Mock Version: 4.1 Mock Version: 4.1 Mock Version: 4.1 ENTER ['do_with_status'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --noclean --target i686 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/inferit-9_5-updates-build-85805-157007/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=86400uid=991gid=135user='mockbuild'nspawn_args=['--capability=cap_ipc_lock', '--bind=/tmp/mock-resolv.nq_vxahn:/etc/resolv.conf', '--bind=/dev/mapper/control', '--bind=/dev/loop-control', '--bind=/dev/loop0', '--bind=/dev/loop1', '--bind=/dev/loop2', '--bind=/dev/loop3', '--bind=/dev/loop4', '--bind=/dev/loop5', '--bind=/dev/loop6', '--bind=/dev/loop7', '--bind=/dev/loop8', '--bind=/dev/loop9', '--bind=/dev/loop10', '--bind=/dev/loop11']unshare_net=TrueprintOutput=False) Using nspawn with args ['--capability=cap_ipc_lock', '--bind=/tmp/mock-resolv.nq_vxahn:/etc/resolv.conf', '--bind=/dev/mapper/control', '--bind=/dev/loop-control', '--bind=/dev/loop0', '--bind=/dev/loop1', '--bind=/dev/loop2', '--bind=/dev/loop3', '--bind=/dev/loop4', '--bind=/dev/loop5', '--bind=/dev/loop6', '--bind=/dev/loop7', '--bind=/dev/loop8', '--bind=/dev/loop9', '--bind=/dev/loop10', '--bind=/dev/loop11'] Executing command: ['/usr/bin/systemd-nspawn', '-q', '-M', '4280e11302a04615a92849b7968c6dce', '-D', '/var/lib/mock/inferit-9_5-updates-build-85805-157007/root', '-a', '-u', 'mockbuild', '--capability=cap_ipc_lock', '--bind=/tmp/mock-resolv.nq_vxahn:/etc/resolv.conf', '--bind=/dev/mapper/control', '--bind=/dev/loop-control', '--bind=/dev/loop0', '--bind=/dev/loop1', '--bind=/dev/loop2', '--bind=/dev/loop3', '--bind=/dev/loop4', '--bind=/dev/loop5', '--bind=/dev/loop6', '--bind=/dev/loop7', '--bind=/dev/loop8', '--bind=/dev/loop9', '--bind=/dev/loop10', '--bind=/dev/loop11', '--console=pipe', '--setenv=TERM=vt100', '--setenv=SHELL=/bin/bash', '--setenv=HOME=/builddir', '--setenv=HOSTNAME=mock', '--setenv=PATH=/usr/bin:/bin:/usr/sbin:/sbin', '--setenv=PROMPT_COMMAND=printf "\\033]0;\\007"', '--setenv=PS1= \\s-\\v\\$ ', '--setenv=LANG=C.UTF-8', '--resolv-conf=off', 'bash', '--login', '-c', '/usr/bin/rpmbuild -bs --noclean --target i686 --nodeps /builddir/build/SPECS/nss.spec'] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8', 'SYSTEMD_NSPAWN_TMPFS_TMP': '0', 'SYSTEMD_SECCOMP': '0'} and shell False Building target platforms: i686 Building for target i686 setting SOURCE_DATE_EPOCH=1731283200 Wrote: /builddir/build/SRPMS/nss-3.101.0-10.el9_5.src.rpm Child return code was: 0 ENTER ['do_with_status'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bb --noclean --target i686 --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/inferit-9_5-updates-build-85805-157007/root'env={'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8'}shell=Falselogger=timeout=86400uid=991gid=135user='mockbuild'nspawn_args=['--capability=cap_ipc_lock', '--bind=/tmp/mock-resolv.nq_vxahn:/etc/resolv.conf', '--bind=/dev/mapper/control', '--bind=/dev/loop-control', '--bind=/dev/loop0', '--bind=/dev/loop1', '--bind=/dev/loop2', '--bind=/dev/loop3', '--bind=/dev/loop4', '--bind=/dev/loop5', '--bind=/dev/loop6', '--bind=/dev/loop7', '--bind=/dev/loop8', '--bind=/dev/loop9', '--bind=/dev/loop10', '--bind=/dev/loop11']unshare_net=TrueprintOutput=False) Using nspawn with args ['--capability=cap_ipc_lock', '--bind=/tmp/mock-resolv.nq_vxahn:/etc/resolv.conf', '--bind=/dev/mapper/control', '--bind=/dev/loop-control', '--bind=/dev/loop0', '--bind=/dev/loop1', '--bind=/dev/loop2', '--bind=/dev/loop3', '--bind=/dev/loop4', '--bind=/dev/loop5', '--bind=/dev/loop6', '--bind=/dev/loop7', '--bind=/dev/loop8', '--bind=/dev/loop9', '--bind=/dev/loop10', '--bind=/dev/loop11'] Executing command: ['/usr/bin/systemd-nspawn', '-q', '-M', '8ca0656abccf405fb065b9196f2bb23b', '-D', '/var/lib/mock/inferit-9_5-updates-build-85805-157007/root', '-a', '-u', 'mockbuild', '--capability=cap_ipc_lock', '--bind=/tmp/mock-resolv.nq_vxahn:/etc/resolv.conf', '--bind=/dev/mapper/control', '--bind=/dev/loop-control', '--bind=/dev/loop0', '--bind=/dev/loop1', '--bind=/dev/loop2', '--bind=/dev/loop3', '--bind=/dev/loop4', '--bind=/dev/loop5', '--bind=/dev/loop6', '--bind=/dev/loop7', '--bind=/dev/loop8', '--bind=/dev/loop9', '--bind=/dev/loop10', '--bind=/dev/loop11', '--console=pipe', '--setenv=TERM=vt100', '--setenv=SHELL=/bin/bash', '--setenv=HOME=/builddir', '--setenv=HOSTNAME=mock', '--setenv=PATH=/usr/bin:/bin:/usr/sbin:/sbin', '--setenv=PROMPT_COMMAND=printf "\\033]0;\\007"', '--setenv=PS1= \\s-\\v\\$ ', '--setenv=LANG=C.UTF-8', '--resolv-conf=off', 'bash', '--login', '-c', '/usr/bin/rpmbuild -bb --noclean --target i686 --nodeps /builddir/build/SPECS/nss.spec'] with env {'TERM': 'vt100', 'SHELL': '/bin/bash', 'HOME': '/builddir', 'HOSTNAME': 'mock', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'PROMPT_COMMAND': 'printf "\\033]0;\\007"', 'PS1': ' \\s-\\v\\$ ', 'LANG': 'C.UTF-8', 'SYSTEMD_NSPAWN_TMPFS_TMP': '0', 'SYSTEMD_SECCOMP': '0'} and shell False Building target platforms: i686 Building for target i686 setting SOURCE_DATE_EPOCH=1731283200 Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.WQFea9 + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nspr-4.35 + /usr/bin/gzip -dc /builddir/build/SOURCES/nspr-4.35.tar.gz + /usr/bin/tar -xof - + STATUS=0 + '[' 0 -ne 0 ']' + cd nspr-4.35 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + cd /builddir/build/BUILD + rm -rf nss-3.101 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.101.tar.gz + /usr/bin/tar -xof - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.101 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . + mv ../nspr-4.35/nspr . + cp ./nspr/config/nspr-config.in ./nspr/config/nspr-config-pc.in + echo 'Patch #100 (nspr-config-pc.patch):' Patch #100 (nspr-config-pc.patch): + /usr/bin/patch --no-backup-if-mismatch -p0 -b --suffix .flags --fuzz=0 patching file nspr/config/nspr-config.in patching file nspr/config/nspr.pc.in + pushd nspr ~/build/BUILD/nss-3.101/nspr ~/build/BUILD/nss-3.101 + /usr/bin/cat /builddir/build/SOURCES/nspr-gcc-atomics.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nspr-4.34-fix-coverity-loop-issue.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nspr-4.34-server-passive.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + popd ~/build/BUILD/nss-3.101 ~/build/BUILD/nss-3.101/nss ~/build/BUILD/nss-3.101 + pushd nss + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-signtool-format.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-extend-db-dump-time.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-enable-sdb-tests.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-dso-ldflags.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-disable-md5.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-no-dbm-man-page.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.71-fix-lto-gtests.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.71-camellia-pkcs12-doc.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-disable-ech.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-fips.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fips-review.patches + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-pbkdf2-indicator.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-skip-ocsp-if-not-connected.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-revert-libpkix-default.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-add-ems-policy.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-fips-safe-memset.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fips-indicators.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-aes-gmc-indicator.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-fips-indicators2.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-dh-test-update.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-ppc_no_init.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-enable-kyber-policy.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fix-rsa-policy-test.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fix-pkcs12-md5-decode.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-el9-restore-old-pkcs12-default.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-no-p12-smime-policy.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fix-missing-size-checks.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-chacha-timing-fix.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-add-certificate-compression-test.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fix-pkcs12-pbkdf1-encoding.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fix-cms-abi-break.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-long-pwd-fix.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fix-shlibsign-fips.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-fips-check-ec25519-size.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch + /usr/bin/cat /builddir/build/SOURCES/nss-3.101-allow-fips-rsa-oaep.patch + /usr/bin/patch -p1 -s --fuzz=0 --no-backup-if-mismatch Patch #300 (nss-3.79-distrusted-certs.patch): + echo 'Patch #300 (nss-3.79-distrusted-certs.patch):' + /usr/bin/patch --no-backup-if-mismatch -p1 --fuzz=0 -R patching file lib/ckfw/builtins/certdata.txt Hunk #1 succeeded at 5819 (offset -1844 lines). Hunk #2 succeeded at 6133 (offset -2204 lines). Hunk #3 succeeded at 6838 (offset -2204 lines). + popd ~/build/BUILD/nss-3.101 + cp /builddir/build/SOURCES/fips_algorithms.h nss/lib/softoken/ + find nss/lib/libpkix -perm /u+x -type f -exec chmod -x '{}' ';' + RPM_EC=0 ++ jobs -p + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.1s0oSz + umask 022 + cd /builddir/build/BUILD + cd nss-3.101 + mkdir -p nspr_build + pushd nspr_build ~/build/BUILD/nss-3.101/nspr_build ~/build/BUILD/nss-3.101 + export 'LDFLAGS=-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 ' + LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 ' + export 'CFLAGS=-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + CFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + ../nspr/configure --prefix=/usr --libdir=/usr/lib --includedir=/usr/include/nspr4 --with-dist-prefix=/builddir/build/BUILD/nss-3.101/nspr_build/../dist '--enable-optimize=-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' --disable-debug checking build system type... i686-pc-linux-gnu checking host system type... i686-pc-linux-gnu checking target system type... i686-pc-linux-gnu checking for whoami... /usr/bin/whoami checking for gcc... gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... no checking for suffix of object files... o checking whether we are using the GNU C compiler... yes checking whether gcc accepts -g... yes checking for gcc option to accept ISO C89... none needed checking for ranlib... ranlib checking for as... /usr/bin/as checking for ar... /usr/bin/ar checking for ld... /usr/bin/ld checking for strip... /usr/bin/strip checking for windres... no checking how to run the C preprocessor... gcc -E checking for gcc -pipe support... no checking for pragma diagnostic... no checking whether C compiler supports -fprofile-generate... yes checking for visibility(hidden) attribute... yes checking for visibility pragma support... yes checking for perl5... no checking for perl... /usr/bin/perl checking for dlopen in -ldl... yes checking dlfcn.h usability... yes checking dlfcn.h presence... yes checking for dlfcn.h... yes checking whether gcc needs -traditional... no checking for dladdr... yes checking for gettid... yes checking for lchown... yes checking for setpriority... yes checking for strerror... yes checking for syscall... yes checking for secure_getenv... yes checking for __secure_getenv... no checking for pthread_create in -lpthreads... no checking for pthread_create in -lpthread... yes checking whether gcc accepts -pthread... yes configure: creating ./config.status config.status: creating Makefile config.status: creating config/Makefile config.status: creating config/autoconf.mk config.status: creating config/nsprincl.mk config.status: creating config/nsprincl.sh config.status: creating config/nspr-config config.status: creating config/nspr.pc config.status: creating lib/Makefile config.status: creating lib/ds/Makefile config.status: creating lib/libc/Makefile config.status: creating lib/libc/include/Makefile config.status: creating lib/libc/src/Makefile config.status: creating lib/tests/Makefile config.status: creating pkg/Makefile config.status: creating pr/Makefile config.status: creating pr/include/Makefile config.status: creating pr/include/md/Makefile config.status: creating pr/include/obsolete/Makefile config.status: creating pr/include/private/Makefile config.status: creating pr/src/Makefile config.status: creating pr/src/io/Makefile config.status: creating pr/src/linking/Makefile config.status: creating pr/src/malloc/Makefile config.status: creating pr/src/md/Makefile config.status: creating pr/src/md/unix/Makefile config.status: creating pr/src/memory/Makefile config.status: creating pr/src/misc/Makefile config.status: creating pr/src/threads/Makefile config.status: creating pr/tests/Makefile config.status: creating pr/tests/dll/Makefile config.status: creating pkg/linux/Makefile config.status: creating pr/src/pthreads/Makefile config.status: executing default commands + sed -i '/^PR_MD_ASFILES/d' config/autoconf.mk + make make -C config export make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/config' gcc -o now.o -c -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM ../../nspr/config/now.c gcc now.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -o now gcc -o nsinstall.o -c -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM ../../nspr/config/nsinstall.c gcc nsinstall.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -o nsinstall rm -f nfspwd; cp ../../nspr/config/nfspwd.pl nfspwd; chmod +x nfspwd rm -f /builddir/build/BUILD/nss-3.101/nspr_build/../dist/bin/nspr-config make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/config' make -C pr export make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr' make -C include export make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include' make -C md export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/md' ../../../config/./nsinstall -R -m 444 ../../../../nspr/pr/include/md/_aix32.cfg ../../../../nspr/pr/include/md/_aix64.cfg ../../../../nspr/pr/include/md/_bsdi.cfg ../../../../nspr/pr/include/md/_darwin.cfg ../../../../nspr/pr/include/md/_freebsd.cfg ../../../../nspr/pr/include/md/_hpux32.cfg ../../../../nspr/pr/include/md/_hpux64.cfg ../../../../nspr/pr/include/md/_linux.cfg ../../../../nspr/pr/include/md/_netbsd.cfg ../../../../nspr/pr/include/md/_nto.cfg ../../../../nspr/pr/include/md/_openbsd.cfg ../../../../nspr/pr/include/md/_os2.cfg ../../../../nspr/pr/include/md/_qnx.cfg ../../../../nspr/pr/include/md/_riscos.cfg ../../../../nspr/pr/include/md/_scoos.cfg ../../../../nspr/pr/include/md/_solaris.cfg ../../../../nspr/pr/include/md/_unixware.cfg ../../../../nspr/pr/include/md/_unixware7.cfg ../../../../nspr/pr/include/md/_win95.cfg ../../../../nspr/pr/include/md/_winnt.cfg /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr/md ../../../config/./nsinstall -R -m 444 ../../../../nspr/pr/include/md/_linux.cfg /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr mv -f /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr/_linux.cfg /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr/prcpucfg.h make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/md' make -C private export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/private' ../../../config/./nsinstall -R -m 444 ../../../../nspr/pr/include/private/pprio.h ../../../../nspr/pr/include/private/pprthred.h ../../../../nspr/pr/include/private/prpriv.h /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr/private make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/private' make -C obsolete export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/obsolete' ../../../config/./nsinstall -R -m 444 ../../../../nspr/pr/include/obsolete/pralarm.h ../../../../nspr/pr/include/obsolete/probslet.h ../../../../nspr/pr/include/obsolete/protypes.h ../../../../nspr/pr/include/obsolete/prsem.h /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr/obsolete make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/obsolete' ../../config/./nsinstall -R -m 444 ../../../nspr/pr/include/nspr.h ../../../nspr/pr/include/pratom.h ../../../nspr/pr/include/prbit.h ../../../nspr/pr/include/prclist.h ../../../nspr/pr/include/prcmon.h ../../../nspr/pr/include/prcountr.h ../../../nspr/pr/include/prcvar.h ../../../nspr/pr/include/prdtoa.h ../../../nspr/pr/include/prenv.h ../../../nspr/pr/include/prerr.h ../../../nspr/pr/include/prerror.h ../../../nspr/pr/include/prinet.h ../../../nspr/pr/include/prinit.h ../../../nspr/pr/include/prinrval.h ../../../nspr/pr/include/prio.h ../../../nspr/pr/include/pripcsem.h ../../../nspr/pr/include/prlink.h ../../../nspr/pr/include/prlock.h ../../../nspr/pr/include/prlog.h ../../../nspr/pr/include/prlong.h ../../../nspr/pr/include/prmem.h ../../../nspr/pr/include/prmon.h ../../../nspr/pr/include/prmwait.h ../../../nspr/pr/include/prnetdb.h ../../../nspr/pr/include/prolock.h ../../../nspr/pr/include/prpdce.h ../../../nspr/pr/include/prprf.h ../../../nspr/pr/include/prproces.h ../../../nspr/pr/include/prrng.h ../../../nspr/pr/include/prrwlock.h ../../../nspr/pr/include/prshm.h ../../../nspr/pr/include/prshma.h ../../../nspr/pr/include/prsystem.h ../../../nspr/pr/include/prthread.h ../../../nspr/pr/include/prtime.h ../../../nspr/pr/include/prtpool.h ../../../nspr/pr/include/prtrace.h ../../../nspr/pr/include/prtypes.h ../../../nspr/pr/include/prvrsion.h ../../../nspr/pr/include/prwin16.h /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include' make -C src export make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src' make -C io export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/io' gcc -o prfdcach.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prfdcach.c gcc -o prmwait.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prmwait.c gcc -o priometh.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/priometh.c gcc -o pripv6.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/pripv6.c ../../../../nspr/pr/src/io/pripv6.c: In function 'Ipv6ToIpv4SocketAccept': ../../../../nspr/pr/src/io/pripv6.c:135:14: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 135 | PRStatus rv; | ^~ ../../../../nspr/pr/src/io/pripv6.c: In function 'Ipv6ToIpv4SocketAcceptRead': ../../../../nspr/pr/src/io/pripv6.c:175:14: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 175 | PRStatus rv; | ^~ gcc -o prmapopt.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prmapopt.c gcc -o prlayer.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prlayer.c ../../../../nspr/pr/src/io/prlayer.c: In function 'pl_TopAccept': ../../../../nspr/pr/src/io/prlayer.c:182:14: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 182 | PRStatus rv; | ^~ ../../../../nspr/pr/src/io/prlayer.c: In function 'pl_DefAcceptread': ../../../../nspr/pr/src/io/prlayer.c:303:14: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 303 | PRStatus rv; | ^~ gcc -o prlog.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prlog.c gcc -o prmmap.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prmmap.c gcc -o prpolevt.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prpolevt.c gcc -o prprf.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prprf.c gcc -o prscanf.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prscanf.c gcc -o prstdio.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/io/prstdio.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/io' make -C linking export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/linking' gcc -o prlink.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/linking/prlink.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/linking' make -C malloc export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/malloc' gcc -o prmalloc.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/malloc/prmalloc.c gcc -o prmem.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/malloc/prmem.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/malloc' make -C md export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md' make -C unix export make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md/unix' gcc -o unix.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../../nspr/pr/include -I../../../../../nspr/pr/include/private ../../../../../nspr/pr/src/md/unix/unix.c ../../../../../nspr/pr/src/md/unix/unix.c: In function '_PR_UnixInit': ../../../../../nspr/pr/src/md/unix/unix.c:2780:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 2780 | int rv; | ^~ gcc -o unix_errors.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../../nspr/pr/include -I../../../../../nspr/pr/include/private ../../../../../nspr/pr/src/md/unix/unix_errors.c gcc -o uxproces.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../../nspr/pr/include -I../../../../../nspr/pr/include/private ../../../../../nspr/pr/src/md/unix/uxproces.c ../../../../../nspr/pr/src/md/unix/uxproces.c: In function 'pr_InstallSigchldHandler': ../../../../../nspr/pr/src/md/unix/uxproces.c:691:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 691 | int rv; | ^~ ../../../../../nspr/pr/src/md/unix/uxproces.c: In function '_MD_InitProcesses': ../../../../../nspr/pr/src/md/unix/uxproces.c:709:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 709 | int rv; | ^~ ../../../../../nspr/pr/src/md/unix/uxproces.c: In function '_MD_unix_terminate_waitpid_daemon': ../../../../../nspr/pr/src/md/unix/uxproces.c:121:9: warning: ignoring return value of 'write' declared with attribute 'warn_unused_result' [-Wunused-result] 121 | write(pr_wp.pipefd[1], "", 1); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~ gcc -o uxrng.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../../nspr/pr/include -I../../../../../nspr/pr/include/private ../../../../../nspr/pr/src/md/unix/uxrng.c gcc -o uxshm.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../../nspr/pr/include -I../../../../../nspr/pr/include/private ../../../../../nspr/pr/src/md/unix/uxshm.c gcc -o uxwrap.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../../nspr/pr/include -I../../../../../nspr/pr/include/private ../../../../../nspr/pr/src/md/unix/uxwrap.c gcc -o linux.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../../nspr/pr/include -I../../../../../nspr/pr/include/private ../../../../../nspr/pr/src/md/unix/linux.c make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md/unix' gcc -o prosdep.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include ../../../../nspr/pr/src/md/prosdep.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md' make -C memory export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/memory' gcc -o prseg.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/memory/prseg.c gcc -o prshm.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/memory/prshm.c gcc -o prshma.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/memory/prshma.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/memory' make -C misc export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/misc' gcc -o pralarm.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/pralarm.c gcc -o pratom.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/pratom.c gcc -o prcountr.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prcountr.c gcc -o prdtoa.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prdtoa.c gcc -o prenv.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prenv.c gcc -o prerr.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prerr.c gcc -o prerror.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prerror.c gcc -o prerrortable.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prerrortable.c gcc -o prinit.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prinit.c gcc -o prinrval.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prinrval.c gcc -o pripc.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/pripc.c gcc -o prlog2.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prlog2.c gcc -o prlong.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prlong.c gcc -o prnetdb.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prnetdb.c gcc -o praton.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/praton.c gcc -o prolock.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prolock.c gcc -o prrng.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prrng.c gcc -o prsystem.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prsystem.c gcc -o prtime.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prtime.c gcc -o prthinfo.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prthinfo.c gcc -o prtpool.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prtpool.c ../../../../nspr/pr/src/misc/prtpool.c: In function 'io_wstart': ../../../../nspr/pr/src/misc/prtpool.c:391:22: warning: variable 'rval_status' set but not used [-Wunused-but-set-variable] 391 | PRStatus rval_status; | ^~~~~~~~~~~ ../../../../nspr/pr/src/misc/prtpool.c: In function 'notify_ioq': ../../../../nspr/pr/src/misc/prtpool.c:997:14: warning: variable 'rval_status' set but not used [-Wunused-but-set-variable] 997 | PRStatus rval_status; | ^~~~~~~~~~~ ../../../../nspr/pr/src/misc/prtpool.c: In function 'PR_JoinThreadPool': ../../../../nspr/pr/src/misc/prtpool.c:1123:14: warning: variable 'rval_status' set but not used [-Wunused-but-set-variable] 1123 | PRStatus rval_status; | ^~~~~~~~~~~ gcc -o prtrace.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/misc/prtrace.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/misc' make -C threads export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/threads' gcc -o prcmon.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/threads/prcmon.c gcc -o prrwlock.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/threads/prrwlock.c gcc -o prtpd.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/threads/prtpd.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/threads' make -C pthreads export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/pthreads' gcc -o ptio.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/pthreads/ptio.c ../../../../nspr/pr/src/pthreads/ptio.c: In function 'pt_linux_sendfile_cont': ../../../../nspr/pr/src/pthreads/ptio.c:1162:11: warning: variable 'oldoffset' set but not used [-Wunused-but-set-variable] 1162 | off_t oldoffset; | ^~~~~~~~~ gcc -o ptsynch.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/pthreads/ptsynch.c ../../../../nspr/pr/src/pthreads/ptsynch.c: In function '_PR_InitLocks': ../../../../nspr/pr/src/pthreads/ptsynch.c:49:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 49 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'pt_PostNotifies': ../../../../nspr/pr/src/pthreads/ptsynch.c:65:19: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 65 | PRIntn index, rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_NewLock': ../../../../nspr/pr/src/pthreads/ptsynch.c:134:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 134 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_DestroyLock': ../../../../nspr/pr/src/pthreads/ptsynch.c:155:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 155 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_Lock': ../../../../nspr/pr/src/pthreads/ptsynch.c:174:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 174 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_Unlock': ../../../../nspr/pr/src/pthreads/ptsynch.c:195:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 195 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'pt_PostNotifiesFromMonitor': ../../../../nspr/pr/src/pthreads/ptsynch.c:473:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 473 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_DestroyMonitor': ../../../../nspr/pr/src/pthreads/ptsynch.c:559:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 559 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_GetMonitorEntryCount': ../../../../nspr/pr/src/pthreads/ptsynch.c:580:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 580 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_EnterMonitor': ../../../../nspr/pr/src/pthreads/ptsynch.c:610:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 610 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PR_ExitMonitor': ../../../../nspr/pr/src/pthreads/ptsynch.c:640:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 640 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PRP_DestroyNakedCondVar': ../../../../nspr/pr/src/pthreads/ptsynch.c:1246:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1246 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PRP_NakedNotify': ../../../../nspr/pr/src/pthreads/ptsynch.c:1277:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1277 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptsynch.c: In function 'PRP_NakedBroadcast': ../../../../nspr/pr/src/pthreads/ptsynch.c:1286:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1286 | int rv; | ^~ gcc -o ptthread.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/pthreads/ptthread.c ../../../../nspr/pr/src/pthreads/ptthread.c: In function 'pt_AttachThread': ../../../../nspr/pr/src/pthreads/ptthread.c:277:13: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 277 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function 'PR_DetachThread': ../../../../nspr/pr/src/pthreads/ptthread.c:621:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 621 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function 'PR_Interrupt': ../../../../nspr/pr/src/pthreads/ptthread.c:770:16: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 770 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function '_pt_thread_death': ../../../../nspr/pr/src/pthreads/ptthread.c:846:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 846 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function '_PR_Fini': ../../../../nspr/pr/src/pthreads/ptthread.c:1089:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1089 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function 'PR_Cleanup': ../../../../nspr/pr/src/pthreads/ptthread.c:1124:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1124 | int rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function 'init_pthread_gc_support': ../../../../nspr/pr/src/pthreads/ptthread.c:1242:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1242 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function 'pt_SuspendSet': ../../../../nspr/pr/src/pthreads/ptthread.c:1446:12: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1446 | PRIntn rv; | ^~ ../../../../nspr/pr/src/pthreads/ptthread.c: In function 'PR_SuspendAll': ../../../../nspr/pr/src/pthreads/ptthread.c:1557:9: warning: variable 'rv' set but not used [-Wunused-but-set-variable] 1557 | int rv; | ^~ gcc -o ptmisc.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../../nspr/pr/include -I../../../../nspr/pr/include/private ../../../../nspr/pr/src/pthreads/ptmisc.c make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/pthreads' make build make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src' rm -f libnspr4.a /usr/bin/ar cr libnspr4.a io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o ranlib libnspr4.a gcc -o prvrsion.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -D_NSPR_BUILD_ -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../nspr/pr/include -I../../../nspr/pr/include/private -I. ../../../nspr/pr/src/prvrsion.c ../../../nspr/pr/src/prvrsion.c: In function 'libVersionPoint': ../../../nspr/pr/src/prvrsion.c:88:17: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] 88 | const char *dummy; | ^~~~~ rm -f libnspr4.so gcc -shared -Wl,-soname -Wl,libnspr4.so -o libnspr4.so ./prvrsion.o io/./prfdcach.o io/./prmwait.o io/./prmapopt.o io/./priometh.o io/./pripv6.o io/./prlayer.o io/./prlog.o io/./prmmap.o io/./prpolevt.o io/./prprf.o io/./prscanf.o io/./prstdio.o threads/./prcmon.o threads/./prrwlock.o threads/./prtpd.o linking/./prlink.o malloc/./prmalloc.o malloc/./prmem.o md/./prosdep.o memory/./prshm.o memory/./prshma.o memory/./prseg.o misc/./pralarm.o misc/./pratom.o misc/./prcountr.o misc/./prdtoa.o misc/./prenv.o misc/./prerr.o misc/./prerror.o misc/./prerrortable.o misc/./prinit.o misc/./prinrval.o misc/./pripc.o misc/./prlog2.o misc/./prlong.o misc/./prnetdb.o misc/./praton.o misc/./prolock.o misc/./prrng.o misc/./prsystem.o misc/./prthinfo.o misc/./prtpool.o misc/./prtrace.o misc/./prtime.o pthreads/./ptsynch.o pthreads/./ptio.o pthreads/./ptthread.o pthreads/./ptmisc.o md/unix/./unix.o md/unix/./unix_errors.o md/unix/./uxproces.o md/unix/./uxrng.o md/unix/./uxshm.o md/unix/./uxwrap.o md/unix/./linux.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -lpthread -ldl -lrt lto-wrapper: warning: using serial compilation of 3 LTRANS jobs ../../config/./nsinstall -R -m 444 ./libnspr4.a ./libnspr4.so /builddir/build/BUILD/nss-3.101/nspr_build/../dist/lib ../../config/./nsinstall -R -m 444 ./libnspr4.so /builddir/build/BUILD/nss-3.101/nspr_build/../dist/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr' make -C lib export make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib' make -C ds export make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/ds' gcc -o plarena.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../nspr/pr/include ../../../nspr/lib/ds/plarena.c gcc -o plhash.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../nspr/pr/include ../../../nspr/lib/ds/plhash.c rm -f libplds4.a /usr/bin/ar cr libplds4.a ./plarena.o ./plhash.o ranlib libplds4.a gcc -o plvrsion.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I../../../nspr/pr/include -I. ../../../nspr/lib/ds/plvrsion.c ../../../nspr/lib/ds/plvrsion.c: In function 'libVersionPoint': ../../../nspr/lib/ds/plvrsion.c:88:17: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] 88 | const char *dummy; | ^~~~~ rm -f libplds4.so gcc -shared -Wl,-soname -Wl,libplds4.so -o libplds4.so ./plarena.o ./plhash.o ./plvrsion.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -L/builddir/build/BUILD/nss-3.101/nspr_build/../dist/lib -lnspr4 ../../config/./nsinstall -R -m 444 ../../../nspr/lib/ds/plarenas.h ../../../nspr/lib/ds/plarena.h ../../../nspr/lib/ds/plhash.h /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../config/./nsinstall -R -m 444 ./libplds4.a ./libplds4.so /builddir/build/BUILD/nss-3.101/nspr_build/../dist/lib ../../config/./nsinstall -R -m 444 ./libplds4.so /builddir/build/BUILD/nss-3.101/nspr_build/../dist/bin make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/ds' make -C libc export make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc' make -C include export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/include' ../../../config/./nsinstall -R -m 444 ../../../../nspr/lib/libc/include/plbase64.h ../../../../nspr/lib/libc/include/plerror.h ../../../../nspr/lib/libc/include/plgetopt.h ../../../../nspr/lib/libc/include/plstr.h /builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/include' make -C src export make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/src' gcc -o strlen.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strlen.c gcc -o strcpy.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strcpy.c gcc -o strdup.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strdup.c gcc -o strcase.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strcase.c gcc -o strcat.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strcat.c gcc -o strcmp.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strcmp.c gcc -o strchr.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strchr.c gcc -o strpbrk.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strpbrk.c gcc -o strstr.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strstr.c gcc -o strtok.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/strtok.c gcc -o base64.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/base64.c gcc -o plerror.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/plerror.c gcc -o plgetopt.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr ../../../../nspr/lib/libc/src/plgetopt.c rm -f libplc4.a /usr/bin/ar cr libplc4.a ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o ranlib libplc4.a gcc -o plvrsion.o -c -fvisibility=hidden -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wall -pthread -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -fPIC -UDEBUG -DPACKAGE_NAME=\"\" -DPACKAGE_TARNAME=\"\" -DPACKAGE_VERSION=\"\" -DPACKAGE_STRING=\"\" -DPACKAGE_BUGREPORT=\"\" -DPACKAGE_URL=\"\" -DNDEBUG=1 -DHAVE_VISIBILITY_HIDDEN_ATTRIBUTE=1 -DHAVE_VISIBILITY_PRAGMA=1 -DXP_UNIX=1 -D_GNU_SOURCE=1 -DHAVE_FCNTL_FILE_LOCKING=1 -DHAVE_POINTER_LOCALTIME_R=1 -DLINUX=1 -Di386=1 -DHAVE_DLADDR=1 -DHAVE_GETTID=1 -DHAVE_LCHOWN=1 -DHAVE_SETPRIORITY=1 -DHAVE_STRERROR=1 -DHAVE_SYSCALL=1 -DHAVE_SECURE_GETENV=1 -D_REENTRANT=1 -DFORCE_PR_LOG -D_PR_PTHREADS -UHAVE_CVAR_BUILT_ON_SEM -I/builddir/build/BUILD/nss-3.101/nspr_build/../dist/include/nspr -I. ../../../../nspr/lib/libc/src/plvrsion.c ../../../../nspr/lib/libc/src/plvrsion.c: In function 'libVersionPoint': ../../../../nspr/lib/libc/src/plvrsion.c:88:17: warning: variable 'dummy' set but not used [-Wunused-but-set-variable] 88 | const char *dummy; | ^~~~~ rm -f libplc4.so gcc -shared -Wl,-soname -Wl,libplc4.so -o libplc4.so ./plvrsion.o ./strlen.o ./strcpy.o ./strdup.o ./strcase.o ./strcat.o ./strcmp.o ./strchr.o ./strpbrk.o ./strstr.o ./strtok.o ./base64.o ./plerror.o ./plgetopt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -L/builddir/build/BUILD/nss-3.101/nspr_build/../dist/lib -lnspr4 ../../../config/./nsinstall -R -m 444 ./libplc4.a ./libplc4.so /builddir/build/BUILD/nss-3.101/nspr_build/../dist/lib ../../../config/./nsinstall -R -m 444 ./libplc4.so /builddir/build/BUILD/nss-3.101/nspr_build/../dist/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/src' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib' + date '+%e %B %Y' + tr -d '\n' + echo -n 4.35.0 + for m in /builddir/build/SOURCES/nspr-config.xml + cp /builddir/build/SOURCES/nspr-config.xml . + for m in nspr-config.xml + xmlto man nspr-config.xml Note: Writing nspr-config.1 ~/build/BUILD/nss-3.101 + popd + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export 'NSS_FIPS_VERSION=nss\ 3.101.0-892ca980b854fa8a' + NSS_FIPS_VERSION='nss\ 3.101.0-892ca980b854fa8a' ++ sed -n 's/^\(\(NAME\|VERSION_ID\)=.*\)/OS_\1/p' /etc/os-release ++ sed -e 's/ /\\ /g' + eval 'OS_NAME="MSVSphere"' 'OS_VERSION_ID="9.5"' ++ OS_NAME=MSVSphere ++ OS_VERSION_ID=9.5 + export 'FIPS_MODULE_OS=MSVSphere\ 9' + FIPS_MODULE_OS='MSVSphere\ 9' + export 'NSS_FIPS_MODULE_ID=MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a' + NSS_FIPS_MODULE_ID='MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a' + export NSS_FIPS_140_3=1 + NSS_FIPS_140_3=1 + export NSS_ENABLE_FIPS_INDICATORS=1 + NSS_ENABLE_FIPS_INDICATORS=1 + export BUILD_OPT=1 + BUILD_OPT=1 + export 'XCFLAGS=-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + XCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection' + export 'XCFLAGS=-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter' + XCFLAGS='-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter' + export 'DSO_LDFLAGS=-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 ' + DSO_LDFLAGS='-Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 ' + export PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export NSPR_INCLUDE_DIR=/builddir/build/BUILD/nss-3.101/dist/include/nspr + NSPR_INCLUDE_DIR=/builddir/build/BUILD/nss-3.101/dist/include/nspr + export NSPR_LIB_DIR=/builddir/build/BUILD/nss-3.101/dist/lib + NSPR_LIB_DIR=/builddir/build/BUILD/nss-3.101/dist/lib + export NSS_USE_SYSTEM_SQLITE=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_ALLOW_SSLKEYLOGFILE=1 + NSS_ALLOW_SSLKEYLOGFILE=1 + export NSS_SEED_ONLY_DEV_URANDOM=1 + NSS_SEED_ONLY_DEV_URANDOM=1 + export NSS_DISABLE_DBM=1 + NSS_DISABLE_DBM=1 + export POLICY_FILE=nss.config + POLICY_FILE=nss.config + export POLICY_PATH=/etc/crypto-policies/back-ends + POLICY_PATH=/etc/crypto-policies/back-ends + /usr/bin/make -C ./nss all make: Entering directory '/builddir/build/BUILD/nss-3.101/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 # no real way to encode these in any sensible way /usr/bin/make -C coreconf/nsinstall program make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nsinstall.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pathsub.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pathsub.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pathsub.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -lpthread -ldl -lc true -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/coreconf/nsinstall' /usr/bin/make export make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/coreconf/nsinstall' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/coreconf' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 baset.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbaset.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssbase.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/base' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 genname.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 xconst.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certxutl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 certdb.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/certdb' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocsp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ocspt.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/certhigh' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptohi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cryptoht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 key.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyhi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keyt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 keythi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sechash.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/cryptohi' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckhelper.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 devt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 dev.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssdevt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssdev.h ../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/dev' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_errorstrings.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_results.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkixt.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_params.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revchecker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certstore.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pki.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_sample_modules.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_checker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_system.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_util.h ../../../../dist/private/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/include' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcertselparams.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlselector.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_certchainchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_crlchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_ekuchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_expirationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_namechainingchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_nameconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_ocspchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_policychecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revocationmethod.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_revocationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_signaturechecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_targetcertchecker.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/checker' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_trustanchor.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_valparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_resourcelimits.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/params' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_policynode.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_valresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_verifynode.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/results' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/store' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_build.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_validate.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/top' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_error.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_logger.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_list.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/util' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_cert.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyinfo.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicymap.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyqualifier.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crl.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crldp.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crlentry.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_date.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_generalname.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_infoaccess.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nameconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocsprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_publickey.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_x500name.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mem.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_object.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_string.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_primhash.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bigint.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mutex.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bytearray.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_oid.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_hashtable.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_rwlock.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_monitorlock.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_colcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapt.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldaprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nsscontext.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pk11certstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkix_pl_socket.h ../../../../../dist/private/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 dev3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmod.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secpkcs5.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11func.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11hpke.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11pub.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11priv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11sdr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11pqg.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pk11wrap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsspki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkistore.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pki3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkitm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkim.h ../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pki' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 verref.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 templates.c ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 base64.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ciferfam.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 eccutil.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hasht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 kyber.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssb64.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssb64t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsshash.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsslocks.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssilock.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssilckt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrwlk.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrwlkt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssutil.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11f.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11p.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11n.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11u.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs1sig.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 portreg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secasn1.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secasn1t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 seccomon.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secder.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secdert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secdig.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secdigt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secitem.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secoid.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secoidt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secport.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 utilmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 utilrename.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 utilpars.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 utilparst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11uri.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssoptions.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/nss' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ck.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfw.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfwm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckfwtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckmd.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ckt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssck.api ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckepv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfw.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfwc.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckfwt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckmdt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckt.h ../../../dist/public/nss make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Nothing to be done for 'export'. make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins/testlib' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 crmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmmft.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/crmf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jar-ds.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 jarfile.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/jar' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12plcy.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p12t.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs12' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 p7local.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secpkcs7.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs7t.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs7' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmslocal.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cms.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 smime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmsreclist.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/smime' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ssl.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslexp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sslproto.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 preenc.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ssl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/sysinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 cmac.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 alghmac.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blake2b.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 chacha20poly1305.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 hmacct.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secmpi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secrng.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ec.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ecl/ecl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ecl/ecl-curve.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ecl/eclt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 blapit.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 shsign.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 ecl/ecl-exp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 nsslowhash.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/softoken' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pkcs11ni.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 softoken.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 softoknt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 softkver.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sdb.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 sftkdbt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lowkeyi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 lowkeyti.h ../../../dist/public/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/softoken' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 basicutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 secutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 444 pk11table.h ../../../dist/private/nss make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lib' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/bltest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/bltest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ecperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ecperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fbectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fbectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fipstest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fipstest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lowhashtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lowhashtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 Makefile:100: warning: overriding recipe for target 'libs' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'libs' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for 'export'. make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/mangle' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/addbuiltin' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/atob' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/btoa' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/certutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/chktest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crlutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crmftest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/derdump' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/digest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/httpserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/listsuites' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/makepqg' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/multinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/nss-policy-check' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspresp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/oidcalc' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7content' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7env' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7verify' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk12util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11importtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11ectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11gcmtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11mode' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk1sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pwdecrypt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsaperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsapoptst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdbthreadtst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdrtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/selfserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signver' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target 'install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'install' make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/smimetools' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ssltap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/strsclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/symkeyutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tests' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tstclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/validation' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfychain' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfyserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/modutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pkix-errcodes' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cpputil' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Nothing to be done for 'export'. make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cpputil' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/google_test' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/google_test' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/common' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/common' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/util_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/util_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/base_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/base_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certdb_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certdb_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certhigh_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certhigh_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/cryptohi_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/cryptohi_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/der_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/der_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/freebl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/freebl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pkcs11testmodule' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pkcs11testmodule' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pk11_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pk11_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/smime_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/smime_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/softoken_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/softoken_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/ssl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/ssl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/sysinit_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/sysinit_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/nss_bogo_shim' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for 'export'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/nss_bogo_shim' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss' /usr/bin/make libs make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 true -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/coreconf/nsinstall' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/coreconf' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/arena.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter arena.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/error.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter error.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/errorval.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter errorval.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hashops.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter hashops.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter libc.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tracker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tracker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/item.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter item.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter utf8.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter list.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter hash.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/arena.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/error.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/errorval.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hashops.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libc.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tracker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/item.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/list.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hash.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/base' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/alg1485.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter alg1485.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdb.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certdb.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certv3.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certv3.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certxutl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certxutl.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crl.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/genname.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter genname.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter stanpcertdb.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/polcyxtn.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter polcyxtn.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secname.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secname.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xauthkid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter xauthkid.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xbsconst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter xbsconst.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xconst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter xconst.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/alg1485.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdb.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certv3.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certxutl.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crl.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/genname.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/polcyxtn.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secname.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xauthkid.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xbsconst.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xconst.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/certdb' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhtml.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certhtml.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certreq.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certreq.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlv2.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crlv2.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocsp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ocsp.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspsig.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ocspsig.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certhigh.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certvfy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certvfy.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certvfypkix.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certvfypkix.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xcrldist.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter xcrldist.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhtml.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certreq.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlv2.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocsp.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspsig.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certvfy.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certvfypkix.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xcrldist.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/certhigh' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sechash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sechash.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/seckey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter seckey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secsign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secsign.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secvfy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secvfy.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dsautil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dsautil.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sechash.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/seckey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secsign.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secvfy.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dsautil.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/cryptohi' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devslot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter devslot.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devtoken.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter devtoken.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter devutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ckhelper.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ckhelper.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devslot.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devtoken.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ckhelper.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/dev' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for 'libs'. make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/include' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_certselector.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_comcertselparams.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_crlselector.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_comcrlselparams.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_basicconstraintschecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_certchainchecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_crlchecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_ekuchecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_expirationchecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_namechainingchecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_nameconstraintschecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_ocspchecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_revocationmethod.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_revocationchecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_policychecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_signaturechecker.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_targetcertchecker.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/checker' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_trustanchor.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_procparams.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_valparams.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_resourcelimits.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/params' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_buildresult.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_policynode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_valresult.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_verifynode.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/results' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_store.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_store.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_store.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/store' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_validate.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_validate.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_lifecycle.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_build.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_build.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_validate.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_build.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/top' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_tools.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_tools.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_error.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_error.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_logger.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_logger.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_list.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_errpaths.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_tools.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_error.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_logger.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_list.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix/util' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_basicconstraints.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_cert.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_certpolicyinfo.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_certpolicymap.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_certpolicyqualifier.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_crl.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_crldp.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_crlentry.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_date.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_generalname.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_infoaccess.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_nameconstraints.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ocsprequest.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ocspresponse.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_publickey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_x500name.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ocspcertid.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_bigint.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_bytearray.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_common.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_error.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_hashtable.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_lifecycle.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_mem.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_monitorlock.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_mutex.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_object.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_oid.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_primhash.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_rwlock.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_string.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_aiamgr.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_colcertstore.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_httpcertstore.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_httpdefaultclient.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ldaptemplates.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ldapcertstore.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ldapresponse.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ldaprequest.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_ldapdefaultclient.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_nsscontext.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_pk11certstore.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix_pl_socket.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/libpkix' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dev3hack.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dev3hack.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11akey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11akey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11auth.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11auth.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11cert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11cert.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11cxt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11cxt.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11err.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11err.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11hpke.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11hpke.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11kea.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11kea.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11list.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11load.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11load.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mech.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11mech.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11merge.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11merge.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11nobj.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11nobj.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11obj.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11obj.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pars.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11pars.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pbe.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11pbe.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pk12.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11pk12.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pqg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11pqg.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11sdr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11sdr.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11skey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11skey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11slot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11slot.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11util.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11util.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dev3hack.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11akey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11auth.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11cert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11cxt.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11err.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11hpke.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11kea.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11list.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11load.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mech.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11merge.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11nobj.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11obj.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pars.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pbe.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pk12.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pqg.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11sdr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11skey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11slot.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11util.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pk11wrap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/asymmkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter asymmkey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certificate.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certificate.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptocontext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cryptocontext.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symmkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter symmkey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/trustdomain.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter trustdomain.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tdcache.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tdcache.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdecode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certdecode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkistore.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkistore.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkibase.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkibase.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pki3hack.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pki3hack.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/asymmkey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certificate.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptocontext.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symmkey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/trustdomain.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tdcache.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdecode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkistore.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkibase.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pki3hack.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pki' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/quickder.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter quickder.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secdig.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secdig.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter derdec.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derenc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter derenc.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dersubr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dersubr.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertime.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dertime.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/errstrs.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter errstrs.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssb64d.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nssb64d.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssb64e.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nssb64e.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsshash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nsshash.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssrwlk.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nssrwlk.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssilock.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nssilock.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidstring.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter oidstring.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs1sig.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkcs1sig.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/portreg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter portreg.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secalgid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secalgid.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1d.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secasn1d.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1e.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secasn1e.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1u.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secasn1u.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secitem.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secitem.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secload.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secload.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secoid.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secoid.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sectime.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sectime.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secport.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secport.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/templates.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter templates.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter utf8.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilmod.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter utilmod.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilpars.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter utilpars.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11uri.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkcs11uri.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/quickder.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secdig.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derenc.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dersubr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertime.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/errstrs.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssb64d.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssb64e.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsshash.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssrwlk.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssilock.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidstring.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/portreg.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secalgid.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1d.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1e.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1u.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secitem.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secload.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secoid.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sectime.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secport.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/templates.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilmod.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilpars.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11uri.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil.a grep -v ';-' nssutil.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssutil.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil3.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libnssutil3.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssutil.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil3.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/quickder.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secdig.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derenc.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dersubr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertime.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/errstrs.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssb64d.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssb64e.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsshash.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssrwlk.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssilock.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidstring.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs1sig.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/portreg.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secalgid.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1d.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1e.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secasn1u.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secitem.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secload.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secoid.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sectime.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secport.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/templates.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilmod.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilpars.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11uri.o -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc lto-wrapper: warning: using serial compilation of 2 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil3.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssutil3.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nssinit.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssoptions.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nssoptions.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nssver.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilwrap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss.config\" -DPOLICY_PATH=\"/etc/crypto-policies/back-ends\" -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter utilwrap.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilwrap.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssinit.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssoptions.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utilwrap.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhtml.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certreq.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlv2.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocsp.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspsig.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certvfy.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certvfypkix.o ../certhigh/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xcrldist.o ../cryptohi/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sechash.o ../cryptohi/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/seckey.o ../cryptohi/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secsign.o ../cryptohi/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secvfy.o ../cryptohi/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dsautil.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dev3hack.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11akey.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11auth.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11cert.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11err.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11hpke.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11kea.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11list.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11load.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mech.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11merge.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11obj.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pars.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11skey.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11slot.o ../pk11wrap/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11util.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/alg1485.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdb.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certv3.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certxutl.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crl.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/genname.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/stanpcertdb.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/polcyxtn.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secname.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xauthkid.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xbsconst.o ../certdb/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/xconst.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/asymmkey.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certificate.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptocontext.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symmkey.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/trustdomain.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tdcache.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdecode.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkistore.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkibase.o ../pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pki3hack.o ../dev/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devslot.o ../dev/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devtoken.o ../dev/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/devutil.o ../dev/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ckhelper.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/arena.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/error.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/errorval.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hashops.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libc.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tracker.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/item.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/list.o ../base/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc lto-wrapper: warning: using serial compilation of 19 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnss3.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/nss' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crypto.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crypto.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/find.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter find.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter hash.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/instance.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter instance.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mutex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mutex.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/object.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter object.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/session.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter session.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sessobj.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sessobj.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/slot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter slot.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/token.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter token.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/wrap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter wrap.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mechanism.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mechanism.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crypto.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/find.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/hash.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/instance.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mutex.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/object.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/session.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sessobj.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/slot.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/token.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/wrap.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mechanism.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter anchor.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter constants.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter bfind.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter binst.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter bobject.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter bsession.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter bslot.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter btoken.c perl certdata.perl certdata.txt Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssckbi.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nssckbi.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/anchor.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/constants.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bfind.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/binst.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bobject.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bsession.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bslot.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoken.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc lto-wrapper: warning: using serial compilation of 2 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' make[5]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../anchor.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bfind.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../binst.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bobject.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bsession.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../bslot.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../btoken.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../ckbiver.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins ../constants.c perl ../certdata.perl certdata-testlib.txt Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../../../lib/ckfw/builtins Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libnssckbi-testlib.so -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/anchor.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bfind.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/binst.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bobject.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bsession.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bslot.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoken.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ckbiver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/constants.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdata-testlib.o ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc lto-wrapper: warning: using serial compilation of 2 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so ../../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi-testlib.so ../../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[5]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins/testlib' ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckbi.so ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnssckfw.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ckfw' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfenc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crmfenc.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmftmpl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crmftmpl.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfreq.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crmfreq.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfpop.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crmfpop.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfdec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crmfdec.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfget.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crmfget.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfcont.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crmfcont.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmmfasn1.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfresp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmmfresp.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfrec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmmfrec.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfchal.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmmfchal.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/servget.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter servget.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/encutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter encutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/respcli.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter respcli.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/respcmn.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter respcmn.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/challcli.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter challcli.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/asn1cmn.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter asn1cmn.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfenc.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmftmpl.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfreq.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfpop.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfdec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfget.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmfcont.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfasn1.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfresp.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfrec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmmfchal.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/servget.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/encutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/respcli.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/respcmn.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/challcli.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/asn1cmn.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcrmf.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/crmf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jarver.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarsign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jarsign.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jar.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jar.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jar-ds.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jar-ds.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarfile.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jarfile.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarint.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_X86_OR_X64 -DNSS_X86 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jarint.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libjar.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libjar.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarsign.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jar.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jar-ds.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarfile.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jarint.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libjar.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libjar.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/jar' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12local.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p12local.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12creat.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p12creat.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12dec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p12dec.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12plcy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p12plcy.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12tmpl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p12tmpl.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12e.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p12e.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12d.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p12d.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12local.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12creat.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12dec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12plcy.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12tmpl.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12e.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12d.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs12' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certread.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certread.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7common.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7common.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7create.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7create.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7decode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7decode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7encode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7encode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7local.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7local.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmime.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secmime.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certread.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7common.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7create.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7decode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7encode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7local.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmime.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/pkcs7' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsarray.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsarray.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsasn1.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsasn1.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsattr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsattr.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmscinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmscinfo.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmscipher.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmscipher.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdecode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsdecode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsdigdata.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdigest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsdigest.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsencdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsencdata.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsencode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsencode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsenvdata.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsmessage.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsmessage.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmspubkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmspubkey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsrecinfo.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsreclist.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsreclist.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmssigdata.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmssigdata.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmssiginfo.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsudf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsudf.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimemessage.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter smimemessage.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimeutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter smimeutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimever.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter smimever.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimever.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smime.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smime.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsarray.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsasn1.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsattr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmscinfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmscipher.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdecode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdigdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsdigest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsencdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsencode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsenvdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsmessage.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmspubkey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsrecinfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsreclist.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmssigdata.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmssiginfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsudf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimemessage.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimeutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smimever.o ../pkcs12/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12local.o ../pkcs12/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12creat.o ../pkcs12/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12dec.o ../pkcs12/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12plcy.o ../pkcs12/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12tmpl.o ../pkcs12/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12e.o ../pkcs12/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12d.o ../pkcs7/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certread.o ../pkcs7/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7common.o ../pkcs7/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7create.o ../pkcs7/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7decode.o ../pkcs7/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7encode.o ../pkcs7/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7local.o ../pkcs7/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmime.o -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc lto-wrapper: warning: using serial compilation of 2 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsmime3.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/smime' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/authcert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter authcert.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmpcert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmpcert.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dtls13con.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dtls13con.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dtlscon.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dtlscon.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/prelib.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter prelib.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter selfencrypt.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3con.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssl3con.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssl3ecc.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3ext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssl3ext.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssl3exthandle.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssl3gthr.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslauth.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslauth.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslbloom.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslbloom.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslcert.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslcert.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslcon.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslcon.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssldef.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssldef.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslencode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslencode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslenum.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslenum.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslerr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslerr.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslerrstrs.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslgrp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslgrp.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslinfo.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslinfo.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslinit.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslmutex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslmutex.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslnonce.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslnonce.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslprimitive.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslprimitive.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslreveal.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslreveal.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsecur.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslsecur.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsnce.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslsnce.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsock.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslsock.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslspec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslspec.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltrace.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssltrace.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sslver.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13con.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13con.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13ech.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13ech.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13echv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13echv.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13exthandle.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13hashstate.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13hkdf.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13psk.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13psk.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13replay.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13replay.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tls13subcerts.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/unix_err.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter unix_err.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/authcert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dtls13con.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/prelib.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslbloom.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslencode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslprimitive.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslspec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13ech.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13echv.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13psk.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13replay.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/unix_err.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/authcert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmpcert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dtls13con.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dtlscon.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/prelib.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3con.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3ecc.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3ext.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3exthandle.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl3gthr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslauth.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslbloom.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslcert.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslcon.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssldef.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslencode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslenum.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslerr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslerrstrs.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslgrp.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslinfo.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslinit.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslmutex.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslnonce.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslprimitive.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslreveal.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsecur.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsnce.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslsock.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslspec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltrace.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sslver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13con.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13ech.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13echv.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13exthandle.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13hashstate.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13hkdf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13psk.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13replay.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls13subcerts.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/unix_err.o -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnss3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc lto-wrapper: warning: using serial compilation of 6 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl3.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/ssl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nsssysinit.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a grep -v ';-' nsssysinit.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libnsssysinit.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsssysinit.o -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libnsssysinit.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/sysinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/loader.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter loader.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libfreebl.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libfreebl.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/loader.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libfreebl.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libfreebl.a /usr/bin/make FREEBL_CHILD_BUILD=1 NEEDED_DUMMY=1 OBJDIR=Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter freeblver.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ldvector.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sysrand.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sha_fast.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter md2.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter md5.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sha512.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha3.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sha3.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shake.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter shake.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cmac.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmac.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter alghmac.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter rawhash.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter arcfour.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter arcfive.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/crypto_primitives.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crypto_primitives.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/blake2b.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter blake2b.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter desblapi.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter des.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter drbg.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter chacha20poly1305.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cts.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ctr.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/blinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter blinit.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter fipsfreebl.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter gcm.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter hmacct.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter rijndael.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter aeskeywrap.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter camellia.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dh.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ec.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ecdecode.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pqg.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dsa.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter rsa.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa_blind.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter rsa_blind.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter rsapkcs.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter shvfy.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tlsprfalg.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jpake.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/secmpi.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secmpi.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/kyber.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter kyber.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/kyber-pqcrystals-ref.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter kyber-pqcrystals-ref.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mpi/mpprime.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mpi/mpmontg.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mpi/mplogic.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mpi/mpi.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mpi/mp_gf2m.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mpi/mpcpucache.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_25519.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ecl/ecp_25519.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp256r1.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ecl/ecp_secp256r1.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp384r1.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ecl/ecp_secp384r1.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp521r1.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ecl/ecp_secp521r1.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/curve25519_32.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ecl/curve25519_32.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Poly1305_32.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_Poly1305_32.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_Chacha20.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20Poly1305_32.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_Chacha20Poly1305_32.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Hash_SHA3.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_Hash_SHA3.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P256.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_P256.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P384.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_P384.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P521.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_P521.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Ed25519.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_Ed25519.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Curve25519_51.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verified/Hacl_Curve25519_51.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter stubs.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nsslowhash.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm-x86.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -mpclmul -maes gcm-x86.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aes-x86.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -mpclmul -maes aes-x86.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha256-x86.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -msha -mssse3 -msse4.1 sha256-x86.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/seed.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter deprecated/seed.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/alg2268.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter deprecated/alg2268.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -c mpi/mpi_x86.s grep -v ';-' freebl_hash_vector.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libfreeblpriv3.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblpriv.def -Wl,-Bsymbolic -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freeblver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ldvector.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sysrand.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha_fast.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md2.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/md5.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha512.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha3.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shake.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cmac.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/alghmac.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rawhash.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfour.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/arcfive.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/crypto_primitives.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/blake2b.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/desblapi.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/des.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/drbg.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/chacha20poly1305.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/cts.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ctr.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/blinit.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/fipsfreebl.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/hmacct.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rijndael.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aeskeywrap.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/camellia.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dh.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecdecode.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/pqg.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/dsa.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsa_blind.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/rsapkcs.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/shvfy.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/tlsprfalg.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/jpake.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/secmpi.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/kyber.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/kyber-pqcrystals-ref.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpprime.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpmontg.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mplogic.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mp_gf2m.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpcpucache.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_25519.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp256r1.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp384r1.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/ecp_secp521r1.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/curve25519_32.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Poly1305_32.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Chacha20Poly1305_32.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Hash_SHA3.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P256.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P384.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_P521.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Ed25519.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/Hacl_Curve25519_51.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/stubs.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/nsslowhash.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/gcm-x86.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/aes-x86.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/sha256-x86.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/seed.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/deprecated/alg2268.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/mpi_x86.o -ldl -lc lto-wrapper: warning: using serial compilation of 14 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' /usr/bin/make FREEBL_CHILD_BUILD=1 USE_STUB_BUILD=1 OBJDIR=Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB libs make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -DKYBER_K=3 -DRIJNDAEL_INCLUDE_TABLES -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_FIPS_140_3 -DFREEBL_NO_DEPEND -DFREEBL_LOWHASH -DNSS_X86_OR_X64 -DNSS_X86 -DUSE_HW_SHA2 -DMP_ASSEMBLY_MULTIPLY -DMP_ASSEMBLY_SQUARE -DMP_ASSEMBLY_DIV_2DX1D -DMP_USE_UINT_DIGIT -DMP_IS_LITTLE_ENDIAN -DKRML_VERIFIED_UINT128 -DMP_API_COMPATIBLE -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -Impi -Iecl -Iverified -Iverified/internal -Iverified/karamel/include -Iverified/karamel/krmllib/dist/minimal -Ideprecated -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter lowhash_vector.c grep -v ';-' freebl_hash.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libfreebl3.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/freebl.def -Wl,-Bsymbolic -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/lowhash_vector.o -ldl -lc chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/freebl' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/lib/softoken' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipsaudt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter fipsaudt.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter fipstest.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstokn.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter fipstokn.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/kbkdf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter kbkdf.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/kem.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter kem.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter lowkey.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowpbe.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter lowpbe.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/padbuf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter padbuf.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkcs11.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11c.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkcs11c.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11u.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkcs11u.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdb.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sdb.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkdb.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sftkdb.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkdhverify.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sftkdhverify.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkhmac.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sftkhmac.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkike.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sftkike.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkmessage.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sftkmessage.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkpars.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sftkpars.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkpwd.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sftkpwd.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softkver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter softkver.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tlsprf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tlsprf.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jpakesftk.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSOFTOKEN_LIB_NAME=\"libsoftokn3.so\" -DSHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_ENABLE_FIPS_INDICATORS -DNSS_FIPS_MODULE_ID=\"MSVSphere\ 9\ nss\ 3.101.0-892ca980b854fa8a\" -DNSS_FIPS_140_3 -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter jpakesftk.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipsaudt.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstokn.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/kbkdf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/kem.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowkey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowpbe.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/padbuf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11c.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11u.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdb.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkdb.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkdhverify.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkhmac.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkike.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkmessage.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkpars.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkpwd.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softkver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tlsprf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jpakesftk.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn.a grep -v ';-' softokn.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softokn.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn3.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libsoftokn3.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softokn.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn3.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipsaudt.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstokn.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/kbkdf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/kem.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowkey.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowpbe.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/padbuf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11c.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11u.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdb.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkdb.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkdhverify.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkhmac.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkike.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkmessage.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkpars.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sftkpwd.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softkver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tlsprf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/jpakesftk.o ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc lto-wrapper: warning: using serial compilation of 6 LTRANS jobs chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn3.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib/softoken' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/lib' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/basicutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter basicutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secpwd.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secpwd.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derprint.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter derprint.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/moreoids.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter moreoids.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pppolicy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pppolicy.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ffs.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ffs.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11table.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11table.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/basicutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secpwd.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derprint.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/moreoids.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pppolicy.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ffs.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11table.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lib' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/bltest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/blapitest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter blapitest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bltest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bltest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/blapitest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bltest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/bltest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtool.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dbtool.c cp ../../lib/softoken/sdb.c sdb.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdb.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sdb.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtool cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtool -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtool.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdb.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtool ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ecperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ecperf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ecperf.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ecperf cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ecperf -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ecperf.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ecperf ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ecperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fbectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fbectest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter fbectest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fbectest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fbectest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fbectest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fbectest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fbectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fipstest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter fipstest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/fipstest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/fipstest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lowhashtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowhashtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter lowhashtest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowhashtest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowhashtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../nss/lib/freebl -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowhashtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lfreebl3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lowhashtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/lowhashtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 Makefile:100: warning: overriding recipe for target 'libs' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'libs' make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mangle.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter mangle.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mangle cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mangle -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mangle.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/mangle ../../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/mangle' cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter shlibsign.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin /usr/bin/make ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreeblpriv3.chk make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 Makefile:100: warning: overriding recipe for target 'libs' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'libs' cd Linux5.14_x86_cc_glibc_PTH_OPT.OBJ ; sh '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/.'/sign.sh '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ' \ '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ' Linux \ '/builddir/build/BUILD/nss-3.101/dist/lib' '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so' /builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so Library File: ../../../nss/lib/softoken/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn3.so Check File: ../../../nss/lib/softoken/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libsoftokn3.chk Link: libsoftokn3.chk Library File Size: 1615656 bytes key: 32 bytes bb 7e 37 7d 6b 22 25 79 11 3d 82 ea 8f 3d 6e 8b fa 6d 85 77 51 81 1c 2c 72 53 b5 b1 a6 de 28 17 signature: 32 bytes eb cc 45 6a 1f ba 4a 25 87 52 22 d3 b4 a7 72 8f e9 c3 e5 d8 dd 6a db 7d 7e b3 e4 96 4c 2a 1c 1f moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate an HMAC key ... cd Linux5.14_x86_cc_glibc_PTH_OPT.OBJ ; sh '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/.'/sign.sh '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ' \ '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ' Linux \ '/builddir/build/BUILD/nss-3.101/dist/lib' '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl3.so' /builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl3.so Library File: ../../../nss/lib/freebl/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.so Check File: ../../../nss/lib/freebl/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreebl3.chk Link: libfreebl3.chk Library File Size: 51976 bytes key: 32 bytes cf 5f 38 b5 f4 a4 6b 95 e3 88 16 ce b7 8c a6 15 5a 44 5f 29 4c 3b 06 e2 56 ba 31 7b 79 ba 99 c7 signature: 32 bytes 90 01 b7 14 63 9d 98 5c a0 a3 73 9c af 98 54 48 1b 64 8d 92 d1 d0 10 b0 fe 9b f0 8a 2a 6a 53 e2 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate an HMAC key ... cd Linux5.14_x86_cc_glibc_PTH_OPT.OBJ ; sh '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/.'/sign.sh '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ' \ '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ' Linux \ '/builddir/build/BUILD/nss-3.101/dist/lib' '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreeblpriv3.so' /builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/shlibsign -v -i /builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign/../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreeblpriv3.so Library File: ../../../nss/lib/freebl/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.so Check File: ../../../nss/lib/freebl/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/Linux_SINGLE_SHLIB/libfreeblpriv3.chk Link: libfreeblpriv3.chk Library File Size: 3992064 bytes key: 32 bytes 57 bd d4 c5 b6 46 d3 e8 62 69 1f 5b ac 54 50 ff b6 ed 49 b9 37 87 9a 6e 93 e9 98 58 10 49 81 42 signature: 32 bytes 66 23 e9 ff 5e d6 e2 a2 4b e2 7d 0e 53 4b 38 37 d6 7d 43 4f 4f 6a 44 ba c6 11 fe f8 1d 76 d2 84 moduleSpec configdir='' certPrefix='' keyPrefix='' secmod='' flags=noCertDB, noModDB Generate an HMAC key ... make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/shlibsign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter addbuiltin.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/addbuiltin ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/addbuiltin' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/atob.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter atob.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/atob cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/atob -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/atob.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/atob ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/atob' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoa.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter btoa.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoa cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoa -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoa.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/btoa ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/btoa' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certext.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certext.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/keystuff.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter keystuff.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certutil cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certext.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/keystuff.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certutil ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/certutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/chktest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter chktest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/chktest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/chktest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/chktest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/chktest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/chktest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crlgen_lex.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlgen.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crlgen.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter crlutil.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlutil cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlgen_lex.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlgen.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crlutil ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crlutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/testcrmf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter testcrmf.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmftest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmftest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/testcrmf.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/crmftest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/crmftest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dbtest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dbtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/dbtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdump.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter derdump.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdump cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdump -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdump.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/derdump ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/derdump' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/digest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter digest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/digest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/digest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/digest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/digest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/digest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/httpserv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter httpserv.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/httpserv cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/httpserv -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/httpserv.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/httpserv ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/httpserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/listsuites.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter listsuites.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/listsuites cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/listsuites -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/listsuites.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/listsuites ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/listsuites' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/makepqg.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter makepqg.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/makepqg cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/makepqg -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/makepqg.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/makepqg ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/makepqg' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/multinit.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter multinit.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/multinit cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/multinit -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/multinit.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/multinit ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/multinit' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nss-policy-check.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss-policy-check ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/nss-policy-check' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ocspclnt.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspclnt ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspresp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ocspresp.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspresp cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspresp -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspresp.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ocspresp ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ocspresp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidcalc.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter oidcalc.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidcalc cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidcalc -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidcalc.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/oidcalc ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/oidcalc' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7content.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7content.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7content cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7content -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7content.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7content ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7content' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7env.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7env.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7env cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7env -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7env.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7env ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7env' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7sign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7sign.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7sign cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7sign -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7sign.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7sign ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7verify.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter p7verify.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7verify cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7verify -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7verify.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p7verify ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/p7verify' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk12util.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk12util.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk12util cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk12util -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk12util.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk12util ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk12util' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11importtest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11importtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11importtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11ectest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11ectest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11ectest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11gcmtest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11gcmtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11gcmtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mode.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11mode.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mode cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mode -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mode.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11mode ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk11mode' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk1sign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk1sign.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk1sign cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk1sign -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk1sign.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk1sign ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pk1sign' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pp.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pp.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pp cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pp -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pp.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pp ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pp' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pwdecrypt.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pwdecrypt ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pwdecrypt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsaperf.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter rsaperf.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/defkey.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter defkey.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsaperf cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsaperf -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsaperf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/defkey.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsaperf ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsaperf' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter rsapoptst.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsapoptst ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/rsapoptst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sdbthreadtst.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdbthreadtst ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdbthreadtst' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdrtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sdrtest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdrtest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdrtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdrtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sdrtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/sdrtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfserv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter selfserv.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfserv cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfserv -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfserv.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfserv ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/selfserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signtool.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter signtool.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certgen.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter certgen.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/javascript.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter javascript.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter list.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sign.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter sign.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter util.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/verify.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter verify.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/zip.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter zip.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signtool cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signtool -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signtool.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certgen.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/javascript.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/list.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sign.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/verify.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/zip.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signtool ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signtool' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signver.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter signver.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk7print.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk7print.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signver cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signver -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signver.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk7print.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/signver ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/signver' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target 'install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target 'install' cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter cmsutil.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmsutil ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/smimetools' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltap.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter ssltap.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltap cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltap -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltap.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssltap ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/ssltap' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/strsclnt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter strsclnt.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/strsclnt cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/strsclnt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/strsclnt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/strsclnt ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/strsclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter symkeyutil.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/symkeyutil ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/symkeyutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/baddbdir.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter baddbdir.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/baddbdir cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/baddbdir -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/baddbdir.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/conflict.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter conflict.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/conflict cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/conflict -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/conflict.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertimetest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter dertimetest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertimetest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertimetest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertimetest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter encodeinttest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nonspr10.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter nonspr10.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nonspr10 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nonspr10 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nonspr10.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/remtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter remtest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/remtest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/remtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/remtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmodtest.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter secmodtest.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmodtest cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmodtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmodtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/baddbdir Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/conflict Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dertimetest Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/encodeinttest Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nonspr10 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/remtest Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/secmodtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tests' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tstclnt.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter tstclnt.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tstclnt cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tstclnt -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tstclnt.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tstclnt ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/tstclnt' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/validation.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter validation.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/validation cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/validation -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/validation.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/validation ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/validation' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfychain.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter vfychain.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfychain cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfychain -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfychain.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfychain ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfychain' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfyserv.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter vfyserv.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfyutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter vfyutil.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfyserv cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfyserv -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfyserv.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfyutil.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/vfyserv ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/vfyserv' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/modutil.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter modutil.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pk11.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/instsec.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter instsec.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/install.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter install.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/installparse.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter installparse.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/install-ds.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter install-ds.c cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter lex.Pk11Install_yy.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/modutil cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/modutil -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/modutil.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/instsec.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/install.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/installparse.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/install-ds.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lex.Pk11Install_yy.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/modutil ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/modutil' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkix-errcodes.c rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkix-errcodes ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd/pkix-errcodes' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cmd' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/cpputil' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/databuffer.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x databuffer.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dummy_io.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x dummy_io.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dummy_io_fwd.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x dummy_io_fwd.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_parser.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../dist/public/nss -I../../dist/private/nss -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x tls_parser.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcpputil.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcpputil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/databuffer.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dummy_io.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dummy_io_fwd.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_parser.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcpputil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcpputil.a ../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libcpputil.a ../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/cpputil' make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/google_test' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -Igtest/include/ -Igtest -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/gtest -I../../../dist/private/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x gtest/src/gtest-all.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtest.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtest.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/gtest/src/gtest-all.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtest.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtest.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/google_test' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/common' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/gtests.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x gtests.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtestutil.a ar cr Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtestutil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/gtests.o echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtestutil.a Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtestutil.a ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 664 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/common' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/util_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_aligned_malloc_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_aligned_malloc_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_b64_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_b64_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_gtests.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_gtests.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_memcmpzero_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_memcmpzero_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_pkcs11uri_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_pkcs11uri_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_secasn1d_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_secasn1d_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_select_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_select_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_utf8_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x util_utf8_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_aligned_malloc_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_b64_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_gtests.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_memcmpzero_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_pkcs11uri_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_secasn1d_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_select_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_utf8_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/util_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/util_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/base_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x utf8_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/base_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/base_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/utf8_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/base_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/base_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certdb_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/alg1485_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x alg1485_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cert_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x cert_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/decode_certs_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x decode_certs_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdb_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdb_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/alg1485_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cert_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/decode_certs_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certdb_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certdb_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certhigh_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x certhigh_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/certhigh_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/certhigh_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/cryptohi_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptohi_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x cryptohi_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptohi_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptohi_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptohi_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cryptohi_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/cryptohi_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/der_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/der_getint_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x der_getint_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/der_quickder_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x der_quickder_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12_import_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x p12_import_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/der_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/der_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/der_getint_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/der_quickder_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/p12_import_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/der_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/der_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/freebl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dh_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x dh_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ecl_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x ecl_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsa_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x rsa_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmac_unittests.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x cmac_unittests.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/freebl_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/freebl_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../lib/freebl/ecl -I../../lib/freebl/mpi -I../../lib/freebl -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/dh_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ecl_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/rsa_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/cmac_unittests.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/freebl_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/freebl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pkcs11testmodule' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11testmodule.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter pkcs11testmodule.cpp grep -v ';-' pkcs11testmodule.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11testmodule.def rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs11testmodule.so cc -shared -Wl,--gc-sections -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -Wl,-z,defs -Wl,-soname -Wl,libpkcs11testmodule.so -Wl,--version-script,Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11testmodule.def -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs11testmodule.so Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pkcs11testmodule.o ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcpputil.a -lpthread -ldl -lc chmod +x Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs11testmodule.so ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libpkcs11testmodule.so ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pkcs11testmodule' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pk11_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/json_reader.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x json_reader.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aes_gcm_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_aes_gcm_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_aeskeywrap_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrapkwp_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_aeskeywrapkwp_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrappad_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_aeskeywrappad_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_cbc_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_cbc_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_chacha20poly1305_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_curve25519_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_curve25519_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_der_private_key_import_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_der_private_key_import_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_des_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_des_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_dsa_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_dsa_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_ecdsa_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_ecdsa_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_eddsa_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_eddsa_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_ecdh_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_ecdh_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_encrypt_derive_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_encrypt_derive_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_export_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_export_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_find_certs_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_find_certs_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_hkdf_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_hkdf_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_hmac_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_hmac_unittest.cc pk11_hmac_unittest.cc: In function '__static_initialization_and_destruction_0(int, int) [clone .constprop.0]': pk11_hmac_unittest.cc:94:1: note: variable tracking size limit exceeded with '-fvar-tracking-assignments', retrying without 94 | } // namespace nss_test | ^ g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_hpke_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_hpke_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_ike_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_ike_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_import_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_import_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_kbkdf.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_kbkdf.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_kem_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_kem_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_keygen.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_keygen.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_key_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_key_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_module_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_module_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_pbe_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_pbe_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_pbkdf2_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_prf_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_prng_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_prng_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsaencrypt_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_rsaencrypt_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsaoaep_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_rsaoaep_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsapkcs1_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_rsapkcs1_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_rsapss_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_signature_test.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_signature_test.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_seed_cbc_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_seed_cbc_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_symkey_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x pk11_symkey_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/json_reader.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aes_gcm_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrap_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrapkwp_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_aeskeywrappad_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_cbc_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_chacha20poly1305_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_curve25519_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_der_private_key_import_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_des_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_dsa_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_ecdsa_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_eddsa_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_ecdh_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_encrypt_derive_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_export_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_find_certs_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_hkdf_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_hmac_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_hpke_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_ike_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_import_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_kbkdf.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_kem_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_keygen.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_key_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_module_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_pbe_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_pbkdf2_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_prf_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_prng_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsaencrypt_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsaoaep_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsapkcs1_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_rsapss_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_signature_test.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_seed_cbc_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_symkey_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc pk11_hmac_unittest.cc: In function '__static_initialization_and_destruction_0.constprop': pk11_hmac_unittest.cc:94:1: note: variable tracking size limit exceeded with '-fvar-tracking-assignments', retrying without 94 | } // namespace nss_test | ^ ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/pk11_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/pk11_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/smime_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smime_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x smime_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smime_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smime_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smime_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/smime_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/smime_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/softoken_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softoken_gtest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_SUFFIX=\"so\" -DDLL_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x softoken_gtest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softoken_nssckbi_testlib_gtest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_SUFFIX=\"so\" -DDLL_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util -std=c++0x softoken_nssckbi_testlib_gtest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softoken_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softoken_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -DDLL_SUFFIX=\"so\" -DDLL_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/util Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softoken_gtest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softoken_nssckbi_testlib_gtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/softoken_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/softoken_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/ssl_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl_internals.o -c -std=c99 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl libssl_internals.c g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bloomfilter_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x bloomfilter_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_0rtt_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_0rtt_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_aead_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_aead_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_agent_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_auth_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_cert_ext_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_cert_ext_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_certificate_compression_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_certificate_compression_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_cipherorder_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_cipherorder_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_ciphersuite_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_custext_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_custext_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_damage_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_damage_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_debug_env_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_debug_env_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_dhe_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_drop_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_ecdh_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_ecdh_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_ems_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_exporter_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_exporter_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_extension_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_fragment_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_fragment_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_fuzz_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_fuzz_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_gather_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_gather_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_gtest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_gtest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_hrr_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_hrr_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_keyupdate_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_keyupdate_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_loopback_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_masking_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_masking_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_misc_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_misc_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_record_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_record_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_recordsep_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_recordsep_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_recordsize_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_recordsize_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_resumption_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_renegotiation_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_renegotiation_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_skip_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_staticrsa_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_tls13compat_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_tls13compat_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_v2_client_hello_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_version_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_version_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_versionpolicy_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_versionpolicy_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x selfencrypt_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/test_io.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x test_io.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_agent.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_agent.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_connect.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_connect.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_hkdf_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_filter.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_filter.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_protect.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_protect.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_psk_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_psk_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_subcerts_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_subcerts_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_xyber_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x tls_xyber_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_keylog_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x ssl_keylog_unittest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/libssl_internals.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bloomfilter_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_0rtt_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_aead_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_agent_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_auth_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_cert_ext_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_certificate_compression_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_cipherorder_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_ciphersuite_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_custext_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_damage_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_debug_env_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_dhe_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_drop_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_ecdh_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_ems_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_exporter_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_extension_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_fragment_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_fuzz_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_gather_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_gtest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_hrr_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_keyupdate_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_loopback_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_masking_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_misc_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_record_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_recordsep_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_recordsize_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_resumption_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_renegotiation_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_skip_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_staticrsa_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_tls13compat_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_v2_client_hello_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_version_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_versionpolicy_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/selfencrypt_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/test_io.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_agent.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_connect.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_hkdf_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_filter.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_protect.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_psk_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_subcerts_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/tls_xyber_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_keylog_unittest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/ssl_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/ssl_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/sysinit_gtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/getUserDB_unittest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x getUserDB_unittest.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sysinit_gtest.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -std=c++0x sysinit_gtest.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sysinit_gtest g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sysinit_gtest -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../gtests/google_test/gtest/include -I../../gtests/common -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/gtest -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/getUserDB_unittest.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sysinit_gtest.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/sysinit_gtest ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/sysinit_gtest' make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/gtests/nss_bogo_shim' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/config.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x -std=c++0x config.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsskeys.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x -std=c++0x nsskeys.cc g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim.o -c -std=c++11 -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl -std=c++0x -std=c++0x nss_bogo_shim.cc rm -f Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim g++ -o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim -O2 -fPIC -Di386 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -Wsign-compare -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_DBM -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DSEED_ONLY_DEV_URANDOM -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../cpputil -I/builddir/build/BUILD/nss-3.101/dist/include/nspr -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../public/nss -iquote ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/../private/nss -I../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -I../../../dist/public/nss -I../../../dist/public/libdbm -I../../../dist/public/cpputil -O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=i686 -mtune=generic -msse2 -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protection -Wno-array-parameter -I../../lib/ssl Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/config.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsskeys.o Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim.o -Wl,-z,relro -Wl,--as-needed -Wl,-z,now -specs=/usr/lib/rpm/redhat/redhat-hardened-ld -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack -z noexecstack ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcpputil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lsqlite3 -L../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib -lnssutil3 -L/builddir/build/BUILD/nss-3.101/dist/lib -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nsinstall -R -m 775 Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/nss_bogo_shim ../../../dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests/nss_bogo_shim' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/gtests' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss' make: Leaving directory '/builddir/build/BUILD/nss-3.101/nss' + /usr/bin/make -C ./nss latest make: Entering directory '/builddir/build/BUILD/nss-3.101/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 echo Linux5.14_x86_cc_glibc_PTH_OPT.OBJ > ./../dist/latest make: Leaving directory '/builddir/build/BUILD/nss-3.101/nss' + pushd ./nss ~/build/BUILD/nss-3.101/nss ~/build/BUILD/nss-3.101 + /usr/bin/make clean_docs build_docs coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 /usr/bin/make -C ./doc clean make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/doc' rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/doc' /usr/bin/make -C ./doc make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nss/doc' date +"%e %B %Y" | tr -d '\n' > date.xml echo -n > version.xml mkdir -p html mkdir -p nroff xmlto -o nroff man certutil.xml Note: Writing certutil.1 xmlto -o nroff man pk12util.xml Note: Writing pk12util.1 xmlto -o nroff man modutil.xml Note: Writing modutil.1 xmlto -o nroff man signver.xml Note: Writing signver.1 xmlto -o nroff man nss-policy-check.xml Note: Writing nss-policy-check.1 xmlto -o html html certutil.xml Writing index.html for refentry(certutil) mv html/index.html html/certutil.html xmlto -o html html pk12util.xml Writing index.html for refentry(pk12util) mv html/index.html html/pk12util.html xmlto -o html html modutil.xml Writing index.html for refentry(modutil) mv html/index.html html/modutil.html xmlto -o html html signver.xml Writing index.html for refentry(signver) mv html/index.html html/signver.html xmlto -o html html nss-policy-check.xml Writing index.html for refentry(nss-policy-check) mv html/index.html html/nss-policy-check.html make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nss/doc' + popd ~/build/BUILD/nss-3.101 + mkdir -p ./dist/docs/nroff + cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/nss-policy-check.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/docs/nroff + mkdir -p ./dist/pkgconfig + cat /builddir/build/SOURCES/nss-util.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSPR_VERSION%,4.35.0,g -e s,%NSSUTIL_VERSION%,3.101.0,g ++ cat nss/lib/util/nssutil.h ++ grep '#define.*NSSUTIL_VMAJOR' ++ awk '{print $3}' + NSSUTIL_VMAJOR=3 ++ cat nss/lib/util/nssutil.h ++ grep '#define.*NSSUTIL_VMINOR' ++ awk '{print $3}' + NSSUTIL_VMINOR=101 ++ cat nss/lib/util/nssutil.h ++ grep '#define.*NSSUTIL_VPATCH' ++ awk '{print $3}' + NSSUTIL_VPATCH=0 + cat /builddir/build/SOURCES/nss-util-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,101,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-util-config + cat /builddir/build/SOURCES/nss-softokn.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSPR_VERSION%,4.35.0,g -e s,%NSSUTIL_VERSION%,3.101.0,g -e s,%SOFTOKEN_VERSION%,3.101.0,g ++ cat nss/lib/softoken/softkver.h ++ grep '#define.*SOFTOKEN_VMAJOR' ++ awk '{print $3}' + SOFTOKEN_VMAJOR=3 ++ cat nss/lib/softoken/softkver.h ++ grep '#define.*SOFTOKEN_VMINOR' ++ awk '{print $3}' + SOFTOKEN_VMINOR=101 ++ cat nss/lib/softoken/softkver.h ++ grep '#define.*SOFTOKEN_VPATCH' ++ awk '{print $3}' + SOFTOKEN_VPATCH=0 + cat /builddir/build/SOURCES/nss-softokn-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,101,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-softokn-config + cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.101.0,g -e s,%NSPR_VERSION%,4.35.0,g -e s,%NSSUTIL_VERSION%,3.101.0,g -e s,%SOFTOKEN_VERSION%,3.101.0,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=101 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=0 + cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,101,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-config + cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + date '+%e %B %Y' + tr -d '\n' + echo -n 3.101.0 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key4.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml cert9.db.xml key4.db.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml cert9.db.xml key4.db.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml cert9.db.xml key4.db.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml cert9.db.xml key4.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml cert9.db.xml key4.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + RPM_EC=0 ++ jobs -p + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.LPzAko + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386 '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386 ++ dirname /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386 + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386 + cd nss-3.101 ~/build/BUILD/nss-3.101/nspr_build ~/build/BUILD/nss-3.101 + pushd nspr_build + make install DESTDIR=/builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386 make -C config install make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/config' ../config/./nsinstall -t -m 0755 nspr-config /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin ../config/./nsinstall -D /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/aclocal ../config/./nsinstall -t -m 0644 ../../nspr/config/nspr.m4 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/aclocal ../config/./nsinstall -D /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/pkgconfig ../config/./nsinstall -t -m 0644 nspr.pc /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/pkgconfig make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/config' make -C pr install make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr' make -C include install make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include' ../../config/./nsinstall -t -m 0644 ../../../nspr/pr/include/nspr.h ../../../nspr/pr/include/pratom.h ../../../nspr/pr/include/prbit.h ../../../nspr/pr/include/prclist.h ../../../nspr/pr/include/prcmon.h ../../../nspr/pr/include/prcountr.h ../../../nspr/pr/include/prcvar.h ../../../nspr/pr/include/prdtoa.h ../../../nspr/pr/include/prenv.h ../../../nspr/pr/include/prerr.h ../../../nspr/pr/include/prerror.h ../../../nspr/pr/include/prinet.h ../../../nspr/pr/include/prinit.h ../../../nspr/pr/include/prinrval.h ../../../nspr/pr/include/prio.h ../../../nspr/pr/include/pripcsem.h ../../../nspr/pr/include/prlink.h ../../../nspr/pr/include/prlock.h ../../../nspr/pr/include/prlog.h ../../../nspr/pr/include/prlong.h ../../../nspr/pr/include/prmem.h ../../../nspr/pr/include/prmon.h ../../../nspr/pr/include/prmwait.h ../../../nspr/pr/include/prnetdb.h ../../../nspr/pr/include/prolock.h ../../../nspr/pr/include/prpdce.h ../../../nspr/pr/include/prprf.h ../../../nspr/pr/include/prproces.h ../../../nspr/pr/include/prrng.h ../../../nspr/pr/include/prrwlock.h ../../../nspr/pr/include/prshm.h ../../../nspr/pr/include/prshma.h ../../../nspr/pr/include/prsystem.h ../../../nspr/pr/include/prthread.h ../../../nspr/pr/include/prtime.h ../../../nspr/pr/include/prtpool.h ../../../nspr/pr/include/prtrace.h ../../../nspr/pr/include/prtypes.h ../../../nspr/pr/include/prvrsion.h ../../../nspr/pr/include/prwin16.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/ make -C md install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/md' ../../../config/./nsinstall -D /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/md ../../../config/./nsinstall -t -m 644 ../../../../nspr/pr/include/md/_aix32.cfg ../../../../nspr/pr/include/md/_aix64.cfg ../../../../nspr/pr/include/md/_bsdi.cfg ../../../../nspr/pr/include/md/_darwin.cfg ../../../../nspr/pr/include/md/_freebsd.cfg ../../../../nspr/pr/include/md/_hpux32.cfg ../../../../nspr/pr/include/md/_hpux64.cfg ../../../../nspr/pr/include/md/_linux.cfg ../../../../nspr/pr/include/md/_netbsd.cfg ../../../../nspr/pr/include/md/_nto.cfg ../../../../nspr/pr/include/md/_openbsd.cfg ../../../../nspr/pr/include/md/_os2.cfg ../../../../nspr/pr/include/md/_qnx.cfg ../../../../nspr/pr/include/md/_riscos.cfg ../../../../nspr/pr/include/md/_scoos.cfg ../../../../nspr/pr/include/md/_solaris.cfg ../../../../nspr/pr/include/md/_unixware.cfg ../../../../nspr/pr/include/md/_unixware7.cfg ../../../../nspr/pr/include/md/_win95.cfg ../../../../nspr/pr/include/md/_winnt.cfg /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/md ../../../config/./nsinstall -t -m 644 ../../../../nspr/pr/include/md/_linux.cfg /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4 mv -f /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/_linux.cfg /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/prcpucfg.h make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/md' make -C private install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/private' ../../../config/./nsinstall -t -m 0644 ../../../../nspr/pr/include/private/pprio.h ../../../../nspr/pr/include/private/pprthred.h ../../../../nspr/pr/include/private/prpriv.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/private make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/private' make -C obsolete install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/obsolete' ../../../config/./nsinstall -t -m 0644 ../../../../nspr/pr/include/obsolete/pralarm.h ../../../../nspr/pr/include/obsolete/probslet.h ../../../../nspr/pr/include/obsolete/protypes.h ../../../../nspr/pr/include/obsolete/prsem.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/obsolete make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include/obsolete' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/include' make -C src install make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src' ../../config/./nsinstall -t -m 0755 ./libnspr4.a ./libnspr4.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/ make -C io install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/io' make[3]: Nothing to be done for 'install'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/io' make -C linking install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/linking' make[3]: Nothing to be done for 'install'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/linking' make -C malloc install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/malloc' make[3]: Nothing to be done for 'install'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/malloc' make -C md install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md' make -C unix install make[4]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md/unix' make[4]: Nothing to be done for 'install'. make[4]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md/unix' make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/md' make -C memory install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/memory' make[3]: Nothing to be done for 'install'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/memory' make -C misc install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/misc' ../../../config/./nsinstall -t -m 0755 ../../../../nspr/pr/src/misc/compile-et.pl ../../../../nspr/pr/src/misc/prerr.properties /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/misc' make -C threads install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/threads' make[3]: Nothing to be done for 'install'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/threads' make -C pthreads install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/pthreads' make[3]: Nothing to be done for 'install'. make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src/pthreads' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr/src' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/pr' make -C lib install make[1]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib' make -C ds install make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/ds' ../../config/./nsinstall -t -m 0644 ../../../nspr/lib/ds/plarenas.h ../../../nspr/lib/ds/plarena.h ../../../nspr/lib/ds/plhash.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/ ../../config/./nsinstall -t -m 0755 ./libplds4.a ./libplds4.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/ make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/ds' make -C libc install make[2]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc' make -C include install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/include' ../../../config/./nsinstall -t -m 0644 ../../../../nspr/lib/libc/include/plbase64.h ../../../../nspr/lib/libc/include/plerror.h ../../../../nspr/lib/libc/include/plgetopt.h ../../../../nspr/lib/libc/include/plstr.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/include/nspr4/ make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/include' make -C src install make[3]: Entering directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/src' ../../../config/./nsinstall -t -m 0755 ./libplc4.a ./libplc4.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/ make[3]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc/src' make[2]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib/libc' make[1]: Leaving directory '/builddir/build/BUILD/nss-3.101/nspr_build/lib' + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/pkgconfig + rm -rf /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/compile-et.pl /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/prerr.properties /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/libnspr4.a /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/libplc4.a /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/libplds4.a /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/share/aclocal/nspr.m4 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nspr4/md + for f in nspr-config + install -c -m 644 nspr-config.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/nspr-config.1 + popd ~/build/BUILD/nss-3.101 + export FREEBL_NO_DEPEND=1 + FREEBL_NO_DEPEND=1 + export BUILD_OPT=1 + BUILD_OPT=1 + export NSS_DISABLE_PPC_GHASH=1 + NSS_DISABLE_PPC_GHASH=1 ++ make -s -C ./nss/tests/common objdir_name ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 + export LOBJDIR=Linux5.14_x86_cc_glibc_PTH_OPT.OBJ + LOBJDIR=Linux5.14_x86_cc_glibc_PTH_OPT.OBJ + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3/templates + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/saved + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/dracut/modules.d/05nss-softokn/ + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/dracut/dracut.conf.d + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//etc/crypto-policies/local.d + install -m 755 /builddir/build/SOURCES/nss-softokn-dracut-module-setup.sh /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/dracut/modules.d/05nss-softokn//module-setup.sh + install -m 644 /builddir/build/SOURCES/nss-softokn-dracut.conf /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/dracut/dracut.conf.d/50-nss-softokn.conf + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man5 + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreeblpriv3.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libnssutil3.so libsoftokn3.so libfreebl3.so libfreeblpriv3.so libnss3.so libnsssysinit.so libsmime3.so libssl3.so + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + mkdir -p /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//etc/pki/nssdb + install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//etc/pki/nssdb/cert9.db + install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//etc/pki/nssdb/key4.db + install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + install -p -m 644 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + install -p -m 644 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in libcrmf.a libnssb.a libnssckfw.a + install -p -m 644 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/nss-policy-check /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/bltest /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/dbtool /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/ecperf /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/fbectest /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/fipstest /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/shlibsign /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/validation /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in bltest dbtool ecperf fbectest fipstest shlibsign atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt validation vfyserv vfychain + install -p -m 755 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/base64.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/blapit.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ciferfam.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/eccutil.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ecl-exp.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/hasht.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/kyber.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/lowkeyi.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/lowkeyti.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssb64.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssb64t.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nsshash.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssilckt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssilock.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nsslocks.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nsslowhash.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssrwlk.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssrwlkt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/nssutil.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11hpke.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11f.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11n.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11p.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11t.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11u.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs11uri.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs1sig.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/portreg.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secasn1.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secasn1t.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/seccomon.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secder.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secdert.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secdig.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secdigt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secerr.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secitem.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secoid.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secoidt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/secport.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/shsign.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslexp.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilmodt.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilpars.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilparst.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in dist/public/nss/*.h + install -p -m 644 dist/public/nss/utilrename.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in blapi.h alghmac.h cmac.h + install -p -m 644 dist/private/nss/blapi.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in blapi.h alghmac.h cmac.h + install -p -m 644 dist/private/nss/alghmac.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in blapi.h alghmac.h cmac.h + install -p -m 644 dist/private/nss/cmac.h /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3 + for file in libfreebl.a + install -p -m 644 dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib + for file in dist/private/nss/templates.c dist/private/nss/nssck.api + install -p -m 644 dist/private/nss/templates.c /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3/templates + for file in dist/private/nss/templates.c dist/private/nss/nssck.api + install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/include/nss3/templates + install -p -m 644 ./dist/pkgconfig/nss-util.pc /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/pkgconfig/nss-util.pc + install -p -m 755 ./dist/pkgconfig/nss-util-config /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/nss-util-config + install -p -m 644 ./dist/pkgconfig/nss-softokn.pc /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/pkgconfig/nss-softokn.pc + install -p -m 755 ./dist/pkgconfig/nss-softokn-config /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/nss-softokn-config + install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/pkgconfig/nss.pc + install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/nss-config + install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/setup-nsssysinit.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/certutil.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/cmsutil.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/crlutil.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/derdump.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/modutil.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/nss-policy-check.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/nss-policy-check.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/pk12util.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/signtool.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/signver.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/ssltap.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/vfychain.1 + for f in certutil cmsutil crlutil derdump modutil nss-policy-check pk12util signtool signver ssltap vfychain vfyserv + install -c -m 644 ./dist/docs/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/vfyserv.1 + install -c -m 644 ./dist/docs/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man1/pp.1 + for f in pkcs11.txt cert9.db key4.db + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man5/pkcs11.txt.5 + for f in pkcs11.txt cert9.db key4.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man5/cert9.db.5 + for f in pkcs11.txt cert9.db key4.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/share/man/man5/key4.db.5 + install -p -m 644 /builddir/build/SOURCES/nss-p11-kit.config /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//etc/crypto-policies/local.d + /usr/bin/find-debuginfo -j16 --strict-build-id -m -i --build-id-seed 3.101.0-10.el9_5 --unique-debug-suffix -3.101.0-10.el9_5.i386 --unique-debug-src-base nss-3.101.0-10.el9_5.i386 --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 --remove-section .gnu.build.attributes -S debugsourcefiles.list /builddir/build/BUILD/nss-3.101 extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/nss-policy-check extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/pk12util extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libfreebl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libfreeblpriv3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libnspr4.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libnssutil3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libplc4.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libplds4.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libsoftokn3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/bltest extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/dbtool extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/ecperf extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/fbectest extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/fipstest extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/shlibsign extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/validation extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386/usr/lib/nss/unsupported-tools/vfyserv original debug info size: 23732kB, size after compression: 18984kB /usr/bin/sepdebugcrcfix: Updated 39 CRC32s, 0 CRC32s did match. cpio: nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory cpio: nss/lib/freebl/mpi_x86.s: Cannot stat: No such file or directory 37773 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-ldconfig + /usr/lib/rpm/brp-compress + /usr/lib/rpm/redhat/brp-strip-lto /usr/bin/strip + /usr/lib/rpm/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/redhat/brp-python-bytecompile '' 1 0 + /usr/lib/rpm/brp-python-hardlink + /usr/lib/rpm/redhat/brp-mangle-shebangs mangling shebang in /usr/bin/nspr-config from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/nss-util-config from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/nss-softokn-config from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/nss-config from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/bin/setup-nsssysinit.sh from /bin/sh to #!/usr/bin/sh mangling shebang in /usr/lib/dracut/modules.d/05nss-softokn/module-setup.sh from /bin/bash to #!/usr/bin/bash *** WARNING: ./usr/src/debug/nss-3.101.0-10.el9_5.i386/dist/include/nspr/prvrsion.h is executable but has no shebang, removing executable bit + /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools/shlibsign -i /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/libsoftokn3.so + /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools/shlibsign -i /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/libfreeblpriv3.so + /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/nss/unsupported-tools/shlibsign -i /builddir/build/BUILDROOT/nss-3.101.0-10.el9_5.i386//usr/lib/libfreebl3.so Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.1x0l7s + umask 022 + cd /builddir/build/BUILD ~/build/BUILD/nss-3.101/nspr_build ~/build/BUILD/nss-3.101 + cd nss-3.101 + pushd nspr_build + perl ../nspr/pr/tests/runtests.pl + tee output.log No output file. NSPR Test Results - tests BEGIN 2024-11-26 14:15:57 NSPR_TEST_LOGFILE /dev/null TEST_TIMEOUT 0 Test Result abstract Passed accept Passed acceptread Passed acceptreademu Passed affinity Passed alarm Passed anonfm Passed atomic Passed attach Passed bigfile Passed cleanup Passed cltsrv Passed concur Passed cvar Passed cvar2 Passed dlltest Passed dtoa Passed errcodes Passed exit Passed fdcach Passed fileio Passed foreign Passed formattm Passed fsync Passed gethost Passed getproto Passed i2l Passed initclk Passed inrval Passed instrumt Passed intrio Passed intrupt Passed io_timeout Passed ioconthr Passed join Passed joinkk Passed joinku Passed joinuk Passed joinuu Passed layer Passed lazyinit Passed libfilename Passed lltest Passed lock Passed lockfile Passed logfile Passed logger Passed many_cv Passed nameshm1 Passed nblayer Passed nonblock Passed ntioto Passed ntoh Passed op_2long Passed op_excl Passed op_filnf Passed op_filok Passed op_nofil Passed parent Passed parsetm Passed peek Passed perf Passed pipeping Passed pipeping2 Passed pipeself Passed poll_nm Passed poll_to Passed pollable Passed prftest Passed prfz Passed primblok Passed provider Passed prpollml Passed pushtop Passed ranfile Passed randseed Passed reinit Passed rwlocktest Passed sel_spd Passed selct_er Passed selct_nm Passed selct_to Passed selintr Passed sema Passed semaerr Passed semaping Passed sendzlf Passed server_test Passed servr_kk Passed servr_uk Passed servr_ku Passed servr_uu Passed short_thread Passed sigpipe Passed socket Passed sockopt Passed sockping Passed sprintf Passed stack Passed stdio Passed str2addr Passed strod Passed switch Passed system Passed testbit Passed testfile Passed threads Passed timemac Passed timetest Passed tpd Passed udpsrv Passed vercheck Passed version Passed writev Passed xnotify Passed zerolen Passed END 2024-11-26 14:15:57 ++ grep -c FAILED ./output.log + TEST_FAILURES=0 + : test suite completed ~/build/BUILD/nss-3.101 + '[' 0 -ne 0 ']' + echo 'test suite completed' + popd + export FREEBL_NO_DEPEND=1 + FREEBL_NO_DEPEND=1 + export BUILD_OPT=1 + BUILD_OPT=1 ++ make -s -C ./nss/tests/common objdir_name ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 + export LOBJDIR=Linux5.14_x86_cc_glibc_PTH_OPT.OBJ + LOBJDIR=Linux5.14_x86_cc_glibc_PTH_OPT.OBJ + for i in ./dist/lib/*.so + cp ./dist/lib/libnspr4.so ./dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib + for i in ./dist/lib/*.so + cp ./dist/lib/libplc4.so ./dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib + for i in ./dist/lib/*.so + cp ./dist/lib/libplds4.so ./dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib + export NSS_IGNORE_SYSTEM_POLICY=1 + NSS_IGNORE_SYSTEM_POLICY=1 + export NSS_DB_DUMP_TIME=10 + NSS_DB_DUMP_TIME=10 ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' + export MYRAND=9525 + MYRAND=9525 9525 selfserv_9525 ~/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin ~/build/BUILD/nss-3.101 + echo 9525 + export RANDSERV=selfserv_9525 + RANDSERV=selfserv_9525 + echo selfserv_9525 + export DISTBINDIR=./dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin + DISTBINDIR=./dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin + pushd ./dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin + ln -s selfserv selfserv_9525 + popd ~/build/BUILD/nss-3.101 + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + grep -v '\.crt$' + grep -vw CVS + xargs grep -lw selfserv + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9525/g' + killall selfserv_9525 selfserv_9525: no process found + : + rm -rf ./tests_results + pushd nss/tests ~/build/BUILD/nss-3.101/nss/tests ~/build/BUILD/nss-3.101 + HOST=localhost + DOMSUF=localdomain + PORT=9525 + NSS_CYCLES= + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests' + NSS_SSL_TESTS= + NSS_SSL_RUN= + ./all.sh ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 testdir is /builddir/build/BUILD/nss-3.101/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.101/tests_results/security ******************************************** Platform: Linux5.14_x86_cc_glibc_PTH_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib:/bin:/usr/bin:/usr/share/Modules/bin:/usr/sbin:/sbin:/usr/local/sbin against LIB /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib: Running test cycle: STANDARD ---------------------- List of tests that will be executed: libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests Running tests for cert TIMESTAMP cert BEGIN: Thu Dec 26 14:15:58 UTC 2024 rm: cannot remove '/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.STANDARD.cert.cache.tar.gz': No such file or directory cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #82: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #84: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #85: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #108: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #110: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #111: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #114: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #115: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 90dbb523f61ab3ac4cfbd114cddfcc3178206a22 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 93aef8ecdf449c963b31a943a74dd365fce2c0fb -s CN=orphan -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:ef:a1:64:b4:6a:f3:85:26:ec:5d:49:a8:b5:42:25: 7a:68:8a:d8:ad:c8:29:39:65:42:ed:bf:86:2f:be:11: 9f:63:01:3b:e9:60:c3:b6:02:3e:1e:ab:9f:3c:73:ce: be:49:13:21:54:18:8e:0c:7a:2f:b4:6a:09:5a:e7:55: b7:25:9c:c6:c7:de:f3:9b:77:02:91:1f:35:79:9e:da: a1:25:05:c7:82:c3:97:89:46:0d:da:97:92:7d:95:0d: 3d:34:6f:86:97:a4:58:82:31:57:a6:69:9c:d3:d6:ca: 66:0d:96:73:bf:5e:f7:e6:08:a0:26:a5:cd:06:43:89: 34:ef:7b:b1:0f:87:91:e0:1b:b6:02:73:25:d2:38:8c: 32:95:31:83:c9:b4:50:df:e9:1b:5e:24:f3:53:45:6f: 9d:a5:4d:2e:ad:4b:9d:1b:b4:a2:6f:3e:8a:a9:c5:f2: 92:e6:14:55:cf:d8:09:99:cd:39:da:fe:6d:9e:b6:ef: 89:c9:f8:23:bb:ca:6d:93:a9:5e:e5:0f:64:a0:7b:3f: 55:0b:f0:0d:8d:1f:6a:b7:33:fb:78:eb:17:e2:35:1c: 91:c4:54:c9:29:5e:63:13:8e:77:b7:33:53:b1:65:4b: 2f:12:50:7f:4a:e1:c3:4a:8a:53:ec:87:5e:ed:c8:17 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:63:51:8e:12:50:4a:2c:04:72:22:ef:ed:c9:bf:86: 2b:e9:ab:de:3f:32:e9:31:2d:b6:33:3b:f0:58:f8:27: 57:34:bb:da:8d:08:e1:39:2f:67:c9:c8:b4:fd:74:66: 4a:af:fe:85:91:6c:c3:10:87:30:ce:34:eb:af:5b:0c: ef:86:af:e9:66:c4:89:f1:b7:dd:10:c1:ab:7a:29:61: a5:d9:7e:95:96:10:9d:9e:54:bf:01:5c:9f:33:04:ca: ba:48:5f:f3:3c:fc:be:42:a7:cd:67:44:7f:13:06:ad: 8b:1b:67:30:f2:da:53:1f:8d:a5:3e:33:34:80:0c:f6: 9d:55:52:87:1c:bb:d7:81:df:3e:fc:96:d3:e8:3e:96: 61:7b:b4:4d:b9:76:17:d5:69:c2:de:b2:7c:f6:44:f3: e3:98:2c:fb:5f:e1:ca:01:e5:98:22:91:af:10:11:92: 43:e3:a3:03:58:80:56:04:56:71:78:43:2e:2f:e1:e7: 3f:3f:0b:61:6b:3f:1b:f1:0c:bf:38:c5:5f:f3:31:41: 99:6a:57:ee:0c:00:93:c8:cc:35:85:47:bf:83:64:c2: 69:b7:f8:56:5e:8f:e2:4b:9e:de:5b:20:63:68:17:02: 3c:f9:54:ff:7e:fe:52:ea:0d:35:5b:2c:ac:9a:a5:0f Fingerprint (SHA-256): 18:F4:6A:ED:B3:C7:BF:77:80:98:36:C4:CD:98:2B:3C:A1:52:E4:A2:E1:07:35:11:65:6A:E2:82:8E:74:98:5C Fingerprint (SHA1): E0:EB:45:8D:B5:09:88:8E:09:64:D1:71:52:43:73:14:68:DA:46:18 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:de Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:44 2024 Not After : Wed Mar 26 14:16:44 2025 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:d6:75:e9:a5:82:85:68:42:9b:fe:6e:3b:bb:39:9e: f3:85:b3:a2:d8:4c:fb:f5:59:c3:91:6d:e4:83:39:5d: 3c:fa:66:c4:a4:c1:e4:b3:cf:32:c7:f8:bb:2b:ca:2c: 97:90:0d:23:ec:63:bf:02:37:9b:88:d4:fc:31:38:35: e0:97:78:50:cf:89:42:e4:76:53:90:6f:66:39:ef:d7: a8:a2:31:98:3c:f5:32:60:9c:f4:58:af:31:4e:7f:01: d3:7d:94:dc:4d:d7:72:28:76:1f:82:51:7a:2f:82:1b: 14:41:20:52:f3:d4:5e:5d:25:0e:a8:ba:1e:ad:04:72: 4e:0b:b3:36:0b:77:29:42:e5:71:9d:ba:e0:d4:03:bb: f9:08:c7:c6:6c:aa:42:59:3f:95:51:a8:90:bb:b2:14: f8:24:2f:8a:70:3e:33:c8:07:c5:75:f1:d2:92:6b:57: 0a:20:e3:d9:63:71:96:1c:2b:19:c8:5e:60:0a:e2:a2: cc:a6:35:df:95:0d:97:70:7c:bc:cf:8a:98:d7:2b:19: 9d:98:65:57:e5:19:2b:d8:4b:93:a4:7b:fa:ec:3e:d7: 3a:cd:83:34:87:22:e9:56:c8:e1:70:ab:8b:c1:23:99: 06:00:d3:81:ca:79:a8:df:95:8e:c0:4b:05:44:11:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:8d:b3:40:0a:60:24:1d:b8:37:4a:ba:62:4a:29:68: ea:66:81:6b:3a:69:bc:6a:a9:ab:b3:30:9a:d6:d1:dd: b7:c4:bf:f2:03:e0:9c:6c:89:e1:e7:78:98:e0:81:e7: e0:79:e2:0b:a8:93:9d:ba:dd:10:a5:79:b5:aa:bd:d4: 10:72:40:67:e3:0a:7c:5a:b1:a5:61:e7:17:9a:a7:c1: 24:60:bb:54:52:9c:bc:88:71:be:57:11:8d:0a:63:1f: f1:bf:79:61:3c:2f:b7:e3:b4:16:0b:69:18:0b:ee:16: f2:89:5a:27:43:ac:e7:5c:8d:f4:e4:ab:ab:6e:37:94: 77:a4:a4:a2:b6:20:b4:d5:e3:f3:1e:f9:43:a4:6d:9f: eb:e0:05:fa:49:d3:ec:ad:a5:32:bd:82:bd:26:82:e7: 1b:0f:21:98:55:90:c3:fd:83:07:17:96:c3:ab:5a:b1: e7:1d:8b:13:f2:42:64:c3:c9:a3:16:ce:44:0e:10:0c: 81:d0:dd:c9:47:f4:35:0b:ea:3b:d8:52:78:98:90:e9: 4a:12:cf:3d:57:57:69:f1:af:b8:4d:ca:d6:2a:2d:56: 06:a0:2f:56:36:42:63:94:0d:e1:15:df:93:40:61:50: 32:09:cd:96:fe:9c:40:d4:bd:f0:0d:ce:d7:d4:b6:ff Fingerprint (SHA-256): 5B:F5:09:1D:C0:8E:87:39:EE:90:D8:8A:F9:BE:27:70:35:ED:A1:4E:E7:6B:E7:5E:3C:B4:63:96:A3:C9:15:A9 Fingerprint (SHA1): C9:26:78:61:C2:1A:D7:B5:7B:9C:5A:ED:45:EC:90:1A:31:5C:10:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:df Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:45 2024 Not After : Wed Mar 26 14:16:45 2025 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:37:7b:3c:98:dd:94:11:d1:39:be:8b:d3:fd:a6:23: f6:04:61:ae:4f:60:3b:8a:0c:10:76:e8:33:39:8c:10: ec:fa:74:37:09:9c:d8:8c:35:56:1a:79:6b:4a:e9:a1: ff:ba:cc:b8:99:0d:53:a4:6d:03:cd:73:16:f1:ac:2e: 39:25:7d:d2:9d:2c:a8:79:ca:1f:4f:c8:a7:90:3c:75: 92:89:0c:7d:12:cf:5f:c6:af:50:0e:c8:06:41:c8:da: 1f:d1:1b:57:cb:b7:77:94:46:9a:ca:39:39:b4:be:2f: 27:21:40:b4:13:2f:58:6a:24:e0:56:79:9a:96:5c:e8: 71:7e:52:84:3f:3a:28:82:2f:cc:a0:a8:82:11:4d:b0: 68:80:28:65:a7:4e:b2:74:f5:e8:1a:1a:e7:f9:90:0d: 95:a2:e4:d5:bd:2f:94:f7:8b:79:c4:70:a2:c9:5c:92: 00:e3:0a:90:83:d5:29:02:1b:a6:b1:5a:50:af:b4:78: ce:51:97:c4:4a:0f:6f:26:a5:20:eb:e9:f2:cb:bc:6f: 5d:c3:d7:da:23:8f:f9:b2:fb:53:ee:2c:bc:36:14:59: ec:53:b2:fc:0c:f0:2d:6b:a8:43:27:e1:d4:06:ab:4f: 47:51:ea:de:29:91:fe:17:5b:b3:b5:4c:86:4c:88:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:e0:e1:cf:a3:0c:ff:34:b8:e7:ce:5b:6d:3e:4d:a8: 89:43:c5:32:22:61:c0:d6:a5:9e:4d:ca:af:fa:32:83: 84:ed:25:47:ae:c8:15:44:c2:d5:33:21:7e:fe:aa:91: 9c:c6:13:15:f5:d0:fa:d6:40:5f:93:ac:40:93:98:54: 12:90:09:b1:a9:1c:f3:d6:49:bd:73:d5:06:90:1f:9e: 47:f8:6b:f3:67:33:88:b7:19:ba:28:a0:0e:dc:70:92: 88:6a:fe:e7:83:25:c8:ae:2d:8a:2f:82:7b:60:1f:bd: b9:c1:79:2d:2e:64:eb:73:40:2a:d8:79:eb:eb:14:78: 6b:24:c2:ad:c2:dd:e4:6d:4d:d1:ec:10:1f:88:15:c8: 32:3f:f4:35:f9:76:91:49:13:d1:e5:fb:22:f8:a6:6d: 21:12:f2:73:bb:17:3b:05:8b:b1:01:14:92:b2:39:b5: 28:6e:5a:22:03:b0:b8:d0:48:aa:1f:80:44:e6:df:16: e3:ea:9c:ca:8f:ba:bb:9a:82:16:11:37:4e:a5:1a:70: 9b:fc:2f:5e:ac:cc:ac:7a:86:45:a0:d2:d1:44:a9:1e: 37:b6:8d:27:38:79:08:46:05:c4:bc:bb:d1:da:88:22: 54:67:3a:cd:90:4c:62:9a:d2:39:5c:35:33:77:bf:3b Fingerprint (SHA-256): 31:36:68:7A:B9:16:BB:EF:19:06:2D:D6:5B:EF:87:62:12:26:C7:A6:AE:7B:C8:15:D9:8E:A5:34:8B:7A:5F:09 Fingerprint (SHA1): D4:79:94:DE:ED:96:72:B6:36:DF:69:11:13:63:8A:7B:2C:C1:1F:72 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e0 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:46 2024 Not After : Wed Mar 26 14:16:46 2025 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:96:f8:82:46:15:f5:91:50:86:59:24:48:58:3f:7e: 2d:57:9e:fb:45:89:99:85:b7:31:c6:4d:70:4e:d4:4d: 52:0a:0c:09:9d:eb:a0:06:8c:98:05:6c:72:72:4c:3f: 16:48:36:5e:e3:ab:8e:e1:c9:e7:40:1a:86:d7:49:ba: be:55:52:e8:4a:ca:93:f7:c9:69:21:43:50:cf:1a:e6: 70:9c:38:e3:f7:66:1d:5b:9c:5e:83:67:4d:fd:c5:d7: ae:2d:f6:41:78:f1:a3:44:2b:1d:c1:40:8a:31:0f:c3: 51:11:b8:4d:f2:fc:eb:45:b5:2c:37:84:05:95:4d:94: 8b:65:83:bb:95:4a:4f:71:e6:3d:c3:c7:02:b7:43:2d: b7:a7:47:fa:d3:b5:08:7a:2f:d4:15:1d:3b:ac:b2:5c: b6:5e:dd:8e:c3:2b:e2:6c:bf:b7:59:d9:57:0e:93:b5: 8d:88:c8:b2:3b:66:36:6d:95:ba:d7:76:13:77:c5:77: bb:78:f4:93:99:9a:ee:d8:bb:03:08:33:9c:ad:ba:76: df:e7:8d:04:d2:2b:c3:2a:ad:3a:24:18:9e:c8:0c:6c: f1:de:63:0b:00:eb:08:96:97:bc:27:ea:1c:0c:18:44: 2e:44:52:23:8f:38:48:9a:a5:5e:4d:7f:1e:ca:0a:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:9a:86:b9:e4:57:43:1a:70:58:43:c9:2c:3e:ef:f7: a7:7e:ac:e9:f9:d2:b9:5c:e7:d7:57:f6:3e:ca:1f:75: 87:1d:dc:6e:4a:11:89:3b:61:63:a6:e5:f1:67:6b:b1: 9c:a3:ba:fc:ff:5f:42:2c:00:15:fe:ab:e1:af:63:21: ca:84:52:96:82:69:9a:03:59:e2:45:a3:95:3e:e0:e3: cb:7d:7b:03:75:3b:6b:e7:20:85:bb:2b:7f:b0:28:18: 3b:f6:45:4a:f7:8e:f2:26:11:fd:60:a2:5c:11:23:1c: 2c:77:cf:50:e9:a8:0d:58:f7:dc:c3:9d:cb:2b:78:ff: e7:a5:53:0c:ac:fc:76:90:26:65:d3:bd:39:50:d9:29: bc:e3:cb:2c:2b:68:3e:1d:8a:92:75:fe:c7:4b:e7:72: 4b:25:e9:63:65:79:fa:2f:d8:b8:02:2b:49:74:d5:27: 16:b7:aa:20:6d:96:f9:71:ae:a5:26:d6:35:60:ff:e8: d1:d8:ea:66:77:2f:37:a4:da:8b:7c:2b:3e:d3:c2:f4: a8:97:cf:22:40:88:bc:1d:8e:8a:79:9f:c3:2d:98:0e: 4b:b3:37:e7:06:f4:43:75:c0:b3:73:5b:63:65:0d:8a: 70:d3:87:da:59:9b:9e:9d:5a:ea:ca:ac:96:60:fe:10 Fingerprint (SHA-256): D4:8F:76:C3:C9:70:DC:96:0C:9B:CE:C3:20:8F:4D:20:03:F5:B3:5F:D8:A1:A3:95:ED:49:B1:A4:0D:46:BA:90 Fingerprint (SHA1): 3A:28:B3:FC:44:5B:43:56:6B:67:55:1D:C3:C4:9E:A8:23:60:5F:B3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:46 2024 Not After : Wed Mar 26 14:16:46 2025 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:f6:b7:0d:c4:c7:ab:5f:0e:65:95:e6:cc:39:40:dc: 65:55:92:51:5b:20:08:ff:ad:c4:4d:21:1a:1e:69:00: 99:ce:11:87:e5:5a:49:83:6f:cf:29:d3:d1:67:83:2e: 31:3b:2f:66:a0:07:5c:19:44:73:ec:f0:97:5d:e4:d3: c0:f9:32:07:72:94:7b:48:56:24:78:2f:8f:00:37:65: 2b:ea:cf:4b:20:b9:41:91:ae:7f:6f:ce:6d:93:01:8f: 02:f2:2b:64:ef:80:47:b3:8f:06:06:3c:8e:02:77:ae: 36:c7:0a:91:9b:6d:10:ba:5b:d6:0b:e2:99:83:3a:78: 79:4f:ba:6d:f1:c0:f9:6e:c4:8b:9f:79:8d:9c:61:56: 04:15:3a:21:d6:ee:ed:59:3b:e0:40:41:bd:a3:27:a9: f1:20:b3:16:d4:0c:30:c9:54:d9:94:1b:c8:6b:e8:b4: 2e:13:d5:2c:25:dd:00:d2:3a:c5:af:c8:f1:84:77:83: 71:4a:11:0a:67:a1:03:7a:1d:a1:bc:44:43:21:5f:58: 11:5d:6c:5d:d9:8c:60:98:75:30:d2:75:c5:96:86:20: 4f:92:af:e4:c2:6b:99:5d:d7:1c:a2:18:01:bb:3f:e3: a3:15:fd:33:c0:d3:d8:a7:fc:7d:59:21:2b:50:c9:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:ad:4b:ab:4d:fd:69:c6:d0:2f:c1:54:a4:bd:81:39: 39:59:4e:3f:b0:b7:9e:38:7c:de:ff:a2:69:56:eb:07: ad:c6:ec:8c:64:8c:0c:2f:a2:dc:5c:a4:82:c2:99:c8: 7b:9a:db:14:b7:7c:ab:c9:dc:b5:d8:cd:d9:bb:59:b3: e0:64:25:83:a2:42:bc:e0:2f:4f:67:30:59:ec:c3:af: b7:fb:23:2b:05:ac:56:12:20:54:5a:9b:53:23:b1:1c: c9:b7:60:75:75:7a:bc:a7:8a:7e:0b:00:28:d2:05:9c: 4b:a7:bf:1f:ad:d7:7a:55:f1:cf:46:9c:9f:5f:b9:7c: ad:04:56:9c:26:52:f1:9d:e0:0d:a0:bc:af:a2:d1:d3: 4a:37:eb:c2:2b:1e:b4:e2:8d:5d:14:f2:93:0f:a9:7e: 59:2f:f8:c7:a2:5f:24:83:23:af:a6:24:95:c1:41:f8: 15:09:63:d0:76:8e:31:a5:74:7d:d1:1e:2c:b1:1c:9d: 7e:3f:d0:1e:a1:99:0c:c1:4a:a4:0f:e6:da:9d:54:c5: d1:c3:1f:b4:61:ab:8e:bb:33:86:95:5a:7e:d6:a3:bd: cd:1a:0a:70:d9:ae:be:3e:9f:02:52:58:ec:27:dc:b4: 2c:b9:02:06:bd:e3:0d:af:58:87:05:c9:bd:21:e7:d1 Fingerprint (SHA-256): 43:42:37:70:5A:36:CF:9D:B2:48:F8:6F:51:2A:F4:3D:03:35:46:02:C0:5F:B0:41:FA:65:85:C4:F1:A0:84:38 Fingerprint (SHA1): 20:9A:B3:7C:7D:AF:08:73:FC:1A:A1:1F:C4:60:E5:D1:FF:D6:ED:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:47 2024 Not After : Wed Mar 26 14:16:47 2025 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:23:28:34:46:14:6d:35:10:60:ab:49:4c:4d:63:14: d7:b2:2d:81:88:1f:ec:0d:ef:24:6e:f6:9b:4b:45:98: 6f:43:e8:f2:a9:ff:41:73:1a:a8:47:f5:32:d4:63:e4: f4:b6:83:74:b7:00:d4:66:74:c7:de:57:e8:c0:5e:af: 17:87:90:5c:c8:ba:91:47:d1:11:72:f9:cc:91:ed:0a: 00:b9:5f:f2:5e:c1:7e:76:ac:39:57:82:9e:87:5f:61: c4:76:af:35:32:54:43:70:e4:8f:da:5e:8d:1c:df:45: 2a:45:25:33:2d:71:f3:5a:48:30:b9:0d:e6:3a:33:33: c6:e4:d6:0a:a8:5c:d1:f8:fa:56:f3:05:77:df:62:28: 4b:95:30:0d:5a:b3:ce:2c:d7:de:e9:9e:2b:f3:27:7c: 6d:67:25:80:5b:b1:f1:71:13:60:04:1d:1d:71:91:a9: 60:a3:97:52:90:30:d9:a4:d9:99:7d:db:7a:86:4e:bb: dd:71:a6:35:47:b9:0e:ec:3b:57:f1:b9:1f:32:cf:7d: fe:6e:3b:d8:39:44:41:63:78:e0:2e:c1:59:c4:86:c2: 46:24:48:8e:ed:40:df:fe:84:67:5a:a0:6b:a1:f0:5d: f3:d0:ef:64:d2:b1:a1:e6:e9:f4:f9:5f:52:29:ad:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:b5:28:34:09:11:76:d5:d8:ab:eb:fb:ac:23:ec:9b: bc:86:cc:c6:82:ef:72:17:db:16:13:36:e8:9b:29:07: 28:24:63:9e:cf:b6:95:a4:9c:13:39:0a:76:61:a3:2f: 43:52:e6:0b:84:73:3e:15:75:4f:08:f8:17:b7:f0:54: cb:ef:b5:02:2e:87:b8:81:c2:f2:49:86:24:b7:f9:d3: db:8a:a2:6b:05:71:54:03:34:1b:83:c8:58:ce:91:19: fa:ab:c5:7f:30:18:40:8f:cd:83:92:e3:6f:4b:af:42: 76:a3:a8:33:fa:af:06:d7:0c:45:f7:03:69:ba:73:d8: bd:f7:5c:3c:7d:e4:b6:8b:3e:6d:ff:a4:f9:34:0b:d3: 8c:ef:1a:36:57:37:1f:91:c1:20:05:9d:86:63:87:3f: 1d:1a:07:7f:45:0a:80:1b:fe:21:22:57:0b:c1:13:38: 6e:82:69:35:e9:e2:d4:75:d8:18:00:27:5d:ee:73:27: 69:96:77:27:66:57:31:e9:02:2e:90:04:97:3e:07:49: 91:cf:e9:cf:9e:ca:bf:df:3c:70:83:67:64:42:c5:de: e6:34:de:6f:d4:0a:dc:5d:9d:21:1b:aa:33:d3:df:2f: 02:dd:50:13:f0:a4:92:ac:de:92:e6:13:18:1b:14:72 Fingerprint (SHA-256): 50:63:31:78:E1:DC:6B:A3:1F:A1:C0:2F:8F:C3:DD:8F:01:C3:67:0F:2D:30:3B:A1:C5:1F:D1:E4:9C:15:74:45 Fingerprint (SHA1): 92:16:44:65:EB:84:1C:67:A3:7C:7E:1A:29:C2:AA:A7:45:3C:AD:04 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:47 2024 Not After : Wed Mar 26 14:16:47 2025 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:a1:76:8b:3d:b6:cb:98:5a:9d:52:d8:21:ab:bb:5d: 1f:a0:b5:82:1e:41:ac:f6:e2:5f:a7:7c:73:2b:d7:21: 13:3a:a6:b9:87:4d:f9:82:d2:81:cd:ec:1c:ca:a9:4b: c6:31:02:53:b7:a3:e9:05:5c:10:53:0f:64:96:f6:6e: e1:1a:73:48:71:a5:3d:8f:67:f0:f3:31:fc:9c:07:b1: 08:a4:75:b5:bc:6b:30:21:13:95:83:d3:d3:08:0d:98: e5:a1:b6:75:07:54:1d:57:87:02:2b:19:de:6d:e4:92: 49:34:23:a5:9f:bc:56:4a:3a:11:63:92:eb:79:1c:f8: 8d:8c:d1:a0:b5:7d:24:e3:cb:10:04:b1:17:ec:58:05: 90:6d:24:86:2b:b1:79:f3:95:6e:54:bc:c4:4b:58:b1: a3:af:94:cd:34:81:4a:53:fc:c4:a6:b2:fe:de:35:19: a6:40:b2:2c:f9:ca:3e:46:c5:6d:2b:fe:58:1f:12:c5: 51:fe:2f:b1:05:42:f9:88:b1:9e:d7:c2:af:5a:a3:31: 46:c0:ca:ab:4b:a1:8f:4e:cd:10:f0:47:f9:bc:92:ff: 11:c2:fa:a0:6e:9a:0c:9b:57:fa:0b:8a:b4:cc:da:70: ba:8a:b5:1f:d2:35:da:a0:c6:14:22:72:39:39:65:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:94:6d:83:e6:23:bf:64:c7:e2:ef:68:73:a5:a9:df: 88:44:2b:00:1f:a8:8b:2d:5c:62:a1:84:45:ae:0f:c5: f9:7c:90:62:2e:08:24:6a:c8:e8:03:42:03:74:5f:b8: 9f:cc:82:f6:b3:8c:cd:3b:a1:28:6c:7d:fd:85:61:bb: e0:8e:f3:56:55:dc:d2:36:5d:19:c5:1f:29:0d:92:43: 98:f2:15:17:2d:01:8e:e6:4c:bc:9b:72:c3:69:72:12: 50:56:6c:59:c5:b6:1f:ce:26:d5:54:04:33:8d:68:f6: 36:56:42:a0:70:f1:2e:a4:a4:89:0f:c4:c1:a5:6f:34: ca:82:55:2d:2e:aa:00:2b:e1:44:4e:36:4e:b8:0a:2b: c2:2d:26:ec:15:1a:af:90:d4:4a:83:18:d2:ef:5f:29: c7:76:2e:8a:bb:59:f2:45:9d:64:ec:9a:e8:2f:07:1b: 82:d3:5a:52:c7:bb:b2:17:bb:fa:95:5a:bd:ae:48:29: 0a:de:5b:fd:21:ff:fc:96:a5:00:13:3c:b4:53:f1:83: c2:d2:d0:f4:bd:e2:c5:3d:b1:c9:eb:73:ba:a0:d2:80: 4c:df:85:d0:2e:d8:63:13:da:82:b6:5a:98:da:fa:14: 94:63:8c:75:bc:4e:f4:09:77:06:86:a6:2f:9e:e5:3f Fingerprint (SHA-256): FC:6F:C2:E5:B3:BE:07:1E:87:39:43:CB:60:71:07:56:47:15:C9:2A:77:33:B1:E3:DD:CF:73:28:0A:87:25:FC Fingerprint (SHA1): B2:80:3C:3C:D0:AA:13:C8:81:50:C1:97:95:C7:EF:D5:37:74:98:59 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:48 2024 Not After : Wed Mar 26 14:16:48 2025 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:3b:73:3f:af:48:5c:92:f6:74:83:5a:b6:fc:bd:7d: 41:53:2d:d0:26:a2:9e:d2:3f:18:fa:46:43:05:cb:f7: 1c:c2:ee:35:b1:f7:3f:cd:64:ff:04:fc:24:57:73:fc: 04:7e:83:73:59:e1:37:d5:34:31:71:d8:4c:0c:e2:90: 01:19:5b:f2:16:b7:68:e7:7d:88:ab:75:35:1e:f7:a9: 64:b3:08:62:75:87:50:24:89:99:09:e8:c5:32:7e:76: 7e:ce:c3:a2:88:fc:b3:61:cc:b3:08:58:a2:06:16:a6: 98:8b:37:5e:72:9f:25:3d:2c:b5:ec:06:55:ab:a0:79: 50:31:ef:f6:6a:5e:de:bc:24:b4:f0:a4:a5:4d:23:9b: 65:6a:b9:d7:ed:0e:a9:0b:e4:8c:55:0c:a0:59:8b:3f: 2c:fc:4e:23:d5:89:37:fe:ce:ec:1a:92:17:b0:96:77: a2:8a:65:cc:ea:ab:c8:39:a8:67:da:b1:0f:c0:f5:6e: 0b:5b:fe:c5:c9:7a:3b:16:7e:90:7b:b2:3a:ba:e0:8f: c4:35:b7:97:d8:7d:48:14:d4:a7:fc:d9:3f:9f:2d:5e: 7f:e3:c4:eb:24:b8:d8:67:28:1c:4e:1b:d5:dd:3b:77: ff:a6:86:8f:32:46:19:29:9a:18:e5:7a:1f:72:3e:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 44:8f:2d:c2:b9:f0:9a:f9:7b:4e:78:97:44:f7:0c:f8: da:2f:06:73:59:06:f3:42:f2:71:d1:81:4c:3c:b9:fa: 7d:05:04:3c:d6:48:f9:b8:8b:c0:fb:ff:c3:a2:dc:c7: 59:1c:1e:80:77:15:fc:54:69:16:49:a7:ea:55:fc:e2: 83:41:ea:1a:12:67:72:18:15:b6:01:e4:fa:a4:20:ce: 4e:0e:7c:0b:f2:4f:41:c0:5c:b0:3b:35:4b:bd:b5:cf: bb:96:43:dd:3c:ca:ca:d3:2a:67:20:7c:6e:26:23:43: 3a:84:b2:70:8f:f6:ac:89:bf:03:e6:6b:dc:55:7d:67: d1:12:20:d3:71:fc:d9:4f:c5:bb:12:93:b5:20:e2:9c: 3a:0e:17:58:7d:09:ca:4e:ce:74:77:56:9c:5a:71:31: cc:75:58:f2:5c:87:82:06:73:2a:17:33:96:49:12:68: 9d:8d:86:8d:40:39:d8:5f:1c:7f:7a:d5:1d:60:e9:d6: f9:bf:51:7a:eb:5a:10:fa:c7:2f:b4:40:52:e9:82:40: d5:a2:5a:66:16:e9:b2:be:67:b3:70:16:ee:71:a4:a0: 8b:79:24:af:d1:0b:8e:7f:ec:a6:5b:17:7f:40:ba:fa: ec:09:1b:dc:fc:f8:50:99:52:3a:df:cc:50:1b:f9:b2 Fingerprint (SHA-256): BD:61:49:B2:41:3B:9A:48:73:57:54:0C:B0:8D:C6:00:F3:07:CB:3F:AC:D2:74:95:08:FB:66:04:7A:4C:CD:73 Fingerprint (SHA1): 55:1D:DF:8B:A9:6D:2F:69:C7:6C:F2:B6:0F:BF:90:D1:BF:77:94:76 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:49 2024 Not After : Wed Mar 26 14:16:49 2025 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:e9:f5:1b:ea:3c:3d:80:93:bc:86:f0:ea:20:79:4b: 58:9c:1d:c8:de:78:09:99:b8:ac:58:4e:4b:bf:11:69: f9:b4:01:06:95:a3:54:9e:8a:07:4b:7f:10:53:43:b6: d9:4a:18:72:dd:aa:6d:2b:21:34:15:c8:cf:b9:6f:58: 1c:d5:28:9c:94:11:25:6e:dd:d7:b2:55:4b:61:66:90: 19:b4:c4:f9:b2:0a:b7:4d:de:45:3c:14:ec:d9:64:83: 3d:f8:77:f1:23:41:47:59:92:ac:4b:61:b6:1e:09:66: f9:36:0f:b5:1c:ff:d8:68:70:03:4e:c3:6c:92:6e:7c: b3:12:d1:af:fa:86:02:9a:2a:89:49:6e:76:75:44:16: d7:00:2b:e3:5f:00:71:e6:33:80:d1:ce:d8:34:ef:97: 47:57:12:aa:c5:ae:ee:b8:08:5a:fb:78:98:6e:04:d1: 5e:64:62:f1:c7:3e:88:5c:dc:72:2d:c2:51:48:ce:3f: a7:f6:d9:12:7d:d9:95:31:e8:5a:a5:be:59:e4:e1:c9: 70:10:27:a1:e3:43:cd:56:77:60:e1:de:e8:fc:ad:8d: f0:d2:d0:88:99:60:ca:53:f2:5c:97:12:0d:8c:f9:3a: e1:e9:1e:5c:e0:f8:4b:38:b6:83:ad:ec:e5:98:7b:1d Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:15:13:60:a2:a8:96:1e:f2:f7:e6:66:bb:89:c3:dc: 10:fd:06:1f:fc:5d:bc:2a:19:79:b2:00:58:db:e6:37: 7e:07:62:fb:58:a9:8f:2e:60:59:ab:57:41:7f:64:9a: 52:8d:f8:9e:10:28:60:ac:ff:10:12:2f:18:f7:0b:16: 5e:1f:58:9d:21:1f:bd:4c:f3:58:c1:fa:15:6e:63:4a: 08:91:d9:93:e4:c7:73:e8:df:16:4c:76:67:dd:5b:f8: 9d:44:42:58:18:9f:65:61:d7:9c:3b:cc:ad:a6:49:4f: 72:9a:ce:fb:35:e9:ef:ec:18:f9:ca:e0:14:91:d4:c8: 74:ab:43:36:ca:39:06:55:20:4b:c9:71:2e:a0:6b:fa: 58:9d:1a:65:04:4a:36:68:69:03:99:3d:a4:8a:6f:8c: 33:ba:ae:ed:0c:fd:8a:83:35:ec:38:98:87:cf:37:e1: b4:62:8a:33:39:c0:8d:7f:69:57:20:9d:21:59:f7:31: f5:06:31:54:f9:67:9b:0c:54:d4:88:4f:23:e8:95:69: 46:f5:95:f2:08:53:ce:d2:de:73:51:d3:0b:07:50:01: cb:83:1c:dd:c9:d7:45:30:08:96:22:5b:e5:6b:57:d9: 6e:15:b8:75:a6:d2:e2:7a:c4:c6:d3:a5:f7:58:48:7a Fingerprint (SHA-256): C1:EB:CB:3E:AE:11:DB:4A:D5:49:35:A5:C3:9E:7A:06:86:05:72:F1:7A:F8:76:10:19:67:81:89:BE:DA:31:48 Fingerprint (SHA1): BD:3E:1F:B7:5B:EF:82:0C:C2:8B:28:50:4D:40:95:85:9D:E2:0A:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e7 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:49 2024 Not After : Wed Mar 26 14:16:49 2025 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:29:7f:23:a8:82:1d:67:33:45:47:eb:29:63:aa:f3: 89:11:22:73:76:af:25:f9:9c:0e:21:47:b1:f1:3b:95: 4d:9a:a5:33:ec:79:5e:9f:6e:af:67:fc:ae:24:2d:cf: 8e:0a:91:d4:19:47:95:46:91:3b:1a:22:d3:75:bd:b3: 2e:ba:3e:da:58:aa:86:40:26:6e:72:2b:fa:46:dc:ff: 9d:fa:63:b1:1f:4a:04:c0:88:56:8e:26:87:7c:df:24: 86:9c:5a:b6:47:46:4f:bc:f9:ed:5f:df:d1:18:bc:2f: cb:07:33:21:25:3c:a2:60:26:47:00:1d:ea:20:af:67: 7d:d6:d1:43:cb:4a:25:c6:f3:07:37:ea:11:07:7f:a0: 89:5d:c6:ba:1c:7f:e1:1b:59:a0:6d:2d:dc:6e:71:bd: 36:3b:1b:26:42:b4:c9:25:16:98:41:1d:3e:33:95:72: f0:2e:01:8b:99:77:cb:f8:4b:22:13:e0:6b:a9:fc:13: 30:4d:b1:30:45:4f:f4:fc:f7:9a:91:38:1e:bc:4e:2f: ce:1a:7b:ff:ab:83:55:7e:27:f2:8a:c1:7a:6c:bc:cb: 3a:12:6d:cc:fd:d6:e8:b1:e3:f6:ea:88:8d:26:7d:74: 33:a1:7f:73:fa:95:b5:e5:75:0b:ce:f1:90:d2:6b:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:a2:8d:82:c8:46:f5:de:13:9a:ae:00:e3:f5:0b:96: b3:c8:93:78:b8:f7:eb:ba:f3:08:ae:d7:2f:13:5f:81: 8a:c3:49:e5:36:17:9d:58:86:bc:66:d8:b3:5e:52:9d: c9:0b:5e:53:29:49:1a:7b:39:c2:59:e1:89:96:1b:43: 8c:3c:0b:31:e5:fd:f4:1b:4b:7d:b2:c2:09:af:1e:28: 79:8f:e1:d3:94:93:f4:62:1c:07:48:25:99:3e:06:5c: 47:3f:c7:f1:3d:1f:96:92:91:88:54:29:be:55:c0:7d: 89:b7:98:42:2a:e8:01:cb:82:af:52:18:cf:be:8e:db: ee:82:af:a1:84:33:d5:32:6c:a4:20:8d:1c:6c:0c:27: bf:f1:c9:72:76:b0:b0:00:ff:dc:b6:08:a3:12:7b:39: 89:35:1d:85:6b:9d:06:14:11:b6:9f:b3:b4:a1:9c:c3: 9a:4b:74:cd:f2:4a:c8:df:bb:46:30:a1:30:e5:70:3f: b4:e6:4b:df:12:f8:7a:d9:5d:37:c1:c0:01:b5:18:ba: 94:a5:0d:49:7a:cc:57:7b:d5:b8:c2:13:ce:8f:a4:9e: 37:35:03:34:67:b5:5a:90:3d:4a:f6:5e:f0:8d:76:31: 85:2a:c7:5e:5c:b6:7d:ce:91:f0:d9:40:e4:6e:68:44 Fingerprint (SHA-256): C6:4A:79:15:A3:92:00:28:7B:83:61:6A:4D:AC:39:18:A4:17:19:56:9C:4D:16:6D:79:72:CE:35:E5:A6:25:64 Fingerprint (SHA1): B3:A6:DD:EB:B5:9D:15:23:68:00:7C:16:0F:9D:E9:92:1C:BA:80:4F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e8 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:50 2024 Not After : Wed Mar 26 14:16:50 2025 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:dd:00:fc:7f:e4:9f:c8:6f:71:c2:0a:2a:50:06:da: 18:d2:f3:a4:11:c3:26:80:09:7e:2f:2f:28:8f:dc:2e: 43:e8:31:34:77:4a:a9:83:10:a8:94:cf:ae:cc:5b:87: c5:c4:92:c6:11:8b:bd:63:89:42:be:8c:ac:20:1b:71: d2:7f:d1:68:05:c2:ab:62:bb:d2:7b:30:34:95:61:ce: 83:af:55:a9:82:fb:f3:0e:5a:d2:4c:e9:3b:b5:a9:a0: 13:d3:a4:93:d6:54:d6:ef:91:dc:ea:8a:2d:b6:3d:31: a0:5d:e7:7f:ef:95:f3:48:88:52:95:db:77:9f:07:d0: c4:34:15:d5:83:13:38:de:aa:8b:84:1c:61:bd:50:b0: 0f:21:9a:80:3a:8c:ad:b5:d1:fe:ce:2f:3d:a0:cf:e3: c0:e6:d2:73:f6:a4:cf:ab:21:82:b7:34:e0:b6:e9:ac: e7:4c:ec:1c:e9:de:50:1d:6e:00:29:23:f3:34:89:69: e4:4a:2d:fc:e4:eb:d9:29:bf:9a:22:a8:c2:d8:b3:d4: dc:10:7e:21:74:0d:e0:0f:fa:0e:cf:77:0d:86:e9:4b: 3f:9d:15:73:21:8e:64:93:70:50:2d:93:dc:04:d8:84: 9d:d2:f9:2f:c4:42:29:28:ab:68:c4:d6:a9:32:d4:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:f8:da:50:6e:a1:b6:66:cc:fb:9c:8e:1d:1c:86:26: 1c:f8:0f:89:f5:8a:54:d0:6d:af:a2:0d:81:c5:29:30: 8e:36:c4:7b:45:d8:6b:a8:72:4a:d7:fa:48:6a:9b:4a: 63:45:7d:21:6e:06:98:56:08:43:cb:96:d6:6f:1f:d3: 07:b8:50:95:5d:73:82:15:7e:e7:34:4b:f2:0d:36:2e: 3b:23:d8:a6:a0:9c:b2:fe:8b:22:0c:05:26:22:69:06: 32:1b:5b:2d:00:a4:e8:5e:11:dd:bd:7f:60:22:b4:f8: b8:61:06:ad:4c:52:85:32:d3:60:65:52:d4:ea:95:80: 94:27:39:71:ec:10:ef:28:4f:fb:88:5e:a5:ad:cc:8a: b1:6a:dc:60:33:fe:27:da:af:47:2b:3b:a8:a2:40:37: 4e:fa:c9:0e:33:ad:d3:74:4d:ef:53:70:32:42:48:1f: c5:95:6c:6e:1e:4e:8d:01:a8:7d:97:38:e6:9c:5f:b1: 2f:14:4f:bd:21:9c:ae:c3:59:e3:e4:8e:0b:22:19:34: df:31:65:6b:a8:20:59:d6:a2:02:ee:71:a4:d1:cb:8f: b5:fe:45:fe:e2:4d:43:ea:23:57:1d:78:02:40:ab:ce: 28:a9:88:83:ac:34:36:23:69:3e:d0:a4:6f:28:9c:22 Fingerprint (SHA-256): 31:09:C0:6B:5C:26:81:F4:C1:58:64:48:D5:11:34:64:E9:85:42:A0:7D:53:62:1D:37:23:C0:37:1A:6B:A7:69 Fingerprint (SHA1): E6:9E:6D:6C:90:AB:C1:59:3B:B9:CD:EF:97:88:4F:4D:36:93:6F:1C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:e9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Thu Dec 26 14:16:50 2024 Not After : Wed Mar 26 14:16:50 2025 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:4a:6c:43:a9:a6:c2:35:c7:70:4a:05:5b:3d:04:93: f2:80:9a:a1:3d:39:7c:b9:ed:2d:2c:c6:25:b4:6b:9b: b4:32:b9:25:d4:63:6e:97:8a:63:e3:15:8f:b0:33:3b: 30:40:71:b0:9f:b1:bc:e6:d6:a1:d1:35:11:3d:31:fa: e5:90:2f:95:d9:ce:cc:b4:79:6d:4c:96:20:7e:44:42: ae:50:4d:8e:97:2c:42:ce:f1:c0:48:e8:15:31:20:6e: f3:e9:a3:fb:91:a7:63:bc:1b:60:78:3e:69:ec:b8:cd: fa:e0:ef:8e:09:ae:16:65:95:d5:73:d1:20:49:8d:ab: 43:86:d8:be:f0:9e:d1:f3:ac:e0:b0:24:f4:bf:a1:b7: c1:2b:4d:9b:74:24:5e:4e:e4:37:ea:75:6e:6d:44:92: 03:96:2e:f6:1c:99:5a:ae:c8:f4:3d:51:6d:5e:04:01: 67:ff:b7:87:92:28:0b:84:96:8a:73:73:d6:6b:f8:5c: aa:b4:b8:6e:c3:7a:cd:ad:75:43:74:02:7f:77:2f:9c: 3a:51:0f:23:89:14:4b:fc:b7:e9:9e:4c:d4:86:da:58: 6e:e1:b2:f9:ae:a0:05:28:77:04:65:83:3f:49:e9:6c: b9:c6:17:80:e8:43:f4:aa:4c:76:42:eb:2e:c9:e7:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e4:47:7b:95:07:d7:eb:38:83:f3:66:36:d2:d1:9a:05: 60:e5:99:11:49:3d:5c:0c:35:40:6d:1b:1c:7e:49:a8: 25:4c:ac:96:57:b3:03:91:cf:3e:04:e6:88:00:66:df: ea:4e:3d:b5:f2:3c:ed:51:59:e0:79:89:fe:4b:56:07: 2b:92:eb:6c:ed:65:8c:28:29:9e:b9:77:72:1f:2a:a9: ff:eb:cb:c8:07:62:fa:d3:0b:03:62:24:64:ac:de:b2: ea:93:c5:64:cf:2f:7b:45:67:50:83:b7:09:ef:3c:c8: fa:8f:59:bb:69:aa:ac:28:07:38:a4:61:a9:88:62:17: 4e:4b:f8:e4:ff:cf:4b:35:87:09:6e:23:27:77:0b:70: 67:d5:c1:5d:e3:e8:81:67:ee:56:b1:85:ad:ed:59:d8: 37:a1:d4:4f:0c:4b:eb:6d:32:f9:94:08:33:4d:40:f5: f5:ed:9b:e0:e7:4f:45:70:ca:05:39:19:e2:54:5a:54: d9:87:53:28:b1:07:ed:ef:86:ef:13:5e:8f:db:7c:72: b3:92:81:e3:d3:2d:21:08:7d:70:68:69:85:4b:07:d1: f2:29:55:db:f1:95:f8:40:3e:f5:19:80:c4:4e:86:29: f1:3c:aa:63:ba:79:17:55:f7:81:35:02:f6:f4:b4:b8 Fingerprint (SHA-256): 21:34:25:B1:66:EB:F5:9A:44:96:3E:A8:08:5B:88:34:6C:33:3A:1C:4F:3D:88:50:AE:F1:C3:01:A5:ED:EA:5F Fingerprint (SHA1): D0:26:D9:66:C3:36:E9:FB:96:4C:2D:87:BA:03:2F:8A:23:AC:2A:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:ec Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Thu Dec 26 14:16:52 2024 Not After : Wed Mar 26 14:16:52 2025 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:83:b1:d8:57:96:e0:eb:6f:3d:43:56:b1:91:9b:39: 82:88:3c:80:dc:8f:ad:ee:9a:cc:c1:3d:e7:95:10:64: 87:91:90:8a:74:70:1f:ee:3e:16:e3:29:90:a1:f1:5b: e2:17:40:f6:b9:e9:46:40:98:d6:af:cc:79:40:f8:0f: 20:a0:09:8c:c4:16:8d:d6:44:37:b1:c0:32:4d:33:77: e3:64:25:6b:b7:e2:e0:bd:ec:2d:e3:9a:3a:a4:7e:9b: 77:fb:c2:8b:5b:76:cc:5d:a8:f4:fb:cf:e3:ba:04:25: 77:35:56:9a:2c:a7:44:61:d4:c4:68:ce:88:f4:58:43: 8d:1b:4f:a6:ba:7f:77:11:0e:4c:23:ba:98:15:99:17: 88:a6:6e:15:19:8b:ac:aa:ed:d4:41:79:f9:0d:5a:e3: 58:31:2c:88:c0:b7:b9:95:22:5d:dc:40:1c:ff:7a:70: d4:dd:24:47:b3:52:97:32:f9:d3:33:bc:ee:a3:df:b1: b8:da:9d:b5:d7:98:97:ba:09:d4:fd:7b:1c:2c:b9:d4: 3f:e7:b8:a4:2d:a1:71:7e:12:a0:6b:11:e1:a9:e0:aa: e1:11:fe:22:2b:bb:3e:5a:b5:8e:69:23:bd:69:24:ee: b7:72:d9:68:e1:2f:eb:33:2a:0b:43:46:c1:15:4b:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:2c:63:e3:b8:46:d4:16:93:ae:cb:6c:e5:ef:7d:5c: e7:d1:ab:77:51:c2:a1:3c:ae:50:2f:63:64:a1:8a:d8: 5f:60:55:44:45:c7:e3:53:03:a8:8c:31:e2:78:71:88: 68:16:04:3d:af:14:a1:f2:93:44:61:5d:9c:51:0d:2a: 79:90:3f:f0:13:49:0c:e2:9b:27:cb:0a:95:e0:2d:3d: 33:bc:ca:8e:42:9a:fe:af:f1:40:de:6a:b6:8d:2a:92: 83:45:e8:d7:86:7b:f3:eb:fc:1a:ae:fc:7b:c3:93:01: 20:8e:ac:56:12:25:1c:f0:1b:7d:f3:1e:09:16:6c:ba: 9c:90:e0:35:6e:b7:ec:ca:49:17:df:c3:1b:83:ea:eb: 39:f1:6d:d9:3c:c7:14:b3:ee:5c:31:78:63:c5:08:c1: 1e:61:d3:0f:36:8e:68:91:b6:85:dd:4d:5c:7e:fe:55: 59:77:50:83:0e:0a:d1:92:7f:ed:36:f2:20:1d:c9:84: f7:d5:f7:c1:d5:21:a4:c8:ce:b5:a4:6f:56:9a:36:61: 84:31:ae:63:8d:4b:64:9e:31:ba:67:48:dc:5f:2b:8b: 33:d5:72:38:13:00:e5:dd:c8:b4:26:3b:32:e4:32:93: 3d:1a:20:71:57:e2:d2:de:cc:d1:f9:5d:cc:86:c6:56 Fingerprint (SHA-256): 88:28:B4:4A:87:08:93:FA:D4:AD:75:32:66:4B:87:6A:8C:17:07:8E:35:2D:9E:07:7B:49:EF:25:7D:ED:0A:00 Fingerprint (SHA1): E8:6A:99:E8:54:0D:87:C2:26:09:E9:FA:BD:D3:65:B9:A5:F3:04:A9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c5:45:9f:f1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Thu Dec 26 14:16:55 2024 Not After : Wed Mar 26 14:16:55 2025 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:73:54:85:9f:a6:24:b9:76:6a:a1:04:66:be:dc:c8: 2c:f7:6c:88:3e:c2:7d:9a:dc:5c:24:51:2a:ba:df:26: 20:6b:88:a5:d6:91:1b:7f:f2:5a:47:7a:52:d0:21:60: cf:8d:98:9b:a2:c3:7e:44:50:0f:86:cd:ac:f5:fb:4e: b7:2b:cc:6b:f7:2a:91:0b:ca:9d:7d:8d:b5:c2:6f:45: 7f:a1:17:f3:5b:4d:f8:93:2c:df:d1:69:52:a2:d7:fd: 34:d2:ee:37:4d:56:66:43:62:7f:6e:5c:1b:92:6b:56: db:4a:92:50:13:e7:9a:3b:db:a6:06:f2:28:8f:25:66: d5:6c:3d:b4:90:a8:f8:3f:49:15:cd:bc:bc:74:e5:ce: b4:65:77:1b:c7:21:28:13:ca:58:a9:ef:1b:73:63:bc: 64:92:49:e5:55:dc:bd:85:b0:46:a3:37:f1:bd:34:d3: e3:d6:10:69:e2:b4:1e:b6:3c:62:ab:1f:73:38:94:65: 48:bd:f3:b1:cf:af:78:02:5b:e8:40:0c:a8:2e:51:7f: 4c:02:93:88:e6:19:ab:09:34:50:07:0e:f0:ab:1b:5f: 5c:34:9c:57:15:12:90:59:13:a0:f7:68:b0:00:41:11: 4d:97:ca:ef:d6:8a:04:af:41:16:5e:8a:f8:2f:5f:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:7f:94:5b:ac:16:eb:8e:eb:c4:83:61:a9:fa:ba:f8: 16:a3:df:88:1d:68:ac:53:99:5a:8d:87:ae:a9:4f:7f: ea:cf:8c:e9:9a:e2:a9:60:3a:35:33:4b:fe:3d:a3:22: 6f:c5:1c:c2:43:80:fd:09:79:3b:11:6d:6d:f9:3d:68: 99:33:61:3d:0c:75:7c:bf:b8:17:fb:db:9b:41:07:d3: c9:a9:92:8b:6a:f8:6e:d3:1f:4e:3b:8e:03:c7:ea:5b: 13:7c:97:8d:d0:bc:99:49:8e:ff:24:03:5b:cf:d4:c4: f8:7e:5c:43:5b:b8:23:d7:80:8c:58:a2:3d:87:1c:73: 3f:b6:de:49:2f:6a:f2:18:a8:c7:72:cc:55:27:c6:ac: 76:51:0d:49:f0:2b:e9:61:b4:b4:c8:7a:9a:7c:6b:41: 93:fc:85:19:81:7b:15:d9:48:4d:d6:a1:7c:8c:eb:d0: b3:cf:d8:59:76:f6:e7:84:88:d9:5e:a5:68:17:f1:88: 6c:23:4a:ed:d0:f1:26:fe:34:54:fd:44:6b:7d:a8:b5: 3c:1e:49:cc:1e:70:d1:d3:1d:d4:4e:d4:a0:e0:16:06: ad:95:ca:e0:d2:1e:a1:a9:b6:29:51:cd:1d:df:8f:1c: e8:a9:93:da:a8:a4:40:7d:cb:27:3e:9b:de:31:d7:fa Fingerprint (SHA-256): 69:5F:AD:6E:A7:C9:8C:AF:76:74:AA:8B:2A:18:ED:47:A3:E4:91:65:93:2C:FD:53:29:71:B0:45:0C:31:55:94 Fingerprint (SHA1): 58:B1:2A:90:18:50:C0:0A:92:1E:5A:F7:B9:32:9D:C1:54:DF:CE:D5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa f7e82381b397595c4e43393eb3a09cb395a5bb56 NSS Certificate DB:localhost.localdomain < 1> dsa 9796bee8e1689af026e16d0474dd608a0dfb806c NSS Certificate DB:localhost.localdomain-dsa < 2> dsa e1c06defcdb80e31ef5c205a43230fbe1a5a5099 NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 2ec803c6d993fc34a391ddf89ee15c0b62491f50 NSS Certificate DB:localhost.localdomain-ec < 4> ec 5b285d8af563890cf5563d2def9b1c0a2ac4e347 NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa a48b8c9159d918a6f2241fbd3c83d6c0c922c30b NSS Certificate DB:localhost-sni.localdomain < 7> dsa a1c9e59de3b803c1c890d72d5a611f77df65995b NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa b36679629321ccb136ba5e81bb2edf5dec9f3055 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec afbae8accc2ae8a181663be78694ef6b3d852aa2 NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 7338b3fd51b2016dbb9c7b883439f139699432fa NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa 93aef8ecdf449c963b31a943a74dd365fce2c0fb (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.101/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Thu Dec 26 14:18:01 UTC 2024 Running tests for dbtests TIMESTAMP dbtests BEGIN: Thu Dec 26 14:18:01 UTC 2024 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/key3.db" does not exist. dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/key3.db" does not exist. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mock 4096 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mock 1227 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mock 1427 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mock 582 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mock 707 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mock 881 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mock 872 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mock 274432 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/cert9.db -r--------. 1 mockbuild mock 204800 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/key4.db -r--------. 1 mockbuild mock 617 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mock 728 Dec 26 14:18 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:30 2024 Not After : Wed Dec 26 14:16:30 2029 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:d1:7b:f6:5e:6a:93:54:91:04:d6:9c:2f:bc:d7:5e: 9b:27:4a:bf:47:3d:6a:f2:c6:ed:6d:0f:8e:07:fd:4a: 58:b3:c1:02:2f:79:0d:93:83:27:59:94:1b:92:b0:8d: d6:eb:86:ed:4a:07:0b:25:03:1b:14:83:78:b8:56:cb: 2b:ed:ce:8b:58:7c:56:e4:a3:50:40:a0:92:95:80:d4: df:c6:18:b1:ec:1e:9d:75:47:8d:15:bd:05:0a:a5:33: 38:58:a9:24:15:4a:4f:bc:44:9b:f4:c7:56:7b:1f:18: 51:ed:2b:c6:0c:d5:0e:31:4c:19:d9:fd:2c:52:a8:30: 60:54:d0:28:33:76:09:41:93:29:94:8a:e7:da:24:03: 1c:8a:8d:17:8d:9d:bb:82:9d:66:a7:93:c8:19:1a:88: 7a:dd:01:5e:7e:37:a7:84:9b:c9:fe:46:32:7e:d7:e8: cf:29:80:fe:6d:37:ad:89:30:c4:bc:d9:1d:91:ce:4d: 94:4f:8a:25:a2:08:44:01:b4:46:6b:91:ba:85:cd:4b: 42:4e:fb:e7:e2:5a:b2:e4:cc:41:f9:e8:49:e5:e5:79: a3:8e:57:c3:48:5d:3e:4e:17:6c:66:0d:4a:18:9e:0c: 2f:6a:10:24:c1:78:b7:4e:93:fd:17:2a:7f:30:83:63 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:33:79:6e:eb:b2:48:b0:29:56:6c:13:90:57:38:64: 7e:7a:1a:0c:25:07:4d:fc:93:a9:f3:86:72:fc:b4:db: 61:ae:f3:8f:b6:fd:b8:9f:43:c2:64:af:08:48:96:2d: 63:c6:a0:3b:7b:ec:56:77:a5:c5:2b:99:55:e0:af:1f: 23:6f:d8:bd:c5:fe:8d:44:82:90:2b:59:b1:dc:77:39: cd:07:3a:33:83:a3:11:02:45:fd:3c:bb:29:6c:ee:d1: cb:f5:c6:2d:65:53:f1:5a:da:c6:37:33:31:ac:8f:b5: 76:be:18:fd:ed:55:90:30:e6:ab:a4:e1:d7:10:93:a2: d6:03:4a:5f:4e:85:ca:4e:b6:62:fb:fe:36:6a:95:61: 15:63:d3:79:dd:df:95:78:64:22:46:ce:d5:2e:87:d7: dc:f7:7b:b0:f2:28:81:21:4c:8f:09:a5:29:4c:b3:fe: a1:a9:eb:09:24:c7:3f:72:24:34:e0:53:72:a9:33:fe: d0:cb:8e:1e:53:11:52:57:87:00:12:a4:ff:dd:cc:a2: d3:4b:ea:97:dd:e3:a2:2b:68:f7:19:cf:84:da:c3:af: 60:90:fb:9a:c8:57:51:85:b6:13:d2:5b:f9:5a:0a:4f: f5:1b:2c:09:b3:96:0f:68:a2:18:82:fc:5d:da:98:9b Fingerprint (SHA-256): BC:58:C0:65:77:24:FD:5C:E8:B2:A3:29:F8:D0:9A:FA:94:18:2B:49:2C:21:EF:3E:D5:F3:00:11:38:42:AF:22 Fingerprint (SHA1): 11:61:3D:B6:7F:BB:E9:F9:A1:23:A3:7C:D8:DD:13:95:58:BA:0A:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { ae, e1, 47, 5a, 32, 77, 60, 3a, 51, d2, 28, 97, 8d, f8, 47, 3a 52, c1, c7, 16, c4, d4, da, 83, 02, d9, c7, b0, 6a, 49, 30, 8e 65, 42, ed, 59, 03, cc, bd, e8, 45, ec, 0a, 6f, 88, 7c, 6d, 57 23, 88, b6, 17, af, eb, 2a, 89, d6, af, 81, 8b, 0e, d2, a2, ae 94, b7, 2f, 8c, 4e, 86, da, 18, 42, 52, e5, f5, 2b, 2e, c9, c9 2e, bb, ee, 01, ab, 9a, d0, 09, 2e, e6, 73, b0, b9, e6, e8, ca e8, fb, 0c, de, 10, 68, 22, 12, 2f, 4e, f0, 48, c5, 31, ee, 93 63, 4e, 82, b9, b8, ec, ab, bd, 3f, 15, 71, 39, 1d, 1b, e6, 3b}; privKey CKA_ID = [20 bytes] { 6b, 4c, ba, d4, ed, c5, c9, da, ac, 92, 51, 2b, 71, 5d, 91, f7 b9, bb, 06, 16}; pubKey CKA_ID = [20 bytes] { 6b, 4c, ba, d4, ed, c5, c9, da, ac, 92, 51, 2b, 71, 5d, 91, f7 b9, bb, 06, 16}; matching public key found pubValue = [128 bytes] { 35, 92, 8e, b4, 39, 1d, 32, 40, d6, 99, d5, 67, 54, 5a, bc, d2 e8, a7, e7, a6, 6a, 59, c3, 2f, 5b, 0b, e9, e4, 5f, e6, dc, 8e b6, 57, 7b, 1d, 40, f2, ca, 10, e2, 88, fe, 3d, a5, 7b, 07, 5c ca, a8, 1b, 6e, 28, 89, af, c6, 40, e4, 36, cc, e7, dd, 75, 5a d9, 03, f2, 7a, 43, 4a, 28, b6, ac, 71, 9b, 33, 2d, a8, fd, 23 73, 10, 2e, b4, ca, 9f, 24, f8, fe, 25, 51, 19, b6, c0, ed, cd 43, ec, e7, 81, 94, 00, 08, 04, 93, d8, bf, 21, a2, 1e, a3, 86 21, 2c, db, c9, 52, df, a2, 47, 44, 53, 65, 02, 53, e7, ba, 80}; privKey CKA_ID = [20 bytes] { aa, e4, ba, 52, c8, 6f, 73, 8b, d0, 7c, 5a, 21, 3f, 05, 40, 2d a7, 7c, ac, 3a}; pubKey CKA_ID = [20 bytes] { 6b, 4c, ba, d4, ed, c5, c9, da, ac, 92, 51, 2b, 71, 5d, 91, f7 b9, bb, 06, 16}; pubKey CKA_ID = [20 bytes] { aa, e4, ba, 52, c8, 6f, 73, 8b, d0, 7c, 5a, 21, 3f, 05, 40, 2d a7, 7c, ac, 3a}; matching public key found pubValue = [65 bytes] { 04, 3f, de, 3c, b1, 66, 89, b3, ca, 3c, 61, 67, 72, d3, df, 62 a8, 3c, 96, 63, ff, 5c, 58, 13, 32, 3f, 86, a8, 41, 34, 03, 9d ca, f5, d0, b6, 93, fe, e5, 7e, 29, ca, 39, af, 71, 29, d8, 1f be, 7e, 48, 76, 29, 4e, bb, 20, 4b, 6d, 29, 95, 82, 4a, 97, 91 84}; privKey CKA_ID = [20 bytes] { cd, ed, 61, d8, 12, 06, 87, d3, 1b, dd, 21, 98, b5, ae, 31, cb 59, 5d, 81, fc}; pubKey CKA_ID = [20 bytes] { 6b, 4c, ba, d4, ed, c5, c9, da, ac, 92, 51, 2b, 71, 5d, 91, f7 b9, bb, 06, 16}; pubKey CKA_ID = [20 bytes] { aa, e4, ba, 52, c8, 6f, 73, 8b, d0, 7c, 5a, 21, 3f, 05, 40, 2d a7, 7c, ac, 3a}; pubKey CKA_ID = [20 bytes] { cd, ed, 61, d8, 12, 06, 87, d3, 1b, dd, 21, 98, b5, ae, 31, cb 59, 5d, 81, fc}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 testKey < 1> dsa aae4ba52c86f738bd07c5a213f05402da77cac3a testKey < 2> ec cded61d8120687d31bdd2198b5ae31cb595d81fc testKey --------------------------------------------------------------- | testing if key corruption is detected in attribute 120 --------------------------------------------------------------- amending sig_key_03da54c2_00000120 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c303504201c9257bf6758f92d32eb49f8795d86de2a9642138fb8956fcf5d8db233f6054302022710020120300a06082a864886f70d0209300a06082a864886f70d02090420cb89dd290a2585bf84665a126bdfad75112184673c9354891482afff1bba1502 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c303504201c9257bf6758f92d32eb49f8795d86de2a9642138fb8956fcf5d8db233f6054302022710020120300a06082a864886f70d0209300a06082a864886f70d02090420cb89dd290a2585bf84665a126bdfad75112184673c9354891482afff1bba1503 /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert 6b4cbad4edc5c9daac92512b715d91f7b9bb0616: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #17: Corrupted key attribute 120 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 122 --------------------------------------------------------------- amending sig_key_03da54c2_00000122 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420475a70b5bbafb4192844b265f9e3dce829bcdfda81b7092401a3d19ea72ad7b502022710020120300a06082a864886f70d0209300a06082a864886f70d02090420c02566afae21f009aa0ad94dfde199251f27bff8538154702f7fa31c827303de to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420475a70b5bbafb4192844b265f9e3dce829bcdfda81b7092401a3d19ea72ad7b502022710020120300a06082a864886f70d0209300a06082a864886f70d02090420c02566afae21f009aa0ad94dfde199251f27bff8538154702f7fa31c827303df /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert 6b4cbad4edc5c9daac92512b715d91f7b9bb0616: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #18: Corrupted key attribute 122 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 123 --------------------------------------------------------------- amending sig_key_03da54c2_00000123 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420fb78bcfc7cc3baed90763e3e7840a209e7a86dfee0da0c532784bc096d34450d02022710020120300a06082a864886f70d0209300a06082a864886f70d02090420cae873a714d1825215c8c10307cd43d937fbf58493c9df3e311ad97f177d03f5 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420fb78bcfc7cc3baed90763e3e7840a209e7a86dfee0da0c532784bc096d34450d02022710020120300a06082a864886f70d0209300a06082a864886f70d02090420cae873a714d1825215c8c10307cd43d937fbf58493c9df3e311ad97f177d03f6 /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #19: Corrupted key attribute 123 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 124 --------------------------------------------------------------- amending sig_key_03da54c2_00000124 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420b0d6fddd5baf79d5f87a96336540a76331d436c297f348080fd45f32e7bd14bc02022710020120300a06082a864886f70d0209300a06082a864886f70d02090420cb107ed488ca39f80a2cd4a5f6ad256a4766f2f632ba2baf56d7758c67880e42 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420b0d6fddd5baf79d5f87a96336540a76331d436c297f348080fd45f32e7bd14bc02022710020120300a06082a864886f70d0209300a06082a864886f70d02090420cb107ed488ca39f80a2cd4a5f6ad256a4766f2f632ba2baf56d7758c67880e43 /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #20: Corrupted key attribute 124 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 125 --------------------------------------------------------------- amending sig_key_03da54c2_00000125 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c303504202963445ce014e2c985bc88660069b1c17adbfd59edb4b43b49f14176577678a502022710020120300a06082a864886f70d0209300a06082a864886f70d020904206ef69526580952c38281187ab8992ab450c91e9357ea138dd92841de544f2ab1 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c303504202963445ce014e2c985bc88660069b1c17adbfd59edb4b43b49f14176577678a502022710020120300a06082a864886f70d0209300a06082a864886f70d020904206ef69526580952c38281187ab8992ab450c91e9357ea138dd92841de544f2ab2 /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #21: Corrupted key attribute 125 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 126 --------------------------------------------------------------- amending sig_key_03da54c2_00000126 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420b70d6e7d73062e01847660b477f1aa7e6d630e738c259c412b3870efbc5c46de02022710020120300a06082a864886f70d0209300a06082a864886f70d020904208a65eef5dfd4633dd6b5fc4eaf30d2c19cc1b0b0857dd83f03aff7ca73c4e711 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420b70d6e7d73062e01847660b477f1aa7e6d630e738c259c412b3870efbc5c46de02022710020120300a06082a864886f70d0209300a06082a864886f70d020904208a65eef5dfd4633dd6b5fc4eaf30d2c19cc1b0b0857dd83f03aff7ca73c4e712 /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #22: Corrupted key attribute 126 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 127 --------------------------------------------------------------- amending sig_key_03da54c2_00000127 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420b1a31060a38226cd1a0fe5f4d3a46d1536865873da27f2c2414a402be908886b02022710020120300a06082a864886f70d0209300a06082a864886f70d02090420c0f3828e7bd327df7225638cec35aa104313e8efeed35d7a07bc4b025563a338 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420b1a31060a38226cd1a0fe5f4d3a46d1536865873da27f2c2414a402be908886b02022710020120300a06082a864886f70d0209300a06082a864886f70d02090420c0f3828e7bd327df7225638cec35aa104313e8efeed35d7a07bc4b025563a339 /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #23: Corrupted key attribute 127 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 128 --------------------------------------------------------------- amending sig_key_03da54c2_00000128 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420acb1966b209c6a32c024850a1fab51f99979c05dce8bed83c2d3e48437c29a3d02022710020120300a06082a864886f70d0209300a06082a864886f70d020904201365444be204aca70623167dce1b8f3b9f9d28771d6417bd7ed0d4dbcd9fe9fc to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420acb1966b209c6a32c024850a1fab51f99979c05dce8bed83c2d3e48437c29a3d02022710020120300a06082a864886f70d0209300a06082a864886f70d020904201365444be204aca70623167dce1b8f3b9f9d28771d6417bd7ed0d4dbcd9fe9fd /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k 6b4cbad4edc5c9daac92512b715d91f7b9bb0616 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #24: Corrupted key attribute 128 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 011 --------------------------------------------------------------- amending sig_key_03da54c4_00000011 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c303504207db3ff38e4ee85a5d0f6809eb7994eff6ca7d46e3840e4fa18d53393e710e83602022710020120300a06082a864886f70d0209300a06082a864886f70d0209042041ed85f4ddca5e9f59ab95451e2af655b9ab0a3999fa2eec276ce6bd45a33e66 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c303504207db3ff38e4ee85a5d0f6809eb7994eff6ca7d46e3840e4fa18d53393e710e83602022710020120300a06082a864886f70d0209300a06082a864886f70d0209042041ed85f4ddca5e9f59ab95451e2af655b9ab0a3999fa2eec276ce6bd45a33e67 amending sig_key_03da54c6_00000011 from 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420f7ab2fa397e6e6323fdce084113d752349693fbc23a0da9fae7bdd05200593bd02022710020120300a06082a864886f70d0209300a06082a864886f70d020904209a0286413a9ec22612b71270eb4224fd84e93334c4d6ed177dba81db545fb530 to 308181305d06092a864886f70d01050e3050304206092a864886f70d01050c30350420f7ab2fa397e6e6323fdce084113d752349693fbc23a0da9fae7bdd05200593bd02022710020120300a06082a864886f70d0209300a06082a864886f70d020904209a0286413a9ec22612b71270eb4224fd84e93334c4d6ed177dba81db545fb531 /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -R -k cded61d8120687d31bdd2198b5ae31cb595d81fc -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_NO_MEMORY: security library: memory allocation failure. dbtests.sh: #25: Corrupted key attribute 011 correctly disabled key - PASSED --------------------------------------------------------------- | testing for thread starvation while creating keys --------------------------------------------------------------- creating 30 threads - thread 5 starting - thread 0 starting - thread 6 starting - thread 1 starting - thread 3 starting - thread 4 starting - thread 2 starting - thread 7 starting - thread 8 starting - thread 9 starting - thread 10 starting - thread 11 starting - thread 12 starting - thread 13 starting - thread 14 starting - thread 15 starting waiting on 30 threads - thread 25 starting - thread 24 starting - thread 23 starting - thread 28 starting - thread 16 starting - thread 22 starting - thread 18 starting - thread 29 starting - thread 21 starting - thread 17 starting - thread 27 starting - thread 19 starting - thread 20 starting - thread 26 starting * thread 10 ending with 0 failures * thread 7 ending with 0 failures * thread 1 ending with 0 failures * thread 29 ending with 0 failures * thread 0 ending with 0 failures * thread 14 ending with 0 failures * thread 22 ending with 0 failures * thread 8 ending with 0 failures * thread 24 ending with 0 failures * thread 12 ending with 0 failures * thread 9 ending with 0 failures * thread 17 ending with 0 failures * thread 23 ending with 0 failures * thread 15 ending with 0 failures * thread 19 ending with 0 failures * thread 26 ending with 0 failures * thread 5 ending with 0 failures * thread 4 ending with 0 failures * thread 3 ending with 0 failures * thread 11 ending with 0 failures * thread 21 ending with 0 failures * thread 6 ending with 0 failures * thread 13 ending with 0 failures * thread 16 ending with 0 failures * thread 28 ending with 0 failures * thread 27 ending with 0 failures * thread 25 ending with 0 failures * thread 18 ending with 0 failures * thread 2 ending with 0 failures * thread 20 ending with 0 failures 0 failures and 0 errors found dbtests.sh: #26: Successfully completed 7 loops in 30 threads without failure. - PASSED time certutil -K -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/bigdir -f ../tests.pw ------------- time ---------------------- real 0.62 user 0.55 sys 0.03 0 seconds dbtests.sh: #27: certutil dump keys with explicit default trust flags - PASSED TIMESTAMP dbtests END: Thu Dec 26 14:18:44 UTC 2024 Running tests for tools TIMESTAMP tools BEGIN: Thu Dec 26 14:18:44 UTC 2024 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 67:a1:4e:6d:f1:cd:80:25:3f:13:f7:69:dc:e1:38:9e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:8c:82:4f:64:47:0e:10:25:00:6f:8e:79:ee:bc: dc:f5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw certutil: could not authenticate to token NSS Certificate DB.: SEC_ERROR_IO: An I/O error occurred during security authorization. pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b7:15:33:36:79:22:2c:69:f1:d3:a3:71:e3:6e:f3:49 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:6d:94:fa:e0:d5:84:bf:1b:1b:84:66:19:83:3d: ba:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Thu Dec 26 14:16:05 2024 Not After : Wed Dec 26 14:16:05 2074 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:9b:6b:13:30:39:52:02:7b:9c:38:7d:2b:77:b8: 7f:b2:12:15:39:a8:de:26:df:7b:d1:2c:10:eb:27:80: ad:8b:da:40:58:8d:84:22:cf:c0:3e:66:b6:9d:6c:6f: 52:c8:d1:5d:6a:7d:f8:a8:6c:97:f3:5b:69:07:39:cb: 13:77:70:00:ce:7a:87:80:8d:f2:7a:72:31:07:91:2d: ca:cc:cc:0f:58:49:eb:49:d8:fa:1a:44:64:0d:4a:f6: 20:f3:59:42:6a:29:20:49:40:23:f1:21:00:52:0a:31: d6:6f:54:22:a4:60:bf:eb:df:4f:79:c8:9a:f4:3c:af: 84:79:5a:40:26 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:4a:28:b2:4f:76:29:f2:76:31:ad: 1f:76:0e:4e:6e:8a:8e:44:95:96:57:86:99:3f:65:de: a4:53:1b:55:e1:50:9a:53:e9:54:0a:0b:90:06:27:81: 4d:46:67:19:7f:7b:76:7d:35:f2:0f:a0:11:82:ef:cf: 53:d4:59:05:41:00:7d:02:42:00:d4:24:be:8a:98:ff: 1c:8a:40:fe:fc:6a:a9:bd:e4:88:b1:2b:ec:cb:bd:42: 6f:ac:19:be:0f:b1:6f:cf:99:d2:d7:72:95:6f:3c:b1: d7:c5:12:03:0c:5d:20:93:8a:a5:7e:8f:e9:3c:b7:51: f2:35:fe:3f:27:97:39:ac:16:b3:95 Fingerprint (SHA-256): 05:34:1F:F5:45:48:FB:2E:2F:A9:F9:5E:C0:1A:09:E6:6E:A4:B4:01:79:F9:6E:44:BB:15:C2:88:65:EC:C0:1B Fingerprint (SHA1): ED:05:1F:8F:CD:03:06:7B:A7:53:2A:64:17:DF:EE:7F:DB:9B:6F:A9 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Thu Dec 26 14:16:28 2024 Not After : Wed Dec 26 14:16:28 2029 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:78:2c:d6:9c:e7:f5:69:82:e2:3b:de:5e:e2:d4:c7: a5:33:48:54:78:79:7a:05:b8:40:1c:6b:28:a4:c3:f5: 83:8c:dc:b8:0e:38:68:41:eb:67:c0:3d:26:55:48:d6: 69:2b:1a:f2:48:0f:c1:92:5a:ac:88:42:db:f4:3d:2e: a1:33:6d:9e:92:3d:87:dc:08:8c:0c:97:e1:4c:3e:19: 67:a5:ea:7b:a0:92:b5:65:15:09:b8:6a:02:f5:fd:52: a8 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:92:66:2d:3c:ba:38:17:89:e5:1a: 3b:76:f6:66:12:b2:d2:86:a5:e8:ce:e7:28:f0:d0:af: 4b:2a:96:ba:ed:e1:9d:84:09:c0:c6:f1:a0:3f:1b:4d: 86:94:03:60:7c:0b:fc:93:7f:f8:98:e5:b3:c6:28:15: 52:32:d3:36:d2:fb:48:02:42:00:cf:0d:38:87:b2:ef: fa:cb:a0:21:12:de:e1:a2:b2:78:9b:65:11:b5:17:a6: dc:18:1b:98:58:f9:f2:8c:e5:97:60:80:cf:be:37:bf: 39:1c:25:a0:51:b9:6e:73:d5:a3:2e:a3:3f:d7:4a:87: 11:d3:7e:cc:db:b2:84:ae:8e:bc:92 Fingerprint (SHA-256): 16:DC:09:32:58:15:35:07:25:48:89:6F:F9:20:18:1F:80:AA:95:4C:33:0F:29:13:BC:A8:96:51:0E:DD:CE:10 Fingerprint (SHA1): B9:E4:6B:B8:C8:9A:AD:B3:E9:00:4A:FC:93:7E:AB:17:AC:31:BD:12 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: cd:e9:09:9f:86:36:b6:08:a6:6a:dc:b3:a9:bd:d9:ec Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:df:5e:6d:b4:95:b2:9d:10:f0:0c:16:36:01:51: e6:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Thu Dec 26 14:16:05 2024 Not After : Wed Dec 26 14:16:05 2074 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:9b:6b:13:30:39:52:02:7b:9c:38:7d:2b:77:b8: 7f:b2:12:15:39:a8:de:26:df:7b:d1:2c:10:eb:27:80: ad:8b:da:40:58:8d:84:22:cf:c0:3e:66:b6:9d:6c:6f: 52:c8:d1:5d:6a:7d:f8:a8:6c:97:f3:5b:69:07:39:cb: 13:77:70:00:ce:7a:87:80:8d:f2:7a:72:31:07:91:2d: ca:cc:cc:0f:58:49:eb:49:d8:fa:1a:44:64:0d:4a:f6: 20:f3:59:42:6a:29:20:49:40:23:f1:21:00:52:0a:31: d6:6f:54:22:a4:60:bf:eb:df:4f:79:c8:9a:f4:3c:af: 84:79:5a:40:26 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:4a:28:b2:4f:76:29:f2:76:31:ad: 1f:76:0e:4e:6e:8a:8e:44:95:96:57:86:99:3f:65:de: a4:53:1b:55:e1:50:9a:53:e9:54:0a:0b:90:06:27:81: 4d:46:67:19:7f:7b:76:7d:35:f2:0f:a0:11:82:ef:cf: 53:d4:59:05:41:00:7d:02:42:00:d4:24:be:8a:98:ff: 1c:8a:40:fe:fc:6a:a9:bd:e4:88:b1:2b:ec:cb:bd:42: 6f:ac:19:be:0f:b1:6f:cf:99:d2:d7:72:95:6f:3c:b1: d7:c5:12:03:0c:5d:20:93:8a:a5:7e:8f:e9:3c:b7:51: f2:35:fe:3f:27:97:39:ac:16:b3:95 Fingerprint (SHA-256): 05:34:1F:F5:45:48:FB:2E:2F:A9:F9:5E:C0:1A:09:E6:6E:A4:B4:01:79:F9:6E:44:BB:15:C2:88:65:EC:C0:1B Fingerprint (SHA1): ED:05:1F:8F:CD:03:06:7B:A7:53:2A:64:17:DF:EE:7F:DB:9B:6F:A9 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Thu Dec 26 14:16:28 2024 Not After : Wed Dec 26 14:16:28 2029 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:78:2c:d6:9c:e7:f5:69:82:e2:3b:de:5e:e2:d4:c7: a5:33:48:54:78:79:7a:05:b8:40:1c:6b:28:a4:c3:f5: 83:8c:dc:b8:0e:38:68:41:eb:67:c0:3d:26:55:48:d6: 69:2b:1a:f2:48:0f:c1:92:5a:ac:88:42:db:f4:3d:2e: a1:33:6d:9e:92:3d:87:dc:08:8c:0c:97:e1:4c:3e:19: 67:a5:ea:7b:a0:92:b5:65:15:09:b8:6a:02:f5:fd:52: a8 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:92:66:2d:3c:ba:38:17:89:e5:1a: 3b:76:f6:66:12:b2:d2:86:a5:e8:ce:e7:28:f0:d0:af: 4b:2a:96:ba:ed:e1:9d:84:09:c0:c6:f1:a0:3f:1b:4d: 86:94:03:60:7c:0b:fc:93:7f:f8:98:e5:b3:c6:28:15: 52:32:d3:36:d2:fb:48:02:42:00:cf:0d:38:87:b2:ef: fa:cb:a0:21:12:de:e1:a2:b2:78:9b:65:11:b5:17:a6: dc:18:1b:98:58:f9:f2:8c:e5:97:60:80:cf:be:37:bf: 39:1c:25:a0:51:b9:6e:73:d5:a3:2e:a3:3f:d7:4a:87: 11:d3:7e:cc:db:b2:84:ae:8e:bc:92 Fingerprint (SHA-256): 16:DC:09:32:58:15:35:07:25:48:89:6F:F9:20:18:1F:80:AA:95:4C:33:0F:29:13:BC:A8:96:51:0E:DD:CE:10 Fingerprint (SHA1): B9:E4:6B:B8:C8:9A:AD:B3:E9:00:4A:FC:93:7E:AB:17:AC:31:BD:12 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 64:4f:03:2f:95:89:1c:8c:70:32:ec:26:c4:ae:ad:1e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 2d:f3:a3:dd:8f:37:df:d8:55:0c:a2:4b:67:d0:b0:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e5:1c:cf:31:b2:fc:ec:6c:06:d1:79:92:ab:85:99:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 83:61:c3:05:6d:e2:ae:df:d5:09:6e:89:85:68:b5:be Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c7:22:19:5b:de:71:19:f2:95:a8:81:a6:48:fa:61:f6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:11:23:f0:d0:81:12:6c:3a:3a:13:99:5b:5e:25: a0:ce Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 0b:28:40:9c:38:b0:08:4d:7a:42:79:43:26:f7:97:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: d1:41:e0:3e:3a:36:ec:40:1e:5a:20:6f:10:de:ca:60 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0f:c9:1a:7e:86:3c:9e:27:a0:96:0c:7b:3b:40: f1:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 70:91:9f:1e:cb:58:e8:04:f3:05:25:a2:b5:61:b4:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 7d:fc:cd:41:4e:9d:dc:02:7f:56:fb:f9:72:b1:4f:f9 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: d3:7f:0d:bb:a9:9d:73:a2:70:9c:1c:a3:f1:65:86:66 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 67:20:71:28:04:bc:28:39:9e:28:84:77:d1:6f:c9:71 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 9b:e4:f1:ed:7c:c4:91:77:43:b5:73:6f:29:b1:52:30 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:7b:bf:47:4e:f9:c8:ec:7b:98:cc:13:5c:f7:c2:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 52:e6:a2:50:94:79:c5:57:40:89:ca:4a:cd:77:fd:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 85:71:d4:cb:25:2b:1d:22:35:9a:05:b2:cd:27:cf:42 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ad:1f:9a:13:0a:94:cb:be:31:ee:82:d7:5b:12: 26:2e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 01:33:94:12:a0:db:c1:8c:76:15:80:b4:19:5a:b8:6f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 45:63:0b:27:79:22:0a:4d:20:c2:97:a3:c2:58:9f:64 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:64:1a:35:cf:05:1a:e9:78:27:8b:49:25:7d:a5: 6f:69 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 49:d1:2c:d9:2b:84:19:7f:c1:0c:ad:af:0c:31:d7:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a5:1e:09:fd:e8:e2:a7:9f:77:cf:97:41:af:3c:4e:63 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 5b:b1:b2:d6:e2:e4:a6:6b:07:e9:12:07:f0:d1:c0:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:08:a5:9d:41:78:0d:0c:28:5c:95:25:2f:84:fa:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 96:3c:5a:98:7e:2d:13:b8:7d:7b:70:24:19:d2:58:02 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 92:10:b5:f9:a8:c0:58:99:ad:d2:f5:0d:e8:a1:23:2c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ea:d8:87:01:a4:93:fb:0e:25:f5:94:a6:ec:b6: 55:d3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c3:06:e8:1e:77:e8:13:42:b6:a7:51:6d:cf:39:b1:e9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e4:9f:b3:16:e0:fe:8e:19:32:2c:1d:ce:1c:12:25:2c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:74:01:ff:9a:00:c0:a0:5e:5b:74:51:c4:00:b2: d8:96 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b9:64:ae:67:92:3e:cd:d7:c6:4b:0d:a5:22:49:d6:10 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: da:60:ba:fc:ee:a0:41:bb:f7:20:ce:7e:72:fc:e9:ea Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 28:f1:bd:1c:92:64:99:0f:f6:77:e2:e7:88:7d:87:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d5:e5:03:96:f4:64:04:1d:d1:37:e8:eb:7f:b1:d3:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 76:35:83:f2:23:5c:6a:0b:5b:d3:8b:38:d7:44:34:7d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7e:56:07:ca:5b:94:e1:cd:59:a4:ef:9d:49:0c:89:0d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 5b:fe:40:31:4c:81:c9:da:43:77:01:2a:b5:e1:b3:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 27:dc:82:24:a6:0c:b0:aa:59:ee:b5:c1:95:c8:a2:e1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7d:d6:62:d7:57:84:ae:2b:06:da:1d:b0:0a:c5: b5:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 18:35:62:9d:8c:82:1d:04:e6:8b:f1:b5:7a:63:0e:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ad:25:22:ed:ac:77:b8:52:95:ab:3c:ef:d0:06:84:b1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0e:aa:91:12:41:73:14:86:6e:ae:2d:52:fd:5d: 7f:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 75:98:18:e7:a7:03:9e:1e:2b:1a:e2:a2:95:77:37:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 9a:32:78:c9:23:f4:ae:02:da:c9:9e:cc:45:7a:9d:6b Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 0b:ae:ac:2a:fc:a7:d0:53:21:e7:9a:c7:20:c8:5d:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 86:ea:72:97:fc:f2:9a:1f:ff:e7:1e:45:a2:00:2f:27 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 2b:2c:57:e3:4f:ac:36:94:22:42:ae:0a:d1:aa:21:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0c:2b:60:53:ef:8e:0b:4c:37:16:4e:a4:f1:77:6b:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: c5:43:c9:51:34:e5:ff:f2:78:88:82:54:be:0e:a5:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e6:31:ef:64:33:b6:fe:0c:19:c4:4e:be:fe:32:1b:74 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a9:d3:94:6b:75:a2:29:9f:ef:38:ee:95:35:02: 76:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 27:71:38:12:ee:7a:49:9a:a8:d9:97:b6:71:fc:d2:50 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: aa:02:fa:7e:30:5e:e1:27:1b:6c:20:71:ff:72:84:13 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b9:7c:1c:3b:00:9a:20:ea:01:30:5a:e2:5a:a3: 5c:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 09:c3:17:ca:05:2b:74:7a:40:8d:31:f9:2f:9a:1c:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: a3:57:d0:6b:be:74:82:2d:43:8f:12:bb:d3:2a:5c:8e Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: be:99:da:eb:54:11:ee:2c:ce:89:b1:fa:de:d6:7c:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 17:b8:b3:bd:5f:af:ce:26:c6:50:3e:97:1c:b6:66:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:72:7f:7e:cf:79:5a:5b:a1:bf:ff:25:b8:85:9d:fb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: cc:d0:92:42:f6:8e:5b:2f:8e:df:72:6f:76:18:e8:89 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:56:6c:dd:07:30:ef:d7:97:05:83:70:b4:46:0a: e0:42 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f3:5b:4f:87:b2:1d:c2:55:74:42:18:19:c5:bc:4d:9e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 5a:3d:5e:a2:1b:cb:5f:a4:b8:c3:6d:e8:3f:83:15:2c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:26:06:d0:a8:dc:af:fe:88:8d:28:3f:6e:61:65: 6d:e1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f4:55:49:b4:23:5b:d0:a7:f6:aa:3f:38:7e:41:e6:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:10:eb:07:51:97:37:72:52:3a:bf:34:72:cc:ff:46 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c9:66:f4:7f:9c:9f:26:9c:3b:fa:e5:9a:60:b1:e5:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 83:00:15:fd:57:43:64:34:13:e4:8c:36:e3:9e:33:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5f:08:d6:17:92:b7:93:cb:6a:30:e3:39:dc:f2:97:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:55:25:31:b2:97:87:d2:77:27:11:dd:55:de:ce:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a5:2b:ec:0b:f3:0d:7f:ee:c2:cb:e0:12:f9:b0:1d:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 30:5f:e9:6c:02:be:95:e4:3c:aa:e5:b1:13:c8:9d:01 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:12:60:3e:5f:4d:02:cb:01:66:06:06:50:cc:e7: 3b:7f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 5c:9d:f6:ea:a0:60:41:04:58:bc:db:7c:6b:7e:e1:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 5f:63:30:a0:9f:6a:3e:3d:eb:25:83:28:d3:94:4b:50 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:38:45:44:d2:f0:ae:de:8e:b9:db:40:95:c4:5d: 1c:40 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: cc:22:4a:90:39:91:02:d1:33:32:92:74:69:37:bf:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8f:58:36:bf:f3:ff:40:9d:e6:9c:10:a1:62:a3:08:56 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e0:39:14:8e:6d:c1:a9:64:0e:ba:6b:a8:d0:52:fc:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a6:ba:a5:64:fd:fb:c9:18:14:e5:10:c7:29:b8:e1:00 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 97:c1:25:b7:65:e3:fb:a4:f8:96:cf:28:df:af:d9:2b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 88:bc:02:b5:ee:65:74:9e:cf:10:a7:b4:7f:d3:9c:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 2f:56:1b:f4:c2:cc:2d:11:d1:65:4c:bc:8a:8b:ef:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 13:57:8d:33:07:0a:3c:96:24:85:79:bc:b0:f3:f4:6c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1b:a0:60:aa:53:d6:24:aa:d4:a1:82:05:3d:84: bc:29 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 8b:b9:dc:50:c4:0d:e9:0a:b6:94:18:4b:e9:3a:ff:6b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 5d:49:dd:fd:9f:b8:07:aa:6b:f0:a8:29:de:77:85:4a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:67:c6:ea:af:53:9d:df:8c:87:bf:3d:e2:39:9f: bb:64 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 09:2b:58:85:65:d4:05:12:0b:0b:e2:d9:f5:ec:31:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a7:e1:e7:3e:a2:49:21:4d:2d:65:b2:5d:c7:23:25:e4 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 35:db:11:48:c2:4c:85:3e:1c:22:7f:69:da:be:1d:16 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 39:80:ce:3f:b0:7f:c2:40:0a:bd:b9:35:da:31:50:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e3:fb:43:8e:cf:98:af:26:d5:5c:8c:d2:5a:b0:fc:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:fd:c7:ee:1f:9d:8a:ee:c5:7b:4e:8a:5b:90:b8:1a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 1d:11:d1:88:21:b1:08:65:90:aa:74:8f:60:56:ea:1d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 1b:01:7e:e7:c4:a9:97:85:63:7f:4f:2f:cf:56:ac:e4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:fe:c2:f9:02:ce:5f:3a:35:e8:68:e7:c9:be: 9d:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a0:39:b9:b5:d7:68:e0:58:55:ec:8b:32:da:47:73:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4f:4d:6a:b0:64:8d:5d:33:3c:78:b8:3c:d7:e4:5b:95 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:e8:06:81:a7:c1:53:a0:53:db:2a:9d:e8:e6: 14:42 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 4e:17:fd:24:4d:2c:a2:6d:d8:93:22:a4:7c:8d:1e:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e7:93:2d:ec:86:c4:1a:07:e1:9e:ee:cb:df:37:7f:cd Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 92:7d:c4:7b:fd:86:8e:16:c5:04:f5:cd:12:0a:95:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d8:e7:bc:d8:c7:83:ea:40:1d:59:ad:47:f8:0c:ef:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:ce:b3:8a:ad:d7:8a:01:9a:e8:c2:21:42:65:9f:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dd:e6:7c:99:b8:4c:6b:d8:19:a6:16:ae:43:38:b9:2f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:bf:34:bc:15:06:77:56:af:7c:d0:af:4c:8a:80:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 47:df:1e:c7:7f:ec:ce:3d:d0:9c:b4:87:f6:6b:23:6a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f8:f1:35:fe:42:31:11:c1:be:cd:f3:88:39:cd: ad:f6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:b8:75:ff:ce:4d:0d:55:ad:91:cb:44:f9:e4:8c:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: df:fa:85:69:4b:3c:0e:10:af:4c:d5:04:2b:21:a3:97 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d2:e1:96:bb:f2:5b:e1:09:ab:21:24:88:9e:b2: f3:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 90:0e:1f:d6:eb:a6:13:c8:5b:4e:d0:da:30:fb:fa:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:b3:4f:a3:f1:3a:5c:0d:f9:0a:71:09:f8:c2:16:2a Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a6:38:88:90:07:c6:ea:06:f4:58:0b:c7:90:b3:d7:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c6:b3:33:9e:e4:fc:cb:18:f0:2d:f5:86:86:e9:4e:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ab:af:d3:28:ac:97:e5:f1:b4:47:cc:a7:11:d7:32:eb Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:38:02:08:b0:52:38:4a:7b:53:64:56:85:94:8e: bb:22 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:e3:56:c8:b7:71:03:49:75:8a:eb:3d:a2:77:61:80 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 2c:0a:51:ca:70:95:d5:2a:ad:9b:71:c1:42:83:32:e4 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:2e:69:13:93:83:05:4e:59:96:3a:d7:9f:bd:bc: 01:3d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: a9:c0:d5:ea:75:a0:78:89:ac:1b:19:a0:b1:e8:01:38 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f8:d8:c9:92:e9:c9:aa:95:05:c8:fc:bd:6d:94: 16:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 71:b5:55:36:68:8c:4a:53:a0:e3:64:31:5f:63:c4:40 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:34:14:ca:96:c3:49:ba:76:08:15:d4:94:c0:f8: 48:9c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e4:40:79:ea:6a:d2:7c:e9:2b:fe:71:b0:d4:a6:1e:4b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c9:32:1f:40:c5:ab:8c:a8:c6:4d:7d:d6:0d:6f: fd:82 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4e:c6:f1:51:5e:20:34:13:69:c7:22:94:89:bd:c7:47 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:0d:b1:a7:b3:3a:09:27:8c:3a:b6:d2:58:35:dd: bb:ff Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: db:88:9a:a0:48:2c:4c:bc:f1:6e:29:12:ac:95:ce:c2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:21:1c:ab:c1:ef:a8:1d:d5:d1:1c:2a:1c:a1:88: 2e:6e tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 79:29:67:b1:6e:c0:c5:8b:8d:2e:d1:e2:31:cd:e0:da Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-512 Cipher: AES-128-CBC Args: 04:10:3d:c0:94:ce:d0:c4:08:21:c7:83:8c:f9:b4:e8: bc:25 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7e:3f:0a:56:18:ed:37:ce:22:e5:92:cb:8e:2c:90:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 1c:dd:dc:fb:0b:86:dc:5e:81:81:ef:be:d5:f1:88:5a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:66:83:4a:56:d2:9b:db:44:ba:e5:de:70:0d:01: 25:3d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3c:90:d8:8f:7b:b5:28:53:dc:44:5f:b1:bf:53:aa:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: ba:b4:66:ef:72:24:af:3b:fe:a7:ac:fe:bf:7f:6e:33 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:49:da:5d:94:bf:d0:64:93:18:50:fb:35:51:2a: 2a:a3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 65:8c:2b:e4:66:c3:cc:2e:3d:76:d5:f7:80:8b:e2:ff Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:85:5c:cf:75:1b:85:ae:51:70:bd:f8:5f:34:c6: 04:03 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f7:10:4d:c0:44:d9:6f:a4:d0:f0:30:f5:05:f5:9c:d0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:2c:b2:95:4d:4c:cd:8d:a6:2b:ec:6a:25:22:7c: 86:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f4:48:af:3b:fe:e5:c2:28:26:65:88:bf:0a:72:1f:f9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:41:08:ca:58:5b:f1:4a:c9:22:0d:7d:bd:4d:78: 51:34 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: d8:c6:78:8a:19:88:25:55:2a:00:ef:17:0c:a4:df:23 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:40:d4:ce:5f:dd:3c:8c:94:c3:96:77:f0:3d:db: 55:ba Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 59:6b:34:17:6c:01:44:a3:22:68:b8:0c:ae:fc:65:bf Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:40:78:9e:82:1c:a4:95:34:d4:cf:77:c7:2d:7f: 5f:2f tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: d0:99:ab:ab:67:09:b0:ef:5f:35:9a:99:f7:3c:1e:2f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-512 Cipher: AES-192-CBC Args: 04:10:03:9e:fd:b4:70:24:d7:0c:06:19:20:8c:e3:e8: 12:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fd:da:31:24:3b:82:ca:20:19:9e:c6:1d:da:b1:e0:50 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 99:8e:80:5c:12:44:9a:1a:0c:65:84:ef:2b:54:68:f0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:29:21:17:b1:10:0c:2b:b8:d3:88:00:a2:4f:3b: 03:0c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e6:17:ba:4b:db:4f:6b:86:95:3f:34:5a:5c:9b:36:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 2c:b2:a8:29:bd:b7:58:85:b1:15:8c:a2:a1:f8:d2:57 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:af:20:70:a4:9c:12:4d:7d:0d:c0:39:00:e2:46: b5:70 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 26:07:e2:42:8a:3b:de:68:6b:74:c0:2d:6d:ae:0c:5f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2b:48:4f:95:62:51:0a:d5:bb:80:b7:3a:fc:e5: cc:e0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f8:ca:f3:56:1a:ed:fe:97:42:bc:3b:1b:4a:2d:f8:04 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:0e:94:a2:df:9e:25:b6:5e:6f:40:36:b9:e7:b8: 68:8f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: dd:69:e8:98:2f:03:d2:ab:4b:3e:f3:bc:ba:ce:f9:ba Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:bd:5a:8d:a4:0a:65:f6:2f:82:6a:15:fe:f6:28: 9e:af tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: dd:1c:b2:cd:1c:96:98:0a:34:c4:8b:5f:3e:e6:02:f4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:03:ab:f7:1d:1b:06:9b:a2:65:a4:f0:2b:f1:e9: 34:f4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3e:ed:d3:06:cc:81:ab:de:ef:a0:fc:c2:bb:80:99:71 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 7b:e6:c8:2f:27:b0:fb:bd:2a:c9:9c:b4:fc:52:ba:7f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:ea:cb:49:01:c9:80:41:0b:31:98:79:2b:8d:2b: 7c:56 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:86:4b:6c:5c:0f:e7:11:2e:6e:d9:49:69:9a:8d:20 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: b3:43:e2:0d:71:9f:ea:ed:39:11:a8:cc:82:35:1a:6a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:5a:20:d6:d1:d3:cd:72:9f:84:f5:e9:83:eb:ff: e6:00 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: cb:7a:dd:80:df:79:76:71:15:fc:d3:d5:8c:88:1d:d9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:9a:7a:45:ac:c7:b3:63:55:95:f9:18:74:d6:4e: 3b:e9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: d9:80:5d:44:38:f8:26:55:09:e2:a3:b7:48:5c:61:71 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:58:30:1c:76:93:13:2e:64:95:69:ae:00:8a:5e: d0:d0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 77:a9:d0:36:eb:a9:e1:b5:62:7d:f8:03:1f:13:a2:6a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b5:4f:69:8a:d7:2c:84:bc:db:31:c9:26:48:f2: 81:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: c8:e9:92:4c:d2:8b:06:42:9e:8f:1b:3e:f2:26:ff:aa Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:53:f5:d1:e6:68:5d:a0:a3:e6:6e:07:b9:05:ab: 4a:1a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 96:11:e3:49:c2:7d:12:0a:b6:42:4d:92:a1:f0:5d:1c Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:1d:cb:07:81:e8:ca:13:78:25:46:dc:2b:61:f6: f0:b9 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 39:f3:06:2b:c4:5b:ba:5c:df:61:f3:5a:61:32:9a:12 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-128-CBC Args: 04:10:bd:86:a3:4a:3c:a4:36:81:32:9e:41:a9:06:6e: d2:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 22:0d:b1:a1:08:bd:46:85:91:94:a4:4e:ba:5f:87:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: fb:e4:e1:61:aa:7d:17:cf:aa:fe:cb:04:41:58:64:6c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:7a:3c:0a:d2:34:19:27:35:06:be:07:be:a9:0c: c2:09 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 42:0e:b4:aa:95:5e:0b:a4:94:eb:1b:db:de:8b:37:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 03:27:7e:00:85:ef:b7:eb:30:43:76:22:6a:8c:49:22 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:d6:dd:f8:03:c7:3e:13:ba:ee:30:3b:59:eb:a7: b5:40 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 12:ed:44:f5:6d:79:eb:e6:0c:da:f2:16:6d:88:78:81 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3e:1d:37:1a:55:9f:eb:37:ff:86:15:58:6e:c9: 64:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 2c:6a:51:20:1b:ce:3e:24:27:c2:85:e4:50:f0:be:17 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:ad:b2:9b:6e:72:00:90:54:09:6b:0a:c9:a9:91: de:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 06:1d:a5:2c:55:a1:d7:b0:55:39:12:ac:3a:b7:d2:61 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b0:37:cb:e6:f4:fd:29:76:0f:08:c4:4e:b4:07: e2:9a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 7b:d9:37:3a:5a:5f:4c:13:aa:47:eb:78:4e:2f:87:81 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:7c:a0:d8:7e:31:49:77:2b:4d:a6:f3:8b:41:b8: 5e:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 22:b6:9a:61:8b:b6:f8:22:d8:af:d9:71:12:be:b3:3a Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:53:d9:ae:e7:62:63:b5:63:ca:ed:11:ae:13:2c: 19:17 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 99:e2:8d:2f:03:0a:59:77:66:e8:03:a7:97:de:75:f6 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-192-CBC Args: 04:10:71:ef:1f:2e:6f:c6:72:3a:2e:dd:be:50:44:de: 42:67 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f4:b4:8e:02:24:fa:74:41:df:1c:2b:a6:91:e8:1c:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 69:75:b8:de:ca:2e:a3:da:0d:c3:9e:1a:c3:ee:22:ae Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:77:a0:95:6b:48:b5:0a:07:4c:89:27:9b:41:5a: 60:55 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d3:83:6e:9c:ec:e3:15:5c:2a:3c:40:90:d8:34:9e:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: db:1e:9a:ef:78:cc:67:c6:70:03:55:bb:cc:75:15:c3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:e5:07:78:dc:9c:97:5b:c4:4e:88:bd:41:8e:ff: 08:32 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: de:3a:1d:7e:4c:e1:61:6f:9c:64:06:0b:43:d3:f4:b4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cd:e5:28:b1:05:07:2b:16:70:61:52:9b:86:4f: e2:bb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 6e:c1:b7:26:ef:55:17:c0:a7:c9:1b:dd:79:00:16:50 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:f3:1a:92:9c:9f:20:e7:09:a3:ff:58:05:0d:8a: 76:50 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 50:a7:bd:21:0c:88:0e:90:97:af:ad:ea:1f:60:1a:1a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d6:78:69:ae:99:bf:02:6c:b0:35:b1:49:1d:86: da:cf Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 89:ad:f8:49:27:69:1a:bd:93:fb:bb:55:f2:e4:33:43 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:39:f8:ea:ed:a3:1e:a5:cb:8e:3f:d9:dc:f4:54: 6f:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 23:52:68:98:63:79:c4:2a:34:cf:85:5a:ad:25:f6:04 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:f1:c4:76:55:0a:88:49:b2:27:e3:81:8a:d7:26: a8:e3 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "HMAC SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:HMAC SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:HMAC SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: f8:fe:13:a5:8a:29:0b:68:74:34:80:d5:0a:6a:b9:83 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: CAMELLIA-256-CBC Args: 04:10:d3:ee:76:f6:70:91:3f:ba:e9:c7:75:fa:2b:34: c9:17 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fc:ce:a2:24:f5:f1:1f:0b:9e:7a:8a:a3:f0:bd:32:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 99:26:a8:f0:fc:98:29:fb:37:ba:b0:89:61:39:e4:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1e:43:30:8d:22:a2:99:b3:83:15:36:20:f5:40:50:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7b:fc:89:76:ea:a4:4b:bb:99:d9:67:a1:83:8d:71:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 06:22:c9:f8:9b:99:f7:e0:66:91:5c:9b:ba:4d:48:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 72:6b:24:28:55:f1:0a:ee:09:0d:75:5c:b8:d6:ac:a6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 75:51:4d:29:67:8e:76:87:03:07:eb:b7:0a:c3:55:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:7f:3f:b9:98:09:af:b4:c7:1f:41:f3:e6:da:d4:fe Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6c:12:81:59:4d:9f:9d:f9:f5:8e:ef:a9:fa:62:f4:39 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 00:6d:e5:cd:08:af:4d:85:c8:02:b5:4e:9c:c7:96:8c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 70:8d:8c:ca:f5:af:c2:ee:42:cf:01:96:6c:90:4c:b9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:43:e7:34:b5:4e:a1:79:42:8e:e3:77:eb:ad:34: 51:4a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 37:4d:91:cc:bb:e3:a2:55:0e:9c:5a:0e:fe:a1:30:3e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:20:d9:41:3d:e9:15:cd:a9:ac:87:9a:6f:05:6a: 6b:93 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 76:5c:ca:e9:31:fc:6e:ef:39:93:9c:7c:09:54:83:89 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:6e:0d:cf:58:05:96:ef:68:64:3d:f6:ef:52:73: e0:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 87:09:8f:35:fc:29:b6:ec:4a:75:dd:a9:8c:e3:dd:24 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:74:5b:6e:e8:5e:c4:80:30:e9:95:b6:9e:8a:6e: d5:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: e8:bb:12:04:32:fe:ef:3a:dd:24:e4:9c:af:11:90:e3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:c2:3d:93:b4:11:a4:63:8a:7d:68:71:07:f0:72: d5:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 28:5a:3c:a4:3d:a7:1e:cb:ca:8a:c1:1e:34:00:7f:37 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:04:8b:73:2c:6d:b7:e3:1b:2f:e8:a1:01:45:c2: 4c:b6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 4e:af:1e:73:6f:a2:ad:ad:ae:8e:6a:fe:79:c7:3b:32 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:05:46:94:8d:9b:28:64:04:e6:13:76:73:38:79: 50:3b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 6b:5f:7f:26:eb:62:89:ef:31:7a:dd:c0:4f:06:47:4f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:aa:b8:3a:7a:59:55:f0:a2:e3:04:eb:44:4a:b3: 5f:4d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "HMAC SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:HMAC SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:HMAC SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 56:73:40:12:72:00:8d:34:2d:dd:ea:bd:6d:95:11:e8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:f0:21:d6:65:33:a1:7b:aa:57:99:87:8c:32:90: 18:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Derive Function v2 Parameters: Salt: 54:d8:8b:c6:74:31:d8:35:21:00:c3:be:2a:5f:2a:2b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:ef:02:48:8e:23:22:ac:b7:e6:d4:9d:4f:02:91: 90:35 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:15:58 2024 Not After : Wed Dec 26 14:15:58 2074 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:a0:67:72:72:5a:0b:da:5e:d7:9e:a9:8a:5b:54:76: a1:5f:3f:23:2a:9c:fa:d0:0e:2d:3f:03:07:d1:a7:54: 74:bc:66:56:00:42:37:67:54:80:09:7c:a1:f7:e9:3a: a8:72:72:a0:5a:6e:d2:e5:d0:7e:e1:e3:48:4e:23:e2: 12:08:73:5f:7f:f8:d5:2a:b4:b6:11:71:4d:d1:38:ef: c8:8e:d1:ca:9a:72:76:5d:99:7e:e3:03:1b:ad:50:fc: 47:25:f4:cb:b7:a2:f4:5d:23:f0:15:8e:ad:5e:d4:fb: 51:c0:71:50:3f:81:e9:59:2e:c2:aa:df:72:c9:da:75: a5:c2:73:e3:70:9b:a7:70:26:44:49:06:14:e1:31:1b: 3c:c1:c2:c4:22:5e:9e:17:aa:84:c2:d5:29:b0:19:5d: 6a:66:b8:f0:5e:a1:4b:52:c0:c2:47:4f:32:f0:79:a3: e8:ba:de:39:71:4a:d9:60:f7:df:10:f3:58:a8:18:f2: 17:87:48:6f:e2:db:5d:e5:c5:f3:63:45:6e:c4:d1:4d: bb:a5:26:c0:6f:89:31:b5:35:da:27:f0:1c:c6:6b:bd: df:58:8a:ce:df:47:3d:5f:cd:40:61:04:44:e5:90:3f: 5d:cc:bf:35:4b:6c:46:ef:92:48:48:5a:f2:2a:69:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:f0:a9:5c:be:15:1b:7d:34:3b:da:1b:9d:14:33:16: ed:72:02:a2:7a:8a:29:6c:0d:6d:7c:37:38:76:d9:81: ee:4c:c9:8e:03:6a:1a:ab:9d:0c:8d:8a:8a:8d:ab:fd: a8:80:1c:6e:43:d5:3a:18:3c:0f:1b:52:12:06:d2:23: 5b:ba:ba:3c:c8:c9:7e:77:46:b0:f0:d5:6f:2e:44:8a: 54:b0:11:02:f8:f2:b0:a7:b3:ec:79:da:de:47:a7:a8: 35:12:d2:5b:19:f4:5d:d5:fe:13:26:33:96:0d:c2:de: a9:99:b8:9c:a6:fc:d7:11:b8:e1:27:53:e5:55:fa:78: 19:55:fd:f0:be:25:0d:75:c1:76:a4:10:4f:12:be:c2: 71:d7:37:e1:d2:bc:33:8d:e4:fe:7b:8a:f6:6f:a7:41: c5:b8:0a:3f:27:7b:93:71:11:3f:9d:49:2f:87:f0:0e: 98:64:4d:af:ef:17:72:20:9b:77:3d:e3:87:a7:72:5e: 44:ca:7c:16:5d:37:0d:23:2d:66:4c:20:c6:7a:62:3f: 1d:38:7f:7b:6a:95:03:b8:51:52:6e:e6:16:de:f4:1a: 16:83:a9:93:1b:ea:5a:55:73:c7:b7:57:68:ad:42:a7: 38:bb:f6:a6:85:c6:5c:be:22:bd:97:65:38:da:53:34 Fingerprint (SHA-256): CE:A8:E6:46:7D:34:A3:0B:9A:24:9E:58:5B:C3:DC:24:D1:83:F2:A4:52:CC:02:A5:C1:1E:62:2E:78:88:D1:B4 Fingerprint (SHA1): 09:33:7F:A7:82:22:53:EC:41:2A:3D:57:A2:62:9F:CA:53:BA:2D:DE Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:16:27 2024 Not After : Wed Dec 26 14:16:27 2029 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:25:a4:09:b3:f5:3e:fa:5e:c9:c8:d7:18:17:3a:56: 52:df:73:d5:4e:dd:ee:96:f9:21:84:e7:b0:dd:82:be: 3c:2c:46:55:b3:78:0c:6f:d8:f5:fe:0d:9f:dd:3c:ef: ec:50:04:e0:c0:50:3b:05:6d:1a:f4:0e:76:d3:29:04: db:16:15:e5:a5:7f:fd:1f:da:ed:a3:ab:06:a5:e5:ab: 90:c3:e7:a0:43:0a:e3:e2:6e:7f:ad:a2:a3:6d:ac:ba: 86:34:09:5f:2e:4d:a6:ba:34:84:56:41:81:74:57:1c: 80:95:02:77:ba:c4:70:2d:d4:1b:55:9a:eb:39:2c:4a: 0d:2a:1f:fc:38:66:ef:08:0f:03:c4:4b:a6:0a:77:5d: ac:3b:07:34:61:f5:54:1a:a4:50:04:e1:64:c7:a1:09: fa:a5:9e:89:aa:c2:6c:c7:17:c4:4a:79:d0:54:6d:c0: 32:26:4c:55:79:59:55:9d:88:cb:a5:60:5e:3c:c8:96: ea:8f:e3:06:be:1d:eb:b2:d6:97:7c:57:59:b0:a3:d6: 00:82:f3:dd:c0:59:64:9d:59:67:25:a4:f2:09:b3:85: 42:fb:1d:39:ee:c1:af:6e:f9:ef:79:ce:ca:48:ed:2a: 22:5f:37:ee:58:f7:0d:31:1b:7d:c5:ad:d2:75:9f:2f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:e1:f0:08:2b:a7:92:e5:5c:89:70:97:e8:ef:f9:fd: d9:b8:12:1a:d3:19:f4:3d:2d:83:d9:bf:94:40:8c:37: d4:2f:ec:b9:01:0d:8b:b1:35:ca:e5:f2:f3:22:00:60: 4f:fb:67:bd:d4:4e:b3:d1:31:e2:51:22:01:91:c6:5e: 8f:cc:7b:c3:6f:10:36:5f:f2:26:13:41:41:11:f9:e7: 9f:23:97:f7:98:07:44:5c:ef:f0:4e:df:ef:e3:02:cc: 4f:ff:43:84:ca:53:f7:34:69:c0:17:5e:9a:68:38:dc: 8d:7b:49:dd:9c:84:f9:87:9c:f6:6f:88:c3:64:ad:a2: ae:d8:6c:c6:e1:2e:fd:2d:81:a4:ae:0e:cb:6d:b6:2a: cf:cd:0f:21:5c:fd:5e:65:46:78:8f:5a:75:17:fd:b5: d1:4b:1f:6e:7c:b3:99:04:13:0d:5b:b9:6d:32:9a:ca: e2:17:1d:fd:a0:07:b9:ed:3d:46:e0:76:04:75:cf:f8: 0c:a6:17:1f:de:f6:b6:c0:e6:3e:36:13:03:46:50:87: 70:51:32:3c:09:0d:0a:cf:fc:75:2f:b0:e6:93:23:d3: af:94:9a:a5:2a:4e:9d:6c:c8:fa:80:4c:d5:9d:96:f0: 0c:d4:47:ab:be:f3:ce:72:7f:5e:02:f1:b0:82:49:8e Fingerprint (SHA-256): 0A:73:5B:09:6F:68:1E:97:C7:40:9B:45:F9:30:88:F3:BC:EE:FA:AB:FC:4E:F6:AB:3E:58:0D:9A:93:83:90:2A Fingerprint (SHA1): C2:EB:68:32:12:CA:C1:03:B6:55:EC:85:1D:E9:8D:1A:06:39:B7:81 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file to ../tools/copydir certutil -F -d ../tools/copydir -n Alice -f ../tests.pw pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #709: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #710: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util tools.sh: #711: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #712: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #713: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #714: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #715: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED pk12util -i PKCS5WithImplicitKDF.p12 -d ../tools/copydir -k ../tests.pw -W pasword pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing PKCS#12 file with and implicit KDF value - PASSED tools.sh: Importing private key pbmac1 PKCS#12 file -------------- /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tools/data/pbmac1-valid-sha256.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: no nickname for cert in PKCS12 file. pk12util: using nickname: tt - ee pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #717: Importing private key pbmac1 hmac-sha-256 from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tools/data/pbmac1-valid-sha256-sha512.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #718: Importing private key pbmac1 hmac-sha-256 and hmac-sha-512 prf from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tools/data/pbmac1-valid-sha512.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #719: Importing private key pbmac1 hmac-sha-512 from PKCS#12 file - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tools/data/pbmac1-invalid-bad-iter.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. tools.sh: #720: Fail to list private key with bad iterator - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tools/data/pbmac1-invalid-bad-salt.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. Fail to list private key with bad salt val=19 tools.sh: #721: Fail to import private key with bad salt - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -l /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tools/data/pbmac1-invalid-no-length.p12 -d ../tools/copydir -k ../tests.pw -W '1234' pk12util: PKCS12 decode not verified: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. pk12util: PKCS12 decode iterate bags failed: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. Fail to import private key with no length val=19 tools.sh: #722: Fail to import private key with no length - PASSED tools.sh: Importing RSA-PSS private key from PKCS#12 file -------------- pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #723: Importing RSA-PSS private key from PKCS#12 file - PASSED < 6> rsaPss 26c20b122640e4628a5f4f451bba1be46766fe5b server tools.sh: #724: Listing RSA-PSS private key imported from PKCS#12 file - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #725: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 33%) tree "../tools/html" signed successfully tools.sh: #726: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #727: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #728: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 30%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #729: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #730: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #731: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #732: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Thu Dec 26 14:34:31 UTC 2024 Running tests for fips TIMESTAMP fips BEGIN: Thu Dec 26 14:34:31 UTC 2024 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.101 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.68 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa de32cac785368b446dc62aec601f76c34094e4af NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa de32cac785368b446dc62aec601f76c34094e4af FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa de32cac785368b446dc62aec601f76c34094e4af FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcpputil.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl3.chk /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreebl3.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreeblpriv3.chk /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libfreeblpriv3.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtest.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libgtestutil.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnspr4.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssutil.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssutil3.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs11testmodule.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libplc4.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libplds4.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn3.chk /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libsoftokn3.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x0018a720 (1615648): from 01 (1) to 21 (33) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED Copying CAVS vectors Copying CAVS scripts cd /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/cavs/scripts Running CAVS tests in /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/cavs/tests ********************Running aesgcm tests gcmDecrypt128.req gcmDecrypt128.rsp gcmDecrypt192.req gcmDecrypt192.rsp gcmDecrypt256.req gcmDecrypt256.rsp gcmEncryptExtIV128.req gcmEncryptExtIV128.rsp gcmEncryptExtIV192.req gcmEncryptExtIV192.rsp gcmEncryptExtIV256.req gcmEncryptExtIV256.rsp ********************Running ecdsa tests KeyPair.req KeyPair.rsp PKV.req PKV.rsp SigGen.req SigGen.rsp SigVer.req SigVer.rsp ********************Running hmac tests HMAC.req HMAC.rsp ********************Running kas tests KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init.req KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init.rsp KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.req KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.rsp KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init.req KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init.rsp KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.req KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp.rsp KASFunctionTest_FFCEphem_NOKC_ZZOnly_init.req KASFunctionTest_FFCEphem_NOKC_ZZOnly_init.rsp KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp.req KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp.rsp KASValidityTest_FFCEphem_NOKC_ZZOnly_init.req KASValidityTest_FFCEphem_NOKC_ZZOnly_init.rsp KASValidityTest_FFCEphem_NOKC_ZZOnly_resp.req KASValidityTest_FFCEphem_NOKC_ZZOnly_resp.rsp ********************Running tls tests tls.req tls.rsp ********************Running ike tests ikev1_dsa.req ikev1_dsa.rsp ikev1_psk.req ikev1_psk.rsp ikev2.req ikev2.rsp ********************Running rng tests Hash_DRBG.req Hash_DRBG.rsp ********************Running sha tests SHA1ShortMsg.req SHA1ShortMsg.rsp SHA224ShortMsg.req SHA224ShortMsg.rsp SHA256ShortMsg.req SHA256ShortMsg.rsp SHA384ShortMsg.req SHA384ShortMsg.rsp SHA512ShortMsg.req SHA512ShortMsg.rsp SHA1LongMsg.req SHA1LongMsg.rsp SHA224LongMsg.req SHA224LongMsg.rsp SHA256LongMsg.req SHA256LongMsg.rsp SHA384LongMsg.req SHA384LongMsg.rsp SHA512LongMsg.req SHA512LongMsg.rsp SHA1Monte.req SHA1Monte.rsp SHA224Monte.req SHA224Monte.rsp SHA256Monte.req SHA256Monte.rsp SHA384Monte.req SHA384Monte.rsp SHA512Monte.req SHA512Monte.rsp Verifying CAVS results in /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/cavs/tests ********************Running aesgcm tests >>>>> gcmDecrypt128 >>>>> gcmDecrypt192 >>>>> gcmDecrypt256 >>>>> gcmEncryptExtIV128 >>>>> gcmEncryptExtIV192 >>>>> gcmEncryptExtIV256 ********************Running ecdsa tests >>>>> KeyPair >>>>> PKV >>>>> SigGen >>>>> SigVer ********************Running hmac tests >>>>> HMAC ********************Running kas tests >>>>> KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_init >>>>> KASFunctionTest_ECCEphemeralUnified_NOKC_ZZOnly_resp >>>>> KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_init >>>>> KASValidityTest_ECCEphemeralUnified_NOKC_ZZOnly_resp >>>>> KASFunctionTest_FFCEphem_NOKC_ZZOnly_init >>>>> KASFunctionTest_FFCEphem_NOKC_ZZOnly_resp >>>>> KASValidityTest_FFCEphem_NOKC_ZZOnly_init >>>>> KASValidityTest_FFCEphem_NOKC_ZZOnly_resp ********************Running tls tests >>>>> tls ********************Running ike tests >>>>> ikev1_dsa >>>>> ikev1_psk >>>>> ikev2 ********************Running rng tests >>>>> Hash_DRBG ********************Running sha tests >>>>> SHA1ShortMsg >>>>> SHA224ShortMsg >>>>> SHA256ShortMsg >>>>> SHA384ShortMsg >>>>> SHA512ShortMsg >>>>> SHA1LongMsg >>>>> SHA224LongMsg >>>>> SHA256LongMsg >>>>> SHA384LongMsg >>>>> SHA512LongMsg >>>>> SHA1Monte >>>>> SHA224Monte >>>>> SHA256Monte >>>>> SHA384Monte >>>>> SHA512Monte fips.sh: #23: NIST CAVS test /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/fips/cavs/tests - PASSED fips.sh done TIMESTAMP fips END: Thu Dec 26 14:35:04 UTC 2024 Running tests for sdr TIMESTAMP sdr BEGIN: Thu Dec 26 14:35:04 UTC 2024 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v1.15633 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v2.15633 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v3.15633 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v1.15633 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v2.15633 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v3.15633 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/SDR/combined.15633 -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/SDR/decoded.15633 -l /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/SDR/log.15633 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/SDR/decoded.15633 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/SDR/log.15633 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.13 user 0.10 sys 0.02 0 seconds sdr.sh: #9: pwdecrypt no time regression - PASSED TIMESTAMP sdr END: Thu Dec 26 14:35:05 UTC 2024 Running tests for crmf TIMESTAMP crmf BEGIN: Thu Dec 26 14:35:05 UTC 2024 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Thu Dec 26 14:35:05 UTC 2024 Running tests for smime TIMESTAMP smime BEGIN: Thu Dec 26 14:35:05 UTC 2024 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -G -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -G -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -G -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -G -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -G -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -G -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -G -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -G -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -G -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -G -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -G -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -G -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -G -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Enveloped Data Tests (ECDH) ------------------------------ cmsutil -E -r bob-ec@example.com -i alice.txt -d ../alicedir -p nss \ -o alice-ec.env smime.sh: #44: Create Enveloped Data with Alice (ECDH) . - PASSED cmsutil -D -i alice-ec.env -d ../bobdir -p nss -o alice.data1 smime.sh: #45: Decode Enveloped Data Alice (ECDH) . - PASSED diff alice.txt alice-ec.data1 smime.sh: #46: Compare Decoded Enveloped Data and Original (ECDH) . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #47: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #48: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #49: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #50: Decode Multiple Recipients Enveloped Data Alice by Dave (ECDH) . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #51: Decrypt with a Multiple Email cert . - PASSED smime.sh: #52: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #53: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #54: Compare Decoded with Multiple Email cert . - PASSED smime.sh: OpenSSL interoperability -------------------------------- pk12util: PKCS12 IMPORT SUCCESSFUL pk12util: PKCS12 IMPORT SUCCESSFUL cmsutil -D -i fran-oaep_ossl.env -d ../alicedir -p nss -o fran-oaep.data1 smime.sh: #55: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #56: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256hash_ossl.env -d ../alicedir -p nss -o fran-oaep.data2 smime.sh: #57: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #58: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha384hash_ossl.env -d ../alicedir -p nss -o fran-oaep.data3 smime.sh: #59: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #60: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha512hash_ossl.env -d ../alicedir -p nss -o fran-oaep.data4 smime.sh: #61: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #62: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data5 smime.sh: #63: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #64: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha384mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data6 smime.sh: #65: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #66: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha512mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data7 smime.sh: #67: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #68: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-label_ossl.env -d ../alicedir -p nss -o fran-oaep.data8 smime.sh: #69: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #70: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256hash-sha256mgf_ossl.env -d ../alicedir -p nss -o fran-oaep.data9 smime.sh: #71: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #72: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256hash-label_ossl.env -d ../alicedir -p nss -o fran-oaep.data10 smime.sh: #73: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #74: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep-sha256mgf-label_ossl.env -d ../alicedir -p nss -o fran-oaep.data11 smime.sh: #75: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #76: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-oaep_ossl-sha256hash-sha256mgf-label.env -d ../alicedir -p nss -o fran-oaep.data12 smime.sh: #77: Decode OpenSSL OAEP Enveloped Data Fran . - PASSED smime.sh: #78: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes128-sha1.env -d ../alicedir -p nss -o fran.data1 smime.sh: #79: Decode OpenSSL Enveloped Data Fran (ECDH, AES128 key wrap, SHA-1 KDF) . - PASSED smime.sh: #80: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes128-sha224.env -d ../alicedir -p nss -o fran.data2 smime.sh: #81: Decode OpenSSL Enveloped Data Fran (ECDH, AES128 key wrap, SHA-224 KDF) . - PASSED smime.sh: #82: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes128-sha256.env -d ../alicedir -p nss -o fran.data3 smime.sh: #83: Decode OpenSSL Enveloped Data Fran (ECDH, AES128 key wrap, SHA-256 KDF) . - PASSED smime.sh: #84: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes192-sha384.env -d ../alicedir -p nss -o fran.data4 smime.sh: #85: Decode OpenSSL Enveloped Data Fran (ECDH, AES192 key wrap, SHA-384 KDF) . - PASSED smime.sh: #86: Compare Decoded with OpenSSL enveloped . - PASSED cmsutil -D -i fran-ec_ossl-aes256-sha512.env -d ../alicedir -p nss -o fran.data5 smime.sh: #87: Decode OpenSSL Enveloped Data Fran (ECDH, AES256 key wrap, SHA-512 KDF) . - PASSED smime.sh: #88: Compare Decoded with OpenSSL enveloped . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #89: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #90: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #91: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #92: Decode Encrypted-Data . - PASSED smime.sh: #93: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #94: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #95: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #96: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #97: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #98: Verifying file delivered to user Alice . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 0 smime.sh: #99: Signing file for user Alice -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #100: Verifying file delivered to user Alice -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 1 smime.sh: #101: Signing file for user Alice -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #102: Verifying file delivered to user Alice -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #103: Signing file for user Alice -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #104: Signing file for user Alice -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 4 smime.sh: #105: Signing file for user Alice -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #106: Verifying file delivered to user Alice -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 5 smime.sh: #107: Signing file for user Alice -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #108: Verifying file delivered to user Alice -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #109: Signing file for user Alice -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 8 smime.sh: #110: Signing file for user Alice -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #111: Verifying file delivered to user Alice -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #112: Signing file for user Alice -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 11 smime.sh: #113: Signing file for user Alice -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #114: Verifying file delivered to user Alice -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -u 12 smime.sh: #115: Signing file for user Alice -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #116: Verifying file delivered to user Alice -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 smime.sh: #117: Signing file for user Alice -a sha-1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #118: Verifying file delivered to user Alice -a sha-1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 0 smime.sh: #119: Signing file for user Alice -a sha-1 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #120: Verifying file delivered to user Alice -a sha-1 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 1 smime.sh: #121: Signing file for user Alice -a sha-1 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #122: Verifying file delivered to user Alice -a sha-1 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #123: Signing file for user Alice -a sha-1 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #124: Signing file for user Alice -a sha-1 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 4 smime.sh: #125: Signing file for user Alice -a sha-1 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #126: Verifying file delivered to user Alice -a sha-1 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 5 smime.sh: #127: Signing file for user Alice -a sha-1 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #128: Verifying file delivered to user Alice -a sha-1 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #129: Signing file for user Alice -a sha-1 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 8 smime.sh: #130: Signing file for user Alice -a sha-1 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #131: Verifying file delivered to user Alice -a sha-1 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #132: Signing file for user Alice -a sha-1 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 11 smime.sh: #133: Signing file for user Alice -a sha-1 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #134: Verifying file delivered to user Alice -a sha-1 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-1 -u 12 smime.sh: #135: Signing file for user Alice -a sha-1 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #136: Verifying file delivered to user Alice -a sha-1 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 smime.sh: #137: Signing file for user Alice -a sha-256 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #138: Verifying file delivered to user Alice -a sha-256 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 0 smime.sh: #139: Signing file for user Alice -a sha-256 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #140: Verifying file delivered to user Alice -a sha-256 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 1 smime.sh: #141: Signing file for user Alice -a sha-256 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #142: Verifying file delivered to user Alice -a sha-256 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #143: Signing file for user Alice -a sha-256 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #144: Signing file for user Alice -a sha-256 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 4 smime.sh: #145: Signing file for user Alice -a sha-256 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #146: Verifying file delivered to user Alice -a sha-256 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 5 smime.sh: #147: Signing file for user Alice -a sha-256 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #148: Verifying file delivered to user Alice -a sha-256 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #149: Signing file for user Alice -a sha-256 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 8 smime.sh: #150: Signing file for user Alice -a sha-256 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #151: Verifying file delivered to user Alice -a sha-256 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #152: Signing file for user Alice -a sha-256 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 11 smime.sh: #153: Signing file for user Alice -a sha-256 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #154: Verifying file delivered to user Alice -a sha-256 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-256 -u 12 smime.sh: #155: Signing file for user Alice -a sha-256 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #156: Verifying file delivered to user Alice -a sha-256 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 smime.sh: #157: Signing file for user Alice -a sha-384 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #158: Verifying file delivered to user Alice -a sha-384 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 0 smime.sh: #159: Signing file for user Alice -a sha-384 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #160: Verifying file delivered to user Alice -a sha-384 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 1 smime.sh: #161: Signing file for user Alice -a sha-384 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #162: Verifying file delivered to user Alice -a sha-384 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #163: Signing file for user Alice -a sha-384 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #164: Signing file for user Alice -a sha-384 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 4 smime.sh: #165: Signing file for user Alice -a sha-384 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #166: Verifying file delivered to user Alice -a sha-384 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 5 smime.sh: #167: Signing file for user Alice -a sha-384 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #168: Verifying file delivered to user Alice -a sha-384 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #169: Signing file for user Alice -a sha-384 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 8 smime.sh: #170: Signing file for user Alice -a sha-384 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #171: Verifying file delivered to user Alice -a sha-384 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #172: Signing file for user Alice -a sha-384 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 11 smime.sh: #173: Signing file for user Alice -a sha-384 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #174: Verifying file delivered to user Alice -a sha-384 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a sha-384 -u 12 smime.sh: #175: Signing file for user Alice -a sha-384 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #176: Verifying file delivered to user Alice -a sha-384 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 smime.sh: #177: Signing file for user Alice -a SHA-512 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #178: Verifying file delivered to user Alice -a SHA-512 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 0 smime.sh: #179: Signing file for user Alice -a SHA-512 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #180: Verifying file delivered to user Alice -a SHA-512 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 1 smime.sh: #181: Signing file for user Alice -a SHA-512 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #182: Verifying file delivered to user Alice -a SHA-512 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #183: Signing file for user Alice -a SHA-512 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #184: Signing file for user Alice -a SHA-512 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 4 smime.sh: #185: Signing file for user Alice -a SHA-512 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #186: Verifying file delivered to user Alice -a SHA-512 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 5 smime.sh: #187: Signing file for user Alice -a SHA-512 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #188: Verifying file delivered to user Alice -a SHA-512 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #189: Signing file for user Alice -a SHA-512 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 8 smime.sh: #190: Signing file for user Alice -a SHA-512 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #191: Verifying file delivered to user Alice -a SHA-512 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #192: Signing file for user Alice -a SHA-512 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 11 smime.sh: #193: Signing file for user Alice -a SHA-512 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #194: Verifying file delivered to user Alice -a SHA-512 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-512 -u 12 smime.sh: #195: Signing file for user Alice -a SHA-512 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is invalid (Reason: Signature verification failed: no signer found, too many signers found, or improper or corrupted data.). smime.sh: #196: Verifying file delivered to user Alice -a SHA-512 -u 12 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 smime.sh: #197: Signing file for user Alice -a SHA-224 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #198: Verifying file delivered to user Alice -a SHA-224 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 0 smime.sh: #199: Signing file for user Alice -a SHA-224 -u 0 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 0 Signature is valid. smime.sh: #200: Verifying file delivered to user Alice -a SHA-224 -u 0 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 1 smime.sh: #201: Signing file for user Alice -a SHA-224 -u 1 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 1 Signature is valid. smime.sh: #202: Verifying file delivered to user Alice -a SHA-224 -u 1 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 2 p7sign: problem signing data: SEC_ERROR_INADEQUATE_KEY_USAGE: Certificate key usage inadequate for attempted operation. smime.sh: #203: Signing file for user Alice -a SHA-224 -u 2 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 3 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #204: Signing file for user Alice -a SHA-224 -u 3 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 4 smime.sh: #205: Signing file for user Alice -a SHA-224 -u 4 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 4 Signature is valid. smime.sh: #206: Verifying file delivered to user Alice -a SHA-224 -u 4 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 5 smime.sh: #207: Signing file for user Alice -a SHA-224 -u 5 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 5 Signature is valid. smime.sh: #208: Verifying file delivered to user Alice -a SHA-224 -u 5 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 6 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #209: Signing file for user Alice -a SHA-224 -u 6 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 8 smime.sh: #210: Signing file for user Alice -a SHA-224 -u 8 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 8 Signature is valid. smime.sh: #211: Verifying file delivered to user Alice -a SHA-224 -u 8 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 10 p7sign: problem signing data: SEC_ERROR_INADEQUATE_CERT_TYPE: Certificate type not approved for application. smime.sh: #212: Signing file for user Alice -a SHA-224 -u 10 (inadequate) . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 11 smime.sh: #213: Signing file for user Alice -a SHA-224 -u 11 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 11 Signature is valid. smime.sh: #214: Verifying file delivered to user Alice -a SHA-224 -u 11 . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e -a SHA-224 -u 12 smime.sh: #215: Signing file for user Alice -a SHA-224 -u 12 . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig -u 12 Signature is valid. smime.sh: #216: Verifying file delivered to user Alice -a SHA-224 -u 12 . - PASSED TIMESTAMP smime END: Thu Dec 26 14:35:36 UTC 2024 Running tests for ssl TIMESTAMP ssl BEGIN: Thu Dec 26 14:35:36 UTC 2024 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:36 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27309 >/dev/null 2>/dev/null selfserv_9525 with PID 27309 found at Thu Dec 26 14:35:36 UTC 2024 selfserv_9525 with PID 27309 started at Thu Dec 26 14:35:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 27309 at Thu Dec 26 14:35:37 UTC 2024 kill -USR1 27309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27309 killed at Thu Dec 26 14:35:37 UTC 2024 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27348 >/dev/null 2>/dev/null selfserv_9525 with PID 27348 found at Thu Dec 26 14:35:37 UTC 2024 selfserv_9525 with PID 27348 started at Thu Dec 26 14:35:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 27348 at Thu Dec 26 14:35:37 UTC 2024 kill -USR1 27348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27348 killed at Thu Dec 26 14:35:37 UTC 2024 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27387 >/dev/null 2>/dev/null selfserv_9525 with PID 27387 found at Thu Dec 26 14:35:37 UTC 2024 selfserv_9525 with PID 27387 started at Thu Dec 26 14:35:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 27387 at Thu Dec 26 14:35:37 UTC 2024 kill -USR1 27387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27387 killed at Thu Dec 26 14:35:37 UTC 2024 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27440 >/dev/null 2>/dev/null selfserv_9525 with PID 27440 found at Thu Dec 26 14:35:38 UTC 2024 selfserv_9525 with PID 27440 started at Thu Dec 26 14:35:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 27440 at Thu Dec 26 14:35:38 UTC 2024 kill -USR1 27440 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27440 killed at Thu Dec 26 14:35:38 UTC 2024 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27479 >/dev/null 2>/dev/null selfserv_9525 with PID 27479 found at Thu Dec 26 14:35:38 UTC 2024 selfserv_9525 with PID 27479 started at Thu Dec 26 14:35:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 27479 at Thu Dec 26 14:35:38 UTC 2024 kill -USR1 27479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27479 killed at Thu Dec 26 14:35:38 UTC 2024 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27518 >/dev/null 2>/dev/null selfserv_9525 with PID 27518 found at Thu Dec 26 14:35:38 UTC 2024 selfserv_9525 with PID 27518 started at Thu Dec 26 14:35:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 27518 at Thu Dec 26 14:35:38 UTC 2024 kill -USR1 27518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27518 killed at Thu Dec 26 14:35:38 UTC 2024 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27571 >/dev/null 2>/dev/null selfserv_9525 with PID 27571 found at Thu Dec 26 14:35:39 UTC 2024 selfserv_9525 with PID 27571 started at Thu Dec 26 14:35:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27571 at Thu Dec 26 14:35:39 UTC 2024 kill -USR1 27571 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27571 killed at Thu Dec 26 14:35:39 UTC 2024 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27610 >/dev/null 2>/dev/null selfserv_9525 with PID 27610 found at Thu Dec 26 14:35:39 UTC 2024 selfserv_9525 with PID 27610 started at Thu Dec 26 14:35:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 27610 at Thu Dec 26 14:35:39 UTC 2024 kill -USR1 27610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27610 killed at Thu Dec 26 14:35:39 UTC 2024 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27649 >/dev/null 2>/dev/null selfserv_9525 with PID 27649 found at Thu Dec 26 14:35:39 UTC 2024 selfserv_9525 with PID 27649 started at Thu Dec 26 14:35:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27649 at Thu Dec 26 14:35:40 UTC 2024 kill -USR1 27649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27649 killed at Thu Dec 26 14:35:40 UTC 2024 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27702 >/dev/null 2>/dev/null selfserv_9525 with PID 27702 found at Thu Dec 26 14:35:40 UTC 2024 selfserv_9525 with PID 27702 started at Thu Dec 26 14:35:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27702 at Thu Dec 26 14:35:40 UTC 2024 kill -USR1 27702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27702 killed at Thu Dec 26 14:35:40 UTC 2024 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27741 >/dev/null 2>/dev/null selfserv_9525 with PID 27741 found at Thu Dec 26 14:35:40 UTC 2024 selfserv_9525 with PID 27741 started at Thu Dec 26 14:35:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27741 at Thu Dec 26 14:35:41 UTC 2024 kill -USR1 27741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27741 killed at Thu Dec 26 14:35:41 UTC 2024 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27780 >/dev/null 2>/dev/null selfserv_9525 with PID 27780 found at Thu Dec 26 14:35:41 UTC 2024 selfserv_9525 with PID 27780 started at Thu Dec 26 14:35:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27780 at Thu Dec 26 14:35:41 UTC 2024 kill -USR1 27780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27780 killed at Thu Dec 26 14:35:41 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27833 >/dev/null 2>/dev/null selfserv_9525 with PID 27833 found at Thu Dec 26 14:35:41 UTC 2024 selfserv_9525 with PID 27833 started at Thu Dec 26 14:35:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27833 at Thu Dec 26 14:35:41 UTC 2024 kill -USR1 27833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27833 killed at Thu Dec 26 14:35:41 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27872 >/dev/null 2>/dev/null selfserv_9525 with PID 27872 found at Thu Dec 26 14:35:41 UTC 2024 selfserv_9525 with PID 27872 started at Thu Dec 26 14:35:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27872 at Thu Dec 26 14:35:42 UTC 2024 kill -USR1 27872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27872 killed at Thu Dec 26 14:35:42 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27911 >/dev/null 2>/dev/null selfserv_9525 with PID 27911 found at Thu Dec 26 14:35:42 UTC 2024 selfserv_9525 with PID 27911 started at Thu Dec 26 14:35:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27911 at Thu Dec 26 14:35:42 UTC 2024 kill -USR1 27911 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27911 killed at Thu Dec 26 14:35:42 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 27964 >/dev/null 2>/dev/null selfserv_9525 with PID 27964 found at Thu Dec 26 14:35:42 UTC 2024 selfserv_9525 with PID 27964 started at Thu Dec 26 14:35:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 27964 at Thu Dec 26 14:35:42 UTC 2024 kill -USR1 27964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 27964 killed at Thu Dec 26 14:35:42 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28003 >/dev/null 2>/dev/null selfserv_9525 with PID 28003 found at Thu Dec 26 14:35:42 UTC 2024 selfserv_9525 with PID 28003 started at Thu Dec 26 14:35:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28003 at Thu Dec 26 14:35:43 UTC 2024 kill -USR1 28003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28003 killed at Thu Dec 26 14:35:43 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28042 >/dev/null 2>/dev/null selfserv_9525 with PID 28042 found at Thu Dec 26 14:35:43 UTC 2024 selfserv_9525 with PID 28042 started at Thu Dec 26 14:35:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28042 at Thu Dec 26 14:35:43 UTC 2024 kill -USR1 28042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28042 killed at Thu Dec 26 14:35:43 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28095 >/dev/null 2>/dev/null selfserv_9525 with PID 28095 found at Thu Dec 26 14:35:43 UTC 2024 selfserv_9525 with PID 28095 started at Thu Dec 26 14:35:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28095 at Thu Dec 26 14:35:43 UTC 2024 kill -USR1 28095 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28095 killed at Thu Dec 26 14:35:43 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28134 >/dev/null 2>/dev/null selfserv_9525 with PID 28134 found at Thu Dec 26 14:35:44 UTC 2024 selfserv_9525 with PID 28134 started at Thu Dec 26 14:35:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28134 at Thu Dec 26 14:35:44 UTC 2024 kill -USR1 28134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28134 killed at Thu Dec 26 14:35:44 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28173 >/dev/null 2>/dev/null selfserv_9525 with PID 28173 found at Thu Dec 26 14:35:44 UTC 2024 selfserv_9525 with PID 28173 started at Thu Dec 26 14:35:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28173 at Thu Dec 26 14:35:44 UTC 2024 kill -USR1 28173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28173 killed at Thu Dec 26 14:35:44 UTC 2024 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28226 >/dev/null 2>/dev/null selfserv_9525 with PID 28226 found at Thu Dec 26 14:35:44 UTC 2024 selfserv_9525 with PID 28226 started at Thu Dec 26 14:35:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28226 at Thu Dec 26 14:35:45 UTC 2024 kill -USR1 28226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28226 killed at Thu Dec 26 14:35:45 UTC 2024 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28265 >/dev/null 2>/dev/null selfserv_9525 with PID 28265 found at Thu Dec 26 14:35:45 UTC 2024 selfserv_9525 with PID 28265 started at Thu Dec 26 14:35:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28265 at Thu Dec 26 14:35:45 UTC 2024 kill -USR1 28265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28265 killed at Thu Dec 26 14:35:45 UTC 2024 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28304 >/dev/null 2>/dev/null selfserv_9525 with PID 28304 found at Thu Dec 26 14:35:45 UTC 2024 selfserv_9525 with PID 28304 started at Thu Dec 26 14:35:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28304 at Thu Dec 26 14:35:45 UTC 2024 kill -USR1 28304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28304 killed at Thu Dec 26 14:35:45 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28357 >/dev/null 2>/dev/null selfserv_9525 with PID 28357 found at Thu Dec 26 14:35:45 UTC 2024 selfserv_9525 with PID 28357 started at Thu Dec 26 14:35:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28357 at Thu Dec 26 14:35:45 UTC 2024 kill -USR1 28357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28357 killed at Thu Dec 26 14:35:45 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28396 >/dev/null 2>/dev/null selfserv_9525 with PID 28396 found at Thu Dec 26 14:35:46 UTC 2024 selfserv_9525 with PID 28396 started at Thu Dec 26 14:35:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28396 at Thu Dec 26 14:35:46 UTC 2024 kill -USR1 28396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28396 killed at Thu Dec 26 14:35:46 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:46 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28435 >/dev/null 2>/dev/null selfserv_9525 with PID 28435 found at Thu Dec 26 14:35:46 UTC 2024 selfserv_9525 with PID 28435 started at Thu Dec 26 14:35:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28435 at Thu Dec 26 14:35:46 UTC 2024 kill -USR1 28435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28435 killed at Thu Dec 26 14:35:46 UTC 2024 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:46 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28488 >/dev/null 2>/dev/null selfserv_9525 with PID 28488 found at Thu Dec 26 14:35:46 UTC 2024 selfserv_9525 with PID 28488 started at Thu Dec 26 14:35:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28488 at Thu Dec 26 14:35:47 UTC 2024 kill -USR1 28488 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28488 killed at Thu Dec 26 14:35:47 UTC 2024 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:47 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28527 >/dev/null 2>/dev/null selfserv_9525 with PID 28527 found at Thu Dec 26 14:35:47 UTC 2024 selfserv_9525 with PID 28527 started at Thu Dec 26 14:35:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28527 at Thu Dec 26 14:35:47 UTC 2024 kill -USR1 28527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28527 killed at Thu Dec 26 14:35:47 UTC 2024 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:47 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28566 >/dev/null 2>/dev/null selfserv_9525 with PID 28566 found at Thu Dec 26 14:35:47 UTC 2024 selfserv_9525 with PID 28566 started at Thu Dec 26 14:35:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28566 at Thu Dec 26 14:35:47 UTC 2024 kill -USR1 28566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28566 killed at Thu Dec 26 14:35:47 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:47 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28619 >/dev/null 2>/dev/null selfserv_9525 with PID 28619 found at Thu Dec 26 14:35:47 UTC 2024 selfserv_9525 with PID 28619 started at Thu Dec 26 14:35:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28619 at Thu Dec 26 14:35:48 UTC 2024 kill -USR1 28619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28619 killed at Thu Dec 26 14:35:48 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:48 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28658 >/dev/null 2>/dev/null selfserv_9525 with PID 28658 found at Thu Dec 26 14:35:48 UTC 2024 selfserv_9525 with PID 28658 started at Thu Dec 26 14:35:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28658 at Thu Dec 26 14:35:48 UTC 2024 kill -USR1 28658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28658 killed at Thu Dec 26 14:35:48 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:48 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28697 >/dev/null 2>/dev/null selfserv_9525 with PID 28697 found at Thu Dec 26 14:35:48 UTC 2024 selfserv_9525 with PID 28697 started at Thu Dec 26 14:35:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28697 at Thu Dec 26 14:35:48 UTC 2024 kill -USR1 28697 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28697 killed at Thu Dec 26 14:35:48 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:48 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28750 >/dev/null 2>/dev/null selfserv_9525 with PID 28750 found at Thu Dec 26 14:35:48 UTC 2024 selfserv_9525 with PID 28750 started at Thu Dec 26 14:35:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28750 at Thu Dec 26 14:35:49 UTC 2024 kill -USR1 28750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28750 killed at Thu Dec 26 14:35:49 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28789 >/dev/null 2>/dev/null selfserv_9525 with PID 28789 found at Thu Dec 26 14:35:49 UTC 2024 selfserv_9525 with PID 28789 started at Thu Dec 26 14:35:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28789 at Thu Dec 26 14:35:49 UTC 2024 kill -USR1 28789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28789 killed at Thu Dec 26 14:35:49 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28828 >/dev/null 2>/dev/null selfserv_9525 with PID 28828 found at Thu Dec 26 14:35:49 UTC 2024 selfserv_9525 with PID 28828 started at Thu Dec 26 14:35:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 28828 at Thu Dec 26 14:35:49 UTC 2024 kill -USR1 28828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28828 killed at Thu Dec 26 14:35:49 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28881 >/dev/null 2>/dev/null selfserv_9525 with PID 28881 found at Thu Dec 26 14:35:49 UTC 2024 selfserv_9525 with PID 28881 started at Thu Dec 26 14:35:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28881 at Thu Dec 26 14:35:50 UTC 2024 kill -USR1 28881 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28881 killed at Thu Dec 26 14:35:50 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:50 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28920 >/dev/null 2>/dev/null selfserv_9525 with PID 28920 found at Thu Dec 26 14:35:50 UTC 2024 selfserv_9525 with PID 28920 started at Thu Dec 26 14:35:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28920 at Thu Dec 26 14:35:50 UTC 2024 kill -USR1 28920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28920 killed at Thu Dec 26 14:35:50 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:50 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 28959 >/dev/null 2>/dev/null selfserv_9525 with PID 28959 found at Thu Dec 26 14:35:50 UTC 2024 selfserv_9525 with PID 28959 started at Thu Dec 26 14:35:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 28959 at Thu Dec 26 14:35:51 UTC 2024 kill -USR1 28959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 28959 killed at Thu Dec 26 14:35:51 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29012 >/dev/null 2>/dev/null selfserv_9525 with PID 29012 found at Thu Dec 26 14:35:51 UTC 2024 selfserv_9525 with PID 29012 started at Thu Dec 26 14:35:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29012 at Thu Dec 26 14:35:51 UTC 2024 kill -USR1 29012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29012 killed at Thu Dec 26 14:35:51 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29051 >/dev/null 2>/dev/null selfserv_9525 with PID 29051 found at Thu Dec 26 14:35:51 UTC 2024 selfserv_9525 with PID 29051 started at Thu Dec 26 14:35:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29051 at Thu Dec 26 14:35:51 UTC 2024 kill -USR1 29051 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29051 killed at Thu Dec 26 14:35:51 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29090 >/dev/null 2>/dev/null selfserv_9525 with PID 29090 found at Thu Dec 26 14:35:52 UTC 2024 selfserv_9525 with PID 29090 started at Thu Dec 26 14:35:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29090 at Thu Dec 26 14:35:52 UTC 2024 kill -USR1 29090 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29090 killed at Thu Dec 26 14:35:52 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:52 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29143 >/dev/null 2>/dev/null selfserv_9525 with PID 29143 found at Thu Dec 26 14:35:52 UTC 2024 selfserv_9525 with PID 29143 started at Thu Dec 26 14:35:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29143 at Thu Dec 26 14:35:52 UTC 2024 kill -USR1 29143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29143 killed at Thu Dec 26 14:35:52 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:52 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29182 >/dev/null 2>/dev/null selfserv_9525 with PID 29182 found at Thu Dec 26 14:35:52 UTC 2024 selfserv_9525 with PID 29182 started at Thu Dec 26 14:35:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29182 at Thu Dec 26 14:35:53 UTC 2024 kill -USR1 29182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29182 killed at Thu Dec 26 14:35:53 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:53 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:53 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29221 >/dev/null 2>/dev/null selfserv_9525 with PID 29221 found at Thu Dec 26 14:35:53 UTC 2024 selfserv_9525 with PID 29221 started at Thu Dec 26 14:35:53 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29221 at Thu Dec 26 14:35:53 UTC 2024 kill -USR1 29221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29221 killed at Thu Dec 26 14:35:53 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:53 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:53 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29274 >/dev/null 2>/dev/null selfserv_9525 with PID 29274 found at Thu Dec 26 14:35:53 UTC 2024 selfserv_9525 with PID 29274 started at Thu Dec 26 14:35:53 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29274 at Thu Dec 26 14:35:54 UTC 2024 kill -USR1 29274 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29274 killed at Thu Dec 26 14:35:54 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:54 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:54 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29313 >/dev/null 2>/dev/null selfserv_9525 with PID 29313 found at Thu Dec 26 14:35:54 UTC 2024 selfserv_9525 with PID 29313 started at Thu Dec 26 14:35:54 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29313 at Thu Dec 26 14:35:54 UTC 2024 kill -USR1 29313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29313 killed at Thu Dec 26 14:35:54 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:54 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:54 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29352 >/dev/null 2>/dev/null selfserv_9525 with PID 29352 found at Thu Dec 26 14:35:54 UTC 2024 selfserv_9525 with PID 29352 started at Thu Dec 26 14:35:54 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29352 at Thu Dec 26 14:35:55 UTC 2024 kill -USR1 29352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29352 killed at Thu Dec 26 14:35:55 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:55 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29405 >/dev/null 2>/dev/null selfserv_9525 with PID 29405 found at Thu Dec 26 14:35:55 UTC 2024 selfserv_9525 with PID 29405 started at Thu Dec 26 14:35:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29405 at Thu Dec 26 14:35:55 UTC 2024 kill -USR1 29405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29405 killed at Thu Dec 26 14:35:55 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:55 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29444 >/dev/null 2>/dev/null selfserv_9525 with PID 29444 found at Thu Dec 26 14:35:55 UTC 2024 selfserv_9525 with PID 29444 started at Thu Dec 26 14:35:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29444 at Thu Dec 26 14:35:55 UTC 2024 kill -USR1 29444 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29444 killed at Thu Dec 26 14:35:55 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:55 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29483 >/dev/null 2>/dev/null selfserv_9525 with PID 29483 found at Thu Dec 26 14:35:55 UTC 2024 selfserv_9525 with PID 29483 started at Thu Dec 26 14:35:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29483 at Thu Dec 26 14:35:56 UTC 2024 kill -USR1 29483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29483 killed at Thu Dec 26 14:35:56 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:56 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29536 >/dev/null 2>/dev/null selfserv_9525 with PID 29536 found at Thu Dec 26 14:35:56 UTC 2024 selfserv_9525 with PID 29536 started at Thu Dec 26 14:35:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29536 at Thu Dec 26 14:35:56 UTC 2024 kill -USR1 29536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29536 killed at Thu Dec 26 14:35:56 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:56 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29575 >/dev/null 2>/dev/null selfserv_9525 with PID 29575 found at Thu Dec 26 14:35:56 UTC 2024 selfserv_9525 with PID 29575 started at Thu Dec 26 14:35:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29575 at Thu Dec 26 14:35:57 UTC 2024 kill -USR1 29575 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29575 killed at Thu Dec 26 14:35:57 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:57 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:57 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29614 >/dev/null 2>/dev/null selfserv_9525 with PID 29614 found at Thu Dec 26 14:35:57 UTC 2024 selfserv_9525 with PID 29614 started at Thu Dec 26 14:35:57 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29614 at Thu Dec 26 14:35:57 UTC 2024 kill -USR1 29614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29614 killed at Thu Dec 26 14:35:57 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:57 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:57 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29667 >/dev/null 2>/dev/null selfserv_9525 with PID 29667 found at Thu Dec 26 14:35:57 UTC 2024 selfserv_9525 with PID 29667 started at Thu Dec 26 14:35:57 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29667 at Thu Dec 26 14:35:58 UTC 2024 kill -USR1 29667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29667 killed at Thu Dec 26 14:35:58 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:58 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29706 >/dev/null 2>/dev/null selfserv_9525 with PID 29706 found at Thu Dec 26 14:35:58 UTC 2024 selfserv_9525 with PID 29706 started at Thu Dec 26 14:35:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29706 at Thu Dec 26 14:35:58 UTC 2024 kill -USR1 29706 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29706 killed at Thu Dec 26 14:35:58 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:35:58 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29745 >/dev/null 2>/dev/null selfserv_9525 with PID 29745 found at Thu Dec 26 14:35:58 UTC 2024 selfserv_9525 with PID 29745 started at Thu Dec 26 14:35:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29745 at Thu Dec 26 14:35:59 UTC 2024 kill -USR1 29745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29745 killed at Thu Dec 26 14:35:59 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29798 >/dev/null 2>/dev/null selfserv_9525 with PID 29798 found at Thu Dec 26 14:35:59 UTC 2024 selfserv_9525 with PID 29798 started at Thu Dec 26 14:35:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29798 at Thu Dec 26 14:35:59 UTC 2024 kill -USR1 29798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29798 killed at Thu Dec 26 14:35:59 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:35:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:35:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29837 >/dev/null 2>/dev/null selfserv_9525 with PID 29837 found at Thu Dec 26 14:35:59 UTC 2024 selfserv_9525 with PID 29837 started at Thu Dec 26 14:35:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29837 at Thu Dec 26 14:36:00 UTC 2024 kill -USR1 29837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29837 killed at Thu Dec 26 14:36:00 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29876 >/dev/null 2>/dev/null selfserv_9525 with PID 29876 found at Thu Dec 26 14:36:00 UTC 2024 selfserv_9525 with PID 29876 started at Thu Dec 26 14:36:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29876 at Thu Dec 26 14:36:00 UTC 2024 kill -USR1 29876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29876 killed at Thu Dec 26 14:36:00 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29929 >/dev/null 2>/dev/null selfserv_9525 with PID 29929 found at Thu Dec 26 14:36:00 UTC 2024 selfserv_9525 with PID 29929 started at Thu Dec 26 14:36:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 29929 at Thu Dec 26 14:36:01 UTC 2024 kill -USR1 29929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29929 killed at Thu Dec 26 14:36:01 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 29968 >/dev/null 2>/dev/null selfserv_9525 with PID 29968 found at Thu Dec 26 14:36:01 UTC 2024 selfserv_9525 with PID 29968 started at Thu Dec 26 14:36:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 29968 at Thu Dec 26 14:36:01 UTC 2024 kill -USR1 29968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 29968 killed at Thu Dec 26 14:36:01 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30007 >/dev/null 2>/dev/null selfserv_9525 with PID 30007 found at Thu Dec 26 14:36:01 UTC 2024 selfserv_9525 with PID 30007 started at Thu Dec 26 14:36:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30007 at Thu Dec 26 14:36:02 UTC 2024 kill -USR1 30007 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30007 killed at Thu Dec 26 14:36:02 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30060 >/dev/null 2>/dev/null selfserv_9525 with PID 30060 found at Thu Dec 26 14:36:02 UTC 2024 selfserv_9525 with PID 30060 started at Thu Dec 26 14:36:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30060 at Thu Dec 26 14:36:02 UTC 2024 kill -USR1 30060 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30060 killed at Thu Dec 26 14:36:02 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30099 >/dev/null 2>/dev/null selfserv_9525 with PID 30099 found at Thu Dec 26 14:36:02 UTC 2024 selfserv_9525 with PID 30099 started at Thu Dec 26 14:36:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30099 at Thu Dec 26 14:36:03 UTC 2024 kill -USR1 30099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30099 killed at Thu Dec 26 14:36:03 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30138 >/dev/null 2>/dev/null selfserv_9525 with PID 30138 found at Thu Dec 26 14:36:03 UTC 2024 selfserv_9525 with PID 30138 started at Thu Dec 26 14:36:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30138 at Thu Dec 26 14:36:03 UTC 2024 kill -USR1 30138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30138 killed at Thu Dec 26 14:36:03 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30191 >/dev/null 2>/dev/null selfserv_9525 with PID 30191 found at Thu Dec 26 14:36:03 UTC 2024 selfserv_9525 with PID 30191 started at Thu Dec 26 14:36:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30191 at Thu Dec 26 14:36:04 UTC 2024 kill -USR1 30191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30191 killed at Thu Dec 26 14:36:04 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30230 >/dev/null 2>/dev/null selfserv_9525 with PID 30230 found at Thu Dec 26 14:36:04 UTC 2024 selfserv_9525 with PID 30230 started at Thu Dec 26 14:36:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30230 at Thu Dec 26 14:36:04 UTC 2024 kill -USR1 30230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30230 killed at Thu Dec 26 14:36:04 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30269 >/dev/null 2>/dev/null selfserv_9525 with PID 30269 found at Thu Dec 26 14:36:04 UTC 2024 selfserv_9525 with PID 30269 started at Thu Dec 26 14:36:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30269 at Thu Dec 26 14:36:04 UTC 2024 kill -USR1 30269 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30269 killed at Thu Dec 26 14:36:04 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30322 >/dev/null 2>/dev/null selfserv_9525 with PID 30322 found at Thu Dec 26 14:36:05 UTC 2024 selfserv_9525 with PID 30322 started at Thu Dec 26 14:36:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30322 at Thu Dec 26 14:36:05 UTC 2024 kill -USR1 30322 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30322 killed at Thu Dec 26 14:36:05 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30361 >/dev/null 2>/dev/null selfserv_9525 with PID 30361 found at Thu Dec 26 14:36:05 UTC 2024 selfserv_9525 with PID 30361 started at Thu Dec 26 14:36:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30361 at Thu Dec 26 14:36:06 UTC 2024 kill -USR1 30361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30361 killed at Thu Dec 26 14:36:06 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30400 >/dev/null 2>/dev/null selfserv_9525 with PID 30400 found at Thu Dec 26 14:36:06 UTC 2024 selfserv_9525 with PID 30400 started at Thu Dec 26 14:36:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30400 at Thu Dec 26 14:36:06 UTC 2024 kill -USR1 30400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30400 killed at Thu Dec 26 14:36:06 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30453 >/dev/null 2>/dev/null selfserv_9525 with PID 30453 found at Thu Dec 26 14:36:06 UTC 2024 selfserv_9525 with PID 30453 started at Thu Dec 26 14:36:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30453 at Thu Dec 26 14:36:06 UTC 2024 kill -USR1 30453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30453 killed at Thu Dec 26 14:36:06 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30492 >/dev/null 2>/dev/null selfserv_9525 with PID 30492 found at Thu Dec 26 14:36:07 UTC 2024 selfserv_9525 with PID 30492 started at Thu Dec 26 14:36:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30492 at Thu Dec 26 14:36:07 UTC 2024 kill -USR1 30492 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30492 killed at Thu Dec 26 14:36:07 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30531 >/dev/null 2>/dev/null selfserv_9525 with PID 30531 found at Thu Dec 26 14:36:07 UTC 2024 selfserv_9525 with PID 30531 started at Thu Dec 26 14:36:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30531 at Thu Dec 26 14:36:07 UTC 2024 kill -USR1 30531 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30531 killed at Thu Dec 26 14:36:07 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30584 >/dev/null 2>/dev/null selfserv_9525 with PID 30584 found at Thu Dec 26 14:36:07 UTC 2024 selfserv_9525 with PID 30584 started at Thu Dec 26 14:36:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30584 at Thu Dec 26 14:36:08 UTC 2024 kill -USR1 30584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30584 killed at Thu Dec 26 14:36:08 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30623 >/dev/null 2>/dev/null selfserv_9525 with PID 30623 found at Thu Dec 26 14:36:08 UTC 2024 selfserv_9525 with PID 30623 started at Thu Dec 26 14:36:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30623 at Thu Dec 26 14:36:08 UTC 2024 kill -USR1 30623 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30623 killed at Thu Dec 26 14:36:08 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30662 >/dev/null 2>/dev/null selfserv_9525 with PID 30662 found at Thu Dec 26 14:36:08 UTC 2024 selfserv_9525 with PID 30662 started at Thu Dec 26 14:36:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30662 at Thu Dec 26 14:36:08 UTC 2024 kill -USR1 30662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30662 killed at Thu Dec 26 14:36:08 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30715 >/dev/null 2>/dev/null selfserv_9525 with PID 30715 found at Thu Dec 26 14:36:08 UTC 2024 selfserv_9525 with PID 30715 started at Thu Dec 26 14:36:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30715 at Thu Dec 26 14:36:09 UTC 2024 kill -USR1 30715 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30715 killed at Thu Dec 26 14:36:09 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30754 >/dev/null 2>/dev/null selfserv_9525 with PID 30754 found at Thu Dec 26 14:36:09 UTC 2024 selfserv_9525 with PID 30754 started at Thu Dec 26 14:36:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 30754 at Thu Dec 26 14:36:09 UTC 2024 kill -USR1 30754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30754 killed at Thu Dec 26 14:36:09 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30793 >/dev/null 2>/dev/null selfserv_9525 with PID 30793 found at Thu Dec 26 14:36:09 UTC 2024 selfserv_9525 with PID 30793 started at Thu Dec 26 14:36:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30793 at Thu Dec 26 14:36:09 UTC 2024 kill -USR1 30793 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30793 killed at Thu Dec 26 14:36:09 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30846 >/dev/null 2>/dev/null selfserv_9525 with PID 30846 found at Thu Dec 26 14:36:10 UTC 2024 selfserv_9525 with PID 30846 started at Thu Dec 26 14:36:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30846 at Thu Dec 26 14:36:10 UTC 2024 kill -USR1 30846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30846 killed at Thu Dec 26 14:36:10 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30885 >/dev/null 2>/dev/null selfserv_9525 with PID 30885 found at Thu Dec 26 14:36:10 UTC 2024 selfserv_9525 with PID 30885 started at Thu Dec 26 14:36:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30885 at Thu Dec 26 14:36:10 UTC 2024 kill -USR1 30885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30885 killed at Thu Dec 26 14:36:10 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30924 >/dev/null 2>/dev/null selfserv_9525 with PID 30924 found at Thu Dec 26 14:36:10 UTC 2024 selfserv_9525 with PID 30924 started at Thu Dec 26 14:36:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30924 at Thu Dec 26 14:36:11 UTC 2024 kill -USR1 30924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30924 killed at Thu Dec 26 14:36:11 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 30977 >/dev/null 2>/dev/null selfserv_9525 with PID 30977 found at Thu Dec 26 14:36:11 UTC 2024 selfserv_9525 with PID 30977 started at Thu Dec 26 14:36:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 30977 at Thu Dec 26 14:36:11 UTC 2024 kill -USR1 30977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 30977 killed at Thu Dec 26 14:36:11 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31016 >/dev/null 2>/dev/null selfserv_9525 with PID 31016 found at Thu Dec 26 14:36:11 UTC 2024 selfserv_9525 with PID 31016 started at Thu Dec 26 14:36:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31016 at Thu Dec 26 14:36:11 UTC 2024 kill -USR1 31016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31016 killed at Thu Dec 26 14:36:11 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31055 >/dev/null 2>/dev/null selfserv_9525 with PID 31055 found at Thu Dec 26 14:36:11 UTC 2024 selfserv_9525 with PID 31055 started at Thu Dec 26 14:36:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31055 at Thu Dec 26 14:36:12 UTC 2024 kill -USR1 31055 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31055 killed at Thu Dec 26 14:36:12 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31108 >/dev/null 2>/dev/null selfserv_9525 with PID 31108 found at Thu Dec 26 14:36:12 UTC 2024 selfserv_9525 with PID 31108 started at Thu Dec 26 14:36:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31108 at Thu Dec 26 14:36:12 UTC 2024 kill -USR1 31108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31108 killed at Thu Dec 26 14:36:12 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31147 >/dev/null 2>/dev/null selfserv_9525 with PID 31147 found at Thu Dec 26 14:36:12 UTC 2024 selfserv_9525 with PID 31147 started at Thu Dec 26 14:36:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31147 at Thu Dec 26 14:36:12 UTC 2024 kill -USR1 31147 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31147 killed at Thu Dec 26 14:36:12 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31186 >/dev/null 2>/dev/null selfserv_9525 with PID 31186 found at Thu Dec 26 14:36:12 UTC 2024 selfserv_9525 with PID 31186 started at Thu Dec 26 14:36:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31186 at Thu Dec 26 14:36:13 UTC 2024 kill -USR1 31186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31186 killed at Thu Dec 26 14:36:13 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31239 >/dev/null 2>/dev/null selfserv_9525 with PID 31239 found at Thu Dec 26 14:36:13 UTC 2024 selfserv_9525 with PID 31239 started at Thu Dec 26 14:36:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31239 at Thu Dec 26 14:36:13 UTC 2024 kill -USR1 31239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31239 killed at Thu Dec 26 14:36:13 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31278 >/dev/null 2>/dev/null selfserv_9525 with PID 31278 found at Thu Dec 26 14:36:13 UTC 2024 selfserv_9525 with PID 31278 started at Thu Dec 26 14:36:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31278 at Thu Dec 26 14:36:13 UTC 2024 kill -USR1 31278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31278 killed at Thu Dec 26 14:36:13 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31317 >/dev/null 2>/dev/null selfserv_9525 with PID 31317 found at Thu Dec 26 14:36:14 UTC 2024 selfserv_9525 with PID 31317 started at Thu Dec 26 14:36:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31317 at Thu Dec 26 14:36:14 UTC 2024 kill -USR1 31317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31317 killed at Thu Dec 26 14:36:14 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31370 >/dev/null 2>/dev/null selfserv_9525 with PID 31370 found at Thu Dec 26 14:36:14 UTC 2024 selfserv_9525 with PID 31370 started at Thu Dec 26 14:36:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31370 at Thu Dec 26 14:36:14 UTC 2024 kill -USR1 31370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31370 killed at Thu Dec 26 14:36:14 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31409 >/dev/null 2>/dev/null selfserv_9525 with PID 31409 found at Thu Dec 26 14:36:14 UTC 2024 selfserv_9525 with PID 31409 started at Thu Dec 26 14:36:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31409 at Thu Dec 26 14:36:14 UTC 2024 kill -USR1 31409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31409 killed at Thu Dec 26 14:36:14 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31448 >/dev/null 2>/dev/null selfserv_9525 with PID 31448 found at Thu Dec 26 14:36:15 UTC 2024 selfserv_9525 with PID 31448 started at Thu Dec 26 14:36:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31448 at Thu Dec 26 14:36:15 UTC 2024 kill -USR1 31448 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31448 killed at Thu Dec 26 14:36:15 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31501 >/dev/null 2>/dev/null selfserv_9525 with PID 31501 found at Thu Dec 26 14:36:15 UTC 2024 selfserv_9525 with PID 31501 started at Thu Dec 26 14:36:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31501 at Thu Dec 26 14:36:15 UTC 2024 kill -USR1 31501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31501 killed at Thu Dec 26 14:36:15 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31540 >/dev/null 2>/dev/null selfserv_9525 with PID 31540 found at Thu Dec 26 14:36:15 UTC 2024 selfserv_9525 with PID 31540 started at Thu Dec 26 14:36:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31540 at Thu Dec 26 14:36:16 UTC 2024 kill -USR1 31540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31540 killed at Thu Dec 26 14:36:16 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31579 >/dev/null 2>/dev/null selfserv_9525 with PID 31579 found at Thu Dec 26 14:36:16 UTC 2024 selfserv_9525 with PID 31579 started at Thu Dec 26 14:36:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31579 at Thu Dec 26 14:36:16 UTC 2024 kill -USR1 31579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31579 killed at Thu Dec 26 14:36:16 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31632 >/dev/null 2>/dev/null selfserv_9525 with PID 31632 found at Thu Dec 26 14:36:16 UTC 2024 selfserv_9525 with PID 31632 started at Thu Dec 26 14:36:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31632 at Thu Dec 26 14:36:16 UTC 2024 kill -USR1 31632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31632 killed at Thu Dec 26 14:36:16 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31671 >/dev/null 2>/dev/null selfserv_9525 with PID 31671 found at Thu Dec 26 14:36:16 UTC 2024 selfserv_9525 with PID 31671 started at Thu Dec 26 14:36:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31671 at Thu Dec 26 14:36:17 UTC 2024 kill -USR1 31671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31671 killed at Thu Dec 26 14:36:17 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31710 >/dev/null 2>/dev/null selfserv_9525 with PID 31710 found at Thu Dec 26 14:36:17 UTC 2024 selfserv_9525 with PID 31710 started at Thu Dec 26 14:36:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31710 at Thu Dec 26 14:36:17 UTC 2024 kill -USR1 31710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31710 killed at Thu Dec 26 14:36:17 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31763 >/dev/null 2>/dev/null selfserv_9525 with PID 31763 found at Thu Dec 26 14:36:17 UTC 2024 selfserv_9525 with PID 31763 started at Thu Dec 26 14:36:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31763 at Thu Dec 26 14:36:17 UTC 2024 kill -USR1 31763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31763 killed at Thu Dec 26 14:36:17 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31802 >/dev/null 2>/dev/null selfserv_9525 with PID 31802 found at Thu Dec 26 14:36:17 UTC 2024 selfserv_9525 with PID 31802 started at Thu Dec 26 14:36:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31802 at Thu Dec 26 14:36:18 UTC 2024 kill -USR1 31802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31802 killed at Thu Dec 26 14:36:18 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31841 >/dev/null 2>/dev/null selfserv_9525 with PID 31841 found at Thu Dec 26 14:36:18 UTC 2024 selfserv_9525 with PID 31841 started at Thu Dec 26 14:36:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 31841 at Thu Dec 26 14:36:18 UTC 2024 kill -USR1 31841 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31841 killed at Thu Dec 26 14:36:18 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31894 >/dev/null 2>/dev/null selfserv_9525 with PID 31894 found at Thu Dec 26 14:36:18 UTC 2024 selfserv_9525 with PID 31894 started at Thu Dec 26 14:36:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31894 at Thu Dec 26 14:36:18 UTC 2024 kill -USR1 31894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31894 killed at Thu Dec 26 14:36:18 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31933 >/dev/null 2>/dev/null selfserv_9525 with PID 31933 found at Thu Dec 26 14:36:19 UTC 2024 selfserv_9525 with PID 31933 started at Thu Dec 26 14:36:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31933 at Thu Dec 26 14:36:19 UTC 2024 kill -USR1 31933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31933 killed at Thu Dec 26 14:36:19 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 31972 >/dev/null 2>/dev/null selfserv_9525 with PID 31972 found at Thu Dec 26 14:36:19 UTC 2024 selfserv_9525 with PID 31972 started at Thu Dec 26 14:36:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 31972 at Thu Dec 26 14:36:19 UTC 2024 kill -USR1 31972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 31972 killed at Thu Dec 26 14:36:19 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32025 >/dev/null 2>/dev/null selfserv_9525 with PID 32025 found at Thu Dec 26 14:36:19 UTC 2024 selfserv_9525 with PID 32025 started at Thu Dec 26 14:36:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32025 at Thu Dec 26 14:36:20 UTC 2024 kill -USR1 32025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32025 killed at Thu Dec 26 14:36:20 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32064 >/dev/null 2>/dev/null selfserv_9525 with PID 32064 found at Thu Dec 26 14:36:20 UTC 2024 selfserv_9525 with PID 32064 started at Thu Dec 26 14:36:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32064 at Thu Dec 26 14:36:20 UTC 2024 kill -USR1 32064 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32064 killed at Thu Dec 26 14:36:20 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32103 >/dev/null 2>/dev/null selfserv_9525 with PID 32103 found at Thu Dec 26 14:36:20 UTC 2024 selfserv_9525 with PID 32103 started at Thu Dec 26 14:36:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32103 at Thu Dec 26 14:36:20 UTC 2024 kill -USR1 32103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32103 killed at Thu Dec 26 14:36:20 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32156 >/dev/null 2>/dev/null selfserv_9525 with PID 32156 found at Thu Dec 26 14:36:20 UTC 2024 selfserv_9525 with PID 32156 started at Thu Dec 26 14:36:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32156 at Thu Dec 26 14:36:21 UTC 2024 kill -USR1 32156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32156 killed at Thu Dec 26 14:36:21 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32195 >/dev/null 2>/dev/null selfserv_9525 with PID 32195 found at Thu Dec 26 14:36:21 UTC 2024 selfserv_9525 with PID 32195 started at Thu Dec 26 14:36:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32195 at Thu Dec 26 14:36:21 UTC 2024 kill -USR1 32195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32195 killed at Thu Dec 26 14:36:21 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32234 >/dev/null 2>/dev/null selfserv_9525 with PID 32234 found at Thu Dec 26 14:36:21 UTC 2024 selfserv_9525 with PID 32234 started at Thu Dec 26 14:36:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32234 at Thu Dec 26 14:36:22 UTC 2024 kill -USR1 32234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32234 killed at Thu Dec 26 14:36:22 UTC 2024 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32287 >/dev/null 2>/dev/null selfserv_9525 with PID 32287 found at Thu Dec 26 14:36:22 UTC 2024 selfserv_9525 with PID 32287 started at Thu Dec 26 14:36:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32287 at Thu Dec 26 14:36:22 UTC 2024 kill -USR1 32287 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32287 killed at Thu Dec 26 14:36:22 UTC 2024 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32326 >/dev/null 2>/dev/null selfserv_9525 with PID 32326 found at Thu Dec 26 14:36:22 UTC 2024 selfserv_9525 with PID 32326 started at Thu Dec 26 14:36:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32326 at Thu Dec 26 14:36:22 UTC 2024 kill -USR1 32326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32326 killed at Thu Dec 26 14:36:22 UTC 2024 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32365 >/dev/null 2>/dev/null selfserv_9525 with PID 32365 found at Thu Dec 26 14:36:22 UTC 2024 selfserv_9525 with PID 32365 started at Thu Dec 26 14:36:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32365 at Thu Dec 26 14:36:23 UTC 2024 kill -USR1 32365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32365 killed at Thu Dec 26 14:36:23 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32418 >/dev/null 2>/dev/null selfserv_9525 with PID 32418 found at Thu Dec 26 14:36:23 UTC 2024 selfserv_9525 with PID 32418 started at Thu Dec 26 14:36:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32418 at Thu Dec 26 14:36:23 UTC 2024 kill -USR1 32418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32418 killed at Thu Dec 26 14:36:23 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32457 >/dev/null 2>/dev/null selfserv_9525 with PID 32457 found at Thu Dec 26 14:36:23 UTC 2024 selfserv_9525 with PID 32457 started at Thu Dec 26 14:36:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32457 at Thu Dec 26 14:36:23 UTC 2024 kill -USR1 32457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32457 killed at Thu Dec 26 14:36:23 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32496 >/dev/null 2>/dev/null selfserv_9525 with PID 32496 found at Thu Dec 26 14:36:24 UTC 2024 selfserv_9525 with PID 32496 started at Thu Dec 26 14:36:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32496 at Thu Dec 26 14:36:24 UTC 2024 kill -USR1 32496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32496 killed at Thu Dec 26 14:36:24 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32549 >/dev/null 2>/dev/null selfserv_9525 with PID 32549 found at Thu Dec 26 14:36:24 UTC 2024 selfserv_9525 with PID 32549 started at Thu Dec 26 14:36:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32549 at Thu Dec 26 14:36:24 UTC 2024 kill -USR1 32549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32549 killed at Thu Dec 26 14:36:24 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32588 >/dev/null 2>/dev/null selfserv_9525 with PID 32588 found at Thu Dec 26 14:36:24 UTC 2024 selfserv_9525 with PID 32588 started at Thu Dec 26 14:36:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32588 at Thu Dec 26 14:36:24 UTC 2024 kill -USR1 32588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32588 killed at Thu Dec 26 14:36:24 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32627 >/dev/null 2>/dev/null selfserv_9525 with PID 32627 found at Thu Dec 26 14:36:25 UTC 2024 selfserv_9525 with PID 32627 started at Thu Dec 26 14:36:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32627 at Thu Dec 26 14:36:25 UTC 2024 kill -USR1 32627 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32627 killed at Thu Dec 26 14:36:25 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32680 >/dev/null 2>/dev/null selfserv_9525 with PID 32680 found at Thu Dec 26 14:36:25 UTC 2024 selfserv_9525 with PID 32680 started at Thu Dec 26 14:36:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32680 at Thu Dec 26 14:36:25 UTC 2024 kill -USR1 32680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32680 killed at Thu Dec 26 14:36:25 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32719 >/dev/null 2>/dev/null selfserv_9525 with PID 32719 found at Thu Dec 26 14:36:25 UTC 2024 selfserv_9525 with PID 32719 started at Thu Dec 26 14:36:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32719 at Thu Dec 26 14:36:26 UTC 2024 kill -USR1 32719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32719 killed at Thu Dec 26 14:36:26 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32758 >/dev/null 2>/dev/null selfserv_9525 with PID 32758 found at Thu Dec 26 14:36:26 UTC 2024 selfserv_9525 with PID 32758 started at Thu Dec 26 14:36:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32758 at Thu Dec 26 14:36:26 UTC 2024 kill -USR1 32758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32758 killed at Thu Dec 26 14:36:26 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32811 >/dev/null 2>/dev/null selfserv_9525 with PID 32811 found at Thu Dec 26 14:36:26 UTC 2024 selfserv_9525 with PID 32811 started at Thu Dec 26 14:36:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32811 at Thu Dec 26 14:36:26 UTC 2024 kill -USR1 32811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32811 killed at Thu Dec 26 14:36:26 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32850 >/dev/null 2>/dev/null selfserv_9525 with PID 32850 found at Thu Dec 26 14:36:26 UTC 2024 selfserv_9525 with PID 32850 started at Thu Dec 26 14:36:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32850 at Thu Dec 26 14:36:27 UTC 2024 kill -USR1 32850 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32850 killed at Thu Dec 26 14:36:27 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32889 >/dev/null 2>/dev/null selfserv_9525 with PID 32889 found at Thu Dec 26 14:36:27 UTC 2024 selfserv_9525 with PID 32889 started at Thu Dec 26 14:36:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32889 at Thu Dec 26 14:36:27 UTC 2024 kill -USR1 32889 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32889 killed at Thu Dec 26 14:36:27 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32942 >/dev/null 2>/dev/null selfserv_9525 with PID 32942 found at Thu Dec 26 14:36:27 UTC 2024 selfserv_9525 with PID 32942 started at Thu Dec 26 14:36:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 32942 at Thu Dec 26 14:36:27 UTC 2024 kill -USR1 32942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32942 killed at Thu Dec 26 14:36:27 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 32981 >/dev/null 2>/dev/null selfserv_9525 with PID 32981 found at Thu Dec 26 14:36:27 UTC 2024 selfserv_9525 with PID 32981 started at Thu Dec 26 14:36:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 32981 at Thu Dec 26 14:36:28 UTC 2024 kill -USR1 32981 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 32981 killed at Thu Dec 26 14:36:28 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33020 >/dev/null 2>/dev/null selfserv_9525 with PID 33020 found at Thu Dec 26 14:36:28 UTC 2024 selfserv_9525 with PID 33020 started at Thu Dec 26 14:36:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 33020 at Thu Dec 26 14:36:28 UTC 2024 kill -USR1 33020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33020 killed at Thu Dec 26 14:36:28 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33073 >/dev/null 2>/dev/null selfserv_9525 with PID 33073 found at Thu Dec 26 14:36:28 UTC 2024 selfserv_9525 with PID 33073 started at Thu Dec 26 14:36:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33073 at Thu Dec 26 14:36:28 UTC 2024 kill -USR1 33073 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33073 killed at Thu Dec 26 14:36:28 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33112 >/dev/null 2>/dev/null selfserv_9525 with PID 33112 found at Thu Dec 26 14:36:29 UTC 2024 selfserv_9525 with PID 33112 started at Thu Dec 26 14:36:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33112 at Thu Dec 26 14:36:29 UTC 2024 kill -USR1 33112 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33112 killed at Thu Dec 26 14:36:29 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33151 >/dev/null 2>/dev/null selfserv_9525 with PID 33151 found at Thu Dec 26 14:36:29 UTC 2024 selfserv_9525 with PID 33151 started at Thu Dec 26 14:36:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33151 at Thu Dec 26 14:36:29 UTC 2024 kill -USR1 33151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33151 killed at Thu Dec 26 14:36:29 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33204 >/dev/null 2>/dev/null selfserv_9525 with PID 33204 found at Thu Dec 26 14:36:29 UTC 2024 selfserv_9525 with PID 33204 started at Thu Dec 26 14:36:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33204 at Thu Dec 26 14:36:30 UTC 2024 kill -USR1 33204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33204 killed at Thu Dec 26 14:36:30 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33243 >/dev/null 2>/dev/null selfserv_9525 with PID 33243 found at Thu Dec 26 14:36:30 UTC 2024 selfserv_9525 with PID 33243 started at Thu Dec 26 14:36:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33243 at Thu Dec 26 14:36:30 UTC 2024 kill -USR1 33243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33243 killed at Thu Dec 26 14:36:30 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33282 >/dev/null 2>/dev/null selfserv_9525 with PID 33282 found at Thu Dec 26 14:36:30 UTC 2024 selfserv_9525 with PID 33282 started at Thu Dec 26 14:36:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33282 at Thu Dec 26 14:36:31 UTC 2024 kill -USR1 33282 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33282 killed at Thu Dec 26 14:36:31 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33335 >/dev/null 2>/dev/null selfserv_9525 with PID 33335 found at Thu Dec 26 14:36:31 UTC 2024 selfserv_9525 with PID 33335 started at Thu Dec 26 14:36:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33335 at Thu Dec 26 14:36:31 UTC 2024 kill -USR1 33335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33335 killed at Thu Dec 26 14:36:31 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33374 >/dev/null 2>/dev/null selfserv_9525 with PID 33374 found at Thu Dec 26 14:36:31 UTC 2024 selfserv_9525 with PID 33374 started at Thu Dec 26 14:36:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33374 at Thu Dec 26 14:36:31 UTC 2024 kill -USR1 33374 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33374 killed at Thu Dec 26 14:36:31 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33413 >/dev/null 2>/dev/null selfserv_9525 with PID 33413 found at Thu Dec 26 14:36:31 UTC 2024 selfserv_9525 with PID 33413 started at Thu Dec 26 14:36:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33413 at Thu Dec 26 14:36:32 UTC 2024 kill -USR1 33413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33413 killed at Thu Dec 26 14:36:32 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:32 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33466 >/dev/null 2>/dev/null selfserv_9525 with PID 33466 found at Thu Dec 26 14:36:32 UTC 2024 selfserv_9525 with PID 33466 started at Thu Dec 26 14:36:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33466 at Thu Dec 26 14:36:32 UTC 2024 kill -USR1 33466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33466 killed at Thu Dec 26 14:36:32 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:32 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33505 >/dev/null 2>/dev/null selfserv_9525 with PID 33505 found at Thu Dec 26 14:36:32 UTC 2024 selfserv_9525 with PID 33505 started at Thu Dec 26 14:36:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33505 at Thu Dec 26 14:36:33 UTC 2024 kill -USR1 33505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33505 killed at Thu Dec 26 14:36:33 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:33 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33544 >/dev/null 2>/dev/null selfserv_9525 with PID 33544 found at Thu Dec 26 14:36:33 UTC 2024 selfserv_9525 with PID 33544 started at Thu Dec 26 14:36:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33544 at Thu Dec 26 14:36:33 UTC 2024 kill -USR1 33544 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33544 killed at Thu Dec 26 14:36:33 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:33 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33597 >/dev/null 2>/dev/null selfserv_9525 with PID 33597 found at Thu Dec 26 14:36:33 UTC 2024 selfserv_9525 with PID 33597 started at Thu Dec 26 14:36:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33597 at Thu Dec 26 14:36:34 UTC 2024 kill -USR1 33597 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33597 killed at Thu Dec 26 14:36:34 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33636 >/dev/null 2>/dev/null selfserv_9525 with PID 33636 found at Thu Dec 26 14:36:34 UTC 2024 selfserv_9525 with PID 33636 started at Thu Dec 26 14:36:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33636 at Thu Dec 26 14:36:34 UTC 2024 kill -USR1 33636 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33636 killed at Thu Dec 26 14:36:34 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33675 >/dev/null 2>/dev/null selfserv_9525 with PID 33675 found at Thu Dec 26 14:36:34 UTC 2024 selfserv_9525 with PID 33675 started at Thu Dec 26 14:36:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33675 at Thu Dec 26 14:36:35 UTC 2024 kill -USR1 33675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33675 killed at Thu Dec 26 14:36:35 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:35 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33728 >/dev/null 2>/dev/null selfserv_9525 with PID 33728 found at Thu Dec 26 14:36:35 UTC 2024 selfserv_9525 with PID 33728 started at Thu Dec 26 14:36:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33728 at Thu Dec 26 14:36:35 UTC 2024 kill -USR1 33728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33728 killed at Thu Dec 26 14:36:35 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:35 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33767 >/dev/null 2>/dev/null selfserv_9525 with PID 33767 found at Thu Dec 26 14:36:35 UTC 2024 selfserv_9525 with PID 33767 started at Thu Dec 26 14:36:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 33767 at Thu Dec 26 14:36:36 UTC 2024 kill -USR1 33767 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33767 killed at Thu Dec 26 14:36:36 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:36 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33806 >/dev/null 2>/dev/null selfserv_9525 with PID 33806 found at Thu Dec 26 14:36:36 UTC 2024 selfserv_9525 with PID 33806 started at Thu Dec 26 14:36:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33806 at Thu Dec 26 14:36:36 UTC 2024 kill -USR1 33806 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33806 killed at Thu Dec 26 14:36:36 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:36 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33859 >/dev/null 2>/dev/null selfserv_9525 with PID 33859 found at Thu Dec 26 14:36:36 UTC 2024 selfserv_9525 with PID 33859 started at Thu Dec 26 14:36:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33859 at Thu Dec 26 14:36:37 UTC 2024 kill -USR1 33859 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33859 killed at Thu Dec 26 14:36:37 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33898 >/dev/null 2>/dev/null selfserv_9525 with PID 33898 found at Thu Dec 26 14:36:37 UTC 2024 selfserv_9525 with PID 33898 started at Thu Dec 26 14:36:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33898 at Thu Dec 26 14:36:37 UTC 2024 kill -USR1 33898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33898 killed at Thu Dec 26 14:36:37 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33937 >/dev/null 2>/dev/null selfserv_9525 with PID 33937 found at Thu Dec 26 14:36:37 UTC 2024 selfserv_9525 with PID 33937 started at Thu Dec 26 14:36:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33937 at Thu Dec 26 14:36:37 UTC 2024 kill -USR1 33937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33937 killed at Thu Dec 26 14:36:37 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 33990 >/dev/null 2>/dev/null selfserv_9525 with PID 33990 found at Thu Dec 26 14:36:38 UTC 2024 selfserv_9525 with PID 33990 started at Thu Dec 26 14:36:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 33990 at Thu Dec 26 14:36:38 UTC 2024 kill -USR1 33990 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 33990 killed at Thu Dec 26 14:36:38 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34029 >/dev/null 2>/dev/null selfserv_9525 with PID 34029 found at Thu Dec 26 14:36:38 UTC 2024 selfserv_9525 with PID 34029 started at Thu Dec 26 14:36:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34029 at Thu Dec 26 14:36:39 UTC 2024 kill -USR1 34029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34029 killed at Thu Dec 26 14:36:39 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34068 >/dev/null 2>/dev/null selfserv_9525 with PID 34068 found at Thu Dec 26 14:36:39 UTC 2024 selfserv_9525 with PID 34068 started at Thu Dec 26 14:36:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34068 at Thu Dec 26 14:36:39 UTC 2024 kill -USR1 34068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34068 killed at Thu Dec 26 14:36:39 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34121 >/dev/null 2>/dev/null selfserv_9525 with PID 34121 found at Thu Dec 26 14:36:39 UTC 2024 selfserv_9525 with PID 34121 started at Thu Dec 26 14:36:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34121 at Thu Dec 26 14:36:39 UTC 2024 kill -USR1 34121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34121 killed at Thu Dec 26 14:36:39 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34160 >/dev/null 2>/dev/null selfserv_9525 with PID 34160 found at Thu Dec 26 14:36:39 UTC 2024 selfserv_9525 with PID 34160 started at Thu Dec 26 14:36:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34160 at Thu Dec 26 14:36:40 UTC 2024 kill -USR1 34160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34160 killed at Thu Dec 26 14:36:40 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34199 >/dev/null 2>/dev/null selfserv_9525 with PID 34199 found at Thu Dec 26 14:36:40 UTC 2024 selfserv_9525 with PID 34199 started at Thu Dec 26 14:36:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34199 at Thu Dec 26 14:36:40 UTC 2024 kill -USR1 34199 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34199 killed at Thu Dec 26 14:36:40 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34252 >/dev/null 2>/dev/null selfserv_9525 with PID 34252 found at Thu Dec 26 14:36:40 UTC 2024 selfserv_9525 with PID 34252 started at Thu Dec 26 14:36:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34252 at Thu Dec 26 14:36:40 UTC 2024 kill -USR1 34252 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34252 killed at Thu Dec 26 14:36:40 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34291 >/dev/null 2>/dev/null selfserv_9525 with PID 34291 found at Thu Dec 26 14:36:41 UTC 2024 selfserv_9525 with PID 34291 started at Thu Dec 26 14:36:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34291 at Thu Dec 26 14:36:41 UTC 2024 kill -USR1 34291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34291 killed at Thu Dec 26 14:36:41 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34330 >/dev/null 2>/dev/null selfserv_9525 with PID 34330 found at Thu Dec 26 14:36:41 UTC 2024 selfserv_9525 with PID 34330 started at Thu Dec 26 14:36:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34330 at Thu Dec 26 14:36:41 UTC 2024 kill -USR1 34330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34330 killed at Thu Dec 26 14:36:41 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34383 >/dev/null 2>/dev/null selfserv_9525 with PID 34383 found at Thu Dec 26 14:36:41 UTC 2024 selfserv_9525 with PID 34383 started at Thu Dec 26 14:36:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34383 at Thu Dec 26 14:36:42 UTC 2024 kill -USR1 34383 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34383 killed at Thu Dec 26 14:36:42 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34422 >/dev/null 2>/dev/null selfserv_9525 with PID 34422 found at Thu Dec 26 14:36:42 UTC 2024 selfserv_9525 with PID 34422 started at Thu Dec 26 14:36:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34422 at Thu Dec 26 14:36:42 UTC 2024 kill -USR1 34422 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34422 killed at Thu Dec 26 14:36:42 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:36:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34461 >/dev/null 2>/dev/null selfserv_9525 with PID 34461 found at Thu Dec 26 14:36:42 UTC 2024 selfserv_9525 with PID 34461 started at Thu Dec 26 14:36:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34461 at Thu Dec 26 14:36:42 UTC 2024 kill -USR1 34461 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34461 killed at Thu Dec 26 14:36:42 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34514 >/dev/null 2>/dev/null selfserv_9525 with PID 34514 found at Thu Dec 26 14:36:42 UTC 2024 selfserv_9525 with PID 34514 started at Thu Dec 26 14:36:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34514 at Thu Dec 26 14:36:43 UTC 2024 kill -USR1 34514 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34514 killed at Thu Dec 26 14:36:43 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34553 >/dev/null 2>/dev/null selfserv_9525 with PID 34553 found at Thu Dec 26 14:36:43 UTC 2024 selfserv_9525 with PID 34553 started at Thu Dec 26 14:36:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34553 at Thu Dec 26 14:36:43 UTC 2024 kill -USR1 34553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34553 killed at Thu Dec 26 14:36:43 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34592 >/dev/null 2>/dev/null selfserv_9525 with PID 34592 found at Thu Dec 26 14:36:43 UTC 2024 selfserv_9525 with PID 34592 started at Thu Dec 26 14:36:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 34592 at Thu Dec 26 14:36:44 UTC 2024 kill -USR1 34592 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34592 killed at Thu Dec 26 14:36:44 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34645 >/dev/null 2>/dev/null selfserv_9525 with PID 34645 found at Thu Dec 26 14:36:44 UTC 2024 selfserv_9525 with PID 34645 started at Thu Dec 26 14:36:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34645 at Thu Dec 26 14:36:44 UTC 2024 kill -USR1 34645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34645 killed at Thu Dec 26 14:36:44 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34684 >/dev/null 2>/dev/null selfserv_9525 with PID 34684 found at Thu Dec 26 14:36:44 UTC 2024 selfserv_9525 with PID 34684 started at Thu Dec 26 14:36:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34684 at Thu Dec 26 14:36:45 UTC 2024 kill -USR1 34684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34684 killed at Thu Dec 26 14:36:45 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34723 >/dev/null 2>/dev/null selfserv_9525 with PID 34723 found at Thu Dec 26 14:36:45 UTC 2024 selfserv_9525 with PID 34723 started at Thu Dec 26 14:36:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34723 at Thu Dec 26 14:36:45 UTC 2024 kill -USR1 34723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34723 killed at Thu Dec 26 14:36:45 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34776 >/dev/null 2>/dev/null selfserv_9525 with PID 34776 found at Thu Dec 26 14:36:45 UTC 2024 selfserv_9525 with PID 34776 started at Thu Dec 26 14:36:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34776 at Thu Dec 26 14:36:45 UTC 2024 kill -USR1 34776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34776 killed at Thu Dec 26 14:36:45 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34815 >/dev/null 2>/dev/null selfserv_9525 with PID 34815 found at Thu Dec 26 14:36:46 UTC 2024 selfserv_9525 with PID 34815 started at Thu Dec 26 14:36:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34815 at Thu Dec 26 14:36:46 UTC 2024 kill -USR1 34815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34815 killed at Thu Dec 26 14:36:46 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:46 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34854 >/dev/null 2>/dev/null selfserv_9525 with PID 34854 found at Thu Dec 26 14:36:46 UTC 2024 selfserv_9525 with PID 34854 started at Thu Dec 26 14:36:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34854 at Thu Dec 26 14:36:46 UTC 2024 kill -USR1 34854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34854 killed at Thu Dec 26 14:36:46 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:36:46 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34907 >/dev/null 2>/dev/null selfserv_9525 with PID 34907 found at Thu Dec 26 14:36:46 UTC 2024 selfserv_9525 with PID 34907 started at Thu Dec 26 14:36:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #175: TLS 1.3 client certificate compression (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34907 at Thu Dec 26 14:36:47 UTC 2024 kill -USR1 34907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34907 killed at Thu Dec 26 14:36:47 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:36:47 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34946 >/dev/null 2>/dev/null selfserv_9525 with PID 34946 found at Thu Dec 26 14:36:47 UTC 2024 selfserv_9525 with PID 34946 started at Thu Dec 26 14:36:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #176: TLS 1.3 client certificate compression (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34946 at Thu Dec 26 14:36:47 UTC 2024 kill -USR1 34946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34946 killed at Thu Dec 26 14:36:47 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:36:47 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 34985 >/dev/null 2>/dev/null selfserv_9525 with PID 34985 found at Thu Dec 26 14:36:47 UTC 2024 selfserv_9525 with PID 34985 started at Thu Dec 26 14:36:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #177: TLS 1.3 client certificate compression (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 34985 at Thu Dec 26 14:36:47 UTC 2024 kill -USR1 34985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 34985 killed at Thu Dec 26 14:36:47 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:36:47 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 35038 >/dev/null 2>/dev/null selfserv_9525 with PID 35038 found at Thu Dec 26 14:36:47 UTC 2024 selfserv_9525 with PID 35038 started at Thu Dec 26 14:36:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #178: TLS 1.3 server certificate compression (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 35038 at Thu Dec 26 14:36:48 UTC 2024 kill -USR1 35038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 35038 killed at Thu Dec 26 14:36:48 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:36:48 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 35077 >/dev/null 2>/dev/null selfserv_9525 with PID 35077 found at Thu Dec 26 14:36:48 UTC 2024 selfserv_9525 with PID 35077 started at Thu Dec 26 14:36:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #179: TLS 1.3 server certificate compression (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 35077 at Thu Dec 26 14:36:48 UTC 2024 kill -USR1 35077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 35077 killed at Thu Dec 26 14:36:48 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:36:48 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 35116 >/dev/null 2>/dev/null selfserv_9525 with PID 35116 found at Thu Dec 26 14:36:48 UTC 2024 selfserv_9525 with PID 35116 started at Thu Dec 26 14:36:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #180: TLS 1.3 server certificate compression (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 35116 at Thu Dec 26 14:36:48 UTC 2024 kill -USR1 35116 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 35116 killed at Thu Dec 26 14:36:48 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:36:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 35169 >/dev/null 2>/dev/null selfserv_9525 with PID 35169 found at Thu Dec 26 14:36:49 UTC 2024 selfserv_9525 with PID 35169 started at Thu Dec 26 14:36:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #181: TLS 1.3 client/server certificate comlpression (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 35169 at Thu Dec 26 14:36:49 UTC 2024 kill -USR1 35169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 35169 killed at Thu Dec 26 14:36:49 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:36:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 35208 >/dev/null 2>/dev/null selfserv_9525 with PID 35208 found at Thu Dec 26 14:36:49 UTC 2024 selfserv_9525 with PID 35208 started at Thu Dec 26 14:36:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #182: TLS 1.3 client/server certificate comlpression (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 35208 at Thu Dec 26 14:36:49 UTC 2024 kill -USR1 35208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 35208 killed at Thu Dec 26 14:36:49 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:36:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 35247 >/dev/null 2>/dev/null selfserv_9525 with PID 35247 found at Thu Dec 26 14:36:49 UTC 2024 selfserv_9525 with PID 35247 started at Thu Dec 26 14:36:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #183: TLS 1.3 client/server certificate comlpression (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 35247 at Thu Dec 26 14:36:50 UTC 2024 kill -USR1 35247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 35247 killed at Thu Dec 26 14:36:50 UTC 2024 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9525 starting at Thu Dec 26 14:36:50 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:50 UTC 2024 selfserv_9525 with PID 35307 started at Thu Dec 26 14:36:50 UTC 2024 Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:50 UTC 2024 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:50 UTC 2024 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:51 UTC 2024 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:51 UTC 2024 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:51 UTC 2024 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:51 UTC 2024 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:51 UTC 2024 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:52 UTC 2024 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:52 UTC 2024 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:52 UTC 2024 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:52 UTC 2024 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:53 UTC 2024 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:53 UTC 2024 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:53 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:53 UTC 2024 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:54 UTC 2024 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:54 UTC 2024 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:54 UTC 2024 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:54 UTC 2024 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:54 UTC 2024 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:55 UTC 2024 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:55 UTC 2024 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:55 UTC 2024 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:55 UTC 2024 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:56 UTC 2024 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:56 UTC 2024 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:56 UTC 2024 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:56 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:57 UTC 2024 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:57 UTC 2024 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:57 UTC 2024 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:57 UTC 2024 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:57 UTC 2024 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:58 UTC 2024 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:58 UTC 2024 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:58 UTC 2024 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:58 UTC 2024 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:59 UTC 2024 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:59 UTC 2024 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:59 UTC 2024 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 35307 >/dev/null 2>/dev/null selfserv_9525 with PID 35307 found at Thu Dec 26 14:36:59 UTC 2024 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 35307 at Thu Dec 26 14:36:59 UTC 2024 kill -USR1 35307 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 35307 killed at Thu Dec 26 14:36:59 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:36:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:36:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:36:59 UTC 2024 selfserv_9525 with PID 36226 started at Thu Dec 26 14:36:59 UTC 2024 Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:00 UTC 2024 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:00 UTC 2024 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:00 UTC 2024 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:00 UTC 2024 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:00 UTC 2024 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:01 UTC 2024 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:01 UTC 2024 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:01 UTC 2024 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:01 UTC 2024 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:01 UTC 2024 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:02 UTC 2024 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:02 UTC 2024 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:02 UTC 2024 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:02 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:02 UTC 2024 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:03 UTC 2024 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:03 UTC 2024 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:03 UTC 2024 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:03 UTC 2024 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:03 UTC 2024 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:03 UTC 2024 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:04 UTC 2024 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:04 UTC 2024 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:04 UTC 2024 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:04 UTC 2024 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:04 UTC 2024 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:05 UTC 2024 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:05 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:05 UTC 2024 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:05 UTC 2024 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:05 UTC 2024 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:06 UTC 2024 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:06 UTC 2024 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:06 UTC 2024 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:06 UTC 2024 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:06 UTC 2024 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:06 UTC 2024 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:07 UTC 2024 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:07 UTC 2024 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:07 UTC 2024 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 36226 >/dev/null 2>/dev/null selfserv_9525 with PID 36226 found at Thu Dec 26 14:37:07 UTC 2024 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 36226 at Thu Dec 26 14:37:07 UTC 2024 kill -USR1 36226 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 36226 killed at Thu Dec 26 14:37:07 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:37:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:37:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:07 UTC 2024 selfserv_9525 with PID 37145 started at Thu Dec 26 14:37:07 UTC 2024 Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:08 UTC 2024 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:08 UTC 2024 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:08 UTC 2024 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:08 UTC 2024 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:08 UTC 2024 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:09 UTC 2024 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:09 UTC 2024 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:09 UTC 2024 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:09 UTC 2024 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:09 UTC 2024 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:10 UTC 2024 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:10 UTC 2024 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:10 UTC 2024 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:10 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:11 UTC 2024 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:11 UTC 2024 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:11 UTC 2024 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:11 UTC 2024 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:11 UTC 2024 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:11 UTC 2024 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:12 UTC 2024 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:12 UTC 2024 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:12 UTC 2024 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:12 UTC 2024 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:13 UTC 2024 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:13 UTC 2024 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:13 UTC 2024 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:13 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:13 UTC 2024 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:14 UTC 2024 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:14 UTC 2024 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:14 UTC 2024 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:14 UTC 2024 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:14 UTC 2024 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:15 UTC 2024 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:15 UTC 2024 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:15 UTC 2024 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:15 UTC 2024 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:15 UTC 2024 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:16 UTC 2024 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 37145 >/dev/null 2>/dev/null selfserv_9525 with PID 37145 found at Thu Dec 26 14:37:16 UTC 2024 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 37145 at Thu Dec 26 14:37:16 UTC 2024 kill -USR1 37145 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 37145 killed at Thu Dec 26 14:37:16 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:37:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:37:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:16 UTC 2024 selfserv_9525 with PID 38064 started at Thu Dec 26 14:37:16 UTC 2024 Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:16 UTC 2024 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:16 UTC 2024 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:17 UTC 2024 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:17 UTC 2024 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:17 UTC 2024 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:17 UTC 2024 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:17 UTC 2024 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:18 UTC 2024 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:18 UTC 2024 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:18 UTC 2024 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:18 UTC 2024 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:18 UTC 2024 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:19 UTC 2024 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:19 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:19 UTC 2024 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:19 UTC 2024 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:19 UTC 2024 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:20 UTC 2024 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:20 UTC 2024 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:20 UTC 2024 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:20 UTC 2024 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:20 UTC 2024 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:20 UTC 2024 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:21 UTC 2024 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:21 UTC 2024 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:21 UTC 2024 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:21 UTC 2024 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:21 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:22 UTC 2024 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:22 UTC 2024 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:22 UTC 2024 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:22 UTC 2024 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:22 UTC 2024 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:23 UTC 2024 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:23 UTC 2024 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:23 UTC 2024 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:23 UTC 2024 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:23 UTC 2024 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:24 UTC 2024 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:24 UTC 2024 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 38064 >/dev/null 2>/dev/null selfserv_9525 with PID 38064 found at Thu Dec 26 14:37:24 UTC 2024 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 38064 at Thu Dec 26 14:37:24 UTC 2024 kill -USR1 38064 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 38064 killed at Thu Dec 26 14:37:24 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:37:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:37:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 38983 >/dev/null 2>/dev/null selfserv_9525 with PID 38983 found at Thu Dec 26 14:37:24 UTC 2024 selfserv_9525 with PID 38983 started at Thu Dec 26 14:37:24 UTC 2024 trying to kill selfserv_9525 with PID 38983 at Thu Dec 26 14:37:24 UTC 2024 kill -USR1 38983 ./ssl.sh: line 213: 38983 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9525 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 38983 killed at Thu Dec 26 14:37:24 UTC 2024 selfserv_9525 starting at Thu Dec 26 14:37:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:37:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:24 UTC 2024 selfserv_9525 with PID 39015 started at Thu Dec 26 14:37:24 UTC 2024 Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:25 UTC 2024 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:25 UTC 2024 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:25 UTC 2024 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:25 UTC 2024 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:26 UTC 2024 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:26 UTC 2024 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:26 UTC 2024 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:27 UTC 2024 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:27 UTC 2024 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:27 UTC 2024 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:27 UTC 2024 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:28 UTC 2024 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:28 UTC 2024 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:28 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:29 UTC 2024 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:29 UTC 2024 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:29 UTC 2024 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:29 UTC 2024 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:30 UTC 2024 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:30 UTC 2024 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:30 UTC 2024 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:31 UTC 2024 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:31 UTC 2024 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:31 UTC 2024 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:31 UTC 2024 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:32 UTC 2024 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:32 UTC 2024 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:32 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:33 UTC 2024 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:33 UTC 2024 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:33 UTC 2024 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:33 UTC 2024 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:34 UTC 2024 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:34 UTC 2024 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:34 UTC 2024 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:35 UTC 2024 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:35 UTC 2024 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:35 UTC 2024 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:35 UTC 2024 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:36 UTC 2024 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39015 >/dev/null 2>/dev/null selfserv_9525 with PID 39015 found at Thu Dec 26 14:37:36 UTC 2024 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 39015 at Thu Dec 26 14:37:36 UTC 2024 kill -USR1 39015 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 39015 killed at Thu Dec 26 14:37:36 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:37:36 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:37:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:36 UTC 2024 selfserv_9525 with PID 39934 started at Thu Dec 26 14:37:36 UTC 2024 Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:37 UTC 2024 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:37 UTC 2024 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:37 UTC 2024 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:38 UTC 2024 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:38 UTC 2024 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:38 UTC 2024 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:39 UTC 2024 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:39 UTC 2024 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:39 UTC 2024 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:40 UTC 2024 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:40 UTC 2024 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:40 UTC 2024 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:41 UTC 2024 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:41 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:41 UTC 2024 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:42 UTC 2024 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:42 UTC 2024 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:43 UTC 2024 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:43 UTC 2024 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:43 UTC 2024 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:44 UTC 2024 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:44 UTC 2024 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:44 UTC 2024 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:45 UTC 2024 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:45 UTC 2024 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:45 UTC 2024 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:46 UTC 2024 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:46 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:46 UTC 2024 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:47 UTC 2024 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:47 UTC 2024 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:47 UTC 2024 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:48 UTC 2024 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:48 UTC 2024 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:48 UTC 2024 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:49 UTC 2024 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:49 UTC 2024 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:49 UTC 2024 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:50 UTC 2024 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:50 UTC 2024 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 39934 >/dev/null 2>/dev/null selfserv_9525 with PID 39934 found at Thu Dec 26 14:37:51 UTC 2024 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 39934 at Thu Dec 26 14:37:51 UTC 2024 kill -USR1 39934 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 39934 killed at Thu Dec 26 14:37:51 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:37:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:37:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:51 UTC 2024 selfserv_9525 with PID 40853 started at Thu Dec 26 14:37:51 UTC 2024 Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:51 UTC 2024 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:51 UTC 2024 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:51 UTC 2024 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:52 UTC 2024 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:52 UTC 2024 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:52 UTC 2024 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:52 UTC 2024 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:52 UTC 2024 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:53 UTC 2024 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:53 UTC 2024 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:53 UTC 2024 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:53 UTC 2024 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:53 UTC 2024 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:54 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:54 UTC 2024 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:54 UTC 2024 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:54 UTC 2024 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:55 UTC 2024 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:55 UTC 2024 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:55 UTC 2024 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:55 UTC 2024 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:55 UTC 2024 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:56 UTC 2024 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:56 UTC 2024 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:56 UTC 2024 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:56 UTC 2024 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:56 UTC 2024 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:57 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:57 UTC 2024 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:57 UTC 2024 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:57 UTC 2024 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:58 UTC 2024 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:58 UTC 2024 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:58 UTC 2024 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:58 UTC 2024 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:58 UTC 2024 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:59 UTC 2024 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:59 UTC 2024 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:59 UTC 2024 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:37:59 UTC 2024 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 40853 >/dev/null 2>/dev/null selfserv_9525 with PID 40853 found at Thu Dec 26 14:38:00 UTC 2024 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 40853 at Thu Dec 26 14:38:00 UTC 2024 kill -USR1 40853 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 40853 killed at Thu Dec 26 14:38:00 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:38:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:38:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:00 UTC 2024 selfserv_9525 with PID 41772 started at Thu Dec 26 14:38:00 UTC 2024 Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:00 UTC 2024 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:00 UTC 2024 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:01 UTC 2024 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:01 UTC 2024 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:01 UTC 2024 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:01 UTC 2024 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:02 UTC 2024 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:02 UTC 2024 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:02 UTC 2024 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:02 UTC 2024 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:03 UTC 2024 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:03 UTC 2024 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:03 UTC 2024 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:03 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:04 UTC 2024 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:04 UTC 2024 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:04 UTC 2024 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:04 UTC 2024 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:05 UTC 2024 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:05 UTC 2024 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:05 UTC 2024 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:05 UTC 2024 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:06 UTC 2024 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:06 UTC 2024 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:06 UTC 2024 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:07 UTC 2024 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:07 UTC 2024 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:07 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:07 UTC 2024 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:08 UTC 2024 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:08 UTC 2024 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:08 UTC 2024 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:08 UTC 2024 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:09 UTC 2024 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:09 UTC 2024 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:09 UTC 2024 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:09 UTC 2024 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:10 UTC 2024 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:10 UTC 2024 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:10 UTC 2024 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 41772 >/dev/null 2>/dev/null selfserv_9525 with PID 41772 found at Thu Dec 26 14:38:10 UTC 2024 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 41772 at Thu Dec 26 14:38:10 UTC 2024 kill -USR1 41772 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 41772 killed at Thu Dec 26 14:38:10 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:38:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:38:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:11 UTC 2024 selfserv_9525 with PID 42691 started at Thu Dec 26 14:38:11 UTC 2024 Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:11 UTC 2024 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:11 UTC 2024 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:12 UTC 2024 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:12 UTC 2024 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:12 UTC 2024 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:13 UTC 2024 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:13 UTC 2024 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:13 UTC 2024 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:14 UTC 2024 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:14 UTC 2024 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:14 UTC 2024 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:15 UTC 2024 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:15 UTC 2024 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:15 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:16 UTC 2024 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:16 UTC 2024 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:16 UTC 2024 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:17 UTC 2024 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:17 UTC 2024 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:17 UTC 2024 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:18 UTC 2024 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:18 UTC 2024 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:18 UTC 2024 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:18 UTC 2024 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:19 UTC 2024 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:19 UTC 2024 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:19 UTC 2024 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:20 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:20 UTC 2024 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:20 UTC 2024 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:21 UTC 2024 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:21 UTC 2024 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:21 UTC 2024 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:22 UTC 2024 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:22 UTC 2024 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:22 UTC 2024 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:23 UTC 2024 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:23 UTC 2024 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:23 UTC 2024 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:24 UTC 2024 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 42691 >/dev/null 2>/dev/null selfserv_9525 with PID 42691 found at Thu Dec 26 14:38:24 UTC 2024 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 42691 at Thu Dec 26 14:38:24 UTC 2024 kill -USR1 42691 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 42691 killed at Thu Dec 26 14:38:24 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:38:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:38:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:24 UTC 2024 selfserv_9525 with PID 43610 started at Thu Dec 26 14:38:24 UTC 2024 Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:24 UTC 2024 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:25 UTC 2024 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:25 UTC 2024 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:25 UTC 2024 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:25 UTC 2024 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:26 UTC 2024 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:26 UTC 2024 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:26 UTC 2024 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:26 UTC 2024 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:26 UTC 2024 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:27 UTC 2024 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:27 UTC 2024 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:27 UTC 2024 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:27 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:28 UTC 2024 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:28 UTC 2024 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:28 UTC 2024 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:28 UTC 2024 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:29 UTC 2024 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:29 UTC 2024 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:29 UTC 2024 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:29 UTC 2024 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:29 UTC 2024 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:30 UTC 2024 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:30 UTC 2024 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:30 UTC 2024 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:30 UTC 2024 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:31 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:31 UTC 2024 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:31 UTC 2024 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:31 UTC 2024 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:32 UTC 2024 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:32 UTC 2024 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:32 UTC 2024 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:32 UTC 2024 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:32 UTC 2024 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:33 UTC 2024 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:33 UTC 2024 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:33 UTC 2024 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:33 UTC 2024 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 43610 >/dev/null 2>/dev/null selfserv_9525 with PID 43610 found at Thu Dec 26 14:38:34 UTC 2024 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 43610 at Thu Dec 26 14:38:34 UTC 2024 kill -USR1 43610 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 43610 killed at Thu Dec 26 14:38:34 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:38:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:38:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 44529 >/dev/null 2>/dev/null selfserv_9525 with PID 44529 found at Thu Dec 26 14:38:34 UTC 2024 selfserv_9525 with PID 44529 started at Thu Dec 26 14:38:34 UTC 2024 trying to kill selfserv_9525 with PID 44529 at Thu Dec 26 14:38:34 UTC 2024 kill -USR1 44529 ./ssl.sh: line 213: 44529 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9525 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 44529 killed at Thu Dec 26 14:38:34 UTC 2024 selfserv_9525 starting at Thu Dec 26 14:38:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:38:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:34 UTC 2024 selfserv_9525 with PID 44561 started at Thu Dec 26 14:38:34 UTC 2024 Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:34 UTC 2024 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:34 UTC 2024 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:35 UTC 2024 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:35 UTC 2024 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:35 UTC 2024 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:36 UTC 2024 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:36 UTC 2024 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:36 UTC 2024 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:37 UTC 2024 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:37 UTC 2024 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:37 UTC 2024 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:37 UTC 2024 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:38 UTC 2024 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:38 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:38 UTC 2024 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:39 UTC 2024 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:39 UTC 2024 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:39 UTC 2024 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:39 UTC 2024 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:40 UTC 2024 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:40 UTC 2024 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:40 UTC 2024 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:41 UTC 2024 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:41 UTC 2024 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:41 UTC 2024 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:42 UTC 2024 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:42 UTC 2024 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:42 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:42 UTC 2024 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:43 UTC 2024 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:43 UTC 2024 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:43 UTC 2024 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:44 UTC 2024 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:44 UTC 2024 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:44 UTC 2024 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:45 UTC 2024 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:45 UTC 2024 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:45 UTC 2024 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:45 UTC 2024 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:46 UTC 2024 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 44561 >/dev/null 2>/dev/null selfserv_9525 with PID 44561 found at Thu Dec 26 14:38:46 UTC 2024 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 44561 at Thu Dec 26 14:38:46 UTC 2024 kill -USR1 44561 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 44561 killed at Thu Dec 26 14:38:46 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:38:46 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:38:46 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:46 UTC 2024 selfserv_9525 with PID 45480 started at Thu Dec 26 14:38:46 UTC 2024 Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:47 UTC 2024 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:47 UTC 2024 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:47 UTC 2024 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:48 UTC 2024 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:48 UTC 2024 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:48 UTC 2024 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:49 UTC 2024 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:49 UTC 2024 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:49 UTC 2024 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:50 UTC 2024 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:50 UTC 2024 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:51 UTC 2024 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:51 UTC 2024 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:51 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:52 UTC 2024 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:52 UTC 2024 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:52 UTC 2024 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:53 UTC 2024 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:53 UTC 2024 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:53 UTC 2024 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:54 UTC 2024 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:54 UTC 2024 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:54 UTC 2024 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:55 UTC 2024 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:55 UTC 2024 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:55 UTC 2024 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:56 UTC 2024 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:56 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:56 UTC 2024 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:57 UTC 2024 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:57 UTC 2024 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:58 UTC 2024 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:58 UTC 2024 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:58 UTC 2024 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:59 UTC 2024 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:59 UTC 2024 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:38:59 UTC 2024 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:39:00 UTC 2024 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:39:00 UTC 2024 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:39:00 UTC 2024 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 45480 >/dev/null 2>/dev/null selfserv_9525 with PID 45480 found at Thu Dec 26 14:39:01 UTC 2024 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 45480 at Thu Dec 26 14:39:01 UTC 2024 kill -USR1 45480 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 45480 killed at Thu Dec 26 14:39:01 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:39:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:01 UTC 2024 selfserv_9525 with PID 46399 started at Thu Dec 26 14:39:01 UTC 2024 Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:01 UTC 2024 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:01 UTC 2024 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:02 UTC 2024 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:02 UTC 2024 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:02 UTC 2024 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:02 UTC 2024 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:03 UTC 2024 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:03 UTC 2024 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:03 UTC 2024 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:03 UTC 2024 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:03 UTC 2024 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:04 UTC 2024 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:04 UTC 2024 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:04 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:04 UTC 2024 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:05 UTC 2024 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:05 UTC 2024 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:05 UTC 2024 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:05 UTC 2024 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:05 UTC 2024 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:06 UTC 2024 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:06 UTC 2024 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:06 UTC 2024 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:06 UTC 2024 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:06 UTC 2024 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:07 UTC 2024 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:07 UTC 2024 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:07 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:07 UTC 2024 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:08 UTC 2024 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:08 UTC 2024 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:08 UTC 2024 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:08 UTC 2024 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:08 UTC 2024 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:09 UTC 2024 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:09 UTC 2024 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:09 UTC 2024 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:09 UTC 2024 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:10 UTC 2024 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:10 UTC 2024 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 46399 >/dev/null 2>/dev/null selfserv_9525 with PID 46399 found at Thu Dec 26 14:39:10 UTC 2024 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 46399 at Thu Dec 26 14:39:10 UTC 2024 kill -USR1 46399 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 46399 killed at Thu Dec 26 14:39:10 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:39:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:10 UTC 2024 selfserv_9525 with PID 47318 started at Thu Dec 26 14:39:10 UTC 2024 Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:10 UTC 2024 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:11 UTC 2024 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:11 UTC 2024 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:11 UTC 2024 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:12 UTC 2024 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:12 UTC 2024 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:12 UTC 2024 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:12 UTC 2024 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:13 UTC 2024 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:13 UTC 2024 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:13 UTC 2024 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:13 UTC 2024 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:14 UTC 2024 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:14 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:14 UTC 2024 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:15 UTC 2024 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:15 UTC 2024 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:15 UTC 2024 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:15 UTC 2024 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:16 UTC 2024 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:16 UTC 2024 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:16 UTC 2024 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:16 UTC 2024 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:17 UTC 2024 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:17 UTC 2024 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:17 UTC 2024 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:17 UTC 2024 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:18 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:18 UTC 2024 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:18 UTC 2024 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:18 UTC 2024 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:19 UTC 2024 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:19 UTC 2024 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:19 UTC 2024 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:19 UTC 2024 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:20 UTC 2024 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:20 UTC 2024 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:20 UTC 2024 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:21 UTC 2024 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:21 UTC 2024 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 47318 >/dev/null 2>/dev/null selfserv_9525 with PID 47318 found at Thu Dec 26 14:39:21 UTC 2024 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 47318 at Thu Dec 26 14:39:21 UTC 2024 kill -USR1 47318 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 47318 killed at Thu Dec 26 14:39:21 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:39:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:21 UTC 2024 selfserv_9525 with PID 48237 started at Thu Dec 26 14:39:21 UTC 2024 Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:22 UTC 2024 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:22 UTC 2024 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:22 UTC 2024 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:23 UTC 2024 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:23 UTC 2024 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:23 UTC 2024 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:24 UTC 2024 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:24 UTC 2024 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:24 UTC 2024 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:24 UTC 2024 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:25 UTC 2024 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:25 UTC 2024 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:25 UTC 2024 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:26 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:26 UTC 2024 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:26 UTC 2024 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:27 UTC 2024 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:27 UTC 2024 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:27 UTC 2024 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:28 UTC 2024 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:28 UTC 2024 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:28 UTC 2024 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:29 UTC 2024 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:29 UTC 2024 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:29 UTC 2024 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:30 UTC 2024 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:30 UTC 2024 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:30 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:31 UTC 2024 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:31 UTC 2024 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:31 UTC 2024 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:31 UTC 2024 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:32 UTC 2024 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:32 UTC 2024 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:32 UTC 2024 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:33 UTC 2024 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:33 UTC 2024 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:33 UTC 2024 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:34 UTC 2024 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:34 UTC 2024 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 48237 >/dev/null 2>/dev/null selfserv_9525 with PID 48237 found at Thu Dec 26 14:39:34 UTC 2024 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 48237 at Thu Dec 26 14:39:34 UTC 2024 kill -USR1 48237 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 48237 killed at Thu Dec 26 14:39:34 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:39:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:34 UTC 2024 selfserv_9525 with PID 49156 started at Thu Dec 26 14:39:34 UTC 2024 Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:35 UTC 2024 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:35 UTC 2024 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:35 UTC 2024 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:35 UTC 2024 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:36 UTC 2024 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:36 UTC 2024 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:36 UTC 2024 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:36 UTC 2024 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:37 UTC 2024 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:37 UTC 2024 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:37 UTC 2024 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:37 UTC 2024 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:37 UTC 2024 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:38 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:38 UTC 2024 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:38 UTC 2024 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:38 UTC 2024 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:39 UTC 2024 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:39 UTC 2024 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:39 UTC 2024 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:39 UTC 2024 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:39 UTC 2024 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:40 UTC 2024 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:40 UTC 2024 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:40 UTC 2024 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:40 UTC 2024 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:41 UTC 2024 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time ssl_gtests subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:41 UTC 2024 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:41 UTC 2024 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:41 UTC 2024 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:41 UTC 2024 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:42 UTC 2024 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:42 UTC 2024 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:42 UTC 2024 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:42 UTC 2024 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:43 UTC 2024 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:43 UTC 2024 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:43 UTC 2024 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:43 UTC 2024 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:43 UTC 2024 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 49156 >/dev/null 2>/dev/null selfserv_9525 with PID 49156 found at Thu Dec 26 14:39:44 UTC 2024 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 49156 at Thu Dec 26 14:39:44 UTC 2024 kill -USR1 49156 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 49156 killed at Thu Dec 26 14:39:44 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:39:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 50075 >/dev/null 2>/dev/null selfserv_9525 with PID 50075 found at Thu Dec 26 14:39:44 UTC 2024 selfserv_9525 with PID 50075 started at Thu Dec 26 14:39:44 UTC 2024 trying to kill selfserv_9525 with PID 50075 at Thu Dec 26 14:39:44 UTC 2024 kill -USR1 50075 ./ssl.sh: line 213: 50075 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9525 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 50075 killed at Thu Dec 26 14:39:44 UTC 2024 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #657: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #658: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #659: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #660: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #661: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing ../server with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9525 starting at Thu Dec 26 14:39:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain -M 3 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 50165 >/dev/null 2>/dev/null selfserv_9525 with PID 50165 found at Thu Dec 26 14:39:44 UTC 2024 selfserv_9525 with PID 50165 started at Thu Dec 26 14:39:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #662: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 50165 at Thu Dec 26 14:39:44 UTC 2024 kill -USR1 50165 SIG_USER: Parent got sig_user, killing children (3). Child 3 exited with exit code 100 Child 2 exited with exit code 100 Child 1 exited with exit code 100 selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 50165 killed at Thu Dec 26 14:39:44 UTC 2024 ssl.sh: Check that OCSP doesn't break if we disable sha1 - server /client =============================== Error in function PR_GetHostByName: -5973 - A directory lookup on a network address has failed OCSP: RET=1 GRET=1 ssl.sh: skipping Check that OCSP doesn't break if we disable sha1 - server /client - can't reach external servers ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9525 starting at Thu Dec 26 14:39:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 50222 >/dev/null 2>/dev/null selfserv_9525 with PID 50222 found at Thu Dec 26 14:39:45 UTC 2024 selfserv_9525 with PID 50222 started at Thu Dec 26 14:39:45 UTC 2024 ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #663: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #664: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #665: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #666: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #667: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #668: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #669: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #670: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #671: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #672: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #673: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #674: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #675: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #676: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #677: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #678: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #679: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #680: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #681: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #682: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #683: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #684: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #685: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #686: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #687: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signature verification ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-verify library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #688: Restrict RSA keys on signature verification produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signing ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-sign library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #689: Restrict RSA keys on signing produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-ssl library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12226: SSL peer rejected a handshake message for unacceptable content. tstclnt: write to SSL socket failed: SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. ssl.sh: #690: Restrict RSA keys when used in SSL produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=1023 library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #691: Restrict RSA keys when used in SSL produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #692: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #693: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #694: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing ../client with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #695: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 50222 at Thu Dec 26 14:39:47 UTC 2024 kill -USR1 50222 selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 50222 killed at Thu Dec 26 14:39:47 UTC 2024 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9525 starting at Thu Dec 26 14:39:47 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:47 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 50685 >/dev/null 2>/dev/null selfserv_9525 with PID 50685 found at Thu Dec 26 14:39:47 UTC 2024 selfserv_9525 with PID 50685 started at Thu Dec 26 14:39:47 UTC 2024 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9525 with PID 50685 at Thu Dec 26 14:39:52 UTC 2024 kill -USR1 50685 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 50685 killed at Thu Dec 26 14:39:52 UTC 2024 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9525 starting at Thu Dec 26 14:39:52 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:39:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 51172 >/dev/null 2>/dev/null selfserv_9525 with PID 51172 found at Thu Dec 26 14:39:52 UTC 2024 selfserv_9525 with PID 51172 started at Thu Dec 26 14:39:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 51172 at Thu Dec 26 14:40:01 UTC 2024 kill -USR1 51172 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 51172 killed at Thu Dec 26 14:40:01 UTC 2024 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9525 starting at Thu Dec 26 14:40:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 51883 >/dev/null 2>/dev/null selfserv_9525 with PID 51883 found at Thu Dec 26 14:40:01 UTC 2024 selfserv_9525 with PID 51883 started at Thu Dec 26 14:40:01 UTC 2024 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 51883 at Thu Dec 26 14:40:01 UTC 2024 kill -USR1 51883 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 51883 killed at Thu Dec 26 14:40:01 UTC 2024 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 51937 >/dev/null 2>/dev/null selfserv_9525 with PID 51937 found at Thu Dec 26 14:40:01 UTC 2024 selfserv_9525 with PID 51937 started at Thu Dec 26 14:40:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 51937 at Thu Dec 26 14:40:01 UTC 2024 kill -USR1 51937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 51937 killed at Thu Dec 26 14:40:01 UTC 2024 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 51978 >/dev/null 2>/dev/null selfserv_9525 with PID 51978 found at Thu Dec 26 14:40:01 UTC 2024 selfserv_9525 with PID 51978 started at Thu Dec 26 14:40:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 51978 at Thu Dec 26 14:40:02 UTC 2024 kill -USR1 51978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 51978 killed at Thu Dec 26 14:40:02 UTC 2024 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52019 >/dev/null 2>/dev/null selfserv_9525 with PID 52019 found at Thu Dec 26 14:40:02 UTC 2024 selfserv_9525 with PID 52019 started at Thu Dec 26 14:40:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52019 at Thu Dec 26 14:40:02 UTC 2024 kill -USR1 52019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52019 killed at Thu Dec 26 14:40:02 UTC 2024 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52060 >/dev/null 2>/dev/null selfserv_9525 with PID 52060 found at Thu Dec 26 14:40:02 UTC 2024 selfserv_9525 with PID 52060 started at Thu Dec 26 14:40:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52060 at Thu Dec 26 14:40:02 UTC 2024 kill -USR1 52060 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52060 killed at Thu Dec 26 14:40:02 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52101 >/dev/null 2>/dev/null selfserv_9525 with PID 52101 found at Thu Dec 26 14:40:03 UTC 2024 selfserv_9525 with PID 52101 started at Thu Dec 26 14:40:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52101 at Thu Dec 26 14:40:03 UTC 2024 kill -USR1 52101 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52101 killed at Thu Dec 26 14:40:03 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52142 >/dev/null 2>/dev/null selfserv_9525 with PID 52142 found at Thu Dec 26 14:40:03 UTC 2024 selfserv_9525 with PID 52142 started at Thu Dec 26 14:40:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52142 at Thu Dec 26 14:40:03 UTC 2024 kill -USR1 52142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52142 killed at Thu Dec 26 14:40:03 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52183 >/dev/null 2>/dev/null selfserv_9525 with PID 52183 found at Thu Dec 26 14:40:03 UTC 2024 selfserv_9525 with PID 52183 started at Thu Dec 26 14:40:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52183 at Thu Dec 26 14:40:04 UTC 2024 kill -USR1 52183 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52183 killed at Thu Dec 26 14:40:04 UTC 2024 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52224 >/dev/null 2>/dev/null selfserv_9525 with PID 52224 found at Thu Dec 26 14:40:04 UTC 2024 selfserv_9525 with PID 52224 started at Thu Dec 26 14:40:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52224 at Thu Dec 26 14:40:04 UTC 2024 kill -USR1 52224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52224 killed at Thu Dec 26 14:40:04 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52265 >/dev/null 2>/dev/null selfserv_9525 with PID 52265 found at Thu Dec 26 14:40:04 UTC 2024 selfserv_9525 with PID 52265 started at Thu Dec 26 14:40:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52265 at Thu Dec 26 14:40:04 UTC 2024 kill -USR1 52265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52265 killed at Thu Dec 26 14:40:04 UTC 2024 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52306 >/dev/null 2>/dev/null selfserv_9525 with PID 52306 found at Thu Dec 26 14:40:04 UTC 2024 selfserv_9525 with PID 52306 started at Thu Dec 26 14:40:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52306 at Thu Dec 26 14:40:05 UTC 2024 kill -USR1 52306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52306 killed at Thu Dec 26 14:40:05 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52347 >/dev/null 2>/dev/null selfserv_9525 with PID 52347 found at Thu Dec 26 14:40:05 UTC 2024 selfserv_9525 with PID 52347 started at Thu Dec 26 14:40:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52347 at Thu Dec 26 14:40:05 UTC 2024 kill -USR1 52347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52347 killed at Thu Dec 26 14:40:05 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52388 >/dev/null 2>/dev/null selfserv_9525 with PID 52388 found at Thu Dec 26 14:40:05 UTC 2024 selfserv_9525 with PID 52388 started at Thu Dec 26 14:40:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52388 at Thu Dec 26 14:40:05 UTC 2024 kill -USR1 52388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52388 killed at Thu Dec 26 14:40:05 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52429 >/dev/null 2>/dev/null selfserv_9525 with PID 52429 found at Thu Dec 26 14:40:05 UTC 2024 selfserv_9525 with PID 52429 started at Thu Dec 26 14:40:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52429 at Thu Dec 26 14:40:06 UTC 2024 kill -USR1 52429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52429 killed at Thu Dec 26 14:40:06 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52470 >/dev/null 2>/dev/null selfserv_9525 with PID 52470 found at Thu Dec 26 14:40:06 UTC 2024 selfserv_9525 with PID 52470 started at Thu Dec 26 14:40:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52470 at Thu Dec 26 14:40:06 UTC 2024 kill -USR1 52470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52470 killed at Thu Dec 26 14:40:06 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52511 >/dev/null 2>/dev/null selfserv_9525 with PID 52511 found at Thu Dec 26 14:40:06 UTC 2024 selfserv_9525 with PID 52511 started at Thu Dec 26 14:40:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52511 at Thu Dec 26 14:40:06 UTC 2024 kill -USR1 52511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52511 killed at Thu Dec 26 14:40:07 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52552 >/dev/null 2>/dev/null selfserv_9525 with PID 52552 found at Thu Dec 26 14:40:07 UTC 2024 selfserv_9525 with PID 52552 started at Thu Dec 26 14:40:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52552 at Thu Dec 26 14:40:07 UTC 2024 kill -USR1 52552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52552 killed at Thu Dec 26 14:40:07 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52593 >/dev/null 2>/dev/null selfserv_9525 with PID 52593 found at Thu Dec 26 14:40:07 UTC 2024 selfserv_9525 with PID 52593 started at Thu Dec 26 14:40:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52593 at Thu Dec 26 14:40:07 UTC 2024 kill -USR1 52593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52593 killed at Thu Dec 26 14:40:07 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52634 >/dev/null 2>/dev/null selfserv_9525 with PID 52634 found at Thu Dec 26 14:40:07 UTC 2024 selfserv_9525 with PID 52634 started at Thu Dec 26 14:40:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52634 at Thu Dec 26 14:40:08 UTC 2024 kill -USR1 52634 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52634 killed at Thu Dec 26 14:40:08 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52675 >/dev/null 2>/dev/null selfserv_9525 with PID 52675 found at Thu Dec 26 14:40:08 UTC 2024 selfserv_9525 with PID 52675 started at Thu Dec 26 14:40:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52675 at Thu Dec 26 14:40:08 UTC 2024 kill -USR1 52675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52675 killed at Thu Dec 26 14:40:08 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52716 >/dev/null 2>/dev/null selfserv_9525 with PID 52716 found at Thu Dec 26 14:40:08 UTC 2024 selfserv_9525 with PID 52716 started at Thu Dec 26 14:40:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52716 at Thu Dec 26 14:40:09 UTC 2024 kill -USR1 52716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52716 killed at Thu Dec 26 14:40:09 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52757 >/dev/null 2>/dev/null selfserv_9525 with PID 52757 found at Thu Dec 26 14:40:09 UTC 2024 selfserv_9525 with PID 52757 started at Thu Dec 26 14:40:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52757 at Thu Dec 26 14:40:09 UTC 2024 kill -USR1 52757 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52757 killed at Thu Dec 26 14:40:09 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52798 >/dev/null 2>/dev/null selfserv_9525 with PID 52798 found at Thu Dec 26 14:40:09 UTC 2024 selfserv_9525 with PID 52798 started at Thu Dec 26 14:40:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52798 at Thu Dec 26 14:40:10 UTC 2024 kill -USR1 52798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52798 killed at Thu Dec 26 14:40:10 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52839 >/dev/null 2>/dev/null selfserv_9525 with PID 52839 found at Thu Dec 26 14:40:10 UTC 2024 selfserv_9525 with PID 52839 started at Thu Dec 26 14:40:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 52839 at Thu Dec 26 14:40:10 UTC 2024 kill -USR1 52839 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52839 killed at Thu Dec 26 14:40:10 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52880 >/dev/null 2>/dev/null selfserv_9525 with PID 52880 found at Thu Dec 26 14:40:10 UTC 2024 selfserv_9525 with PID 52880 started at Thu Dec 26 14:40:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52880 at Thu Dec 26 14:40:11 UTC 2024 kill -USR1 52880 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52880 killed at Thu Dec 26 14:40:11 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52921 >/dev/null 2>/dev/null selfserv_9525 with PID 52921 found at Thu Dec 26 14:40:11 UTC 2024 selfserv_9525 with PID 52921 started at Thu Dec 26 14:40:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52921 at Thu Dec 26 14:40:11 UTC 2024 kill -USR1 52921 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52921 killed at Thu Dec 26 14:40:11 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 52962 >/dev/null 2>/dev/null selfserv_9525 with PID 52962 found at Thu Dec 26 14:40:11 UTC 2024 selfserv_9525 with PID 52962 started at Thu Dec 26 14:40:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 52962 at Thu Dec 26 14:40:12 UTC 2024 kill -USR1 52962 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 52962 killed at Thu Dec 26 14:40:12 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53003 >/dev/null 2>/dev/null selfserv_9525 with PID 53003 found at Thu Dec 26 14:40:12 UTC 2024 selfserv_9525 with PID 53003 started at Thu Dec 26 14:40:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53003 at Thu Dec 26 14:40:12 UTC 2024 kill -USR1 53003 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53003 killed at Thu Dec 26 14:40:12 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53044 >/dev/null 2>/dev/null selfserv_9525 with PID 53044 found at Thu Dec 26 14:40:12 UTC 2024 selfserv_9525 with PID 53044 started at Thu Dec 26 14:40:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #817: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 53044 at Thu Dec 26 14:40:12 UTC 2024 kill -USR1 53044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53044 killed at Thu Dec 26 14:40:12 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53085 >/dev/null 2>/dev/null selfserv_9525 with PID 53085 found at Thu Dec 26 14:40:12 UTC 2024 selfserv_9525 with PID 53085 started at Thu Dec 26 14:40:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #818: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 53085 at Thu Dec 26 14:40:13 UTC 2024 kill -USR1 53085 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53085 killed at Thu Dec 26 14:40:13 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53126 >/dev/null 2>/dev/null selfserv_9525 with PID 53126 found at Thu Dec 26 14:40:13 UTC 2024 selfserv_9525 with PID 53126 started at Thu Dec 26 14:40:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53126 at Thu Dec 26 14:40:13 UTC 2024 kill -USR1 53126 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53126 killed at Thu Dec 26 14:40:13 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53167 >/dev/null 2>/dev/null selfserv_9525 with PID 53167 found at Thu Dec 26 14:40:13 UTC 2024 selfserv_9525 with PID 53167 started at Thu Dec 26 14:40:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53167 at Thu Dec 26 14:40:13 UTC 2024 kill -USR1 53167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53167 killed at Thu Dec 26 14:40:13 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53208 >/dev/null 2>/dev/null selfserv_9525 with PID 53208 found at Thu Dec 26 14:40:13 UTC 2024 selfserv_9525 with PID 53208 started at Thu Dec 26 14:40:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53208 at Thu Dec 26 14:40:14 UTC 2024 kill -USR1 53208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53208 killed at Thu Dec 26 14:40:14 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53249 >/dev/null 2>/dev/null selfserv_9525 with PID 53249 found at Thu Dec 26 14:40:14 UTC 2024 selfserv_9525 with PID 53249 started at Thu Dec 26 14:40:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53249 at Thu Dec 26 14:40:14 UTC 2024 kill -USR1 53249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53249 killed at Thu Dec 26 14:40:14 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53290 >/dev/null 2>/dev/null selfserv_9525 with PID 53290 found at Thu Dec 26 14:40:14 UTC 2024 selfserv_9525 with PID 53290 started at Thu Dec 26 14:40:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #823: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 53290 at Thu Dec 26 14:40:14 UTC 2024 kill -USR1 53290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53290 killed at Thu Dec 26 14:40:14 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53331 >/dev/null 2>/dev/null selfserv_9525 with PID 53331 found at Thu Dec 26 14:40:15 UTC 2024 selfserv_9525 with PID 53331 started at Thu Dec 26 14:40:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53331 at Thu Dec 26 14:40:15 UTC 2024 kill -USR1 53331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53331 killed at Thu Dec 26 14:40:15 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53372 >/dev/null 2>/dev/null selfserv_9525 with PID 53372 found at Thu Dec 26 14:40:15 UTC 2024 selfserv_9525 with PID 53372 started at Thu Dec 26 14:40:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53372 at Thu Dec 26 14:40:15 UTC 2024 kill -USR1 53372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53372 killed at Thu Dec 26 14:40:15 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53413 >/dev/null 2>/dev/null selfserv_9525 with PID 53413 found at Thu Dec 26 14:40:15 UTC 2024 selfserv_9525 with PID 53413 started at Thu Dec 26 14:40:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53413 at Thu Dec 26 14:40:16 UTC 2024 kill -USR1 53413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53413 killed at Thu Dec 26 14:40:16 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53454 >/dev/null 2>/dev/null selfserv_9525 with PID 53454 found at Thu Dec 26 14:40:16 UTC 2024 selfserv_9525 with PID 53454 started at Thu Dec 26 14:40:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53454 at Thu Dec 26 14:40:16 UTC 2024 kill -USR1 53454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53454 killed at Thu Dec 26 14:40:16 UTC 2024 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53495 >/dev/null 2>/dev/null selfserv_9525 with PID 53495 found at Thu Dec 26 14:40:16 UTC 2024 selfserv_9525 with PID 53495 started at Thu Dec 26 14:40:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #828: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 53495 at Thu Dec 26 14:40:16 UTC 2024 kill -USR1 53495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53495 killed at Thu Dec 26 14:40:16 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53536 >/dev/null 2>/dev/null selfserv_9525 with PID 53536 found at Thu Dec 26 14:40:16 UTC 2024 selfserv_9525 with PID 53536 started at Thu Dec 26 14:40:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53536 at Thu Dec 26 14:40:17 UTC 2024 kill -USR1 53536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53536 killed at Thu Dec 26 14:40:17 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53577 >/dev/null 2>/dev/null selfserv_9525 with PID 53577 found at Thu Dec 26 14:40:17 UTC 2024 selfserv_9525 with PID 53577 started at Thu Dec 26 14:40:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53577 at Thu Dec 26 14:40:17 UTC 2024 kill -USR1 53577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53577 killed at Thu Dec 26 14:40:17 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53618 >/dev/null 2>/dev/null selfserv_9525 with PID 53618 found at Thu Dec 26 14:40:17 UTC 2024 selfserv_9525 with PID 53618 started at Thu Dec 26 14:40:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53618 at Thu Dec 26 14:40:17 UTC 2024 kill -USR1 53618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53618 killed at Thu Dec 26 14:40:17 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53659 >/dev/null 2>/dev/null selfserv_9525 with PID 53659 found at Thu Dec 26 14:40:18 UTC 2024 selfserv_9525 with PID 53659 started at Thu Dec 26 14:40:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #832: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 53659 at Thu Dec 26 14:40:18 UTC 2024 kill -USR1 53659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53659 killed at Thu Dec 26 14:40:18 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53700 >/dev/null 2>/dev/null selfserv_9525 with PID 53700 found at Thu Dec 26 14:40:18 UTC 2024 selfserv_9525 with PID 53700 started at Thu Dec 26 14:40:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53700 at Thu Dec 26 14:40:18 UTC 2024 kill -USR1 53700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53700 killed at Thu Dec 26 14:40:18 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53741 >/dev/null 2>/dev/null selfserv_9525 with PID 53741 found at Thu Dec 26 14:40:18 UTC 2024 selfserv_9525 with PID 53741 started at Thu Dec 26 14:40:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53741 at Thu Dec 26 14:40:19 UTC 2024 kill -USR1 53741 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53741 killed at Thu Dec 26 14:40:19 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53782 >/dev/null 2>/dev/null selfserv_9525 with PID 53782 found at Thu Dec 26 14:40:19 UTC 2024 selfserv_9525 with PID 53782 started at Thu Dec 26 14:40:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53782 at Thu Dec 26 14:40:19 UTC 2024 kill -USR1 53782 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53782 killed at Thu Dec 26 14:40:19 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53823 >/dev/null 2>/dev/null selfserv_9525 with PID 53823 found at Thu Dec 26 14:40:19 UTC 2024 selfserv_9525 with PID 53823 started at Thu Dec 26 14:40:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #836: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 53823 at Thu Dec 26 14:40:19 UTC 2024 kill -USR1 53823 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53823 killed at Thu Dec 26 14:40:19 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53864 >/dev/null 2>/dev/null selfserv_9525 with PID 53864 found at Thu Dec 26 14:40:20 UTC 2024 selfserv_9525 with PID 53864 started at Thu Dec 26 14:40:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53864 at Thu Dec 26 14:40:20 UTC 2024 kill -USR1 53864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53864 killed at Thu Dec 26 14:40:20 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53905 >/dev/null 2>/dev/null selfserv_9525 with PID 53905 found at Thu Dec 26 14:40:20 UTC 2024 selfserv_9525 with PID 53905 started at Thu Dec 26 14:40:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53905 at Thu Dec 26 14:40:20 UTC 2024 kill -USR1 53905 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53905 killed at Thu Dec 26 14:40:20 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53946 >/dev/null 2>/dev/null selfserv_9525 with PID 53946 found at Thu Dec 26 14:40:20 UTC 2024 selfserv_9525 with PID 53946 started at Thu Dec 26 14:40:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 53946 at Thu Dec 26 14:40:21 UTC 2024 kill -USR1 53946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53946 killed at Thu Dec 26 14:40:21 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 53987 >/dev/null 2>/dev/null selfserv_9525 with PID 53987 found at Thu Dec 26 14:40:21 UTC 2024 selfserv_9525 with PID 53987 started at Thu Dec 26 14:40:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #840: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 53987 at Thu Dec 26 14:40:21 UTC 2024 kill -USR1 53987 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 53987 killed at Thu Dec 26 14:40:21 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54028 >/dev/null 2>/dev/null selfserv_9525 with PID 54028 found at Thu Dec 26 14:40:21 UTC 2024 selfserv_9525 with PID 54028 started at Thu Dec 26 14:40:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54028 at Thu Dec 26 14:40:22 UTC 2024 kill -USR1 54028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54028 killed at Thu Dec 26 14:40:22 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54069 >/dev/null 2>/dev/null selfserv_9525 with PID 54069 found at Thu Dec 26 14:40:22 UTC 2024 selfserv_9525 with PID 54069 started at Thu Dec 26 14:40:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54069 at Thu Dec 26 14:40:22 UTC 2024 kill -USR1 54069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54069 killed at Thu Dec 26 14:40:22 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54110 >/dev/null 2>/dev/null selfserv_9525 with PID 54110 found at Thu Dec 26 14:40:22 UTC 2024 selfserv_9525 with PID 54110 started at Thu Dec 26 14:40:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54110 at Thu Dec 26 14:40:23 UTC 2024 kill -USR1 54110 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54110 killed at Thu Dec 26 14:40:23 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:40:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54151 >/dev/null 2>/dev/null selfserv_9525 with PID 54151 found at Thu Dec 26 14:40:23 UTC 2024 selfserv_9525 with PID 54151 started at Thu Dec 26 14:40:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #844: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 54151 at Thu Dec 26 14:40:23 UTC 2024 kill -USR1 54151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54151 killed at Thu Dec 26 14:40:23 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54192 >/dev/null 2>/dev/null selfserv_9525 with PID 54192 found at Thu Dec 26 14:40:23 UTC 2024 selfserv_9525 with PID 54192 started at Thu Dec 26 14:40:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54192 at Thu Dec 26 14:40:23 UTC 2024 kill -USR1 54192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54192 killed at Thu Dec 26 14:40:23 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54233 >/dev/null 2>/dev/null selfserv_9525 with PID 54233 found at Thu Dec 26 14:40:24 UTC 2024 selfserv_9525 with PID 54233 started at Thu Dec 26 14:40:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54233 at Thu Dec 26 14:40:24 UTC 2024 kill -USR1 54233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54233 killed at Thu Dec 26 14:40:24 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54274 >/dev/null 2>/dev/null selfserv_9525 with PID 54274 found at Thu Dec 26 14:40:24 UTC 2024 selfserv_9525 with PID 54274 started at Thu Dec 26 14:40:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54274 at Thu Dec 26 14:40:24 UTC 2024 kill -USR1 54274 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54274 killed at Thu Dec 26 14:40:24 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:40:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54315 >/dev/null 2>/dev/null selfserv_9525 with PID 54315 found at Thu Dec 26 14:40:24 UTC 2024 selfserv_9525 with PID 54315 started at Thu Dec 26 14:40:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS 1.3 client certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54315 at Thu Dec 26 14:40:25 UTC 2024 kill -USR1 54315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54315 killed at Thu Dec 26 14:40:25 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:40:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54356 >/dev/null 2>/dev/null selfserv_9525 with PID 54356 found at Thu Dec 26 14:40:25 UTC 2024 selfserv_9525 with PID 54356 started at Thu Dec 26 14:40:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS 1.3 server certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54356 at Thu Dec 26 14:40:25 UTC 2024 kill -USR1 54356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54356 killed at Thu Dec 26 14:40:25 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:40:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54397 >/dev/null 2>/dev/null selfserv_9525 with PID 54397 found at Thu Dec 26 14:40:25 UTC 2024 selfserv_9525 with PID 54397 started at Thu Dec 26 14:40:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #850: TLS 1.3 client/server certificate comlpression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54397 at Thu Dec 26 14:40:25 UTC 2024 kill -USR1 54397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54397 killed at Thu Dec 26 14:40:25 UTC 2024 ssl.sh: TLS Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:40:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54444 >/dev/null 2>/dev/null selfserv_9525 with PID 54444 found at Thu Dec 26 14:40:26 UTC 2024 selfserv_9525 with PID 54444 started at Thu Dec 26 14:40:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54444 at Thu Dec 26 14:40:26 UTC 2024 kill -USR1 54444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54444 killed at Thu Dec 26 14:40:26 UTC 2024 ssl.sh: TLS Server hello response with SNI ---- selfserv_9525 starting at Thu Dec 26 14:40:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54491 >/dev/null 2>/dev/null selfserv_9525 with PID 54491 found at Thu Dec 26 14:40:26 UTC 2024 selfserv_9525 with PID 54491 started at Thu Dec 26 14:40:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #852: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54491 at Thu Dec 26 14:40:26 UTC 2024 kill -USR1 54491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54491 killed at Thu Dec 26 14:40:26 UTC 2024 ssl.sh: TLS Server response with alert ---- selfserv_9525 starting at Thu Dec 26 14:40:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54538 >/dev/null 2>/dev/null selfserv_9525 with PID 54538 found at Thu Dec 26 14:40:26 UTC 2024 selfserv_9525 with PID 54538 started at Thu Dec 26 14:40:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #853: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 54538 at Thu Dec 26 14:40:26 UTC 2024 kill -USR1 54538 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54538 killed at Thu Dec 26 14:40:26 UTC 2024 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:40:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54585 >/dev/null 2>/dev/null selfserv_9525 with PID 54585 found at Thu Dec 26 14:40:27 UTC 2024 selfserv_9525 with PID 54585 started at Thu Dec 26 14:40:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54585 at Thu Dec 26 14:40:27 UTC 2024 kill -USR1 54585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54585 killed at Thu Dec 26 14:40:27 UTC 2024 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9525 starting at Thu Dec 26 14:40:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54632 >/dev/null 2>/dev/null selfserv_9525 with PID 54632 found at Thu Dec 26 14:40:27 UTC 2024 selfserv_9525 with PID 54632 started at Thu Dec 26 14:40:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #855: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 54632 at Thu Dec 26 14:40:27 UTC 2024 kill -USR1 54632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54632 killed at Thu Dec 26 14:40:27 UTC 2024 ssl.sh: TLS Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:40:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54679 >/dev/null 2>/dev/null selfserv_9525 with PID 54679 found at Thu Dec 26 14:40:27 UTC 2024 selfserv_9525 with PID 54679 started at Thu Dec 26 14:40:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #856: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54679 at Thu Dec 26 14:40:28 UTC 2024 kill -USR1 54679 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54679 killed at Thu Dec 26 14:40:28 UTC 2024 ssl.sh: TLS Server hello response with SNI ---- selfserv_9525 starting at Thu Dec 26 14:40:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54726 >/dev/null 2>/dev/null selfserv_9525 with PID 54726 found at Thu Dec 26 14:40:28 UTC 2024 selfserv_9525 with PID 54726 started at Thu Dec 26 14:40:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #857: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54726 at Thu Dec 26 14:40:28 UTC 2024 kill -USR1 54726 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54726 killed at Thu Dec 26 14:40:28 UTC 2024 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9525 starting at Thu Dec 26 14:40:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54773 >/dev/null 2>/dev/null selfserv_9525 with PID 54773 found at Thu Dec 26 14:40:28 UTC 2024 selfserv_9525 with PID 54773 started at Thu Dec 26 14:40:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #858: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 54773 at Thu Dec 26 14:40:28 UTC 2024 kill -USR1 54773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54773 killed at Thu Dec 26 14:40:28 UTC 2024 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9525 starting at Thu Dec 26 14:40:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54820 >/dev/null 2>/dev/null selfserv_9525 with PID 54820 found at Thu Dec 26 14:40:29 UTC 2024 selfserv_9525 with PID 54820 started at Thu Dec 26 14:40:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #859: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 54820 at Thu Dec 26 14:40:29 UTC 2024 kill -USR1 54820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54820 killed at Thu Dec 26 14:40:29 UTC 2024 ssl.sh: TLS Server response with alert ---- selfserv_9525 starting at Thu Dec 26 14:40:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54867 >/dev/null 2>/dev/null selfserv_9525 with PID 54867 found at Thu Dec 26 14:40:29 UTC 2024 selfserv_9525 with PID 54867 started at Thu Dec 26 14:40:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #860: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 54867 at Thu Dec 26 14:40:29 UTC 2024 kill -USR1 54867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54867 killed at Thu Dec 26 14:40:29 UTC 2024 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9525 starting at Thu Dec 26 14:40:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54898 >/dev/null 2>/dev/null selfserv_9525 with PID 54898 found at Thu Dec 26 14:40:29 UTC 2024 selfserv_9525 with PID 54898 started at Thu Dec 26 14:40:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #790: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 54898 at Thu Dec 26 14:40:29 UTC 2024 kill -USR1 54898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54898 killed at Thu Dec 26 14:40:29 UTC 2024 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9525 starting at Thu Dec 26 14:40:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54929 >/dev/null 2>/dev/null selfserv_9525 with PID 54929 found at Thu Dec 26 14:40:29 UTC 2024 selfserv_9525 with PID 54929 started at Thu Dec 26 14:40:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #791: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9525 with PID 54929 at Thu Dec 26 14:40:30 UTC 2024 kill -USR1 54929 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54929 killed at Thu Dec 26 14:40:30 UTC 2024 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9525 starting at Thu Dec 26 14:40:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54960 >/dev/null 2>/dev/null selfserv_9525 with PID 54960 found at Thu Dec 26 14:40:30 UTC 2024 selfserv_9525 with PID 54960 started at Thu Dec 26 14:40:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #792: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 54960 at Thu Dec 26 14:40:30 UTC 2024 kill -USR1 54960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54960 killed at Thu Dec 26 14:40:30 UTC 2024 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9525 starting at Thu Dec 26 14:40:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 54991 >/dev/null 2>/dev/null selfserv_9525 with PID 54991 found at Thu Dec 26 14:40:30 UTC 2024 selfserv_9525 with PID 54991 started at Thu Dec 26 14:40:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #793: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 54991 at Thu Dec 26 14:40:30 UTC 2024 kill -USR1 54991 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 54991 killed at Thu Dec 26 14:40:30 UTC 2024 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9525 starting at Thu Dec 26 14:40:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55022 >/dev/null 2>/dev/null selfserv_9525 with PID 55022 found at Thu Dec 26 14:40:30 UTC 2024 selfserv_9525 with PID 55022 started at Thu Dec 26 14:40:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #794: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 55022 at Thu Dec 26 14:40:30 UTC 2024 kill -USR1 55022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55022 killed at Thu Dec 26 14:40:30 UTC 2024 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9525 starting at Thu Dec 26 14:40:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55053 >/dev/null 2>/dev/null selfserv_9525 with PID 55053 found at Thu Dec 26 14:40:31 UTC 2024 selfserv_9525 with PID 55053 started at Thu Dec 26 14:40:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #795: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 55053 at Thu Dec 26 14:40:31 UTC 2024 kill -USR1 55053 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55053 killed at Thu Dec 26 14:40:31 UTC 2024 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9525 starting at Thu Dec 26 14:40:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55084 >/dev/null 2>/dev/null selfserv_9525 with PID 55084 found at Thu Dec 26 14:40:31 UTC 2024 selfserv_9525 with PID 55084 started at Thu Dec 26 14:40:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #796: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 55084 at Thu Dec 26 14:40:31 UTC 2024 kill -USR1 55084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55084 killed at Thu Dec 26 14:40:31 UTC 2024 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9525 starting at Thu Dec 26 14:40:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55115 >/dev/null 2>/dev/null selfserv_9525 with PID 55115 found at Thu Dec 26 14:40:31 UTC 2024 selfserv_9525 with PID 55115 started at Thu Dec 26 14:40:31 UTC 2024 strsclnt -4 -q -p 9525 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Thu Dec 26 14:40:31 UTC 2024 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Thu Dec 26 14:40:40 UTC 2024 ssl.sh: #797: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9525 with PID 55115 at Thu Dec 26 14:40:40 UTC 2024 kill -USR1 55115 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55115 killed at Thu Dec 26 14:40:40 UTC 2024 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9525 starting at Thu Dec 26 14:40:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55153 >/dev/null 2>/dev/null selfserv_9525 with PID 55153 found at Thu Dec 26 14:40:40 UTC 2024 selfserv_9525 with PID 55153 started at Thu Dec 26 14:40:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55153 at Thu Dec 26 14:40:41 UTC 2024 kill -USR1 55153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55153 killed at Thu Dec 26 14:40:41 UTC 2024 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55184 >/dev/null 2>/dev/null selfserv_9525 with PID 55184 found at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 with PID 55184 started at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55184 at Thu Dec 26 14:40:41 UTC 2024 kill -USR1 55184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55184 killed at Thu Dec 26 14:40:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55212 >/dev/null 2>/dev/null selfserv_9525 with PID 55212 found at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 with PID 55212 started at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 55212 at Thu Dec 26 14:40:41 UTC 2024 kill -USR1 55212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55212 killed at Thu Dec 26 14:40:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55240 >/dev/null 2>/dev/null selfserv_9525 with PID 55240 found at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 with PID 55240 started at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55240 at Thu Dec 26 14:40:41 UTC 2024 kill -USR1 55240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55240 killed at Thu Dec 26 14:40:41 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55268 >/dev/null 2>/dev/null selfserv_9525 with PID 55268 found at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 with PID 55268 started at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #802: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 55268 at Thu Dec 26 14:40:41 UTC 2024 kill -USR1 55268 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55268 killed at Thu Dec 26 14:40:41 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55296 >/dev/null 2>/dev/null selfserv_9525 with PID 55296 found at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 with PID 55296 started at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55296 at Thu Dec 26 14:40:42 UTC 2024 kill -USR1 55296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55296 killed at Thu Dec 26 14:40:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55324 >/dev/null 2>/dev/null selfserv_9525 with PID 55324 found at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 with PID 55324 started at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55324 at Thu Dec 26 14:40:42 UTC 2024 kill -USR1 55324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55324 killed at Thu Dec 26 14:40:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55352 >/dev/null 2>/dev/null selfserv_9525 with PID 55352 found at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 with PID 55352 started at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55352 at Thu Dec 26 14:40:42 UTC 2024 kill -USR1 55352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55352 killed at Thu Dec 26 14:40:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55380 >/dev/null 2>/dev/null selfserv_9525 with PID 55380 found at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 with PID 55380 started at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55380 at Thu Dec 26 14:40:42 UTC 2024 kill -USR1 55380 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55380 killed at Thu Dec 26 14:40:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55408 >/dev/null 2>/dev/null selfserv_9525 with PID 55408 found at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 with PID 55408 started at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55408 at Thu Dec 26 14:40:42 UTC 2024 kill -USR1 55408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55408 killed at Thu Dec 26 14:40:42 UTC 2024 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55436 >/dev/null 2>/dev/null selfserv_9525 with PID 55436 found at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 with PID 55436 started at Thu Dec 26 14:40:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55436 at Thu Dec 26 14:40:43 UTC 2024 kill -USR1 55436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55436 killed at Thu Dec 26 14:40:43 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55465 >/dev/null 2>/dev/null selfserv_9525 with PID 55465 found at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 with PID 55465 started at Thu Dec 26 14:40:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 55465 at Thu Dec 26 14:40:43 UTC 2024 kill -USR1 55465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55465 killed at Thu Dec 26 14:40:43 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55494 >/dev/null 2>/dev/null selfserv_9525 with PID 55494 found at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 with PID 55494 started at Thu Dec 26 14:40:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55494 at Thu Dec 26 14:40:43 UTC 2024 kill -USR1 55494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55494 killed at Thu Dec 26 14:40:43 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55523 >/dev/null 2>/dev/null selfserv_9525 with PID 55523 found at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 with PID 55523 started at Thu Dec 26 14:40:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #811: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 55523 at Thu Dec 26 14:40:43 UTC 2024 kill -USR1 55523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55523 killed at Thu Dec 26 14:40:43 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55552 >/dev/null 2>/dev/null selfserv_9525 with PID 55552 found at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 with PID 55552 started at Thu Dec 26 14:40:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #812: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55552 at Thu Dec 26 14:40:43 UTC 2024 kill -USR1 55552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55552 killed at Thu Dec 26 14:40:43 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55581 >/dev/null 2>/dev/null selfserv_9525 with PID 55581 found at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 with PID 55581 started at Thu Dec 26 14:40:44 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #813: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55581 at Thu Dec 26 14:40:44 UTC 2024 kill -USR1 55581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55581 killed at Thu Dec 26 14:40:44 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55610 >/dev/null 2>/dev/null selfserv_9525 with PID 55610 found at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 with PID 55610 started at Thu Dec 26 14:40:44 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #814: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55610 at Thu Dec 26 14:40:44 UTC 2024 kill -USR1 55610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55610 killed at Thu Dec 26 14:40:44 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55639 >/dev/null 2>/dev/null selfserv_9525 with PID 55639 found at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 with PID 55639 started at Thu Dec 26 14:40:44 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #815: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55639 at Thu Dec 26 14:40:44 UTC 2024 kill -USR1 55639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55639 killed at Thu Dec 26 14:40:44 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 55668 >/dev/null 2>/dev/null selfserv_9525 with PID 55668 found at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 with PID 55668 started at Thu Dec 26 14:40:44 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #816: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 55668 at Thu Dec 26 14:40:44 UTC 2024 kill -USR1 55668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55668 killed at Thu Dec 26 14:40:44 UTC 2024 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9525 starting at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 55697 >/dev/null 2>/dev/null selfserv_9525 with PID 55697 found at Thu Dec 26 14:40:44 UTC 2024 selfserv_9525 with PID 55697 started at Thu Dec 26 14:40:44 UTC 2024 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9525 with PID 55697 at Thu Dec 26 14:40:49 UTC 2024 kill -USR1 55697 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 55697 killed at Thu Dec 26 14:40:49 UTC 2024 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9525 starting at Thu Dec 26 14:40:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 56184 >/dev/null 2>/dev/null selfserv_9525 with PID 56184 found at Thu Dec 26 14:40:49 UTC 2024 selfserv_9525 with PID 56184 started at Thu Dec 26 14:40:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 56184 at Thu Dec 26 14:40:59 UTC 2024 kill -USR1 56184 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 56184 killed at Thu Dec 26 14:40:59 UTC 2024 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:40:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:40:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 56908 >/dev/null 2>/dev/null selfserv_9525 with PID 56908 found at Thu Dec 26 14:40:59 UTC 2024 selfserv_9525 with PID 56908 started at Thu Dec 26 14:40:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 56908 at Thu Dec 26 14:41:00 UTC 2024 kill -USR1 56908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 56908 killed at Thu Dec 26 14:41:00 UTC 2024 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 56949 >/dev/null 2>/dev/null selfserv_9525 with PID 56949 found at Thu Dec 26 14:41:00 UTC 2024 selfserv_9525 with PID 56949 started at Thu Dec 26 14:41:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 56949 at Thu Dec 26 14:41:00 UTC 2024 kill -USR1 56949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 56949 killed at Thu Dec 26 14:41:00 UTC 2024 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 56990 >/dev/null 2>/dev/null selfserv_9525 with PID 56990 found at Thu Dec 26 14:41:01 UTC 2024 selfserv_9525 with PID 56990 started at Thu Dec 26 14:41:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 56990 at Thu Dec 26 14:41:01 UTC 2024 kill -USR1 56990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 56990 killed at Thu Dec 26 14:41:01 UTC 2024 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57031 >/dev/null 2>/dev/null selfserv_9525 with PID 57031 found at Thu Dec 26 14:41:01 UTC 2024 selfserv_9525 with PID 57031 started at Thu Dec 26 14:41:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57031 at Thu Dec 26 14:41:02 UTC 2024 kill -USR1 57031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57031 killed at Thu Dec 26 14:41:02 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57072 >/dev/null 2>/dev/null selfserv_9525 with PID 57072 found at Thu Dec 26 14:41:02 UTC 2024 selfserv_9525 with PID 57072 started at Thu Dec 26 14:41:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57072 at Thu Dec 26 14:41:02 UTC 2024 kill -USR1 57072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57072 killed at Thu Dec 26 14:41:02 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57113 >/dev/null 2>/dev/null selfserv_9525 with PID 57113 found at Thu Dec 26 14:41:02 UTC 2024 selfserv_9525 with PID 57113 started at Thu Dec 26 14:41:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57113 at Thu Dec 26 14:41:03 UTC 2024 kill -USR1 57113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57113 killed at Thu Dec 26 14:41:03 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57154 >/dev/null 2>/dev/null selfserv_9525 with PID 57154 found at Thu Dec 26 14:41:03 UTC 2024 selfserv_9525 with PID 57154 started at Thu Dec 26 14:41:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57154 at Thu Dec 26 14:41:03 UTC 2024 kill -USR1 57154 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57154 killed at Thu Dec 26 14:41:03 UTC 2024 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57195 >/dev/null 2>/dev/null selfserv_9525 with PID 57195 found at Thu Dec 26 14:41:04 UTC 2024 selfserv_9525 with PID 57195 started at Thu Dec 26 14:41:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57195 at Thu Dec 26 14:41:04 UTC 2024 kill -USR1 57195 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57195 killed at Thu Dec 26 14:41:04 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57236 >/dev/null 2>/dev/null selfserv_9525 with PID 57236 found at Thu Dec 26 14:41:04 UTC 2024 selfserv_9525 with PID 57236 started at Thu Dec 26 14:41:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57236 at Thu Dec 26 14:41:04 UTC 2024 kill -USR1 57236 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57236 killed at Thu Dec 26 14:41:04 UTC 2024 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57277 >/dev/null 2>/dev/null selfserv_9525 with PID 57277 found at Thu Dec 26 14:41:05 UTC 2024 selfserv_9525 with PID 57277 started at Thu Dec 26 14:41:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57277 at Thu Dec 26 14:41:05 UTC 2024 kill -USR1 57277 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57277 killed at Thu Dec 26 14:41:05 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57318 >/dev/null 2>/dev/null selfserv_9525 with PID 57318 found at Thu Dec 26 14:41:05 UTC 2024 selfserv_9525 with PID 57318 started at Thu Dec 26 14:41:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57318 at Thu Dec 26 14:41:05 UTC 2024 kill -USR1 57318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57318 killed at Thu Dec 26 14:41:05 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57359 >/dev/null 2>/dev/null selfserv_9525 with PID 57359 found at Thu Dec 26 14:41:06 UTC 2024 selfserv_9525 with PID 57359 started at Thu Dec 26 14:41:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57359 at Thu Dec 26 14:41:06 UTC 2024 kill -USR1 57359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57359 killed at Thu Dec 26 14:41:06 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57400 >/dev/null 2>/dev/null selfserv_9525 with PID 57400 found at Thu Dec 26 14:41:06 UTC 2024 selfserv_9525 with PID 57400 started at Thu Dec 26 14:41:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57400 at Thu Dec 26 14:41:07 UTC 2024 kill -USR1 57400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57400 killed at Thu Dec 26 14:41:07 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57441 >/dev/null 2>/dev/null selfserv_9525 with PID 57441 found at Thu Dec 26 14:41:07 UTC 2024 selfserv_9525 with PID 57441 started at Thu Dec 26 14:41:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57441 at Thu Dec 26 14:41:07 UTC 2024 kill -USR1 57441 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57441 killed at Thu Dec 26 14:41:07 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57482 >/dev/null 2>/dev/null selfserv_9525 with PID 57482 found at Thu Dec 26 14:41:08 UTC 2024 selfserv_9525 with PID 57482 started at Thu Dec 26 14:41:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57482 at Thu Dec 26 14:41:08 UTC 2024 kill -USR1 57482 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57482 killed at Thu Dec 26 14:41:08 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57523 >/dev/null 2>/dev/null selfserv_9525 with PID 57523 found at Thu Dec 26 14:41:08 UTC 2024 selfserv_9525 with PID 57523 started at Thu Dec 26 14:41:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57523 at Thu Dec 26 14:41:09 UTC 2024 kill -USR1 57523 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57523 killed at Thu Dec 26 14:41:09 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57564 >/dev/null 2>/dev/null selfserv_9525 with PID 57564 found at Thu Dec 26 14:41:09 UTC 2024 selfserv_9525 with PID 57564 started at Thu Dec 26 14:41:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57564 at Thu Dec 26 14:41:10 UTC 2024 kill -USR1 57564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57564 killed at Thu Dec 26 14:41:10 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57605 >/dev/null 2>/dev/null selfserv_9525 with PID 57605 found at Thu Dec 26 14:41:10 UTC 2024 selfserv_9525 with PID 57605 started at Thu Dec 26 14:41:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57605 at Thu Dec 26 14:41:10 UTC 2024 kill -USR1 57605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57605 killed at Thu Dec 26 14:41:10 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57646 >/dev/null 2>/dev/null selfserv_9525 with PID 57646 found at Thu Dec 26 14:41:10 UTC 2024 selfserv_9525 with PID 57646 started at Thu Dec 26 14:41:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57646 at Thu Dec 26 14:41:11 UTC 2024 kill -USR1 57646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57646 killed at Thu Dec 26 14:41:11 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57687 >/dev/null 2>/dev/null selfserv_9525 with PID 57687 found at Thu Dec 26 14:41:11 UTC 2024 selfserv_9525 with PID 57687 started at Thu Dec 26 14:41:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57687 at Thu Dec 26 14:41:12 UTC 2024 kill -USR1 57687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57687 killed at Thu Dec 26 14:41:12 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57728 >/dev/null 2>/dev/null selfserv_9525 with PID 57728 found at Thu Dec 26 14:41:12 UTC 2024 selfserv_9525 with PID 57728 started at Thu Dec 26 14:41:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57728 at Thu Dec 26 14:41:13 UTC 2024 kill -USR1 57728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57728 killed at Thu Dec 26 14:41:13 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57769 >/dev/null 2>/dev/null selfserv_9525 with PID 57769 found at Thu Dec 26 14:41:13 UTC 2024 selfserv_9525 with PID 57769 started at Thu Dec 26 14:41:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57769 at Thu Dec 26 14:41:13 UTC 2024 kill -USR1 57769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57769 killed at Thu Dec 26 14:41:13 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57810 >/dev/null 2>/dev/null selfserv_9525 with PID 57810 found at Thu Dec 26 14:41:13 UTC 2024 selfserv_9525 with PID 57810 started at Thu Dec 26 14:41:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 57810 at Thu Dec 26 14:41:14 UTC 2024 kill -USR1 57810 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57810 killed at Thu Dec 26 14:41:14 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57851 >/dev/null 2>/dev/null selfserv_9525 with PID 57851 found at Thu Dec 26 14:41:14 UTC 2024 selfserv_9525 with PID 57851 started at Thu Dec 26 14:41:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57851 at Thu Dec 26 14:41:15 UTC 2024 kill -USR1 57851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57851 killed at Thu Dec 26 14:41:15 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57892 >/dev/null 2>/dev/null selfserv_9525 with PID 57892 found at Thu Dec 26 14:41:15 UTC 2024 selfserv_9525 with PID 57892 started at Thu Dec 26 14:41:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57892 at Thu Dec 26 14:41:15 UTC 2024 kill -USR1 57892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57892 killed at Thu Dec 26 14:41:15 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57933 >/dev/null 2>/dev/null selfserv_9525 with PID 57933 found at Thu Dec 26 14:41:15 UTC 2024 selfserv_9525 with PID 57933 started at Thu Dec 26 14:41:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57933 at Thu Dec 26 14:41:16 UTC 2024 kill -USR1 57933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57933 killed at Thu Dec 26 14:41:16 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 57974 >/dev/null 2>/dev/null selfserv_9525 with PID 57974 found at Thu Dec 26 14:41:16 UTC 2024 selfserv_9525 with PID 57974 started at Thu Dec 26 14:41:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 57974 at Thu Dec 26 14:41:16 UTC 2024 kill -USR1 57974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 57974 killed at Thu Dec 26 14:41:16 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58015 >/dev/null 2>/dev/null selfserv_9525 with PID 58015 found at Thu Dec 26 14:41:16 UTC 2024 selfserv_9525 with PID 58015 started at Thu Dec 26 14:41:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #971: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 58015 at Thu Dec 26 14:41:17 UTC 2024 kill -USR1 58015 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58015 killed at Thu Dec 26 14:41:17 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58056 >/dev/null 2>/dev/null selfserv_9525 with PID 58056 found at Thu Dec 26 14:41:17 UTC 2024 selfserv_9525 with PID 58056 started at Thu Dec 26 14:41:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #972: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 58056 at Thu Dec 26 14:41:17 UTC 2024 kill -USR1 58056 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58056 killed at Thu Dec 26 14:41:17 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58097 >/dev/null 2>/dev/null selfserv_9525 with PID 58097 found at Thu Dec 26 14:41:17 UTC 2024 selfserv_9525 with PID 58097 started at Thu Dec 26 14:41:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58097 at Thu Dec 26 14:41:18 UTC 2024 kill -USR1 58097 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58097 killed at Thu Dec 26 14:41:18 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58138 >/dev/null 2>/dev/null selfserv_9525 with PID 58138 found at Thu Dec 26 14:41:18 UTC 2024 selfserv_9525 with PID 58138 started at Thu Dec 26 14:41:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58138 at Thu Dec 26 14:41:19 UTC 2024 kill -USR1 58138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58138 killed at Thu Dec 26 14:41:19 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58179 >/dev/null 2>/dev/null selfserv_9525 with PID 58179 found at Thu Dec 26 14:41:19 UTC 2024 selfserv_9525 with PID 58179 started at Thu Dec 26 14:41:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58179 at Thu Dec 26 14:41:19 UTC 2024 kill -USR1 58179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58179 killed at Thu Dec 26 14:41:19 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58220 >/dev/null 2>/dev/null selfserv_9525 with PID 58220 found at Thu Dec 26 14:41:19 UTC 2024 selfserv_9525 with PID 58220 started at Thu Dec 26 14:41:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58220 at Thu Dec 26 14:41:20 UTC 2024 kill -USR1 58220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58220 killed at Thu Dec 26 14:41:20 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58261 >/dev/null 2>/dev/null selfserv_9525 with PID 58261 found at Thu Dec 26 14:41:20 UTC 2024 selfserv_9525 with PID 58261 started at Thu Dec 26 14:41:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #977: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 58261 at Thu Dec 26 14:41:20 UTC 2024 kill -USR1 58261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58261 killed at Thu Dec 26 14:41:20 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58302 >/dev/null 2>/dev/null selfserv_9525 with PID 58302 found at Thu Dec 26 14:41:20 UTC 2024 selfserv_9525 with PID 58302 started at Thu Dec 26 14:41:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58302 at Thu Dec 26 14:41:21 UTC 2024 kill -USR1 58302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58302 killed at Thu Dec 26 14:41:21 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58343 >/dev/null 2>/dev/null selfserv_9525 with PID 58343 found at Thu Dec 26 14:41:21 UTC 2024 selfserv_9525 with PID 58343 started at Thu Dec 26 14:41:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58343 at Thu Dec 26 14:41:21 UTC 2024 kill -USR1 58343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58343 killed at Thu Dec 26 14:41:21 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58384 >/dev/null 2>/dev/null selfserv_9525 with PID 58384 found at Thu Dec 26 14:41:21 UTC 2024 selfserv_9525 with PID 58384 started at Thu Dec 26 14:41:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58384 at Thu Dec 26 14:41:22 UTC 2024 kill -USR1 58384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58384 killed at Thu Dec 26 14:41:22 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58425 >/dev/null 2>/dev/null selfserv_9525 with PID 58425 found at Thu Dec 26 14:41:22 UTC 2024 selfserv_9525 with PID 58425 started at Thu Dec 26 14:41:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58425 at Thu Dec 26 14:41:23 UTC 2024 kill -USR1 58425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58425 killed at Thu Dec 26 14:41:23 UTC 2024 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58466 >/dev/null 2>/dev/null selfserv_9525 with PID 58466 found at Thu Dec 26 14:41:23 UTC 2024 selfserv_9525 with PID 58466 started at Thu Dec 26 14:41:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #982: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 58466 at Thu Dec 26 14:41:23 UTC 2024 kill -USR1 58466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58466 killed at Thu Dec 26 14:41:23 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58507 >/dev/null 2>/dev/null selfserv_9525 with PID 58507 found at Thu Dec 26 14:41:23 UTC 2024 selfserv_9525 with PID 58507 started at Thu Dec 26 14:41:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58507 at Thu Dec 26 14:41:24 UTC 2024 kill -USR1 58507 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58507 killed at Thu Dec 26 14:41:24 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58548 >/dev/null 2>/dev/null selfserv_9525 with PID 58548 found at Thu Dec 26 14:41:24 UTC 2024 selfserv_9525 with PID 58548 started at Thu Dec 26 14:41:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58548 at Thu Dec 26 14:41:24 UTC 2024 kill -USR1 58548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58548 killed at Thu Dec 26 14:41:24 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58589 >/dev/null 2>/dev/null selfserv_9525 with PID 58589 found at Thu Dec 26 14:41:25 UTC 2024 selfserv_9525 with PID 58589 started at Thu Dec 26 14:41:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58589 at Thu Dec 26 14:41:25 UTC 2024 kill -USR1 58589 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58589 killed at Thu Dec 26 14:41:25 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58630 >/dev/null 2>/dev/null selfserv_9525 with PID 58630 found at Thu Dec 26 14:41:25 UTC 2024 selfserv_9525 with PID 58630 started at Thu Dec 26 14:41:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #986: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 58630 at Thu Dec 26 14:41:26 UTC 2024 kill -USR1 58630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58630 killed at Thu Dec 26 14:41:26 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58671 >/dev/null 2>/dev/null selfserv_9525 with PID 58671 found at Thu Dec 26 14:41:26 UTC 2024 selfserv_9525 with PID 58671 started at Thu Dec 26 14:41:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58671 at Thu Dec 26 14:41:26 UTC 2024 kill -USR1 58671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58671 killed at Thu Dec 26 14:41:26 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58712 >/dev/null 2>/dev/null selfserv_9525 with PID 58712 found at Thu Dec 26 14:41:26 UTC 2024 selfserv_9525 with PID 58712 started at Thu Dec 26 14:41:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58712 at Thu Dec 26 14:41:27 UTC 2024 kill -USR1 58712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58712 killed at Thu Dec 26 14:41:27 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58753 >/dev/null 2>/dev/null selfserv_9525 with PID 58753 found at Thu Dec 26 14:41:27 UTC 2024 selfserv_9525 with PID 58753 started at Thu Dec 26 14:41:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58753 at Thu Dec 26 14:41:28 UTC 2024 kill -USR1 58753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58753 killed at Thu Dec 26 14:41:28 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58794 >/dev/null 2>/dev/null selfserv_9525 with PID 58794 found at Thu Dec 26 14:41:28 UTC 2024 selfserv_9525 with PID 58794 started at Thu Dec 26 14:41:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #990: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 58794 at Thu Dec 26 14:41:28 UTC 2024 kill -USR1 58794 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58794 killed at Thu Dec 26 14:41:28 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58835 >/dev/null 2>/dev/null selfserv_9525 with PID 58835 found at Thu Dec 26 14:41:28 UTC 2024 selfserv_9525 with PID 58835 started at Thu Dec 26 14:41:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58835 at Thu Dec 26 14:41:29 UTC 2024 kill -USR1 58835 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58835 killed at Thu Dec 26 14:41:29 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58876 >/dev/null 2>/dev/null selfserv_9525 with PID 58876 found at Thu Dec 26 14:41:29 UTC 2024 selfserv_9525 with PID 58876 started at Thu Dec 26 14:41:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58876 at Thu Dec 26 14:41:30 UTC 2024 kill -USR1 58876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58876 killed at Thu Dec 26 14:41:30 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58917 >/dev/null 2>/dev/null selfserv_9525 with PID 58917 found at Thu Dec 26 14:41:30 UTC 2024 selfserv_9525 with PID 58917 started at Thu Dec 26 14:41:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58917 at Thu Dec 26 14:41:31 UTC 2024 kill -USR1 58917 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58917 killed at Thu Dec 26 14:41:31 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58958 >/dev/null 2>/dev/null selfserv_9525 with PID 58958 found at Thu Dec 26 14:41:31 UTC 2024 selfserv_9525 with PID 58958 started at Thu Dec 26 14:41:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 58958 at Thu Dec 26 14:41:31 UTC 2024 kill -USR1 58958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58958 killed at Thu Dec 26 14:41:31 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 58999 >/dev/null 2>/dev/null selfserv_9525 with PID 58999 found at Thu Dec 26 14:41:32 UTC 2024 selfserv_9525 with PID 58999 started at Thu Dec 26 14:41:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 58999 at Thu Dec 26 14:41:32 UTC 2024 kill -USR1 58999 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 58999 killed at Thu Dec 26 14:41:32 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:32 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59040 >/dev/null 2>/dev/null selfserv_9525 with PID 59040 found at Thu Dec 26 14:41:32 UTC 2024 selfserv_9525 with PID 59040 started at Thu Dec 26 14:41:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59040 at Thu Dec 26 14:41:33 UTC 2024 kill -USR1 59040 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59040 killed at Thu Dec 26 14:41:33 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:33 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59081 >/dev/null 2>/dev/null selfserv_9525 with PID 59081 found at Thu Dec 26 14:41:33 UTC 2024 selfserv_9525 with PID 59081 started at Thu Dec 26 14:41:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59081 at Thu Dec 26 14:41:34 UTC 2024 kill -USR1 59081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59081 killed at Thu Dec 26 14:41:34 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59122 >/dev/null 2>/dev/null selfserv_9525 with PID 59122 found at Thu Dec 26 14:41:34 UTC 2024 selfserv_9525 with PID 59122 started at Thu Dec 26 14:41:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #998: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 59122 at Thu Dec 26 14:41:34 UTC 2024 kill -USR1 59122 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59122 killed at Thu Dec 26 14:41:34 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59163 >/dev/null 2>/dev/null selfserv_9525 with PID 59163 found at Thu Dec 26 14:41:34 UTC 2024 selfserv_9525 with PID 59163 started at Thu Dec 26 14:41:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #999: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59163 at Thu Dec 26 14:41:35 UTC 2024 kill -USR1 59163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59163 killed at Thu Dec 26 14:41:35 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:35 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59204 >/dev/null 2>/dev/null selfserv_9525 with PID 59204 found at Thu Dec 26 14:41:35 UTC 2024 selfserv_9525 with PID 59204 started at Thu Dec 26 14:41:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1000: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59204 at Thu Dec 26 14:41:35 UTC 2024 kill -USR1 59204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59204 killed at Thu Dec 26 14:41:35 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:35 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59245 >/dev/null 2>/dev/null selfserv_9525 with PID 59245 found at Thu Dec 26 14:41:36 UTC 2024 selfserv_9525 with PID 59245 started at Thu Dec 26 14:41:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59245 at Thu Dec 26 14:41:36 UTC 2024 kill -USR1 59245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59245 killed at Thu Dec 26 14:41:36 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:41:36 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59286 >/dev/null 2>/dev/null selfserv_9525 with PID 59286 found at Thu Dec 26 14:41:36 UTC 2024 selfserv_9525 with PID 59286 started at Thu Dec 26 14:41:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1002: TLS 1.3 client certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59286 at Thu Dec 26 14:41:37 UTC 2024 kill -USR1 59286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59286 killed at Thu Dec 26 14:41:37 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:41:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59327 >/dev/null 2>/dev/null selfserv_9525 with PID 59327 found at Thu Dec 26 14:41:37 UTC 2024 selfserv_9525 with PID 59327 started at Thu Dec 26 14:41:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1003: TLS 1.3 server certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59327 at Thu Dec 26 14:41:37 UTC 2024 kill -USR1 59327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59327 killed at Thu Dec 26 14:41:37 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:41:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59368 >/dev/null 2>/dev/null selfserv_9525 with PID 59368 found at Thu Dec 26 14:41:37 UTC 2024 selfserv_9525 with PID 59368 started at Thu Dec 26 14:41:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1004: TLS 1.3 client/server certificate comlpression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59368 at Thu Dec 26 14:41:38 UTC 2024 kill -USR1 59368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59368 killed at Thu Dec 26 14:41:38 UTC 2024 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9525 starting at Thu Dec 26 14:41:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59439 >/dev/null 2>/dev/null selfserv_9525 with PID 59439 found at Thu Dec 26 14:41:38 UTC 2024 selfserv_9525 with PID 59439 started at Thu Dec 26 14:41:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59439 at Thu Dec 26 14:41:38 UTC 2024 kill -USR1 59439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59439 killed at Thu Dec 26 14:41:38 UTC 2024 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59470 >/dev/null 2>/dev/null selfserv_9525 with PID 59470 found at Thu Dec 26 14:41:38 UTC 2024 selfserv_9525 with PID 59470 started at Thu Dec 26 14:41:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59470 at Thu Dec 26 14:41:38 UTC 2024 kill -USR1 59470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59470 killed at Thu Dec 26 14:41:38 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59498 >/dev/null 2>/dev/null selfserv_9525 with PID 59498 found at Thu Dec 26 14:41:39 UTC 2024 selfserv_9525 with PID 59498 started at Thu Dec 26 14:41:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 59498 at Thu Dec 26 14:41:39 UTC 2024 kill -USR1 59498 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59498 killed at Thu Dec 26 14:41:39 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59526 >/dev/null 2>/dev/null selfserv_9525 with PID 59526 found at Thu Dec 26 14:41:39 UTC 2024 selfserv_9525 with PID 59526 started at Thu Dec 26 14:41:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59526 at Thu Dec 26 14:41:39 UTC 2024 kill -USR1 59526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59526 killed at Thu Dec 26 14:41:39 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59554 >/dev/null 2>/dev/null selfserv_9525 with PID 59554 found at Thu Dec 26 14:41:39 UTC 2024 selfserv_9525 with PID 59554 started at Thu Dec 26 14:41:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #948: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 59554 at Thu Dec 26 14:41:39 UTC 2024 kill -USR1 59554 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59554 killed at Thu Dec 26 14:41:39 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59582 >/dev/null 2>/dev/null selfserv_9525 with PID 59582 found at Thu Dec 26 14:41:39 UTC 2024 selfserv_9525 with PID 59582 started at Thu Dec 26 14:41:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59582 at Thu Dec 26 14:41:40 UTC 2024 kill -USR1 59582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59582 killed at Thu Dec 26 14:41:40 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59610 >/dev/null 2>/dev/null selfserv_9525 with PID 59610 found at Thu Dec 26 14:41:40 UTC 2024 selfserv_9525 with PID 59610 started at Thu Dec 26 14:41:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59610 at Thu Dec 26 14:41:40 UTC 2024 kill -USR1 59610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59610 killed at Thu Dec 26 14:41:40 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59638 >/dev/null 2>/dev/null selfserv_9525 with PID 59638 found at Thu Dec 26 14:41:40 UTC 2024 selfserv_9525 with PID 59638 started at Thu Dec 26 14:41:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59638 at Thu Dec 26 14:41:40 UTC 2024 kill -USR1 59638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59638 killed at Thu Dec 26 14:41:40 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59666 >/dev/null 2>/dev/null selfserv_9525 with PID 59666 found at Thu Dec 26 14:41:40 UTC 2024 selfserv_9525 with PID 59666 started at Thu Dec 26 14:41:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59666 at Thu Dec 26 14:41:40 UTC 2024 kill -USR1 59666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59666 killed at Thu Dec 26 14:41:40 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59694 >/dev/null 2>/dev/null selfserv_9525 with PID 59694 found at Thu Dec 26 14:41:41 UTC 2024 selfserv_9525 with PID 59694 started at Thu Dec 26 14:41:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59694 at Thu Dec 26 14:41:41 UTC 2024 kill -USR1 59694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59694 killed at Thu Dec 26 14:41:41 UTC 2024 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59722 >/dev/null 2>/dev/null selfserv_9525 with PID 59722 found at Thu Dec 26 14:41:41 UTC 2024 selfserv_9525 with PID 59722 started at Thu Dec 26 14:41:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59722 at Thu Dec 26 14:41:41 UTC 2024 kill -USR1 59722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59722 killed at Thu Dec 26 14:41:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59751 >/dev/null 2>/dev/null selfserv_9525 with PID 59751 found at Thu Dec 26 14:41:41 UTC 2024 selfserv_9525 with PID 59751 started at Thu Dec 26 14:41:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 59751 at Thu Dec 26 14:41:41 UTC 2024 kill -USR1 59751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59751 killed at Thu Dec 26 14:41:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59780 >/dev/null 2>/dev/null selfserv_9525 with PID 59780 found at Thu Dec 26 14:41:41 UTC 2024 selfserv_9525 with PID 59780 started at Thu Dec 26 14:41:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59780 at Thu Dec 26 14:41:42 UTC 2024 kill -USR1 59780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59780 killed at Thu Dec 26 14:41:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59809 >/dev/null 2>/dev/null selfserv_9525 with PID 59809 found at Thu Dec 26 14:41:42 UTC 2024 selfserv_9525 with PID 59809 started at Thu Dec 26 14:41:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #957: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 59809 at Thu Dec 26 14:41:42 UTC 2024 kill -USR1 59809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59809 killed at Thu Dec 26 14:41:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59838 >/dev/null 2>/dev/null selfserv_9525 with PID 59838 found at Thu Dec 26 14:41:42 UTC 2024 selfserv_9525 with PID 59838 started at Thu Dec 26 14:41:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #958: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59838 at Thu Dec 26 14:41:42 UTC 2024 kill -USR1 59838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59838 killed at Thu Dec 26 14:41:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59867 >/dev/null 2>/dev/null selfserv_9525 with PID 59867 found at Thu Dec 26 14:41:42 UTC 2024 selfserv_9525 with PID 59867 started at Thu Dec 26 14:41:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #959: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59867 at Thu Dec 26 14:41:42 UTC 2024 kill -USR1 59867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59867 killed at Thu Dec 26 14:41:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59896 >/dev/null 2>/dev/null selfserv_9525 with PID 59896 found at Thu Dec 26 14:41:43 UTC 2024 selfserv_9525 with PID 59896 started at Thu Dec 26 14:41:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #960: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59896 at Thu Dec 26 14:41:43 UTC 2024 kill -USR1 59896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59896 killed at Thu Dec 26 14:41:43 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59925 >/dev/null 2>/dev/null selfserv_9525 with PID 59925 found at Thu Dec 26 14:41:43 UTC 2024 selfserv_9525 with PID 59925 started at Thu Dec 26 14:41:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #961: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59925 at Thu Dec 26 14:41:43 UTC 2024 kill -USR1 59925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59925 killed at Thu Dec 26 14:41:43 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:41:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 59954 >/dev/null 2>/dev/null selfserv_9525 with PID 59954 found at Thu Dec 26 14:41:43 UTC 2024 selfserv_9525 with PID 59954 started at Thu Dec 26 14:41:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #962: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 59954 at Thu Dec 26 14:41:43 UTC 2024 kill -USR1 59954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 59954 killed at Thu Dec 26 14:41:43 UTC 2024 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #963: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -list ssl.sh: #964: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #965: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #966: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -list ssl.sh: #967: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #968: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9525 starting at Thu Dec 26 14:41:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 60021 >/dev/null 2>/dev/null selfserv_9525 with PID 60021 found at Thu Dec 26 14:41:44 UTC 2024 selfserv_9525 with PID 60021 started at Thu Dec 26 14:41:44 UTC 2024 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9525 with PID 60021 at Thu Dec 26 14:41:49 UTC 2024 kill -USR1 60021 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 60021 killed at Thu Dec 26 14:41:49 UTC 2024 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9525 starting at Thu Dec 26 14:41:49 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 60508 >/dev/null 2>/dev/null selfserv_9525 with PID 60508 found at Thu Dec 26 14:41:49 UTC 2024 selfserv_9525 with PID 60508 started at Thu Dec 26 14:41:49 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1092: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1093: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1094: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1095: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 60508 at Thu Dec 26 14:41:58 UTC 2024 kill -USR1 60508 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 60508 killed at Thu Dec 26 14:41:58 UTC 2024 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9525 starting at Thu Dec 26 14:41:58 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61219 >/dev/null 2>/dev/null selfserv_9525 with PID 61219 found at Thu Dec 26 14:41:58 UTC 2024 selfserv_9525 with PID 61219 started at Thu Dec 26 14:41:58 UTC 2024 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61219 at Thu Dec 26 14:41:58 UTC 2024 kill -USR1 61219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61219 killed at Thu Dec 26 14:41:58 UTC 2024 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:58 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61273 >/dev/null 2>/dev/null selfserv_9525 with PID 61273 found at Thu Dec 26 14:41:58 UTC 2024 selfserv_9525 with PID 61273 started at Thu Dec 26 14:41:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61273 at Thu Dec 26 14:41:58 UTC 2024 kill -USR1 61273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61273 killed at Thu Dec 26 14:41:58 UTC 2024 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:41:58 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61314 >/dev/null 2>/dev/null selfserv_9525 with PID 61314 found at Thu Dec 26 14:41:58 UTC 2024 selfserv_9525 with PID 61314 started at Thu Dec 26 14:41:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61314 at Thu Dec 26 14:41:59 UTC 2024 kill -USR1 61314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61314 killed at Thu Dec 26 14:41:59 UTC 2024 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61355 >/dev/null 2>/dev/null selfserv_9525 with PID 61355 found at Thu Dec 26 14:41:59 UTC 2024 selfserv_9525 with PID 61355 started at Thu Dec 26 14:41:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61355 at Thu Dec 26 14:41:59 UTC 2024 kill -USR1 61355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61355 killed at Thu Dec 26 14:41:59 UTC 2024 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:41:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:41:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61396 >/dev/null 2>/dev/null selfserv_9525 with PID 61396 found at Thu Dec 26 14:41:59 UTC 2024 selfserv_9525 with PID 61396 started at Thu Dec 26 14:41:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 61396 at Thu Dec 26 14:42:00 UTC 2024 kill -USR1 61396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61396 killed at Thu Dec 26 14:42:00 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61437 >/dev/null 2>/dev/null selfserv_9525 with PID 61437 found at Thu Dec 26 14:42:00 UTC 2024 selfserv_9525 with PID 61437 started at Thu Dec 26 14:42:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 61437 at Thu Dec 26 14:42:00 UTC 2024 kill -USR1 61437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61437 killed at Thu Dec 26 14:42:00 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61478 >/dev/null 2>/dev/null selfserv_9525 with PID 61478 found at Thu Dec 26 14:42:00 UTC 2024 selfserv_9525 with PID 61478 started at Thu Dec 26 14:42:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61478 at Thu Dec 26 14:42:00 UTC 2024 kill -USR1 61478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61478 killed at Thu Dec 26 14:42:00 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61519 >/dev/null 2>/dev/null selfserv_9525 with PID 61519 found at Thu Dec 26 14:42:00 UTC 2024 selfserv_9525 with PID 61519 started at Thu Dec 26 14:42:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61519 at Thu Dec 26 14:42:01 UTC 2024 kill -USR1 61519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61519 killed at Thu Dec 26 14:42:01 UTC 2024 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61560 >/dev/null 2>/dev/null selfserv_9525 with PID 61560 found at Thu Dec 26 14:42:01 UTC 2024 selfserv_9525 with PID 61560 started at Thu Dec 26 14:42:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61560 at Thu Dec 26 14:42:01 UTC 2024 kill -USR1 61560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61560 killed at Thu Dec 26 14:42:01 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61601 >/dev/null 2>/dev/null selfserv_9525 with PID 61601 found at Thu Dec 26 14:42:01 UTC 2024 selfserv_9525 with PID 61601 started at Thu Dec 26 14:42:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61601 at Thu Dec 26 14:42:01 UTC 2024 kill -USR1 61601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61601 killed at Thu Dec 26 14:42:01 UTC 2024 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61642 >/dev/null 2>/dev/null selfserv_9525 with PID 61642 found at Thu Dec 26 14:42:02 UTC 2024 selfserv_9525 with PID 61642 started at Thu Dec 26 14:42:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 61642 at Thu Dec 26 14:42:02 UTC 2024 kill -USR1 61642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61642 killed at Thu Dec 26 14:42:02 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61683 >/dev/null 2>/dev/null selfserv_9525 with PID 61683 found at Thu Dec 26 14:42:02 UTC 2024 selfserv_9525 with PID 61683 started at Thu Dec 26 14:42:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 61683 at Thu Dec 26 14:42:02 UTC 2024 kill -USR1 61683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61683 killed at Thu Dec 26 14:42:02 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61724 >/dev/null 2>/dev/null selfserv_9525 with PID 61724 found at Thu Dec 26 14:42:02 UTC 2024 selfserv_9525 with PID 61724 started at Thu Dec 26 14:42:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61724 at Thu Dec 26 14:42:03 UTC 2024 kill -USR1 61724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61724 killed at Thu Dec 26 14:42:03 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61765 >/dev/null 2>/dev/null selfserv_9525 with PID 61765 found at Thu Dec 26 14:42:03 UTC 2024 selfserv_9525 with PID 61765 started at Thu Dec 26 14:42:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61765 at Thu Dec 26 14:42:03 UTC 2024 kill -USR1 61765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61765 killed at Thu Dec 26 14:42:03 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61806 >/dev/null 2>/dev/null selfserv_9525 with PID 61806 found at Thu Dec 26 14:42:03 UTC 2024 selfserv_9525 with PID 61806 started at Thu Dec 26 14:42:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61806 at Thu Dec 26 14:42:03 UTC 2024 kill -USR1 61806 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61806 killed at Thu Dec 26 14:42:03 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61847 >/dev/null 2>/dev/null selfserv_9525 with PID 61847 found at Thu Dec 26 14:42:04 UTC 2024 selfserv_9525 with PID 61847 started at Thu Dec 26 14:42:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61847 at Thu Dec 26 14:42:04 UTC 2024 kill -USR1 61847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61847 killed at Thu Dec 26 14:42:04 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61888 >/dev/null 2>/dev/null selfserv_9525 with PID 61888 found at Thu Dec 26 14:42:04 UTC 2024 selfserv_9525 with PID 61888 started at Thu Dec 26 14:42:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 61888 at Thu Dec 26 14:42:04 UTC 2024 kill -USR1 61888 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61888 killed at Thu Dec 26 14:42:04 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61929 >/dev/null 2>/dev/null selfserv_9525 with PID 61929 found at Thu Dec 26 14:42:04 UTC 2024 selfserv_9525 with PID 61929 started at Thu Dec 26 14:42:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 61929 at Thu Dec 26 14:42:05 UTC 2024 kill -USR1 61929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61929 killed at Thu Dec 26 14:42:05 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 61970 >/dev/null 2>/dev/null selfserv_9525 with PID 61970 found at Thu Dec 26 14:42:05 UTC 2024 selfserv_9525 with PID 61970 started at Thu Dec 26 14:42:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 61970 at Thu Dec 26 14:42:05 UTC 2024 kill -USR1 61970 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 61970 killed at Thu Dec 26 14:42:05 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62011 >/dev/null 2>/dev/null selfserv_9525 with PID 62011 found at Thu Dec 26 14:42:05 UTC 2024 selfserv_9525 with PID 62011 started at Thu Dec 26 14:42:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62011 at Thu Dec 26 14:42:06 UTC 2024 kill -USR1 62011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62011 killed at Thu Dec 26 14:42:06 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62052 >/dev/null 2>/dev/null selfserv_9525 with PID 62052 found at Thu Dec 26 14:42:06 UTC 2024 selfserv_9525 with PID 62052 started at Thu Dec 26 14:42:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62052 at Thu Dec 26 14:42:06 UTC 2024 kill -USR1 62052 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62052 killed at Thu Dec 26 14:42:06 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62093 >/dev/null 2>/dev/null selfserv_9525 with PID 62093 found at Thu Dec 26 14:42:06 UTC 2024 selfserv_9525 with PID 62093 started at Thu Dec 26 14:42:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62093 at Thu Dec 26 14:42:07 UTC 2024 kill -USR1 62093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62093 killed at Thu Dec 26 14:42:07 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62134 >/dev/null 2>/dev/null selfserv_9525 with PID 62134 found at Thu Dec 26 14:42:07 UTC 2024 selfserv_9525 with PID 62134 started at Thu Dec 26 14:42:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 62134 at Thu Dec 26 14:42:07 UTC 2024 kill -USR1 62134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62134 killed at Thu Dec 26 14:42:07 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62175 >/dev/null 2>/dev/null selfserv_9525 with PID 62175 found at Thu Dec 26 14:42:07 UTC 2024 selfserv_9525 with PID 62175 started at Thu Dec 26 14:42:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 62175 at Thu Dec 26 14:42:08 UTC 2024 kill -USR1 62175 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62175 killed at Thu Dec 26 14:42:08 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62216 >/dev/null 2>/dev/null selfserv_9525 with PID 62216 found at Thu Dec 26 14:42:08 UTC 2024 selfserv_9525 with PID 62216 started at Thu Dec 26 14:42:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62216 at Thu Dec 26 14:42:08 UTC 2024 kill -USR1 62216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62216 killed at Thu Dec 26 14:42:08 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62257 >/dev/null 2>/dev/null selfserv_9525 with PID 62257 found at Thu Dec 26 14:42:08 UTC 2024 selfserv_9525 with PID 62257 started at Thu Dec 26 14:42:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62257 at Thu Dec 26 14:42:09 UTC 2024 kill -USR1 62257 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62257 killed at Thu Dec 26 14:42:09 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62298 >/dev/null 2>/dev/null selfserv_9525 with PID 62298 found at Thu Dec 26 14:42:09 UTC 2024 selfserv_9525 with PID 62298 started at Thu Dec 26 14:42:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62298 at Thu Dec 26 14:42:09 UTC 2024 kill -USR1 62298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62298 killed at Thu Dec 26 14:42:09 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62339 >/dev/null 2>/dev/null selfserv_9525 with PID 62339 found at Thu Dec 26 14:42:09 UTC 2024 selfserv_9525 with PID 62339 started at Thu Dec 26 14:42:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62339 at Thu Dec 26 14:42:09 UTC 2024 kill -USR1 62339 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62339 killed at Thu Dec 26 14:42:09 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62380 >/dev/null 2>/dev/null selfserv_9525 with PID 62380 found at Thu Dec 26 14:42:10 UTC 2024 selfserv_9525 with PID 62380 started at Thu Dec 26 14:42:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1123: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 62380 at Thu Dec 26 14:42:10 UTC 2024 kill -USR1 62380 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62380 killed at Thu Dec 26 14:42:10 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62421 >/dev/null 2>/dev/null selfserv_9525 with PID 62421 found at Thu Dec 26 14:42:10 UTC 2024 selfserv_9525 with PID 62421 started at Thu Dec 26 14:42:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1124: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 62421 at Thu Dec 26 14:42:10 UTC 2024 kill -USR1 62421 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62421 killed at Thu Dec 26 14:42:10 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62462 >/dev/null 2>/dev/null selfserv_9525 with PID 62462 found at Thu Dec 26 14:42:10 UTC 2024 selfserv_9525 with PID 62462 started at Thu Dec 26 14:42:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62462 at Thu Dec 26 14:42:11 UTC 2024 kill -USR1 62462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62462 killed at Thu Dec 26 14:42:11 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62503 >/dev/null 2>/dev/null selfserv_9525 with PID 62503 found at Thu Dec 26 14:42:11 UTC 2024 selfserv_9525 with PID 62503 started at Thu Dec 26 14:42:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62503 at Thu Dec 26 14:42:11 UTC 2024 kill -USR1 62503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62503 killed at Thu Dec 26 14:42:11 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62544 >/dev/null 2>/dev/null selfserv_9525 with PID 62544 found at Thu Dec 26 14:42:11 UTC 2024 selfserv_9525 with PID 62544 started at Thu Dec 26 14:42:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62544 at Thu Dec 26 14:42:11 UTC 2024 kill -USR1 62544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62544 killed at Thu Dec 26 14:42:11 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62585 >/dev/null 2>/dev/null selfserv_9525 with PID 62585 found at Thu Dec 26 14:42:12 UTC 2024 selfserv_9525 with PID 62585 started at Thu Dec 26 14:42:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1128: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62585 at Thu Dec 26 14:42:12 UTC 2024 kill -USR1 62585 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62585 killed at Thu Dec 26 14:42:12 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62626 >/dev/null 2>/dev/null selfserv_9525 with PID 62626 found at Thu Dec 26 14:42:12 UTC 2024 selfserv_9525 with PID 62626 started at Thu Dec 26 14:42:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1129: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 62626 at Thu Dec 26 14:42:12 UTC 2024 kill -USR1 62626 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62626 killed at Thu Dec 26 14:42:12 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62667 >/dev/null 2>/dev/null selfserv_9525 with PID 62667 found at Thu Dec 26 14:42:12 UTC 2024 selfserv_9525 with PID 62667 started at Thu Dec 26 14:42:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62667 at Thu Dec 26 14:42:12 UTC 2024 kill -USR1 62667 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62667 killed at Thu Dec 26 14:42:12 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62708 >/dev/null 2>/dev/null selfserv_9525 with PID 62708 found at Thu Dec 26 14:42:13 UTC 2024 selfserv_9525 with PID 62708 started at Thu Dec 26 14:42:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62708 at Thu Dec 26 14:42:13 UTC 2024 kill -USR1 62708 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62708 killed at Thu Dec 26 14:42:13 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62749 >/dev/null 2>/dev/null selfserv_9525 with PID 62749 found at Thu Dec 26 14:42:13 UTC 2024 selfserv_9525 with PID 62749 started at Thu Dec 26 14:42:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1132: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62749 at Thu Dec 26 14:42:13 UTC 2024 kill -USR1 62749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62749 killed at Thu Dec 26 14:42:13 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62790 >/dev/null 2>/dev/null selfserv_9525 with PID 62790 found at Thu Dec 26 14:42:13 UTC 2024 selfserv_9525 with PID 62790 started at Thu Dec 26 14:42:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62790 at Thu Dec 26 14:42:14 UTC 2024 kill -USR1 62790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62790 killed at Thu Dec 26 14:42:14 UTC 2024 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62831 >/dev/null 2>/dev/null selfserv_9525 with PID 62831 found at Thu Dec 26 14:42:14 UTC 2024 selfserv_9525 with PID 62831 started at Thu Dec 26 14:42:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1134: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 62831 at Thu Dec 26 14:42:14 UTC 2024 kill -USR1 62831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62831 killed at Thu Dec 26 14:42:14 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62872 >/dev/null 2>/dev/null selfserv_9525 with PID 62872 found at Thu Dec 26 14:42:14 UTC 2024 selfserv_9525 with PID 62872 started at Thu Dec 26 14:42:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62872 at Thu Dec 26 14:42:14 UTC 2024 kill -USR1 62872 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62872 killed at Thu Dec 26 14:42:14 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62913 >/dev/null 2>/dev/null selfserv_9525 with PID 62913 found at Thu Dec 26 14:42:15 UTC 2024 selfserv_9525 with PID 62913 started at Thu Dec 26 14:42:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1136: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62913 at Thu Dec 26 14:42:15 UTC 2024 kill -USR1 62913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62913 killed at Thu Dec 26 14:42:15 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62954 >/dev/null 2>/dev/null selfserv_9525 with PID 62954 found at Thu Dec 26 14:42:15 UTC 2024 selfserv_9525 with PID 62954 started at Thu Dec 26 14:42:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 62954 at Thu Dec 26 14:42:15 UTC 2024 kill -USR1 62954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62954 killed at Thu Dec 26 14:42:15 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 62995 >/dev/null 2>/dev/null selfserv_9525 with PID 62995 found at Thu Dec 26 14:42:15 UTC 2024 selfserv_9525 with PID 62995 started at Thu Dec 26 14:42:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1138: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 62995 at Thu Dec 26 14:42:16 UTC 2024 kill -USR1 62995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 62995 killed at Thu Dec 26 14:42:16 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63036 >/dev/null 2>/dev/null selfserv_9525 with PID 63036 found at Thu Dec 26 14:42:16 UTC 2024 selfserv_9525 with PID 63036 started at Thu Dec 26 14:42:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63036 at Thu Dec 26 14:42:16 UTC 2024 kill -USR1 63036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63036 killed at Thu Dec 26 14:42:16 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63077 >/dev/null 2>/dev/null selfserv_9525 with PID 63077 found at Thu Dec 26 14:42:16 UTC 2024 selfserv_9525 with PID 63077 started at Thu Dec 26 14:42:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1140: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63077 at Thu Dec 26 14:42:16 UTC 2024 kill -USR1 63077 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63077 killed at Thu Dec 26 14:42:16 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63118 >/dev/null 2>/dev/null selfserv_9525 with PID 63118 found at Thu Dec 26 14:42:17 UTC 2024 selfserv_9525 with PID 63118 started at Thu Dec 26 14:42:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63118 at Thu Dec 26 14:42:17 UTC 2024 kill -USR1 63118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63118 killed at Thu Dec 26 14:42:17 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63159 >/dev/null 2>/dev/null selfserv_9525 with PID 63159 found at Thu Dec 26 14:42:17 UTC 2024 selfserv_9525 with PID 63159 started at Thu Dec 26 14:42:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1142: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 63159 at Thu Dec 26 14:42:17 UTC 2024 kill -USR1 63159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63159 killed at Thu Dec 26 14:42:17 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63200 >/dev/null 2>/dev/null selfserv_9525 with PID 63200 found at Thu Dec 26 14:42:17 UTC 2024 selfserv_9525 with PID 63200 started at Thu Dec 26 14:42:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63200 at Thu Dec 26 14:42:18 UTC 2024 kill -USR1 63200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63200 killed at Thu Dec 26 14:42:18 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63241 >/dev/null 2>/dev/null selfserv_9525 with PID 63241 found at Thu Dec 26 14:42:18 UTC 2024 selfserv_9525 with PID 63241 started at Thu Dec 26 14:42:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63241 at Thu Dec 26 14:42:18 UTC 2024 kill -USR1 63241 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63241 killed at Thu Dec 26 14:42:18 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63282 >/dev/null 2>/dev/null selfserv_9525 with PID 63282 found at Thu Dec 26 14:42:18 UTC 2024 selfserv_9525 with PID 63282 started at Thu Dec 26 14:42:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63282 at Thu Dec 26 14:42:19 UTC 2024 kill -USR1 63282 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63282 killed at Thu Dec 26 14:42:19 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63323 >/dev/null 2>/dev/null selfserv_9525 with PID 63323 found at Thu Dec 26 14:42:19 UTC 2024 selfserv_9525 with PID 63323 started at Thu Dec 26 14:42:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1146: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 63323 at Thu Dec 26 14:42:19 UTC 2024 kill -USR1 63323 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63323 killed at Thu Dec 26 14:42:19 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63364 >/dev/null 2>/dev/null selfserv_9525 with PID 63364 found at Thu Dec 26 14:42:19 UTC 2024 selfserv_9525 with PID 63364 started at Thu Dec 26 14:42:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63364 at Thu Dec 26 14:42:20 UTC 2024 kill -USR1 63364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63364 killed at Thu Dec 26 14:42:20 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63405 >/dev/null 2>/dev/null selfserv_9525 with PID 63405 found at Thu Dec 26 14:42:20 UTC 2024 selfserv_9525 with PID 63405 started at Thu Dec 26 14:42:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63405 at Thu Dec 26 14:42:20 UTC 2024 kill -USR1 63405 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63405 killed at Thu Dec 26 14:42:20 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63446 >/dev/null 2>/dev/null selfserv_9525 with PID 63446 found at Thu Dec 26 14:42:20 UTC 2024 selfserv_9525 with PID 63446 started at Thu Dec 26 14:42:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63446 at Thu Dec 26 14:42:21 UTC 2024 kill -USR1 63446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63446 killed at Thu Dec 26 14:42:21 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63487 >/dev/null 2>/dev/null selfserv_9525 with PID 63487 found at Thu Dec 26 14:42:21 UTC 2024 selfserv_9525 with PID 63487 started at Thu Dec 26 14:42:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1150: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 63487 at Thu Dec 26 14:42:21 UTC 2024 kill -USR1 63487 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63487 killed at Thu Dec 26 14:42:21 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63528 >/dev/null 2>/dev/null selfserv_9525 with PID 63528 found at Thu Dec 26 14:42:21 UTC 2024 selfserv_9525 with PID 63528 started at Thu Dec 26 14:42:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63528 at Thu Dec 26 14:42:21 UTC 2024 kill -USR1 63528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63528 killed at Thu Dec 26 14:42:21 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63569 >/dev/null 2>/dev/null selfserv_9525 with PID 63569 found at Thu Dec 26 14:42:22 UTC 2024 selfserv_9525 with PID 63569 started at Thu Dec 26 14:42:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1152: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63569 at Thu Dec 26 14:42:22 UTC 2024 kill -USR1 63569 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63569 killed at Thu Dec 26 14:42:22 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63610 >/dev/null 2>/dev/null selfserv_9525 with PID 63610 found at Thu Dec 26 14:42:22 UTC 2024 selfserv_9525 with PID 63610 started at Thu Dec 26 14:42:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63610 at Thu Dec 26 14:42:22 UTC 2024 kill -USR1 63610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63610 killed at Thu Dec 26 14:42:22 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:42:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63651 >/dev/null 2>/dev/null selfserv_9525 with PID 63651 found at Thu Dec 26 14:42:22 UTC 2024 selfserv_9525 with PID 63651 started at Thu Dec 26 14:42:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS 1.3 client certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63651 at Thu Dec 26 14:42:23 UTC 2024 kill -USR1 63651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63651 killed at Thu Dec 26 14:42:23 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:42:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63692 >/dev/null 2>/dev/null selfserv_9525 with PID 63692 found at Thu Dec 26 14:42:23 UTC 2024 selfserv_9525 with PID 63692 started at Thu Dec 26 14:42:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1155: TLS 1.3 server certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63692 at Thu Dec 26 14:42:23 UTC 2024 kill -USR1 63692 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63692 killed at Thu Dec 26 14:42:23 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:42:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63733 >/dev/null 2>/dev/null selfserv_9525 with PID 63733 found at Thu Dec 26 14:42:23 UTC 2024 selfserv_9525 with PID 63733 started at Thu Dec 26 14:42:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1156: TLS 1.3 client/server certificate comlpression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63733 at Thu Dec 26 14:42:24 UTC 2024 kill -USR1 63733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63733 killed at Thu Dec 26 14:42:24 UTC 2024 ssl.sh: TLS Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:42:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63780 >/dev/null 2>/dev/null selfserv_9525 with PID 63780 found at Thu Dec 26 14:42:24 UTC 2024 selfserv_9525 with PID 63780 started at Thu Dec 26 14:42:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1157: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63780 at Thu Dec 26 14:42:24 UTC 2024 kill -USR1 63780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63780 killed at Thu Dec 26 14:42:24 UTC 2024 ssl.sh: TLS Server hello response with SNI ---- selfserv_9525 starting at Thu Dec 26 14:42:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63827 >/dev/null 2>/dev/null selfserv_9525 with PID 63827 found at Thu Dec 26 14:42:24 UTC 2024 selfserv_9525 with PID 63827 started at Thu Dec 26 14:42:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1158: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63827 at Thu Dec 26 14:42:24 UTC 2024 kill -USR1 63827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63827 killed at Thu Dec 26 14:42:24 UTC 2024 ssl.sh: TLS Server response with alert ---- selfserv_9525 starting at Thu Dec 26 14:42:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63874 >/dev/null 2>/dev/null selfserv_9525 with PID 63874 found at Thu Dec 26 14:42:24 UTC 2024 selfserv_9525 with PID 63874 started at Thu Dec 26 14:42:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1159: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 63874 at Thu Dec 26 14:42:25 UTC 2024 kill -USR1 63874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63874 killed at Thu Dec 26 14:42:25 UTC 2024 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:42:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63921 >/dev/null 2>/dev/null selfserv_9525 with PID 63921 found at Thu Dec 26 14:42:25 UTC 2024 selfserv_9525 with PID 63921 started at Thu Dec 26 14:42:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1160: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 63921 at Thu Dec 26 14:42:25 UTC 2024 kill -USR1 63921 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63921 killed at Thu Dec 26 14:42:25 UTC 2024 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9525 starting at Thu Dec 26 14:42:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 63968 >/dev/null 2>/dev/null selfserv_9525 with PID 63968 found at Thu Dec 26 14:42:25 UTC 2024 selfserv_9525 with PID 63968 started at Thu Dec 26 14:42:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1161: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 63968 at Thu Dec 26 14:42:25 UTC 2024 kill -USR1 63968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 63968 killed at Thu Dec 26 14:42:25 UTC 2024 ssl.sh: TLS Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:42:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64015 >/dev/null 2>/dev/null selfserv_9525 with PID 64015 found at Thu Dec 26 14:42:25 UTC 2024 selfserv_9525 with PID 64015 started at Thu Dec 26 14:42:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1162: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64015 at Thu Dec 26 14:42:26 UTC 2024 kill -USR1 64015 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64015 killed at Thu Dec 26 14:42:26 UTC 2024 ssl.sh: TLS Server hello response with SNI ---- selfserv_9525 starting at Thu Dec 26 14:42:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64062 >/dev/null 2>/dev/null selfserv_9525 with PID 64062 found at Thu Dec 26 14:42:26 UTC 2024 selfserv_9525 with PID 64062 started at Thu Dec 26 14:42:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1163: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64062 at Thu Dec 26 14:42:26 UTC 2024 kill -USR1 64062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64062 killed at Thu Dec 26 14:42:26 UTC 2024 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9525 starting at Thu Dec 26 14:42:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64109 >/dev/null 2>/dev/null selfserv_9525 with PID 64109 found at Thu Dec 26 14:42:26 UTC 2024 selfserv_9525 with PID 64109 started at Thu Dec 26 14:42:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1164: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 64109 at Thu Dec 26 14:42:27 UTC 2024 kill -USR1 64109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64109 killed at Thu Dec 26 14:42:27 UTC 2024 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9525 starting at Thu Dec 26 14:42:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64156 >/dev/null 2>/dev/null selfserv_9525 with PID 64156 found at Thu Dec 26 14:42:27 UTC 2024 selfserv_9525 with PID 64156 started at Thu Dec 26 14:42:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1165: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 64156 at Thu Dec 26 14:42:27 UTC 2024 kill -USR1 64156 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64156 killed at Thu Dec 26 14:42:27 UTC 2024 ssl.sh: TLS Server response with alert ---- selfserv_9525 starting at Thu Dec 26 14:42:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64203 >/dev/null 2>/dev/null selfserv_9525 with PID 64203 found at Thu Dec 26 14:42:27 UTC 2024 selfserv_9525 with PID 64203 started at Thu Dec 26 14:42:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1166: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 64203 at Thu Dec 26 14:42:27 UTC 2024 kill -USR1 64203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64203 killed at Thu Dec 26 14:42:27 UTC 2024 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9525 starting at Thu Dec 26 14:42:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64234 >/dev/null 2>/dev/null selfserv_9525 with PID 64234 found at Thu Dec 26 14:42:27 UTC 2024 selfserv_9525 with PID 64234 started at Thu Dec 26 14:42:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1096: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64234 at Thu Dec 26 14:42:27 UTC 2024 kill -USR1 64234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64234 killed at Thu Dec 26 14:42:27 UTC 2024 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9525 starting at Thu Dec 26 14:42:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64265 >/dev/null 2>/dev/null selfserv_9525 with PID 64265 found at Thu Dec 26 14:42:28 UTC 2024 selfserv_9525 with PID 64265 started at Thu Dec 26 14:42:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1097: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9525 with PID 64265 at Thu Dec 26 14:42:28 UTC 2024 kill -USR1 64265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64265 killed at Thu Dec 26 14:42:28 UTC 2024 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9525 starting at Thu Dec 26 14:42:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64296 >/dev/null 2>/dev/null selfserv_9525 with PID 64296 found at Thu Dec 26 14:42:28 UTC 2024 selfserv_9525 with PID 64296 started at Thu Dec 26 14:42:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1098: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 64296 at Thu Dec 26 14:42:28 UTC 2024 kill -USR1 64296 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64296 killed at Thu Dec 26 14:42:28 UTC 2024 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9525 starting at Thu Dec 26 14:42:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64327 >/dev/null 2>/dev/null selfserv_9525 with PID 64327 found at Thu Dec 26 14:42:28 UTC 2024 selfserv_9525 with PID 64327 started at Thu Dec 26 14:42:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1099: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 64327 at Thu Dec 26 14:42:28 UTC 2024 kill -USR1 64327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64327 killed at Thu Dec 26 14:42:28 UTC 2024 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9525 starting at Thu Dec 26 14:42:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64358 >/dev/null 2>/dev/null selfserv_9525 with PID 64358 found at Thu Dec 26 14:42:28 UTC 2024 selfserv_9525 with PID 64358 started at Thu Dec 26 14:42:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1100: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 64358 at Thu Dec 26 14:42:29 UTC 2024 kill -USR1 64358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64358 killed at Thu Dec 26 14:42:29 UTC 2024 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9525 starting at Thu Dec 26 14:42:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64389 >/dev/null 2>/dev/null selfserv_9525 with PID 64389 found at Thu Dec 26 14:42:29 UTC 2024 selfserv_9525 with PID 64389 started at Thu Dec 26 14:42:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1101: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 64389 at Thu Dec 26 14:42:29 UTC 2024 kill -USR1 64389 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64389 killed at Thu Dec 26 14:42:29 UTC 2024 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9525 starting at Thu Dec 26 14:42:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64420 >/dev/null 2>/dev/null selfserv_9525 with PID 64420 found at Thu Dec 26 14:42:29 UTC 2024 selfserv_9525 with PID 64420 started at Thu Dec 26 14:42:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1102: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 64420 at Thu Dec 26 14:42:29 UTC 2024 kill -USR1 64420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64420 killed at Thu Dec 26 14:42:29 UTC 2024 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9525 starting at Thu Dec 26 14:42:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64451 >/dev/null 2>/dev/null selfserv_9525 with PID 64451 found at Thu Dec 26 14:42:29 UTC 2024 selfserv_9525 with PID 64451 started at Thu Dec 26 14:42:29 UTC 2024 strsclnt -4 -q -p 9525 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Thu Dec 26 14:42:29 UTC 2024 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Thu Dec 26 14:42:39 UTC 2024 ssl.sh: #1103: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9525 with PID 64451 at Thu Dec 26 14:42:39 UTC 2024 kill -USR1 64451 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64451 killed at Thu Dec 26 14:42:39 UTC 2024 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9525 starting at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64489 >/dev/null 2>/dev/null selfserv_9525 with PID 64489 found at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 with PID 64489 started at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64489 at Thu Dec 26 14:42:39 UTC 2024 kill -USR1 64489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64489 killed at Thu Dec 26 14:42:39 UTC 2024 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64520 >/dev/null 2>/dev/null selfserv_9525 with PID 64520 found at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 with PID 64520 started at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64520 at Thu Dec 26 14:42:39 UTC 2024 kill -USR1 64520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64520 killed at Thu Dec 26 14:42:39 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64548 >/dev/null 2>/dev/null selfserv_9525 with PID 64548 found at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 with PID 64548 started at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 64548 at Thu Dec 26 14:42:39 UTC 2024 kill -USR1 64548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64548 killed at Thu Dec 26 14:42:39 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64576 >/dev/null 2>/dev/null selfserv_9525 with PID 64576 found at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 with PID 64576 started at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64576 at Thu Dec 26 14:42:39 UTC 2024 kill -USR1 64576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64576 killed at Thu Dec 26 14:42:39 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64604 >/dev/null 2>/dev/null selfserv_9525 with PID 64604 found at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 with PID 64604 started at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1108: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 64604 at Thu Dec 26 14:42:40 UTC 2024 kill -USR1 64604 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64604 killed at Thu Dec 26 14:42:40 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64632 >/dev/null 2>/dev/null selfserv_9525 with PID 64632 found at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 with PID 64632 started at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64632 at Thu Dec 26 14:42:40 UTC 2024 kill -USR1 64632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64632 killed at Thu Dec 26 14:42:40 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64660 >/dev/null 2>/dev/null selfserv_9525 with PID 64660 found at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 with PID 64660 started at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64660 at Thu Dec 26 14:42:40 UTC 2024 kill -USR1 64660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64660 killed at Thu Dec 26 14:42:40 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64688 >/dev/null 2>/dev/null selfserv_9525 with PID 64688 found at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 with PID 64688 started at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64688 at Thu Dec 26 14:42:40 UTC 2024 kill -USR1 64688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64688 killed at Thu Dec 26 14:42:40 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64716 >/dev/null 2>/dev/null selfserv_9525 with PID 64716 found at Thu Dec 26 14:42:40 UTC 2024 selfserv_9525 with PID 64716 started at Thu Dec 26 14:42:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1112: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64716 at Thu Dec 26 14:42:41 UTC 2024 kill -USR1 64716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64716 killed at Thu Dec 26 14:42:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64744 >/dev/null 2>/dev/null selfserv_9525 with PID 64744 found at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 with PID 64744 started at Thu Dec 26 14:42:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64744 at Thu Dec 26 14:42:41 UTC 2024 kill -USR1 64744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64744 killed at Thu Dec 26 14:42:41 UTC 2024 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64772 >/dev/null 2>/dev/null selfserv_9525 with PID 64772 found at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 with PID 64772 started at Thu Dec 26 14:42:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64772 at Thu Dec 26 14:42:41 UTC 2024 kill -USR1 64772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64772 killed at Thu Dec 26 14:42:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64801 >/dev/null 2>/dev/null selfserv_9525 with PID 64801 found at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 with PID 64801 started at Thu Dec 26 14:42:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 64801 at Thu Dec 26 14:42:41 UTC 2024 kill -USR1 64801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64801 killed at Thu Dec 26 14:42:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64830 >/dev/null 2>/dev/null selfserv_9525 with PID 64830 found at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 with PID 64830 started at Thu Dec 26 14:42:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64830 at Thu Dec 26 14:42:41 UTC 2024 kill -USR1 64830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64830 killed at Thu Dec 26 14:42:41 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64859 >/dev/null 2>/dev/null selfserv_9525 with PID 64859 found at Thu Dec 26 14:42:41 UTC 2024 selfserv_9525 with PID 64859 started at Thu Dec 26 14:42:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1117: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 64859 at Thu Dec 26 14:42:42 UTC 2024 kill -USR1 64859 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64859 killed at Thu Dec 26 14:42:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64888 >/dev/null 2>/dev/null selfserv_9525 with PID 64888 found at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 with PID 64888 started at Thu Dec 26 14:42:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1118: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64888 at Thu Dec 26 14:42:42 UTC 2024 kill -USR1 64888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64888 killed at Thu Dec 26 14:42:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64917 >/dev/null 2>/dev/null selfserv_9525 with PID 64917 found at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 with PID 64917 started at Thu Dec 26 14:42:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1119: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64917 at Thu Dec 26 14:42:42 UTC 2024 kill -USR1 64917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64917 killed at Thu Dec 26 14:42:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64946 >/dev/null 2>/dev/null selfserv_9525 with PID 64946 found at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 with PID 64946 started at Thu Dec 26 14:42:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1120: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64946 at Thu Dec 26 14:42:42 UTC 2024 kill -USR1 64946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64946 killed at Thu Dec 26 14:42:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 64975 >/dev/null 2>/dev/null selfserv_9525 with PID 64975 found at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 with PID 64975 started at Thu Dec 26 14:42:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1121: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 64975 at Thu Dec 26 14:42:42 UTC 2024 kill -USR1 64975 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 64975 killed at Thu Dec 26 14:42:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:42:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 65004 >/dev/null 2>/dev/null selfserv_9525 with PID 65004 found at Thu Dec 26 14:42:43 UTC 2024 selfserv_9525 with PID 65004 started at Thu Dec 26 14:42:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1122: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 65004 at Thu Dec 26 14:42:43 UTC 2024 kill -USR1 65004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 65004 killed at Thu Dec 26 14:42:43 UTC 2024 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9525 starting at Thu Dec 26 14:42:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 65033 >/dev/null 2>/dev/null selfserv_9525 with PID 65033 found at Thu Dec 26 14:42:43 UTC 2024 selfserv_9525 with PID 65033 started at Thu Dec 26 14:42:43 UTC 2024 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9525 with PID 65033 at Thu Dec 26 14:42:48 UTC 2024 kill -USR1 65033 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 65033 killed at Thu Dec 26 14:42:48 UTC 2024 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9525 starting at Thu Dec 26 14:42:48 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 65520 >/dev/null 2>/dev/null selfserv_9525 with PID 65520 found at Thu Dec 26 14:42:48 UTC 2024 selfserv_9525 with PID 65520 started at Thu Dec 26 14:42:48 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 65520 at Thu Dec 26 14:42:58 UTC 2024 kill -USR1 65520 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 65520 killed at Thu Dec 26 14:42:58 UTC 2024 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:58 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66244 >/dev/null 2>/dev/null selfserv_9525 with PID 66244 found at Thu Dec 26 14:42:58 UTC 2024 selfserv_9525 with PID 66244 started at Thu Dec 26 14:42:58 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66244 at Thu Dec 26 14:42:59 UTC 2024 kill -USR1 66244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66244 killed at Thu Dec 26 14:42:59 UTC 2024 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:42:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66285 >/dev/null 2>/dev/null selfserv_9525 with PID 66285 found at Thu Dec 26 14:42:59 UTC 2024 selfserv_9525 with PID 66285 started at Thu Dec 26 14:42:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66285 at Thu Dec 26 14:42:59 UTC 2024 kill -USR1 66285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66285 killed at Thu Dec 26 14:42:59 UTC 2024 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:42:59 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:42:59 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66326 >/dev/null 2>/dev/null selfserv_9525 with PID 66326 found at Thu Dec 26 14:43:00 UTC 2024 selfserv_9525 with PID 66326 started at Thu Dec 26 14:43:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66326 at Thu Dec 26 14:43:00 UTC 2024 kill -USR1 66326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66326 killed at Thu Dec 26 14:43:00 UTC 2024 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:00 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66367 >/dev/null 2>/dev/null selfserv_9525 with PID 66367 found at Thu Dec 26 14:43:00 UTC 2024 selfserv_9525 with PID 66367 started at Thu Dec 26 14:43:00 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 66367 at Thu Dec 26 14:43:01 UTC 2024 kill -USR1 66367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66367 killed at Thu Dec 26 14:43:01 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66408 >/dev/null 2>/dev/null selfserv_9525 with PID 66408 found at Thu Dec 26 14:43:01 UTC 2024 selfserv_9525 with PID 66408 started at Thu Dec 26 14:43:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 66408 at Thu Dec 26 14:43:01 UTC 2024 kill -USR1 66408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66408 killed at Thu Dec 26 14:43:01 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66449 >/dev/null 2>/dev/null selfserv_9525 with PID 66449 found at Thu Dec 26 14:43:01 UTC 2024 selfserv_9525 with PID 66449 started at Thu Dec 26 14:43:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66449 at Thu Dec 26 14:43:02 UTC 2024 kill -USR1 66449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66449 killed at Thu Dec 26 14:43:02 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66490 >/dev/null 2>/dev/null selfserv_9525 with PID 66490 found at Thu Dec 26 14:43:02 UTC 2024 selfserv_9525 with PID 66490 started at Thu Dec 26 14:43:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66490 at Thu Dec 26 14:43:02 UTC 2024 kill -USR1 66490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66490 killed at Thu Dec 26 14:43:02 UTC 2024 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66531 >/dev/null 2>/dev/null selfserv_9525 with PID 66531 found at Thu Dec 26 14:43:03 UTC 2024 selfserv_9525 with PID 66531 started at Thu Dec 26 14:43:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66531 at Thu Dec 26 14:43:03 UTC 2024 kill -USR1 66531 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66531 killed at Thu Dec 26 14:43:03 UTC 2024 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66572 >/dev/null 2>/dev/null selfserv_9525 with PID 66572 found at Thu Dec 26 14:43:03 UTC 2024 selfserv_9525 with PID 66572 started at Thu Dec 26 14:43:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66572 at Thu Dec 26 14:43:04 UTC 2024 kill -USR1 66572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66572 killed at Thu Dec 26 14:43:04 UTC 2024 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66613 >/dev/null 2>/dev/null selfserv_9525 with PID 66613 found at Thu Dec 26 14:43:04 UTC 2024 selfserv_9525 with PID 66613 started at Thu Dec 26 14:43:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 66613 at Thu Dec 26 14:43:04 UTC 2024 kill -USR1 66613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66613 killed at Thu Dec 26 14:43:04 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66654 >/dev/null 2>/dev/null selfserv_9525 with PID 66654 found at Thu Dec 26 14:43:04 UTC 2024 selfserv_9525 with PID 66654 started at Thu Dec 26 14:43:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 66654 at Thu Dec 26 14:43:05 UTC 2024 kill -USR1 66654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66654 killed at Thu Dec 26 14:43:05 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66695 >/dev/null 2>/dev/null selfserv_9525 with PID 66695 found at Thu Dec 26 14:43:05 UTC 2024 selfserv_9525 with PID 66695 started at Thu Dec 26 14:43:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66695 at Thu Dec 26 14:43:05 UTC 2024 kill -USR1 66695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66695 killed at Thu Dec 26 14:43:05 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66736 >/dev/null 2>/dev/null selfserv_9525 with PID 66736 found at Thu Dec 26 14:43:05 UTC 2024 selfserv_9525 with PID 66736 started at Thu Dec 26 14:43:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66736 at Thu Dec 26 14:43:06 UTC 2024 kill -USR1 66736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66736 killed at Thu Dec 26 14:43:06 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66777 >/dev/null 2>/dev/null selfserv_9525 with PID 66777 found at Thu Dec 26 14:43:06 UTC 2024 selfserv_9525 with PID 66777 started at Thu Dec 26 14:43:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66777 at Thu Dec 26 14:43:07 UTC 2024 kill -USR1 66777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66777 killed at Thu Dec 26 14:43:07 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66818 >/dev/null 2>/dev/null selfserv_9525 with PID 66818 found at Thu Dec 26 14:43:07 UTC 2024 selfserv_9525 with PID 66818 started at Thu Dec 26 14:43:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66818 at Thu Dec 26 14:43:07 UTC 2024 kill -USR1 66818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66818 killed at Thu Dec 26 14:43:07 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66859 >/dev/null 2>/dev/null selfserv_9525 with PID 66859 found at Thu Dec 26 14:43:08 UTC 2024 selfserv_9525 with PID 66859 started at Thu Dec 26 14:43:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 66859 at Thu Dec 26 14:43:08 UTC 2024 kill -USR1 66859 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66859 killed at Thu Dec 26 14:43:08 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66900 >/dev/null 2>/dev/null selfserv_9525 with PID 66900 found at Thu Dec 26 14:43:08 UTC 2024 selfserv_9525 with PID 66900 started at Thu Dec 26 14:43:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 66900 at Thu Dec 26 14:43:09 UTC 2024 kill -USR1 66900 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66900 killed at Thu Dec 26 14:43:09 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66941 >/dev/null 2>/dev/null selfserv_9525 with PID 66941 found at Thu Dec 26 14:43:09 UTC 2024 selfserv_9525 with PID 66941 started at Thu Dec 26 14:43:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66941 at Thu Dec 26 14:43:10 UTC 2024 kill -USR1 66941 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66941 killed at Thu Dec 26 14:43:10 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 66982 >/dev/null 2>/dev/null selfserv_9525 with PID 66982 found at Thu Dec 26 14:43:10 UTC 2024 selfserv_9525 with PID 66982 started at Thu Dec 26 14:43:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 66982 at Thu Dec 26 14:43:10 UTC 2024 kill -USR1 66982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 66982 killed at Thu Dec 26 14:43:10 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67023 >/dev/null 2>/dev/null selfserv_9525 with PID 67023 found at Thu Dec 26 14:43:10 UTC 2024 selfserv_9525 with PID 67023 started at Thu Dec 26 14:43:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67023 at Thu Dec 26 14:43:11 UTC 2024 kill -USR1 67023 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67023 killed at Thu Dec 26 14:43:11 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67064 >/dev/null 2>/dev/null selfserv_9525 with PID 67064 found at Thu Dec 26 14:43:11 UTC 2024 selfserv_9525 with PID 67064 started at Thu Dec 26 14:43:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67064 at Thu Dec 26 14:43:12 UTC 2024 kill -USR1 67064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67064 killed at Thu Dec 26 14:43:12 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67105 >/dev/null 2>/dev/null selfserv_9525 with PID 67105 found at Thu Dec 26 14:43:12 UTC 2024 selfserv_9525 with PID 67105 started at Thu Dec 26 14:43:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 67105 at Thu Dec 26 14:43:12 UTC 2024 kill -USR1 67105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67105 killed at Thu Dec 26 14:43:12 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67146 >/dev/null 2>/dev/null selfserv_9525 with PID 67146 found at Thu Dec 26 14:43:13 UTC 2024 selfserv_9525 with PID 67146 started at Thu Dec 26 14:43:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 67146 at Thu Dec 26 14:43:13 UTC 2024 kill -USR1 67146 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67146 killed at Thu Dec 26 14:43:13 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67187 >/dev/null 2>/dev/null selfserv_9525 with PID 67187 found at Thu Dec 26 14:43:13 UTC 2024 selfserv_9525 with PID 67187 started at Thu Dec 26 14:43:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67187 at Thu Dec 26 14:43:14 UTC 2024 kill -USR1 67187 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67187 killed at Thu Dec 26 14:43:14 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67228 >/dev/null 2>/dev/null selfserv_9525 with PID 67228 found at Thu Dec 26 14:43:14 UTC 2024 selfserv_9525 with PID 67228 started at Thu Dec 26 14:43:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67228 at Thu Dec 26 14:43:15 UTC 2024 kill -USR1 67228 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67228 killed at Thu Dec 26 14:43:15 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67269 >/dev/null 2>/dev/null selfserv_9525 with PID 67269 found at Thu Dec 26 14:43:15 UTC 2024 selfserv_9525 with PID 67269 started at Thu Dec 26 14:43:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67269 at Thu Dec 26 14:43:15 UTC 2024 kill -USR1 67269 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67269 killed at Thu Dec 26 14:43:15 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67310 >/dev/null 2>/dev/null selfserv_9525 with PID 67310 found at Thu Dec 26 14:43:15 UTC 2024 selfserv_9525 with PID 67310 started at Thu Dec 26 14:43:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67310 at Thu Dec 26 14:43:16 UTC 2024 kill -USR1 67310 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67310 killed at Thu Dec 26 14:43:16 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67351 >/dev/null 2>/dev/null selfserv_9525 with PID 67351 found at Thu Dec 26 14:43:16 UTC 2024 selfserv_9525 with PID 67351 started at Thu Dec 26 14:43:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1277: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 67351 at Thu Dec 26 14:43:16 UTC 2024 kill -USR1 67351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67351 killed at Thu Dec 26 14:43:16 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67392 >/dev/null 2>/dev/null selfserv_9525 with PID 67392 found at Thu Dec 26 14:43:17 UTC 2024 selfserv_9525 with PID 67392 started at Thu Dec 26 14:43:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1278: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 67392 at Thu Dec 26 14:43:17 UTC 2024 kill -USR1 67392 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67392 killed at Thu Dec 26 14:43:17 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67433 >/dev/null 2>/dev/null selfserv_9525 with PID 67433 found at Thu Dec 26 14:43:17 UTC 2024 selfserv_9525 with PID 67433 started at Thu Dec 26 14:43:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67433 at Thu Dec 26 14:43:18 UTC 2024 kill -USR1 67433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67433 killed at Thu Dec 26 14:43:18 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67474 >/dev/null 2>/dev/null selfserv_9525 with PID 67474 found at Thu Dec 26 14:43:18 UTC 2024 selfserv_9525 with PID 67474 started at Thu Dec 26 14:43:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67474 at Thu Dec 26 14:43:18 UTC 2024 kill -USR1 67474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67474 killed at Thu Dec 26 14:43:18 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67515 >/dev/null 2>/dev/null selfserv_9525 with PID 67515 found at Thu Dec 26 14:43:18 UTC 2024 selfserv_9525 with PID 67515 started at Thu Dec 26 14:43:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67515 at Thu Dec 26 14:43:19 UTC 2024 kill -USR1 67515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67515 killed at Thu Dec 26 14:43:19 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67556 >/dev/null 2>/dev/null selfserv_9525 with PID 67556 found at Thu Dec 26 14:43:19 UTC 2024 selfserv_9525 with PID 67556 started at Thu Dec 26 14:43:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1282: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67556 at Thu Dec 26 14:43:19 UTC 2024 kill -USR1 67556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67556 killed at Thu Dec 26 14:43:19 UTC 2024 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67597 >/dev/null 2>/dev/null selfserv_9525 with PID 67597 found at Thu Dec 26 14:43:19 UTC 2024 selfserv_9525 with PID 67597 started at Thu Dec 26 14:43:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1283: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 67597 at Thu Dec 26 14:43:20 UTC 2024 kill -USR1 67597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67597 killed at Thu Dec 26 14:43:20 UTC 2024 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67638 >/dev/null 2>/dev/null selfserv_9525 with PID 67638 found at Thu Dec 26 14:43:20 UTC 2024 selfserv_9525 with PID 67638 started at Thu Dec 26 14:43:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67638 at Thu Dec 26 14:43:20 UTC 2024 kill -USR1 67638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67638 killed at Thu Dec 26 14:43:20 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67679 >/dev/null 2>/dev/null selfserv_9525 with PID 67679 found at Thu Dec 26 14:43:21 UTC 2024 selfserv_9525 with PID 67679 started at Thu Dec 26 14:43:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67679 at Thu Dec 26 14:43:21 UTC 2024 kill -USR1 67679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67679 killed at Thu Dec 26 14:43:21 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67720 >/dev/null 2>/dev/null selfserv_9525 with PID 67720 found at Thu Dec 26 14:43:21 UTC 2024 selfserv_9525 with PID 67720 started at Thu Dec 26 14:43:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1286: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67720 at Thu Dec 26 14:43:22 UTC 2024 kill -USR1 67720 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67720 killed at Thu Dec 26 14:43:22 UTC 2024 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67761 >/dev/null 2>/dev/null selfserv_9525 with PID 67761 found at Thu Dec 26 14:43:22 UTC 2024 selfserv_9525 with PID 67761 started at Thu Dec 26 14:43:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67761 at Thu Dec 26 14:43:22 UTC 2024 kill -USR1 67761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67761 killed at Thu Dec 26 14:43:22 UTC 2024 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67802 >/dev/null 2>/dev/null selfserv_9525 with PID 67802 found at Thu Dec 26 14:43:23 UTC 2024 selfserv_9525 with PID 67802 started at Thu Dec 26 14:43:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1288: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 67802 at Thu Dec 26 14:43:23 UTC 2024 kill -USR1 67802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67802 killed at Thu Dec 26 14:43:23 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67843 >/dev/null 2>/dev/null selfserv_9525 with PID 67843 found at Thu Dec 26 14:43:23 UTC 2024 selfserv_9525 with PID 67843 started at Thu Dec 26 14:43:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67843 at Thu Dec 26 14:43:24 UTC 2024 kill -USR1 67843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67843 killed at Thu Dec 26 14:43:24 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67884 >/dev/null 2>/dev/null selfserv_9525 with PID 67884 found at Thu Dec 26 14:43:24 UTC 2024 selfserv_9525 with PID 67884 started at Thu Dec 26 14:43:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1290: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67884 at Thu Dec 26 14:43:24 UTC 2024 kill -USR1 67884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67884 killed at Thu Dec 26 14:43:24 UTC 2024 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67925 >/dev/null 2>/dev/null selfserv_9525 with PID 67925 found at Thu Dec 26 14:43:24 UTC 2024 selfserv_9525 with PID 67925 started at Thu Dec 26 14:43:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 67925 at Thu Dec 26 14:43:25 UTC 2024 kill -USR1 67925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67925 killed at Thu Dec 26 14:43:25 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 67966 >/dev/null 2>/dev/null selfserv_9525 with PID 67966 found at Thu Dec 26 14:43:25 UTC 2024 selfserv_9525 with PID 67966 started at Thu Dec 26 14:43:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1292: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 67966 at Thu Dec 26 14:43:25 UTC 2024 kill -USR1 67966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 67966 killed at Thu Dec 26 14:43:25 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68007 >/dev/null 2>/dev/null selfserv_9525 with PID 68007 found at Thu Dec 26 14:43:26 UTC 2024 selfserv_9525 with PID 68007 started at Thu Dec 26 14:43:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68007 at Thu Dec 26 14:43:26 UTC 2024 kill -USR1 68007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68007 killed at Thu Dec 26 14:43:26 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68048 >/dev/null 2>/dev/null selfserv_9525 with PID 68048 found at Thu Dec 26 14:43:26 UTC 2024 selfserv_9525 with PID 68048 started at Thu Dec 26 14:43:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1294: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68048 at Thu Dec 26 14:43:27 UTC 2024 kill -USR1 68048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68048 killed at Thu Dec 26 14:43:27 UTC 2024 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68089 >/dev/null 2>/dev/null selfserv_9525 with PID 68089 found at Thu Dec 26 14:43:27 UTC 2024 selfserv_9525 with PID 68089 started at Thu Dec 26 14:43:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68089 at Thu Dec 26 14:43:28 UTC 2024 kill -USR1 68089 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68089 killed at Thu Dec 26 14:43:28 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68130 >/dev/null 2>/dev/null selfserv_9525 with PID 68130 found at Thu Dec 26 14:43:28 UTC 2024 selfserv_9525 with PID 68130 started at Thu Dec 26 14:43:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1296: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 68130 at Thu Dec 26 14:43:28 UTC 2024 kill -USR1 68130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68130 killed at Thu Dec 26 14:43:28 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68171 >/dev/null 2>/dev/null selfserv_9525 with PID 68171 found at Thu Dec 26 14:43:28 UTC 2024 selfserv_9525 with PID 68171 started at Thu Dec 26 14:43:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68171 at Thu Dec 26 14:43:29 UTC 2024 kill -USR1 68171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68171 killed at Thu Dec 26 14:43:29 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68212 >/dev/null 2>/dev/null selfserv_9525 with PID 68212 found at Thu Dec 26 14:43:29 UTC 2024 selfserv_9525 with PID 68212 started at Thu Dec 26 14:43:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68212 at Thu Dec 26 14:43:30 UTC 2024 kill -USR1 68212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68212 killed at Thu Dec 26 14:43:30 UTC 2024 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68253 >/dev/null 2>/dev/null selfserv_9525 with PID 68253 found at Thu Dec 26 14:43:30 UTC 2024 selfserv_9525 with PID 68253 started at Thu Dec 26 14:43:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68253 at Thu Dec 26 14:43:31 UTC 2024 kill -USR1 68253 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68253 killed at Thu Dec 26 14:43:31 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68294 >/dev/null 2>/dev/null selfserv_9525 with PID 68294 found at Thu Dec 26 14:43:31 UTC 2024 selfserv_9525 with PID 68294 started at Thu Dec 26 14:43:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 68294 at Thu Dec 26 14:43:31 UTC 2024 kill -USR1 68294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68294 killed at Thu Dec 26 14:43:31 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68335 >/dev/null 2>/dev/null selfserv_9525 with PID 68335 found at Thu Dec 26 14:43:32 UTC 2024 selfserv_9525 with PID 68335 started at Thu Dec 26 14:43:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68335 at Thu Dec 26 14:43:32 UTC 2024 kill -USR1 68335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68335 killed at Thu Dec 26 14:43:32 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:32 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68376 >/dev/null 2>/dev/null selfserv_9525 with PID 68376 found at Thu Dec 26 14:43:32 UTC 2024 selfserv_9525 with PID 68376 started at Thu Dec 26 14:43:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1302: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68376 at Thu Dec 26 14:43:33 UTC 2024 kill -USR1 68376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68376 killed at Thu Dec 26 14:43:33 UTC 2024 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:33 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68417 >/dev/null 2>/dev/null selfserv_9525 with PID 68417 found at Thu Dec 26 14:43:33 UTC 2024 selfserv_9525 with PID 68417 started at Thu Dec 26 14:43:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68417 at Thu Dec 26 14:43:34 UTC 2024 kill -USR1 68417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68417 killed at Thu Dec 26 14:43:34 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:43:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68458 >/dev/null 2>/dev/null selfserv_9525 with PID 68458 found at Thu Dec 26 14:43:34 UTC 2024 selfserv_9525 with PID 68458 started at Thu Dec 26 14:43:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1304: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 68458 at Thu Dec 26 14:43:34 UTC 2024 kill -USR1 68458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68458 killed at Thu Dec 26 14:43:34 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:34 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68499 >/dev/null 2>/dev/null selfserv_9525 with PID 68499 found at Thu Dec 26 14:43:34 UTC 2024 selfserv_9525 with PID 68499 started at Thu Dec 26 14:43:34 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1305: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68499 at Thu Dec 26 14:43:35 UTC 2024 kill -USR1 68499 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68499 killed at Thu Dec 26 14:43:35 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:35 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68540 >/dev/null 2>/dev/null selfserv_9525 with PID 68540 found at Thu Dec 26 14:43:35 UTC 2024 selfserv_9525 with PID 68540 started at Thu Dec 26 14:43:35 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1306: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68540 at Thu Dec 26 14:43:36 UTC 2024 kill -USR1 68540 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68540 killed at Thu Dec 26 14:43:36 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:43:36 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68581 >/dev/null 2>/dev/null selfserv_9525 with PID 68581 found at Thu Dec 26 14:43:36 UTC 2024 selfserv_9525 with PID 68581 started at Thu Dec 26 14:43:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1307: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68581 at Thu Dec 26 14:43:36 UTC 2024 kill -USR1 68581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68581 killed at Thu Dec 26 14:43:36 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:43:36 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68622 >/dev/null 2>/dev/null selfserv_9525 with PID 68622 found at Thu Dec 26 14:43:36 UTC 2024 selfserv_9525 with PID 68622 started at Thu Dec 26 14:43:36 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1308: TLS 1.3 client certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68622 at Thu Dec 26 14:43:37 UTC 2024 kill -USR1 68622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68622 killed at Thu Dec 26 14:43:37 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:43:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68663 >/dev/null 2>/dev/null selfserv_9525 with PID 68663 found at Thu Dec 26 14:43:37 UTC 2024 selfserv_9525 with PID 68663 started at Thu Dec 26 14:43:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1309: TLS 1.3 server certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68663 at Thu Dec 26 14:43:37 UTC 2024 kill -USR1 68663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68663 killed at Thu Dec 26 14:43:37 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:43:37 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68704 >/dev/null 2>/dev/null selfserv_9525 with PID 68704 found at Thu Dec 26 14:43:37 UTC 2024 selfserv_9525 with PID 68704 started at Thu Dec 26 14:43:37 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1310: TLS 1.3 client/server certificate comlpression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68704 at Thu Dec 26 14:43:38 UTC 2024 kill -USR1 68704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68704 killed at Thu Dec 26 14:43:38 UTC 2024 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9525 starting at Thu Dec 26 14:43:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68775 >/dev/null 2>/dev/null selfserv_9525 with PID 68775 found at Thu Dec 26 14:43:38 UTC 2024 selfserv_9525 with PID 68775 started at Thu Dec 26 14:43:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68775 at Thu Dec 26 14:43:38 UTC 2024 kill -USR1 68775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68775 killed at Thu Dec 26 14:43:38 UTC 2024 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68806 >/dev/null 2>/dev/null selfserv_9525 with PID 68806 found at Thu Dec 26 14:43:39 UTC 2024 selfserv_9525 with PID 68806 started at Thu Dec 26 14:43:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68806 at Thu Dec 26 14:43:39 UTC 2024 kill -USR1 68806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68806 killed at Thu Dec 26 14:43:39 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68834 >/dev/null 2>/dev/null selfserv_9525 with PID 68834 found at Thu Dec 26 14:43:39 UTC 2024 selfserv_9525 with PID 68834 started at Thu Dec 26 14:43:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 68834 at Thu Dec 26 14:43:39 UTC 2024 kill -USR1 68834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68834 killed at Thu Dec 26 14:43:39 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68862 >/dev/null 2>/dev/null selfserv_9525 with PID 68862 found at Thu Dec 26 14:43:39 UTC 2024 selfserv_9525 with PID 68862 started at Thu Dec 26 14:43:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68862 at Thu Dec 26 14:43:39 UTC 2024 kill -USR1 68862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68862 killed at Thu Dec 26 14:43:39 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68890 >/dev/null 2>/dev/null selfserv_9525 with PID 68890 found at Thu Dec 26 14:43:39 UTC 2024 selfserv_9525 with PID 68890 started at Thu Dec 26 14:43:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1254: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 68890 at Thu Dec 26 14:43:40 UTC 2024 kill -USR1 68890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68890 killed at Thu Dec 26 14:43:40 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68918 >/dev/null 2>/dev/null selfserv_9525 with PID 68918 found at Thu Dec 26 14:43:40 UTC 2024 selfserv_9525 with PID 68918 started at Thu Dec 26 14:43:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68918 at Thu Dec 26 14:43:40 UTC 2024 kill -USR1 68918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68918 killed at Thu Dec 26 14:43:40 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68946 >/dev/null 2>/dev/null selfserv_9525 with PID 68946 found at Thu Dec 26 14:43:40 UTC 2024 selfserv_9525 with PID 68946 started at Thu Dec 26 14:43:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68946 at Thu Dec 26 14:43:40 UTC 2024 kill -USR1 68946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68946 killed at Thu Dec 26 14:43:40 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 68974 >/dev/null 2>/dev/null selfserv_9525 with PID 68974 found at Thu Dec 26 14:43:40 UTC 2024 selfserv_9525 with PID 68974 started at Thu Dec 26 14:43:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 68974 at Thu Dec 26 14:43:40 UTC 2024 kill -USR1 68974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 68974 killed at Thu Dec 26 14:43:40 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:40 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69002 >/dev/null 2>/dev/null selfserv_9525 with PID 69002 found at Thu Dec 26 14:43:41 UTC 2024 selfserv_9525 with PID 69002 started at Thu Dec 26 14:43:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69002 at Thu Dec 26 14:43:41 UTC 2024 kill -USR1 69002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69002 killed at Thu Dec 26 14:43:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69030 >/dev/null 2>/dev/null selfserv_9525 with PID 69030 found at Thu Dec 26 14:43:41 UTC 2024 selfserv_9525 with PID 69030 started at Thu Dec 26 14:43:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69030 at Thu Dec 26 14:43:41 UTC 2024 kill -USR1 69030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69030 killed at Thu Dec 26 14:43:41 UTC 2024 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69058 >/dev/null 2>/dev/null selfserv_9525 with PID 69058 found at Thu Dec 26 14:43:41 UTC 2024 selfserv_9525 with PID 69058 started at Thu Dec 26 14:43:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69058 at Thu Dec 26 14:43:41 UTC 2024 kill -USR1 69058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69058 killed at Thu Dec 26 14:43:41 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69087 >/dev/null 2>/dev/null selfserv_9525 with PID 69087 found at Thu Dec 26 14:43:41 UTC 2024 selfserv_9525 with PID 69087 started at Thu Dec 26 14:43:41 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 69087 at Thu Dec 26 14:43:42 UTC 2024 kill -USR1 69087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69087 killed at Thu Dec 26 14:43:42 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69116 >/dev/null 2>/dev/null selfserv_9525 with PID 69116 found at Thu Dec 26 14:43:42 UTC 2024 selfserv_9525 with PID 69116 started at Thu Dec 26 14:43:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69116 at Thu Dec 26 14:43:42 UTC 2024 kill -USR1 69116 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69116 killed at Thu Dec 26 14:43:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69145 >/dev/null 2>/dev/null selfserv_9525 with PID 69145 found at Thu Dec 26 14:43:42 UTC 2024 selfserv_9525 with PID 69145 started at Thu Dec 26 14:43:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1263: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 69145 at Thu Dec 26 14:43:42 UTC 2024 kill -USR1 69145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69145 killed at Thu Dec 26 14:43:42 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69174 >/dev/null 2>/dev/null selfserv_9525 with PID 69174 found at Thu Dec 26 14:43:42 UTC 2024 selfserv_9525 with PID 69174 started at Thu Dec 26 14:43:42 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1264: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69174 at Thu Dec 26 14:43:43 UTC 2024 kill -USR1 69174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69174 killed at Thu Dec 26 14:43:43 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69203 >/dev/null 2>/dev/null selfserv_9525 with PID 69203 found at Thu Dec 26 14:43:43 UTC 2024 selfserv_9525 with PID 69203 started at Thu Dec 26 14:43:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1265: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69203 at Thu Dec 26 14:43:43 UTC 2024 kill -USR1 69203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69203 killed at Thu Dec 26 14:43:43 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69232 >/dev/null 2>/dev/null selfserv_9525 with PID 69232 found at Thu Dec 26 14:43:43 UTC 2024 selfserv_9525 with PID 69232 started at Thu Dec 26 14:43:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1266: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69232 at Thu Dec 26 14:43:43 UTC 2024 kill -USR1 69232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69232 killed at Thu Dec 26 14:43:43 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69261 >/dev/null 2>/dev/null selfserv_9525 with PID 69261 found at Thu Dec 26 14:43:43 UTC 2024 selfserv_9525 with PID 69261 started at Thu Dec 26 14:43:43 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1267: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69261 at Thu Dec 26 14:43:43 UTC 2024 kill -USR1 69261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69261 killed at Thu Dec 26 14:43:43 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:43:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 69290 >/dev/null 2>/dev/null selfserv_9525 with PID 69290 found at Thu Dec 26 14:43:44 UTC 2024 selfserv_9525 with PID 69290 started at Thu Dec 26 14:43:44 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1268: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69290 at Thu Dec 26 14:43:44 UTC 2024 kill -USR1 69290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69290 killed at Thu Dec 26 14:43:44 UTC 2024 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1269: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/server -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1272: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_server -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #1275: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -list ssl.sh: #1276: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1277: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1278: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -list ssl.sh: #1279: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1280: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9525 starting at Thu Dec 26 14:43:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 69389 >/dev/null 2>/dev/null selfserv_9525 with PID 69389 found at Thu Dec 26 14:43:44 UTC 2024 selfserv_9525 with PID 69389 started at Thu Dec 26 14:43:44 UTC 2024 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9525 with PID 69389 at Thu Dec 26 14:43:50 UTC 2024 kill -USR1 69389 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69389 killed at Thu Dec 26 14:43:50 UTC 2024 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9525 starting at Thu Dec 26 14:43:50 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:43:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 69876 >/dev/null 2>/dev/null selfserv_9525 with PID 69876 found at Thu Dec 26 14:43:51 UTC 2024 selfserv_9525 with PID 69876 started at Thu Dec 26 14:43:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 69876 at Thu Dec 26 14:44:01 UTC 2024 kill -USR1 69876 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 69876 killed at Thu Dec 26 14:44:01 UTC 2024 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9525 starting at Thu Dec 26 14:44:01 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:01 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70587 >/dev/null 2>/dev/null selfserv_9525 with PID 70587 found at Thu Dec 26 14:44:01 UTC 2024 selfserv_9525 with PID 70587 started at Thu Dec 26 14:44:01 UTC 2024 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1408: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1409: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 70587 at Thu Dec 26 14:44:02 UTC 2024 kill -USR1 70587 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70587 killed at Thu Dec 26 14:44:02 UTC 2024 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:44:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70653 >/dev/null 2>/dev/null selfserv_9525 with PID 70653 found at Thu Dec 26 14:44:02 UTC 2024 selfserv_9525 with PID 70653 started at Thu Dec 26 14:44:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 70653 at Thu Dec 26 14:44:02 UTC 2024 kill -USR1 70653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70653 killed at Thu Dec 26 14:44:02 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:44:02 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70694 >/dev/null 2>/dev/null selfserv_9525 with PID 70694 found at Thu Dec 26 14:44:02 UTC 2024 selfserv_9525 with PID 70694 started at Thu Dec 26 14:44:02 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 70694 at Thu Dec 26 14:44:26 UTC 2024 kill -USR1 70694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70694 killed at Thu Dec 26 14:44:26 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:44:26 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70735 >/dev/null 2>/dev/null selfserv_9525 with PID 70735 found at Thu Dec 26 14:44:26 UTC 2024 selfserv_9525 with PID 70735 started at Thu Dec 26 14:44:26 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 70735 at Thu Dec 26 14:44:27 UTC 2024 kill -USR1 70735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70735 killed at Thu Dec 26 14:44:27 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:44:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70788 >/dev/null 2>/dev/null selfserv_9525 with PID 70788 found at Thu Dec 26 14:44:27 UTC 2024 selfserv_9525 with PID 70788 started at Thu Dec 26 14:44:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 70788 at Thu Dec 26 14:44:27 UTC 2024 kill -USR1 70788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70788 killed at Thu Dec 26 14:44:27 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:44:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70829 >/dev/null 2>/dev/null selfserv_9525 with PID 70829 found at Thu Dec 26 14:44:27 UTC 2024 selfserv_9525 with PID 70829 started at Thu Dec 26 14:44:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1412: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 70829 at Thu Dec 26 14:44:51 UTC 2024 kill -USR1 70829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70829 killed at Thu Dec 26 14:44:51 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:44:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70870 >/dev/null 2>/dev/null selfserv_9525 with PID 70870 found at Thu Dec 26 14:44:51 UTC 2024 selfserv_9525 with PID 70870 started at Thu Dec 26 14:44:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 70870 at Thu Dec 26 14:44:51 UTC 2024 kill -USR1 70870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70870 killed at Thu Dec 26 14:44:51 UTC 2024 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:44:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70923 >/dev/null 2>/dev/null selfserv_9525 with PID 70923 found at Thu Dec 26 14:44:51 UTC 2024 selfserv_9525 with PID 70923 started at Thu Dec 26 14:44:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 70923 at Thu Dec 26 14:44:51 UTC 2024 kill -USR1 70923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70923 killed at Thu Dec 26 14:44:51 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:44:52 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:44:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 70964 >/dev/null 2>/dev/null selfserv_9525 with PID 70964 found at Thu Dec 26 14:44:52 UTC 2024 selfserv_9525 with PID 70964 started at Thu Dec 26 14:44:52 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1415: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 70964 at Thu Dec 26 14:45:16 UTC 2024 kill -USR1 70964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 70964 killed at Thu Dec 26 14:45:16 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:45:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:45:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71005 >/dev/null 2>/dev/null selfserv_9525 with PID 71005 found at Thu Dec 26 14:45:16 UTC 2024 selfserv_9525 with PID 71005 started at Thu Dec 26 14:45:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71005 at Thu Dec 26 14:45:16 UTC 2024 kill -USR1 71005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71005 killed at Thu Dec 26 14:45:16 UTC 2024 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:45:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:45:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71058 >/dev/null 2>/dev/null selfserv_9525 with PID 71058 found at Thu Dec 26 14:45:16 UTC 2024 selfserv_9525 with PID 71058 started at Thu Dec 26 14:45:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1417: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71058 at Thu Dec 26 14:45:17 UTC 2024 kill -USR1 71058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71058 killed at Thu Dec 26 14:45:17 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:45:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:45:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71099 >/dev/null 2>/dev/null selfserv_9525 with PID 71099 found at Thu Dec 26 14:45:17 UTC 2024 selfserv_9525 with PID 71099 started at Thu Dec 26 14:45:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71099 at Thu Dec 26 14:45:41 UTC 2024 kill -USR1 71099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71099 killed at Thu Dec 26 14:45:41 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:45:41 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:45:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71140 >/dev/null 2>/dev/null selfserv_9525 with PID 71140 found at Thu Dec 26 14:45:41 UTC 2024 selfserv_9525 with PID 71140 started at Thu Dec 26 14:45:41 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71140 at Thu Dec 26 14:45:42 UTC 2024 kill -USR1 71140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71140 killed at Thu Dec 26 14:45:42 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:45:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:45:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71193 >/dev/null 2>/dev/null selfserv_9525 with PID 71193 found at Thu Dec 26 14:45:42 UTC 2024 selfserv_9525 with PID 71193 started at Thu Dec 26 14:45:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1420: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71193 at Thu Dec 26 14:45:42 UTC 2024 kill -USR1 71193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71193 killed at Thu Dec 26 14:45:42 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:45:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:45:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71234 >/dev/null 2>/dev/null selfserv_9525 with PID 71234 found at Thu Dec 26 14:45:42 UTC 2024 selfserv_9525 with PID 71234 started at Thu Dec 26 14:45:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1421: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71234 at Thu Dec 26 14:46:05 UTC 2024 kill -USR1 71234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71234 killed at Thu Dec 26 14:46:05 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:46:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71275 >/dev/null 2>/dev/null selfserv_9525 with PID 71275 found at Thu Dec 26 14:46:05 UTC 2024 selfserv_9525 with PID 71275 started at Thu Dec 26 14:46:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71275 at Thu Dec 26 14:46:06 UTC 2024 kill -USR1 71275 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71275 killed at Thu Dec 26 14:46:06 UTC 2024 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:46:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71320 >/dev/null 2>/dev/null selfserv_9525 with PID 71320 found at Thu Dec 26 14:46:06 UTC 2024 selfserv_9525 with PID 71320 started at Thu Dec 26 14:46:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71320 at Thu Dec 26 14:46:06 UTC 2024 kill -USR1 71320 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71320 killed at Thu Dec 26 14:46:06 UTC 2024 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:46:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71365 >/dev/null 2>/dev/null selfserv_9525 with PID 71365 found at Thu Dec 26 14:46:06 UTC 2024 selfserv_9525 with PID 71365 started at Thu Dec 26 14:46:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1424: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71365 at Thu Dec 26 14:46:07 UTC 2024 kill -USR1 71365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71365 killed at Thu Dec 26 14:46:07 UTC 2024 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:46:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71410 >/dev/null 2>/dev/null selfserv_9525 with PID 71410 found at Thu Dec 26 14:46:07 UTC 2024 selfserv_9525 with PID 71410 started at Thu Dec 26 14:46:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71410 at Thu Dec 26 14:46:07 UTC 2024 kill -USR1 71410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71410 killed at Thu Dec 26 14:46:07 UTC 2024 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:46:07 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71459 >/dev/null 2>/dev/null selfserv_9525 with PID 71459 found at Thu Dec 26 14:46:07 UTC 2024 selfserv_9525 with PID 71459 started at Thu Dec 26 14:46:07 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71459 at Thu Dec 26 14:46:31 UTC 2024 kill -USR1 71459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71459 killed at Thu Dec 26 14:46:31 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:46:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71500 >/dev/null 2>/dev/null selfserv_9525 with PID 71500 found at Thu Dec 26 14:46:31 UTC 2024 selfserv_9525 with PID 71500 started at Thu Dec 26 14:46:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71500 at Thu Dec 26 14:46:32 UTC 2024 kill -USR1 71500 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71500 killed at Thu Dec 26 14:46:32 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:46:32 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71549 >/dev/null 2>/dev/null selfserv_9525 with PID 71549 found at Thu Dec 26 14:46:32 UTC 2024 selfserv_9525 with PID 71549 started at Thu Dec 26 14:46:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71549 at Thu Dec 26 14:46:55 UTC 2024 kill -USR1 71549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71549 killed at Thu Dec 26 14:46:55 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:46:55 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71590 >/dev/null 2>/dev/null selfserv_9525 with PID 71590 found at Thu Dec 26 14:46:55 UTC 2024 selfserv_9525 with PID 71590 started at Thu Dec 26 14:46:55 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71590 at Thu Dec 26 14:46:56 UTC 2024 kill -USR1 71590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71590 killed at Thu Dec 26 14:46:56 UTC 2024 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:46:56 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:46:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71639 >/dev/null 2>/dev/null selfserv_9525 with PID 71639 found at Thu Dec 26 14:46:56 UTC 2024 selfserv_9525 with PID 71639 started at Thu Dec 26 14:46:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1430: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71639 at Thu Dec 26 14:47:20 UTC 2024 kill -USR1 71639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71639 killed at Thu Dec 26 14:47:20 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:47:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:47:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71680 >/dev/null 2>/dev/null selfserv_9525 with PID 71680 found at Thu Dec 26 14:47:20 UTC 2024 selfserv_9525 with PID 71680 started at Thu Dec 26 14:47:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71680 at Thu Dec 26 14:47:20 UTC 2024 kill -USR1 71680 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71680 killed at Thu Dec 26 14:47:20 UTC 2024 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:47:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:47:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71729 >/dev/null 2>/dev/null selfserv_9525 with PID 71729 found at Thu Dec 26 14:47:20 UTC 2024 selfserv_9525 with PID 71729 started at Thu Dec 26 14:47:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1432: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71729 at Thu Dec 26 14:47:44 UTC 2024 kill -USR1 71729 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71729 killed at Thu Dec 26 14:47:44 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:47:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:47:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71770 >/dev/null 2>/dev/null selfserv_9525 with PID 71770 found at Thu Dec 26 14:47:45 UTC 2024 selfserv_9525 with PID 71770 started at Thu Dec 26 14:47:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71770 at Thu Dec 26 14:47:45 UTC 2024 kill -USR1 71770 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71770 killed at Thu Dec 26 14:47:45 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:47:45 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:47:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71819 >/dev/null 2>/dev/null selfserv_9525 with PID 71819 found at Thu Dec 26 14:47:45 UTC 2024 selfserv_9525 with PID 71819 started at Thu Dec 26 14:47:45 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1434: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 71819 at Thu Dec 26 14:48:08 UTC 2024 kill -USR1 71819 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71819 killed at Thu Dec 26 14:48:08 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:48:08 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71860 >/dev/null 2>/dev/null selfserv_9525 with PID 71860 found at Thu Dec 26 14:48:08 UTC 2024 selfserv_9525 with PID 71860 started at Thu Dec 26 14:48:08 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71860 at Thu Dec 26 14:48:09 UTC 2024 kill -USR1 71860 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71860 killed at Thu Dec 26 14:48:09 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:48:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71901 >/dev/null 2>/dev/null selfserv_9525 with PID 71901 found at Thu Dec 26 14:48:09 UTC 2024 selfserv_9525 with PID 71901 started at Thu Dec 26 14:48:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1436: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71901 at Thu Dec 26 14:48:09 UTC 2024 kill -USR1 71901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71901 killed at Thu Dec 26 14:48:09 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:48:09 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71942 >/dev/null 2>/dev/null selfserv_9525 with PID 71942 found at Thu Dec 26 14:48:09 UTC 2024 selfserv_9525 with PID 71942 started at Thu Dec 26 14:48:09 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71942 at Thu Dec 26 14:48:10 UTC 2024 kill -USR1 71942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71942 killed at Thu Dec 26 14:48:10 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:48:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 71983 >/dev/null 2>/dev/null selfserv_9525 with PID 71983 found at Thu Dec 26 14:48:10 UTC 2024 selfserv_9525 with PID 71983 started at Thu Dec 26 14:48:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS 1.3 client certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 71983 at Thu Dec 26 14:48:10 UTC 2024 kill -USR1 71983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 71983 killed at Thu Dec 26 14:48:10 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:48:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72024 >/dev/null 2>/dev/null selfserv_9525 with PID 72024 found at Thu Dec 26 14:48:10 UTC 2024 selfserv_9525 with PID 72024 started at Thu Dec 26 14:48:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1439: TLS 1.3 server certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72024 at Thu Dec 26 14:48:11 UTC 2024 kill -USR1 72024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72024 killed at Thu Dec 26 14:48:11 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:48:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72065 >/dev/null 2>/dev/null selfserv_9525 with PID 72065 found at Thu Dec 26 14:48:11 UTC 2024 selfserv_9525 with PID 72065 started at Thu Dec 26 14:48:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1440: TLS 1.3 client/server certificate comlpression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72065 at Thu Dec 26 14:48:11 UTC 2024 kill -USR1 72065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72065 killed at Thu Dec 26 14:48:11 UTC 2024 ssl.sh: TLS Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:48:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72112 >/dev/null 2>/dev/null selfserv_9525 with PID 72112 found at Thu Dec 26 14:48:11 UTC 2024 selfserv_9525 with PID 72112 started at Thu Dec 26 14:48:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1441: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72112 at Thu Dec 26 14:48:12 UTC 2024 kill -USR1 72112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72112 killed at Thu Dec 26 14:48:12 UTC 2024 ssl.sh: TLS Server hello response with SNI ---- selfserv_9525 starting at Thu Dec 26 14:48:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72159 >/dev/null 2>/dev/null selfserv_9525 with PID 72159 found at Thu Dec 26 14:48:12 UTC 2024 selfserv_9525 with PID 72159 started at Thu Dec 26 14:48:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1442: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72159 at Thu Dec 26 14:48:12 UTC 2024 kill -USR1 72159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72159 killed at Thu Dec 26 14:48:12 UTC 2024 ssl.sh: TLS Server response with alert ---- selfserv_9525 starting at Thu Dec 26 14:48:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72206 >/dev/null 2>/dev/null selfserv_9525 with PID 72206 found at Thu Dec 26 14:48:12 UTC 2024 selfserv_9525 with PID 72206 started at Thu Dec 26 14:48:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1443: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 72206 at Thu Dec 26 14:48:12 UTC 2024 kill -USR1 72206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72206 killed at Thu Dec 26 14:48:12 UTC 2024 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:48:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72253 >/dev/null 2>/dev/null selfserv_9525 with PID 72253 found at Thu Dec 26 14:48:12 UTC 2024 selfserv_9525 with PID 72253 started at Thu Dec 26 14:48:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1444: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72253 at Thu Dec 26 14:48:13 UTC 2024 kill -USR1 72253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72253 killed at Thu Dec 26 14:48:13 UTC 2024 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9525 starting at Thu Dec 26 14:48:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72300 >/dev/null 2>/dev/null selfserv_9525 with PID 72300 found at Thu Dec 26 14:48:13 UTC 2024 selfserv_9525 with PID 72300 started at Thu Dec 26 14:48:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1445: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 72300 at Thu Dec 26 14:48:13 UTC 2024 kill -USR1 72300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72300 killed at Thu Dec 26 14:48:13 UTC 2024 ssl.sh: TLS Server hello response without SNI ---- selfserv_9525 starting at Thu Dec 26 14:48:13 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72347 >/dev/null 2>/dev/null selfserv_9525 with PID 72347 found at Thu Dec 26 14:48:13 UTC 2024 selfserv_9525 with PID 72347 started at Thu Dec 26 14:48:13 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1446: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72347 at Thu Dec 26 14:48:14 UTC 2024 kill -USR1 72347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72347 killed at Thu Dec 26 14:48:14 UTC 2024 ssl.sh: TLS Server hello response with SNI ---- selfserv_9525 starting at Thu Dec 26 14:48:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72394 >/dev/null 2>/dev/null selfserv_9525 with PID 72394 found at Thu Dec 26 14:48:14 UTC 2024 selfserv_9525 with PID 72394 started at Thu Dec 26 14:48:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1447: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72394 at Thu Dec 26 14:48:14 UTC 2024 kill -USR1 72394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72394 killed at Thu Dec 26 14:48:14 UTC 2024 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9525 starting at Thu Dec 26 14:48:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72441 >/dev/null 2>/dev/null selfserv_9525 with PID 72441 found at Thu Dec 26 14:48:14 UTC 2024 selfserv_9525 with PID 72441 started at Thu Dec 26 14:48:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1448: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 72441 at Thu Dec 26 14:48:14 UTC 2024 kill -USR1 72441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72441 killed at Thu Dec 26 14:48:14 UTC 2024 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9525 starting at Thu Dec 26 14:48:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72488 >/dev/null 2>/dev/null selfserv_9525 with PID 72488 found at Thu Dec 26 14:48:14 UTC 2024 selfserv_9525 with PID 72488 started at Thu Dec 26 14:48:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1449: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 72488 at Thu Dec 26 14:48:15 UTC 2024 kill -USR1 72488 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72488 killed at Thu Dec 26 14:48:15 UTC 2024 ssl.sh: TLS Server response with alert ---- selfserv_9525 starting at Thu Dec 26 14:48:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72535 >/dev/null 2>/dev/null selfserv_9525 with PID 72535 found at Thu Dec 26 14:48:15 UTC 2024 selfserv_9525 with PID 72535 started at Thu Dec 26 14:48:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1450: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 72535 at Thu Dec 26 14:48:15 UTC 2024 kill -USR1 72535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72535 killed at Thu Dec 26 14:48:15 UTC 2024 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9525 starting at Thu Dec 26 14:48:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72566 >/dev/null 2>/dev/null selfserv_9525 with PID 72566 found at Thu Dec 26 14:48:15 UTC 2024 selfserv_9525 with PID 72566 started at Thu Dec 26 14:48:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1408: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72566 at Thu Dec 26 14:48:15 UTC 2024 kill -USR1 72566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72566 killed at Thu Dec 26 14:48:15 UTC 2024 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9525 starting at Thu Dec 26 14:48:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72597 >/dev/null 2>/dev/null selfserv_9525 with PID 72597 found at Thu Dec 26 14:48:15 UTC 2024 selfserv_9525 with PID 72597 started at Thu Dec 26 14:48:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1409: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9525 with PID 72597 at Thu Dec 26 14:48:16 UTC 2024 kill -USR1 72597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72597 killed at Thu Dec 26 14:48:16 UTC 2024 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9525 starting at Thu Dec 26 14:48:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72628 >/dev/null 2>/dev/null selfserv_9525 with PID 72628 found at Thu Dec 26 14:48:16 UTC 2024 selfserv_9525 with PID 72628 started at Thu Dec 26 14:48:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1410: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 72628 at Thu Dec 26 14:48:16 UTC 2024 kill -USR1 72628 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72628 killed at Thu Dec 26 14:48:16 UTC 2024 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9525 starting at Thu Dec 26 14:48:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72659 >/dev/null 2>/dev/null selfserv_9525 with PID 72659 found at Thu Dec 26 14:48:16 UTC 2024 selfserv_9525 with PID 72659 started at Thu Dec 26 14:48:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1411: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 72659 at Thu Dec 26 14:48:16 UTC 2024 kill -USR1 72659 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72659 killed at Thu Dec 26 14:48:16 UTC 2024 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9525 starting at Thu Dec 26 14:48:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72690 >/dev/null 2>/dev/null selfserv_9525 with PID 72690 found at Thu Dec 26 14:48:16 UTC 2024 selfserv_9525 with PID 72690 started at Thu Dec 26 14:48:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1412: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 72690 at Thu Dec 26 14:48:17 UTC 2024 kill -USR1 72690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72690 killed at Thu Dec 26 14:48:17 UTC 2024 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9525 starting at Thu Dec 26 14:48:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72721 >/dev/null 2>/dev/null selfserv_9525 with PID 72721 found at Thu Dec 26 14:48:17 UTC 2024 selfserv_9525 with PID 72721 started at Thu Dec 26 14:48:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1413: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 72721 at Thu Dec 26 14:48:17 UTC 2024 kill -USR1 72721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72721 killed at Thu Dec 26 14:48:17 UTC 2024 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9525 starting at Thu Dec 26 14:48:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72752 >/dev/null 2>/dev/null selfserv_9525 with PID 72752 found at Thu Dec 26 14:48:17 UTC 2024 selfserv_9525 with PID 72752 started at Thu Dec 26 14:48:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1414: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9525 with PID 72752 at Thu Dec 26 14:48:17 UTC 2024 kill -USR1 72752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72752 killed at Thu Dec 26 14:48:17 UTC 2024 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9525 starting at Thu Dec 26 14:48:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72783 >/dev/null 2>/dev/null selfserv_9525 with PID 72783 found at Thu Dec 26 14:48:17 UTC 2024 selfserv_9525 with PID 72783 started at Thu Dec 26 14:48:17 UTC 2024 strsclnt -4 -q -p 9525 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Thu Dec 26 14:48:17 UTC 2024 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Thu Dec 26 14:48:27 UTC 2024 ssl.sh: #1415: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9525 with PID 72783 at Thu Dec 26 14:48:27 UTC 2024 kill -USR1 72783 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72783 killed at Thu Dec 26 14:48:27 UTC 2024 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9525 starting at Thu Dec 26 14:48:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72821 >/dev/null 2>/dev/null selfserv_9525 with PID 72821 found at Thu Dec 26 14:48:27 UTC 2024 selfserv_9525 with PID 72821 started at Thu Dec 26 14:48:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72821 at Thu Dec 26 14:48:27 UTC 2024 kill -USR1 72821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72821 killed at Thu Dec 26 14:48:27 UTC 2024 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72852 >/dev/null 2>/dev/null selfserv_9525 with PID 72852 found at Thu Dec 26 14:48:27 UTC 2024 selfserv_9525 with PID 72852 started at Thu Dec 26 14:48:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72852 at Thu Dec 26 14:48:27 UTC 2024 kill -USR1 72852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72852 killed at Thu Dec 26 14:48:27 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:27 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72880 >/dev/null 2>/dev/null selfserv_9525 with PID 72880 found at Thu Dec 26 14:48:27 UTC 2024 selfserv_9525 with PID 72880 started at Thu Dec 26 14:48:27 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 72880 at Thu Dec 26 14:48:28 UTC 2024 kill -USR1 72880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72880 killed at Thu Dec 26 14:48:28 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72908 >/dev/null 2>/dev/null selfserv_9525 with PID 72908 found at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 with PID 72908 started at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72908 at Thu Dec 26 14:48:28 UTC 2024 kill -USR1 72908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72908 killed at Thu Dec 26 14:48:28 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72936 >/dev/null 2>/dev/null selfserv_9525 with PID 72936 found at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 with PID 72936 started at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 72936 at Thu Dec 26 14:48:28 UTC 2024 kill -USR1 72936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72936 killed at Thu Dec 26 14:48:28 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72964 >/dev/null 2>/dev/null selfserv_9525 with PID 72964 found at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 with PID 72964 started at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72964 at Thu Dec 26 14:48:28 UTC 2024 kill -USR1 72964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72964 killed at Thu Dec 26 14:48:28 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 72992 >/dev/null 2>/dev/null selfserv_9525 with PID 72992 found at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 with PID 72992 started at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 72992 at Thu Dec 26 14:48:28 UTC 2024 kill -USR1 72992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 72992 killed at Thu Dec 26 14:48:28 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:28 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:28 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73020 >/dev/null 2>/dev/null selfserv_9525 with PID 73020 found at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 with PID 73020 started at Thu Dec 26 14:48:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73020 at Thu Dec 26 14:48:29 UTC 2024 kill -USR1 73020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73020 killed at Thu Dec 26 14:48:29 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73048 >/dev/null 2>/dev/null selfserv_9525 with PID 73048 found at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 with PID 73048 started at Thu Dec 26 14:48:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73048 at Thu Dec 26 14:48:29 UTC 2024 kill -USR1 73048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73048 killed at Thu Dec 26 14:48:29 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73076 >/dev/null 2>/dev/null selfserv_9525 with PID 73076 found at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 with PID 73076 started at Thu Dec 26 14:48:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73076 at Thu Dec 26 14:48:29 UTC 2024 kill -USR1 73076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73076 killed at Thu Dec 26 14:48:29 UTC 2024 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73104 >/dev/null 2>/dev/null selfserv_9525 with PID 73104 found at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 with PID 73104 started at Thu Dec 26 14:48:29 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73104 at Thu Dec 26 14:48:29 UTC 2024 kill -USR1 73104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73104 killed at Thu Dec 26 14:48:29 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:29 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:29 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73133 >/dev/null 2>/dev/null selfserv_9525 with PID 73133 found at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 with PID 73133 started at Thu Dec 26 14:48:30 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 73133 at Thu Dec 26 14:48:30 UTC 2024 kill -USR1 73133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73133 killed at Thu Dec 26 14:48:30 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73162 >/dev/null 2>/dev/null selfserv_9525 with PID 73162 found at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 with PID 73162 started at Thu Dec 26 14:48:30 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73162 at Thu Dec 26 14:48:30 UTC 2024 kill -USR1 73162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73162 killed at Thu Dec 26 14:48:30 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73191 >/dev/null 2>/dev/null selfserv_9525 with PID 73191 found at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 with PID 73191 started at Thu Dec 26 14:48:30 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1429: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 73191 at Thu Dec 26 14:48:30 UTC 2024 kill -USR1 73191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73191 killed at Thu Dec 26 14:48:30 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73220 >/dev/null 2>/dev/null selfserv_9525 with PID 73220 found at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 with PID 73220 started at Thu Dec 26 14:48:30 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1430: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73220 at Thu Dec 26 14:48:30 UTC 2024 kill -USR1 73220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73220 killed at Thu Dec 26 14:48:30 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:30 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73249 >/dev/null 2>/dev/null selfserv_9525 with PID 73249 found at Thu Dec 26 14:48:30 UTC 2024 selfserv_9525 with PID 73249 started at Thu Dec 26 14:48:30 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1431: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73249 at Thu Dec 26 14:48:31 UTC 2024 kill -USR1 73249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73249 killed at Thu Dec 26 14:48:31 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73278 >/dev/null 2>/dev/null selfserv_9525 with PID 73278 found at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 with PID 73278 started at Thu Dec 26 14:48:31 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1432: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73278 at Thu Dec 26 14:48:31 UTC 2024 kill -USR1 73278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73278 killed at Thu Dec 26 14:48:31 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73307 >/dev/null 2>/dev/null selfserv_9525 with PID 73307 found at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 with PID 73307 started at Thu Dec 26 14:48:31 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1433: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73307 at Thu Dec 26 14:48:31 UTC 2024 kill -USR1 73307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73307 killed at Thu Dec 26 14:48:31 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 73336 >/dev/null 2>/dev/null selfserv_9525 with PID 73336 found at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 with PID 73336 started at Thu Dec 26 14:48:31 UTC 2024 strsclnt -4 -q -p 9525 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1434: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73336 at Thu Dec 26 14:48:31 UTC 2024 kill -USR1 73336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73336 killed at Thu Dec 26 14:48:31 UTC 2024 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9525 starting at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:31 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 73365 >/dev/null 2>/dev/null selfserv_9525 with PID 73365 found at Thu Dec 26 14:48:31 UTC 2024 selfserv_9525 with PID 73365 started at Thu Dec 26 14:48:31 UTC 2024 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9525 with PID 73365 at Thu Dec 26 14:48:38 UTC 2024 kill -USR1 73365 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73365 killed at Thu Dec 26 14:48:38 UTC 2024 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9525 starting at Thu Dec 26 14:48:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.15633\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 73852 >/dev/null 2>/dev/null selfserv_9525 with PID 73852 found at Thu Dec 26 14:48:38 UTC 2024 selfserv_9525 with PID 73852 started at Thu Dec 26 14:48:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -4 -p 9525 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9525 (address=127.0.0.1) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 73852 at Thu Dec 26 14:48:50 UTC 2024 kill -USR1 73852 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 73852 killed at Thu Dec 26 14:48:50 UTC 2024 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:48:50 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74588 >/dev/null 2>/dev/null selfserv_9525 with PID 74588 found at Thu Dec 26 14:48:50 UTC 2024 selfserv_9525 with PID 74588 started at Thu Dec 26 14:48:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 74588 at Thu Dec 26 14:48:51 UTC 2024 kill -USR1 74588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74588 killed at Thu Dec 26 14:48:51 UTC 2024 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:48:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:48:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74629 >/dev/null 2>/dev/null selfserv_9525 with PID 74629 found at Thu Dec 26 14:48:51 UTC 2024 selfserv_9525 with PID 74629 started at Thu Dec 26 14:48:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 74629 at Thu Dec 26 14:49:17 UTC 2024 kill -USR1 74629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74629 killed at Thu Dec 26 14:49:17 UTC 2024 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:49:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:49:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74670 >/dev/null 2>/dev/null selfserv_9525 with PID 74670 found at Thu Dec 26 14:49:17 UTC 2024 selfserv_9525 with PID 74670 started at Thu Dec 26 14:49:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 74670 at Thu Dec 26 14:49:18 UTC 2024 kill -USR1 74670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74670 killed at Thu Dec 26 14:49:18 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:49:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:49:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74723 >/dev/null 2>/dev/null selfserv_9525 with PID 74723 found at Thu Dec 26 14:49:18 UTC 2024 selfserv_9525 with PID 74723 started at Thu Dec 26 14:49:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 74723 at Thu Dec 26 14:49:19 UTC 2024 kill -USR1 74723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74723 killed at Thu Dec 26 14:49:19 UTC 2024 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:49:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:49:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74764 >/dev/null 2>/dev/null selfserv_9525 with PID 74764 found at Thu Dec 26 14:49:19 UTC 2024 selfserv_9525 with PID 74764 started at Thu Dec 26 14:49:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1566: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 74764 at Thu Dec 26 14:49:42 UTC 2024 kill -USR1 74764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74764 killed at Thu Dec 26 14:49:42 UTC 2024 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:49:42 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:49:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74805 >/dev/null 2>/dev/null selfserv_9525 with PID 74805 found at Thu Dec 26 14:49:42 UTC 2024 selfserv_9525 with PID 74805 started at Thu Dec 26 14:49:42 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 74805 at Thu Dec 26 14:49:43 UTC 2024 kill -USR1 74805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74805 killed at Thu Dec 26 14:49:43 UTC 2024 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:49:43 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:49:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74858 >/dev/null 2>/dev/null selfserv_9525 with PID 74858 found at Thu Dec 26 14:49:43 UTC 2024 selfserv_9525 with PID 74858 started at Thu Dec 26 14:49:43 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 74858 at Thu Dec 26 14:49:44 UTC 2024 kill -USR1 74858 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74858 killed at Thu Dec 26 14:49:44 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:49:44 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:49:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74899 >/dev/null 2>/dev/null selfserv_9525 with PID 74899 found at Thu Dec 26 14:49:44 UTC 2024 selfserv_9525 with PID 74899 started at Thu Dec 26 14:49:44 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1569: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 74899 at Thu Dec 26 14:50:10 UTC 2024 kill -USR1 74899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74899 killed at Thu Dec 26 14:50:10 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:50:10 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:50:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74940 >/dev/null 2>/dev/null selfserv_9525 with PID 74940 found at Thu Dec 26 14:50:10 UTC 2024 selfserv_9525 with PID 74940 started at Thu Dec 26 14:50:10 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 74940 at Thu Dec 26 14:50:11 UTC 2024 kill -USR1 74940 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74940 killed at Thu Dec 26 14:50:11 UTC 2024 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:50:11 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:50:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 74993 >/dev/null 2>/dev/null selfserv_9525 with PID 74993 found at Thu Dec 26 14:50:11 UTC 2024 selfserv_9525 with PID 74993 started at Thu Dec 26 14:50:11 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1571: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 74993 at Thu Dec 26 14:50:12 UTC 2024 kill -USR1 74993 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 74993 killed at Thu Dec 26 14:50:12 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:50:12 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:50:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75034 >/dev/null 2>/dev/null selfserv_9525 with PID 75034 found at Thu Dec 26 14:50:12 UTC 2024 selfserv_9525 with PID 75034 started at Thu Dec 26 14:50:12 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1572: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75034 at Thu Dec 26 14:50:38 UTC 2024 kill -USR1 75034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75034 killed at Thu Dec 26 14:50:38 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:50:38 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:50:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75075 >/dev/null 2>/dev/null selfserv_9525 with PID 75075 found at Thu Dec 26 14:50:38 UTC 2024 selfserv_9525 with PID 75075 started at Thu Dec 26 14:50:38 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75075 at Thu Dec 26 14:50:39 UTC 2024 kill -USR1 75075 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75075 killed at Thu Dec 26 14:50:39 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:50:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:50:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75128 >/dev/null 2>/dev/null selfserv_9525 with PID 75128 found at Thu Dec 26 14:50:39 UTC 2024 selfserv_9525 with PID 75128 started at Thu Dec 26 14:50:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75128 at Thu Dec 26 14:50:39 UTC 2024 kill -USR1 75128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75128 killed at Thu Dec 26 14:50:39 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:50:39 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:50:39 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75169 >/dev/null 2>/dev/null selfserv_9525 with PID 75169 found at Thu Dec 26 14:50:40 UTC 2024 selfserv_9525 with PID 75169 started at Thu Dec 26 14:50:40 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1575: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75169 at Thu Dec 26 14:51:03 UTC 2024 kill -USR1 75169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75169 killed at Thu Dec 26 14:51:03 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:51:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75210 >/dev/null 2>/dev/null selfserv_9525 with PID 75210 found at Thu Dec 26 14:51:03 UTC 2024 selfserv_9525 with PID 75210 started at Thu Dec 26 14:51:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75210 at Thu Dec 26 14:51:03 UTC 2024 kill -USR1 75210 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75210 killed at Thu Dec 26 14:51:03 UTC 2024 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:51:03 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75255 >/dev/null 2>/dev/null selfserv_9525 with PID 75255 found at Thu Dec 26 14:51:03 UTC 2024 selfserv_9525 with PID 75255 started at Thu Dec 26 14:51:03 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75255 at Thu Dec 26 14:51:04 UTC 2024 kill -USR1 75255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75255 killed at Thu Dec 26 14:51:04 UTC 2024 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9525 starting at Thu Dec 26 14:51:04 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75300 >/dev/null 2>/dev/null selfserv_9525 with PID 75300 found at Thu Dec 26 14:51:04 UTC 2024 selfserv_9525 with PID 75300 started at Thu Dec 26 14:51:04 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1578: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75300 at Thu Dec 26 14:51:05 UTC 2024 kill -USR1 75300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75300 killed at Thu Dec 26 14:51:05 UTC 2024 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:51:05 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75345 >/dev/null 2>/dev/null selfserv_9525 with PID 75345 found at Thu Dec 26 14:51:05 UTC 2024 selfserv_9525 with PID 75345 started at Thu Dec 26 14:51:05 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75345 at Thu Dec 26 14:51:05 UTC 2024 kill -USR1 75345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75345 killed at Thu Dec 26 14:51:05 UTC 2024 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:51:06 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75394 >/dev/null 2>/dev/null selfserv_9525 with PID 75394 found at Thu Dec 26 14:51:06 UTC 2024 selfserv_9525 with PID 75394 started at Thu Dec 26 14:51:06 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75394 at Thu Dec 26 14:51:32 UTC 2024 kill -USR1 75394 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75394 killed at Thu Dec 26 14:51:32 UTC 2024 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:51:32 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75435 >/dev/null 2>/dev/null selfserv_9525 with PID 75435 found at Thu Dec 26 14:51:32 UTC 2024 selfserv_9525 with PID 75435 started at Thu Dec 26 14:51:32 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75435 at Thu Dec 26 14:51:33 UTC 2024 kill -USR1 75435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75435 killed at Thu Dec 26 14:51:33 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:51:33 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75484 >/dev/null 2>/dev/null selfserv_9525 with PID 75484 found at Thu Dec 26 14:51:33 UTC 2024 selfserv_9525 with PID 75484 started at Thu Dec 26 14:51:33 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75484 at Thu Dec 26 14:51:56 UTC 2024 kill -USR1 75484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75484 killed at Thu Dec 26 14:51:56 UTC 2024 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:51:56 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75525 >/dev/null 2>/dev/null selfserv_9525 with PID 75525 found at Thu Dec 26 14:51:56 UTC 2024 selfserv_9525 with PID 75525 started at Thu Dec 26 14:51:56 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75525 at Thu Dec 26 14:51:57 UTC 2024 kill -USR1 75525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75525 killed at Thu Dec 26 14:51:57 UTC 2024 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:51:57 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:51:57 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75574 >/dev/null 2>/dev/null selfserv_9525 with PID 75574 found at Thu Dec 26 14:51:57 UTC 2024 selfserv_9525 with PID 75574 started at Thu Dec 26 14:51:57 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1584: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75574 at Thu Dec 26 14:52:23 UTC 2024 kill -USR1 75574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75574 killed at Thu Dec 26 14:52:23 UTC 2024 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:52:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:52:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75615 >/dev/null 2>/dev/null selfserv_9525 with PID 75615 found at Thu Dec 26 14:52:23 UTC 2024 selfserv_9525 with PID 75615 started at Thu Dec 26 14:52:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75615 at Thu Dec 26 14:52:24 UTC 2024 kill -USR1 75615 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75615 killed at Thu Dec 26 14:52:24 UTC 2024 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:52:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:52:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75664 >/dev/null 2>/dev/null selfserv_9525 with PID 75664 found at Thu Dec 26 14:52:24 UTC 2024 selfserv_9525 with PID 75664 started at Thu Dec 26 14:52:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1586: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75664 at Thu Dec 26 14:52:50 UTC 2024 kill -USR1 75664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75664 killed at Thu Dec 26 14:52:50 UTC 2024 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:52:50 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:52:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75705 >/dev/null 2>/dev/null selfserv_9525 with PID 75705 found at Thu Dec 26 14:52:50 UTC 2024 selfserv_9525 with PID 75705 started at Thu Dec 26 14:52:50 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75705 at Thu Dec 26 14:52:51 UTC 2024 kill -USR1 75705 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75705 killed at Thu Dec 26 14:52:51 UTC 2024 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9525 starting at Thu Dec 26 14:52:51 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:52:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75754 >/dev/null 2>/dev/null selfserv_9525 with PID 75754 found at Thu Dec 26 14:52:51 UTC 2024 selfserv_9525 with PID 75754 started at Thu Dec 26 14:52:51 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1588: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 75754 at Thu Dec 26 14:53:14 UTC 2024 kill -USR1 75754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75754 killed at Thu Dec 26 14:53:14 UTC 2024 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:53:14 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75795 >/dev/null 2>/dev/null selfserv_9525 with PID 75795 found at Thu Dec 26 14:53:14 UTC 2024 selfserv_9525 with PID 75795 started at Thu Dec 26 14:53:14 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1589: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75795 at Thu Dec 26 14:53:15 UTC 2024 kill -USR1 75795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75795 killed at Thu Dec 26 14:53:15 UTC 2024 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:53:15 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75836 >/dev/null 2>/dev/null selfserv_9525 with PID 75836 found at Thu Dec 26 14:53:15 UTC 2024 selfserv_9525 with PID 75836 started at Thu Dec 26 14:53:15 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1590: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75836 at Thu Dec 26 14:53:16 UTC 2024 kill -USR1 75836 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75836 killed at Thu Dec 26 14:53:16 UTC 2024 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9525 starting at Thu Dec 26 14:53:16 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75877 >/dev/null 2>/dev/null selfserv_9525 with PID 75877 found at Thu Dec 26 14:53:16 UTC 2024 selfserv_9525 with PID 75877 started at Thu Dec 26 14:53:16 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1591: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75877 at Thu Dec 26 14:53:16 UTC 2024 kill -USR1 75877 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75877 killed at Thu Dec 26 14:53:16 UTC 2024 ssl.sh: TLS 1.3 client certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:53:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75918 >/dev/null 2>/dev/null selfserv_9525 with PID 75918 found at Thu Dec 26 14:53:17 UTC 2024 selfserv_9525 with PID 75918 started at Thu Dec 26 14:53:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1592: TLS 1.3 client certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75918 at Thu Dec 26 14:53:17 UTC 2024 kill -USR1 75918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75918 killed at Thu Dec 26 14:53:17 UTC 2024 ssl.sh: TLS 1.3 server certificate compression ---- selfserv_9525 starting at Thu Dec 26 14:53:17 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 75959 >/dev/null 2>/dev/null selfserv_9525 with PID 75959 found at Thu Dec 26 14:53:17 UTC 2024 selfserv_9525 with PID 75959 started at Thu Dec 26 14:53:17 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1593: TLS 1.3 server certificate compression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 75959 at Thu Dec 26 14:53:18 UTC 2024 kill -USR1 75959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 75959 killed at Thu Dec 26 14:53:18 UTC 2024 ssl.sh: TLS 1.3 client/server certificate comlpression ---- selfserv_9525 starting at Thu Dec 26 14:53:18 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -q -i ../tests_pid.15633\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76000 >/dev/null 2>/dev/null selfserv_9525 with PID 76000 found at Thu Dec 26 14:53:18 UTC 2024 selfserv_9525 with PID 76000 started at Thu Dec 26 14:53:18 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss -j < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1594: TLS 1.3 client/server certificate comlpression produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76000 at Thu Dec 26 14:53:19 UTC 2024 kill -USR1 76000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76000 killed at Thu Dec 26 14:53:19 UTC 2024 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9525 starting at Thu Dec 26 14:53:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76071 >/dev/null 2>/dev/null selfserv_9525 with PID 76071 found at Thu Dec 26 14:53:19 UTC 2024 selfserv_9525 with PID 76071 started at Thu Dec 26 14:53:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76071 at Thu Dec 26 14:53:19 UTC 2024 kill -USR1 76071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76071 killed at Thu Dec 26 14:53:19 UTC 2024 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:19 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76102 >/dev/null 2>/dev/null selfserv_9525 with PID 76102 found at Thu Dec 26 14:53:19 UTC 2024 selfserv_9525 with PID 76102 started at Thu Dec 26 14:53:19 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76102 at Thu Dec 26 14:53:20 UTC 2024 kill -USR1 76102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76102 killed at Thu Dec 26 14:53:20 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76130 >/dev/null 2>/dev/null selfserv_9525 with PID 76130 found at Thu Dec 26 14:53:20 UTC 2024 selfserv_9525 with PID 76130 started at Thu Dec 26 14:53:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 76130 at Thu Dec 26 14:53:20 UTC 2024 kill -USR1 76130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76130 killed at Thu Dec 26 14:53:20 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76158 >/dev/null 2>/dev/null selfserv_9525 with PID 76158 found at Thu Dec 26 14:53:20 UTC 2024 selfserv_9525 with PID 76158 started at Thu Dec 26 14:53:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76158 at Thu Dec 26 14:53:20 UTC 2024 kill -USR1 76158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76158 killed at Thu Dec 26 14:53:20 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76186 >/dev/null 2>/dev/null selfserv_9525 with PID 76186 found at Thu Dec 26 14:53:20 UTC 2024 selfserv_9525 with PID 76186 started at Thu Dec 26 14:53:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1566: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9525 with PID 76186 at Thu Dec 26 14:53:20 UTC 2024 kill -USR1 76186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76186 killed at Thu Dec 26 14:53:20 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:20 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:20 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76214 >/dev/null 2>/dev/null selfserv_9525 with PID 76214 found at Thu Dec 26 14:53:21 UTC 2024 selfserv_9525 with PID 76214 started at Thu Dec 26 14:53:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76214 at Thu Dec 26 14:53:21 UTC 2024 kill -USR1 76214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76214 killed at Thu Dec 26 14:53:21 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76242 >/dev/null 2>/dev/null selfserv_9525 with PID 76242 found at Thu Dec 26 14:53:21 UTC 2024 selfserv_9525 with PID 76242 started at Thu Dec 26 14:53:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76242 at Thu Dec 26 14:53:21 UTC 2024 kill -USR1 76242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76242 killed at Thu Dec 26 14:53:21 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76270 >/dev/null 2>/dev/null selfserv_9525 with PID 76270 found at Thu Dec 26 14:53:21 UTC 2024 selfserv_9525 with PID 76270 started at Thu Dec 26 14:53:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76270 at Thu Dec 26 14:53:21 UTC 2024 kill -USR1 76270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76270 killed at Thu Dec 26 14:53:21 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:21 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:21 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76298 >/dev/null 2>/dev/null selfserv_9525 with PID 76298 found at Thu Dec 26 14:53:22 UTC 2024 selfserv_9525 with PID 76298 started at Thu Dec 26 14:53:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76298 at Thu Dec 26 14:53:22 UTC 2024 kill -USR1 76298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76298 killed at Thu Dec 26 14:53:22 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76326 >/dev/null 2>/dev/null selfserv_9525 with PID 76326 found at Thu Dec 26 14:53:22 UTC 2024 selfserv_9525 with PID 76326 started at Thu Dec 26 14:53:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76326 at Thu Dec 26 14:53:22 UTC 2024 kill -USR1 76326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76326 killed at Thu Dec 26 14:53:22 UTC 2024 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76354 >/dev/null 2>/dev/null selfserv_9525 with PID 76354 found at Thu Dec 26 14:53:22 UTC 2024 selfserv_9525 with PID 76354 started at Thu Dec 26 14:53:22 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76354 at Thu Dec 26 14:53:22 UTC 2024 kill -USR1 76354 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76354 killed at Thu Dec 26 14:53:22 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:22 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:22 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76383 >/dev/null 2>/dev/null selfserv_9525 with PID 76383 found at Thu Dec 26 14:53:23 UTC 2024 selfserv_9525 with PID 76383 started at Thu Dec 26 14:53:23 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 76383 at Thu Dec 26 14:53:23 UTC 2024 kill -USR1 76383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76383 killed at Thu Dec 26 14:53:23 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76412 >/dev/null 2>/dev/null selfserv_9525 with PID 76412 found at Thu Dec 26 14:53:23 UTC 2024 selfserv_9525 with PID 76412 started at Thu Dec 26 14:53:23 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76412 at Thu Dec 26 14:53:23 UTC 2024 kill -USR1 76412 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76412 killed at Thu Dec 26 14:53:23 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76441 >/dev/null 2>/dev/null selfserv_9525 with PID 76441 found at Thu Dec 26 14:53:23 UTC 2024 selfserv_9525 with PID 76441 started at Thu Dec 26 14:53:23 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1575: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9525 with PID 76441 at Thu Dec 26 14:53:23 UTC 2024 kill -USR1 76441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76441 killed at Thu Dec 26 14:53:23 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:23 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:23 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76470 >/dev/null 2>/dev/null selfserv_9525 with PID 76470 found at Thu Dec 26 14:53:23 UTC 2024 selfserv_9525 with PID 76470 started at Thu Dec 26 14:53:23 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1576: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76470 at Thu Dec 26 14:53:24 UTC 2024 kill -USR1 76470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76470 killed at Thu Dec 26 14:53:24 UTC 2024 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76499 >/dev/null 2>/dev/null selfserv_9525 with PID 76499 found at Thu Dec 26 14:53:24 UTC 2024 selfserv_9525 with PID 76499 started at Thu Dec 26 14:53:24 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1577: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76499 at Thu Dec 26 14:53:24 UTC 2024 kill -USR1 76499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76499 killed at Thu Dec 26 14:53:24 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76528 >/dev/null 2>/dev/null selfserv_9525 with PID 76528 found at Thu Dec 26 14:53:24 UTC 2024 selfserv_9525 with PID 76528 started at Thu Dec 26 14:53:24 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1578: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76528 at Thu Dec 26 14:53:24 UTC 2024 kill -USR1 76528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76528 killed at Thu Dec 26 14:53:24 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:24 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:24 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76557 >/dev/null 2>/dev/null selfserv_9525 with PID 76557 found at Thu Dec 26 14:53:24 UTC 2024 selfserv_9525 with PID 76557 started at Thu Dec 26 14:53:24 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1579: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76557 at Thu Dec 26 14:53:25 UTC 2024 kill -USR1 76557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76557 killed at Thu Dec 26 14:53:25 UTC 2024 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9525 starting at Thu Dec 26 14:53:25 UTC 2024 selfserv_9525 -D -p 9525 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.15633\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9525 at Thu Dec 26 14:53:25 UTC 2024 tstclnt -4 -p 9525 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat kill -0 76586 >/dev/null 2>/dev/null selfserv_9525 with PID 76586 found at Thu Dec 26 14:53:25 UTC 2024 selfserv_9525 with PID 76586 started at Thu Dec 26 14:53:25 UTC 2024 strsclnt -4 -q -p 9525 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.101/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1580: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9525 with PID 76586 at Thu Dec 26 14:53:25 UTC 2024 kill -USR1 76586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9525 -b -p 9525 2>/dev/null; selfserv_9525 with PID 76586 killed at Thu Dec 26 14:53:25 UTC 2024 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #1581: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/client -list ssl.sh: #1582: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1583: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1584: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ext_client -list ssl.sh: #1585: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1586: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Thu Dec 26 14:53:25 UTC 2024 Running tests for ocsp TIMESTAMP ocsp BEGIN: Thu Dec 26 14:53:25 UTC 2024 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Thu Dec 26 14:53:25 UTC 2024 Running tests for merge TIMESTAMP merge BEGIN: Thu Dec 26 14:53:25 UTC 2024 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v3.15633 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:17:29 2024 Not After : Wed Dec 26 14:17:29 2029 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:26:13:69:ea:a5:36:c7:ba:02:08:be:9c:4f:97:70: 6a:ff:1e:2f:a5:26:a9:a7:ca:9c:d1:64:7b:49:8e:37: 59:26:80:c0:e3:f7:d0:83:fd:28:4f:2c:b8:c0:3b:e6: e2:6d:7f:c5:f9:bb:f8:2b:70:9a:6b:13:2e:7f:44:6c: 6d:7e:94:14:15:81:c4:fa:24:0c:bf:40:9a:4b:60:a8: 04:23:06:5d:dc:0b:e1:24:d1:eb:78:d8:f3:ba:98:53: e0:77:06:b7:ad:67:61:69:59:48:dd:14:14:4b:eb:3e: e8:2a:1b:04:cd:ac:cc:e6:0d:cc:e9:a4:8b:c8:30:cd: 15:be:d7:e0:b3:4d:f7:53:80:fe:4c:dd:be:52:bc:f7: 3a:b3:35:ca:a0:35:ef:60:7c:78:b4:88:c9:b9:9f:cb: 33:fc:83:b9:f4:4d:fe:d3:83:65:c7:2b:19:4d:bb:f0: c1:8a:af:b9:15:5b:f5:86:08:45:ea:26:f8:63:46:04: 31:94:81:16:47:5f:29:47:5d:5e:72:c7:0f:43:1d:96: 18:15:bd:5c:8b:94:92:92:88:c2:3c:37:b3:ca:ba:f6: 21:0d:45:c0:c9:cb:9e:b7:8b:37:93:f4:a9:a2:cc:5d: 1f:bc:fe:72:e4:bd:1b:8f:fd:50:fa:6d:ad:b2:a9:45 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:c8:61:4b:ff:a1:0a:07:c2:05:c9:a4:3d:77:17:80: 20:b1:1b:ac:46:47:10:47:0e:73:8c:7c:93:11:06:b3: 42:dd:fb:09:9b:f6:03:d4:a2:68:22:69:32:a6:ad:46: 37:0d:6b:de:ce:5e:03:c7:63:90:09:ea:e8:28:ad:02: b8:da:d9:77:f5:87:58:1f:f4:2a:b4:01:ee:a4:70:01: 40:3a:3b:b3:ce:46:ae:70:d8:5f:c7:3c:76:14:47:55: bd:09:83:79:3a:6f:99:69:73:8f:3b:e7:bc:6e:bb:76: 3c:27:d1:0a:e1:4b:c7:93:b8:45:a7:6d:93:40:68:2d: 7f:36:7f:34:b3:9d:15:16:4b:f0:d3:a1:81:38:7f:3d: 76:48:3f:32:7f:9a:e1:ce:11:b4:c9:14:65:e5:60:7d: 0f:b3:5c:fd:7f:af:7c:2a:6d:62:db:56:7a:0d:f8:ef: 31:0e:25:77:8b:3d:e6:c4:9e:24:24:45:fd:fd:f9:eb: 15:16:8d:0c:04:32:4b:a2:59:ad:66:92:d5:7e:cf:b9: 8d:16:57:0f:52:e5:41:f8:ef:88:a7:62:ae:81:84:20: ff:8a:30:d2:bb:1c:4d:ef:f0:3c:76:28:94:68:73:f2: b3:8a:6b:9c:4b:58:2a:41:a6:54:d3:22:14:05:34:4a Fingerprint (SHA-256): 15:F3:3A:4A:4C:99:92:FA:92:45:3E:1D:51:8D:6C:EA:1A:61:51:58:A1:4B:EF:76:01:5C:C7:A8:2C:8B:67:1A Fingerprint (SHA1): BE:62:21:41:33:34:34:F3:79:44:77:AA:09:6D:16:58:E5:3E:6D:89 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Dec 26 14:17:32 2024 Not After : Wed Dec 26 14:17:32 2029 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:78:0c:4c:57:b1:80:d0:b7:6d:0b:f3:19:1e:51:f4: cb:24:13:ee:d8:65:ea:3d:28:d3:41:23:d3:ee:b0:e7: 0b:0e:40:3a:56:f8:fd:9d:e5:3f:2b:cd:3f:60:60:29: a5:04:f7:15:73:1b:ee:7f:3b:f8:9c:8c:b0:09:c7:62: 0c:75:3e:2c:6b:46:61:85:8a:94:f2:43:d8:28:ce:a4: 93:f0:03:0e:88:af:0c:64:8f:79:07:5f:02:09:7e:0e: af:eb:98:c7:ef:b0:61:a1:cb:f2:1f:a4:7b:87:22:70: 82:4f:ee:1a:d2:18:02:79:f2:05:4f:5e:3e:37:5b:1c: e2:6c:26:df:29:04:8e:85:41:6b:3d:23:57:04:35:15: 90:53:57:37:ba:61:6a:10:a2:34:cd:cc:b9:86:8b:fb: 7c:86:2d:c5:0b:81:9f:f7:cc:bf:e0:8f:c5:54:fd:a1: 42:2a:98:60:64:fc:54:60:53:3c:a6:c5:84:d6:56:c1: 39:94:8d:de:72:1d:b7:1a:1e:2d:cd:fb:23:9d:c7:13: a0:a2:3d:91:5e:ad:c1:c7:14:ee:62:cc:ce:4d:bc:fd: c7:4c:d2:ee:61:92:81:0a:ba:fd:04:dd:4b:ef:05:ac: 53:a9:74:02:7f:24:04:7a:3b:9f:e4:98:39:bc:b9:b7 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:73:9a:fa:4b:a8:4a:7e:06:6a:2c:21:7e:e3:56:c2: 45:ee:2c:9e:5d:42:83:8a:ff:37:f9:2b:9c:d5:22:d5: ca:4b:d3:11:88:00:00:bc:67:ca:65:b5:eb:4e:8b:90: 05:5a:f6:17:2e:ae:12:b0:cb:66:a2:ce:a9:e8:84:87: 57:83:c0:4a:67:16:89:f7:15:b0:e5:5d:d6:5c:51:a6: ec:59:00:e9:ad:88:db:a3:98:a7:f6:c5:a9:c3:02:1b: 6b:03:5e:b6:07:0c:92:95:df:60:71:c5:53:e7:1b:9f: aa:4d:f1:b2:f2:7a:bf:24:d7:7f:b3:98:6b:e8:46:d0: 53:04:cf:7d:6f:7d:96:3a:07:23:b8:ff:e0:bb:71:3a: ec:9d:d0:45:09:c4:95:4d:b0:f8:5a:19:41:38:56:81: fc:45:03:8a:b8:e6:b2:53:ea:5d:6b:e6:a6:2b:59:ff: 0d:4a:2c:51:2e:07:4f:90:d7:07:7b:62:dc:1d:0b:50: 0f:e7:86:d7:29:07:43:1c:70:ff:77:92:5b:51:f7:60: d5:ac:cc:21:d9:bd:6e:eb:22:e3:6c:93:4f:75:b3:66: aa:60:8e:1c:38:4f:63:23:2c:40:46:ee:1b:fe:3b:ce: 24:00:c7:43:70:dd:82:cf:b2:1d:98:a7:bd:73:a9:c2 Fingerprint (SHA-256): 3A:77:B4:B3:1B:4A:33:3F:7B:62:1D:31:39:04:0F:17:49:0C:3F:D3:51:77:08:DA:60:34:F7:73:43:0D:79:7C Fingerprint (SHA1): 02:C3:0E:74:16:D3:08:5F:52:A6:83:95:02:BB:B4:B9:EA:C9:1E:3C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u Fran u,u,u Fran-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u clientCA T,C,C chain-1-clientCA ,, chain-2-clientCA ,, clientCA-dsa T,C,C chain-1-clientCA-dsa ,, chain-2-clientCA-dsa ,, clientCA-ec T,C,C chain-1-clientCA-ec ,, chain-2-clientCA-ec ,, Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v3.15633 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests.v1.15633 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Thu Dec 26 14:17:55 2024 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Thu Dec 26 14:15:58 2024 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Thu Dec 26 14:17:51 2024 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Thu Dec 26 14:53:30 UTC 2024 Running tests for chains TIMESTAMP chains BEGIN: Thu Dec 26 14:53:30 UTC 2024 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145331 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9536 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9536 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9536 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9535/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:9536 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20241226145345Z nextupdate=20251226145345Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Thu Dec 26 14:53:45 2024 Next Update: Fri Dec 26 14:53:45 2025 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20241226145346Z addcert 2 20241226145346Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Thu Dec 26 14:53:46 2024 Next Update: Fri Dec 26 14:53:45 2025 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Thu Dec 26 14:53:46 2024 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145346Z nextupdate=20251226145346Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:53:46 2024 Next Update: Fri Dec 26 14:53:46 2025 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145347Z addcert 2 20241226145347Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:53:47 2024 Next Update: Fri Dec 26 14:53:46 2025 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Thu Dec 26 14:53:47 2024 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145348Z addcert 4 20241226145348Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:53:48 2024 Next Update: Fri Dec 26 14:53:46 2025 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Thu Dec 26 14:53:47 2024 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Thu Dec 26 14:53:48 2024 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20241226145348Z nextupdate=20251226145348Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Thu Dec 26 14:53:48 2024 Next Update: Fri Dec 26 14:53:48 2025 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20241226145349Z addcert 2 20241226145349Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Thu Dec 26 14:53:49 2024 Next Update: Fri Dec 26 14:53:48 2025 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Thu Dec 26 14:53:49 2024 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20241226145350Z addcert 3 20241226145350Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Thu Dec 26 14:53:50 2024 Next Update: Fri Dec 26 14:53:48 2025 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Thu Dec 26 14:53:49 2024 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 14:53:50 2024 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20241226145350Z nextupdate=20251226145350Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Thu Dec 26 14:53:50 2024 Next Update: Fri Dec 26 14:53:50 2025 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20241226145351Z addcert 2 20241226145351Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Thu Dec 26 14:53:51 2024 Next Update: Fri Dec 26 14:53:50 2025 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Thu Dec 26 14:53:51 2024 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20241226145352Z addcert 3 20241226145352Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Thu Dec 26 14:53:52 2024 Next Update: Fri Dec 26 14:53:50 2025 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Thu Dec 26 14:53:51 2024 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 14:53:52 2024 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145332 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145333 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1226145334 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1226145335 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1226145336 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1226145337 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1226145338 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1226145339 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1226145340 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1226145341 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1226145342 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1226145343 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1226145344 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1226145345 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1226145346 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1226145347 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Thu Dec 26 14:54:13 UTC 2024 httpserv -D -p 9535 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/aiahttp/http_pid.15633 & trying to connect to httpserv at Thu Dec 26 14:54:13 UTC 2024 tstclnt -4 -p 9535 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9535 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 78650 >/dev/null 2>/dev/null httpserv with PID 78650 found at Thu Dec 26 14:54:13 UTC 2024 httpserv with PID 78650 started at Thu Dec 26 14:54:13 UTC 2024 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145332 (0x49157e34) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:53:57 2024 Not After : Wed Dec 26 14:53:57 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:60:22:9d:f3:e3:86:7d:9c:58:89:f7:07:b2:ab:63: 04:dc:61:6b:a7:1e:6e:94:90:0a:7f:d5:db:45:e1:9d: 38:10:2e:33:12:da:0c:24:d1:d7:9d:6c:95:52:ff:dd: e9:a5:df:d5:95:a1:d1:21:6a:d3:23:b0:e4:ec:da:49: b8:b6:fa:ad:9e:66:19:6e:03:22:69:42:9a:26:c8:07: 84:c0:41:bb:19:7a:c2:9f:1c:18:47:5e:c8:8f:9a:65: a3:bb:34:6d:ba:8e:3a:c7:15:4e:65:2b:64:91:8a:73: 05:67:7b:69:69:9a:fc:dd:14:3d:48:95:b2:61:04:f2: 64:4d:8f:90:a5:18:43:12:a2:67:b5:8b:d1:01:5c:e9: cc:d6:26:5b:10:fc:40:f5:77:89:fe:ed:73:6a:42:a8: ec:8a:01:df:21:24:e5:8e:3d:28:41:b4:8b:a0:82:19: 6a:f6:e8:66:12:4d:43:fe:67:84:56:d1:66:6d:45:94: 11:18:9e:2c:b7:f2:7f:84:a4:a6:67:14:9f:48:dc:71: 82:02:10:6c:01:60:a0:5e:5e:81:c1:f1:4f:8f:ff:1c: 11:14:af:1f:d7:f8:00:fe:0e:fa:54:0d:e2:e7:b6:10: ed:4a:be:54:0a:c4:4f:6c:96:7c:28:d5:5a:46:ee:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:c9:21:d1:7f:63:59:0f:a2:99:34:33:49:3e:01:b1: c5:c0:d2:40:8a:c0:60:ac:31:12:95:35:05:ca:a3:de: 57:da:87:e2:77:7e:5e:c5:4d:57:67:a6:2b:f7:25:8e: c3:f5:a6:15:7e:5f:d6:af:8a:f5:b2:34:4c:f0:1f:1c: 2b:65:51:0f:9b:5a:13:e3:df:77:16:4b:44:bb:f7:9f: 7e:8c:6b:bf:c5:df:c6:66:e3:7f:43:ea:69:66:0d:4c: 76:64:17:2d:ff:23:54:4f:49:4d:c2:c0:5a:60:62:56: e8:dc:f3:af:ef:74:1e:3b:de:65:1f:b0:50:60:1e:f9: 84:7e:ea:ab:0c:24:75:68:85:db:2e:23:be:7b:d5:2a: 3a:a9:10:72:34:a6:ff:93:53:e4:a4:94:3e:e0:ec:aa: f9:e0:bd:1e:59:c4:7c:1a:52:8a:9b:1d:e7:1d:cd:9b: a2:2a:f4:b6:56:d6:ec:27:69:36:64:df:6e:b4:91:5d: ee:ef:a5:7b:60:24:99:6e:fd:d9:76:e1:09:a2:fd:75: 34:80:e1:fc:2b:01:a9:30:d8:1c:47:97:5a:3a:03:f8: 33:12:ef:d6:ec:fa:55:f1:56:33:e3:cb:8e:5a:bf:77: e4:eb:36:d2:48:63:14:20:1f:79:55:37:88:23:fa:72 Fingerprint (SHA-256): 90:9C:91:18:78:2C:30:39:2D:0A:74:3A:83:B7:93:40:33:35:DF:F8:98:0D:7B:5B:29:51:A2:3A:43:EA:C2:2A Fingerprint (SHA1): A7:FE:C4:CB:1F:C9:A8:0D:F4:04:45:89:01:5A:FD:DD:95:80:55:62 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 9535 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 78650 at Thu Dec 26 14:54:14 UTC 2024 kill -USR1 78650 httpserv: normal termination httpserv -b -p 9535 2>/dev/null; httpserv with PID 78650 killed at Thu Dec 26 14:54:14 UTC 2024 httpserv starting at Thu Dec 26 14:54:14 UTC 2024 httpserv -D -p 9535 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/aiahttp/http_pid.15633 & trying to connect to httpserv at Thu Dec 26 14:54:14 UTC 2024 tstclnt -4 -p 9535 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9535 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 78833 >/dev/null 2>/dev/null httpserv with PID 78833 found at Thu Dec 26 14:54:14 UTC 2024 httpserv with PID 78833 started at Thu Dec 26 14:54:14 UTC 2024 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 9535 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 78833 at Thu Dec 26 14:54:15 UTC 2024 kill -USR1 78833 httpserv: normal termination httpserv -b -p 9535 2>/dev/null; httpserv with PID 78833 killed at Thu Dec 26 14:54:15 UTC 2024 httpserv starting at Thu Dec 26 14:54:15 UTC 2024 httpserv -D -p 9535 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/aiahttp/http_pid.15633 & trying to connect to httpserv at Thu Dec 26 14:54:15 UTC 2024 tstclnt -4 -p 9535 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9535 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 79034 >/dev/null 2>/dev/null httpserv with PID 79034 found at Thu Dec 26 14:54:15 UTC 2024 httpserv with PID 79034 started at Thu Dec 26 14:54:15 UTC 2024 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145348 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145349 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145350 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145351 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1226145352 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145349 (0x49157e45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:54:17 2024 Not After : Wed Dec 26 14:54:17 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:f7:42:58:c0:38:d0:ef:af:00:c1:de:9b:4a:51:c1: 74:33:2b:39:fe:a9:e5:7d:34:7b:3d:01:1e:b0:11:13: 08:b8:68:a9:a2:93:d4:92:60:21:9d:0f:00:01:ee:e7: 15:b1:5a:98:9a:98:f9:27:8a:73:ed:49:9a:0f:65:86: 45:c5:39:43:75:6a:c5:e6:0c:2a:01:1f:f6:87:5e:1d: 52:ce:0d:3e:90:5c:74:2f:25:4d:26:97:4b:97:db:88: 89:21:80:b5:e8:e3:7e:4d:9d:79:c9:ed:74:f0:bc:a7: f2:55:b0:5e:81:df:bc:6f:cd:ad:38:a2:c5:1e:90:a9: f1:4b:74:f0:1d:72:02:c6:2c:6b:2d:0f:d0:fe:68:b4: 73:ac:45:96:a3:4a:31:09:3c:fc:da:30:49:74:30:fa: d8:f5:dd:7a:6f:fd:d1:19:66:0f:8e:08:f8:85:72:22: ac:d9:ee:2e:d6:eb:22:01:f3:42:8f:6a:0c:f0:c3:fa: 3f:2d:84:2f:64:7b:c8:19:72:dc:cf:00:1c:67:a3:8c: 4a:cd:e0:1d:d3:5c:2b:61:b0:41:8d:f9:55:b1:38:a5: 47:58:60:f6:28:6c:7c:72:3d:95:a5:34:0f:28:a2:71: 93:e9:cf:b1:83:b5:99:e5:a7:7a:2c:a5:64:90:c4:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:3d:cd:35:b3:9f:95:ae:18:c1:48:ac:84:16:15:b2: d2:9a:04:20:c8:c7:40:ee:ba:a5:b8:66:b5:94:92:c1: 9b:e1:0d:1a:83:e3:b9:e6:9f:1c:89:df:f9:3c:43:f0: 16:10:e1:4b:36:13:5e:e3:9b:59:e2:64:61:74:0e:2d: 6c:01:24:74:ac:83:35:00:c0:27:0c:e0:b6:72:18:31: b4:8c:28:76:8e:38:7d:6b:13:8a:2e:bc:9a:fd:15:6b: 55:e8:63:f8:06:73:71:d9:dd:2d:6a:c4:87:97:d1:85: ff:eb:67:6c:91:33:e5:f6:bb:96:06:91:6d:c0:b5:3a: 5d:aa:45:d2:5d:a6:1a:06:da:2a:30:68:f6:d2:07:d3: 65:63:e2:14:c2:9f:23:03:a7:46:69:bc:85:04:af:93: dc:97:5e:ec:db:a7:3d:1b:a0:5b:bc:7d:e6:a0:73:24: 99:e4:80:98:0d:43:e6:a3:44:20:ce:b4:c9:f0:39:37: 9c:55:70:60:58:7e:e9:23:04:01:08:c9:c0:70:c5:d7: 7c:83:91:50:5f:7c:e4:82:c2:5a:00:fe:72:00:89:57: 2a:0d:6c:d6:31:88:dd:af:b1:9b:c2:4e:4b:5c:e9:37: 3e:1e:18:14:cd:ce:0c:b8:77:de:06:71:b5:7b:22:7e Fingerprint (SHA-256): E6:8F:F4:85:37:49:51:05:AF:07:D0:9D:B6:5C:2A:AB:2C:46:61:45:5A:50:EF:05:D7:BB:42:52:26:73:62:ED Fingerprint (SHA1): 07:8C:A4:34:C5:D5:72:70:30:F7:32:46:D2:3A:3D:1B:37:B1:06:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145348 (0x49157e44) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:54:16 2024 Not After : Wed Dec 26 14:54:16 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:1f:21:64:fa:1f:17:2c:70:e9:5a:07:f2:6e:fa:0f: 61:a5:a0:57:03:3d:f0:23:68:bb:cf:ca:a2:24:e2:6a: c7:89:de:d1:cf:32:4f:04:57:b2:6a:2f:98:06:13:cb: 7a:06:80:11:28:75:00:a7:d0:3f:e7:bc:af:50:eb:86: ce:c1:ad:13:41:fc:3c:88:3d:da:cd:3c:4a:92:8b:f7: ec:c5:b4:e6:6a:ef:c0:93:f4:94:35:17:2d:9d:ad:ba: 5b:18:0f:5f:6e:6d:02:44:7b:71:55:96:ae:54:46:29: 41:72:0e:87:37:a8:05:cf:ee:79:59:d5:8c:7a:d5:83: 26:09:0b:33:71:e6:c0:07:77:d1:9e:82:c7:7e:e7:33: 1d:2c:5e:3e:82:2e:77:53:24:d9:37:47:dd:80:b0:b6: f9:81:49:d3:03:fc:3d:8a:73:df:47:64:93:47:19:7b: 42:88:ae:16:9e:d0:87:9a:88:0a:c1:77:df:ef:fa:c5: 74:a9:eb:53:d1:c2:29:23:c9:bb:56:09:2a:59:40:3c: 09:37:32:88:a7:0c:73:b3:00:0f:34:d8:5c:58:bb:ce: 15:a1:0e:8b:d4:a7:7a:c1:1c:68:ee:fb:eb:eb:c9:63: 14:da:8b:71:97:03:89:8d:c6:e2:d7:cf:4b:2b:f8:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:a1:c6:50:43:b8:6f:49:87:b7:d5:6e:9b:56:75:bc: 20:e1:ae:2e:ea:b1:f6:81:3c:32:e8:6a:ea:a5:c6:31: e4:16:37:1b:83:23:a0:e7:4b:22:14:99:f4:57:de:26: 84:b4:70:fd:71:38:68:4f:ff:ff:f1:76:04:f4:60:e3: 4f:0e:76:ae:1a:a5:67:cb:7b:7a:ab:3a:4b:8e:da:8a: e4:6b:a8:f5:cc:c3:e5:35:76:19:91:0c:ae:54:64:99: 6b:f3:87:f3:02:8a:00:11:b5:b3:59:98:a5:09:b9:1a: cc:4f:08:69:f4:e4:38:ff:4e:32:ee:96:a7:1a:3e:24: 02:de:a7:bf:df:ce:1a:9e:31:76:b2:b5:0f:89:ca:ee: f7:54:b6:1c:e7:f4:fd:09:26:ac:c8:47:bd:88:0a:a1: 60:26:3c:46:3f:6f:5e:d9:91:37:52:a3:aa:1b:e4:3e: 3b:e3:18:ea:26:d4:12:da:69:b3:fe:72:f0:ca:ed:24: e4:f9:ba:13:6b:8a:7e:43:d1:8f:c9:3c:c1:8b:b2:71: 5f:14:68:7e:55:3a:97:32:0c:72:dc:53:4f:ff:33:44: 2a:c9:78:c1:cf:ff:9d:66:80:4c:ff:c2:c3:42:c4:06: f3:03:a3:a0:df:e4:77:55:1b:d8:3e:f0:9b:4d:90:41 Fingerprint (SHA-256): BC:51:8F:F6:94:13:B5:59:60:41:C8:2E:51:1F:4A:44:CF:78:D2:0B:29:92:B6:B8:A7:50:AA:EB:D9:6B:F8:D6 Fingerprint (SHA1): 38:B2:45:61:51:72:A8:82:7B:6A:49:FF:45:34:1A:BF:3A:4E:63:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145348 (0x49157e44) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:54:16 2024 Not After : Wed Dec 26 14:54:16 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:1f:21:64:fa:1f:17:2c:70:e9:5a:07:f2:6e:fa:0f: 61:a5:a0:57:03:3d:f0:23:68:bb:cf:ca:a2:24:e2:6a: c7:89:de:d1:cf:32:4f:04:57:b2:6a:2f:98:06:13:cb: 7a:06:80:11:28:75:00:a7:d0:3f:e7:bc:af:50:eb:86: ce:c1:ad:13:41:fc:3c:88:3d:da:cd:3c:4a:92:8b:f7: ec:c5:b4:e6:6a:ef:c0:93:f4:94:35:17:2d:9d:ad:ba: 5b:18:0f:5f:6e:6d:02:44:7b:71:55:96:ae:54:46:29: 41:72:0e:87:37:a8:05:cf:ee:79:59:d5:8c:7a:d5:83: 26:09:0b:33:71:e6:c0:07:77:d1:9e:82:c7:7e:e7:33: 1d:2c:5e:3e:82:2e:77:53:24:d9:37:47:dd:80:b0:b6: f9:81:49:d3:03:fc:3d:8a:73:df:47:64:93:47:19:7b: 42:88:ae:16:9e:d0:87:9a:88:0a:c1:77:df:ef:fa:c5: 74:a9:eb:53:d1:c2:29:23:c9:bb:56:09:2a:59:40:3c: 09:37:32:88:a7:0c:73:b3:00:0f:34:d8:5c:58:bb:ce: 15:a1:0e:8b:d4:a7:7a:c1:1c:68:ee:fb:eb:eb:c9:63: 14:da:8b:71:97:03:89:8d:c6:e2:d7:cf:4b:2b:f8:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:a1:c6:50:43:b8:6f:49:87:b7:d5:6e:9b:56:75:bc: 20:e1:ae:2e:ea:b1:f6:81:3c:32:e8:6a:ea:a5:c6:31: e4:16:37:1b:83:23:a0:e7:4b:22:14:99:f4:57:de:26: 84:b4:70:fd:71:38:68:4f:ff:ff:f1:76:04:f4:60:e3: 4f:0e:76:ae:1a:a5:67:cb:7b:7a:ab:3a:4b:8e:da:8a: e4:6b:a8:f5:cc:c3:e5:35:76:19:91:0c:ae:54:64:99: 6b:f3:87:f3:02:8a:00:11:b5:b3:59:98:a5:09:b9:1a: cc:4f:08:69:f4:e4:38:ff:4e:32:ee:96:a7:1a:3e:24: 02:de:a7:bf:df:ce:1a:9e:31:76:b2:b5:0f:89:ca:ee: f7:54:b6:1c:e7:f4:fd:09:26:ac:c8:47:bd:88:0a:a1: 60:26:3c:46:3f:6f:5e:d9:91:37:52:a3:aa:1b:e4:3e: 3b:e3:18:ea:26:d4:12:da:69:b3:fe:72:f0:ca:ed:24: e4:f9:ba:13:6b:8a:7e:43:d1:8f:c9:3c:c1:8b:b2:71: 5f:14:68:7e:55:3a:97:32:0c:72:dc:53:4f:ff:33:44: 2a:c9:78:c1:cf:ff:9d:66:80:4c:ff:c2:c3:42:c4:06: f3:03:a3:a0:df:e4:77:55:1b:d8:3e:f0:9b:4d:90:41 Fingerprint (SHA-256): BC:51:8F:F6:94:13:B5:59:60:41:C8:2E:51:1F:4A:44:CF:78:D2:0B:29:92:B6:B8:A7:50:AA:EB:D9:6B:F8:D6 Fingerprint (SHA1): 38:B2:45:61:51:72:A8:82:7B:6A:49:FF:45:34:1A:BF:3A:4E:63:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145349 (0x49157e45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:54:17 2024 Not After : Wed Dec 26 14:54:17 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:f7:42:58:c0:38:d0:ef:af:00:c1:de:9b:4a:51:c1: 74:33:2b:39:fe:a9:e5:7d:34:7b:3d:01:1e:b0:11:13: 08:b8:68:a9:a2:93:d4:92:60:21:9d:0f:00:01:ee:e7: 15:b1:5a:98:9a:98:f9:27:8a:73:ed:49:9a:0f:65:86: 45:c5:39:43:75:6a:c5:e6:0c:2a:01:1f:f6:87:5e:1d: 52:ce:0d:3e:90:5c:74:2f:25:4d:26:97:4b:97:db:88: 89:21:80:b5:e8:e3:7e:4d:9d:79:c9:ed:74:f0:bc:a7: f2:55:b0:5e:81:df:bc:6f:cd:ad:38:a2:c5:1e:90:a9: f1:4b:74:f0:1d:72:02:c6:2c:6b:2d:0f:d0:fe:68:b4: 73:ac:45:96:a3:4a:31:09:3c:fc:da:30:49:74:30:fa: d8:f5:dd:7a:6f:fd:d1:19:66:0f:8e:08:f8:85:72:22: ac:d9:ee:2e:d6:eb:22:01:f3:42:8f:6a:0c:f0:c3:fa: 3f:2d:84:2f:64:7b:c8:19:72:dc:cf:00:1c:67:a3:8c: 4a:cd:e0:1d:d3:5c:2b:61:b0:41:8d:f9:55:b1:38:a5: 47:58:60:f6:28:6c:7c:72:3d:95:a5:34:0f:28:a2:71: 93:e9:cf:b1:83:b5:99:e5:a7:7a:2c:a5:64:90:c4:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:3d:cd:35:b3:9f:95:ae:18:c1:48:ac:84:16:15:b2: d2:9a:04:20:c8:c7:40:ee:ba:a5:b8:66:b5:94:92:c1: 9b:e1:0d:1a:83:e3:b9:e6:9f:1c:89:df:f9:3c:43:f0: 16:10:e1:4b:36:13:5e:e3:9b:59:e2:64:61:74:0e:2d: 6c:01:24:74:ac:83:35:00:c0:27:0c:e0:b6:72:18:31: b4:8c:28:76:8e:38:7d:6b:13:8a:2e:bc:9a:fd:15:6b: 55:e8:63:f8:06:73:71:d9:dd:2d:6a:c4:87:97:d1:85: ff:eb:67:6c:91:33:e5:f6:bb:96:06:91:6d:c0:b5:3a: 5d:aa:45:d2:5d:a6:1a:06:da:2a:30:68:f6:d2:07:d3: 65:63:e2:14:c2:9f:23:03:a7:46:69:bc:85:04:af:93: dc:97:5e:ec:db:a7:3d:1b:a0:5b:bc:7d:e6:a0:73:24: 99:e4:80:98:0d:43:e6:a3:44:20:ce:b4:c9:f0:39:37: 9c:55:70:60:58:7e:e9:23:04:01:08:c9:c0:70:c5:d7: 7c:83:91:50:5f:7c:e4:82:c2:5a:00:fe:72:00:89:57: 2a:0d:6c:d6:31:88:dd:af:b1:9b:c2:4e:4b:5c:e9:37: 3e:1e:18:14:cd:ce:0c:b8:77:de:06:71:b5:7b:22:7e Fingerprint (SHA-256): E6:8F:F4:85:37:49:51:05:AF:07:D0:9D:B6:5C:2A:AB:2C:46:61:45:5A:50:EF:05:D7:BB:42:52:26:73:62:ED Fingerprint (SHA1): 07:8C:A4:34:C5:D5:72:70:30:F7:32:46:D2:3A:3D:1B:37:B1:06:E3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145349 (0x49157e45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:54:17 2024 Not After : Wed Dec 26 14:54:17 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:f7:42:58:c0:38:d0:ef:af:00:c1:de:9b:4a:51:c1: 74:33:2b:39:fe:a9:e5:7d:34:7b:3d:01:1e:b0:11:13: 08:b8:68:a9:a2:93:d4:92:60:21:9d:0f:00:01:ee:e7: 15:b1:5a:98:9a:98:f9:27:8a:73:ed:49:9a:0f:65:86: 45:c5:39:43:75:6a:c5:e6:0c:2a:01:1f:f6:87:5e:1d: 52:ce:0d:3e:90:5c:74:2f:25:4d:26:97:4b:97:db:88: 89:21:80:b5:e8:e3:7e:4d:9d:79:c9:ed:74:f0:bc:a7: f2:55:b0:5e:81:df:bc:6f:cd:ad:38:a2:c5:1e:90:a9: f1:4b:74:f0:1d:72:02:c6:2c:6b:2d:0f:d0:fe:68:b4: 73:ac:45:96:a3:4a:31:09:3c:fc:da:30:49:74:30:fa: d8:f5:dd:7a:6f:fd:d1:19:66:0f:8e:08:f8:85:72:22: ac:d9:ee:2e:d6:eb:22:01:f3:42:8f:6a:0c:f0:c3:fa: 3f:2d:84:2f:64:7b:c8:19:72:dc:cf:00:1c:67:a3:8c: 4a:cd:e0:1d:d3:5c:2b:61:b0:41:8d:f9:55:b1:38:a5: 47:58:60:f6:28:6c:7c:72:3d:95:a5:34:0f:28:a2:71: 93:e9:cf:b1:83:b5:99:e5:a7:7a:2c:a5:64:90:c4:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:3d:cd:35:b3:9f:95:ae:18:c1:48:ac:84:16:15:b2: d2:9a:04:20:c8:c7:40:ee:ba:a5:b8:66:b5:94:92:c1: 9b:e1:0d:1a:83:e3:b9:e6:9f:1c:89:df:f9:3c:43:f0: 16:10:e1:4b:36:13:5e:e3:9b:59:e2:64:61:74:0e:2d: 6c:01:24:74:ac:83:35:00:c0:27:0c:e0:b6:72:18:31: b4:8c:28:76:8e:38:7d:6b:13:8a:2e:bc:9a:fd:15:6b: 55:e8:63:f8:06:73:71:d9:dd:2d:6a:c4:87:97:d1:85: ff:eb:67:6c:91:33:e5:f6:bb:96:06:91:6d:c0:b5:3a: 5d:aa:45:d2:5d:a6:1a:06:da:2a:30:68:f6:d2:07:d3: 65:63:e2:14:c2:9f:23:03:a7:46:69:bc:85:04:af:93: dc:97:5e:ec:db:a7:3d:1b:a0:5b:bc:7d:e6:a0:73:24: 99:e4:80:98:0d:43:e6:a3:44:20:ce:b4:c9:f0:39:37: 9c:55:70:60:58:7e:e9:23:04:01:08:c9:c0:70:c5:d7: 7c:83:91:50:5f:7c:e4:82:c2:5a:00:fe:72:00:89:57: 2a:0d:6c:d6:31:88:dd:af:b1:9b:c2:4e:4b:5c:e9:37: 3e:1e:18:14:cd:ce:0c:b8:77:de:06:71:b5:7b:22:7e Fingerprint (SHA-256): E6:8F:F4:85:37:49:51:05:AF:07:D0:9D:B6:5C:2A:AB:2C:46:61:45:5A:50:EF:05:D7:BB:42:52:26:73:62:ED Fingerprint (SHA1): 07:8C:A4:34:C5:D5:72:70:30:F7:32:46:D2:3A:3D:1B:37:B1:06:E3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145349 (0x49157e45) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:54:17 2024 Not After : Wed Dec 26 14:54:17 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:f7:42:58:c0:38:d0:ef:af:00:c1:de:9b:4a:51:c1: 74:33:2b:39:fe:a9:e5:7d:34:7b:3d:01:1e:b0:11:13: 08:b8:68:a9:a2:93:d4:92:60:21:9d:0f:00:01:ee:e7: 15:b1:5a:98:9a:98:f9:27:8a:73:ed:49:9a:0f:65:86: 45:c5:39:43:75:6a:c5:e6:0c:2a:01:1f:f6:87:5e:1d: 52:ce:0d:3e:90:5c:74:2f:25:4d:26:97:4b:97:db:88: 89:21:80:b5:e8:e3:7e:4d:9d:79:c9:ed:74:f0:bc:a7: f2:55:b0:5e:81:df:bc:6f:cd:ad:38:a2:c5:1e:90:a9: f1:4b:74:f0:1d:72:02:c6:2c:6b:2d:0f:d0:fe:68:b4: 73:ac:45:96:a3:4a:31:09:3c:fc:da:30:49:74:30:fa: d8:f5:dd:7a:6f:fd:d1:19:66:0f:8e:08:f8:85:72:22: ac:d9:ee:2e:d6:eb:22:01:f3:42:8f:6a:0c:f0:c3:fa: 3f:2d:84:2f:64:7b:c8:19:72:dc:cf:00:1c:67:a3:8c: 4a:cd:e0:1d:d3:5c:2b:61:b0:41:8d:f9:55:b1:38:a5: 47:58:60:f6:28:6c:7c:72:3d:95:a5:34:0f:28:a2:71: 93:e9:cf:b1:83:b5:99:e5:a7:7a:2c:a5:64:90:c4:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:3d:cd:35:b3:9f:95:ae:18:c1:48:ac:84:16:15:b2: d2:9a:04:20:c8:c7:40:ee:ba:a5:b8:66:b5:94:92:c1: 9b:e1:0d:1a:83:e3:b9:e6:9f:1c:89:df:f9:3c:43:f0: 16:10:e1:4b:36:13:5e:e3:9b:59:e2:64:61:74:0e:2d: 6c:01:24:74:ac:83:35:00:c0:27:0c:e0:b6:72:18:31: b4:8c:28:76:8e:38:7d:6b:13:8a:2e:bc:9a:fd:15:6b: 55:e8:63:f8:06:73:71:d9:dd:2d:6a:c4:87:97:d1:85: ff:eb:67:6c:91:33:e5:f6:bb:96:06:91:6d:c0:b5:3a: 5d:aa:45:d2:5d:a6:1a:06:da:2a:30:68:f6:d2:07:d3: 65:63:e2:14:c2:9f:23:03:a7:46:69:bc:85:04:af:93: dc:97:5e:ec:db:a7:3d:1b:a0:5b:bc:7d:e6:a0:73:24: 99:e4:80:98:0d:43:e6:a3:44:20:ce:b4:c9:f0:39:37: 9c:55:70:60:58:7e:e9:23:04:01:08:c9:c0:70:c5:d7: 7c:83:91:50:5f:7c:e4:82:c2:5a:00:fe:72:00:89:57: 2a:0d:6c:d6:31:88:dd:af:b1:9b:c2:4e:4b:5c:e9:37: 3e:1e:18:14:cd:ce:0c:b8:77:de:06:71:b5:7b:22:7e Fingerprint (SHA-256): E6:8F:F4:85:37:49:51:05:AF:07:D0:9D:B6:5C:2A:AB:2C:46:61:45:5A:50:EF:05:D7:BB:42:52:26:73:62:ED Fingerprint (SHA1): 07:8C:A4:34:C5:D5:72:70:30:F7:32:46:D2:3A:3D:1B:37:B1:06:E3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145348 (0x49157e44) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:54:16 2024 Not After : Wed Dec 26 14:54:16 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:1f:21:64:fa:1f:17:2c:70:e9:5a:07:f2:6e:fa:0f: 61:a5:a0:57:03:3d:f0:23:68:bb:cf:ca:a2:24:e2:6a: c7:89:de:d1:cf:32:4f:04:57:b2:6a:2f:98:06:13:cb: 7a:06:80:11:28:75:00:a7:d0:3f:e7:bc:af:50:eb:86: ce:c1:ad:13:41:fc:3c:88:3d:da:cd:3c:4a:92:8b:f7: ec:c5:b4:e6:6a:ef:c0:93:f4:94:35:17:2d:9d:ad:ba: 5b:18:0f:5f:6e:6d:02:44:7b:71:55:96:ae:54:46:29: 41:72:0e:87:37:a8:05:cf:ee:79:59:d5:8c:7a:d5:83: 26:09:0b:33:71:e6:c0:07:77:d1:9e:82:c7:7e:e7:33: 1d:2c:5e:3e:82:2e:77:53:24:d9:37:47:dd:80:b0:b6: f9:81:49:d3:03:fc:3d:8a:73:df:47:64:93:47:19:7b: 42:88:ae:16:9e:d0:87:9a:88:0a:c1:77:df:ef:fa:c5: 74:a9:eb:53:d1:c2:29:23:c9:bb:56:09:2a:59:40:3c: 09:37:32:88:a7:0c:73:b3:00:0f:34:d8:5c:58:bb:ce: 15:a1:0e:8b:d4:a7:7a:c1:1c:68:ee:fb:eb:eb:c9:63: 14:da:8b:71:97:03:89:8d:c6:e2:d7:cf:4b:2b:f8:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:a1:c6:50:43:b8:6f:49:87:b7:d5:6e:9b:56:75:bc: 20:e1:ae:2e:ea:b1:f6:81:3c:32:e8:6a:ea:a5:c6:31: e4:16:37:1b:83:23:a0:e7:4b:22:14:99:f4:57:de:26: 84:b4:70:fd:71:38:68:4f:ff:ff:f1:76:04:f4:60:e3: 4f:0e:76:ae:1a:a5:67:cb:7b:7a:ab:3a:4b:8e:da:8a: e4:6b:a8:f5:cc:c3:e5:35:76:19:91:0c:ae:54:64:99: 6b:f3:87:f3:02:8a:00:11:b5:b3:59:98:a5:09:b9:1a: cc:4f:08:69:f4:e4:38:ff:4e:32:ee:96:a7:1a:3e:24: 02:de:a7:bf:df:ce:1a:9e:31:76:b2:b5:0f:89:ca:ee: f7:54:b6:1c:e7:f4:fd:09:26:ac:c8:47:bd:88:0a:a1: 60:26:3c:46:3f:6f:5e:d9:91:37:52:a3:aa:1b:e4:3e: 3b:e3:18:ea:26:d4:12:da:69:b3:fe:72:f0:ca:ed:24: e4:f9:ba:13:6b:8a:7e:43:d1:8f:c9:3c:c1:8b:b2:71: 5f:14:68:7e:55:3a:97:32:0c:72:dc:53:4f:ff:33:44: 2a:c9:78:c1:cf:ff:9d:66:80:4c:ff:c2:c3:42:c4:06: f3:03:a3:a0:df:e4:77:55:1b:d8:3e:f0:9b:4d:90:41 Fingerprint (SHA-256): BC:51:8F:F6:94:13:B5:59:60:41:C8:2E:51:1F:4A:44:CF:78:D2:0B:29:92:B6:B8:A7:50:AA:EB:D9:6B:F8:D6 Fingerprint (SHA1): 38:B2:45:61:51:72:A8:82:7B:6A:49:FF:45:34:1A:BF:3A:4E:63:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145348 (0x49157e44) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:54:16 2024 Not After : Wed Dec 26 14:54:16 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:1f:21:64:fa:1f:17:2c:70:e9:5a:07:f2:6e:fa:0f: 61:a5:a0:57:03:3d:f0:23:68:bb:cf:ca:a2:24:e2:6a: c7:89:de:d1:cf:32:4f:04:57:b2:6a:2f:98:06:13:cb: 7a:06:80:11:28:75:00:a7:d0:3f:e7:bc:af:50:eb:86: ce:c1:ad:13:41:fc:3c:88:3d:da:cd:3c:4a:92:8b:f7: ec:c5:b4:e6:6a:ef:c0:93:f4:94:35:17:2d:9d:ad:ba: 5b:18:0f:5f:6e:6d:02:44:7b:71:55:96:ae:54:46:29: 41:72:0e:87:37:a8:05:cf:ee:79:59:d5:8c:7a:d5:83: 26:09:0b:33:71:e6:c0:07:77:d1:9e:82:c7:7e:e7:33: 1d:2c:5e:3e:82:2e:77:53:24:d9:37:47:dd:80:b0:b6: f9:81:49:d3:03:fc:3d:8a:73:df:47:64:93:47:19:7b: 42:88:ae:16:9e:d0:87:9a:88:0a:c1:77:df:ef:fa:c5: 74:a9:eb:53:d1:c2:29:23:c9:bb:56:09:2a:59:40:3c: 09:37:32:88:a7:0c:73:b3:00:0f:34:d8:5c:58:bb:ce: 15:a1:0e:8b:d4:a7:7a:c1:1c:68:ee:fb:eb:eb:c9:63: 14:da:8b:71:97:03:89:8d:c6:e2:d7:cf:4b:2b:f8:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:a1:c6:50:43:b8:6f:49:87:b7:d5:6e:9b:56:75:bc: 20:e1:ae:2e:ea:b1:f6:81:3c:32:e8:6a:ea:a5:c6:31: e4:16:37:1b:83:23:a0:e7:4b:22:14:99:f4:57:de:26: 84:b4:70:fd:71:38:68:4f:ff:ff:f1:76:04:f4:60:e3: 4f:0e:76:ae:1a:a5:67:cb:7b:7a:ab:3a:4b:8e:da:8a: e4:6b:a8:f5:cc:c3:e5:35:76:19:91:0c:ae:54:64:99: 6b:f3:87:f3:02:8a:00:11:b5:b3:59:98:a5:09:b9:1a: cc:4f:08:69:f4:e4:38:ff:4e:32:ee:96:a7:1a:3e:24: 02:de:a7:bf:df:ce:1a:9e:31:76:b2:b5:0f:89:ca:ee: f7:54:b6:1c:e7:f4:fd:09:26:ac:c8:47:bd:88:0a:a1: 60:26:3c:46:3f:6f:5e:d9:91:37:52:a3:aa:1b:e4:3e: 3b:e3:18:ea:26:d4:12:da:69:b3:fe:72:f0:ca:ed:24: e4:f9:ba:13:6b:8a:7e:43:d1:8f:c9:3c:c1:8b:b2:71: 5f:14:68:7e:55:3a:97:32:0c:72:dc:53:4f:ff:33:44: 2a:c9:78:c1:cf:ff:9d:66:80:4c:ff:c2:c3:42:c4:06: f3:03:a3:a0:df:e4:77:55:1b:d8:3e:f0:9b:4d:90:41 Fingerprint (SHA-256): BC:51:8F:F6:94:13:B5:59:60:41:C8:2E:51:1F:4A:44:CF:78:D2:0B:29:92:B6:B8:A7:50:AA:EB:D9:6B:F8:D6 Fingerprint (SHA1): 38:B2:45:61:51:72:A8:82:7B:6A:49:FF:45:34:1A:BF:3A:4E:63:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145353 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145354 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145355 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145356 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145357 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145358 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145359 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145360 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145361 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1226145362 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1226145363 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1226145364 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1226145365 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1226145366 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1226145367 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1226145368 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1226145369 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1226145370 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1226145371 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1226145372 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1226145373 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1226145374 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145375 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145353 (0x49157e49) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Thu Dec 26 14:54:21 2024 Not After : Wed Dec 26 14:54:21 2074 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:0a:64:8a:c4:21:24:92:45:2e:bf:de:10:a7:93:72: e9:97:03:70:cb:4f:5e:64:88:1e:5d:eb:78:ea:a2:3c: 8f:19:af:1c:ce:61:e8:13:4a:15:50:aa:d1:03:b8:e0: d1:4f:14:65:77:28:5b:4c:57:1c:17:f0:33:e2:56:97: 70:99:53:71:d8:e1:ae:f6:9c:95:4c:8b:c5:2e:82:80: 59:18:0f:19:6d:b7:54:c5:c9:06:86:fd:39:8d:e7:70: cc:a6:10:ef:07:40:6e:0b:05:6a:cf:94:6e:ab:5f:d1: ad:0d:76:4c:19:48:3a:a5:98:d3:e6:cb:7b:e0:e3:4f: f4:a6:c4:ff:d7:89:5f:19:4d:6a:dd:b4:ed:23:c5:e3: df:ea:f9:31:98:fa:43:16:cb:12:ee:ae:f5:87:2b:34: 0c:2c:5e:45:74:44:87:6e:10:40:e6:b4:d8:03:dc:99: ab:96:4a:ae:08:ea:a9:e7:5b:a0:76:08:d8:e4:6e:30: 06:6f:35:14:7a:78:05:f0:5c:a6:04:ff:bd:e0:a3:0c: fc:20:9b:05:e1:ab:c4:50:1c:19:f9:a6:dc:07:80:f6: c0:61:da:7c:72:07:2c:ab:d3:b2:03:4f:05:bd:01:c3: 33:a7:73:1f:90:25:f8:49:33:9e:5c:dc:5e:b6:fc:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:b1:e1:48:69:d6:00:e9:b9:07:5b:2a:5a:7d:9d:39: 6a:b7:64:76:c4:5b:16:f6:b0:96:9b:e6:f7:dc:00:72: c9:f9:94:f9:53:75:c6:62:64:2d:90:82:a8:b6:e6:c3: f7:24:69:04:04:84:19:5d:eb:c2:86:a5:6f:01:0a:e6: 4c:b6:dd:23:74:81:43:a9:bf:31:60:0f:64:16:a8:68: 03:c1:64:7c:df:98:78:a4:7d:9d:04:08:6c:89:ca:e4: fc:32:b7:e7:38:7e:43:6c:1c:ad:c3:2a:50:7e:41:fc: a8:78:5b:f4:c2:8c:2a:12:d4:03:ff:c7:99:0a:9f:de: 02:19:22:ef:48:77:0c:f8:a7:f6:33:44:5b:05:30:8e: ce:f4:33:c4:6f:b1:14:d7:75:bd:56:4a:09:64:15:8a: 1c:f9:59:f2:14:6c:f9:b7:e4:03:13:a0:67:c1:27:bf: 27:09:d4:1a:7e:f9:b4:d6:83:c0:7b:e5:00:1f:2c:97: 9a:ba:b0:53:77:47:2d:0f:1b:65:78:15:87:80:8a:b4: 6e:ac:d6:3e:ea:50:d7:05:dc:35:c7:71:3a:dc:eb:a0: 8f:e6:a3:27:e8:86:1d:a9:50:c5:76:86:b4:c9:33:92: 5e:da:2c:7f:67:fc:0f:fe:c3:12:04:b6:5f:b0:79:fa Fingerprint (SHA-256): FC:70:8D:36:30:71:EF:36:F5:CA:DF:56:54:DD:D1:FB:2D:50:0A:77:87:77:84:F7:18:8E:0D:9C:98:FD:1F:1A Fingerprint (SHA1): CC:84:F1:41:14:FB:94:01:37:C9:C6:F5:7B:06:B5:17:E7:0B:B1:14 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145354 (0x49157e4a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Thu Dec 26 14:54:22 2024 Not After : Wed Dec 26 14:54:22 2074 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:c3:53:3f:8f:cb:e6:5e:66:81:56:e9:ed:f7:97:0d: ae:6f:66:8c:b9:1c:3a:4c:e1:28:c5:49:77:28:5d:ab: b0:fe:f0:2f:c1:1b:eb:ff:42:5e:00:09:fc:a8:ae:5a: fa:c9:8b:91:e2:2b:0c:a9:f6:5e:10:46:8f:95:92:f3: d2:d7:43:c5:ad:d9:0b:67:a2:a9:c4:91:d0:a3:54:51: 67:53:da:ef:6c:14:b9:3c:99:11:25:35:62:06:e9:06: c7:d4:cb:ef:ef:a0:39:67:94:3d:4e:1f:5a:5f:17:64: 8e:d8:26:94:d2:d7:22:c1:35:61:04:e9:00:14:fa:a7: 98:c4:d4:79:b0:0f:17:eb:f7:09:3f:91:9b:65:13:c7: c2:00:92:37:40:4f:92:ea:8d:b1:4a:2b:2c:96:a8:14: 34:de:c3:f1:3d:a8:e6:7f:4b:04:9c:ac:cf:89:dd:bb: 65:39:f7:b2:92:80:44:88:7d:4d:b3:a7:16:79:4c:02: a1:f5:bb:97:02:b2:ca:be:93:f6:d0:c4:13:be:49:d4: 32:b6:f0:96:db:03:3f:18:cd:73:79:68:30:ef:02:4a: 2b:56:28:56:13:62:b6:53:49:45:6c:cb:2f:01:58:d1: ef:de:e1:6f:7a:25:18:db:c3:5b:42:a6:ff:ba:f3:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:3c:80:8b:af:85:fb:20:84:c3:eb:b4:63:61:c3:ae: c8:1a:aa:c8:b1:54:e5:d3:34:1f:51:e7:0e:1c:34:49: 64:f8:64:4e:9b:33:c3:b0:71:ff:98:78:7a:b9:39:ef: 36:a4:47:b1:f6:96:2f:55:e6:d9:1c:b6:fb:a8:97:dc: b0:13:55:3b:6a:a4:33:5c:69:0d:c6:85:07:ea:1e:d8: 9b:02:fa:f7:f8:29:a5:a2:b8:f5:6b:f3:17:d3:74:63: 52:77:8a:18:62:ef:2c:c0:73:4f:79:e7:73:25:e9:76: 90:58:a4:c0:7e:73:b0:34:a1:0f:34:d9:fa:ca:5c:b1: 59:4f:5f:8e:94:13:52:9f:63:88:b4:69:94:cd:9b:1d: a8:17:65:d9:04:31:e0:1c:bd:50:5d:a7:14:45:0d:3b: 49:f2:0b:3f:81:68:25:76:1b:22:66:6d:d2:22:18:92: 62:4d:fa:88:e6:79:50:39:37:2f:b9:8c:7b:0c:3c:48: 08:30:fc:3d:5d:75:3c:31:19:a2:b9:60:3d:54:4c:b6: b2:f6:62:b3:ff:1a:83:09:81:ce:3e:b0:7a:61:3c:ed: 78:13:b1:09:90:65:de:99:9c:d5:0a:41:2b:72:f6:37: f3:84:68:3d:60:66:0c:c7:55:66:4e:6c:91:e7:fb:10 Fingerprint (SHA-256): EF:7E:75:92:F2:7C:A7:56:8E:B5:38:3B:C6:59:79:78:27:2F:2E:D2:75:08:F9:1D:4E:EA:7C:AE:E3:46:D2:4F Fingerprint (SHA1): 8C:7E:BF:D8:1B:3D:81:A3:08:39:B4:72:31:F6:CD:30:4E:C5:8C:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145355 (0x49157e4b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Thu Dec 26 14:54:23 2024 Not After : Wed Dec 26 14:54:23 2074 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cc:6d:e5:7d:60:71:dd:c0:4e:1b:14:97:e6:46:db: d4:76:70:6b:45:96:d4:d1:fe:24:63:b0:86:fc:4f:7c: f4:97:31:05:92:23:66:0d:4c:49:ef:47:94:55:ea:6c: c9:01:c1:5d:8a:4b:fe:8e:97:53:78:ef:60:21:e8:22: 87:6a:35:48:26:5f:01:8e:30:1e:6d:04:da:9f:31:d1: b8:c4:77:2b:06:ed:18:bc:69:5f:03:bd:5b:b8:f6:76: 99:2c:94:54:a1:e1:41:34:28:83:05:2d:b0:9a:18:08: 70:88:15:c9:1c:98:d6:4f:6f:8c:f1:b9:b9:c8:83:bb: f0:19:41:a0:56:e5:03:cb:38:5e:b3:8a:e2:b4:4f:dd: 73:35:bc:97:5a:70:65:40:b1:ed:21:88:a5:62:6f:cc: e2:b4:48:88:87:24:95:10:36:0a:a0:90:17:22:db:a1: 6f:5b:49:dd:6d:22:d6:b4:0f:f6:54:7f:c6:c4:0c:9b: 57:ec:81:d4:a6:5f:72:9f:c6:e1:92:6d:03:1d:9e:32: 78:a2:01:1e:36:bc:45:55:15:95:6f:c7:be:ee:8e:eb: 16:ee:da:f3:32:a8:48:90:18:e1:e1:53:02:47:9c:cd: 79:00:3e:a9:b7:31:2c:80:69:28:fd:b2:eb:f4:45:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:ef:d3:29:8e:d5:4e:74:b4:cb:98:64:5f:d3:71:23: 91:ce:35:5a:38:2a:87:90:cf:46:af:f3:eb:5f:92:f8: 48:f6:c6:4d:ae:a7:9a:16:d2:22:53:8b:a1:a5:e5:d1: ab:3f:a1:48:c3:8a:97:2f:92:a3:46:0b:62:f7:12:2e: 7a:db:23:a2:59:1e:91:9e:8c:ff:7d:f3:56:26:ec:ed: 99:0b:4a:a4:eb:51:98:08:c5:3f:a9:3c:b5:9f:12:53: 36:6d:f5:52:9f:72:ac:b6:1d:c6:f5:b8:fa:9c:de:42: 2b:a5:c5:8d:46:16:7d:10:74:a8:f7:cb:3c:46:27:ec: ad:ad:db:97:d3:a1:d6:03:09:41:54:00:71:09:a2:6c: 23:58:66:22:6e:72:45:24:38:c3:d1:4b:7b:64:30:c2: c8:77:1c:f9:40:a3:d9:17:4e:b8:51:22:2b:fc:03:eb: 4f:f0:93:94:50:eb:88:6b:c5:4e:69:41:aa:b7:43:d3: 2e:c3:1b:31:21:10:f9:75:20:83:d0:d3:98:10:36:9d: f1:8c:b1:9a:67:69:c5:dc:40:5e:a4:30:d1:b1:86:02: c9:70:e4:f1:ea:62:e8:4b:05:eb:1c:e5:30:da:13:2d: aa:7a:7b:d7:ad:e8:ca:eb:62:4c:5c:d4:13:2f:bd:74 Fingerprint (SHA-256): BF:4D:C1:CD:16:63:E5:70:88:8D:D6:15:8B:E1:0F:F5:5D:F4:C7:F5:0C:C8:C7:ED:02:B4:64:FD:06:0C:B5:D5 Fingerprint (SHA1): 47:58:E8:41:68:C5:64:31:E2:40:71:11:13:EC:7F:71:B8:D5:9A:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145356 (0x49157e4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Thu Dec 26 14:54:24 2024 Not After : Wed Dec 26 14:54:24 2074 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:4e:47:30:e0:68:c1:59:15:6d:ac:05:b9:56:01:82: 00:ee:28:35:64:35:b9:13:c6:90:e1:ab:c1:89:b4:98: 99:62:54:4b:23:f1:f4:31:43:cf:f0:c8:b9:5e:e9:6f: c1:37:4b:76:75:88:15:e2:8d:b2:5c:72:2f:7c:b3:da: d0:7b:77:41:18:35:f4:4d:a2:56:d0:59:6b:7f:7c:db: 3c:ca:9c:19:61:15:53:7e:2a:d1:56:e3:c7:a8:28:2e: 3c:d0:be:14:86:d0:a8:a6:43:6a:8b:b7:62:f2:b1:0c: 09:a1:33:47:71:1a:57:a8:f8:ad:e8:ca:73:15:27:07: d3:b9:0c:08:6b:fd:1e:3b:d6:54:03:44:4b:9d:b8:40: 70:1e:5a:77:ad:30:84:b9:33:88:d9:96:63:6f:80:cf: ff:85:0a:68:61:99:b5:c9:dc:b7:09:25:45:28:58:53: ac:48:e7:da:67:19:27:44:38:b4:5b:b8:16:fe:7d:7c: 29:79:df:ae:83:44:5d:69:f9:b3:3f:50:84:b5:c5:78: ca:73:5a:29:43:bd:65:44:46:e5:2e:74:ac:78:a8:f6: da:cc:0a:72:0c:a6:ab:01:bf:39:af:17:d9:d8:78:5f: 0a:ae:c1:c2:3e:c9:c9:a8:12:a7:1a:0f:f4:b3:5b:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d3:41:87:2f:52:d6:c8:9b:06:8f:04:53:f5:e7:41:12: e1:27:67:51:f8:b6:eb:73:0f:7a:7f:76:55:f9:bf:27: d4:c7:96:94:9c:5b:93:0f:df:8c:16:46:de:a8:1c:56: 9a:a0:3b:9d:45:77:75:6b:ab:31:03:53:9e:ea:b2:00: 2b:69:5c:78:99:c9:79:a5:dc:d3:a5:6f:b9:de:a5:dc: 51:b9:51:5f:f1:8d:2e:d0:2b:24:01:89:3d:f8:50:47: 88:4a:1a:47:5f:b3:a0:91:29:6c:60:47:1f:3c:c3:f9: 45:59:b1:ec:24:52:d6:8f:1e:d9:8c:a1:d7:52:94:f8: 11:35:08:41:06:34:6a:33:b6:25:2e:6a:2d:3e:ad:60: 98:c4:01:3c:9b:68:1a:2d:f4:97:1f:5e:d4:3f:83:25: ae:b8:e9:5e:bf:7d:ce:96:a8:d0:ed:e1:f7:69:9b:f7: f7:38:2f:32:b6:cd:3e:34:2f:6e:f5:69:fe:c5:0a:0a: 51:a4:14:68:81:71:95:ae:79:ff:6c:4f:e9:a9:2a:8e: 71:7a:65:7f:a5:8a:85:67:19:c6:a2:5b:0d:48:1a:ff: cc:19:42:c1:d2:6a:bb:2a:44:1d:9c:bf:c3:6b:6c:1c: 7d:3f:cb:bc:bc:6c:32:53:fc:9e:a1:56:7d:66:f1:83 Fingerprint (SHA-256): AF:7A:17:D2:A7:D7:4D:00:7A:75:7F:F0:E3:DA:7D:5F:7C:25:7A:D7:A4:AB:F2:73:4C:C0:4E:82:D6:A1:DF:BD Fingerprint (SHA1): 97:9F:DB:B6:F8:E5:80:24:AB:32:CF:53:97:7D:4C:D2:D6:45:BD:E3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145357 (0x49157e4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Thu Dec 26 14:54:25 2024 Not After : Wed Dec 26 14:54:25 2074 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:8a:1f:f6:79:07:b7:bc:c5:13:e4:f0:7c:9c:2f:89: f5:d5:93:49:f8:5a:5b:e5:33:32:5d:ba:96:0d:fd:7e: e8:0b:0b:89:1b:f4:74:5b:3c:8e:21:d5:05:62:f1:f7: 40:3b:50:80:5a:61:7d:72:09:99:0b:78:2a:86:b9:60: 8a:c8:2b:eb:4b:6e:45:08:7d:29:c5:01:af:36:9a:a5: 70:81:b5:ec:65:37:8f:2e:75:84:cc:65:03:45:4a:e3: fd:05:d4:65:d1:ac:4a:5f:09:93:a6:97:6e:03:e2:c3: 5b:ee:a9:bf:22:09:f0:ee:3e:a3:39:d3:2b:82:1a:bc: 90:ce:23:c9:2a:76:83:5f:83:4a:5d:7c:04:59:7d:79: 1f:ad:88:bc:b1:43:bc:d1:93:81:e3:0d:d5:1b:d8:74: 95:c7:41:8f:a8:83:d7:a3:4a:2a:bd:20:e8:50:64:5b: bf:d3:79:93:35:91:32:42:15:74:b5:f2:11:51:eb:c8: 49:28:da:d6:76:15:e7:ee:02:15:bb:aa:ad:06:82:9a: 42:78:5f:eb:f4:ca:c7:84:4a:20:82:5c:5d:2b:69:f2: bc:ab:69:58:e5:49:4e:47:fc:61:13:42:ff:df:8c:ba: 90:30:08:c3:b5:bd:0b:db:2e:bd:de:e6:28:81:f9:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:cc:17:e2:cc:81:a1:0f:17:5c:e3:08:67:38:49:5d: 08:b3:34:cf:20:87:46:b1:86:3d:c4:9f:fa:6c:db:6f: ad:fc:93:e3:92:c0:a0:1c:3c:32:43:7e:0f:16:17:a5: de:f5:76:dd:27:47:1b:e1:17:45:cd:7e:97:77:d3:8f: a7:c9:d2:53:d5:af:1d:c5:42:32:1b:5b:23:55:41:45: 50:d4:4e:aa:dd:6c:84:fd:30:e3:13:8b:9d:4d:4b:22: 22:17:57:17:66:b5:2b:c5:7b:93:61:a9:63:6c:d2:df: fe:b0:47:4e:b5:bd:f7:e0:61:0f:45:2e:89:97:d1:17: a0:fb:75:7d:1c:bb:14:05:56:ff:17:84:3e:ab:b9:c9: be:f2:e9:c6:60:e6:e5:21:46:bf:5d:06:c8:3c:77:11: a5:d1:ab:6e:2f:7d:f3:7d:94:93:e2:98:25:3c:bc:cb: f3:0a:00:07:e0:0e:b5:c5:62:b0:4f:e3:38:26:d7:b4: e7:89:99:2a:3a:2a:7d:4d:c0:6e:a9:75:d4:34:37:68: c7:f6:77:60:98:00:26:bf:0d:84:77:aa:69:f8:77:67: f6:c0:35:1c:16:9e:ed:a4:74:64:9d:01:e5:ca:e2:5d: ce:bd:c1:62:73:a0:4f:74:16:dd:8e:fb:a9:d7:27:9f Fingerprint (SHA-256): 4E:73:CA:C0:B4:42:A2:A2:1A:17:8E:85:10:0A:50:55:1D:3C:5C:E0:73:28:6C:91:89:AA:03:7A:36:10:C0:48 Fingerprint (SHA1): 51:3B:60:5A:2C:05:E4:FC:20:4A:D6:37:60:44:32:31:B7:E2:F6:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145358 (0x49157e4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Thu Dec 26 14:54:25 2024 Not After : Wed Dec 26 14:54:25 2074 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:ea:51:e8:41:67:f2:d4:62:5b:7d:3c:af:1e:a9:d6: 18:8d:0a:5a:24:0f:4c:ae:f0:8c:b1:a3:f3:62:69:ef: 18:8b:34:20:68:f2:3f:f2:b5:1b:fd:21:c9:4c:74:3b: e2:1b:50:10:06:b6:de:01:db:36:b6:21:76:90:af:c0: 77:c6:2a:1b:02:89:f2:42:c5:e1:20:9b:70:67:09:fc: 20:9b:e2:99:13:7a:d5:fd:4e:2b:88:60:b4:e8:39:c5: 8d:ee:08:26:f1:63:58:fa:4f:2f:e1:71:f6:5e:c9:fe: e2:8a:1e:03:08:6b:ff:db:1a:3a:3d:06:ce:d4:5f:14: 4c:33:69:34:9d:73:19:0e:6d:2a:e6:6c:8e:45:74:c1: 8f:56:b2:71:93:dc:7e:76:38:ea:35:ed:9f:92:7f:19: f1:95:19:9b:b5:54:04:d7:6e:de:b9:78:2e:43:c5:83: fc:1c:84:0c:d4:db:0b:61:61:e4:78:4f:33:3b:91:77: 74:6f:29:d2:25:f4:61:8b:20:0c:72:b8:c7:c4:01:3d: 83:dd:10:b4:f4:d2:d4:50:6c:b4:9b:8a:6e:b1:6b:bf: 3c:e7:48:24:28:ff:44:38:1b:d3:9f:fa:d1:f4:cd:ac: 1a:c6:e5:16:99:f4:95:83:b5:6b:0c:ad:f9:3e:b6:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:f2:3f:40:8f:85:fc:46:07:31:00:7b:03:70:21:26: 74:2e:79:10:fb:80:5b:2d:66:6b:65:52:b4:53:a5:48: 9f:eb:69:56:b9:33:28:d6:22:a3:04:20:66:82:cc:3d: 8d:35:57:ba:43:36:69:43:9d:34:41:04:09:e2:01:a8: cf:2f:74:2e:04:37:a5:ff:86:54:26:cd:c1:9d:95:a2: de:9e:f6:7a:88:c4:f9:d0:e6:a1:34:c2:4d:bd:b3:db: 03:3f:5c:ef:c0:84:ab:87:82:ae:02:71:a1:0a:d0:cc: 76:54:5b:8e:be:26:84:9d:5c:95:e9:c6:6a:83:3e:ba: 11:ac:c2:b8:d3:43:ba:7a:42:03:11:1b:e6:9d:59:dc: fc:cc:9f:a1:cd:9f:24:fc:4b:bb:25:b0:95:4e:4a:09: 85:1e:79:99:eb:19:c2:67:c3:f1:81:bb:8b:e5:f8:db: 97:16:fb:5c:6b:61:48:29:ca:38:f1:6d:6d:85:4f:b5: 50:f0:67:e7:59:68:26:ff:1e:bf:09:99:e6:ef:5d:ba: 80:23:6d:cc:58:0e:2c:96:df:63:aa:89:71:72:72:8f: 77:b4:28:bd:24:5a:7b:62:63:1f:ac:bd:d7:66:57:87: 72:4e:ae:49:6f:ea:25:00:e2:35:0e:c8:ae:76:57:52 Fingerprint (SHA-256): 8E:64:43:DA:59:E4:BC:D2:6D:53:71:E7:D8:47:D4:CB:D8:78:98:D8:BD:85:F4:81:1D:17:1A:75:05:67:1A:29 Fingerprint (SHA1): BF:9A:4A:C7:4F:0B:62:C4:F7:78:CF:CD:9A:A6:AD:72:C8:0D:44:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145359 (0x49157e4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Thu Dec 26 14:54:27 2024 Not After : Wed Dec 26 14:54:27 2074 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:0e:04:15:b6:f7:d3:6f:1d:2d:6c:3e:e6:6f:bc:a9: a3:7d:9a:40:2f:e2:7d:0d:a5:da:12:4a:60:b7:d1:fe: 37:2c:6a:47:c6:71:fc:22:e6:1e:34:a1:fa:af:61:4e: 8d:67:69:e5:93:2f:98:38:b7:c8:0e:65:f1:cd:c5:14: 0e:9e:bb:64:9d:6c:5d:ab:08:3c:40:69:cf:84:14:b1: 36:9c:55:cf:8a:3f:a1:cd:2d:f4:14:41:30:cb:9b:f0: 15:cf:09:09:ee:71:dd:b9:e9:0f:c6:72:e0:76:19:bb: e0:2f:c7:ce:69:79:ed:4c:84:e0:22:57:61:c6:e7:fa: 3c:c6:5b:ae:2d:e9:25:5f:d5:0a:0a:83:9e:84:cc:da: 31:5e:a7:89:7f:c5:a1:22:a6:b4:0b:33:b9:f6:1b:69: fc:27:da:c9:d9:a7:25:96:1f:99:92:e2:8e:5d:2d:22: 07:45:f0:57:62:01:55:d4:01:f3:70:9b:f7:99:3d:64: 31:03:e8:7d:dd:d3:56:0c:70:f8:b1:fd:b3:2a:8d:69: ff:1b:e7:13:3a:ec:27:32:d5:df:34:67:50:2b:45:4a: 48:43:ae:3a:f7:ca:43:00:fb:5f:fb:34:05:01:e2:31: ef:2e:9e:86:64:2a:7e:6f:4b:00:22:b4:89:9e:e4:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:f8:9d:61:58:fc:06:18:c5:e6:e5:c4:98:55:cb:ae: 45:81:6e:0f:da:06:ac:af:9f:34:64:aa:82:16:c4:54: ed:09:0a:2d:7d:ea:0c:14:7d:6f:ba:15:92:c3:bd:1f: 2e:a2:47:1d:cf:6d:35:41:95:ea:db:02:b5:ac:4a:45: 3c:91:01:57:37:76:f8:8d:7d:da:98:99:f6:f0:71:ff: 64:b5:6c:1c:8f:6b:8b:ab:ca:54:99:68:bd:57:78:c9: b9:64:20:4b:ee:7b:bc:d6:85:18:ff:82:21:38:cb:17: 89:48:07:9d:9d:4a:f1:2b:8f:04:a8:0f:8a:67:8c:64: 31:1f:a2:7e:39:d4:c9:4a:66:55:ae:42:15:7f:80:38: dd:c1:13:f0:4f:a7:4a:be:ed:79:71:4d:eb:7f:24:93: 73:c7:f8:c5:7d:ab:e2:03:d3:7d:a5:a1:a0:e5:3e:37: 33:74:af:b0:8f:79:74:74:6d:1d:bc:38:97:2c:a5:ce: f5:78:cd:d7:12:2b:23:2a:00:d4:fe:d7:18:7b:d2:33: d8:9c:b2:93:22:48:3e:28:69:ae:ea:15:a5:95:2e:ba: 54:5f:20:89:a8:56:9b:09:a6:13:94:2d:43:45:f2:13: d4:b0:33:95:3c:21:0c:d2:f6:a6:60:c5:22:e4:52:7d Fingerprint (SHA-256): 42:FA:4C:C7:17:39:A9:5C:E5:C8:CB:34:EF:12:26:A0:12:EF:F0:08:D9:B9:88:89:3A:EC:DD:FE:30:CF:54:13 Fingerprint (SHA1): B7:C7:6A:1F:2D:0E:55:61:3D:D4:34:32:50:4D:F6:45:E3:5A:0F:F9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145360 (0x49157e50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Thu Dec 26 14:54:27 2024 Not After : Wed Dec 26 14:54:27 2074 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:65:33:15:d8:76:77:71:8d:cf:fe:02:e6:47:a9:91: c0:bd:0a:59:93:3a:df:39:5c:47:b9:d9:d3:43:26:b9: 33:2c:6c:c8:0d:ee:49:9e:68:62:0f:92:55:58:8e:1f: cb:a1:be:81:70:96:48:3d:c5:3e:52:86:6e:52:14:c7: 7c:d2:69:4d:08:54:a8:ac:32:2a:e4:11:b4:8d:2d:3a: 0f:8f:82:72:86:b0:e7:2a:bd:c5:f6:41:49:ac:45:f7: 94:3c:b7:fe:c4:83:34:86:b0:10:97:8f:01:1a:02:1a: d9:64:c1:9e:af:14:2e:c5:f2:56:11:aa:0b:18:67:2c: 87:bb:ea:a8:e8:f2:f3:35:cd:c5:21:58:f9:07:54:b0: a0:2a:98:5b:82:ce:de:52:fe:a6:4f:b0:26:7a:2c:15: 42:57:b3:e7:49:cc:07:1b:2a:99:36:d0:35:32:9f:59: 70:1c:82:c8:12:cd:98:62:08:16:de:fe:b6:78:93:91: d5:0f:eb:cd:91:4c:a9:04:b7:6b:4a:6c:b8:b0:46:e9: 79:c0:b0:5d:c3:de:e7:0b:fc:51:18:53:35:7e:d3:c0: d3:6e:4d:e6:8c:ce:5d:7b:ce:7d:96:58:e9:8d:f8:bc: 27:cd:92:c7:b7:f2:6d:15:8e:4c:c8:3f:3f:a4:21:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:99:0a:67:a6:5e:01:dd:d5:3e:bc:5e:c0:ce:2b:f6: 60:68:77:fa:d0:82:22:1c:6f:c1:eb:ff:32:76:84:d1: 7e:f3:bc:7a:36:55:31:ad:8a:1c:13:2e:e6:75:50:ea: 99:ba:d9:d1:eb:ba:d5:fc:6e:2d:e7:62:74:ee:ea:26: 0c:b9:8f:13:80:2c:da:1c:81:80:62:a8:b4:17:3b:f7: 64:96:d5:f1:91:62:bf:c9:ce:50:72:ce:ec:15:fc:40: fd:de:12:d0:7b:98:05:33:17:d0:60:eb:78:0b:5d:eb: 49:2b:44:4c:85:d6:6f:e3:95:5b:3a:b4:1b:00:52:aa: 25:f0:4b:0e:7f:09:2a:81:44:81:42:d9:87:a5:63:fd: 7b:f8:05:15:0a:41:c3:45:57:8b:9d:70:cd:8c:84:df: bd:cb:31:e5:ec:6b:a0:d4:72:d5:2e:53:6a:35:19:9d: ca:44:e4:e3:37:e8:25:a3:e2:00:f5:1d:96:55:54:96: 92:9f:7d:58:b9:7a:f7:1b:dd:a0:f7:be:41:95:98:8f: 3d:a5:48:e3:70:c4:25:85:59:a4:1e:8a:62:94:4a:53: 0f:04:02:8c:53:43:61:bc:bb:f3:a0:b3:3f:1d:26:8f: 9c:5d:7b:66:29:d0:8e:07:ee:e0:f3:c6:03:eb:0a:96 Fingerprint (SHA-256): F0:3C:50:FF:15:3A:F4:4E:40:F9:7C:17:B2:4B:A1:5F:45:44:76:89:08:C6:E4:95:FD:42:17:D1:69:A2:10:C9 Fingerprint (SHA1): E1:E2:3A:78:4A:79:B7:8C:7F:09:EE:95:42:E8:7B:DF:A2:9E:FD:49 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145361 (0x49157e51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Thu Dec 26 14:54:28 2024 Not After : Wed Dec 26 14:54:28 2074 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:56:b1:10:53:b7:61:6d:4a:2e:70:a0:b8:32:90:e1: 77:0f:90:9c:68:cb:17:89:4a:47:e9:6e:40:23:96:9c: da:83:3c:ce:cc:61:cf:6c:64:1d:7a:53:60:69:39:b7: 20:1d:c3:40:13:9a:31:1e:3b:21:d5:11:95:22:7f:14: fd:50:39:3b:89:f4:d4:fc:6a:53:0a:72:08:07:63:28: 74:f0:7e:45:a3:6b:c1:35:7d:d0:1c:26:e0:aa:a4:fa: c5:4e:d5:01:a7:76:2b:9a:13:da:01:9b:46:9e:1e:a9: 0b:5c:60:f7:4a:f3:9b:88:b4:e7:5e:32:6c:36:1b:1e: 4e:73:66:c6:80:b1:b3:49:a3:f9:bc:e8:0b:6a:76:60: 4d:4e:66:01:b9:f0:52:f2:23:3e:98:6a:44:13:22:2b: b1:d0:a6:d7:7b:a1:a1:5f:83:88:14:5a:bf:42:69:56: 81:dd:b2:8f:95:6d:18:26:a6:9e:55:4b:da:44:ab:31: f2:5d:8d:1d:9a:c2:df:66:07:22:39:bf:1b:39:39:77: 8a:5b:55:a0:eb:e2:76:66:6a:c3:bd:8e:d7:3a:bb:76: 52:34:e3:e8:94:9c:b4:92:d6:3e:97:20:90:03:68:8f: e3:22:28:39:9b:33:f4:bb:94:ac:8e:e5:1f:61:47:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:09:a2:9e:da:88:7d:8a:dc:58:f7:ae:2e:61:74:ad: db:77:96:71:af:44:e9:4b:7f:0e:c0:cb:ca:61:e6:ee: 26:74:c0:a7:1a:9b:27:08:ae:bd:8b:e8:4d:0a:06:4a: 61:e7:5b:a7:ff:82:52:b0:7a:52:3c:cf:ff:64:42:b5: 8a:7e:fb:a4:73:d0:64:ac:c5:5e:e4:99:da:79:bb:a1: 23:c4:4e:46:aa:e6:10:b5:bd:fd:da:9f:61:9c:3f:75: 2a:78:7a:79:e6:17:2c:ff:3d:39:5c:32:e8:ba:c9:82: 4d:06:5e:e2:e0:db:40:94:df:79:9e:c0:62:e2:7f:21: fd:6c:e0:54:73:a8:f0:5a:0e:a4:fa:e6:83:a5:6d:78: a6:63:c1:32:56:c1:01:ba:6d:70:a6:7c:eb:ec:85:05: ce:69:ed:96:12:30:eb:f8:99:d2:c4:e9:ac:81:41:eb: 6f:6f:6c:a6:fd:01:f5:c5:7d:91:dc:6f:92:3f:98:93: ad:a9:17:97:7c:a4:f5:2f:cb:72:a7:a8:09:d3:37:f8: 71:19:4e:2a:68:58:32:93:59:e7:fc:ce:1d:e1:2f:b1: 2c:a0:d7:9b:59:26:43:cc:83:8a:0b:95:56:1d:e9:2a: e8:91:a5:08:9b:16:0d:a0:2f:53:d1:4b:ff:fb:32:49 Fingerprint (SHA-256): C7:72:B4:F7:5B:1E:F1:7F:8A:7B:65:EB:5D:23:D4:26:7D:0F:65:B5:B7:6B:61:B0:3E:C8:85:76:85:9A:84:40 Fingerprint (SHA1): DE:53:C9:62:C0:1F:94:9C:DE:29:DD:6A:36:B5:98:58:BD:EB:BF:E2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145376 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145377 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145378 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145379 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145376 (0x49157e60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:36 2024 Not After : Wed Dec 26 14:54:36 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:e4:2b:d0:90:9e:ee:4f:e7:27:38:61:ca:62:ae:a8: d4:c9:77:16:21:c9:3b:c2:82:1c:a3:10:c3:77:fc:5c: 0d:62:b1:f6:d5:b3:d1:e4:50:39:9b:ee:86:1a:46:b3: a5:2c:05:98:cd:93:3d:28:31:0d:28:e0:af:28:26:09: 39:74:06:96:7e:44:fc:ae:a2:f4:2c:af:f8:cd:ff:c4: 29:fe:97:8e:f7:af:be:bb:39:94:28:8a:83:b8:83:a3: 06:3d:89:2b:ce:e1:b2:82:a8:22:e7:8a:8f:a5:e6:31: d1:65:42:43:a1:e9:90:6b:df:46:bf:39:44:15:b2:4f: 9e:0a:62:53:01:8b:1c:e6:08:39:01:0d:20:4d:d0:78: 2a:2e:74:b4:d0:b6:63:5d:05:2e:48:bb:c6:ff:b3:37: 00:13:9c:73:0d:65:d6:80:92:9e:94:cc:0c:e0:b7:9f: 98:4c:67:10:6c:d9:f5:2a:2d:ef:2a:1c:54:36:05:dc: c8:23:ef:a7:53:76:4b:53:bc:49:29:25:69:e8:3a:15: 86:8d:f7:6c:36:9a:d3:85:88:08:a2:39:57:d9:bf:18: 88:dc:f8:1d:ec:c7:98:a9:33:21:a0:a1:72:5a:5d:4a: 4f:0f:e7:7e:6f:f2:64:03:34:5c:0f:fd:04:68:81:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:bf:db:11:f6:78:39:35:a6:b6:40:1e:77:a6:81:1f: 7c:77:e4:eb:5b:24:1f:7d:e0:cd:f8:d1:1d:67:7e:ab: 1f:e6:43:d1:cf:3e:db:57:04:44:00:fa:5b:37:d1:ef: 66:d7:f1:cf:1a:0b:06:d5:b8:b3:e6:3a:fb:66:81:38: f4:00:8d:b5:c7:27:a1:74:72:3a:b2:30:3e:3e:89:a0: 20:f4:a7:29:c9:da:76:2d:2f:6a:2f:45:0a:e5:69:a1: f2:be:a6:f4:1d:5f:b9:77:c6:4b:27:3b:02:e1:d9:7f: 36:dd:21:e9:81:90:fb:78:a7:e6:da:2e:16:2a:b1:4d: 84:5c:ef:d8:90:f3:9b:c6:30:2c:46:83:e4:81:3f:91: 55:88:82:03:35:2c:9a:2a:7a:ee:81:ad:b0:55:33:d9: 4a:a5:fe:61:17:91:d8:25:96:d8:68:c4:0d:83:df:36: 53:13:81:e5:ff:91:1a:e1:c3:65:af:57:d1:96:bb:84: ac:fc:44:3a:5d:4f:c0:46:5b:de:d1:e4:a6:e1:f9:37: 52:ad:fb:f6:aa:90:e7:12:6f:03:d4:aa:48:0b:ed:cd: 9f:a6:4e:1b:0c:8d:f9:0b:9b:59:52:cf:5b:a9:eb:27: b1:5f:88:00:89:84:6f:10:36:e5:40:b7:9e:e8:9b:a7 Fingerprint (SHA-256): 5B:72:98:02:38:01:6D:2E:D7:26:61:0D:14:5C:A3:F1:A0:D1:BF:3B:C6:74:75:C4:CD:CF:4D:61:B4:99:F1:74 Fingerprint (SHA1): DC:6D:8C:D6:4C:91:44:BB:3A:C1:2F:89:08:A7:51:08:32:C0:ED:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145377 (0x49157e61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:37 2024 Not After : Wed Dec 26 14:54:37 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:ef:23:9d:41:f3:23:36:e1:42:61:db:50:52:9e:22: 08:87:cd:9c:70:54:e3:3c:6e:be:cc:33:ed:90:30:5d: 25:41:2c:d2:bd:26:f6:fc:7e:d8:4c:02:a8:b1:a4:65: 1d:c5:07:c5:72:c7:ae:a5:c7:28:11:ef:87:45:e5:4d: cc:37:90:ff:d0:fc:a6:ea:e1:38:ee:f1:e0:b9:9e:ba: ce:f1:f7:fe:d3:79:7b:23:66:a8:fb:14:16:38:56:76: 26:1d:19:18:43:58:74:eb:4b:2e:ee:dc:6e:73:f2:51: 8b:fe:5f:bf:17:48:10:ed:19:1c:53:5a:21:e4:d5:bd: c0:76:4e:c7:17:22:92:51:c6:6c:66:c0:d0:ee:bc:5b: ca:e8:27:e3:93:06:75:fe:d1:0f:40:99:92:bd:c0:b4: 73:ca:5d:5f:35:22:76:3a:7d:5b:46:c9:2f:84:ff:ed: 45:36:5c:c3:43:d5:8f:bf:3a:c3:cc:7b:d7:7c:a2:dd: ae:c2:0c:e5:fd:49:34:32:5d:b5:24:e1:7f:9c:bb:c4: cd:f3:c7:2a:79:31:74:4b:34:8b:91:04:b3:8c:bf:dd: 1f:cf:f0:43:52:54:3d:62:0f:7e:8f:15:db:52:7c:51: 04:47:43:c4:f7:1a:d5:50:ae:0e:36:54:97:96:71:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:81:f3:71:79:60:b5:31:09:cb:b1:95:78:02:2b:76: 96:b7:3e:07:ba:54:67:0d:0d:bc:77:50:8c:09:32:39: 83:81:76:f7:b7:c8:05:9c:d0:6b:10:1c:fb:f3:0a:12: 17:63:ce:3f:e9:c3:b0:cf:79:f3:3f:ec:de:98:7d:55: 06:67:e9:11:e8:a8:aa:df:d0:a8:3d:e2:ec:57:5b:52: 34:65:c0:cc:10:bf:77:2e:90:11:08:fd:73:a7:19:aa: bc:92:6a:58:7b:5a:13:38:72:31:c1:10:27:3b:52:85: a6:d9:ee:04:3d:11:ad:3a:64:42:74:73:7b:55:78:00: 63:87:ca:1f:c3:57:4d:2d:a0:66:4e:9f:36:ec:06:f7: fc:bb:8a:6a:50:13:4f:f6:17:a4:73:9d:b5:7d:da:ea: 1f:0f:50:d7:eb:63:bf:ad:9d:a9:b8:2d:de:0f:25:b1: e8:37:dc:7f:0e:6f:12:56:52:0f:84:67:e7:4f:93:42: d9:de:f6:11:a2:96:1a:bc:08:b8:e1:c0:9b:8d:ea:a0: 78:1b:cc:19:89:50:97:0f:d3:d7:66:12:a2:3d:82:bf: 31:40:a1:48:b6:7b:b4:5c:1d:26:f6:51:ef:9d:7b:d4: 3a:4d:49:fd:a7:23:9a:e0:ef:bf:2c:51:5e:25:ca:73 Fingerprint (SHA-256): 26:6D:F0:E6:53:94:DD:73:FC:38:C1:E8:AB:1D:52:B2:7E:2F:44:4E:AC:19:63:47:60:A8:00:8E:2E:5B:40:67 Fingerprint (SHA1): 7A:BF:27:0E:B6:30:6F:B4:2B:34:F8:CE:6B:C3:24:FA:43:39:86:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145378 (0x49157e62) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:54:38 2024 Not After : Wed Dec 26 14:54:38 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:c0:38:ea:59:b9:f0:36:a2:53:8f:62:2e:44:f7:0d: 01:96:00:a9:ae:34:7f:f5:43:01:67:9e:be:c6:5f:fa: d0:59:d1:70:39:24:7d:02:51:d1:e6:6c:d8:67:7f:52: 0b:aa:db:8b:57:82:1e:dc:63:01:51:2e:80:08:6b:4c: 45:e7:bc:ee:13:f4:68:18:93:7d:c8:ec:70:3c:2d:87: 46:08:5e:1f:7b:92:19:56:89:b6:cd:29:c8:f8:a3:fe: e7:c6:e3:53:9c:34:81:18:ef:c2:d3:a5:eb:be:0c:a9: 63:80:ee:9a:96:7e:e9:b9:5f:d0:ef:45:c8:2a:e5:34: 1e:f9:14:1a:ef:bc:a1:52:d8:4e:f0:3c:68:86:37:5f: cf:b8:17:e2:94:8e:88:a9:d8:d3:ef:fa:ba:87:06:70: 27:ae:83:56:cb:67:7e:b1:a5:05:8f:28:5a:ba:38:2d: 63:a2:14:d7:74:05:1b:43:f8:5e:ed:22:3d:28:3f:b8: 97:6a:1e:9d:61:a7:39:47:2c:ae:ef:4e:b3:5e:09:eb: d2:64:c2:44:70:3a:dd:fd:0d:9d:da:95:c9:96:4c:2c: 49:b0:9f:ad:37:85:b6:3f:55:67:fe:28:e0:35:7e:67: 11:f3:f8:04:03:d6:32:4f:37:39:eb:60:ba:4b:fc:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:7f:ba:49:2a:81:67:2d:cc:9e:f4:c3:89:db:25:1b: c9:41:13:23:a2:30:19:2d:d3:59:9e:bb:46:62:9d:ec: 9b:14:9e:52:1e:b2:c0:86:e6:0a:94:9a:60:a5:42:18: e2:9f:fd:d0:dd:85:ba:71:4f:d5:76:93:42:f5:3c:51: 64:df:9e:25:eb:14:db:0e:18:10:3a:36:78:49:e5:42: 35:1d:0c:c9:1d:a5:0d:d9:45:a4:b9:31:f5:db:82:b1: 6f:eb:50:37:cb:8b:36:2e:c3:ba:03:83:8a:20:79:ed: d9:04:be:10:55:19:cd:45:35:c8:fe:46:3f:eb:9e:51: 68:14:0e:78:85:39:dd:1a:33:3e:68:86:4c:25:b9:d6: e7:7d:5d:9f:30:5d:25:89:b4:4c:82:cb:0d:54:83:c7: 57:73:60:e0:80:97:43:2d:d5:4a:2d:7b:46:dc:2a:50: f6:b4:56:4c:79:5d:bd:e9:86:92:58:f6:21:d6:19:1f: 88:f9:47:69:c0:1e:b9:64:2f:c3:1e:6c:ce:19:97:67: a2:3f:5a:fe:f8:2d:bb:a5:26:19:69:24:39:41:ec:a2: 7a:03:12:d3:af:a7:01:a9:59:74:1c:3b:64:13:40:bd: 5a:c6:d0:76:73:80:04:d7:ca:95:c9:89:ba:9f:ac:37 Fingerprint (SHA-256): C5:D0:F4:32:E0:96:82:29:63:59:2E:F0:C7:22:73:14:A5:AF:AB:EE:5C:11:14:FB:46:FE:66:66:CC:E0:DD:0E Fingerprint (SHA1): 9B:9B:01:F3:04:10:0B:91:53:D7:20:41:09:39:F5:9A:28:6E:39:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145376 (0x49157e60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:36 2024 Not After : Wed Dec 26 14:54:36 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:e4:2b:d0:90:9e:ee:4f:e7:27:38:61:ca:62:ae:a8: d4:c9:77:16:21:c9:3b:c2:82:1c:a3:10:c3:77:fc:5c: 0d:62:b1:f6:d5:b3:d1:e4:50:39:9b:ee:86:1a:46:b3: a5:2c:05:98:cd:93:3d:28:31:0d:28:e0:af:28:26:09: 39:74:06:96:7e:44:fc:ae:a2:f4:2c:af:f8:cd:ff:c4: 29:fe:97:8e:f7:af:be:bb:39:94:28:8a:83:b8:83:a3: 06:3d:89:2b:ce:e1:b2:82:a8:22:e7:8a:8f:a5:e6:31: d1:65:42:43:a1:e9:90:6b:df:46:bf:39:44:15:b2:4f: 9e:0a:62:53:01:8b:1c:e6:08:39:01:0d:20:4d:d0:78: 2a:2e:74:b4:d0:b6:63:5d:05:2e:48:bb:c6:ff:b3:37: 00:13:9c:73:0d:65:d6:80:92:9e:94:cc:0c:e0:b7:9f: 98:4c:67:10:6c:d9:f5:2a:2d:ef:2a:1c:54:36:05:dc: c8:23:ef:a7:53:76:4b:53:bc:49:29:25:69:e8:3a:15: 86:8d:f7:6c:36:9a:d3:85:88:08:a2:39:57:d9:bf:18: 88:dc:f8:1d:ec:c7:98:a9:33:21:a0:a1:72:5a:5d:4a: 4f:0f:e7:7e:6f:f2:64:03:34:5c:0f:fd:04:68:81:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:bf:db:11:f6:78:39:35:a6:b6:40:1e:77:a6:81:1f: 7c:77:e4:eb:5b:24:1f:7d:e0:cd:f8:d1:1d:67:7e:ab: 1f:e6:43:d1:cf:3e:db:57:04:44:00:fa:5b:37:d1:ef: 66:d7:f1:cf:1a:0b:06:d5:b8:b3:e6:3a:fb:66:81:38: f4:00:8d:b5:c7:27:a1:74:72:3a:b2:30:3e:3e:89:a0: 20:f4:a7:29:c9:da:76:2d:2f:6a:2f:45:0a:e5:69:a1: f2:be:a6:f4:1d:5f:b9:77:c6:4b:27:3b:02:e1:d9:7f: 36:dd:21:e9:81:90:fb:78:a7:e6:da:2e:16:2a:b1:4d: 84:5c:ef:d8:90:f3:9b:c6:30:2c:46:83:e4:81:3f:91: 55:88:82:03:35:2c:9a:2a:7a:ee:81:ad:b0:55:33:d9: 4a:a5:fe:61:17:91:d8:25:96:d8:68:c4:0d:83:df:36: 53:13:81:e5:ff:91:1a:e1:c3:65:af:57:d1:96:bb:84: ac:fc:44:3a:5d:4f:c0:46:5b:de:d1:e4:a6:e1:f9:37: 52:ad:fb:f6:aa:90:e7:12:6f:03:d4:aa:48:0b:ed:cd: 9f:a6:4e:1b:0c:8d:f9:0b:9b:59:52:cf:5b:a9:eb:27: b1:5f:88:00:89:84:6f:10:36:e5:40:b7:9e:e8:9b:a7 Fingerprint (SHA-256): 5B:72:98:02:38:01:6D:2E:D7:26:61:0D:14:5C:A3:F1:A0:D1:BF:3B:C6:74:75:C4:CD:CF:4D:61:B4:99:F1:74 Fingerprint (SHA1): DC:6D:8C:D6:4C:91:44:BB:3A:C1:2F:89:08:A7:51:08:32:C0:ED:73 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145377 (0x49157e61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:37 2024 Not After : Wed Dec 26 14:54:37 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:ef:23:9d:41:f3:23:36:e1:42:61:db:50:52:9e:22: 08:87:cd:9c:70:54:e3:3c:6e:be:cc:33:ed:90:30:5d: 25:41:2c:d2:bd:26:f6:fc:7e:d8:4c:02:a8:b1:a4:65: 1d:c5:07:c5:72:c7:ae:a5:c7:28:11:ef:87:45:e5:4d: cc:37:90:ff:d0:fc:a6:ea:e1:38:ee:f1:e0:b9:9e:ba: ce:f1:f7:fe:d3:79:7b:23:66:a8:fb:14:16:38:56:76: 26:1d:19:18:43:58:74:eb:4b:2e:ee:dc:6e:73:f2:51: 8b:fe:5f:bf:17:48:10:ed:19:1c:53:5a:21:e4:d5:bd: c0:76:4e:c7:17:22:92:51:c6:6c:66:c0:d0:ee:bc:5b: ca:e8:27:e3:93:06:75:fe:d1:0f:40:99:92:bd:c0:b4: 73:ca:5d:5f:35:22:76:3a:7d:5b:46:c9:2f:84:ff:ed: 45:36:5c:c3:43:d5:8f:bf:3a:c3:cc:7b:d7:7c:a2:dd: ae:c2:0c:e5:fd:49:34:32:5d:b5:24:e1:7f:9c:bb:c4: cd:f3:c7:2a:79:31:74:4b:34:8b:91:04:b3:8c:bf:dd: 1f:cf:f0:43:52:54:3d:62:0f:7e:8f:15:db:52:7c:51: 04:47:43:c4:f7:1a:d5:50:ae:0e:36:54:97:96:71:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:81:f3:71:79:60:b5:31:09:cb:b1:95:78:02:2b:76: 96:b7:3e:07:ba:54:67:0d:0d:bc:77:50:8c:09:32:39: 83:81:76:f7:b7:c8:05:9c:d0:6b:10:1c:fb:f3:0a:12: 17:63:ce:3f:e9:c3:b0:cf:79:f3:3f:ec:de:98:7d:55: 06:67:e9:11:e8:a8:aa:df:d0:a8:3d:e2:ec:57:5b:52: 34:65:c0:cc:10:bf:77:2e:90:11:08:fd:73:a7:19:aa: bc:92:6a:58:7b:5a:13:38:72:31:c1:10:27:3b:52:85: a6:d9:ee:04:3d:11:ad:3a:64:42:74:73:7b:55:78:00: 63:87:ca:1f:c3:57:4d:2d:a0:66:4e:9f:36:ec:06:f7: fc:bb:8a:6a:50:13:4f:f6:17:a4:73:9d:b5:7d:da:ea: 1f:0f:50:d7:eb:63:bf:ad:9d:a9:b8:2d:de:0f:25:b1: e8:37:dc:7f:0e:6f:12:56:52:0f:84:67:e7:4f:93:42: d9:de:f6:11:a2:96:1a:bc:08:b8:e1:c0:9b:8d:ea:a0: 78:1b:cc:19:89:50:97:0f:d3:d7:66:12:a2:3d:82:bf: 31:40:a1:48:b6:7b:b4:5c:1d:26:f6:51:ef:9d:7b:d4: 3a:4d:49:fd:a7:23:9a:e0:ef:bf:2c:51:5e:25:ca:73 Fingerprint (SHA-256): 26:6D:F0:E6:53:94:DD:73:FC:38:C1:E8:AB:1D:52:B2:7E:2F:44:4E:AC:19:63:47:60:A8:00:8E:2E:5B:40:67 Fingerprint (SHA1): 7A:BF:27:0E:B6:30:6F:B4:2B:34:F8:CE:6B:C3:24:FA:43:39:86:D2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145378 (0x49157e62) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:54:38 2024 Not After : Wed Dec 26 14:54:38 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:c0:38:ea:59:b9:f0:36:a2:53:8f:62:2e:44:f7:0d: 01:96:00:a9:ae:34:7f:f5:43:01:67:9e:be:c6:5f:fa: d0:59:d1:70:39:24:7d:02:51:d1:e6:6c:d8:67:7f:52: 0b:aa:db:8b:57:82:1e:dc:63:01:51:2e:80:08:6b:4c: 45:e7:bc:ee:13:f4:68:18:93:7d:c8:ec:70:3c:2d:87: 46:08:5e:1f:7b:92:19:56:89:b6:cd:29:c8:f8:a3:fe: e7:c6:e3:53:9c:34:81:18:ef:c2:d3:a5:eb:be:0c:a9: 63:80:ee:9a:96:7e:e9:b9:5f:d0:ef:45:c8:2a:e5:34: 1e:f9:14:1a:ef:bc:a1:52:d8:4e:f0:3c:68:86:37:5f: cf:b8:17:e2:94:8e:88:a9:d8:d3:ef:fa:ba:87:06:70: 27:ae:83:56:cb:67:7e:b1:a5:05:8f:28:5a:ba:38:2d: 63:a2:14:d7:74:05:1b:43:f8:5e:ed:22:3d:28:3f:b8: 97:6a:1e:9d:61:a7:39:47:2c:ae:ef:4e:b3:5e:09:eb: d2:64:c2:44:70:3a:dd:fd:0d:9d:da:95:c9:96:4c:2c: 49:b0:9f:ad:37:85:b6:3f:55:67:fe:28:e0:35:7e:67: 11:f3:f8:04:03:d6:32:4f:37:39:eb:60:ba:4b:fc:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:7f:ba:49:2a:81:67:2d:cc:9e:f4:c3:89:db:25:1b: c9:41:13:23:a2:30:19:2d:d3:59:9e:bb:46:62:9d:ec: 9b:14:9e:52:1e:b2:c0:86:e6:0a:94:9a:60:a5:42:18: e2:9f:fd:d0:dd:85:ba:71:4f:d5:76:93:42:f5:3c:51: 64:df:9e:25:eb:14:db:0e:18:10:3a:36:78:49:e5:42: 35:1d:0c:c9:1d:a5:0d:d9:45:a4:b9:31:f5:db:82:b1: 6f:eb:50:37:cb:8b:36:2e:c3:ba:03:83:8a:20:79:ed: d9:04:be:10:55:19:cd:45:35:c8:fe:46:3f:eb:9e:51: 68:14:0e:78:85:39:dd:1a:33:3e:68:86:4c:25:b9:d6: e7:7d:5d:9f:30:5d:25:89:b4:4c:82:cb:0d:54:83:c7: 57:73:60:e0:80:97:43:2d:d5:4a:2d:7b:46:dc:2a:50: f6:b4:56:4c:79:5d:bd:e9:86:92:58:f6:21:d6:19:1f: 88:f9:47:69:c0:1e:b9:64:2f:c3:1e:6c:ce:19:97:67: a2:3f:5a:fe:f8:2d:bb:a5:26:19:69:24:39:41:ec:a2: 7a:03:12:d3:af:a7:01:a9:59:74:1c:3b:64:13:40:bd: 5a:c6:d0:76:73:80:04:d7:ca:95:c9:89:ba:9f:ac:37 Fingerprint (SHA-256): C5:D0:F4:32:E0:96:82:29:63:59:2E:F0:C7:22:73:14:A5:AF:AB:EE:5C:11:14:FB:46:FE:66:66:CC:E0:DD:0E Fingerprint (SHA1): 9B:9B:01:F3:04:10:0B:91:53:D7:20:41:09:39:F5:9A:28:6E:39:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145380 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145381 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145382 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145383 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145384 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145380 (0x49157e64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:40 2024 Not After : Wed Dec 26 14:54:40 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:22:b6:d2:26:b5:20:32:e3:02:93:6a:39:6c:09:04: ec:65:9a:8b:5f:79:e4:ce:80:69:1f:2e:aa:37:fc:55: 5f:ed:c3:2d:b7:dd:c2:a3:81:23:3a:a4:e1:ff:ec:22: 43:3e:a7:31:9f:79:86:9a:af:ea:81:7d:90:06:dc:db: 9a:cb:52:db:f4:4a:07:00:ca:cd:7a:83:c5:1a:39:6d: 07:aa:47:33:48:68:7b:da:07:d0:38:b7:8f:89:93:85: 14:50:07:bb:2e:6d:e4:59:f5:3f:c8:a2:07:b3:d7:1f: 3e:bb:ef:8a:e8:a6:40:f4:aa:9e:30:2e:2c:45:f4:21: b4:7e:b8:3f:b7:60:4b:a0:08:1e:38:d4:b3:49:4c:1a: 32:da:f6:70:4b:a8:86:41:ec:c5:27:16:ee:b7:4d:71: 75:20:ce:53:53:54:e6:fc:6f:70:2f:ed:73:88:63:da: 2c:bb:bd:ed:73:a8:27:73:2f:d6:97:07:75:91:bd:8a: 30:d1:3e:1c:5f:41:4e:ec:54:e1:2d:d1:ca:28:e7:26: 5d:ea:a1:4d:b6:a0:60:6e:30:9b:2a:d3:23:e6:83:8f: 62:1b:07:54:12:b7:29:c7:7d:3f:d7:0f:a8:b6:6a:10: 97:27:2a:b8:7d:ae:15:79:cd:05:07:09:84:05:12:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:a3:c3:03:90:aa:85:8d:0b:56:72:94:f4:d4:f3:03: c7:8f:43:a6:92:f1:dc:8f:c6:38:b9:d4:be:da:12:f4: 15:eb:ad:99:c8:50:72:66:35:2a:e6:8c:83:51:18:08: db:ca:b4:f5:45:b9:17:fb:16:37:48:ce:4e:e0:c5:ac: 64:7d:22:a9:e1:0d:7c:9b:18:9b:d3:94:41:49:1c:4c: ba:ee:d6:2b:64:93:ae:6c:28:a3:75:5b:7a:02:ea:19: 9e:ea:4d:00:82:a6:19:c4:6d:f0:28:71:ad:78:bb:d6: d7:f2:92:d2:09:94:3e:6b:a3:ba:6e:24:28:e6:b8:3b: 88:9b:c7:7e:d0:32:75:f9:52:4e:54:1d:f1:c1:0d:c1: 6b:b5:09:48:f1:08:4c:9a:a8:b8:84:70:64:d5:35:a7: 07:60:09:b0:21:ff:eb:07:64:32:08:ea:5c:52:ea:4e: ad:68:3c:c1:55:4e:b9:c6:1a:e4:6e:9c:56:e0:fa:54: c2:45:8b:75:00:63:e7:00:38:6e:5b:76:27:3a:77:50: 70:67:11:05:a4:b8:f1:48:00:a6:84:b1:6a:a2:74:da: ed:ee:91:bc:72:77:81:e9:80:18:23:34:94:82:44:6e: 38:25:d2:b2:b8:97:99:bb:42:12:32:8e:3a:36:29:66 Fingerprint (SHA-256): 30:36:51:43:9A:35:C5:A2:21:BA:4F:35:DD:3E:63:76:4D:A7:88:73:99:03:9F:01:87:50:B5:2F:50:F6:C0:2D Fingerprint (SHA1): 53:F4:FF:1D:4F:91:88:CC:CE:BA:0E:58:90:D3:79:60:21:85:3F:BC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145381 (0x49157e65) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:41 2024 Not After : Wed Dec 26 14:54:41 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:ec:41:1b:e5:70:5d:9a:13:ff:40:0e:63:84:19:f4: e6:df:5b:4c:0e:20:f8:00:37:06:bd:90:d6:df:08:14: f9:cc:0b:f2:a3:e0:03:48:0f:6a:71:a4:43:58:82:57: 5e:17:33:82:e2:69:d5:2d:02:3a:89:e9:5b:7d:6b:71: 23:ac:63:9e:d5:1e:33:60:43:f8:bd:61:40:0d:e6:34: e6:9c:15:73:a4:0c:b4:a4:de:a3:33:27:3a:2f:cc:70: 2c:31:02:c4:b1:61:6b:b1:02:74:bf:b8:89:58:94:f5: 5c:0e:2a:51:14:ee:38:5c:4b:ed:af:9c:9d:17:ec:b8: 50:e2:da:b8:7d:19:80:9b:40:52:03:c1:61:6d:6a:bc: 15:1a:ab:99:c5:8d:ac:7e:9b:0f:80:30:11:1f:5d:30: 9a:79:f5:50:37:7d:33:cd:fe:1a:83:a5:e0:a6:89:13: 59:97:82:69:d8:01:3e:58:5c:ef:ac:bd:f1:e0:d2:8a: 78:fd:a2:3d:96:4c:70:bb:f5:83:09:15:04:94:89:bc: 64:a7:a8:90:5f:99:44:27:31:51:1d:2f:9f:d1:eb:81: b6:12:0a:a1:d4:8b:2b:f6:5b:ac:3c:fc:f2:dd:63:9c: b0:12:56:de:ef:c3:96:e8:37:5a:01:e0:25:69:96:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:d2:a8:54:03:db:68:8b:a7:99:b3:7b:d2:4b:bd:3f: 56:00:b6:68:7d:da:ab:33:2f:75:41:07:34:41:41:59: e2:03:a5:b5:7c:f3:6b:98:6a:5e:63:c0:48:d0:19:3c: d0:ed:dc:90:16:87:cd:9a:f2:06:c0:c1:44:67:7c:41: 7b:a7:1f:e3:92:56:4d:2d:9c:61:27:7e:13:f0:8c:ad: b6:8f:c7:4b:35:0d:b7:5e:e4:cc:96:eb:39:b9:25:e1: 47:43:bb:e0:1d:ed:93:99:ca:4d:01:2a:5d:e2:44:2e: 57:8a:51:45:e7:f3:20:21:52:79:56:de:2c:ac:89:39: 68:12:f6:05:70:64:57:53:82:5b:1b:88:b2:43:89:37: b9:e3:cb:2f:40:e6:b2:80:63:fc:5a:0f:b9:02:64:89: 91:aa:9f:21:cc:6e:b8:93:3b:0b:60:de:ac:d0:aa:00: 62:71:5a:9e:c7:fc:e5:eb:33:09:2a:43:ed:a6:d9:43: bf:1e:72:3d:51:d8:7c:cc:10:6f:dd:51:50:6b:71:cd: f9:d3:00:8f:3c:3d:f3:dc:de:b7:f0:12:86:e8:bd:f8: 2e:df:a9:4c:d9:6b:93:db:b3:5b:18:88:63:52:a2:27: a3:19:7a:c4:9b:00:6b:06:c9:18:6a:8a:63:ba:bb:0e Fingerprint (SHA-256): 66:05:4C:34:7A:AB:6C:A0:31:DB:73:45:4A:62:4A:7C:7A:18:DA:10:9F:91:29:03:D8:0A:88:7C:E1:7B:6E:F2 Fingerprint (SHA1): EC:3D:2F:03:4A:A6:4F:70:70:EB:1C:C6:EF:6A:4A:BD:A8:75:C6:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145382 (0x49157e66) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:54:42 2024 Not After : Wed Dec 26 14:54:42 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:7e:fe:7d:74:a7:34:cc:17:25:a4:35:ff:3f:aa:23: ea:c7:21:b7:2c:45:53:c3:8b:e2:4d:9c:d7:d8:e2:ea: 34:e5:70:cd:78:c3:46:30:a4:fa:ff:6f:8c:00:85:ad: 12:7a:2c:47:98:df:95:1c:b4:3e:6f:49:41:da:35:eb: 93:58:a7:9d:ab:20:75:2e:68:da:9b:d6:af:26:f4:bd: f6:27:0a:5b:47:f3:e6:c4:4a:a5:d6:80:41:e1:a0:72: a1:95:9b:95:97:8c:15:08:da:06:d0:45:62:21:ac:b7: e1:3f:6b:1f:98:35:38:67:29:58:fc:11:af:ad:0d:3b: c2:5a:9f:e9:2b:b7:0e:d3:38:c3:4a:4a:45:86:24:ac: a4:91:7a:3a:e8:aa:52:52:b8:cc:2c:88:f6:e3:b1:58: e7:04:7b:d8:ee:bf:72:91:d2:31:af:e2:df:82:30:1b: 02:78:73:00:2a:f9:e0:6c:21:a7:27:b6:72:96:a3:03: db:a4:76:3a:9e:ff:d4:00:7d:70:d5:ce:7d:45:6e:31: b6:56:a5:cb:39:c5:57:11:a6:aa:d9:28:bc:a7:05:ef: 8c:9a:ce:98:4c:cb:d8:58:c4:5a:fb:83:6d:d2:9c:8c: 84:69:2a:56:67:ad:58:13:32:1f:5e:61:58:ab:69:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:0a:67:27:ff:56:d5:42:8b:72:21:03:6a:28:40:38: 44:97:77:9a:05:38:40:3b:84:c5:f3:a1:fe:9c:98:43: db:22:a4:27:80:d7:66:02:83:de:50:85:42:13:50:f4: c7:5f:89:37:ee:fa:3d:6f:b0:49:49:54:6c:1a:5f:33: 92:ac:ff:ed:6e:07:83:8c:7f:8e:a3:6a:13:98:9b:23: 9c:a6:27:6f:d4:6b:ed:8d:ac:bc:9c:9d:77:ea:88:a3: 1b:7a:1c:2d:6d:b8:3c:d6:10:95:ab:73:4a:9e:e0:07: d9:bd:99:ad:b3:65:fd:84:e0:24:69:37:32:42:e0:3c: 07:02:e8:92:e7:6f:37:53:d4:65:08:c6:a9:30:62:02: 99:bd:9f:fd:83:9c:af:6f:44:8e:7f:c1:47:4c:2d:f0: 05:17:e0:77:0e:26:ce:e9:01:1c:8d:20:2d:14:b3:a9: d1:17:17:9c:d9:4d:fa:9b:64:c8:9b:62:e9:f5:8d:f2: c4:31:48:10:b5:40:5e:b3:be:0b:b8:d8:70:fc:14:88: 7d:23:39:ac:4d:c1:34:be:16:f7:76:ad:4a:db:d0:62: 65:86:a1:57:f5:07:00:88:05:61:c7:f0:aa:e7:f5:d5: 0e:fe:34:3e:a6:72:48:8a:1e:84:05:6d:14:5d:ee:da Fingerprint (SHA-256): 1C:F8:EF:AF:8A:57:51:5A:F4:54:97:24:3E:18:C2:A1:FE:B2:68:36:69:20:93:4C:1D:A1:90:1A:6C:BF:BE:29 Fingerprint (SHA1): FD:CD:A9:66:BD:1C:F5:64:4D:57:88:15:7E:AF:91:4B:3F:2F:F5:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145380 (0x49157e64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:40 2024 Not After : Wed Dec 26 14:54:40 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:22:b6:d2:26:b5:20:32:e3:02:93:6a:39:6c:09:04: ec:65:9a:8b:5f:79:e4:ce:80:69:1f:2e:aa:37:fc:55: 5f:ed:c3:2d:b7:dd:c2:a3:81:23:3a:a4:e1:ff:ec:22: 43:3e:a7:31:9f:79:86:9a:af:ea:81:7d:90:06:dc:db: 9a:cb:52:db:f4:4a:07:00:ca:cd:7a:83:c5:1a:39:6d: 07:aa:47:33:48:68:7b:da:07:d0:38:b7:8f:89:93:85: 14:50:07:bb:2e:6d:e4:59:f5:3f:c8:a2:07:b3:d7:1f: 3e:bb:ef:8a:e8:a6:40:f4:aa:9e:30:2e:2c:45:f4:21: b4:7e:b8:3f:b7:60:4b:a0:08:1e:38:d4:b3:49:4c:1a: 32:da:f6:70:4b:a8:86:41:ec:c5:27:16:ee:b7:4d:71: 75:20:ce:53:53:54:e6:fc:6f:70:2f:ed:73:88:63:da: 2c:bb:bd:ed:73:a8:27:73:2f:d6:97:07:75:91:bd:8a: 30:d1:3e:1c:5f:41:4e:ec:54:e1:2d:d1:ca:28:e7:26: 5d:ea:a1:4d:b6:a0:60:6e:30:9b:2a:d3:23:e6:83:8f: 62:1b:07:54:12:b7:29:c7:7d:3f:d7:0f:a8:b6:6a:10: 97:27:2a:b8:7d:ae:15:79:cd:05:07:09:84:05:12:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:a3:c3:03:90:aa:85:8d:0b:56:72:94:f4:d4:f3:03: c7:8f:43:a6:92:f1:dc:8f:c6:38:b9:d4:be:da:12:f4: 15:eb:ad:99:c8:50:72:66:35:2a:e6:8c:83:51:18:08: db:ca:b4:f5:45:b9:17:fb:16:37:48:ce:4e:e0:c5:ac: 64:7d:22:a9:e1:0d:7c:9b:18:9b:d3:94:41:49:1c:4c: ba:ee:d6:2b:64:93:ae:6c:28:a3:75:5b:7a:02:ea:19: 9e:ea:4d:00:82:a6:19:c4:6d:f0:28:71:ad:78:bb:d6: d7:f2:92:d2:09:94:3e:6b:a3:ba:6e:24:28:e6:b8:3b: 88:9b:c7:7e:d0:32:75:f9:52:4e:54:1d:f1:c1:0d:c1: 6b:b5:09:48:f1:08:4c:9a:a8:b8:84:70:64:d5:35:a7: 07:60:09:b0:21:ff:eb:07:64:32:08:ea:5c:52:ea:4e: ad:68:3c:c1:55:4e:b9:c6:1a:e4:6e:9c:56:e0:fa:54: c2:45:8b:75:00:63:e7:00:38:6e:5b:76:27:3a:77:50: 70:67:11:05:a4:b8:f1:48:00:a6:84:b1:6a:a2:74:da: ed:ee:91:bc:72:77:81:e9:80:18:23:34:94:82:44:6e: 38:25:d2:b2:b8:97:99:bb:42:12:32:8e:3a:36:29:66 Fingerprint (SHA-256): 30:36:51:43:9A:35:C5:A2:21:BA:4F:35:DD:3E:63:76:4D:A7:88:73:99:03:9F:01:87:50:B5:2F:50:F6:C0:2D Fingerprint (SHA1): 53:F4:FF:1D:4F:91:88:CC:CE:BA:0E:58:90:D3:79:60:21:85:3F:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145381 (0x49157e65) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:41 2024 Not After : Wed Dec 26 14:54:41 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:ec:41:1b:e5:70:5d:9a:13:ff:40:0e:63:84:19:f4: e6:df:5b:4c:0e:20:f8:00:37:06:bd:90:d6:df:08:14: f9:cc:0b:f2:a3:e0:03:48:0f:6a:71:a4:43:58:82:57: 5e:17:33:82:e2:69:d5:2d:02:3a:89:e9:5b:7d:6b:71: 23:ac:63:9e:d5:1e:33:60:43:f8:bd:61:40:0d:e6:34: e6:9c:15:73:a4:0c:b4:a4:de:a3:33:27:3a:2f:cc:70: 2c:31:02:c4:b1:61:6b:b1:02:74:bf:b8:89:58:94:f5: 5c:0e:2a:51:14:ee:38:5c:4b:ed:af:9c:9d:17:ec:b8: 50:e2:da:b8:7d:19:80:9b:40:52:03:c1:61:6d:6a:bc: 15:1a:ab:99:c5:8d:ac:7e:9b:0f:80:30:11:1f:5d:30: 9a:79:f5:50:37:7d:33:cd:fe:1a:83:a5:e0:a6:89:13: 59:97:82:69:d8:01:3e:58:5c:ef:ac:bd:f1:e0:d2:8a: 78:fd:a2:3d:96:4c:70:bb:f5:83:09:15:04:94:89:bc: 64:a7:a8:90:5f:99:44:27:31:51:1d:2f:9f:d1:eb:81: b6:12:0a:a1:d4:8b:2b:f6:5b:ac:3c:fc:f2:dd:63:9c: b0:12:56:de:ef:c3:96:e8:37:5a:01:e0:25:69:96:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:d2:a8:54:03:db:68:8b:a7:99:b3:7b:d2:4b:bd:3f: 56:00:b6:68:7d:da:ab:33:2f:75:41:07:34:41:41:59: e2:03:a5:b5:7c:f3:6b:98:6a:5e:63:c0:48:d0:19:3c: d0:ed:dc:90:16:87:cd:9a:f2:06:c0:c1:44:67:7c:41: 7b:a7:1f:e3:92:56:4d:2d:9c:61:27:7e:13:f0:8c:ad: b6:8f:c7:4b:35:0d:b7:5e:e4:cc:96:eb:39:b9:25:e1: 47:43:bb:e0:1d:ed:93:99:ca:4d:01:2a:5d:e2:44:2e: 57:8a:51:45:e7:f3:20:21:52:79:56:de:2c:ac:89:39: 68:12:f6:05:70:64:57:53:82:5b:1b:88:b2:43:89:37: b9:e3:cb:2f:40:e6:b2:80:63:fc:5a:0f:b9:02:64:89: 91:aa:9f:21:cc:6e:b8:93:3b:0b:60:de:ac:d0:aa:00: 62:71:5a:9e:c7:fc:e5:eb:33:09:2a:43:ed:a6:d9:43: bf:1e:72:3d:51:d8:7c:cc:10:6f:dd:51:50:6b:71:cd: f9:d3:00:8f:3c:3d:f3:dc:de:b7:f0:12:86:e8:bd:f8: 2e:df:a9:4c:d9:6b:93:db:b3:5b:18:88:63:52:a2:27: a3:19:7a:c4:9b:00:6b:06:c9:18:6a:8a:63:ba:bb:0e Fingerprint (SHA-256): 66:05:4C:34:7A:AB:6C:A0:31:DB:73:45:4A:62:4A:7C:7A:18:DA:10:9F:91:29:03:D8:0A:88:7C:E1:7B:6E:F2 Fingerprint (SHA1): EC:3D:2F:03:4A:A6:4F:70:70:EB:1C:C6:EF:6A:4A:BD:A8:75:C6:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145382 (0x49157e66) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:54:42 2024 Not After : Wed Dec 26 14:54:42 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:7e:fe:7d:74:a7:34:cc:17:25:a4:35:ff:3f:aa:23: ea:c7:21:b7:2c:45:53:c3:8b:e2:4d:9c:d7:d8:e2:ea: 34:e5:70:cd:78:c3:46:30:a4:fa:ff:6f:8c:00:85:ad: 12:7a:2c:47:98:df:95:1c:b4:3e:6f:49:41:da:35:eb: 93:58:a7:9d:ab:20:75:2e:68:da:9b:d6:af:26:f4:bd: f6:27:0a:5b:47:f3:e6:c4:4a:a5:d6:80:41:e1:a0:72: a1:95:9b:95:97:8c:15:08:da:06:d0:45:62:21:ac:b7: e1:3f:6b:1f:98:35:38:67:29:58:fc:11:af:ad:0d:3b: c2:5a:9f:e9:2b:b7:0e:d3:38:c3:4a:4a:45:86:24:ac: a4:91:7a:3a:e8:aa:52:52:b8:cc:2c:88:f6:e3:b1:58: e7:04:7b:d8:ee:bf:72:91:d2:31:af:e2:df:82:30:1b: 02:78:73:00:2a:f9:e0:6c:21:a7:27:b6:72:96:a3:03: db:a4:76:3a:9e:ff:d4:00:7d:70:d5:ce:7d:45:6e:31: b6:56:a5:cb:39:c5:57:11:a6:aa:d9:28:bc:a7:05:ef: 8c:9a:ce:98:4c:cb:d8:58:c4:5a:fb:83:6d:d2:9c:8c: 84:69:2a:56:67:ad:58:13:32:1f:5e:61:58:ab:69:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:0a:67:27:ff:56:d5:42:8b:72:21:03:6a:28:40:38: 44:97:77:9a:05:38:40:3b:84:c5:f3:a1:fe:9c:98:43: db:22:a4:27:80:d7:66:02:83:de:50:85:42:13:50:f4: c7:5f:89:37:ee:fa:3d:6f:b0:49:49:54:6c:1a:5f:33: 92:ac:ff:ed:6e:07:83:8c:7f:8e:a3:6a:13:98:9b:23: 9c:a6:27:6f:d4:6b:ed:8d:ac:bc:9c:9d:77:ea:88:a3: 1b:7a:1c:2d:6d:b8:3c:d6:10:95:ab:73:4a:9e:e0:07: d9:bd:99:ad:b3:65:fd:84:e0:24:69:37:32:42:e0:3c: 07:02:e8:92:e7:6f:37:53:d4:65:08:c6:a9:30:62:02: 99:bd:9f:fd:83:9c:af:6f:44:8e:7f:c1:47:4c:2d:f0: 05:17:e0:77:0e:26:ce:e9:01:1c:8d:20:2d:14:b3:a9: d1:17:17:9c:d9:4d:fa:9b:64:c8:9b:62:e9:f5:8d:f2: c4:31:48:10:b5:40:5e:b3:be:0b:b8:d8:70:fc:14:88: 7d:23:39:ac:4d:c1:34:be:16:f7:76:ad:4a:db:d0:62: 65:86:a1:57:f5:07:00:88:05:61:c7:f0:aa:e7:f5:d5: 0e:fe:34:3e:a6:72:48:8a:1e:84:05:6d:14:5d:ee:da Fingerprint (SHA-256): 1C:F8:EF:AF:8A:57:51:5A:F4:54:97:24:3E:18:C2:A1:FE:B2:68:36:69:20:93:4C:1D:A1:90:1A:6C:BF:BE:29 Fingerprint (SHA1): FD:CD:A9:66:BD:1C:F5:64:4D:57:88:15:7E:AF:91:4B:3F:2F:F5:A6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145380 (0x49157e64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:40 2024 Not After : Wed Dec 26 14:54:40 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:22:b6:d2:26:b5:20:32:e3:02:93:6a:39:6c:09:04: ec:65:9a:8b:5f:79:e4:ce:80:69:1f:2e:aa:37:fc:55: 5f:ed:c3:2d:b7:dd:c2:a3:81:23:3a:a4:e1:ff:ec:22: 43:3e:a7:31:9f:79:86:9a:af:ea:81:7d:90:06:dc:db: 9a:cb:52:db:f4:4a:07:00:ca:cd:7a:83:c5:1a:39:6d: 07:aa:47:33:48:68:7b:da:07:d0:38:b7:8f:89:93:85: 14:50:07:bb:2e:6d:e4:59:f5:3f:c8:a2:07:b3:d7:1f: 3e:bb:ef:8a:e8:a6:40:f4:aa:9e:30:2e:2c:45:f4:21: b4:7e:b8:3f:b7:60:4b:a0:08:1e:38:d4:b3:49:4c:1a: 32:da:f6:70:4b:a8:86:41:ec:c5:27:16:ee:b7:4d:71: 75:20:ce:53:53:54:e6:fc:6f:70:2f:ed:73:88:63:da: 2c:bb:bd:ed:73:a8:27:73:2f:d6:97:07:75:91:bd:8a: 30:d1:3e:1c:5f:41:4e:ec:54:e1:2d:d1:ca:28:e7:26: 5d:ea:a1:4d:b6:a0:60:6e:30:9b:2a:d3:23:e6:83:8f: 62:1b:07:54:12:b7:29:c7:7d:3f:d7:0f:a8:b6:6a:10: 97:27:2a:b8:7d:ae:15:79:cd:05:07:09:84:05:12:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:a3:c3:03:90:aa:85:8d:0b:56:72:94:f4:d4:f3:03: c7:8f:43:a6:92:f1:dc:8f:c6:38:b9:d4:be:da:12:f4: 15:eb:ad:99:c8:50:72:66:35:2a:e6:8c:83:51:18:08: db:ca:b4:f5:45:b9:17:fb:16:37:48:ce:4e:e0:c5:ac: 64:7d:22:a9:e1:0d:7c:9b:18:9b:d3:94:41:49:1c:4c: ba:ee:d6:2b:64:93:ae:6c:28:a3:75:5b:7a:02:ea:19: 9e:ea:4d:00:82:a6:19:c4:6d:f0:28:71:ad:78:bb:d6: d7:f2:92:d2:09:94:3e:6b:a3:ba:6e:24:28:e6:b8:3b: 88:9b:c7:7e:d0:32:75:f9:52:4e:54:1d:f1:c1:0d:c1: 6b:b5:09:48:f1:08:4c:9a:a8:b8:84:70:64:d5:35:a7: 07:60:09:b0:21:ff:eb:07:64:32:08:ea:5c:52:ea:4e: ad:68:3c:c1:55:4e:b9:c6:1a:e4:6e:9c:56:e0:fa:54: c2:45:8b:75:00:63:e7:00:38:6e:5b:76:27:3a:77:50: 70:67:11:05:a4:b8:f1:48:00:a6:84:b1:6a:a2:74:da: ed:ee:91:bc:72:77:81:e9:80:18:23:34:94:82:44:6e: 38:25:d2:b2:b8:97:99:bb:42:12:32:8e:3a:36:29:66 Fingerprint (SHA-256): 30:36:51:43:9A:35:C5:A2:21:BA:4F:35:DD:3E:63:76:4D:A7:88:73:99:03:9F:01:87:50:B5:2F:50:F6:C0:2D Fingerprint (SHA1): 53:F4:FF:1D:4F:91:88:CC:CE:BA:0E:58:90:D3:79:60:21:85:3F:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145380 (0x49157e64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:40 2024 Not After : Wed Dec 26 14:54:40 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:22:b6:d2:26:b5:20:32:e3:02:93:6a:39:6c:09:04: ec:65:9a:8b:5f:79:e4:ce:80:69:1f:2e:aa:37:fc:55: 5f:ed:c3:2d:b7:dd:c2:a3:81:23:3a:a4:e1:ff:ec:22: 43:3e:a7:31:9f:79:86:9a:af:ea:81:7d:90:06:dc:db: 9a:cb:52:db:f4:4a:07:00:ca:cd:7a:83:c5:1a:39:6d: 07:aa:47:33:48:68:7b:da:07:d0:38:b7:8f:89:93:85: 14:50:07:bb:2e:6d:e4:59:f5:3f:c8:a2:07:b3:d7:1f: 3e:bb:ef:8a:e8:a6:40:f4:aa:9e:30:2e:2c:45:f4:21: b4:7e:b8:3f:b7:60:4b:a0:08:1e:38:d4:b3:49:4c:1a: 32:da:f6:70:4b:a8:86:41:ec:c5:27:16:ee:b7:4d:71: 75:20:ce:53:53:54:e6:fc:6f:70:2f:ed:73:88:63:da: 2c:bb:bd:ed:73:a8:27:73:2f:d6:97:07:75:91:bd:8a: 30:d1:3e:1c:5f:41:4e:ec:54:e1:2d:d1:ca:28:e7:26: 5d:ea:a1:4d:b6:a0:60:6e:30:9b:2a:d3:23:e6:83:8f: 62:1b:07:54:12:b7:29:c7:7d:3f:d7:0f:a8:b6:6a:10: 97:27:2a:b8:7d:ae:15:79:cd:05:07:09:84:05:12:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:a3:c3:03:90:aa:85:8d:0b:56:72:94:f4:d4:f3:03: c7:8f:43:a6:92:f1:dc:8f:c6:38:b9:d4:be:da:12:f4: 15:eb:ad:99:c8:50:72:66:35:2a:e6:8c:83:51:18:08: db:ca:b4:f5:45:b9:17:fb:16:37:48:ce:4e:e0:c5:ac: 64:7d:22:a9:e1:0d:7c:9b:18:9b:d3:94:41:49:1c:4c: ba:ee:d6:2b:64:93:ae:6c:28:a3:75:5b:7a:02:ea:19: 9e:ea:4d:00:82:a6:19:c4:6d:f0:28:71:ad:78:bb:d6: d7:f2:92:d2:09:94:3e:6b:a3:ba:6e:24:28:e6:b8:3b: 88:9b:c7:7e:d0:32:75:f9:52:4e:54:1d:f1:c1:0d:c1: 6b:b5:09:48:f1:08:4c:9a:a8:b8:84:70:64:d5:35:a7: 07:60:09:b0:21:ff:eb:07:64:32:08:ea:5c:52:ea:4e: ad:68:3c:c1:55:4e:b9:c6:1a:e4:6e:9c:56:e0:fa:54: c2:45:8b:75:00:63:e7:00:38:6e:5b:76:27:3a:77:50: 70:67:11:05:a4:b8:f1:48:00:a6:84:b1:6a:a2:74:da: ed:ee:91:bc:72:77:81:e9:80:18:23:34:94:82:44:6e: 38:25:d2:b2:b8:97:99:bb:42:12:32:8e:3a:36:29:66 Fingerprint (SHA-256): 30:36:51:43:9A:35:C5:A2:21:BA:4F:35:DD:3E:63:76:4D:A7:88:73:99:03:9F:01:87:50:B5:2F:50:F6:C0:2D Fingerprint (SHA1): 53:F4:FF:1D:4F:91:88:CC:CE:BA:0E:58:90:D3:79:60:21:85:3F:BC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145381 (0x49157e65) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:41 2024 Not After : Wed Dec 26 14:54:41 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:ec:41:1b:e5:70:5d:9a:13:ff:40:0e:63:84:19:f4: e6:df:5b:4c:0e:20:f8:00:37:06:bd:90:d6:df:08:14: f9:cc:0b:f2:a3:e0:03:48:0f:6a:71:a4:43:58:82:57: 5e:17:33:82:e2:69:d5:2d:02:3a:89:e9:5b:7d:6b:71: 23:ac:63:9e:d5:1e:33:60:43:f8:bd:61:40:0d:e6:34: e6:9c:15:73:a4:0c:b4:a4:de:a3:33:27:3a:2f:cc:70: 2c:31:02:c4:b1:61:6b:b1:02:74:bf:b8:89:58:94:f5: 5c:0e:2a:51:14:ee:38:5c:4b:ed:af:9c:9d:17:ec:b8: 50:e2:da:b8:7d:19:80:9b:40:52:03:c1:61:6d:6a:bc: 15:1a:ab:99:c5:8d:ac:7e:9b:0f:80:30:11:1f:5d:30: 9a:79:f5:50:37:7d:33:cd:fe:1a:83:a5:e0:a6:89:13: 59:97:82:69:d8:01:3e:58:5c:ef:ac:bd:f1:e0:d2:8a: 78:fd:a2:3d:96:4c:70:bb:f5:83:09:15:04:94:89:bc: 64:a7:a8:90:5f:99:44:27:31:51:1d:2f:9f:d1:eb:81: b6:12:0a:a1:d4:8b:2b:f6:5b:ac:3c:fc:f2:dd:63:9c: b0:12:56:de:ef:c3:96:e8:37:5a:01:e0:25:69:96:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:d2:a8:54:03:db:68:8b:a7:99:b3:7b:d2:4b:bd:3f: 56:00:b6:68:7d:da:ab:33:2f:75:41:07:34:41:41:59: e2:03:a5:b5:7c:f3:6b:98:6a:5e:63:c0:48:d0:19:3c: d0:ed:dc:90:16:87:cd:9a:f2:06:c0:c1:44:67:7c:41: 7b:a7:1f:e3:92:56:4d:2d:9c:61:27:7e:13:f0:8c:ad: b6:8f:c7:4b:35:0d:b7:5e:e4:cc:96:eb:39:b9:25:e1: 47:43:bb:e0:1d:ed:93:99:ca:4d:01:2a:5d:e2:44:2e: 57:8a:51:45:e7:f3:20:21:52:79:56:de:2c:ac:89:39: 68:12:f6:05:70:64:57:53:82:5b:1b:88:b2:43:89:37: b9:e3:cb:2f:40:e6:b2:80:63:fc:5a:0f:b9:02:64:89: 91:aa:9f:21:cc:6e:b8:93:3b:0b:60:de:ac:d0:aa:00: 62:71:5a:9e:c7:fc:e5:eb:33:09:2a:43:ed:a6:d9:43: bf:1e:72:3d:51:d8:7c:cc:10:6f:dd:51:50:6b:71:cd: f9:d3:00:8f:3c:3d:f3:dc:de:b7:f0:12:86:e8:bd:f8: 2e:df:a9:4c:d9:6b:93:db:b3:5b:18:88:63:52:a2:27: a3:19:7a:c4:9b:00:6b:06:c9:18:6a:8a:63:ba:bb:0e Fingerprint (SHA-256): 66:05:4C:34:7A:AB:6C:A0:31:DB:73:45:4A:62:4A:7C:7A:18:DA:10:9F:91:29:03:D8:0A:88:7C:E1:7B:6E:F2 Fingerprint (SHA1): EC:3D:2F:03:4A:A6:4F:70:70:EB:1C:C6:EF:6A:4A:BD:A8:75:C6:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145381 (0x49157e65) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:54:41 2024 Not After : Wed Dec 26 14:54:41 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:ec:41:1b:e5:70:5d:9a:13:ff:40:0e:63:84:19:f4: e6:df:5b:4c:0e:20:f8:00:37:06:bd:90:d6:df:08:14: f9:cc:0b:f2:a3:e0:03:48:0f:6a:71:a4:43:58:82:57: 5e:17:33:82:e2:69:d5:2d:02:3a:89:e9:5b:7d:6b:71: 23:ac:63:9e:d5:1e:33:60:43:f8:bd:61:40:0d:e6:34: e6:9c:15:73:a4:0c:b4:a4:de:a3:33:27:3a:2f:cc:70: 2c:31:02:c4:b1:61:6b:b1:02:74:bf:b8:89:58:94:f5: 5c:0e:2a:51:14:ee:38:5c:4b:ed:af:9c:9d:17:ec:b8: 50:e2:da:b8:7d:19:80:9b:40:52:03:c1:61:6d:6a:bc: 15:1a:ab:99:c5:8d:ac:7e:9b:0f:80:30:11:1f:5d:30: 9a:79:f5:50:37:7d:33:cd:fe:1a:83:a5:e0:a6:89:13: 59:97:82:69:d8:01:3e:58:5c:ef:ac:bd:f1:e0:d2:8a: 78:fd:a2:3d:96:4c:70:bb:f5:83:09:15:04:94:89:bc: 64:a7:a8:90:5f:99:44:27:31:51:1d:2f:9f:d1:eb:81: b6:12:0a:a1:d4:8b:2b:f6:5b:ac:3c:fc:f2:dd:63:9c: b0:12:56:de:ef:c3:96:e8:37:5a:01:e0:25:69:96:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3e:d2:a8:54:03:db:68:8b:a7:99:b3:7b:d2:4b:bd:3f: 56:00:b6:68:7d:da:ab:33:2f:75:41:07:34:41:41:59: e2:03:a5:b5:7c:f3:6b:98:6a:5e:63:c0:48:d0:19:3c: d0:ed:dc:90:16:87:cd:9a:f2:06:c0:c1:44:67:7c:41: 7b:a7:1f:e3:92:56:4d:2d:9c:61:27:7e:13:f0:8c:ad: b6:8f:c7:4b:35:0d:b7:5e:e4:cc:96:eb:39:b9:25:e1: 47:43:bb:e0:1d:ed:93:99:ca:4d:01:2a:5d:e2:44:2e: 57:8a:51:45:e7:f3:20:21:52:79:56:de:2c:ac:89:39: 68:12:f6:05:70:64:57:53:82:5b:1b:88:b2:43:89:37: b9:e3:cb:2f:40:e6:b2:80:63:fc:5a:0f:b9:02:64:89: 91:aa:9f:21:cc:6e:b8:93:3b:0b:60:de:ac:d0:aa:00: 62:71:5a:9e:c7:fc:e5:eb:33:09:2a:43:ed:a6:d9:43: bf:1e:72:3d:51:d8:7c:cc:10:6f:dd:51:50:6b:71:cd: f9:d3:00:8f:3c:3d:f3:dc:de:b7:f0:12:86:e8:bd:f8: 2e:df:a9:4c:d9:6b:93:db:b3:5b:18:88:63:52:a2:27: a3:19:7a:c4:9b:00:6b:06:c9:18:6a:8a:63:ba:bb:0e Fingerprint (SHA-256): 66:05:4C:34:7A:AB:6C:A0:31:DB:73:45:4A:62:4A:7C:7A:18:DA:10:9F:91:29:03:D8:0A:88:7C:E1:7B:6E:F2 Fingerprint (SHA1): EC:3D:2F:03:4A:A6:4F:70:70:EB:1C:C6:EF:6A:4A:BD:A8:75:C6:64 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145382 (0x49157e66) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:54:42 2024 Not After : Wed Dec 26 14:54:42 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:7e:fe:7d:74:a7:34:cc:17:25:a4:35:ff:3f:aa:23: ea:c7:21:b7:2c:45:53:c3:8b:e2:4d:9c:d7:d8:e2:ea: 34:e5:70:cd:78:c3:46:30:a4:fa:ff:6f:8c:00:85:ad: 12:7a:2c:47:98:df:95:1c:b4:3e:6f:49:41:da:35:eb: 93:58:a7:9d:ab:20:75:2e:68:da:9b:d6:af:26:f4:bd: f6:27:0a:5b:47:f3:e6:c4:4a:a5:d6:80:41:e1:a0:72: a1:95:9b:95:97:8c:15:08:da:06:d0:45:62:21:ac:b7: e1:3f:6b:1f:98:35:38:67:29:58:fc:11:af:ad:0d:3b: c2:5a:9f:e9:2b:b7:0e:d3:38:c3:4a:4a:45:86:24:ac: a4:91:7a:3a:e8:aa:52:52:b8:cc:2c:88:f6:e3:b1:58: e7:04:7b:d8:ee:bf:72:91:d2:31:af:e2:df:82:30:1b: 02:78:73:00:2a:f9:e0:6c:21:a7:27:b6:72:96:a3:03: db:a4:76:3a:9e:ff:d4:00:7d:70:d5:ce:7d:45:6e:31: b6:56:a5:cb:39:c5:57:11:a6:aa:d9:28:bc:a7:05:ef: 8c:9a:ce:98:4c:cb:d8:58:c4:5a:fb:83:6d:d2:9c:8c: 84:69:2a:56:67:ad:58:13:32:1f:5e:61:58:ab:69:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:0a:67:27:ff:56:d5:42:8b:72:21:03:6a:28:40:38: 44:97:77:9a:05:38:40:3b:84:c5:f3:a1:fe:9c:98:43: db:22:a4:27:80:d7:66:02:83:de:50:85:42:13:50:f4: c7:5f:89:37:ee:fa:3d:6f:b0:49:49:54:6c:1a:5f:33: 92:ac:ff:ed:6e:07:83:8c:7f:8e:a3:6a:13:98:9b:23: 9c:a6:27:6f:d4:6b:ed:8d:ac:bc:9c:9d:77:ea:88:a3: 1b:7a:1c:2d:6d:b8:3c:d6:10:95:ab:73:4a:9e:e0:07: d9:bd:99:ad:b3:65:fd:84:e0:24:69:37:32:42:e0:3c: 07:02:e8:92:e7:6f:37:53:d4:65:08:c6:a9:30:62:02: 99:bd:9f:fd:83:9c:af:6f:44:8e:7f:c1:47:4c:2d:f0: 05:17:e0:77:0e:26:ce:e9:01:1c:8d:20:2d:14:b3:a9: d1:17:17:9c:d9:4d:fa:9b:64:c8:9b:62:e9:f5:8d:f2: c4:31:48:10:b5:40:5e:b3:be:0b:b8:d8:70:fc:14:88: 7d:23:39:ac:4d:c1:34:be:16:f7:76:ad:4a:db:d0:62: 65:86:a1:57:f5:07:00:88:05:61:c7:f0:aa:e7:f5:d5: 0e:fe:34:3e:a6:72:48:8a:1e:84:05:6d:14:5d:ee:da Fingerprint (SHA-256): 1C:F8:EF:AF:8A:57:51:5A:F4:54:97:24:3E:18:C2:A1:FE:B2:68:36:69:20:93:4C:1D:A1:90:1A:6C:BF:BE:29 Fingerprint (SHA1): FD:CD:A9:66:BD:1C:F5:64:4D:57:88:15:7E:AF:91:4B:3F:2F:F5:A6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145382 (0x49157e66) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:54:42 2024 Not After : Wed Dec 26 14:54:42 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:7e:fe:7d:74:a7:34:cc:17:25:a4:35:ff:3f:aa:23: ea:c7:21:b7:2c:45:53:c3:8b:e2:4d:9c:d7:d8:e2:ea: 34:e5:70:cd:78:c3:46:30:a4:fa:ff:6f:8c:00:85:ad: 12:7a:2c:47:98:df:95:1c:b4:3e:6f:49:41:da:35:eb: 93:58:a7:9d:ab:20:75:2e:68:da:9b:d6:af:26:f4:bd: f6:27:0a:5b:47:f3:e6:c4:4a:a5:d6:80:41:e1:a0:72: a1:95:9b:95:97:8c:15:08:da:06:d0:45:62:21:ac:b7: e1:3f:6b:1f:98:35:38:67:29:58:fc:11:af:ad:0d:3b: c2:5a:9f:e9:2b:b7:0e:d3:38:c3:4a:4a:45:86:24:ac: a4:91:7a:3a:e8:aa:52:52:b8:cc:2c:88:f6:e3:b1:58: e7:04:7b:d8:ee:bf:72:91:d2:31:af:e2:df:82:30:1b: 02:78:73:00:2a:f9:e0:6c:21:a7:27:b6:72:96:a3:03: db:a4:76:3a:9e:ff:d4:00:7d:70:d5:ce:7d:45:6e:31: b6:56:a5:cb:39:c5:57:11:a6:aa:d9:28:bc:a7:05:ef: 8c:9a:ce:98:4c:cb:d8:58:c4:5a:fb:83:6d:d2:9c:8c: 84:69:2a:56:67:ad:58:13:32:1f:5e:61:58:ab:69:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:0a:67:27:ff:56:d5:42:8b:72:21:03:6a:28:40:38: 44:97:77:9a:05:38:40:3b:84:c5:f3:a1:fe:9c:98:43: db:22:a4:27:80:d7:66:02:83:de:50:85:42:13:50:f4: c7:5f:89:37:ee:fa:3d:6f:b0:49:49:54:6c:1a:5f:33: 92:ac:ff:ed:6e:07:83:8c:7f:8e:a3:6a:13:98:9b:23: 9c:a6:27:6f:d4:6b:ed:8d:ac:bc:9c:9d:77:ea:88:a3: 1b:7a:1c:2d:6d:b8:3c:d6:10:95:ab:73:4a:9e:e0:07: d9:bd:99:ad:b3:65:fd:84:e0:24:69:37:32:42:e0:3c: 07:02:e8:92:e7:6f:37:53:d4:65:08:c6:a9:30:62:02: 99:bd:9f:fd:83:9c:af:6f:44:8e:7f:c1:47:4c:2d:f0: 05:17:e0:77:0e:26:ce:e9:01:1c:8d:20:2d:14:b3:a9: d1:17:17:9c:d9:4d:fa:9b:64:c8:9b:62:e9:f5:8d:f2: c4:31:48:10:b5:40:5e:b3:be:0b:b8:d8:70:fc:14:88: 7d:23:39:ac:4d:c1:34:be:16:f7:76:ad:4a:db:d0:62: 65:86:a1:57:f5:07:00:88:05:61:c7:f0:aa:e7:f5:d5: 0e:fe:34:3e:a6:72:48:8a:1e:84:05:6d:14:5d:ee:da Fingerprint (SHA-256): 1C:F8:EF:AF:8A:57:51:5A:F4:54:97:24:3E:18:C2:A1:FE:B2:68:36:69:20:93:4C:1D:A1:90:1A:6C:BF:BE:29 Fingerprint (SHA1): FD:CD:A9:66:BD:1C:F5:64:4D:57:88:15:7E:AF:91:4B:3F:2F:F5:A6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145385 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145386 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145387 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1226145388 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145389 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145390 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1226145391 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145385 (0x49157e69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:46 2024 Not After : Wed Dec 26 14:54:46 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:41:ca:73:8c:22:ab:1c:c9:32:79:1f:78:1d:86:79: 49:66:44:3f:ad:66:39:53:ac:8b:c8:13:8a:30:70:d1: 09:1e:a8:48:9e:d6:9c:10:11:29:65:78:e0:58:f5:ca: c6:98:77:61:f5:46:af:b4:c5:76:ec:41:9d:88:4d:75: 8a:d0:77:ea:9a:42:da:c4:df:67:6c:ec:ce:a3:45:7b: 87:6c:8a:6d:b4:60:db:f1:75:ec:e1:11:82:db:2e:0f: 51:55:cc:75:70:86:d1:09:09:f6:48:a7:b1:9a:0d:75: 0e:69:97:3e:a6:dd:a1:bb:00:e3:96:b3:6f:f9:6d:5c: 38:a7:f1:07:e4:c7:61:7c:63:d7:62:7e:c0:d2:38:79: 79:b8:a4:36:8e:65:ea:97:df:4a:8e:fc:d1:fe:45:02: aa:de:6c:36:75:d9:83:81:71:7c:f3:cf:50:a6:aa:5a: ef:c0:8c:3d:64:69:91:cb:72:38:3b:91:e3:19:0e:67: 2f:80:c3:18:04:34:5d:59:91:fe:5a:7c:48:a4:1d:9b: 1e:8a:2a:8b:96:f8:2e:64:b7:31:28:3f:5b:fc:f4:f4: 3b:39:f9:d1:9f:f9:ce:1f:b4:6e:00:36:3c:de:87:fc: 1a:07:ec:46:37:fc:0e:34:86:83:73:f1:18:82:19:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:a4:62:54:47:4e:24:a6:1b:b5:0c:7c:5d:f8:3e:df: 49:3c:7b:e1:9f:f9:5a:fd:cf:6b:7e:d1:e9:c6:67:98: 82:ca:92:1a:41:a4:4b:3b:0f:59:57:81:eb:37:cf:e5: aa:34:89:ae:58:53:d4:a9:5c:0c:9c:f5:ee:10:4f:bd: e1:db:e4:ae:7a:5b:9e:35:ac:da:1b:e4:63:77:c8:42: 02:66:c9:d3:e4:71:b1:cc:6d:b7:76:fd:2b:97:da:11: 3e:0a:3f:df:04:4a:a3:a9:72:8f:df:ad:b2:5c:f8:f1: 4a:cf:ac:9c:2f:b1:6d:16:85:eb:61:3c:bf:fc:df:d0: cb:e4:d6:ff:ff:98:9c:b1:f2:27:fe:20:ec:78:66:b2: 88:b5:8e:49:9b:ef:b7:37:51:ee:1b:e5:c0:67:2b:07: f0:b7:af:b2:ca:33:26:f9:95:5f:1f:ac:2d:d2:ff:14: 5d:cd:0f:bb:8f:e5:04:8c:f4:36:b0:d8:3a:ac:ad:cc: 82:3f:64:83:d8:55:92:7b:b5:45:e5:8e:0e:5a:fd:3c: a9:a3:5b:9d:67:58:f4:ba:f3:b5:5f:09:5d:1b:7b:96: 8e:2f:95:d9:48:66:e6:c1:af:c1:26:46:9f:a3:42:e3: 37:c4:6d:8f:e5:af:22:fd:00:4c:83:ba:f0:34:df:7d Fingerprint (SHA-256): C3:99:AD:F0:3B:BF:7E:7F:98:E7:20:6B:B5:0C:3C:E0:37:A0:1F:7D:D4:2D:E9:72:91:CE:D8:CD:A4:F0:AC:D5 Fingerprint (SHA1): 72:53:0A:FA:74:5F:FE:D3:40:E3:01:12:7E:D5:E7:52:9D:1C:D1:B5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145385 (0x49157e69) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:46 2024 Not After : Wed Dec 26 14:54:46 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:41:ca:73:8c:22:ab:1c:c9:32:79:1f:78:1d:86:79: 49:66:44:3f:ad:66:39:53:ac:8b:c8:13:8a:30:70:d1: 09:1e:a8:48:9e:d6:9c:10:11:29:65:78:e0:58:f5:ca: c6:98:77:61:f5:46:af:b4:c5:76:ec:41:9d:88:4d:75: 8a:d0:77:ea:9a:42:da:c4:df:67:6c:ec:ce:a3:45:7b: 87:6c:8a:6d:b4:60:db:f1:75:ec:e1:11:82:db:2e:0f: 51:55:cc:75:70:86:d1:09:09:f6:48:a7:b1:9a:0d:75: 0e:69:97:3e:a6:dd:a1:bb:00:e3:96:b3:6f:f9:6d:5c: 38:a7:f1:07:e4:c7:61:7c:63:d7:62:7e:c0:d2:38:79: 79:b8:a4:36:8e:65:ea:97:df:4a:8e:fc:d1:fe:45:02: aa:de:6c:36:75:d9:83:81:71:7c:f3:cf:50:a6:aa:5a: ef:c0:8c:3d:64:69:91:cb:72:38:3b:91:e3:19:0e:67: 2f:80:c3:18:04:34:5d:59:91:fe:5a:7c:48:a4:1d:9b: 1e:8a:2a:8b:96:f8:2e:64:b7:31:28:3f:5b:fc:f4:f4: 3b:39:f9:d1:9f:f9:ce:1f:b4:6e:00:36:3c:de:87:fc: 1a:07:ec:46:37:fc:0e:34:86:83:73:f1:18:82:19:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:a4:62:54:47:4e:24:a6:1b:b5:0c:7c:5d:f8:3e:df: 49:3c:7b:e1:9f:f9:5a:fd:cf:6b:7e:d1:e9:c6:67:98: 82:ca:92:1a:41:a4:4b:3b:0f:59:57:81:eb:37:cf:e5: aa:34:89:ae:58:53:d4:a9:5c:0c:9c:f5:ee:10:4f:bd: e1:db:e4:ae:7a:5b:9e:35:ac:da:1b:e4:63:77:c8:42: 02:66:c9:d3:e4:71:b1:cc:6d:b7:76:fd:2b:97:da:11: 3e:0a:3f:df:04:4a:a3:a9:72:8f:df:ad:b2:5c:f8:f1: 4a:cf:ac:9c:2f:b1:6d:16:85:eb:61:3c:bf:fc:df:d0: cb:e4:d6:ff:ff:98:9c:b1:f2:27:fe:20:ec:78:66:b2: 88:b5:8e:49:9b:ef:b7:37:51:ee:1b:e5:c0:67:2b:07: f0:b7:af:b2:ca:33:26:f9:95:5f:1f:ac:2d:d2:ff:14: 5d:cd:0f:bb:8f:e5:04:8c:f4:36:b0:d8:3a:ac:ad:cc: 82:3f:64:83:d8:55:92:7b:b5:45:e5:8e:0e:5a:fd:3c: a9:a3:5b:9d:67:58:f4:ba:f3:b5:5f:09:5d:1b:7b:96: 8e:2f:95:d9:48:66:e6:c1:af:c1:26:46:9f:a3:42:e3: 37:c4:6d:8f:e5:af:22:fd:00:4c:83:ba:f0:34:df:7d Fingerprint (SHA-256): C3:99:AD:F0:3B:BF:7E:7F:98:E7:20:6B:B5:0C:3C:E0:37:A0:1F:7D:D4:2D:E9:72:91:CE:D8:CD:A4:F0:AC:D5 Fingerprint (SHA1): 72:53:0A:FA:74:5F:FE:D3:40:E3:01:12:7E:D5:E7:52:9D:1C:D1:B5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145392 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145393 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1226145394 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1226145395 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1226145396 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1226145397 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1226145398 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1226145399 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1226145400 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1226145401 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1226145402 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1226145403 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1226145404 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1226145405 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1226145406 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1226145407 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1226145408 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1226145409 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1226145410 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1226145411 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1226145412 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1226145413 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1226145414 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1226145415 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1226145416 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1226145417 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1226145418 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1226145419 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1226145420 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1226145421 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145392 (0x49157e70) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:54:53 2024 Not After : Wed Dec 26 14:54:53 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:50:ff:30:dd:5a:fb:b8:23:0e:e1:99:85:ed:60:40: ef:9a:6b:dd:87:38:66:1f:b2:eb:a7:54:26:42:74:af: c3:90:b9:54:9f:b7:67:b2:07:25:22:33:c2:de:93:95: 2d:b3:51:bc:00:f3:f9:b4:4e:de:d4:90:1d:4f:79:8a: 2c:96:c2:a0:bb:37:3c:16:14:f3:e4:82:a5:f7:73:5b: be:20:fb:72:5e:ab:ea:37:fe:a0:53:87:f5:dc:b8:b2: 14:9c:c2:ea:65:de:e9:42:14:6a:69:e2:44:71:48:1b: 53:48:a5:79:de:60:ed:c8:88:78:2a:13:64:52:6a:57: eb:19:0e:10:b0:98:03:fd:61:80:a9:27:c8:d0:e1:46: 62:eb:20:d9:ef:2c:90:a0:24:8d:82:e0:51:a7:1e:ed: 05:e2:c1:9c:0f:59:7a:5d:a0:11:60:9e:54:67:c5:44: 5c:a6:d8:80:a1:73:b4:e9:dc:a8:54:24:54:65:3c:66: 90:a8:a6:ba:6e:59:2d:a4:e3:b9:80:65:77:fe:46:39: d4:50:67:de:76:cf:31:17:8e:f1:01:83:69:6b:a8:2b: bf:7c:2c:99:f2:8b:c5:05:d3:00:90:fe:29:1f:71:04: 55:37:2a:2d:b0:3c:49:c2:6e:d9:1c:7f:f1:95:ec:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:a6:79:17:8b:53:ea:b7:bd:34:46:32:6f:d8:42:a8: a0:1c:0c:18:1c:e1:e1:07:cd:1c:fe:d3:a4:38:ca:1e: 5e:58:bf:89:d3:2f:00:a1:5c:46:91:ea:8f:d5:3d:30: 80:1a:7f:71:94:f1:c8:88:ce:9c:60:67:ed:0b:ad:3c: 4e:a9:9c:1e:16:36:1b:65:48:2f:4b:ae:a7:98:05:81: b1:51:bd:dd:70:f5:e8:0b:6f:2e:f5:c3:83:a1:79:40: 48:7c:c0:58:6e:e2:35:8f:e9:c1:50:7f:d0:4b:e8:da: f6:05:be:cb:8e:b8:b9:1c:69:45:46:b0:06:3d:65:a0: 27:e4:1b:20:c5:01:71:99:21:05:ca:a0:08:96:e3:cc: 99:1d:20:58:31:b2:7e:31:0b:9f:ba:d3:3a:f5:64:28: 5d:5f:3c:d3:2d:10:cc:93:e2:a7:6f:f8:71:58:61:f9: ab:34:e6:0d:d7:ed:42:a1:ae:e5:07:0f:96:27:74:97: 22:bc:a5:8d:59:3b:50:8c:dc:f8:75:92:9a:38:f1:84: eb:39:a8:68:a6:ff:64:5c:2f:b1:6f:d4:a1:bf:53:e4: 27:ae:55:a0:45:67:9e:ea:6e:15:2f:83:9f:89:7c:34: 32:a9:76:f5:f1:1e:df:83:4d:d8:25:12:1b:c3:23:73 Fingerprint (SHA-256): 8E:BB:73:BE:5A:98:7E:21:4D:F7:1A:7A:8A:26:6B:B4:1B:1F:6F:85:84:FF:99:0F:38:3E:1A:F8:1D:CF:B6:31 Fingerprint (SHA1): 6B:FE:D2:DE:11:19:5F:F8:DF:F2:EE:3D:D3:CF:BF:81:0E:26:4F:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145422 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1226145423 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1226145424 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1226145425 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1226145426 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1226145427 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1226145428 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145422 (0x49157e8e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:55:21 2024 Not After : Wed Dec 26 14:55:21 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:9c:57:14:d2:a8:d7:0b:00:f4:8d:d5:5d:e9:b5:0b: b9:bc:40:1d:31:3a:2b:22:24:8b:75:77:c4:ba:62:0f: 33:1f:f8:22:68:ec:1d:7a:3f:9c:8e:8e:51:d3:30:5f: 3d:c8:54:f7:a3:66:d5:da:22:86:d1:cc:f5:8a:e7:02: 7a:9e:7f:e7:31:a9:21:9b:db:40:b2:00:00:04:10:64: 42:2a:62:7a:b6:da:be:ec:4c:2b:3f:a7:fd:39:c7:c3: 1c:fc:88:9c:89:dd:23:1d:29:8f:d7:72:7e:79:6f:70: fc:fb:91:97:e8:91:9d:bd:d9:38:84:b3:27:7b:7a:a3: 1f:9f:fb:0f:47:7e:fa:66:fb:f9:42:0e:ea:25:aa:21: 48:55:6c:3f:3f:3e:c2:2b:66:f3:7a:00:33:1d:53:16: 0c:af:c9:f7:e4:40:21:39:c9:9b:d6:96:8a:47:2d:7b: e6:c0:1a:13:ed:fd:fe:f0:d3:f9:88:f2:ab:ab:e8:18: dd:2e:45:dc:c7:71:14:ea:2a:89:e1:98:89:a6:ee:40: 3d:d8:b4:26:14:38:0d:3e:fa:57:97:cb:bd:3f:af:9d: b5:5c:b7:e4:97:73:45:c2:87:b3:8b:0c:92:db:4d:43: 1f:6b:0b:4c:4a:94:3e:8c:53:ab:72:2a:39:48:84:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:7b:bf:3e:ae:e2:22:90:ce:f0:ea:04:1c:c3:8f:27: 48:28:14:d6:f8:c2:c4:60:f0:14:39:68:ad:6a:18:f3: 7c:a1:39:ae:4b:17:9f:46:93:bf:fa:0c:f4:0b:f9:f8: 36:51:e7:78:d7:09:fc:82:04:b3:2c:85:b8:94:8b:bc: 03:45:7f:ed:63:50:c3:8f:42:6e:70:50:fe:4e:77:d7: 15:df:11:80:8f:bf:c3:27:fe:75:ba:69:ee:d4:c8:50: a4:f7:16:5f:bd:ba:3f:d3:59:36:93:bf:9d:9f:bb:9d: 88:c8:f0:5a:fc:9a:a0:91:81:2b:3d:97:39:4d:32:b7: ed:5e:fa:10:ca:13:5a:16:e0:28:d9:94:2b:71:c9:17: dd:3e:51:11:f1:89:64:f0:84:5f:d8:7a:11:f9:ab:fb: b5:c8:bc:d0:53:cb:23:e1:53:e9:56:8d:3c:1f:c3:09: d2:9c:52:ac:36:3c:1f:26:f6:35:42:e9:49:26:9d:f2: 3c:63:7c:e7:1d:25:bf:53:11:d9:f2:46:5c:29:3f:23: a9:61:d9:f7:c0:36:dd:cf:3c:54:e8:49:ea:3c:ee:41: 6e:8f:63:4b:76:89:49:6d:c2:71:29:1f:33:dc:bb:c7: 9c:04:0c:a4:29:a5:a4:f2:12:ce:f8:6e:41:61:a5:c1 Fingerprint (SHA-256): 2B:B4:09:84:9E:FE:FE:CF:EB:50:9D:0B:62:88:3B:E7:FD:BC:4F:2D:85:76:E5:E7:55:2C:9C:45:7B:D3:A5:BD Fingerprint (SHA1): 1D:B6:36:86:37:CC:56:45:F1:CC:16:0C:46:17:E3:ED:EF:C2:87:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145422 (0x49157e8e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:55:21 2024 Not After : Wed Dec 26 14:55:21 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:9c:57:14:d2:a8:d7:0b:00:f4:8d:d5:5d:e9:b5:0b: b9:bc:40:1d:31:3a:2b:22:24:8b:75:77:c4:ba:62:0f: 33:1f:f8:22:68:ec:1d:7a:3f:9c:8e:8e:51:d3:30:5f: 3d:c8:54:f7:a3:66:d5:da:22:86:d1:cc:f5:8a:e7:02: 7a:9e:7f:e7:31:a9:21:9b:db:40:b2:00:00:04:10:64: 42:2a:62:7a:b6:da:be:ec:4c:2b:3f:a7:fd:39:c7:c3: 1c:fc:88:9c:89:dd:23:1d:29:8f:d7:72:7e:79:6f:70: fc:fb:91:97:e8:91:9d:bd:d9:38:84:b3:27:7b:7a:a3: 1f:9f:fb:0f:47:7e:fa:66:fb:f9:42:0e:ea:25:aa:21: 48:55:6c:3f:3f:3e:c2:2b:66:f3:7a:00:33:1d:53:16: 0c:af:c9:f7:e4:40:21:39:c9:9b:d6:96:8a:47:2d:7b: e6:c0:1a:13:ed:fd:fe:f0:d3:f9:88:f2:ab:ab:e8:18: dd:2e:45:dc:c7:71:14:ea:2a:89:e1:98:89:a6:ee:40: 3d:d8:b4:26:14:38:0d:3e:fa:57:97:cb:bd:3f:af:9d: b5:5c:b7:e4:97:73:45:c2:87:b3:8b:0c:92:db:4d:43: 1f:6b:0b:4c:4a:94:3e:8c:53:ab:72:2a:39:48:84:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:7b:bf:3e:ae:e2:22:90:ce:f0:ea:04:1c:c3:8f:27: 48:28:14:d6:f8:c2:c4:60:f0:14:39:68:ad:6a:18:f3: 7c:a1:39:ae:4b:17:9f:46:93:bf:fa:0c:f4:0b:f9:f8: 36:51:e7:78:d7:09:fc:82:04:b3:2c:85:b8:94:8b:bc: 03:45:7f:ed:63:50:c3:8f:42:6e:70:50:fe:4e:77:d7: 15:df:11:80:8f:bf:c3:27:fe:75:ba:69:ee:d4:c8:50: a4:f7:16:5f:bd:ba:3f:d3:59:36:93:bf:9d:9f:bb:9d: 88:c8:f0:5a:fc:9a:a0:91:81:2b:3d:97:39:4d:32:b7: ed:5e:fa:10:ca:13:5a:16:e0:28:d9:94:2b:71:c9:17: dd:3e:51:11:f1:89:64:f0:84:5f:d8:7a:11:f9:ab:fb: b5:c8:bc:d0:53:cb:23:e1:53:e9:56:8d:3c:1f:c3:09: d2:9c:52:ac:36:3c:1f:26:f6:35:42:e9:49:26:9d:f2: 3c:63:7c:e7:1d:25:bf:53:11:d9:f2:46:5c:29:3f:23: a9:61:d9:f7:c0:36:dd:cf:3c:54:e8:49:ea:3c:ee:41: 6e:8f:63:4b:76:89:49:6d:c2:71:29:1f:33:dc:bb:c7: 9c:04:0c:a4:29:a5:a4:f2:12:ce:f8:6e:41:61:a5:c1 Fingerprint (SHA-256): 2B:B4:09:84:9E:FE:FE:CF:EB:50:9D:0B:62:88:3B:E7:FD:BC:4F:2D:85:76:E5:E7:55:2C:9C:45:7B:D3:A5:BD Fingerprint (SHA1): 1D:B6:36:86:37:CC:56:45:F1:CC:16:0C:46:17:E3:ED:EF:C2:87:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145429 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145430 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145431 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145432 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145429 (0x49157e95) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:55:29 2024 Not After : Wed Dec 26 14:55:29 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:4c:ce:1a:a3:ad:dc:45:79:20:3b:19:07:bc:71:9c: c3:9b:bd:db:55:62:7f:27:90:f3:89:c9:53:72:a0:9f: 47:07:51:dd:d6:0f:78:57:12:f8:8b:c9:e3:20:0f:cc: 7f:eb:2e:4c:1a:08:20:ad:66:80:0a:89:15:75:60:d1: 25:da:74:0e:11:24:1d:a6:d1:63:3b:dc:b5:e3:eb:c9: 3e:00:6e:fb:12:bf:e0:87:51:fb:ca:f4:e4:96:ab:8a: 82:ee:3a:0c:04:a5:47:bf:f0:67:91:e4:8b:95:e0:f2: 5c:dd:1d:5b:9f:72:7b:39:77:e5:c3:3e:c5:d9:5a:c5: 58:68:df:45:59:6d:f2:60:23:7e:81:ec:7e:4e:05:c5: bb:78:fb:b3:10:e2:40:fe:86:df:dd:1c:2b:52:7b:08: e7:b1:14:19:71:9a:9a:70:8e:5a:b6:58:17:ec:42:7d: 8f:a5:f8:b2:4f:e5:b3:b1:1a:66:ec:4d:28:fb:06:5c: 40:54:72:8b:08:02:08:f5:6a:60:8b:77:93:55:21:e2: ad:d9:a4:bb:56:6b:4c:ba:db:7f:8a:ed:d9:a8:20:3b: d9:d4:05:e0:b4:71:9e:55:34:3d:e7:5b:c7:8a:f0:d5: e4:54:46:7a:77:7f:5e:2d:68:a7:74:0a:fa:37:17:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1d:a2:02:3a:0a:4d:95:08:29:3b:51:c6:d5:cf:95:c0: 6d:ab:36:aa:39:0b:76:9e:e0:bd:44:fc:ea:b0:68:25: 3d:a9:39:c1:61:70:e4:3c:7e:c8:5d:ca:7e:50:8b:e8: 4c:bf:24:2e:1f:77:ea:f4:73:6c:a2:2a:ed:83:a6:3a: 33:16:ce:56:2a:78:5f:f8:3a:48:b4:1f:74:1f:23:cd: 14:c3:16:40:3c:02:0b:b7:51:82:13:a8:f4:16:f6:3e: d1:3e:44:7f:72:14:7b:98:d2:3c:80:06:1e:64:b2:66: 80:c7:ab:b8:cb:91:86:17:41:d8:48:43:c6:17:0b:55: 9b:3a:b5:44:05:94:da:25:b5:64:c6:e3:8a:6a:98:f1: b6:3f:68:6a:69:6a:b2:17:f2:f1:a6:9c:33:1d:57:3e: e6:5f:56:a1:b6:ee:e0:0d:ca:dd:af:07:da:04:d0:5e: 14:4a:28:43:71:63:94:36:5e:65:cb:db:1c:4f:42:83: 95:10:22:7c:e3:d9:d5:ef:13:74:8a:34:71:19:f3:3e: 63:0d:65:2c:fa:f7:08:16:61:b9:b5:3d:29:bd:e5:5a: 8f:e2:ec:21:05:ec:ac:ab:df:d5:58:67:f8:14:21:28: e8:a1:ec:11:8d:d0:68:32:54:e5:58:e5:34:42:33:13 Fingerprint (SHA-256): 8C:C4:48:E8:1F:A8:D3:18:4C:80:83:E1:07:4E:6D:44:99:E4:8F:C4:E6:83:86:21:F2:33:41:52:DA:CC:D6:A3 Fingerprint (SHA1): 45:55:53:56:E7:85:5E:DA:44:6A:62:0C:A9:8D:92:88:73:66:0D:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145430 (0x49157e96) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:55:29 2024 Not After : Wed Dec 26 14:55:29 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:47:cf:06:fc:13:fd:bd:05:c4:0e:54:eb:d6:1c:c0: 37:e3:a4:9a:83:24:b4:f1:5d:10:ec:4d:35:07:c7:51: d1:99:f9:72:46:2e:ab:de:7d:fd:44:34:b1:56:e5:f2: 9b:ab:45:9b:79:43:f7:4c:41:29:8a:66:5b:31:c1:48: 4a:b4:b7:7d:a1:c4:5c:14:29:c3:33:b8:5a:e5:3f:a0: 51:4e:a7:c5:14:ef:12:13:1e:c8:84:a1:be:2c:a0:ad: 42:26:75:70:d4:e0:87:3e:ee:52:23:99:5e:ca:bb:15: 66:15:99:3e:13:fb:f1:8a:a4:ed:d4:99:49:e6:88:c9: 20:ec:9d:9f:56:87:1d:b4:b7:3a:45:69:0a:39:86:1e: f5:91:23:6b:24:5f:1e:a1:8f:76:25:91:e5:fe:1f:16: 85:da:17:97:3b:09:39:7b:15:07:a4:3a:d2:c7:b0:c1: d9:12:86:a3:3f:08:20:a8:f8:6b:2d:63:4a:8a:d1:9f: b2:68:b2:28:19:ac:48:57:57:b4:12:81:da:24:d1:01: b2:bc:44:15:99:ff:a8:ba:0b:36:08:1e:b3:fc:5c:4b: f4:52:ba:54:69:14:85:93:7c:db:e5:3f:02:c2:38:4e: 74:a3:43:24:df:03:7e:11:3c:b4:23:cb:01:28:05:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:7e:9b:cd:5b:00:f3:1f:aa:f7:b8:de:df:da:97:7b: 0e:8c:7b:9f:f1:eb:26:41:c3:55:29:11:ff:5a:4e:a3: eb:ee:92:df:e1:39:38:f3:5f:fb:3e:78:d4:b4:5e:22: 3d:2e:15:a6:2e:ec:38:67:9a:33:ac:53:99:b2:fb:a5: f9:86:70:da:48:b8:95:bc:0c:11:f1:cc:48:de:9e:86: f3:68:65:b9:ad:34:dc:86:37:fb:e8:1f:d2:76:f0:83: d4:25:84:aa:9c:ac:ca:b5:b9:a3:61:64:a5:b3:ea:17: 82:b7:cb:ad:59:62:cb:5a:d1:de:91:80:f4:e9:88:af: 26:bc:27:3c:d3:34:43:e3:53:27:4b:57:69:5e:41:e5: fe:10:b3:b1:47:34:43:fd:5f:82:6b:53:d9:71:a2:57: d8:86:21:02:ad:db:ff:65:3e:53:25:8a:08:d1:4e:21: c4:1e:a2:44:53:41:3c:97:7a:ff:9a:c1:82:cc:a7:c7: 14:ba:61:65:b6:f6:cc:1e:3f:d6:c3:8b:d2:3d:d6:4f: 9f:d6:9a:60:31:70:ce:c2:24:df:9a:59:77:1f:fb:58: ea:3d:3c:9b:9f:fe:f1:c3:03:26:49:94:31:18:79:f4: 79:46:30:aa:c2:e2:7e:41:67:13:e9:fc:30:63:d6:ea Fingerprint (SHA-256): 4A:D3:6A:BE:17:6D:DC:03:B4:5C:69:1E:FE:85:DA:A2:FE:AA:09:5E:37:83:89:81:A9:BB:47:75:E6:2B:00:5D Fingerprint (SHA1): 30:5C:80:65:13:B7:CD:76:E8:C5:AE:4D:D0:BA:D6:7B:B6:5F:93:50 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145431 (0x49157e97) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:55:30 2024 Not After : Wed Dec 26 14:55:30 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:8f:79:d1:b7:4a:7d:43:58:72:66:fd:0c:41:ff:77: 4f:23:54:4f:ce:d6:b1:29:1b:52:ba:de:b8:9d:d2:1d: e3:21:ed:65:33:46:ac:ec:6a:8e:32:b9:0c:92:37:44: aa:37:69:b2:4b:dd:1e:4b:fa:51:4c:69:d8:66:89:99: bf:80:07:ef:b5:d9:8b:f5:fb:f1:a4:88:0f:4b:d2:bf: 26:51:20:a2:f8:7a:54:a8:02:8b:a3:d5:58:10:f4:2a: 8d:2b:68:e0:ed:6a:cf:95:bd:53:2f:03:ee:2c:c7:08: 31:10:e2:02:ed:73:55:c2:35:fb:46:88:32:1a:53:b8: 8c:88:7d:0c:5b:09:20:ea:6b:7e:b7:ce:6a:ce:32:c4: 11:88:fd:5e:6d:2c:f8:f6:ea:62:de:45:ac:5b:56:15: 95:ef:ac:03:8d:bc:8d:10:45:41:ca:63:ca:df:d5:d8: 44:c5:fa:77:ce:f7:fd:ec:2b:aa:c5:03:3b:8e:2d:02: 28:99:52:f5:19:6a:17:a8:d4:fb:e5:ef:79:5f:20:fc: 17:71:93:55:9f:4c:7d:b8:92:15:78:26:f7:c5:07:25: f6:81:81:39:6e:bc:e4:dc:cc:b9:1a:b1:e9:20:3a:61: b2:69:4d:13:9c:c0:88:19:1a:76:0b:3b:56:89:d2:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:10:c0:8e:19:7c:fe:db:65:f2:34:fe:9b:40:ab:c2: 29:29:2f:e3:ea:c8:37:b6:46:78:2f:5b:a1:a6:b3:2b: 9b:fc:86:a9:b0:7f:b9:5d:28:d1:14:04:97:38:24:77: 90:c8:c0:8a:99:7f:db:c7:fe:63:44:66:2e:69:15:39: a9:3e:cf:99:e9:78:9d:be:da:5e:66:89:73:af:12:d9: f3:21:f2:1a:84:ef:89:c3:da:b2:9b:a1:cd:7e:fe:37: 48:e2:be:02:99:a8:b6:65:92:f2:35:4d:66:31:b3:92: fc:40:d2:df:82:e3:01:a2:82:b2:f9:bb:0f:bf:9e:9d: ce:f7:37:e2:85:5f:21:50:b9:dd:c1:49:e7:f4:2c:37: d4:49:b0:54:26:fe:ca:76:27:01:1c:63:2a:e9:dc:5c: 53:7e:5e:e4:dd:05:7b:14:fa:f4:46:5e:dc:84:1e:a9: a4:1c:b7:ac:b4:9d:c0:8e:82:e1:df:a9:e0:30:35:44: a1:75:5a:36:d2:7c:80:84:3f:cd:52:15:5c:b6:b7:bd: 9f:e4:e1:0e:93:ab:36:06:40:a1:14:f0:8e:0a:da:bc: a3:3c:41:50:5b:0a:01:1d:6d:ac:fd:82:6e:4b:17:52: c7:cb:59:18:24:22:31:01:71:99:4d:9c:35:0b:4f:3a Fingerprint (SHA-256): E1:6E:C3:13:49:5F:FE:BE:DF:4B:7D:B7:63:A5:AD:03:6C:AF:58:E5:0F:C1:0B:20:36:F9:DE:48:0A:62:5C:3C Fingerprint (SHA1): 34:B1:B5:F7:3B:D2:A8:1E:76:48:72:5B:66:B4:E8:A3:59:00:86:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145433 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145434 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145435 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1226145436 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1226145437 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145433 (0x49157e99) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:55:33 2024 Not After : Wed Dec 26 14:55:33 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:c6:9b:24:46:90:3d:d8:7d:cd:20:01:36:a1:84:94: 03:6d:d1:46:60:2c:52:d5:6a:b1:c4:3c:67:e3:56:4e: 45:fd:a8:e5:b8:dc:da:0d:be:83:5e:9c:ae:ff:cf:c9: 35:f3:55:70:5d:20:99:a3:4e:a9:c2:90:0a:b3:6d:da: b5:bd:8c:06:c0:57:13:9f:f6:2d:62:5b:4c:36:4c:be: 10:8d:6a:fd:57:3f:97:11:14:37:f4:89:3a:a2:3e:28: 10:4e:fd:7c:fb:0e:88:14:ff:9d:b7:fc:91:94:02:1e: 20:ba:78:68:52:55:16:79:90:40:06:9a:c3:3d:7c:70: 16:6c:e4:23:58:4d:6c:35:d4:ef:f5:e8:69:06:59:ef: 25:65:cc:19:8e:c1:9c:ff:24:88:c6:82:a7:e2:63:3a: 02:e2:ce:e1:58:d6:e8:ad:54:29:73:27:28:ce:b5:30: 40:39:0d:62:26:29:26:42:5b:d3:52:4c:ef:36:ee:5d: 82:c9:de:85:4d:f5:88:92:63:4e:be:70:52:98:30:28: 1b:23:2e:81:3d:d9:cb:b5:d0:75:55:9f:eb:6f:43:4f: 7e:6e:ab:96:ae:46:9a:2f:68:54:59:a2:53:33:6e:fa: 94:27:bf:60:bf:ec:ae:a1:21:ca:cf:ef:b6:54:1a:7f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 80:7a:b6:fc:65:06:f8:1c:46:fd:3b:a5:e0:75:fb:44: e1:22:55:55:93:2b:a5:cc:2c:5b:d5:e3:62:94:80:5c: 34:ae:3d:ce:20:c0:e4:61:4b:50:a0:64:06:60:83:24: d8:1d:6c:b0:43:83:3a:d5:1b:c3:4c:06:2b:dc:d8:fe: 88:3d:d4:6f:45:a8:4d:09:a9:92:fd:85:72:5c:d6:80: 43:8a:37:cb:35:06:54:56:f0:2f:9e:19:85:97:f2:02: 3e:52:e1:c8:36:09:b2:d9:28:29:59:f6:91:c7:f6:e9: dc:b4:eb:b9:8e:58:b6:53:e7:38:a6:1d:32:ae:bb:31: e2:b2:7d:ee:fc:e4:02:a0:2c:dc:b4:2f:86:bf:23:06: 9d:a8:d5:1d:ae:43:c0:23:6a:9d:85:75:87:be:05:2b: df:96:b7:f9:c7:5f:8a:21:e5:29:9c:d6:5b:3e:11:eb: 7c:47:08:7d:8c:8c:fe:33:9c:31:21:1d:13:55:d9:3c: fd:10:00:12:0a:86:02:91:a3:69:c7:3c:89:53:94:4d: 18:e4:b1:6f:05:54:20:b0:99:e0:0a:64:74:9a:bb:d4: 6f:c2:7b:f8:4f:39:39:62:5f:35:90:46:7b:cf:d0:78: 37:df:81:d8:f6:92:34:09:e0:34:f5:97:91:fb:f3:47 Fingerprint (SHA-256): 5C:73:A2:D7:BB:51:73:42:F5:20:BD:B0:61:AD:E0:8F:9C:8A:41:15:F0:B4:3E:FB:6D:B1:8C:F9:CD:13:BE:1D Fingerprint (SHA1): E9:A9:E8:67:BA:41:2F:6D:A1:B3:15:28:13:EF:94:74:22:DD:05:58 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145434 (0x49157e9a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:55:34 2024 Not After : Wed Dec 26 14:55:34 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:2f:3c:19:f0:07:78:d7:00:2c:e0:4a:07:12:b5:aa: cf:5e:f7:1c:2c:25:72:c3:09:c9:57:ea:b6:9a:44:97: 8a:67:44:e6:c2:d8:03:f2:22:10:0b:4d:ab:3f:0b:25: 8b:85:26:84:9d:3b:28:25:8d:5f:4e:78:87:d5:22:07: c2:1c:87:4c:22:6b:72:71:6c:9a:b8:36:eb:77:dc:e1: 65:c8:2d:ab:23:91:02:1e:51:d2:81:69:3a:4e:f5:1f: 4a:53:f3:a7:38:64:28:5c:2e:8f:05:ca:ac:94:29:52: 59:02:a7:81:e3:76:92:05:19:89:33:5a:a1:5a:97:40: 9d:fb:47:1a:46:2f:7b:77:6f:f6:c4:2c:f8:5c:64:5c: 01:0b:26:42:e6:3a:b1:06:19:38:a1:9b:3d:a0:32:1e: ac:01:1d:bd:ec:9d:10:0b:1e:c6:26:db:70:55:a3:3d: 01:a1:78:3a:df:39:25:a5:3a:43:73:4e:13:8e:fe:f4: 3e:3d:42:60:4a:77:ca:e5:63:52:19:20:46:65:5a:b5: 7c:81:c0:2c:62:97:e2:b0:b2:eb:07:7e:8f:d8:c3:5c: a6:db:39:48:53:f2:1d:64:25:05:08:a8:41:c3:9a:45: 6c:01:17:8d:65:c1:97:9a:13:3a:b7:85:6f:91:57:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:11:f5:42:f6:3f:ca:50:02:3e:3c:a7:6b:62:83:72: f5:77:2e:80:d7:4b:33:4e:d4:39:2a:25:01:30:ab:12: 6d:ee:0b:8b:4f:3a:2d:cb:66:ce:61:5a:02:5d:80:53: b2:d8:9e:33:7b:6d:32:b7:cc:a2:5b:cd:dd:b6:79:aa: 34:45:18:37:36:44:f3:00:63:2a:3c:68:d2:d1:ec:1f: bf:78:ec:7e:b5:68:54:55:c9:da:4e:f5:c6:a1:ea:7e: 68:ec:bc:45:a1:c6:30:93:26:e0:ff:05:c0:07:5e:93: 58:c8:2c:95:7b:2b:6e:87:9a:2e:17:4f:ac:bd:02:5f: e6:35:a5:dd:66:29:f0:a4:f9:a8:1b:2f:f9:6a:35:10: 6c:c4:d0:2b:61:ba:d6:da:dc:bc:79:f2:00:cc:fd:b1: 5c:8e:2f:94:e1:17:f8:47:a0:cc:2a:37:8b:43:ee:db: 15:05:44:6e:ca:b7:ef:27:82:1d:08:9b:d8:5e:84:f4: 66:8f:6f:2f:71:bf:04:65:9c:53:c5:c0:4d:7b:a7:7f: 99:4c:6d:2a:a9:55:c5:38:f3:24:4f:f8:0e:a1:f3:10: 84:f0:27:fb:6e:25:ec:66:11:39:f0:96:62:61:8a:c3: 60:fc:2f:1f:ee:ca:ef:37:73:10:ed:fe:cf:a0:55:aa Fingerprint (SHA-256): 1F:03:7A:40:AB:C4:4E:D5:47:7B:E6:B2:4C:21:78:20:3C:6D:EE:A6:44:82:17:11:FC:3D:AE:1E:6E:15:75:A3 Fingerprint (SHA1): A6:1A:DD:0F:8F:E3:86:0E:ED:10:A3:AC:15:F2:BB:05:BF:A6:DF:52 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145435 (0x49157e9b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:55:35 2024 Not After : Wed Dec 26 14:55:35 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:d7:8a:f0:84:82:f3:9e:fd:ab:88:17:67:ba:5e:f9: 19:0a:dd:c5:0f:ad:0d:35:03:6f:71:bb:c6:bc:db:93: 38:18:5e:f8:9a:79:54:f7:7c:62:0a:a9:a4:b3:a5:55: db:dd:86:e7:79:98:17:15:a7:1f:d5:e6:c9:31:81:fb: 62:a1:8d:20:26:96:b7:19:a0:c0:c1:55:48:2e:e9:49: 23:be:a5:bb:8f:c3:c3:bb:5c:6e:d0:1a:0f:5b:3d:3e: 75:84:7b:30:1e:ee:2a:60:46:5f:cf:7b:1d:d0:78:d9: 96:45:ae:54:e6:85:2a:e0:b3:a5:e3:8c:3e:ab:cb:ff: fe:ae:5e:e5:a5:00:c7:43:af:ac:c7:73:4d:30:de:c7: f5:b0:d9:1a:41:9a:82:a7:3f:3e:d5:f5:ad:99:91:0f: 37:da:ba:19:e7:70:c4:f1:d0:57:44:93:7d:a8:a4:80: f4:4b:e5:86:51:eb:02:fe:cd:e8:3a:71:e0:5f:d5:24: b7:80:3e:19:57:5a:a3:a9:86:49:78:24:ca:c3:1c:9a: 08:af:55:3a:30:79:f8:5f:35:e8:47:6c:c6:fd:ca:bf: e2:a2:8e:9a:8a:ed:ff:da:e9:2a:8d:3e:13:3c:69:60: 7f:5e:54:92:ba:cb:70:66:e9:29:8b:05:fd:be:8c:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:ff:ca:58:29:3c:11:c8:fd:1e:94:74:8a:22:0b:7e: 9c:82:28:85:32:08:e6:86:f4:01:54:48:53:e5:5b:ea: ab:35:95:7c:34:98:51:07:56:e0:93:c2:3e:5c:da:b7: 20:6f:cb:7f:19:25:03:0d:22:fb:28:8d:1e:83:76:7d: a0:bd:75:2b:35:13:bb:d3:86:cb:8d:a1:d0:bc:d4:d9: 43:72:7d:ce:c4:85:5f:a6:6b:93:41:03:47:66:9e:5d: 13:3a:00:6f:8d:26:c7:c1:f4:bf:9d:1e:7d:5b:71:ed: e6:e8:47:83:cd:0f:10:d0:9d:a1:e7:e6:18:60:9b:79: 5d:39:35:d9:5c:92:e4:54:6d:f5:dd:d5:0e:66:1f:a3: e0:db:92:94:1c:e0:02:54:c2:2d:05:c6:f0:1b:46:04: 50:11:9d:b1:e7:b0:52:1f:e0:d4:95:83:8d:fd:4b:ff: 39:f6:74:ae:ab:5d:18:1e:e2:ec:e9:53:ab:4d:1d:df: 44:f7:34:32:67:44:c2:b1:43:88:4b:cc:f6:97:57:61: 81:55:99:28:bf:b8:c7:03:c9:46:ea:9e:03:73:64:33: 0e:18:0e:23:1f:a5:f3:17:d6:82:20:2f:55:47:89:01: 07:76:ea:6f:24:81:a3:66:9d:b1:a1:75:a1:f3:e2:a0 Fingerprint (SHA-256): B3:25:29:81:AD:25:75:E2:22:C2:8B:04:97:6B:0C:A2:48:E7:D3:E6:78:0E:A8:80:2F:08:7F:75:E3:5A:E3:1F Fingerprint (SHA1): CD:5D:46:6C:C2:47:DB:46:44:CB:CE:5D:D6:CE:AE:8A:CE:61:7E:AB Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145438 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145439 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145440 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA1Root-1226145331.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145441 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145438 (0x49157e9e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:55:38 2024 Not After : Wed Dec 26 14:55:38 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f4:40:0d:d0:1f:e6:62:c7:b3:65:26:74:66:77:b0:74: d2:ac:3f:f2:ad:4a:01:0c:9d:a4:99:dd:cb:2d:84:3f: a0:00:2c:f4:75:ed:eb:75:0a:9e:a8:89:b9:5f:71:62: da:e5:22:ce:ed:10:01:f9:3e:12:de:12:22:5d:dd:9f: be:2b:0e:95:6f:51:bc:d7:6e:99:f9:11:c7:cd:f0:4f: 22:c5:92:64:8d:f9:3c:02:df:f8:24:0d:cd:cc:bb:58: bb:be:fa:c8:94:df:10:ba:4f:0b:b7:40:d1:73:bb:a1: 86:39:8c:46:ea:d0:4b:65:ef:22:60:59:d3:0a:34:da: 8a:82:1e:e8:48:d7:23:f0:55:20:46:63:28:9a:89:b9: 05:cd:90:b7:b7:3d:73:e7:f9:2e:a6:4c:3b:57:22:46: f7:01:05:2c:65:60:89:1c:7e:a0:13:8b:f4:43:21:21: d9:51:74:75:6a:03:5a:56:ce:49:e6:a1:d9:99:0c:51: 4d:3f:15:cf:be:37:8d:50:ca:1c:84:b7:b4:68:ab:1a: ec:7c:20:a5:ac:8a:9f:c9:38:b9:aa:6f:02:88:84:d9: 34:52:16:9b:19:05:da:02:86:6f:3e:65:36:1d:03:95: d8:af:bf:f8:aa:91:94:a3:c1:8d:14:0b:93:8a:ab:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:04:23:71:2a:04:ae:8c:1c:cd:e9:ea:80:8a:e5:13: c2:0a:33:6d:78:2a:a2:d5:fd:48:73:ef:50:8c:94:64: a6:fc:75:bd:4a:e9:16:e2:b9:95:31:3f:88:d9:1a:15: 20:ec:35:c3:96:e9:37:d5:3e:52:e2:aa:53:d1:dd:c6: af:81:d9:01:87:99:4d:9e:b6:d1:e1:a9:ee:31:f7:b6: 9f:10:b7:13:70:be:b3:8e:62:f0:f7:ee:64:de:15:3c: 24:ac:6d:da:fa:ba:2c:f1:35:c6:3f:a4:45:32:af:33: 7c:cc:07:d1:6c:2c:29:a6:9e:41:cb:e8:0a:09:9b:a6: a5:3d:d9:37:0f:8c:86:48:3d:18:8d:e5:86:20:c5:94: e4:dc:4b:3c:2e:9c:1f:f0:75:e5:48:0d:f1:49:f7:af: 5d:c3:b9:03:fa:48:6e:99:f3:9f:e8:14:90:5e:5e:95: 0d:93:e2:2b:dc:21:b4:4f:63:80:32:81:ab:5b:52:5c: 52:22:f3:4a:40:17:1e:27:28:48:58:a8:16:60:7b:2f: 67:e2:9e:44:8d:45:c9:3d:32:57:8a:01:53:01:cd:bc: 2b:d1:8a:ea:fe:2e:c6:a5:af:e3:31:70:13:ef:dc:af: de:29:65:2e:ac:06:0f:29:03:11:1a:21:4a:61:0e:62 Fingerprint (SHA-256): FB:AD:C0:AA:58:35:EF:63:B3:7C:0D:4F:0D:F7:52:87:76:53:1C:AD:CA:02:9D:AA:CA:41:D9:A0:F4:CF:52:10 Fingerprint (SHA1): 52:99:33:B3:7E:59:BE:9B:55:F1:A4:83:44:F0:79:10:86:5D:92:E3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145442 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145443 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145444 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145445 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145446 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145332.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145447 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145442 (0x49157ea2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:55:41 2024 Not After : Wed Dec 26 14:55:41 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:dc:16:0e:5b:bf:fc:de:5b:b7:c7:f7:63:8e:18:8f: e9:08:31:a8:6a:28:48:dc:19:77:bb:56:c5:fc:27:e0: e0:a1:b5:9b:df:53:33:3e:2b:f9:ff:6c:3e:4d:35:bb: a7:af:fd:d4:b6:b8:8d:bc:87:f4:c0:bb:ab:c7:f7:ba: 12:dd:58:c1:70:da:54:42:bd:d3:89:24:83:dd:e3:cd: 5c:f3:f3:28:28:e9:f4:a5:70:21:26:de:d3:10:57:3e: 1c:78:b9:1b:36:05:30:97:89:61:7f:b0:1e:cb:9e:65: c7:84:13:ca:5c:d5:d5:b9:d8:fd:52:c8:d1:c2:96:7c: df:da:50:44:01:31:e4:92:a0:ee:3b:1f:eb:33:19:d0: 6b:6a:07:38:0c:2f:2e:18:d5:45:b3:66:7f:d7:4c:ed: a4:57:91:63:c7:67:48:0b:58:7b:61:fd:f9:b4:ff:2c: 30:e6:68:21:69:9e:85:b4:00:7e:9a:6b:9f:62:b0:ba: fa:44:ba:6e:8d:9c:f2:3b:be:93:c5:05:be:b9:9a:6a: c4:1d:41:48:5a:36:e5:d5:84:0a:44:0b:f4:ec:41:0a: fd:75:75:76:2d:c8:cb:7b:a2:cc:5e:61:a4:6f:78:f9: 2a:70:0e:c9:5e:08:26:2a:c0:91:6f:d8:f3:2f:4e:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:c6:ab:04:e3:ea:52:40:40:2f:96:ef:ec:40:2c:4c: fa:36:f4:d8:66:e5:0e:a8:3a:71:b3:70:43:d7:a3:57: 53:d1:d3:0d:99:39:fd:a2:5f:86:78:2a:af:d9:a2:3d: 08:06:81:8f:38:14:23:24:15:56:55:d6:31:42:82:84: 2a:c4:a9:5a:6c:fe:5e:c3:81:f6:e5:00:e8:9a:3b:fe: 10:01:aa:04:42:c9:bc:d1:a0:5d:8b:35:25:58:a9:17: 01:46:2c:c1:4c:d1:45:c4:60:9e:2a:ca:bb:d6:20:98: 5a:9f:38:ea:58:b1:51:28:2e:54:5e:b6:41:cc:6f:f2: 2a:09:88:92:10:7e:16:13:a2:62:a6:37:ac:57:37:81: 7e:38:2d:26:6c:22:16:2c:72:c4:88:86:1f:73:65:c1: 8f:c3:40:ed:d4:9b:c4:cd:67:f3:80:40:6a:eb:7f:fb: 76:8e:b2:8a:e5:b7:aa:ad:4b:69:64:fd:57:43:c4:ea: 49:7b:fe:4d:00:7a:26:83:62:b9:5e:a3:29:ef:fd:c6: 2e:46:4b:79:26:78:69:47:06:23:ff:6c:af:9e:58:ee: df:d8:05:43:82:eb:94:90:c4:e9:ff:4f:96:23:32:12: 64:d4:bd:28:b3:c2:81:50:82:0c:b6:35:a7:34:f2:3c Fingerprint (SHA-256): B0:B5:0F:98:01:F3:2E:51:17:E5:2A:B6:96:D7:EC:EC:5A:AA:05:15:2A:DB:02:C9:5A:7A:01:AC:D7:D7:B0:DF Fingerprint (SHA1): 5B:88:82:3C:33:E3:C5:26:1D:8D:FE:8D:F9:1D:10:D4:61:B3:B5:A5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145443 (0x49157ea3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:55:41 2024 Not After : Wed Dec 26 14:55:41 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:3a:61:0a:66:44:8a:b2:09:ee:38:af:da:e6:ee:c0: f4:e1:a9:6b:ca:02:89:ad:a8:e0:0c:19:f3:a1:29:bd: 2a:74:f8:b4:1b:55:66:aa:92:5b:bd:97:52:bc:fd:4d: 13:64:99:ba:57:e6:40:3d:d6:bb:e0:00:19:a5:68:64: 1b:4c:9f:a4:86:80:1d:3b:d4:86:59:49:02:92:21:fb: a7:d2:a8:c0:9e:61:a9:1c:30:07:d0:25:4e:83:9d:79: 3d:aa:a3:0a:da:4f:0c:5a:a9:a3:94:fb:82:44:80:df: 3a:97:2f:4e:77:44:95:a7:29:22:f8:95:78:60:d3:b9: 9d:aa:e9:2a:d7:06:77:bd:17:29:bc:18:d8:0c:da:aa: 4d:cf:44:d1:20:69:9c:3a:3b:61:52:8f:44:18:08:7c: ab:22:5b:5d:39:85:aa:0b:30:b2:66:ca:3a:e2:cd:33: e1:57:61:9a:01:9f:01:13:aa:83:a2:5c:12:a6:0d:69: 18:3b:34:52:26:ca:7a:11:e2:7b:26:a2:64:55:3c:36: 62:a0:c7:1f:ca:8f:eb:d3:7e:91:75:63:7a:ee:97:74: 75:2a:72:5d:36:6d:7a:cb:17:5e:ac:68:9e:bc:1b:7e: 91:21:82:6e:dc:56:f7:ac:c5:62:65:e5:79:43:d0:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:37:e3:8f:63:b8:d5:1f:22:55:de:3b:ad:d5:97:89: 82:a2:00:e3:9b:06:5c:39:e4:7e:90:79:03:a5:e2:31: aa:b9:8a:34:3d:a4:b3:c6:36:10:96:85:06:20:42:db: f8:7f:0b:80:8e:e5:68:c9:07:3b:78:86:f5:80:d4:d4: ce:ae:af:45:8c:e2:3e:7b:b1:11:cc:40:99:2d:e4:c3: 15:46:83:2b:42:23:f3:6a:b1:7f:6a:fe:5f:bc:88:01: 32:76:68:d0:a2:9a:43:fe:e5:1e:e1:80:a4:42:9c:13: 90:1a:b7:92:10:7b:24:94:53:e0:12:d0:c5:63:f7:ef: d2:c2:d6:f0:b8:6b:06:ea:ed:98:ce:85:3d:2a:ba:79: cb:c4:d3:05:e7:cb:9e:26:47:74:c0:96:5f:35:ff:6b: 6a:a0:4f:ac:c0:24:2d:c1:9b:bd:bb:17:82:96:d4:56: cb:75:d4:6a:96:f4:75:d0:96:21:71:5c:a8:19:87:ed: 6a:ba:ba:05:2a:95:26:06:38:81:a8:3b:15:e1:0a:50: 86:15:7f:9a:5d:86:e4:18:df:38:47:6c:e2:12:0e:d3: 85:00:22:39:6a:6e:8c:62:01:65:ab:f8:6e:1d:82:d2: 9e:4d:51:84:70:ab:73:39:14:b0:28:80:e5:31:8f:ac Fingerprint (SHA-256): 74:21:A3:07:54:C5:BB:AA:F1:C5:0C:4C:B1:4B:47:68:25:A3:9C:F8:E9:98:DF:58:DB:B7:16:4B:7D:54:E1:98 Fingerprint (SHA1): 34:C7:EB:B2:0F:25:64:46:C9:BF:31:1F:C9:59:2B:B3:83:CA:21:8C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145443 (0x49157ea3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:55:41 2024 Not After : Wed Dec 26 14:55:41 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9e:3a:61:0a:66:44:8a:b2:09:ee:38:af:da:e6:ee:c0: f4:e1:a9:6b:ca:02:89:ad:a8:e0:0c:19:f3:a1:29:bd: 2a:74:f8:b4:1b:55:66:aa:92:5b:bd:97:52:bc:fd:4d: 13:64:99:ba:57:e6:40:3d:d6:bb:e0:00:19:a5:68:64: 1b:4c:9f:a4:86:80:1d:3b:d4:86:59:49:02:92:21:fb: a7:d2:a8:c0:9e:61:a9:1c:30:07:d0:25:4e:83:9d:79: 3d:aa:a3:0a:da:4f:0c:5a:a9:a3:94:fb:82:44:80:df: 3a:97:2f:4e:77:44:95:a7:29:22:f8:95:78:60:d3:b9: 9d:aa:e9:2a:d7:06:77:bd:17:29:bc:18:d8:0c:da:aa: 4d:cf:44:d1:20:69:9c:3a:3b:61:52:8f:44:18:08:7c: ab:22:5b:5d:39:85:aa:0b:30:b2:66:ca:3a:e2:cd:33: e1:57:61:9a:01:9f:01:13:aa:83:a2:5c:12:a6:0d:69: 18:3b:34:52:26:ca:7a:11:e2:7b:26:a2:64:55:3c:36: 62:a0:c7:1f:ca:8f:eb:d3:7e:91:75:63:7a:ee:97:74: 75:2a:72:5d:36:6d:7a:cb:17:5e:ac:68:9e:bc:1b:7e: 91:21:82:6e:dc:56:f7:ac:c5:62:65:e5:79:43:d0:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:37:e3:8f:63:b8:d5:1f:22:55:de:3b:ad:d5:97:89: 82:a2:00:e3:9b:06:5c:39:e4:7e:90:79:03:a5:e2:31: aa:b9:8a:34:3d:a4:b3:c6:36:10:96:85:06:20:42:db: f8:7f:0b:80:8e:e5:68:c9:07:3b:78:86:f5:80:d4:d4: ce:ae:af:45:8c:e2:3e:7b:b1:11:cc:40:99:2d:e4:c3: 15:46:83:2b:42:23:f3:6a:b1:7f:6a:fe:5f:bc:88:01: 32:76:68:d0:a2:9a:43:fe:e5:1e:e1:80:a4:42:9c:13: 90:1a:b7:92:10:7b:24:94:53:e0:12:d0:c5:63:f7:ef: d2:c2:d6:f0:b8:6b:06:ea:ed:98:ce:85:3d:2a:ba:79: cb:c4:d3:05:e7:cb:9e:26:47:74:c0:96:5f:35:ff:6b: 6a:a0:4f:ac:c0:24:2d:c1:9b:bd:bb:17:82:96:d4:56: cb:75:d4:6a:96:f4:75:d0:96:21:71:5c:a8:19:87:ed: 6a:ba:ba:05:2a:95:26:06:38:81:a8:3b:15:e1:0a:50: 86:15:7f:9a:5d:86:e4:18:df:38:47:6c:e2:12:0e:d3: 85:00:22:39:6a:6e:8c:62:01:65:ab:f8:6e:1d:82:d2: 9e:4d:51:84:70:ab:73:39:14:b0:28:80:e5:31:8f:ac Fingerprint (SHA-256): 74:21:A3:07:54:C5:BB:AA:F1:C5:0C:4C:B1:4B:47:68:25:A3:9C:F8:E9:98:DF:58:DB:B7:16:4B:7D:54:E1:98 Fingerprint (SHA1): 34:C7:EB:B2:0F:25:64:46:C9:BF:31:1F:C9:59:2B:B3:83:CA:21:8C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145448 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145449 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145450 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145451 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145452 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145333.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145453 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145454 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-BridgeNavy-1226145334.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145455 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145448 (0x49157ea8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:55:44 2024 Not After : Wed Dec 26 14:55:44 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b0:f8:ed:0d:db:8c:ce:f2:7c:f9:be:ec:62:77:e7: 5f:47:9b:4a:a3:a1:6f:80:21:d9:c3:0d:60:8c:c0:66: f7:37:b9:2b:07:42:cd:8e:d3:c0:8c:b2:b2:6c:ef:19: 62:9d:ca:e7:ca:92:59:a0:d8:6a:a5:d8:f3:28:d3:7d: 63:9b:e6:36:3b:70:d0:ae:f6:4e:ba:04:2b:bc:a2:7d: d6:01:98:e7:8c:92:45:3c:0c:46:e4:76:89:f9:46:bd: 97:70:97:4c:8f:d8:bf:2c:1f:ae:9e:95:c1:d9:a5:b4: b1:96:76:85:39:e1:7b:fd:58:92:89:3d:6f:52:a7:66: 9d:6c:46:b0:bd:36:fd:22:22:3e:3f:09:c7:95:44:56: 87:a5:ed:e8:6e:6e:f3:81:11:5d:b3:31:9f:ad:f6:74: eb:3f:9a:8c:b4:dd:80:59:90:5b:e9:dc:bb:83:fc:29: 19:98:93:c4:ee:2c:e9:0e:85:98:37:79:ba:cf:7c:18: af:f7:7b:b8:fb:d0:ca:bb:ea:7f:08:8a:c7:d7:ed:c0: 9f:99:33:c8:fb:8e:24:b8:0a:84:fd:10:1b:aa:d9:70: 9e:31:89:ee:d8:4a:04:28:62:79:d7:a8:db:50:89:59: 6e:df:46:d2:c8:d1:79:a6:8a:17:41:62:f7:93:c8:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:37:8b:c8:87:05:34:78:22:bd:42:67:25:0c:76:9c: 00:0a:5e:26:19:3e:42:5a:ce:9d:eb:27:a4:c6:bf:a0: 74:c3:b7:db:69:b1:0f:f1:ae:b1:7d:2c:80:ce:e3:ff: 93:eb:b2:2d:80:34:be:b6:e6:83:dc:c4:3e:6e:4d:e9: 02:da:c5:64:a6:fb:2b:59:ea:4c:06:e1:5b:0f:13:d2: fd:90:f9:a0:8a:24:d9:73:c4:7d:5b:67:95:22:f5:2f: 73:b4:75:b0:5c:ed:14:d2:cc:03:45:8d:bb:19:7f:c4: 9a:1a:e6:c4:79:42:07:71:9c:d9:7f:06:4a:2c:40:a2: 59:f4:ad:78:91:22:4d:14:6d:28:8e:64:ff:4c:15:25: 81:54:d8:8c:97:63:75:5b:76:0f:73:51:7a:35:9e:bb: c2:55:fd:17:59:be:50:c6:55:90:cd:f3:b7:84:94:2f: ef:e5:21:7a:4a:b6:6d:a2:51:ce:f0:47:7e:e7:eb:16: 76:ab:a2:2a:fc:1a:f2:af:1c:cf:2a:01:36:55:d8:87: 81:60:89:a7:ab:d2:17:f4:a0:a7:b2:35:60:18:d0:b3: 95:e6:36:e4:04:67:8d:2f:0c:c4:0a:98:e5:11:78:10: 9e:76:44:24:1b:60:1c:5e:e5:00:8b:10:ad:b3:24:38 Fingerprint (SHA-256): B3:32:C1:A5:71:A5:83:47:81:3D:AA:5E:77:8D:FB:05:33:F4:18:6F:4E:61:23:34:19:A7:9B:CB:F3:1B:C1:61 Fingerprint (SHA1): 58:72:8B:33:3E:9F:A4:89:DD:6C:BD:A5:23:39:2E:E3:BF:F0:09:13 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145449 (0x49157ea9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:55:45 2024 Not After : Wed Dec 26 14:55:45 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a5:0a:4a:60:64:4a:8d:63:1c:eb:12:68:87:69:a6: 88:2c:25:0d:ce:89:bc:5c:33:5f:4d:7a:62:c7:c3:f1: ac:41:d3:07:29:07:b0:3a:f5:4e:c5:cb:d7:15:bf:89: c2:0b:dc:6b:c6:51:94:49:70:0a:dc:78:93:d1:f2:e9: 25:80:2c:4f:29:a2:0e:e2:43:03:61:26:4f:c1:f7:a5: 2d:ec:d1:95:17:8a:30:c3:b8:b1:a3:75:bb:fe:af:49: 89:1b:73:7b:b6:f0:95:11:08:9e:a5:2c:bd:59:db:4c: 92:14:75:ee:98:5c:8e:8c:ca:02:5f:13:16:91:0f:bc: 79:ee:46:54:7f:ea:2b:90:b5:f9:fd:52:6a:0e:70:be: 4e:d5:db:14:66:e6:af:7e:87:cb:4f:56:1d:d2:d8:79: 87:b0:bb:12:5f:de:c6:5f:71:82:12:e4:36:d4:b9:5b: 56:8a:b6:8c:c7:56:66:db:d2:df:6b:22:bd:35:5e:fc: 77:c1:14:e8:97:a0:86:e1:f4:2c:72:83:4c:bf:54:44: e1:ee:ce:d7:4d:88:59:43:bb:84:d3:0f:ba:22:1d:a5: 12:77:1e:3f:88:7c:0f:bc:82:fb:72:e5:6c:66:e7:c7: 14:7b:c1:97:83:bd:a3:e5:30:a2:e4:39:16:fd:21:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:77:9b:00:d8:56:62:78:6c:b7:09:d1:ea:32:78:6e: 3b:f7:40:eb:a1:db:79:f9:e3:b7:a9:4c:a4:fb:50:73: d2:22:5c:ec:25:bc:c0:9a:4d:b0:ca:2a:5a:6a:63:27: 0b:95:ca:93:e6:20:da:b0:5a:1e:e8:76:ab:c3:8b:dd: 10:41:85:b4:6d:ca:9b:6c:e1:ad:54:59:11:e7:b3:be: 03:8f:32:c8:e6:d5:77:d2:ea:79:27:13:5d:db:04:6d: ac:c3:51:23:7a:f1:3d:17:fc:15:c2:7a:b2:68:04:8d: 37:e0:ab:1e:0e:3e:9f:02:d3:40:c6:15:6a:2e:f6:44: 9b:e3:55:ae:ef:01:3f:82:ca:9d:e2:13:6a:9b:61:58: 19:2f:c5:33:f7:75:f0:80:09:02:9b:3a:2b:2f:b3:ce: 25:20:55:0c:7a:d9:65:c7:52:eb:dd:07:64:85:3c:76: a2:a4:e7:7a:18:92:d0:df:dd:64:82:ab:3f:5e:75:1b: cc:08:79:9c:c0:3e:45:37:f7:a8:f8:4c:9c:37:05:fb: e1:c9:9b:65:f9:e2:8c:86:54:ea:e3:d4:42:6d:57:4f: d3:c0:07:d1:c0:a6:4f:aa:2d:b3:f6:e2:5d:27:ad:8f: da:94:29:d3:85:a7:c7:c1:c9:6c:a4:c3:32:c3:58:5d Fingerprint (SHA-256): C7:E3:88:42:B9:A5:6B:61:27:23:D0:00:06:4A:10:4D:8A:B5:AC:EE:8B:35:15:33:C1:90:DD:D2:80:38:42:55 Fingerprint (SHA1): BE:6D:EA:CB:92:57:CE:7A:82:C1:78:66:F7:EC:17:FC:5F:8E:0B:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145449 (0x49157ea9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:55:45 2024 Not After : Wed Dec 26 14:55:45 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a5:0a:4a:60:64:4a:8d:63:1c:eb:12:68:87:69:a6: 88:2c:25:0d:ce:89:bc:5c:33:5f:4d:7a:62:c7:c3:f1: ac:41:d3:07:29:07:b0:3a:f5:4e:c5:cb:d7:15:bf:89: c2:0b:dc:6b:c6:51:94:49:70:0a:dc:78:93:d1:f2:e9: 25:80:2c:4f:29:a2:0e:e2:43:03:61:26:4f:c1:f7:a5: 2d:ec:d1:95:17:8a:30:c3:b8:b1:a3:75:bb:fe:af:49: 89:1b:73:7b:b6:f0:95:11:08:9e:a5:2c:bd:59:db:4c: 92:14:75:ee:98:5c:8e:8c:ca:02:5f:13:16:91:0f:bc: 79:ee:46:54:7f:ea:2b:90:b5:f9:fd:52:6a:0e:70:be: 4e:d5:db:14:66:e6:af:7e:87:cb:4f:56:1d:d2:d8:79: 87:b0:bb:12:5f:de:c6:5f:71:82:12:e4:36:d4:b9:5b: 56:8a:b6:8c:c7:56:66:db:d2:df:6b:22:bd:35:5e:fc: 77:c1:14:e8:97:a0:86:e1:f4:2c:72:83:4c:bf:54:44: e1:ee:ce:d7:4d:88:59:43:bb:84:d3:0f:ba:22:1d:a5: 12:77:1e:3f:88:7c:0f:bc:82:fb:72:e5:6c:66:e7:c7: 14:7b:c1:97:83:bd:a3:e5:30:a2:e4:39:16:fd:21:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:77:9b:00:d8:56:62:78:6c:b7:09:d1:ea:32:78:6e: 3b:f7:40:eb:a1:db:79:f9:e3:b7:a9:4c:a4:fb:50:73: d2:22:5c:ec:25:bc:c0:9a:4d:b0:ca:2a:5a:6a:63:27: 0b:95:ca:93:e6:20:da:b0:5a:1e:e8:76:ab:c3:8b:dd: 10:41:85:b4:6d:ca:9b:6c:e1:ad:54:59:11:e7:b3:be: 03:8f:32:c8:e6:d5:77:d2:ea:79:27:13:5d:db:04:6d: ac:c3:51:23:7a:f1:3d:17:fc:15:c2:7a:b2:68:04:8d: 37:e0:ab:1e:0e:3e:9f:02:d3:40:c6:15:6a:2e:f6:44: 9b:e3:55:ae:ef:01:3f:82:ca:9d:e2:13:6a:9b:61:58: 19:2f:c5:33:f7:75:f0:80:09:02:9b:3a:2b:2f:b3:ce: 25:20:55:0c:7a:d9:65:c7:52:eb:dd:07:64:85:3c:76: a2:a4:e7:7a:18:92:d0:df:dd:64:82:ab:3f:5e:75:1b: cc:08:79:9c:c0:3e:45:37:f7:a8:f8:4c:9c:37:05:fb: e1:c9:9b:65:f9:e2:8c:86:54:ea:e3:d4:42:6d:57:4f: d3:c0:07:d1:c0:a6:4f:aa:2d:b3:f6:e2:5d:27:ad:8f: da:94:29:d3:85:a7:c7:c1:c9:6c:a4:c3:32:c3:58:5d Fingerprint (SHA-256): C7:E3:88:42:B9:A5:6B:61:27:23:D0:00:06:4A:10:4D:8A:B5:AC:EE:8B:35:15:33:C1:90:DD:D2:80:38:42:55 Fingerprint (SHA1): BE:6D:EA:CB:92:57:CE:7A:82:C1:78:66:F7:EC:17:FC:5F:8E:0B:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145448 (0x49157ea8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:55:44 2024 Not After : Wed Dec 26 14:55:44 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:b0:f8:ed:0d:db:8c:ce:f2:7c:f9:be:ec:62:77:e7: 5f:47:9b:4a:a3:a1:6f:80:21:d9:c3:0d:60:8c:c0:66: f7:37:b9:2b:07:42:cd:8e:d3:c0:8c:b2:b2:6c:ef:19: 62:9d:ca:e7:ca:92:59:a0:d8:6a:a5:d8:f3:28:d3:7d: 63:9b:e6:36:3b:70:d0:ae:f6:4e:ba:04:2b:bc:a2:7d: d6:01:98:e7:8c:92:45:3c:0c:46:e4:76:89:f9:46:bd: 97:70:97:4c:8f:d8:bf:2c:1f:ae:9e:95:c1:d9:a5:b4: b1:96:76:85:39:e1:7b:fd:58:92:89:3d:6f:52:a7:66: 9d:6c:46:b0:bd:36:fd:22:22:3e:3f:09:c7:95:44:56: 87:a5:ed:e8:6e:6e:f3:81:11:5d:b3:31:9f:ad:f6:74: eb:3f:9a:8c:b4:dd:80:59:90:5b:e9:dc:bb:83:fc:29: 19:98:93:c4:ee:2c:e9:0e:85:98:37:79:ba:cf:7c:18: af:f7:7b:b8:fb:d0:ca:bb:ea:7f:08:8a:c7:d7:ed:c0: 9f:99:33:c8:fb:8e:24:b8:0a:84:fd:10:1b:aa:d9:70: 9e:31:89:ee:d8:4a:04:28:62:79:d7:a8:db:50:89:59: 6e:df:46:d2:c8:d1:79:a6:8a:17:41:62:f7:93:c8:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:37:8b:c8:87:05:34:78:22:bd:42:67:25:0c:76:9c: 00:0a:5e:26:19:3e:42:5a:ce:9d:eb:27:a4:c6:bf:a0: 74:c3:b7:db:69:b1:0f:f1:ae:b1:7d:2c:80:ce:e3:ff: 93:eb:b2:2d:80:34:be:b6:e6:83:dc:c4:3e:6e:4d:e9: 02:da:c5:64:a6:fb:2b:59:ea:4c:06:e1:5b:0f:13:d2: fd:90:f9:a0:8a:24:d9:73:c4:7d:5b:67:95:22:f5:2f: 73:b4:75:b0:5c:ed:14:d2:cc:03:45:8d:bb:19:7f:c4: 9a:1a:e6:c4:79:42:07:71:9c:d9:7f:06:4a:2c:40:a2: 59:f4:ad:78:91:22:4d:14:6d:28:8e:64:ff:4c:15:25: 81:54:d8:8c:97:63:75:5b:76:0f:73:51:7a:35:9e:bb: c2:55:fd:17:59:be:50:c6:55:90:cd:f3:b7:84:94:2f: ef:e5:21:7a:4a:b6:6d:a2:51:ce:f0:47:7e:e7:eb:16: 76:ab:a2:2a:fc:1a:f2:af:1c:cf:2a:01:36:55:d8:87: 81:60:89:a7:ab:d2:17:f4:a0:a7:b2:35:60:18:d0:b3: 95:e6:36:e4:04:67:8d:2f:0c:c4:0a:98:e5:11:78:10: 9e:76:44:24:1b:60:1c:5e:e5:00:8b:10:ad:b3:24:38 Fingerprint (SHA-256): B3:32:C1:A5:71:A5:83:47:81:3D:AA:5E:77:8D:FB:05:33:F4:18:6F:4E:61:23:34:19:A7:9B:CB:F3:1B:C1:61 Fingerprint (SHA1): 58:72:8B:33:3E:9F:A4:89:DD:6C:BD:A5:23:39:2E:E3:BF:F0:09:13 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145449 (0x49157ea9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:55:45 2024 Not After : Wed Dec 26 14:55:45 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a5:0a:4a:60:64:4a:8d:63:1c:eb:12:68:87:69:a6: 88:2c:25:0d:ce:89:bc:5c:33:5f:4d:7a:62:c7:c3:f1: ac:41:d3:07:29:07:b0:3a:f5:4e:c5:cb:d7:15:bf:89: c2:0b:dc:6b:c6:51:94:49:70:0a:dc:78:93:d1:f2:e9: 25:80:2c:4f:29:a2:0e:e2:43:03:61:26:4f:c1:f7:a5: 2d:ec:d1:95:17:8a:30:c3:b8:b1:a3:75:bb:fe:af:49: 89:1b:73:7b:b6:f0:95:11:08:9e:a5:2c:bd:59:db:4c: 92:14:75:ee:98:5c:8e:8c:ca:02:5f:13:16:91:0f:bc: 79:ee:46:54:7f:ea:2b:90:b5:f9:fd:52:6a:0e:70:be: 4e:d5:db:14:66:e6:af:7e:87:cb:4f:56:1d:d2:d8:79: 87:b0:bb:12:5f:de:c6:5f:71:82:12:e4:36:d4:b9:5b: 56:8a:b6:8c:c7:56:66:db:d2:df:6b:22:bd:35:5e:fc: 77:c1:14:e8:97:a0:86:e1:f4:2c:72:83:4c:bf:54:44: e1:ee:ce:d7:4d:88:59:43:bb:84:d3:0f:ba:22:1d:a5: 12:77:1e:3f:88:7c:0f:bc:82:fb:72:e5:6c:66:e7:c7: 14:7b:c1:97:83:bd:a3:e5:30:a2:e4:39:16:fd:21:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:77:9b:00:d8:56:62:78:6c:b7:09:d1:ea:32:78:6e: 3b:f7:40:eb:a1:db:79:f9:e3:b7:a9:4c:a4:fb:50:73: d2:22:5c:ec:25:bc:c0:9a:4d:b0:ca:2a:5a:6a:63:27: 0b:95:ca:93:e6:20:da:b0:5a:1e:e8:76:ab:c3:8b:dd: 10:41:85:b4:6d:ca:9b:6c:e1:ad:54:59:11:e7:b3:be: 03:8f:32:c8:e6:d5:77:d2:ea:79:27:13:5d:db:04:6d: ac:c3:51:23:7a:f1:3d:17:fc:15:c2:7a:b2:68:04:8d: 37:e0:ab:1e:0e:3e:9f:02:d3:40:c6:15:6a:2e:f6:44: 9b:e3:55:ae:ef:01:3f:82:ca:9d:e2:13:6a:9b:61:58: 19:2f:c5:33:f7:75:f0:80:09:02:9b:3a:2b:2f:b3:ce: 25:20:55:0c:7a:d9:65:c7:52:eb:dd:07:64:85:3c:76: a2:a4:e7:7a:18:92:d0:df:dd:64:82:ab:3f:5e:75:1b: cc:08:79:9c:c0:3e:45:37:f7:a8:f8:4c:9c:37:05:fb: e1:c9:9b:65:f9:e2:8c:86:54:ea:e3:d4:42:6d:57:4f: d3:c0:07:d1:c0:a6:4f:aa:2d:b3:f6:e2:5d:27:ad:8f: da:94:29:d3:85:a7:c7:c1:c9:6c:a4:c3:32:c3:58:5d Fingerprint (SHA-256): C7:E3:88:42:B9:A5:6B:61:27:23:D0:00:06:4A:10:4D:8A:B5:AC:EE:8B:35:15:33:C1:90:DD:D2:80:38:42:55 Fingerprint (SHA1): BE:6D:EA:CB:92:57:CE:7A:82:C1:78:66:F7:EC:17:FC:5F:8E:0B:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145449 (0x49157ea9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:55:45 2024 Not After : Wed Dec 26 14:55:45 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a5:0a:4a:60:64:4a:8d:63:1c:eb:12:68:87:69:a6: 88:2c:25:0d:ce:89:bc:5c:33:5f:4d:7a:62:c7:c3:f1: ac:41:d3:07:29:07:b0:3a:f5:4e:c5:cb:d7:15:bf:89: c2:0b:dc:6b:c6:51:94:49:70:0a:dc:78:93:d1:f2:e9: 25:80:2c:4f:29:a2:0e:e2:43:03:61:26:4f:c1:f7:a5: 2d:ec:d1:95:17:8a:30:c3:b8:b1:a3:75:bb:fe:af:49: 89:1b:73:7b:b6:f0:95:11:08:9e:a5:2c:bd:59:db:4c: 92:14:75:ee:98:5c:8e:8c:ca:02:5f:13:16:91:0f:bc: 79:ee:46:54:7f:ea:2b:90:b5:f9:fd:52:6a:0e:70:be: 4e:d5:db:14:66:e6:af:7e:87:cb:4f:56:1d:d2:d8:79: 87:b0:bb:12:5f:de:c6:5f:71:82:12:e4:36:d4:b9:5b: 56:8a:b6:8c:c7:56:66:db:d2:df:6b:22:bd:35:5e:fc: 77:c1:14:e8:97:a0:86:e1:f4:2c:72:83:4c:bf:54:44: e1:ee:ce:d7:4d:88:59:43:bb:84:d3:0f:ba:22:1d:a5: 12:77:1e:3f:88:7c:0f:bc:82:fb:72:e5:6c:66:e7:c7: 14:7b:c1:97:83:bd:a3:e5:30:a2:e4:39:16:fd:21:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:77:9b:00:d8:56:62:78:6c:b7:09:d1:ea:32:78:6e: 3b:f7:40:eb:a1:db:79:f9:e3:b7:a9:4c:a4:fb:50:73: d2:22:5c:ec:25:bc:c0:9a:4d:b0:ca:2a:5a:6a:63:27: 0b:95:ca:93:e6:20:da:b0:5a:1e:e8:76:ab:c3:8b:dd: 10:41:85:b4:6d:ca:9b:6c:e1:ad:54:59:11:e7:b3:be: 03:8f:32:c8:e6:d5:77:d2:ea:79:27:13:5d:db:04:6d: ac:c3:51:23:7a:f1:3d:17:fc:15:c2:7a:b2:68:04:8d: 37:e0:ab:1e:0e:3e:9f:02:d3:40:c6:15:6a:2e:f6:44: 9b:e3:55:ae:ef:01:3f:82:ca:9d:e2:13:6a:9b:61:58: 19:2f:c5:33:f7:75:f0:80:09:02:9b:3a:2b:2f:b3:ce: 25:20:55:0c:7a:d9:65:c7:52:eb:dd:07:64:85:3c:76: a2:a4:e7:7a:18:92:d0:df:dd:64:82:ab:3f:5e:75:1b: cc:08:79:9c:c0:3e:45:37:f7:a8:f8:4c:9c:37:05:fb: e1:c9:9b:65:f9:e2:8c:86:54:ea:e3:d4:42:6d:57:4f: d3:c0:07:d1:c0:a6:4f:aa:2d:b3:f6:e2:5d:27:ad:8f: da:94:29:d3:85:a7:c7:c1:c9:6c:a4:c3:32:c3:58:5d Fingerprint (SHA-256): C7:E3:88:42:B9:A5:6B:61:27:23:D0:00:06:4A:10:4D:8A:B5:AC:EE:8B:35:15:33:C1:90:DD:D2:80:38:42:55 Fingerprint (SHA1): BE:6D:EA:CB:92:57:CE:7A:82:C1:78:66:F7:EC:17:FC:5F:8E:0B:51 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145456 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145457 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1226145458 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1226145459 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1226145460 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1226145461 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145462 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145463 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145464 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145465 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145456 (0x49157eb0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:55:51 2024 Not After : Wed Dec 26 14:55:51 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:fe:d7:a6:70:f1:68:fc:1e:a9:c1:45:d0:70:38:09: a0:8a:41:54:22:af:68:69:a4:82:48:33:0c:6b:d5:03: 0a:16:db:47:26:07:c5:c7:fc:17:1a:b9:3b:61:11:38: 3a:2c:de:f0:28:1b:54:f5:d2:5d:64:bc:6f:5e:be:8b: 25:c1:90:39:c7:c3:18:c1:e2:01:4d:0c:6d:79:47:95: 94:d1:97:58:48:1e:9a:7e:8c:0a:78:76:b4:0e:af:cb: b1:99:0d:19:15:d6:71:28:28:bb:52:86:a5:8e:61:67: 96:af:c5:57:e2:76:15:81:7e:d3:35:4d:9f:85:fe:99: 63:f7:aa:bd:0d:99:c1:26:0b:79:ee:b0:96:97:bb:49: c1:bf:dd:a0:62:83:6f:7e:a3:1c:aa:18:ab:98:fd:d5: f8:bf:e9:cb:55:14:a7:aa:d6:0a:30:11:d1:e4:c7:4b: 00:fd:32:af:02:5f:f7:52:12:d2:77:e7:71:dd:d4:f5: dc:d1:95:f1:da:e4:82:36:c1:80:c2:b7:d1:f3:e6:d5: d3:74:dd:67:b1:3c:da:7b:ec:59:52:66:83:37:0f:66: 2a:47:9a:ba:3f:05:20:bf:eb:fb:ef:e9:f3:f3:62:da: 00:44:f0:2c:0f:47:e3:64:2a:05:60:66:d5:79:03:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:f7:55:2c:5d:6f:ec:ee:39:ed:9e:0c:15:67:28:cc: f8:b2:07:1b:69:99:3d:da:af:8a:72:d4:04:0e:c6:2e: e4:33:60:e0:78:81:3e:35:d6:4a:74:2a:e7:0c:9f:4e: 5e:10:5f:c3:38:2c:b5:49:13:35:f3:6a:3a:aa:e1:39: b7:4a:ed:21:d4:9a:e9:15:b6:f5:8b:de:cb:c4:ec:bf: 1d:41:b8:10:eb:cd:82:c9:05:0d:b3:d6:19:17:dc:a2: 43:4e:a0:84:53:6b:2a:e2:12:99:ff:2e:8f:2a:79:ba: df:44:4a:91:e3:4e:dc:21:3b:29:8c:a0:ba:4c:bd:d3: dd:b5:1a:77:a4:a3:72:35:96:08:6e:a8:18:fd:fe:ec: 98:b9:11:91:54:37:8e:27:8c:4c:de:cd:a4:0f:f3:3f: 08:7b:27:c1:96:a2:1f:b6:c9:1b:5b:10:79:cd:02:cf: cf:7c:e3:97:d4:fc:f5:e3:44:59:a6:bf:27:2d:64:2b: d3:54:43:4f:aa:f0:bb:5f:37:f6:43:6b:cf:30:cc:17: 4b:d9:46:ea:20:2c:2d:5c:4c:fa:c5:0e:ef:3c:58:4b: 08:61:f9:aa:2b:67:72:d5:77:c8:b8:08:81:fb:f4:f7: 8f:a5:b9:f1:49:d4:94:16:73:34:e9:4b:8e:fd:3a:43 Fingerprint (SHA-256): 72:E5:A0:4E:33:50:F4:DB:77:63:D1:35:74:AE:0A:89:95:0D:CE:28:B9:3C:76:9F:2C:14:FA:9B:50:CD:D2:14 Fingerprint (SHA1): 3F:A7:50:7A:11:0E:A1:70:44:74:F4:74:2D:32:82:48:98:59:82:2D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145457 (0x49157eb1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:55:52 2024 Not After : Wed Dec 26 14:55:52 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:ba:d1:84:0c:21:0a:55:46:44:fa:14:3f:27:bf:84: af:80:1e:ca:a2:e2:72:55:c6:38:a6:97:07:1a:d8:d3: f4:da:0b:6a:a7:94:ed:ab:54:99:91:01:19:a2:f8:30: f4:5e:c2:75:a7:ac:d2:b6:f6:74:04:ab:20:22:3c:ce: a0:12:c6:ee:db:37:2a:c3:72:83:73:47:35:57:d6:31: 38:81:46:7f:82:2e:28:87:88:a1:d8:8e:fc:72:7b:de: 65:25:e1:db:77:39:14:91:8c:24:e7:e1:87:88:5a:2d: ed:bc:01:ee:88:b2:16:45:bd:b2:6c:fc:05:f4:6f:8b: 01:1b:c2:61:45:3e:ba:ab:5d:c1:16:ca:35:d0:9b:af: 47:33:56:68:a9:c1:02:48:54:5e:e9:18:9e:e8:8e:c6: f0:f5:a9:4a:b2:88:36:b2:ac:4c:1d:df:43:82:22:4c: 10:0c:6a:a0:4d:2d:ab:c9:23:72:35:53:b7:01:66:17: 31:bc:07:8f:8f:47:b5:37:6d:9a:a8:91:56:bb:c3:11: 56:19:00:23:5d:a8:e6:99:03:0a:e1:3b:ee:41:a4:a4: d3:4a:d2:8d:fa:8f:10:75:d6:d7:6a:26:ec:37:3e:8c: 28:15:e5:cf:48:5d:a7:4b:77:92:cc:d4:8d:11:ef:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:b2:05:84:b7:07:f1:8f:75:39:c0:59:6f:97:d9:1c: 84:e3:37:a6:9f:36:45:f7:42:47:e5:aa:8d:01:e5:28: 49:40:7c:87:c8:f4:b4:01:d3:53:b5:9d:f3:a4:a9:dc: d9:6b:cc:5d:68:18:a8:d5:17:9a:18:76:02:83:72:9c: f3:94:21:e3:d1:ae:45:8d:b3:cc:4b:74:2e:80:11:24: e9:0c:be:99:ac:64:26:60:20:1e:3f:ef:da:32:25:b9: a4:3b:35:00:7c:a0:be:ea:59:25:91:03:8e:86:10:e1: bc:c7:9f:e0:fd:f6:cc:49:f1:30:57:db:78:10:f8:ae: 7a:d2:b8:02:b4:f9:d3:97:fc:f8:ca:71:93:b0:c2:ba: 40:64:58:26:31:c7:93:99:b7:c8:71:d6:78:1f:45:03: 8e:90:40:21:66:5e:ab:a9:10:32:a0:a6:df:bb:02:e9: ef:bd:96:08:71:62:88:25:ea:4e:31:d6:4b:3d:0d:83: d4:4c:be:e6:78:47:e9:8b:81:6b:a6:06:57:6b:01:a1: 4c:c0:bc:5c:25:b6:0a:f9:e8:48:d5:bc:95:d5:22:37: 63:0a:74:4c:e7:37:8e:a6:31:e0:c6:b3:36:de:7a:b5: ba:0b:c6:8f:8c:d4:71:0e:05:e6:d8:be:b5:63:d3:5e Fingerprint (SHA-256): 7B:43:E7:87:2E:DF:27:87:F6:D2:AD:AE:1E:B8:13:A7:A3:5E:58:12:24:51:4C:FF:D3:15:14:4D:FC:BC:FE:3D Fingerprint (SHA1): 89:4F:94:DF:7F:67:8A:BB:F3:29:98:2F:84:8D:89:B9:64:4D:97:6D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145466 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145467 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145468 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1226145469 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145470 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1226145471 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1226145472 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1226145473 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1226145474 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145466 (0x49157eba) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:00 2024 Not After : Wed Dec 26 14:56:00 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 11:ac:7b:5f:23:18:8f:1f:13:2a:5e:ac:fb:71:ba:a7: 80:b7:17:03:e3:91:10:4c:26:ae:f6:cc:11:cb:de:4a: 90:3c:38:46:ce:0a:d8:4f:eb:7c:0b:3d:27:c0:1b:37: ff:33:34:13:43:11:8b:08:80:05:38:c3:db:c7:05:0c: 4b:6c:25:fa:4d:69:c6:5f:c0:93:8e:f8:24:98:b7:7a: 8c:81:e2:89:bc:8c:95:13:ac:18:95:7c:05:66:82:eb: 1c:04:c0:93:e6:f5:04:fc:ea:24:2c:08:69:27:b3:ec: 20:b4:7c:f8:b3:10:af:be:b9:1e:57:4a:c0:3f:d2:5f: 6e:1b:21:d9:e1:2a:8a:f3:1e:84:46:e9:26:7c:39:c3: d8:13:50:80:3f:98:f0:41:27:f7:c7:6a:98:35:a8:b6: ec:d1:b9:69:0c:39:71:85:67:29:73:a7:83:46:a8:81: 77:03:19:dd:a6:eb:48:ab:df:a4:2c:6b:1e:78:b4:49: f0:82:99:1a:9e:20:6a:d6:89:9b:41:c1:a3:b9:02:4d: bc:30:b8:4e:db:82:14:18:ef:b4:a1:f1:bb:4d:4f:13: 04:5b:89:39:f6:2f:b4:1f:25:98:45:a3:ed:07:69:6b: f5:95:f8:de:a3:4f:b5:74:d9:0c:ab:ab:30:e1:25:ec Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:14:a7:45:b5:9d:2d:96:24:97:a9:cc:5c: 05:3d:bd:cf:21:4f:13:c0:4b:4d:48:91:d0:f6:d8:95: 02:1d:00:8a:bd:c0:5e:f3:24:12:5a:1c:8d:40:a2:ff: 2e:a5:3c:84:55:ee:71:49:ff:a4:13:b7:00:19:c7 Fingerprint (SHA-256): 84:9D:ED:CC:66:6D:48:12:36:45:4F:12:37:E0:1A:50:5C:55:16:83:56:B2:FE:9E:09:ED:9D:88:FF:5B:C8:C7 Fingerprint (SHA1): C8:69:D1:45:D9:63:D4:C1:20:D6:21:B6:78:37:F3:0F:F1:DA:43:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145466 (0x49157eba) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:00 2024 Not After : Wed Dec 26 14:56:00 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 11:ac:7b:5f:23:18:8f:1f:13:2a:5e:ac:fb:71:ba:a7: 80:b7:17:03:e3:91:10:4c:26:ae:f6:cc:11:cb:de:4a: 90:3c:38:46:ce:0a:d8:4f:eb:7c:0b:3d:27:c0:1b:37: ff:33:34:13:43:11:8b:08:80:05:38:c3:db:c7:05:0c: 4b:6c:25:fa:4d:69:c6:5f:c0:93:8e:f8:24:98:b7:7a: 8c:81:e2:89:bc:8c:95:13:ac:18:95:7c:05:66:82:eb: 1c:04:c0:93:e6:f5:04:fc:ea:24:2c:08:69:27:b3:ec: 20:b4:7c:f8:b3:10:af:be:b9:1e:57:4a:c0:3f:d2:5f: 6e:1b:21:d9:e1:2a:8a:f3:1e:84:46:e9:26:7c:39:c3: d8:13:50:80:3f:98:f0:41:27:f7:c7:6a:98:35:a8:b6: ec:d1:b9:69:0c:39:71:85:67:29:73:a7:83:46:a8:81: 77:03:19:dd:a6:eb:48:ab:df:a4:2c:6b:1e:78:b4:49: f0:82:99:1a:9e:20:6a:d6:89:9b:41:c1:a3:b9:02:4d: bc:30:b8:4e:db:82:14:18:ef:b4:a1:f1:bb:4d:4f:13: 04:5b:89:39:f6:2f:b4:1f:25:98:45:a3:ed:07:69:6b: f5:95:f8:de:a3:4f:b5:74:d9:0c:ab:ab:30:e1:25:ec Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:14:a7:45:b5:9d:2d:96:24:97:a9:cc:5c: 05:3d:bd:cf:21:4f:13:c0:4b:4d:48:91:d0:f6:d8:95: 02:1d:00:8a:bd:c0:5e:f3:24:12:5a:1c:8d:40:a2:ff: 2e:a5:3c:84:55:ee:71:49:ff:a4:13:b7:00:19:c7 Fingerprint (SHA-256): 84:9D:ED:CC:66:6D:48:12:36:45:4F:12:37:E0:1A:50:5C:55:16:83:56:B2:FE:9E:09:ED:9D:88:FF:5B:C8:C7 Fingerprint (SHA1): C8:69:D1:45:D9:63:D4:C1:20:D6:21:B6:78:37:F3:0F:F1:DA:43:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145466 (0x49157eba) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:00 2024 Not After : Wed Dec 26 14:56:00 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 11:ac:7b:5f:23:18:8f:1f:13:2a:5e:ac:fb:71:ba:a7: 80:b7:17:03:e3:91:10:4c:26:ae:f6:cc:11:cb:de:4a: 90:3c:38:46:ce:0a:d8:4f:eb:7c:0b:3d:27:c0:1b:37: ff:33:34:13:43:11:8b:08:80:05:38:c3:db:c7:05:0c: 4b:6c:25:fa:4d:69:c6:5f:c0:93:8e:f8:24:98:b7:7a: 8c:81:e2:89:bc:8c:95:13:ac:18:95:7c:05:66:82:eb: 1c:04:c0:93:e6:f5:04:fc:ea:24:2c:08:69:27:b3:ec: 20:b4:7c:f8:b3:10:af:be:b9:1e:57:4a:c0:3f:d2:5f: 6e:1b:21:d9:e1:2a:8a:f3:1e:84:46:e9:26:7c:39:c3: d8:13:50:80:3f:98:f0:41:27:f7:c7:6a:98:35:a8:b6: ec:d1:b9:69:0c:39:71:85:67:29:73:a7:83:46:a8:81: 77:03:19:dd:a6:eb:48:ab:df:a4:2c:6b:1e:78:b4:49: f0:82:99:1a:9e:20:6a:d6:89:9b:41:c1:a3:b9:02:4d: bc:30:b8:4e:db:82:14:18:ef:b4:a1:f1:bb:4d:4f:13: 04:5b:89:39:f6:2f:b4:1f:25:98:45:a3:ed:07:69:6b: f5:95:f8:de:a3:4f:b5:74:d9:0c:ab:ab:30:e1:25:ec Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:14:a7:45:b5:9d:2d:96:24:97:a9:cc:5c: 05:3d:bd:cf:21:4f:13:c0:4b:4d:48:91:d0:f6:d8:95: 02:1d:00:8a:bd:c0:5e:f3:24:12:5a:1c:8d:40:a2:ff: 2e:a5:3c:84:55:ee:71:49:ff:a4:13:b7:00:19:c7 Fingerprint (SHA-256): 84:9D:ED:CC:66:6D:48:12:36:45:4F:12:37:E0:1A:50:5C:55:16:83:56:B2:FE:9E:09:ED:9D:88:FF:5B:C8:C7 Fingerprint (SHA1): C8:69:D1:45:D9:63:D4:C1:20:D6:21:B6:78:37:F3:0F:F1:DA:43:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145466 (0x49157eba) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:00 2024 Not After : Wed Dec 26 14:56:00 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 11:ac:7b:5f:23:18:8f:1f:13:2a:5e:ac:fb:71:ba:a7: 80:b7:17:03:e3:91:10:4c:26:ae:f6:cc:11:cb:de:4a: 90:3c:38:46:ce:0a:d8:4f:eb:7c:0b:3d:27:c0:1b:37: ff:33:34:13:43:11:8b:08:80:05:38:c3:db:c7:05:0c: 4b:6c:25:fa:4d:69:c6:5f:c0:93:8e:f8:24:98:b7:7a: 8c:81:e2:89:bc:8c:95:13:ac:18:95:7c:05:66:82:eb: 1c:04:c0:93:e6:f5:04:fc:ea:24:2c:08:69:27:b3:ec: 20:b4:7c:f8:b3:10:af:be:b9:1e:57:4a:c0:3f:d2:5f: 6e:1b:21:d9:e1:2a:8a:f3:1e:84:46:e9:26:7c:39:c3: d8:13:50:80:3f:98:f0:41:27:f7:c7:6a:98:35:a8:b6: ec:d1:b9:69:0c:39:71:85:67:29:73:a7:83:46:a8:81: 77:03:19:dd:a6:eb:48:ab:df:a4:2c:6b:1e:78:b4:49: f0:82:99:1a:9e:20:6a:d6:89:9b:41:c1:a3:b9:02:4d: bc:30:b8:4e:db:82:14:18:ef:b4:a1:f1:bb:4d:4f:13: 04:5b:89:39:f6:2f:b4:1f:25:98:45:a3:ed:07:69:6b: f5:95:f8:de:a3:4f:b5:74:d9:0c:ab:ab:30:e1:25:ec Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:14:a7:45:b5:9d:2d:96:24:97:a9:cc:5c: 05:3d:bd:cf:21:4f:13:c0:4b:4d:48:91:d0:f6:d8:95: 02:1d:00:8a:bd:c0:5e:f3:24:12:5a:1c:8d:40:a2:ff: 2e:a5:3c:84:55:ee:71:49:ff:a4:13:b7:00:19:c7 Fingerprint (SHA-256): 84:9D:ED:CC:66:6D:48:12:36:45:4F:12:37:E0:1A:50:5C:55:16:83:56:B2:FE:9E:09:ED:9D:88:FF:5B:C8:C7 Fingerprint (SHA1): C8:69:D1:45:D9:63:D4:C1:20:D6:21:B6:78:37:F3:0F:F1:DA:43:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226145611Z nextupdate=20251226145611Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 14:56:11 2024 Next Update: Fri Dec 26 14:56:11 2025 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145612Z nextupdate=20251226145612Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:56:12 2024 Next Update: Fri Dec 26 14:56:12 2025 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226145612Z nextupdate=20251226145612Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 14:56:12 2024 Next Update: Fri Dec 26 14:56:12 2025 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226145612Z nextupdate=20251226145612Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 14:56:12 2024 Next Update: Fri Dec 26 14:56:12 2025 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226145613Z addcert 14 20241226145613Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 14:56:13 2024 Next Update: Fri Dec 26 14:56:12 2025 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Thu Dec 26 14:56:13 2024 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145614Z addcert 15 20241226145614Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:56:14 2024 Next Update: Fri Dec 26 14:56:12 2025 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Thu Dec 26 14:56:14 2024 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:06 2024 Not After : Wed Dec 26 14:56:06 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:a2:e3:e1:c8:9c:04:ba:d9:25:71:53:25:a1:55:0c: bd:94:ed:8f:ab:07:3b:93:31:33:60:b1:6e:8d:2d:79: 51:ca:0a:05:5c:e0:77:ba:08:cc:f0:8d:66:2e:01:6c: 63:6f:06:27:ee:b3:ce:52:3f:b4:8d:5a:d8:a4:e7:f7: 25:66:22:ef:23:8d:01:a3:d2:76:14:87:f1:ad:96:13: 11:63:c7:70:bf:4c:a0:4d:d4:2e:9a:bd:e2:10:a5:52: 01:ad:c2:f6:80:79:9e:28:02:9a:0d:4e:70:ef:fb:eb: 0f:08:de:7f:ea:e9:06:68:73:ca:61:37:2a:f6:cc:56: e5:33:b2:7e:ed:e5:d7:82:0e:71:ed:7c:59:24:cf:3c: ba:89:81:5d:1f:27:27:f9:a1:81:27:9f:50:b2:bf:6c: 7f:fa:70:17:58:11:cc:50:43:38:ab:91:84:07:ec:48: 5c:d0:4c:3b:82:4b:b4:4e:18:b0:a3:19:b1:a1:ea:c5: 1e:cd:de:5b:46:25:00:f4:22:0e:7f:3b:31:da:b2:66: 03:54:b8:8d:26:d6:58:6b:2b:53:2c:e1:0e:7d:58:67: d9:da:0d:96:3b:98:a1:db:c7:96:31:4c:77:3f:4c:b0: f6:34:c3:61:18:c5:6c:63:82:19:ea:b3:f3:99:cb:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:5e:e9:f6:77:cd:81:87:45:b3:98:b5:fb:3e:a8:5f: 20:b9:09:ad:2e:ca:34:57:d0:ce:66:c0:5a:34:9f:d7: 91:07:e8:33:02:9d:93:6c:be:c5:31:33:22:2a:c9:34: 99:df:e4:ee:0e:40:ff:d8:cd:77:50:80:01:76:36:5b: 30:a3:6f:3a:d1:bf:6d:9e:1c:34:da:43:be:2d:3b:6f: 5e:b8:21:8d:be:24:e8:90:d1:8c:ca:7c:1a:08:e0:89: 93:0b:76:09:95:57:1f:2c:bc:2e:d8:f7:4e:c0:92:7d: f7:f4:aa:e8:11:46:b8:4f:a9:38:f5:4a:27:59:13:f4: 9b:b2:88:8e:7b:ed:66:84:d0:a8:75:b1:12:10:b8:f7: 48:69:60:a1:f3:2c:e5:44:65:50:0d:53:fa:78:2f:4a: dd:26:88:88:03:7a:16:5e:8d:48:8e:23:9a:bf:f0:e6: 57:50:c1:c4:cc:d6:05:9a:62:26:af:9c:65:cc:6c:24: 4c:ec:9c:2f:3c:50:0c:5e:b9:12:a2:96:5b:53:66:ae: e2:9f:73:47:61:45:9c:ec:d9:7c:74:bb:a5:e4:a4:21: c6:8f:b9:d8:fc:d7:00:5a:cc:13:30:ce:5a:65:60:fe: dc:b9:ff:2a:e3:58:eb:cb:72:54:0f:b2:87:e4:34:f4 Fingerprint (SHA-256): 48:69:86:51:A5:3A:0B:11:A2:73:8D:73:30:84:81:96:AA:44:B9:75:F4:D1:BA:B7:03:76:66:C2:77:16:BC:CA Fingerprint (SHA1): F2:C9:AA:76:33:C5:2A:54:20:C1:52:9E:56:14:74:E6:FA:88:8D:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:06 2024 Not After : Wed Dec 26 14:56:06 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:a2:e3:e1:c8:9c:04:ba:d9:25:71:53:25:a1:55:0c: bd:94:ed:8f:ab:07:3b:93:31:33:60:b1:6e:8d:2d:79: 51:ca:0a:05:5c:e0:77:ba:08:cc:f0:8d:66:2e:01:6c: 63:6f:06:27:ee:b3:ce:52:3f:b4:8d:5a:d8:a4:e7:f7: 25:66:22:ef:23:8d:01:a3:d2:76:14:87:f1:ad:96:13: 11:63:c7:70:bf:4c:a0:4d:d4:2e:9a:bd:e2:10:a5:52: 01:ad:c2:f6:80:79:9e:28:02:9a:0d:4e:70:ef:fb:eb: 0f:08:de:7f:ea:e9:06:68:73:ca:61:37:2a:f6:cc:56: e5:33:b2:7e:ed:e5:d7:82:0e:71:ed:7c:59:24:cf:3c: ba:89:81:5d:1f:27:27:f9:a1:81:27:9f:50:b2:bf:6c: 7f:fa:70:17:58:11:cc:50:43:38:ab:91:84:07:ec:48: 5c:d0:4c:3b:82:4b:b4:4e:18:b0:a3:19:b1:a1:ea:c5: 1e:cd:de:5b:46:25:00:f4:22:0e:7f:3b:31:da:b2:66: 03:54:b8:8d:26:d6:58:6b:2b:53:2c:e1:0e:7d:58:67: d9:da:0d:96:3b:98:a1:db:c7:96:31:4c:77:3f:4c:b0: f6:34:c3:61:18:c5:6c:63:82:19:ea:b3:f3:99:cb:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:5e:e9:f6:77:cd:81:87:45:b3:98:b5:fb:3e:a8:5f: 20:b9:09:ad:2e:ca:34:57:d0:ce:66:c0:5a:34:9f:d7: 91:07:e8:33:02:9d:93:6c:be:c5:31:33:22:2a:c9:34: 99:df:e4:ee:0e:40:ff:d8:cd:77:50:80:01:76:36:5b: 30:a3:6f:3a:d1:bf:6d:9e:1c:34:da:43:be:2d:3b:6f: 5e:b8:21:8d:be:24:e8:90:d1:8c:ca:7c:1a:08:e0:89: 93:0b:76:09:95:57:1f:2c:bc:2e:d8:f7:4e:c0:92:7d: f7:f4:aa:e8:11:46:b8:4f:a9:38:f5:4a:27:59:13:f4: 9b:b2:88:8e:7b:ed:66:84:d0:a8:75:b1:12:10:b8:f7: 48:69:60:a1:f3:2c:e5:44:65:50:0d:53:fa:78:2f:4a: dd:26:88:88:03:7a:16:5e:8d:48:8e:23:9a:bf:f0:e6: 57:50:c1:c4:cc:d6:05:9a:62:26:af:9c:65:cc:6c:24: 4c:ec:9c:2f:3c:50:0c:5e:b9:12:a2:96:5b:53:66:ae: e2:9f:73:47:61:45:9c:ec:d9:7c:74:bb:a5:e4:a4:21: c6:8f:b9:d8:fc:d7:00:5a:cc:13:30:ce:5a:65:60:fe: dc:b9:ff:2a:e3:58:eb:cb:72:54:0f:b2:87:e4:34:f4 Fingerprint (SHA-256): 48:69:86:51:A5:3A:0B:11:A2:73:8D:73:30:84:81:96:AA:44:B9:75:F4:D1:BA:B7:03:76:66:C2:77:16:BC:CA Fingerprint (SHA1): F2:C9:AA:76:33:C5:2A:54:20:C1:52:9E:56:14:74:E6:FA:88:8D:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9535 -q -t 20 chains.sh: #914: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #915: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #916: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #917: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #918: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145617Z nextupdate=20251226145617Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:56:17 2024 Next Update: Fri Dec 26 14:56:17 2025 CRL Extensions: chains.sh: #919: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145618Z addcert 3 20241226145618Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:56:18 2024 Next Update: Fri Dec 26 14:56:17 2025 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 14:56:18 2024 CRL Extensions: chains.sh: #920: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145619Z addcert 4 20241226145619Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:56:19 2024 Next Update: Fri Dec 26 14:56:17 2025 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Thu Dec 26 14:56:19 2024 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 14:56:18 2024 CRL Extensions: chains.sh: #921: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #922: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #923: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #924: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #925: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #926: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #927: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #928: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #929: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #930: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #931: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #932: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #933: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #934: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:32 2024 Not After : Wed Dec 26 14:53:32 2029 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:a6:8c:06:ff:d5:8b:08:1c:e3:3d:cb:6b:72:7a:a1: 0f:b9:a6:a1:84:8c:81:e3:50:0f:fa:92:0a:e1:18:33: 3d:59:b8:61:b5:a0:1e:55:31:f4:00:4e:9b:2c:d7:c3: 13:b9:52:94:3a:ce:79:f3:7c:43:86:d2:f8:68:5c:8f: 2b:47:24:5e:2b:35:4d:58:1c:30:79:a7:d6:e4:a3:e4: f4:a0:bb:92:89:c3:77:9c:2f:ff:7a:05:15:40:75:8e: fa:23:5f:20:28:5a:80:d7:37:52:41:c5:40:ff:94:24: e3:9d:24:91:62:1d:7a:8d:8f:c2:f0:99:5a:21:09:63: c8:89:c1:e3:6c:8d:30:bb:37:6b:57:09:b9:71:d2:e1: 7b:66:ab:ef:fa:83:3f:20:c9:35:a6:ac:57:37:aa:23: 73:1a:22:b6:5d:d4:07:8e:0e:2f:e6:a0:fe:92:d2:ea: 81:53:9a:fc:75:57:b6:9e:7e:ce:bb:59:53:89:9d:04: 24:f4:cb:c2:a1:e4:9e:ed:36:34:a8:32:3e:87:fa:ad: 6e:bb:9f:7c:95:77:2e:52:26:0d:73:a9:9b:98:ba:f2: e6:c9:88:fd:e5:26:ea:08:39:b4:57:a8:c6:f2:fa:46: f7:96:15:68:3e:3e:14:db:92:4c:96:e9:66:90:06:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9535/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:e8:2c:6b:8a:81:07:1d:1c:3e:7f:66:ec:57:a1:1b: c6:07:b4:66:e5:ca:2c:62:25:fe:a0:7c:11:05:06:d8: 08:56:50:08:af:2d:ad:54:e0:67:dd:72:67:37:dd:7a: f0:fc:f0:7d:24:1c:71:08:22:12:12:df:ba:ec:8d:44: 88:51:9c:25:d9:76:3c:81:98:a8:76:d3:bd:ea:ab:9f: 7b:e4:d1:bd:9c:e7:f6:34:02:27:b3:4c:0b:51:b2:38: 15:9e:d8:56:e1:c5:03:8f:6d:82:5b:e9:c0:17:39:76: 6b:1e:c2:2b:ac:ff:6d:39:e4:b5:1a:d1:99:3c:16:e1: be:40:d8:98:c6:e4:a6:10:ed:d1:95:f8:83:16:fe:83: 7b:9b:ac:34:d7:8d:46:18:a6:76:8c:53:f4:fd:e5:b2: 0b:1a:f4:4e:c4:3c:25:89:17:a4:22:05:c9:6c:83:dd: 09:2d:5f:22:64:95:fc:19:85:41:76:be:6f:78:ae:03: 21:3d:2f:ce:c1:09:13:b8:75:77:df:09:f3:8a:07:c2: b9:4f:04:cb:2a:74:e1:c6:1d:ba:ff:14:1c:42:10:94: 74:f9:4b:b9:fa:1c:72:b2:86:ff:61:2b:5c:14:be:5e: a8:f4:30:10:b7:23:6c:65:0e:09:cf:b6:f1:be:16:dd Fingerprint (SHA-256): 70:93:0C:46:0E:61:B9:C4:18:86:16:D0:04:74:5B:1D:0E:F9:A3:87:48:39:CA:5D:51:0B:76:98:06:28:64:DD Fingerprint (SHA1): 9D:E2:9E:AA:F5:38:27:30:35:12:D1:34:4D:E6:F4:2E:A8:66:E8:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #935: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #936: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #937: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #938: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #939: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #940: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #941: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #942: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145475 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #944: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #945: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #946: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1226145476 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #947: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #948: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #949: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145352.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #950: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145335.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #951: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #953: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145352.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #954: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1226145477 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #955: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #956: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #957: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145352.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #958: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145336.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #959: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #960: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #961: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1226145478 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #963: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #965: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145352.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #966: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145337.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #967: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #969: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145352.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #970: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145338.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #971: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226145628Z nextupdate=20251226145628Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 14:56:28 2024 Next Update: Fri Dec 26 14:56:28 2025 CRL Extensions: chains.sh: #973: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145628Z nextupdate=20251226145628Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:56:28 2024 Next Update: Fri Dec 26 14:56:28 2025 CRL Extensions: chains.sh: #974: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226145628Z nextupdate=20251226145628Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 14:56:28 2024 Next Update: Fri Dec 26 14:56:28 2025 CRL Extensions: chains.sh: #975: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226145629Z nextupdate=20251226145629Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 14:56:29 2024 Next Update: Fri Dec 26 14:56:29 2025 CRL Extensions: chains.sh: #976: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145630Z addcert 20 20241226145630Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:56:30 2024 Next Update: Fri Dec 26 14:56:28 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 14:56:30 2024 CRL Extensions: chains.sh: #977: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145631Z addcert 40 20241226145631Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:56:31 2024 Next Update: Fri Dec 26 14:56:28 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 14:56:30 2024 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Thu Dec 26 14:56:31 2024 CRL Extensions: chains.sh: #978: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #979: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #980: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #981: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145475 (0x49157ec3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:22 2024 Not After : Wed Dec 26 14:56:22 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:77:e9:90:b5:3e:15:96:4b:7d:b9:f4:c3:d4:11:0c: b4:e5:f5:6e:d6:36:a7:71:29:e5:4c:36:09:b9:ab:d3: b6:b5:a2:61:2a:50:b4:6e:05:d7:e4:ba:3a:24:f6:3f: 3a:8f:83:e6:54:59:06:7d:30:7d:a1:41:71:b6:6b:15: fc:e7:13:42:21:9e:f1:1d:f3:f0:60:06:86:79:16:be: c3:a1:68:0b:6c:fa:b0:fc:3a:74:f3:4c:48:dd:b9:95: c0:3a:42:ae:ed:57:8f:f6:fc:e0:06:a6:9b:89:d2:29: a2:a3:4b:46:25:ce:81:c5:aa:a7:d0:4a:30:27:94:87: ce:52:b3:60:d0:20:5a:cd:55:dc:f6:bf:3d:e8:7d:14: 91:5e:32:39:9d:b0:06:7b:23:15:36:71:be:e2:fa:61: 4b:9e:62:a7:ed:1b:8c:e4:fe:5e:6e:75:95:b8:3a:42: 12:86:f7:8c:2b:1e:be:43:40:c1:fe:5a:1c:6a:c2:8c: 09:36:01:dd:66:d3:64:07:ac:26:5f:05:3f:91:51:f6: d2:a2:bf:97:77:7c:4a:d6:ff:67:06:94:aa:57:d6:1b: 85:24:55:20:b3:1d:94:c2:5a:e2:59:c5:4b:a7:35:57: 0f:ed:ea:95:71:6c:6a:82:9c:96:a8:62:38:a8:1a:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:7c:ef:48:b5:1c:f0:27:23:c1:8f:22:e3:99:aa:e7: cf:1f:00:91:06:7b:95:dd:92:f1:0e:88:40:2c:71:59: 90:c7:5b:78:64:c1:25:b9:3d:55:9b:ae:a1:26:c4:91: e3:90:0a:20:b1:20:5e:2e:c7:4e:7b:1f:56:19:06:0c: 71:bd:59:b7:71:12:df:06:c9:89:d3:a6:56:64:67:b7: a7:15:88:10:6f:26:8c:68:4e:fa:bb:09:4c:27:56:f9: f9:70:ac:42:41:26:e8:da:a7:cc:3c:d3:36:b6:25:1c: 4f:31:c3:c2:5d:cc:8a:47:fb:05:b3:d2:36:be:bf:ca: 5c:ad:67:ab:8a:76:71:55:a3:04:f7:42:64:d7:45:34: 82:b8:d5:9b:1a:18:32:7a:b8:17:06:29:cd:91:0e:a9: b8:b5:18:0c:02:51:ea:5b:9b:06:c7:f6:31:1f:c4:f5: 14:5f:4f:f8:16:6d:e7:fb:a3:ef:1a:88:13:b3:53:7c: 07:85:c3:94:e8:48:ae:4e:a7:3e:df:93:6a:5c:0b:bb: ac:94:6c:cc:6e:f8:fc:c4:1e:74:a2:f3:1b:59:f8:c5: 1c:c6:a8:56:d8:d8:17:7d:da:dd:30:34:b7:78:e6:25: ac:32:f0:66:4c:6c:2f:3f:ec:21:d7:54:93:e9:24:5a Fingerprint (SHA-256): 6E:36:62:B8:DE:7D:88:BB:23:67:97:70:5E:C2:50:9B:1C:FB:C3:1C:7B:66:63:42:D4:A5:FB:B7:21:8E:F3:A5 Fingerprint (SHA1): E5:F6:D4:54:35:18:EA:C9:F8:5A:E8:BA:5E:80:7A:68:FD:65:50:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #982: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #983: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145475 (0x49157ec3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:56:22 2024 Not After : Wed Dec 26 14:56:22 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:77:e9:90:b5:3e:15:96:4b:7d:b9:f4:c3:d4:11:0c: b4:e5:f5:6e:d6:36:a7:71:29:e5:4c:36:09:b9:ab:d3: b6:b5:a2:61:2a:50:b4:6e:05:d7:e4:ba:3a:24:f6:3f: 3a:8f:83:e6:54:59:06:7d:30:7d:a1:41:71:b6:6b:15: fc:e7:13:42:21:9e:f1:1d:f3:f0:60:06:86:79:16:be: c3:a1:68:0b:6c:fa:b0:fc:3a:74:f3:4c:48:dd:b9:95: c0:3a:42:ae:ed:57:8f:f6:fc:e0:06:a6:9b:89:d2:29: a2:a3:4b:46:25:ce:81:c5:aa:a7:d0:4a:30:27:94:87: ce:52:b3:60:d0:20:5a:cd:55:dc:f6:bf:3d:e8:7d:14: 91:5e:32:39:9d:b0:06:7b:23:15:36:71:be:e2:fa:61: 4b:9e:62:a7:ed:1b:8c:e4:fe:5e:6e:75:95:b8:3a:42: 12:86:f7:8c:2b:1e:be:43:40:c1:fe:5a:1c:6a:c2:8c: 09:36:01:dd:66:d3:64:07:ac:26:5f:05:3f:91:51:f6: d2:a2:bf:97:77:7c:4a:d6:ff:67:06:94:aa:57:d6:1b: 85:24:55:20:b3:1d:94:c2:5a:e2:59:c5:4b:a7:35:57: 0f:ed:ea:95:71:6c:6a:82:9c:96:a8:62:38:a8:1a:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:7c:ef:48:b5:1c:f0:27:23:c1:8f:22:e3:99:aa:e7: cf:1f:00:91:06:7b:95:dd:92:f1:0e:88:40:2c:71:59: 90:c7:5b:78:64:c1:25:b9:3d:55:9b:ae:a1:26:c4:91: e3:90:0a:20:b1:20:5e:2e:c7:4e:7b:1f:56:19:06:0c: 71:bd:59:b7:71:12:df:06:c9:89:d3:a6:56:64:67:b7: a7:15:88:10:6f:26:8c:68:4e:fa:bb:09:4c:27:56:f9: f9:70:ac:42:41:26:e8:da:a7:cc:3c:d3:36:b6:25:1c: 4f:31:c3:c2:5d:cc:8a:47:fb:05:b3:d2:36:be:bf:ca: 5c:ad:67:ab:8a:76:71:55:a3:04:f7:42:64:d7:45:34: 82:b8:d5:9b:1a:18:32:7a:b8:17:06:29:cd:91:0e:a9: b8:b5:18:0c:02:51:ea:5b:9b:06:c7:f6:31:1f:c4:f5: 14:5f:4f:f8:16:6d:e7:fb:a3:ef:1a:88:13:b3:53:7c: 07:85:c3:94:e8:48:ae:4e:a7:3e:df:93:6a:5c:0b:bb: ac:94:6c:cc:6e:f8:fc:c4:1e:74:a2:f3:1b:59:f8:c5: 1c:c6:a8:56:d8:d8:17:7d:da:dd:30:34:b7:78:e6:25: ac:32:f0:66:4c:6c:2f:3f:ec:21:d7:54:93:e9:24:5a Fingerprint (SHA-256): 6E:36:62:B8:DE:7D:88:BB:23:67:97:70:5E:C2:50:9B:1C:FB:C3:1C:7B:66:63:42:D4:A5:FB:B7:21:8E:F3:A5 Fingerprint (SHA1): E5:F6:D4:54:35:18:EA:C9:F8:5A:E8:BA:5E:80:7A:68:FD:65:50:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #984: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #985: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #986: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145479 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #987: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #988: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #989: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #990: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145480 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #991: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #992: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #994: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145481 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #995: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #996: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #997: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #998: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1226145482 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #999: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1000: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1001: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145483 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1002: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1003: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1004: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1005: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1226145484 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1006: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1007: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1008: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1009: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1226145485 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1010: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1011: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1012: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1013: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1014: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145479 (0x49157ec7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:56:32 2024 Not After : Wed Dec 26 14:56:32 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:57:e5:7d:d2:41:3d:2b:a1:9e:2c:25:17:9f:31:bc: d2:56:6a:5f:46:3f:4c:51:68:d2:53:ea:92:85:0f:a9: 33:5f:ab:95:76:01:65:b2:f5:bd:f8:16:8a:2d:9c:19: 7a:98:6d:54:ea:68:91:a4:50:a6:e4:aa:b0:38:02:f7: 11:c0:8c:8c:52:f3:ff:36:30:f9:98:21:9e:34:07:44: 82:01:f9:b9:70:2e:90:3f:f6:f4:66:ea:79:52:21:3d: a3:69:61:3b:d3:a1:f5:3b:4e:00:ff:66:81:b5:1e:c3: 00:3b:61:6f:84:74:b0:32:01:66:b1:45:f6:db:b6:dd: 8f:20:98:74:ee:fc:7f:9b:65:a7:b0:7c:34:b3:1e:ef: ea:ed:d8:48:55:30:65:30:34:1f:b4:3e:83:22:dc:31: a1:68:99:5b:70:84:f7:6e:32:5a:0f:2e:73:c3:dc:5c: 05:0e:2d:c3:fd:35:c6:5b:49:dd:3f:f7:ca:9e:18:2e: 2d:59:a2:b5:57:c5:4c:e6:df:d3:3c:17:fc:f2:17:6b: 5c:05:3a:26:2a:25:0a:26:d8:ae:c8:39:27:6e:a0:05: d0:36:f6:22:09:34:23:19:49:36:89:5b:1a:4b:e5:be: 24:d5:0e:fd:b6:3b:f0:30:94:31:d0:e7:25:f6:93:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:52:2d:7d:37:01:d2:33:fd:f5:94:f6:8a:9d:6b:e5: ac:57:03:d9:49:f4:34:66:14:e7:a3:d6:a4:42:89:04: 33:7e:61:65:99:e8:63:9e:ba:91:a8:42:f2:6d:f6:36: 04:aa:b3:53:41:ac:12:a1:fc:a7:ea:b8:cf:8b:c0:9a: 72:21:87:ac:ec:7b:83:11:aa:9e:79:f1:88:48:77:fa: ad:28:c7:73:45:df:7a:7b:f8:13:29:9c:1a:5a:f3:64: 6f:d9:66:c7:bb:28:d1:99:e0:72:11:c2:a9:18:15:c6: b4:b9:74:6d:44:f7:68:6a:3d:90:05:7b:68:29:4d:f5: 14:6a:fc:e0:3d:fe:b9:d3:00:96:c1:7b:10:52:40:c3: 4c:b9:2e:60:d1:28:49:36:fe:80:78:c7:be:27:bd:4b: 92:93:da:e2:50:30:12:f3:a9:38:21:f5:ce:a2:79:bc: b9:dd:7a:ab:f5:49:6f:20:10:6f:b8:e3:e8:68:77:95: ac:e5:75:50:4b:52:a4:73:4c:27:6d:02:c6:f2:cf:0a: 28:99:7e:38:d8:29:cc:04:61:40:5f:d1:cf:35:5f:7f: ca:07:e5:d1:33:e5:57:e7:2f:a5:54:ee:64:0e:29:27: c1:7f:c6:52:69:be:a8:c6:32:02:e6:25:6d:3c:b3:3c Fingerprint (SHA-256): CE:A7:DF:F4:D1:07:A6:9C:53:1E:D9:0A:90:76:DE:1D:9A:B0:ED:14:CE:75:E2:DB:07:C6:FB:3C:81:B6:4C:A2 Fingerprint (SHA1): F6:7A:86:F4:C7:91:05:46:F9:D0:01:8B:27:15:BE:83:AF:25:55:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145481 (0x49157ec9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:56:34 2024 Not After : Wed Dec 26 14:56:34 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:f5:2d:94:db:25:a8:32:68:40:ea:71:20:0c:bd:8d: 36:e1:74:ba:1e:a9:40:60:ae:53:09:1a:e8:1e:28:44: 7b:ec:f8:48:32:31:6e:f4:97:f5:58:fc:6f:9e:15:04: 25:ca:ea:f5:d0:45:b0:14:d0:d1:23:f0:76:87:a9:b3: 79:e5:21:ec:70:5a:9e:a0:49:95:16:d6:75:a3:5b:94: 48:ad:30:6d:dc:4e:62:65:0d:70:8e:03:9b:65:82:e5: bf:c2:bf:40:98:8c:d3:01:b5:03:ed:5e:ed:6a:90:f5: 8b:19:db:38:95:77:10:4d:ef:59:ce:6d:aa:5a:e0:16: 37:a1:8c:6a:c6:af:92:89:08:49:ae:d4:b8:14:c4:16: ff:5c:7c:84:a2:a6:d5:63:fd:fb:99:46:bf:e4:1d:68: 2c:65:5b:fc:86:aa:b6:7d:0d:13:dc:95:31:e8:5a:0c: 7c:f4:ba:f9:3f:f0:7a:5e:86:20:5f:6e:37:9b:23:f6: 1b:9a:91:3a:e0:48:53:94:4c:bd:30:e4:f2:af:55:cd: 76:75:e2:44:ce:85:a5:ff:7a:b6:61:cd:98:d9:d8:95: 6d:e9:8c:ed:aa:7e:d7:c9:fc:14:98:53:1d:67:0a:ed: ff:7e:07:bd:b8:b1:58:e8:d3:77:d2:7e:fa:10:5a:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:8b:8e:7e:e0:b5:0b:ed:64:f9:f1:9f:ef:ed:f1:f5: e3:05:93:55:66:85:28:77:26:b0:2b:5a:12:65:50:ee: ff:36:2f:b8:52:de:a1:75:fd:d9:3d:bc:59:d6:b1:b4: 98:ba:30:0e:05:4b:d6:f7:5b:9b:87:ad:13:73:fc:b6: 77:2c:17:dd:5e:6b:40:ef:58:52:b2:28:05:59:5a:81: 2d:b7:c9:e6:48:01:34:91:ba:e4:b9:bf:0c:7f:ce:16: 00:54:02:44:d9:83:08:3b:eb:9e:c7:c2:a8:0a:7f:82: 4e:1b:7b:3f:06:1c:55:56:e3:f3:69:fa:2c:c4:de:1c: dd:94:91:a2:63:f0:bf:fb:07:a2:ca:b7:95:f2:b6:43: eb:c8:13:26:eb:68:ef:b4:95:75:4b:89:5b:0b:81:bf: 29:89:f4:5d:3c:c1:69:f3:1b:e2:18:75:5d:bc:50:01: db:4e:66:15:87:dd:d3:42:af:58:63:72:f7:49:eb:1a: 8e:11:c5:af:19:17:5b:9c:cc:3f:3f:51:40:e3:24:fd: 05:62:66:d8:c6:ef:d1:be:32:4d:c7:2b:80:b2:3b:9f: 34:c3:7c:e4:d2:2c:4f:0c:8c:a9:58:3d:51:31:2c:65: f5:ec:b4:de:41:65:cb:7c:7e:2a:b1:2e:13:14:21:82 Fingerprint (SHA-256): 8D:E8:61:77:38:9B:C0:F7:CC:D1:33:CD:BA:23:01:42:2F:77:92:07:BB:35:48:D0:C3:82:2C:4E:F2:C3:7F:8F Fingerprint (SHA1): 4E:86:47:62:19:04:96:22:52:AE:C6:25:EB:D9:93:41:B2:0F:FE:9E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145479 (0x49157ec7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:56:32 2024 Not After : Wed Dec 26 14:56:32 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:57:e5:7d:d2:41:3d:2b:a1:9e:2c:25:17:9f:31:bc: d2:56:6a:5f:46:3f:4c:51:68:d2:53:ea:92:85:0f:a9: 33:5f:ab:95:76:01:65:b2:f5:bd:f8:16:8a:2d:9c:19: 7a:98:6d:54:ea:68:91:a4:50:a6:e4:aa:b0:38:02:f7: 11:c0:8c:8c:52:f3:ff:36:30:f9:98:21:9e:34:07:44: 82:01:f9:b9:70:2e:90:3f:f6:f4:66:ea:79:52:21:3d: a3:69:61:3b:d3:a1:f5:3b:4e:00:ff:66:81:b5:1e:c3: 00:3b:61:6f:84:74:b0:32:01:66:b1:45:f6:db:b6:dd: 8f:20:98:74:ee:fc:7f:9b:65:a7:b0:7c:34:b3:1e:ef: ea:ed:d8:48:55:30:65:30:34:1f:b4:3e:83:22:dc:31: a1:68:99:5b:70:84:f7:6e:32:5a:0f:2e:73:c3:dc:5c: 05:0e:2d:c3:fd:35:c6:5b:49:dd:3f:f7:ca:9e:18:2e: 2d:59:a2:b5:57:c5:4c:e6:df:d3:3c:17:fc:f2:17:6b: 5c:05:3a:26:2a:25:0a:26:d8:ae:c8:39:27:6e:a0:05: d0:36:f6:22:09:34:23:19:49:36:89:5b:1a:4b:e5:be: 24:d5:0e:fd:b6:3b:f0:30:94:31:d0:e7:25:f6:93:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:52:2d:7d:37:01:d2:33:fd:f5:94:f6:8a:9d:6b:e5: ac:57:03:d9:49:f4:34:66:14:e7:a3:d6:a4:42:89:04: 33:7e:61:65:99:e8:63:9e:ba:91:a8:42:f2:6d:f6:36: 04:aa:b3:53:41:ac:12:a1:fc:a7:ea:b8:cf:8b:c0:9a: 72:21:87:ac:ec:7b:83:11:aa:9e:79:f1:88:48:77:fa: ad:28:c7:73:45:df:7a:7b:f8:13:29:9c:1a:5a:f3:64: 6f:d9:66:c7:bb:28:d1:99:e0:72:11:c2:a9:18:15:c6: b4:b9:74:6d:44:f7:68:6a:3d:90:05:7b:68:29:4d:f5: 14:6a:fc:e0:3d:fe:b9:d3:00:96:c1:7b:10:52:40:c3: 4c:b9:2e:60:d1:28:49:36:fe:80:78:c7:be:27:bd:4b: 92:93:da:e2:50:30:12:f3:a9:38:21:f5:ce:a2:79:bc: b9:dd:7a:ab:f5:49:6f:20:10:6f:b8:e3:e8:68:77:95: ac:e5:75:50:4b:52:a4:73:4c:27:6d:02:c6:f2:cf:0a: 28:99:7e:38:d8:29:cc:04:61:40:5f:d1:cf:35:5f:7f: ca:07:e5:d1:33:e5:57:e7:2f:a5:54:ee:64:0e:29:27: c1:7f:c6:52:69:be:a8:c6:32:02:e6:25:6d:3c:b3:3c Fingerprint (SHA-256): CE:A7:DF:F4:D1:07:A6:9C:53:1E:D9:0A:90:76:DE:1D:9A:B0:ED:14:CE:75:E2:DB:07:C6:FB:3C:81:B6:4C:A2 Fingerprint (SHA1): F6:7A:86:F4:C7:91:05:46:F9:D0:01:8B:27:15:BE:83:AF:25:55:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1018: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145479 (0x49157ec7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:56:32 2024 Not After : Wed Dec 26 14:56:32 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:57:e5:7d:d2:41:3d:2b:a1:9e:2c:25:17:9f:31:bc: d2:56:6a:5f:46:3f:4c:51:68:d2:53:ea:92:85:0f:a9: 33:5f:ab:95:76:01:65:b2:f5:bd:f8:16:8a:2d:9c:19: 7a:98:6d:54:ea:68:91:a4:50:a6:e4:aa:b0:38:02:f7: 11:c0:8c:8c:52:f3:ff:36:30:f9:98:21:9e:34:07:44: 82:01:f9:b9:70:2e:90:3f:f6:f4:66:ea:79:52:21:3d: a3:69:61:3b:d3:a1:f5:3b:4e:00:ff:66:81:b5:1e:c3: 00:3b:61:6f:84:74:b0:32:01:66:b1:45:f6:db:b6:dd: 8f:20:98:74:ee:fc:7f:9b:65:a7:b0:7c:34:b3:1e:ef: ea:ed:d8:48:55:30:65:30:34:1f:b4:3e:83:22:dc:31: a1:68:99:5b:70:84:f7:6e:32:5a:0f:2e:73:c3:dc:5c: 05:0e:2d:c3:fd:35:c6:5b:49:dd:3f:f7:ca:9e:18:2e: 2d:59:a2:b5:57:c5:4c:e6:df:d3:3c:17:fc:f2:17:6b: 5c:05:3a:26:2a:25:0a:26:d8:ae:c8:39:27:6e:a0:05: d0:36:f6:22:09:34:23:19:49:36:89:5b:1a:4b:e5:be: 24:d5:0e:fd:b6:3b:f0:30:94:31:d0:e7:25:f6:93:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:52:2d:7d:37:01:d2:33:fd:f5:94:f6:8a:9d:6b:e5: ac:57:03:d9:49:f4:34:66:14:e7:a3:d6:a4:42:89:04: 33:7e:61:65:99:e8:63:9e:ba:91:a8:42:f2:6d:f6:36: 04:aa:b3:53:41:ac:12:a1:fc:a7:ea:b8:cf:8b:c0:9a: 72:21:87:ac:ec:7b:83:11:aa:9e:79:f1:88:48:77:fa: ad:28:c7:73:45:df:7a:7b:f8:13:29:9c:1a:5a:f3:64: 6f:d9:66:c7:bb:28:d1:99:e0:72:11:c2:a9:18:15:c6: b4:b9:74:6d:44:f7:68:6a:3d:90:05:7b:68:29:4d:f5: 14:6a:fc:e0:3d:fe:b9:d3:00:96:c1:7b:10:52:40:c3: 4c:b9:2e:60:d1:28:49:36:fe:80:78:c7:be:27:bd:4b: 92:93:da:e2:50:30:12:f3:a9:38:21:f5:ce:a2:79:bc: b9:dd:7a:ab:f5:49:6f:20:10:6f:b8:e3:e8:68:77:95: ac:e5:75:50:4b:52:a4:73:4c:27:6d:02:c6:f2:cf:0a: 28:99:7e:38:d8:29:cc:04:61:40:5f:d1:cf:35:5f:7f: ca:07:e5:d1:33:e5:57:e7:2f:a5:54:ee:64:0e:29:27: c1:7f:c6:52:69:be:a8:c6:32:02:e6:25:6d:3c:b3:3c Fingerprint (SHA-256): CE:A7:DF:F4:D1:07:A6:9C:53:1E:D9:0A:90:76:DE:1D:9A:B0:ED:14:CE:75:E2:DB:07:C6:FB:3C:81:B6:4C:A2 Fingerprint (SHA1): F6:7A:86:F4:C7:91:05:46:F9:D0:01:8B:27:15:BE:83:AF:25:55:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1019: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145481 (0x49157ec9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:56:34 2024 Not After : Wed Dec 26 14:56:34 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:f5:2d:94:db:25:a8:32:68:40:ea:71:20:0c:bd:8d: 36:e1:74:ba:1e:a9:40:60:ae:53:09:1a:e8:1e:28:44: 7b:ec:f8:48:32:31:6e:f4:97:f5:58:fc:6f:9e:15:04: 25:ca:ea:f5:d0:45:b0:14:d0:d1:23:f0:76:87:a9:b3: 79:e5:21:ec:70:5a:9e:a0:49:95:16:d6:75:a3:5b:94: 48:ad:30:6d:dc:4e:62:65:0d:70:8e:03:9b:65:82:e5: bf:c2:bf:40:98:8c:d3:01:b5:03:ed:5e:ed:6a:90:f5: 8b:19:db:38:95:77:10:4d:ef:59:ce:6d:aa:5a:e0:16: 37:a1:8c:6a:c6:af:92:89:08:49:ae:d4:b8:14:c4:16: ff:5c:7c:84:a2:a6:d5:63:fd:fb:99:46:bf:e4:1d:68: 2c:65:5b:fc:86:aa:b6:7d:0d:13:dc:95:31:e8:5a:0c: 7c:f4:ba:f9:3f:f0:7a:5e:86:20:5f:6e:37:9b:23:f6: 1b:9a:91:3a:e0:48:53:94:4c:bd:30:e4:f2:af:55:cd: 76:75:e2:44:ce:85:a5:ff:7a:b6:61:cd:98:d9:d8:95: 6d:e9:8c:ed:aa:7e:d7:c9:fc:14:98:53:1d:67:0a:ed: ff:7e:07:bd:b8:b1:58:e8:d3:77:d2:7e:fa:10:5a:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:8b:8e:7e:e0:b5:0b:ed:64:f9:f1:9f:ef:ed:f1:f5: e3:05:93:55:66:85:28:77:26:b0:2b:5a:12:65:50:ee: ff:36:2f:b8:52:de:a1:75:fd:d9:3d:bc:59:d6:b1:b4: 98:ba:30:0e:05:4b:d6:f7:5b:9b:87:ad:13:73:fc:b6: 77:2c:17:dd:5e:6b:40:ef:58:52:b2:28:05:59:5a:81: 2d:b7:c9:e6:48:01:34:91:ba:e4:b9:bf:0c:7f:ce:16: 00:54:02:44:d9:83:08:3b:eb:9e:c7:c2:a8:0a:7f:82: 4e:1b:7b:3f:06:1c:55:56:e3:f3:69:fa:2c:c4:de:1c: dd:94:91:a2:63:f0:bf:fb:07:a2:ca:b7:95:f2:b6:43: eb:c8:13:26:eb:68:ef:b4:95:75:4b:89:5b:0b:81:bf: 29:89:f4:5d:3c:c1:69:f3:1b:e2:18:75:5d:bc:50:01: db:4e:66:15:87:dd:d3:42:af:58:63:72:f7:49:eb:1a: 8e:11:c5:af:19:17:5b:9c:cc:3f:3f:51:40:e3:24:fd: 05:62:66:d8:c6:ef:d1:be:32:4d:c7:2b:80:b2:3b:9f: 34:c3:7c:e4:d2:2c:4f:0c:8c:a9:58:3d:51:31:2c:65: f5:ec:b4:de:41:65:cb:7c:7e:2a:b1:2e:13:14:21:82 Fingerprint (SHA-256): 8D:E8:61:77:38:9B:C0:F7:CC:D1:33:CD:BA:23:01:42:2F:77:92:07:BB:35:48:D0:C3:82:2C:4E:F2:C3:7F:8F Fingerprint (SHA1): 4E:86:47:62:19:04:96:22:52:AE:C6:25:EB:D9:93:41:B2:0F:FE:9E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1021: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1022: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1023: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145479 (0x49157ec7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:56:32 2024 Not After : Wed Dec 26 14:56:32 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:57:e5:7d:d2:41:3d:2b:a1:9e:2c:25:17:9f:31:bc: d2:56:6a:5f:46:3f:4c:51:68:d2:53:ea:92:85:0f:a9: 33:5f:ab:95:76:01:65:b2:f5:bd:f8:16:8a:2d:9c:19: 7a:98:6d:54:ea:68:91:a4:50:a6:e4:aa:b0:38:02:f7: 11:c0:8c:8c:52:f3:ff:36:30:f9:98:21:9e:34:07:44: 82:01:f9:b9:70:2e:90:3f:f6:f4:66:ea:79:52:21:3d: a3:69:61:3b:d3:a1:f5:3b:4e:00:ff:66:81:b5:1e:c3: 00:3b:61:6f:84:74:b0:32:01:66:b1:45:f6:db:b6:dd: 8f:20:98:74:ee:fc:7f:9b:65:a7:b0:7c:34:b3:1e:ef: ea:ed:d8:48:55:30:65:30:34:1f:b4:3e:83:22:dc:31: a1:68:99:5b:70:84:f7:6e:32:5a:0f:2e:73:c3:dc:5c: 05:0e:2d:c3:fd:35:c6:5b:49:dd:3f:f7:ca:9e:18:2e: 2d:59:a2:b5:57:c5:4c:e6:df:d3:3c:17:fc:f2:17:6b: 5c:05:3a:26:2a:25:0a:26:d8:ae:c8:39:27:6e:a0:05: d0:36:f6:22:09:34:23:19:49:36:89:5b:1a:4b:e5:be: 24:d5:0e:fd:b6:3b:f0:30:94:31:d0:e7:25:f6:93:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:52:2d:7d:37:01:d2:33:fd:f5:94:f6:8a:9d:6b:e5: ac:57:03:d9:49:f4:34:66:14:e7:a3:d6:a4:42:89:04: 33:7e:61:65:99:e8:63:9e:ba:91:a8:42:f2:6d:f6:36: 04:aa:b3:53:41:ac:12:a1:fc:a7:ea:b8:cf:8b:c0:9a: 72:21:87:ac:ec:7b:83:11:aa:9e:79:f1:88:48:77:fa: ad:28:c7:73:45:df:7a:7b:f8:13:29:9c:1a:5a:f3:64: 6f:d9:66:c7:bb:28:d1:99:e0:72:11:c2:a9:18:15:c6: b4:b9:74:6d:44:f7:68:6a:3d:90:05:7b:68:29:4d:f5: 14:6a:fc:e0:3d:fe:b9:d3:00:96:c1:7b:10:52:40:c3: 4c:b9:2e:60:d1:28:49:36:fe:80:78:c7:be:27:bd:4b: 92:93:da:e2:50:30:12:f3:a9:38:21:f5:ce:a2:79:bc: b9:dd:7a:ab:f5:49:6f:20:10:6f:b8:e3:e8:68:77:95: ac:e5:75:50:4b:52:a4:73:4c:27:6d:02:c6:f2:cf:0a: 28:99:7e:38:d8:29:cc:04:61:40:5f:d1:cf:35:5f:7f: ca:07:e5:d1:33:e5:57:e7:2f:a5:54:ee:64:0e:29:27: c1:7f:c6:52:69:be:a8:c6:32:02:e6:25:6d:3c:b3:3c Fingerprint (SHA-256): CE:A7:DF:F4:D1:07:A6:9C:53:1E:D9:0A:90:76:DE:1D:9A:B0:ED:14:CE:75:E2:DB:07:C6:FB:3C:81:B6:4C:A2 Fingerprint (SHA1): F6:7A:86:F4:C7:91:05:46:F9:D0:01:8B:27:15:BE:83:AF:25:55:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1024: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145483 (0x49157ecb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 14:56:36 2024 Not After : Wed Dec 26 14:56:36 2074 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:d6:8d:cd:b2:55:5e:12:a8:1c:fc:9f:bb:bd:5f:cd: f8:3e:ba:07:9a:71:8a:64:f8:94:8b:58:69:d9:7a:1d: 7b:12:58:61:bd:01:41:6b:24:b3:c2:0a:64:88:6e:ad: 15:05:57:8b:83:c1:a4:a2:13:52:78:98:46:e0:cc:e5: 4b:04:52:a8:49:d6:44:96:91:39:40:5c:c3:4a:37:c2: 64:4e:47:15:17:5d:22:f6:7a:6b:35:5d:86:59:b0:4b: ed:b7:d0:09:48:8c:2b:93:79:10:55:9e:09:41:ec:7f: 7e:57:e1:a0:64:cc:ae:50:54:65:ae:e6:61:cc:77:1a: f0:56:fd:4c:9f:66:68:09:12:84:80:2a:37:fe:7d:70: 1c:88:8d:81:1b:ff:0c:3f:a1:e9:ad:ed:88:74:ee:6f: 4e:78:f5:d2:a5:73:09:40:fe:0f:66:87:0e:05:39:9a: 27:e5:65:31:2e:3b:87:28:32:56:ae:39:7b:b5:0d:c0: 90:bc:3d:8d:db:a3:7b:90:a5:ea:81:43:45:ab:37:42: d9:ce:8d:13:1e:9a:59:f9:97:65:72:3d:54:42:1b:9e: be:a6:aa:1c:41:a5:4f:70:28:81:8c:29:6e:eb:d0:85: 71:d6:c3:5e:a3:f6:a9:b0:38:56:3e:66:9a:34:2c:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:b2:df:92:53:7e:b0:65:90:58:00:10:c5:f2:70:cd: ff:67:2a:48:55:f9:14:4e:73:26:d2:91:e0:90:24:39: 39:7a:41:9a:ff:94:1a:84:52:95:45:71:60:c1:f1:62: 08:9b:fb:d7:45:b0:b1:01:bf:75:3a:47:63:4c:4e:63: 6f:9d:dd:fe:a8:90:db:ef:93:d2:29:05:1b:ac:a2:fd: f9:bf:d4:ee:08:4e:bd:0b:58:c9:6c:ec:2c:38:cb:90: a4:96:75:38:07:8e:0f:25:a0:a0:57:a5:17:2b:fd:7b: 0f:b4:82:34:52:3d:e6:ef:a7:c5:52:f5:57:7d:71:44: 02:31:c4:f6:8c:7c:d5:db:d2:39:cb:dc:ad:2d:90:a7: fc:1a:65:0a:dd:4c:8f:05:5d:8d:68:2a:6a:4b:29:29: 9b:41:fb:4d:8e:c8:f0:d7:f0:61:b7:2d:68:f9:e8:aa: 7a:d2:c0:6b:59:f1:a6:37:9d:04:01:a4:ab:00:b5:de: 58:7a:0c:e9:16:8c:30:6b:a4:1f:4b:19:ba:eb:b1:34: b3:59:e4:e6:2f:6a:70:41:65:d3:c4:22:5d:71:e2:96: e3:64:f6:98:79:9c:0b:01:9d:07:17:9e:8e:c9:08:7b: 3b:04:db:2e:8c:52:b9:64:55:0f:94:3f:81:ed:93:6e Fingerprint (SHA-256): 9E:93:1D:7D:80:64:CB:E8:F3:19:AC:5F:0C:21:93:FB:AC:A0:6D:6E:6F:9D:AA:A0:53:0F:AB:E4:91:27:32:F8 Fingerprint (SHA1): 96:D9:19:14:58:1D:EB:0E:81:A9:4C:68:97:ED:F8:58:63:E7:EB:D1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1025: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145479 (0x49157ec7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:56:32 2024 Not After : Wed Dec 26 14:56:32 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:57:e5:7d:d2:41:3d:2b:a1:9e:2c:25:17:9f:31:bc: d2:56:6a:5f:46:3f:4c:51:68:d2:53:ea:92:85:0f:a9: 33:5f:ab:95:76:01:65:b2:f5:bd:f8:16:8a:2d:9c:19: 7a:98:6d:54:ea:68:91:a4:50:a6:e4:aa:b0:38:02:f7: 11:c0:8c:8c:52:f3:ff:36:30:f9:98:21:9e:34:07:44: 82:01:f9:b9:70:2e:90:3f:f6:f4:66:ea:79:52:21:3d: a3:69:61:3b:d3:a1:f5:3b:4e:00:ff:66:81:b5:1e:c3: 00:3b:61:6f:84:74:b0:32:01:66:b1:45:f6:db:b6:dd: 8f:20:98:74:ee:fc:7f:9b:65:a7:b0:7c:34:b3:1e:ef: ea:ed:d8:48:55:30:65:30:34:1f:b4:3e:83:22:dc:31: a1:68:99:5b:70:84:f7:6e:32:5a:0f:2e:73:c3:dc:5c: 05:0e:2d:c3:fd:35:c6:5b:49:dd:3f:f7:ca:9e:18:2e: 2d:59:a2:b5:57:c5:4c:e6:df:d3:3c:17:fc:f2:17:6b: 5c:05:3a:26:2a:25:0a:26:d8:ae:c8:39:27:6e:a0:05: d0:36:f6:22:09:34:23:19:49:36:89:5b:1a:4b:e5:be: 24:d5:0e:fd:b6:3b:f0:30:94:31:d0:e7:25:f6:93:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:52:2d:7d:37:01:d2:33:fd:f5:94:f6:8a:9d:6b:e5: ac:57:03:d9:49:f4:34:66:14:e7:a3:d6:a4:42:89:04: 33:7e:61:65:99:e8:63:9e:ba:91:a8:42:f2:6d:f6:36: 04:aa:b3:53:41:ac:12:a1:fc:a7:ea:b8:cf:8b:c0:9a: 72:21:87:ac:ec:7b:83:11:aa:9e:79:f1:88:48:77:fa: ad:28:c7:73:45:df:7a:7b:f8:13:29:9c:1a:5a:f3:64: 6f:d9:66:c7:bb:28:d1:99:e0:72:11:c2:a9:18:15:c6: b4:b9:74:6d:44:f7:68:6a:3d:90:05:7b:68:29:4d:f5: 14:6a:fc:e0:3d:fe:b9:d3:00:96:c1:7b:10:52:40:c3: 4c:b9:2e:60:d1:28:49:36:fe:80:78:c7:be:27:bd:4b: 92:93:da:e2:50:30:12:f3:a9:38:21:f5:ce:a2:79:bc: b9:dd:7a:ab:f5:49:6f:20:10:6f:b8:e3:e8:68:77:95: ac:e5:75:50:4b:52:a4:73:4c:27:6d:02:c6:f2:cf:0a: 28:99:7e:38:d8:29:cc:04:61:40:5f:d1:cf:35:5f:7f: ca:07:e5:d1:33:e5:57:e7:2f:a5:54:ee:64:0e:29:27: c1:7f:c6:52:69:be:a8:c6:32:02:e6:25:6d:3c:b3:3c Fingerprint (SHA-256): CE:A7:DF:F4:D1:07:A6:9C:53:1E:D9:0A:90:76:DE:1D:9A:B0:ED:14:CE:75:E2:DB:07:C6:FB:3C:81:B6:4C:A2 Fingerprint (SHA1): F6:7A:86:F4:C7:91:05:46:F9:D0:01:8B:27:15:BE:83:AF:25:55:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1027: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1028: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1029: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1030: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1031: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145484 (0x49157ecc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 14:56:37 2024 Not After : Wed Dec 26 14:56:37 2029 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:39:88:e3:b7:1e:9c:2f:00:c7:4d:ef:62:57:0e:ff: 96:cf:c5:87:a6:fe:d6:1d:b4:d7:d3:5d:3c:37:3f:c8: 42:e4:b7:62:cf:7f:f1:41:20:98:88:8f:fc:52:30:53: bc:fc:50:8a:81:86:d2:97:45:3d:4e:25:51:03:a0:a7: 81:c1:95:e7:f6:61:30:d2:85:55:3c:79:9d:0f:ba:ad: 6a:2d:e0:ad:05:db:3d:6b:58:3b:3f:5a:f5:ac:4f:a8: 3a:6b:29:81:56:f5:6d:82:ff:95:66:d9:9e:a1:4c:45: 63:11:ab:12:75:d0:5a:1f:7c:9c:6b:bf:ee:ba:a6:d9: b4:31:92:ca:98:4c:62:00:be:82:86:e2:eb:c9:4b:00: 9f:0b:f8:28:b9:bb:6c:4d:5d:21:8c:e3:7c:72:76:69: 4e:8d:32:60:72:18:45:e7:e1:ce:0f:61:d5:eb:69:07: 77:bf:4f:b9:70:61:0f:5a:57:8b:b6:d3:38:8a:de:26: 76:c0:e5:12:17:f4:0d:17:cc:9a:1e:85:10:3a:fd:0c: d6:f0:05:d0:f5:af:c5:4c:48:54:fc:3f:80:3f:e5:06: 74:45:28:6a:fc:93:73:85:c0:0d:c7:24:15:95:b7:22: 03:c9:c6:fa:aa:2a:d6:e6:b2:48:df:21:64:2b:c5:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:86:c3:d0:bd:f4:19:f3:5e:f7:f4:37:94:31:d7:3a: 04:2f:91:2e:a3:3d:b4:a9:97:89:c0:99:7f:51:4f:2d: 0c:2d:d5:06:83:4e:20:45:b6:2a:c0:57:39:bc:43:4c: 0a:40:44:12:43:83:5c:d3:ca:e9:41:52:41:2d:10:59: 2d:2e:eb:0d:f0:0c:8c:9c:3a:3f:42:07:ff:b5:f1:b5: 9b:95:a3:b7:65:e0:d4:5b:54:8d:ef:87:6e:53:a5:4a: 94:e6:74:15:a1:68:2f:c9:b6:c8:e0:51:ad:a9:de:cf: f5:c0:d6:01:d7:86:4e:6a:1b:dd:43:68:fb:49:98:54: d2:09:df:24:8c:af:1e:cf:d8:8e:85:21:34:65:ed:77: a0:02:7c:71:57:f3:70:54:66:6f:28:79:5e:26:43:09: ac:cf:7d:dd:5e:15:75:c9:a9:5c:0e:1b:62:08:c7:61: ac:c7:6f:ec:59:3d:ce:a8:85:95:6e:e0:81:b0:73:ce: 3c:45:1a:61:aa:0a:9c:c5:89:21:36:b2:fa:ba:0f:4f: 07:62:eb:5f:b8:9a:a1:f1:6b:c6:83:b2:5d:a9:5a:ec: ca:05:82:e2:28:8d:76:88:c2:3f:a6:b9:27:fb:fd:7e: c7:0f:7d:cb:44:3e:e5:49:dc:39:2c:e8:e8:85:31:08 Fingerprint (SHA-256): A7:95:FB:51:9D:E5:1F:DF:D2:92:25:DD:87:30:99:8E:2F:CE:35:4F:15:83:1B:A4:9A:96:BA:6F:EC:6D:E3:97 Fingerprint (SHA1): B4:23:3D:17:9E:1D:16:00:52:F3:13:52:19:FB:00:69:1F:BF:A9:2A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1032: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1033: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1034: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1035: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1036: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1037: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1038: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1039: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1040: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1041: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1042: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1043: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1044: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1045: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1046: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1047: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1048: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1049: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1050: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1051: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1052: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1053: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1054: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1055: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1056: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1057: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 79034 at Thu Dec 26 14:56:42 UTC 2024 kill -USR1 79034 httpserv: normal termination httpserv -b -p 9535 2>/dev/null; httpserv with PID 79034 killed at Thu Dec 26 14:56:42 UTC 2024 httpserv starting at Thu Dec 26 14:56:42 UTC 2024 httpserv -D -p 9535 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/aiahttp/http_pid.15633 & trying to connect to httpserv at Thu Dec 26 14:56:42 UTC 2024 tstclnt -4 -p 9535 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9535 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 90855 >/dev/null 2>/dev/null httpserv with PID 90855 found at Thu Dec 26 14:56:42 UTC 2024 httpserv with PID 90855 started at Thu Dec 26 14:56:42 UTC 2024 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1058: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1059: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145486 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1060: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1061: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1062: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145487 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1063: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1064: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1065: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1066: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145488 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1067: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1068: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145489 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1069: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1070: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1071: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1072: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1073: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1226145490 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1074: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1075: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1076: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1077: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1078: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145487 (0x49157ecf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:56:44 2024 Not After : Wed Dec 26 14:56:44 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:e0:8c:71:06:26:d7:56:a0:c7:50:1a:1c:b1:84:f3: bc:d5:f1:d3:57:54:2e:ae:35:12:35:bd:85:66:c7:0f: 9e:e4:34:cb:7a:4a:c6:eb:d3:96:87:5d:8c:fa:02:21: 78:07:cc:33:20:80:ce:59:45:56:05:3e:8e:18:db:6a: 02:51:21:06:90:90:a6:e1:59:5e:35:5e:26:f3:e5:c6: 1d:6b:15:8e:50:2f:41:fc:73:29:66:17:2f:3a:59:a7: 79:b8:05:27:9f:1d:a3:9f:c8:3e:dd:52:53:ee:cb:0f: 7b:67:fd:2b:e2:44:63:2e:c6:0e:bf:81:b9:ae:86:76: 42:f4:a4:da:39:e1:7b:14:09:a7:01:94:f1:e6:6b:d3: 2c:42:b5:96:f1:3f:1b:8d:13:84:95:1b:e1:98:9b:e4: 8a:97:d6:a8:52:10:e0:5e:b5:27:2b:10:76:18:d6:6f: cf:6d:46:64:61:c3:27:4b:57:93:9d:cf:97:cd:70:4a: ab:b8:d5:f6:1d:c2:51:7f:98:60:a1:26:3c:94:c0:af: 2e:42:1a:71:6c:d1:8b:61:9d:75:18:60:60:82:41:be: 7e:50:a8:83:81:cb:ff:0f:86:e0:fc:0c:09:04:2b:00: f4:41:4a:d9:16:fb:78:58:af:ed:30:a8:40:5a:25:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:ac:d5:da:96:b9:09:d7:59:64:6f:89:40:8e:52:38: 7a:5b:92:82:8e:5a:38:71:c2:c3:4f:41:5a:b0:53:2d: 6b:f5:55:07:66:44:a0:ef:f8:40:eb:70:2b:ac:e5:55: b6:1c:05:84:b3:26:ab:9d:79:7a:2e:9a:22:00:58:56: cc:93:28:aa:1f:45:90:68:a8:53:ba:e7:24:9b:4b:92: 48:73:fc:04:34:9f:f6:03:26:7d:e9:2e:c2:bb:c4:fb: 6c:a4:70:b6:a2:9a:66:02:29:67:22:ca:1b:37:e1:01: 36:6e:64:b5:0f:7b:40:3e:26:34:6d:17:fe:1e:ec:97: 51:9c:7d:04:de:a5:b8:9a:b9:8f:2f:8c:31:9d:fa:d9: 7a:2b:f4:bc:91:67:d3:67:98:a3:f0:bd:47:fa:ce:a4: e6:10:0e:1c:ae:c0:a1:14:2d:cd:f5:72:7c:75:f2:86: 5d:31:4c:e0:ab:5f:8b:64:05:6b:17:25:80:4a:0e:92: ec:e0:6f:ac:2e:c4:39:bc:43:48:d5:a0:1f:01:02:80: ed:20:80:c5:3d:9b:cc:c8:bf:e8:c0:74:08:42:25:c3: 04:02:f1:1f:12:b6:3f:04:eb:10:38:a6:2a:a3:5d:f2: 26:dc:41:cc:6b:e8:c0:d4:e1:74:c8:6c:d9:c9:7b:c2 Fingerprint (SHA-256): 16:62:C9:21:F2:B9:66:0A:40:13:66:22:E6:16:4A:60:4A:80:A0:16:13:CF:BB:6A:42:3A:FB:12:39:7F:F5:68 Fingerprint (SHA1): BA:3D:29:F4:41:A9:0C:22:2D:89:CD:22:C9:B5:46:BC:34:50:5A:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1079: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145486 (0x49157ece) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:56:43 2024 Not After : Wed Dec 26 14:56:43 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:3d:df:37:59:74:f9:3f:75:30:f9:65:67:43:ac:85: 53:bd:15:a8:77:3e:54:9f:34:9d:83:ef:d7:51:39:e1: ee:8d:55:a3:e3:33:56:af:37:a1:72:f9:b3:9c:43:6e: f6:3d:cd:98:80:aa:c6:99:df:ed:61:d7:6c:e0:1a:9e: 97:51:a8:27:f1:e3:85:97:87:4c:e0:1e:99:6a:7e:2d: 20:71:13:75:a4:54:11:20:0e:2e:19:10:35:a1:01:6a: 69:16:ea:42:26:b4:48:6c:a0:df:d1:37:86:1e:95:41: 64:01:fe:e0:61:d0:af:52:7c:52:09:9c:2c:60:cd:83: 39:d8:3d:57:bf:3f:92:8e:69:e4:f1:5f:86:90:33:dc: 65:87:a5:13:f5:03:11:0e:74:1d:9f:7d:0e:90:d9:4e: 87:d3:09:8a:dc:0a:5a:ef:c8:62:d3:2c:65:e9:fe:e5: cf:a9:59:5c:9b:83:03:5a:a9:22:38:bf:f7:02:f0:d4: b7:42:00:fe:6e:68:c6:b9:39:5e:3b:49:df:1f:93:2f: 39:f8:3c:42:27:1f:a9:65:97:b5:20:d9:d1:86:06:4b: 47:df:12:e7:f1:3f:5e:2a:9a:3e:30:54:67:a9:a5:6f: 91:67:42:63:95:e7:38:55:32:c2:80:cd:47:65:3a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:c1:96:60:59:46:91:cd:5c:81:ed:82:a4:9c:a9:b0: 87:40:1a:d9:8b:a4:97:f5:ad:22:1f:d8:67:f1:96:b3: 2e:d5:31:dc:af:55:ef:29:73:b8:c4:3b:75:8a:67:f0: e5:c8:0e:14:08:34:44:be:86:01:f6:c7:18:9f:56:cf: 75:78:27:1b:48:4f:ee:f2:78:63:a2:d7:96:15:6a:ea: ac:1f:a0:24:15:ee:6d:8e:3a:f1:ca:12:62:0a:f9:a0: e7:01:34:c7:e0:fd:c3:74:5b:b4:e8:3d:19:98:ff:d3: 81:36:07:a4:29:6e:0c:11:26:6f:b0:4e:95:1a:bf:0d: 35:cb:07:ee:3b:da:29:b5:ae:2d:ca:7f:17:ca:36:47: 6f:8c:20:15:74:b8:95:a4:95:9a:52:4e:83:d3:9d:e7: 04:ae:be:27:39:8c:fb:14:2f:fc:0a:69:8a:e2:6b:64: 4e:5a:ef:fe:a5:e0:5a:8c:ae:7a:ca:e8:ce:36:aa:5b: 5f:c7:35:b7:6d:85:76:ba:de:92:04:d1:0d:f1:97:3e: ba:da:76:31:c1:85:53:72:47:f6:7f:89:ae:d4:82:15: b4:8e:7e:6d:c6:ee:07:88:b4:44:02:84:23:f0:6c:21: 82:2a:d2:1b:d2:cf:74:b5:f6:f1:f0:94:ef:01:e2:ed Fingerprint (SHA-256): D9:20:45:EF:3B:8E:E5:3A:54:AE:28:46:D9:B2:CF:C8:5D:8B:1E:15:8F:5C:3B:84:0F:70:E9:73:8E:7C:89:44 Fingerprint (SHA1): CF:D5:0B:76:04:ED:77:DE:98:31:25:6B:72:54:3F:D0:56:FD:40:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1080: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1081: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1082: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1083: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145486 (0x49157ece) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:56:43 2024 Not After : Wed Dec 26 14:56:43 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:3d:df:37:59:74:f9:3f:75:30:f9:65:67:43:ac:85: 53:bd:15:a8:77:3e:54:9f:34:9d:83:ef:d7:51:39:e1: ee:8d:55:a3:e3:33:56:af:37:a1:72:f9:b3:9c:43:6e: f6:3d:cd:98:80:aa:c6:99:df:ed:61:d7:6c:e0:1a:9e: 97:51:a8:27:f1:e3:85:97:87:4c:e0:1e:99:6a:7e:2d: 20:71:13:75:a4:54:11:20:0e:2e:19:10:35:a1:01:6a: 69:16:ea:42:26:b4:48:6c:a0:df:d1:37:86:1e:95:41: 64:01:fe:e0:61:d0:af:52:7c:52:09:9c:2c:60:cd:83: 39:d8:3d:57:bf:3f:92:8e:69:e4:f1:5f:86:90:33:dc: 65:87:a5:13:f5:03:11:0e:74:1d:9f:7d:0e:90:d9:4e: 87:d3:09:8a:dc:0a:5a:ef:c8:62:d3:2c:65:e9:fe:e5: cf:a9:59:5c:9b:83:03:5a:a9:22:38:bf:f7:02:f0:d4: b7:42:00:fe:6e:68:c6:b9:39:5e:3b:49:df:1f:93:2f: 39:f8:3c:42:27:1f:a9:65:97:b5:20:d9:d1:86:06:4b: 47:df:12:e7:f1:3f:5e:2a:9a:3e:30:54:67:a9:a5:6f: 91:67:42:63:95:e7:38:55:32:c2:80:cd:47:65:3a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:c1:96:60:59:46:91:cd:5c:81:ed:82:a4:9c:a9:b0: 87:40:1a:d9:8b:a4:97:f5:ad:22:1f:d8:67:f1:96:b3: 2e:d5:31:dc:af:55:ef:29:73:b8:c4:3b:75:8a:67:f0: e5:c8:0e:14:08:34:44:be:86:01:f6:c7:18:9f:56:cf: 75:78:27:1b:48:4f:ee:f2:78:63:a2:d7:96:15:6a:ea: ac:1f:a0:24:15:ee:6d:8e:3a:f1:ca:12:62:0a:f9:a0: e7:01:34:c7:e0:fd:c3:74:5b:b4:e8:3d:19:98:ff:d3: 81:36:07:a4:29:6e:0c:11:26:6f:b0:4e:95:1a:bf:0d: 35:cb:07:ee:3b:da:29:b5:ae:2d:ca:7f:17:ca:36:47: 6f:8c:20:15:74:b8:95:a4:95:9a:52:4e:83:d3:9d:e7: 04:ae:be:27:39:8c:fb:14:2f:fc:0a:69:8a:e2:6b:64: 4e:5a:ef:fe:a5:e0:5a:8c:ae:7a:ca:e8:ce:36:aa:5b: 5f:c7:35:b7:6d:85:76:ba:de:92:04:d1:0d:f1:97:3e: ba:da:76:31:c1:85:53:72:47:f6:7f:89:ae:d4:82:15: b4:8e:7e:6d:c6:ee:07:88:b4:44:02:84:23:f0:6c:21: 82:2a:d2:1b:d2:cf:74:b5:f6:f1:f0:94:ef:01:e2:ed Fingerprint (SHA-256): D9:20:45:EF:3B:8E:E5:3A:54:AE:28:46:D9:B2:CF:C8:5D:8B:1E:15:8F:5C:3B:84:0F:70:E9:73:8E:7C:89:44 Fingerprint (SHA1): CF:D5:0B:76:04:ED:77:DE:98:31:25:6B:72:54:3F:D0:56:FD:40:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1084: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145487 (0x49157ecf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:56:44 2024 Not After : Wed Dec 26 14:56:44 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:e0:8c:71:06:26:d7:56:a0:c7:50:1a:1c:b1:84:f3: bc:d5:f1:d3:57:54:2e:ae:35:12:35:bd:85:66:c7:0f: 9e:e4:34:cb:7a:4a:c6:eb:d3:96:87:5d:8c:fa:02:21: 78:07:cc:33:20:80:ce:59:45:56:05:3e:8e:18:db:6a: 02:51:21:06:90:90:a6:e1:59:5e:35:5e:26:f3:e5:c6: 1d:6b:15:8e:50:2f:41:fc:73:29:66:17:2f:3a:59:a7: 79:b8:05:27:9f:1d:a3:9f:c8:3e:dd:52:53:ee:cb:0f: 7b:67:fd:2b:e2:44:63:2e:c6:0e:bf:81:b9:ae:86:76: 42:f4:a4:da:39:e1:7b:14:09:a7:01:94:f1:e6:6b:d3: 2c:42:b5:96:f1:3f:1b:8d:13:84:95:1b:e1:98:9b:e4: 8a:97:d6:a8:52:10:e0:5e:b5:27:2b:10:76:18:d6:6f: cf:6d:46:64:61:c3:27:4b:57:93:9d:cf:97:cd:70:4a: ab:b8:d5:f6:1d:c2:51:7f:98:60:a1:26:3c:94:c0:af: 2e:42:1a:71:6c:d1:8b:61:9d:75:18:60:60:82:41:be: 7e:50:a8:83:81:cb:ff:0f:86:e0:fc:0c:09:04:2b:00: f4:41:4a:d9:16:fb:78:58:af:ed:30:a8:40:5a:25:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:ac:d5:da:96:b9:09:d7:59:64:6f:89:40:8e:52:38: 7a:5b:92:82:8e:5a:38:71:c2:c3:4f:41:5a:b0:53:2d: 6b:f5:55:07:66:44:a0:ef:f8:40:eb:70:2b:ac:e5:55: b6:1c:05:84:b3:26:ab:9d:79:7a:2e:9a:22:00:58:56: cc:93:28:aa:1f:45:90:68:a8:53:ba:e7:24:9b:4b:92: 48:73:fc:04:34:9f:f6:03:26:7d:e9:2e:c2:bb:c4:fb: 6c:a4:70:b6:a2:9a:66:02:29:67:22:ca:1b:37:e1:01: 36:6e:64:b5:0f:7b:40:3e:26:34:6d:17:fe:1e:ec:97: 51:9c:7d:04:de:a5:b8:9a:b9:8f:2f:8c:31:9d:fa:d9: 7a:2b:f4:bc:91:67:d3:67:98:a3:f0:bd:47:fa:ce:a4: e6:10:0e:1c:ae:c0:a1:14:2d:cd:f5:72:7c:75:f2:86: 5d:31:4c:e0:ab:5f:8b:64:05:6b:17:25:80:4a:0e:92: ec:e0:6f:ac:2e:c4:39:bc:43:48:d5:a0:1f:01:02:80: ed:20:80:c5:3d:9b:cc:c8:bf:e8:c0:74:08:42:25:c3: 04:02:f1:1f:12:b6:3f:04:eb:10:38:a6:2a:a3:5d:f2: 26:dc:41:cc:6b:e8:c0:d4:e1:74:c8:6c:d9:c9:7b:c2 Fingerprint (SHA-256): 16:62:C9:21:F2:B9:66:0A:40:13:66:22:E6:16:4A:60:4A:80:A0:16:13:CF:BB:6A:42:3A:FB:12:39:7F:F5:68 Fingerprint (SHA1): BA:3D:29:F4:41:A9:0C:22:2D:89:CD:22:C9:B5:46:BC:34:50:5A:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1085: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1086: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1087: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1088: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1089: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1090: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145487 (0x49157ecf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:56:44 2024 Not After : Wed Dec 26 14:56:44 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:e0:8c:71:06:26:d7:56:a0:c7:50:1a:1c:b1:84:f3: bc:d5:f1:d3:57:54:2e:ae:35:12:35:bd:85:66:c7:0f: 9e:e4:34:cb:7a:4a:c6:eb:d3:96:87:5d:8c:fa:02:21: 78:07:cc:33:20:80:ce:59:45:56:05:3e:8e:18:db:6a: 02:51:21:06:90:90:a6:e1:59:5e:35:5e:26:f3:e5:c6: 1d:6b:15:8e:50:2f:41:fc:73:29:66:17:2f:3a:59:a7: 79:b8:05:27:9f:1d:a3:9f:c8:3e:dd:52:53:ee:cb:0f: 7b:67:fd:2b:e2:44:63:2e:c6:0e:bf:81:b9:ae:86:76: 42:f4:a4:da:39:e1:7b:14:09:a7:01:94:f1:e6:6b:d3: 2c:42:b5:96:f1:3f:1b:8d:13:84:95:1b:e1:98:9b:e4: 8a:97:d6:a8:52:10:e0:5e:b5:27:2b:10:76:18:d6:6f: cf:6d:46:64:61:c3:27:4b:57:93:9d:cf:97:cd:70:4a: ab:b8:d5:f6:1d:c2:51:7f:98:60:a1:26:3c:94:c0:af: 2e:42:1a:71:6c:d1:8b:61:9d:75:18:60:60:82:41:be: 7e:50:a8:83:81:cb:ff:0f:86:e0:fc:0c:09:04:2b:00: f4:41:4a:d9:16:fb:78:58:af:ed:30:a8:40:5a:25:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:ac:d5:da:96:b9:09:d7:59:64:6f:89:40:8e:52:38: 7a:5b:92:82:8e:5a:38:71:c2:c3:4f:41:5a:b0:53:2d: 6b:f5:55:07:66:44:a0:ef:f8:40:eb:70:2b:ac:e5:55: b6:1c:05:84:b3:26:ab:9d:79:7a:2e:9a:22:00:58:56: cc:93:28:aa:1f:45:90:68:a8:53:ba:e7:24:9b:4b:92: 48:73:fc:04:34:9f:f6:03:26:7d:e9:2e:c2:bb:c4:fb: 6c:a4:70:b6:a2:9a:66:02:29:67:22:ca:1b:37:e1:01: 36:6e:64:b5:0f:7b:40:3e:26:34:6d:17:fe:1e:ec:97: 51:9c:7d:04:de:a5:b8:9a:b9:8f:2f:8c:31:9d:fa:d9: 7a:2b:f4:bc:91:67:d3:67:98:a3:f0:bd:47:fa:ce:a4: e6:10:0e:1c:ae:c0:a1:14:2d:cd:f5:72:7c:75:f2:86: 5d:31:4c:e0:ab:5f:8b:64:05:6b:17:25:80:4a:0e:92: ec:e0:6f:ac:2e:c4:39:bc:43:48:d5:a0:1f:01:02:80: ed:20:80:c5:3d:9b:cc:c8:bf:e8:c0:74:08:42:25:c3: 04:02:f1:1f:12:b6:3f:04:eb:10:38:a6:2a:a3:5d:f2: 26:dc:41:cc:6b:e8:c0:d4:e1:74:c8:6c:d9:c9:7b:c2 Fingerprint (SHA-256): 16:62:C9:21:F2:B9:66:0A:40:13:66:22:E6:16:4A:60:4A:80:A0:16:13:CF:BB:6A:42:3A:FB:12:39:7F:F5:68 Fingerprint (SHA1): BA:3D:29:F4:41:A9:0C:22:2D:89:CD:22:C9:B5:46:BC:34:50:5A:65 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1091: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145487 (0x49157ecf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:56:44 2024 Not After : Wed Dec 26 14:56:44 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:e0:8c:71:06:26:d7:56:a0:c7:50:1a:1c:b1:84:f3: bc:d5:f1:d3:57:54:2e:ae:35:12:35:bd:85:66:c7:0f: 9e:e4:34:cb:7a:4a:c6:eb:d3:96:87:5d:8c:fa:02:21: 78:07:cc:33:20:80:ce:59:45:56:05:3e:8e:18:db:6a: 02:51:21:06:90:90:a6:e1:59:5e:35:5e:26:f3:e5:c6: 1d:6b:15:8e:50:2f:41:fc:73:29:66:17:2f:3a:59:a7: 79:b8:05:27:9f:1d:a3:9f:c8:3e:dd:52:53:ee:cb:0f: 7b:67:fd:2b:e2:44:63:2e:c6:0e:bf:81:b9:ae:86:76: 42:f4:a4:da:39:e1:7b:14:09:a7:01:94:f1:e6:6b:d3: 2c:42:b5:96:f1:3f:1b:8d:13:84:95:1b:e1:98:9b:e4: 8a:97:d6:a8:52:10:e0:5e:b5:27:2b:10:76:18:d6:6f: cf:6d:46:64:61:c3:27:4b:57:93:9d:cf:97:cd:70:4a: ab:b8:d5:f6:1d:c2:51:7f:98:60:a1:26:3c:94:c0:af: 2e:42:1a:71:6c:d1:8b:61:9d:75:18:60:60:82:41:be: 7e:50:a8:83:81:cb:ff:0f:86:e0:fc:0c:09:04:2b:00: f4:41:4a:d9:16:fb:78:58:af:ed:30:a8:40:5a:25:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0f:ac:d5:da:96:b9:09:d7:59:64:6f:89:40:8e:52:38: 7a:5b:92:82:8e:5a:38:71:c2:c3:4f:41:5a:b0:53:2d: 6b:f5:55:07:66:44:a0:ef:f8:40:eb:70:2b:ac:e5:55: b6:1c:05:84:b3:26:ab:9d:79:7a:2e:9a:22:00:58:56: cc:93:28:aa:1f:45:90:68:a8:53:ba:e7:24:9b:4b:92: 48:73:fc:04:34:9f:f6:03:26:7d:e9:2e:c2:bb:c4:fb: 6c:a4:70:b6:a2:9a:66:02:29:67:22:ca:1b:37:e1:01: 36:6e:64:b5:0f:7b:40:3e:26:34:6d:17:fe:1e:ec:97: 51:9c:7d:04:de:a5:b8:9a:b9:8f:2f:8c:31:9d:fa:d9: 7a:2b:f4:bc:91:67:d3:67:98:a3:f0:bd:47:fa:ce:a4: e6:10:0e:1c:ae:c0:a1:14:2d:cd:f5:72:7c:75:f2:86: 5d:31:4c:e0:ab:5f:8b:64:05:6b:17:25:80:4a:0e:92: ec:e0:6f:ac:2e:c4:39:bc:43:48:d5:a0:1f:01:02:80: ed:20:80:c5:3d:9b:cc:c8:bf:e8:c0:74:08:42:25:c3: 04:02:f1:1f:12:b6:3f:04:eb:10:38:a6:2a:a3:5d:f2: 26:dc:41:cc:6b:e8:c0:d4:e1:74:c8:6c:d9:c9:7b:c2 Fingerprint (SHA-256): 16:62:C9:21:F2:B9:66:0A:40:13:66:22:E6:16:4A:60:4A:80:A0:16:13:CF:BB:6A:42:3A:FB:12:39:7F:F5:68 Fingerprint (SHA1): BA:3D:29:F4:41:A9:0C:22:2D:89:CD:22:C9:B5:46:BC:34:50:5A:65 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1092: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1093: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1094: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1095: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1096: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1097: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145486 (0x49157ece) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:56:43 2024 Not After : Wed Dec 26 14:56:43 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:3d:df:37:59:74:f9:3f:75:30:f9:65:67:43:ac:85: 53:bd:15:a8:77:3e:54:9f:34:9d:83:ef:d7:51:39:e1: ee:8d:55:a3:e3:33:56:af:37:a1:72:f9:b3:9c:43:6e: f6:3d:cd:98:80:aa:c6:99:df:ed:61:d7:6c:e0:1a:9e: 97:51:a8:27:f1:e3:85:97:87:4c:e0:1e:99:6a:7e:2d: 20:71:13:75:a4:54:11:20:0e:2e:19:10:35:a1:01:6a: 69:16:ea:42:26:b4:48:6c:a0:df:d1:37:86:1e:95:41: 64:01:fe:e0:61:d0:af:52:7c:52:09:9c:2c:60:cd:83: 39:d8:3d:57:bf:3f:92:8e:69:e4:f1:5f:86:90:33:dc: 65:87:a5:13:f5:03:11:0e:74:1d:9f:7d:0e:90:d9:4e: 87:d3:09:8a:dc:0a:5a:ef:c8:62:d3:2c:65:e9:fe:e5: cf:a9:59:5c:9b:83:03:5a:a9:22:38:bf:f7:02:f0:d4: b7:42:00:fe:6e:68:c6:b9:39:5e:3b:49:df:1f:93:2f: 39:f8:3c:42:27:1f:a9:65:97:b5:20:d9:d1:86:06:4b: 47:df:12:e7:f1:3f:5e:2a:9a:3e:30:54:67:a9:a5:6f: 91:67:42:63:95:e7:38:55:32:c2:80:cd:47:65:3a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:c1:96:60:59:46:91:cd:5c:81:ed:82:a4:9c:a9:b0: 87:40:1a:d9:8b:a4:97:f5:ad:22:1f:d8:67:f1:96:b3: 2e:d5:31:dc:af:55:ef:29:73:b8:c4:3b:75:8a:67:f0: e5:c8:0e:14:08:34:44:be:86:01:f6:c7:18:9f:56:cf: 75:78:27:1b:48:4f:ee:f2:78:63:a2:d7:96:15:6a:ea: ac:1f:a0:24:15:ee:6d:8e:3a:f1:ca:12:62:0a:f9:a0: e7:01:34:c7:e0:fd:c3:74:5b:b4:e8:3d:19:98:ff:d3: 81:36:07:a4:29:6e:0c:11:26:6f:b0:4e:95:1a:bf:0d: 35:cb:07:ee:3b:da:29:b5:ae:2d:ca:7f:17:ca:36:47: 6f:8c:20:15:74:b8:95:a4:95:9a:52:4e:83:d3:9d:e7: 04:ae:be:27:39:8c:fb:14:2f:fc:0a:69:8a:e2:6b:64: 4e:5a:ef:fe:a5:e0:5a:8c:ae:7a:ca:e8:ce:36:aa:5b: 5f:c7:35:b7:6d:85:76:ba:de:92:04:d1:0d:f1:97:3e: ba:da:76:31:c1:85:53:72:47:f6:7f:89:ae:d4:82:15: b4:8e:7e:6d:c6:ee:07:88:b4:44:02:84:23:f0:6c:21: 82:2a:d2:1b:d2:cf:74:b5:f6:f1:f0:94:ef:01:e2:ed Fingerprint (SHA-256): D9:20:45:EF:3B:8E:E5:3A:54:AE:28:46:D9:B2:CF:C8:5D:8B:1E:15:8F:5C:3B:84:0F:70:E9:73:8E:7C:89:44 Fingerprint (SHA1): CF:D5:0B:76:04:ED:77:DE:98:31:25:6B:72:54:3F:D0:56:FD:40:AD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1098: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145486 (0x49157ece) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:56:43 2024 Not After : Wed Dec 26 14:56:43 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:3d:df:37:59:74:f9:3f:75:30:f9:65:67:43:ac:85: 53:bd:15:a8:77:3e:54:9f:34:9d:83:ef:d7:51:39:e1: ee:8d:55:a3:e3:33:56:af:37:a1:72:f9:b3:9c:43:6e: f6:3d:cd:98:80:aa:c6:99:df:ed:61:d7:6c:e0:1a:9e: 97:51:a8:27:f1:e3:85:97:87:4c:e0:1e:99:6a:7e:2d: 20:71:13:75:a4:54:11:20:0e:2e:19:10:35:a1:01:6a: 69:16:ea:42:26:b4:48:6c:a0:df:d1:37:86:1e:95:41: 64:01:fe:e0:61:d0:af:52:7c:52:09:9c:2c:60:cd:83: 39:d8:3d:57:bf:3f:92:8e:69:e4:f1:5f:86:90:33:dc: 65:87:a5:13:f5:03:11:0e:74:1d:9f:7d:0e:90:d9:4e: 87:d3:09:8a:dc:0a:5a:ef:c8:62:d3:2c:65:e9:fe:e5: cf:a9:59:5c:9b:83:03:5a:a9:22:38:bf:f7:02:f0:d4: b7:42:00:fe:6e:68:c6:b9:39:5e:3b:49:df:1f:93:2f: 39:f8:3c:42:27:1f:a9:65:97:b5:20:d9:d1:86:06:4b: 47:df:12:e7:f1:3f:5e:2a:9a:3e:30:54:67:a9:a5:6f: 91:67:42:63:95:e7:38:55:32:c2:80:cd:47:65:3a:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:c1:96:60:59:46:91:cd:5c:81:ed:82:a4:9c:a9:b0: 87:40:1a:d9:8b:a4:97:f5:ad:22:1f:d8:67:f1:96:b3: 2e:d5:31:dc:af:55:ef:29:73:b8:c4:3b:75:8a:67:f0: e5:c8:0e:14:08:34:44:be:86:01:f6:c7:18:9f:56:cf: 75:78:27:1b:48:4f:ee:f2:78:63:a2:d7:96:15:6a:ea: ac:1f:a0:24:15:ee:6d:8e:3a:f1:ca:12:62:0a:f9:a0: e7:01:34:c7:e0:fd:c3:74:5b:b4:e8:3d:19:98:ff:d3: 81:36:07:a4:29:6e:0c:11:26:6f:b0:4e:95:1a:bf:0d: 35:cb:07:ee:3b:da:29:b5:ae:2d:ca:7f:17:ca:36:47: 6f:8c:20:15:74:b8:95:a4:95:9a:52:4e:83:d3:9d:e7: 04:ae:be:27:39:8c:fb:14:2f:fc:0a:69:8a:e2:6b:64: 4e:5a:ef:fe:a5:e0:5a:8c:ae:7a:ca:e8:ce:36:aa:5b: 5f:c7:35:b7:6d:85:76:ba:de:92:04:d1:0d:f1:97:3e: ba:da:76:31:c1:85:53:72:47:f6:7f:89:ae:d4:82:15: b4:8e:7e:6d:c6:ee:07:88:b4:44:02:84:23:f0:6c:21: 82:2a:d2:1b:d2:cf:74:b5:f6:f1:f0:94:ef:01:e2:ed Fingerprint (SHA-256): D9:20:45:EF:3B:8E:E5:3A:54:AE:28:46:D9:B2:CF:C8:5D:8B:1E:15:8F:5C:3B:84:0F:70:E9:73:8E:7C:89:44 Fingerprint (SHA1): CF:D5:0B:76:04:ED:77:DE:98:31:25:6B:72:54:3F:D0:56:FD:40:AD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1099: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1100: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145491 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1101: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1102: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1103: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145492 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1104: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1105: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1106: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145493 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1107: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1108: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1109: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145494 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1110: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1111: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1112: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145495 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1113: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1114: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1115: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145496 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1116: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1117: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1118: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145497 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1119: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1120: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1121: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145498 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1122: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1123: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1124: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145499 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1125: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1126: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1127: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1128: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1226145500 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1129: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1130: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1226145501 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1131: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1132: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1226145502 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1133: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1134: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1135: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1136: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1137: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1226145503 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1138: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1139: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1226145504 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1140: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1141: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1226145505 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1142: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1143: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1144: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1145: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1146: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1226145506 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1147: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1148: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1226145507 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1149: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1150: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1226145508 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1151: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1152: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1153: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1154: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1155: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1226145509 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1156: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1157: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1226145510 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1158: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1159: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1226145511 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1160: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1161: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1162: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1163: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1226145512 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1165: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1167: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1168: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145513 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1169: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1170: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145491 (0x49157ed3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Thu Dec 26 14:56:49 2024 Not After : Wed Dec 26 14:56:49 2074 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:c3:41:c9:6b:f0:82:0a:c5:ff:59:34:94:09:8f:8d: 9d:1b:62:f9:61:b9:66:8b:b2:71:3f:6c:94:60:21:cb: 41:89:41:62:47:1c:ed:ec:d5:d4:8d:a1:28:fe:8a:c1: f4:c8:e5:97:a4:69:e2:10:45:a9:1e:d8:e4:9b:b8:53: 10:51:7a:dc:cb:53:2f:ce:0c:ff:24:53:20:18:f8:ce: 8d:97:cb:cc:56:f2:10:5b:40:48:ba:aa:10:b7:44:f9: 93:bb:63:78:dd:d5:85:89:d4:66:b0:d7:a6:26:ab:c3: 06:52:a1:95:1c:aa:75:14:c5:3a:46:c7:68:89:af:43: 7c:4e:6e:26:ec:a2:80:a6:bc:8a:13:af:07:97:22:5c: 43:51:eb:f8:5a:f4:be:00:e7:98:f7:c5:65:2b:8d:da: a7:74:5e:fb:0b:76:bd:b0:a1:ab:81:b9:e0:1d:a0:1b: e2:b4:79:16:8b:ab:da:09:5c:97:5a:fe:65:c1:7f:c2: c0:b8:84:2f:49:b1:7f:34:41:c0:a4:a5:cb:84:dd:20: 20:6b:5a:bd:cb:4d:fe:ef:6e:90:78:69:fd:bc:1c:71: f2:af:cf:a7:e1:f0:16:e0:67:42:79:02:6e:0e:83:fa: 0d:1b:5b:8c:17:cd:9b:76:b4:3d:ec:25:6c:9f:37:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:5e:50:cc:e2:09:e9:1f:fc:a4:18:f8:aa:4a:82:65: b3:24:e3:74:31:17:34:cd:fd:3e:35:ad:6c:d9:08:9e: 37:0a:88:e2:38:94:28:5d:2d:06:cb:8e:5f:de:66:72: bf:23:d8:2e:35:06:52:cf:a6:55:c8:8b:ce:83:f3:6c: da:3b:07:0e:13:95:0a:d5:64:6c:4d:26:3c:a3:33:db: 61:af:0d:aa:a7:1d:bf:20:2d:79:47:e5:ae:51:35:1b: 58:78:11:26:c9:19:e9:ec:d8:b7:5c:39:f9:ed:2e:ea: ba:be:32:17:47:95:7a:c9:d6:e3:e3:40:45:11:ed:e6: 2c:aa:9e:63:38:8c:4a:0b:c3:bf:eb:55:19:d1:9d:e2: 7d:cb:e9:63:f7:73:c9:7a:84:72:2d:fb:3e:d8:73:64: ea:5e:62:8c:29:9d:8d:66:7d:89:1e:ae:27:71:ee:5f: dc:12:26:56:9f:6e:48:d6:fd:b6:45:97:0a:37:92:9c: 70:45:f5:13:fc:ef:b0:d4:68:5e:4f:fc:2d:9a:48:3d: 47:a5:8b:fa:1d:01:f8:ce:f8:73:45:67:0a:76:eb:f6: 5b:9b:3a:c9:67:3e:4b:9a:c3:97:4c:1f:3a:3f:90:dc: 35:5d:19:11:17:f1:d3:31:c5:47:70:6f:1b:fa:30:bc Fingerprint (SHA-256): AC:BC:0B:89:1C:C4:B4:7F:C8:D5:74:82:BC:CB:73:02:E3:8E:1F:C4:D5:20:14:DA:2A:7E:3D:9C:A4:31:79:20 Fingerprint (SHA1): FD:C2:0F:84:7B:98:0A:04:B2:39:C8:9C:03:3E:3B:15:DA:73:69:C7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1171: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145492 (0x49157ed4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Thu Dec 26 14:56:50 2024 Not After : Wed Dec 26 14:56:50 2074 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:a4:ed:88:df:1b:3c:e9:f0:20:0d:17:07:01:70:9a: 15:08:47:38:db:55:45:6c:42:f1:b5:f0:9c:02:65:ab: ba:a2:37:26:48:90:5b:f6:a9:0b:d1:af:13:fe:42:1b: 03:2c:ed:67:c3:0a:45:24:1b:52:67:9c:d6:c9:7f:c5: cf:71:8a:e3:7e:dc:00:0e:9d:2d:93:63:aa:ea:02:f9: 8a:c3:55:93:d5:67:a8:17:aa:7d:8d:f7:45:5c:d1:6d: c6:79:f0:b8:61:f7:16:7e:62:6b:68:0e:fc:51:4b:9c: 1f:3a:1c:36:f0:31:42:90:98:f1:72:63:46:7f:85:ee: 42:54:c0:ca:52:78:aa:b0:40:65:62:58:a6:15:9e:e9: 7a:8e:71:21:5d:5c:de:89:53:d2:d1:4e:8e:87:e3:a0: 63:ec:b7:f9:f3:fc:7f:0b:79:18:8b:8a:12:1d:77:33: 81:8a:b0:65:92:44:1c:8a:b8:51:14:c5:5d:35:91:bb: de:b8:f0:90:96:ff:62:a8:01:6c:61:88:f4:72:00:dc: 8a:da:67:98:2b:97:04:32:33:f4:60:3f:e3:95:f1:42: be:45:c5:50:a6:a9:ad:cb:83:11:93:3e:ae:94:7b:bc: bf:10:c7:d2:23:63:2d:cc:e1:f9:4c:e6:3d:20:bd:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:b4:28:c4:9f:ec:73:7d:57:cc:71:c5:8a:a0:aa:7f: 78:a1:6b:88:cc:9d:22:c5:e7:ab:0d:ba:79:11:93:7f: db:25:f2:f1:0d:34:6f:ef:bd:67:bb:9b:d4:42:66:7c: 17:74:2a:ce:ff:81:eb:63:c4:01:92:7c:84:fa:fb:46: 7c:c8:80:21:29:9b:34:46:4d:fa:5f:56:4a:67:4c:53: 86:c1:0d:b0:63:ad:aa:23:21:2c:5e:89:7b:24:5f:6e: f7:87:6d:19:d9:38:b2:f2:e0:ee:8f:9e:9a:c0:6d:59: 9f:99:18:7c:34:ce:e8:a5:f5:ff:3b:44:79:9c:c3:9d: 7c:6d:8d:d2:17:e0:3e:90:f5:06:58:3a:c9:4c:98:61: dd:4d:c8:de:83:10:f6:76:65:89:7f:fe:be:3e:69:a5: 09:58:1f:b5:9c:e9:7c:5a:f1:63:75:a4:c5:1b:74:f6: 39:91:c2:86:03:70:16:b4:41:8d:87:29:bd:52:0f:58: 72:24:28:42:63:d5:b0:ab:ca:c9:bd:c5:fb:aa:81:99: 8c:fa:af:38:11:7e:3f:26:a5:a9:3c:09:3b:ec:a2:6a: 74:60:cf:fb:b8:4f:d7:04:1d:b4:2c:0a:ab:54:d7:75: 10:fd:e8:d7:f1:a3:6f:bb:12:bf:31:1d:14:85:b9:d0 Fingerprint (SHA-256): 5C:D3:7A:2B:B3:22:E9:AD:9C:60:6A:1A:15:EF:EC:A6:CC:9F:D2:BD:31:86:33:71:69:98:E7:6E:78:A2:A6:5B Fingerprint (SHA1): 6E:15:DA:82:EA:A1:E2:83:A6:D7:08:BE:0E:7F:D9:E8:EE:25:69:9F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1172: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145493 (0x49157ed5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Thu Dec 26 14:56:50 2024 Not After : Wed Dec 26 14:56:50 2074 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:0b:06:66:89:bf:26:48:f2:c4:ad:b7:4d:64:fb:78: 55:76:68:01:10:b6:9d:f6:f8:dc:a4:3d:88:65:d8:50: 0d:52:e2:8a:80:d1:b4:f7:93:5a:78:9d:e2:20:5b:b9: 24:b8:10:0a:e0:62:33:e2:13:c1:08:a4:1b:16:67:18: ff:dd:dd:e7:2f:be:8b:7a:bb:96:fe:59:64:20:c4:66: bb:0d:20:45:90:c5:e6:5e:d4:77:7a:73:d1:55:b9:b8: c7:d0:7d:e3:b8:58:59:f9:c3:24:40:52:5a:8e:53:0f: 19:e8:b1:99:ab:e5:bc:16:61:5c:8b:b6:66:ec:ff:5f: c7:6a:c3:ec:42:77:4d:db:36:12:a4:ce:16:04:4d:d9: 93:41:82:70:c1:05:26:46:4e:ed:87:27:ab:31:13:0f: 4e:58:c0:50:d6:60:f7:d3:a6:ae:78:35:af:21:92:36: d0:b5:d3:06:cc:7b:f5:7e:68:76:ec:57:cc:a0:91:3a: 7b:24:88:1f:fb:59:58:cc:08:3a:e8:ff:fd:94:74:0e: 5b:85:e9:d0:e6:95:72:66:62:2d:41:12:94:e7:f8:4b: 87:b1:72:14:9b:7d:a8:ff:dd:a6:db:6b:61:32:e0:38: a6:d1:d3:21:15:3b:5a:52:4b:34:91:05:dc:12:0a:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:b0:11:9d:88:56:58:00:d7:4a:87:db:54:bb:37:72: 4d:97:07:2c:a4:32:0c:16:48:1e:6f:99:63:e4:a7:32: c0:67:d3:74:4e:5c:c2:dd:61:a2:a7:16:1b:ae:35:07: 22:5f:cb:bc:81:e0:98:e0:dc:9b:e2:19:15:0b:38:13: 1e:5b:0e:c9:ec:0a:74:f2:3d:5a:5b:af:dc:eb:66:f1: 9c:06:24:33:b9:ce:ec:4d:d8:0d:b2:75:24:13:d2:3d: 01:2c:e4:72:fe:5c:d4:fe:5c:f4:50:4b:6f:dc:fa:53: 23:9c:cb:b4:65:b2:09:48:02:e7:6f:6e:4a:92:60:31: 1e:da:fa:57:21:1b:db:d4:e1:6c:78:f7:c5:fc:a4:a5: db:cd:a2:6a:60:a8:03:16:9d:ea:14:df:1a:c5:bc:bc: e7:9a:d5:ca:9b:96:c8:9d:34:35:ea:08:a1:25:4b:38: 0f:e5:90:3b:00:f3:23:30:f3:98:94:15:d6:ac:fc:a9: f1:b6:f7:ec:cb:17:d2:3f:29:39:c2:e7:39:50:46:4d: 6a:d0:17:c4:47:3a:37:66:ca:d2:21:d6:c7:62:29:17: 23:e5:89:2e:bf:33:a2:37:e8:c8:3c:a7:dd:87:91:d9: 16:91:26:6a:81:81:62:fa:6f:7a:d4:be:5a:ad:8a:c4 Fingerprint (SHA-256): 38:BC:EE:EF:C2:B3:AF:35:39:E4:61:C2:9C:58:48:1A:24:C0:E6:08:54:07:64:0A:A1:C4:33:54:4A:D6:35:60 Fingerprint (SHA1): 22:D2:9E:92:56:3D:41:5E:E0:8C:9B:38:EA:E8:E8:BF:04:CE:3C:BB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1173: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145494 (0x49157ed6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Thu Dec 26 14:56:51 2024 Not After : Wed Dec 26 14:56:51 2074 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:0b:99:c0:09:de:3b:54:6c:9f:0e:e1:d6:b4:42:85: f4:bf:3d:72:14:2c:aa:73:83:da:6d:7b:c8:21:ed:23: 63:6c:07:54:b9:b8:59:d1:56:c7:83:03:41:32:4a:91: e7:b6:4e:f2:09:ea:3e:8c:06:d8:01:70:49:30:00:d7: e7:c6:a4:ea:ae:b0:3f:d3:c9:89:e3:98:0f:e5:50:7f: ef:48:f6:7a:b7:66:40:09:dc:d0:87:e3:ff:71:be:09: 84:0d:6b:cb:20:02:a2:a2:05:69:d1:e4:cd:c6:4a:f3: fd:45:1e:26:5b:ba:a2:c9:8c:9e:07:55:fd:cf:97:ee: d0:44:c9:b2:f1:13:b8:02:25:8a:18:64:8f:26:16:19: b5:b4:59:29:57:e7:c2:ac:55:43:76:34:0d:89:aa:da: 30:0c:d8:2f:28:34:17:83:d1:5c:12:60:1c:a6:03:c3: de:48:42:08:a2:ce:4d:09:78:69:fb:5d:3c:f9:d4:dc: 90:94:9f:64:a2:b1:41:90:84:48:8a:b4:13:9d:fb:90: 95:22:75:31:7e:b3:6c:57:43:93:89:14:bd:1f:d2:b4: e8:5b:42:ed:5b:02:3a:90:e3:a2:98:f6:bc:b8:e4:73: 87:97:ba:f9:be:8a:b0:4f:b7:b2:a6:8e:06:94:f9:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:dd:6d:02:92:14:b9:28:92:d0:cd:2f:6a:13:2e:5b: 7d:a2:c1:c0:ce:61:78:44:e9:08:e1:89:77:3c:cb:0d: eb:24:47:8d:d0:44:db:24:42:e3:95:ab:67:86:f5:d6: 3b:7b:3a:68:c1:10:fe:4d:d5:9d:04:49:dd:26:82:15: 82:33:45:f4:80:20:01:00:6e:6e:37:6b:8d:4b:3f:f6: 19:d6:82:d7:71:36:84:93:96:7d:29:bd:4f:70:b8:31: 11:7e:64:3a:af:4e:5c:42:d5:4c:4f:5d:7d:c2:35:82: d2:83:c7:69:6d:eb:27:f3:5b:1a:c3:7d:8d:c4:26:d9: 17:25:14:8e:27:19:c1:55:b1:0e:4c:66:00:61:8f:8a: e3:c4:b7:40:55:1e:a3:01:74:28:b6:a5:85:1b:2b:40: 48:36:20:1f:fa:49:96:24:b2:5b:e5:50:f1:c7:cd:5a: 58:3b:d3:06:9e:24:93:7a:fe:14:d4:10:26:3f:b5:30: e6:e6:73:ed:65:4a:fb:3b:69:91:1e:2f:a9:82:90:45: 35:d0:92:89:a2:b4:1c:73:9c:6a:cb:71:33:da:67:3d: 8e:36:11:64:dc:a7:b5:a6:a6:e5:eb:8f:d9:af:2a:85: 54:b3:47:c4:86:f0:a4:53:eb:dc:84:6f:d8:73:2f:a8 Fingerprint (SHA-256): 42:F0:B8:F4:86:DC:57:50:50:6A:69:7F:73:C2:94:35:8A:BC:75:9B:DB:41:A0:EB:9B:48:4E:3F:20:73:F8:1D Fingerprint (SHA1): 86:C5:EA:39:6F:E6:93:68:CE:85:C7:96:A7:A5:21:62:08:98:0E:05 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1174: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145495 (0x49157ed7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Thu Dec 26 14:56:52 2024 Not After : Wed Dec 26 14:56:52 2074 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:a6:55:8e:46:40:5f:7c:6d:cc:ba:77:32:9b:68:bb: 4e:c9:14:e5:a8:31:49:de:d4:6d:f2:a8:54:24:7a:9d: 14:58:42:f9:4f:0f:2c:e8:46:af:68:54:fa:e0:5e:ed: 31:15:ad:a0:9e:00:70:e3:81:a1:d2:44:44:05:f7:2a: 99:02:63:92:c2:a6:85:c6:34:4a:c0:b3:76:a1:25:a9: 98:eb:16:4d:d0:24:9d:3a:71:4b:10:ac:3e:9f:2f:f4: 56:dd:68:1d:79:c8:b5:97:fb:20:ce:bf:f1:1e:59:8c: 10:04:89:82:30:35:0d:e4:c9:5e:ff:27:bc:cb:f4:d6: 26:e2:cc:4b:fd:70:57:7d:af:8a:91:a2:19:c1:f8:88: 3d:09:b5:d1:ce:a1:a9:a8:68:ce:bb:3d:70:9b:33:db: 53:48:a6:a8:d4:ec:65:b6:5f:0b:b5:29:46:43:dd:0a: d0:86:45:a8:3e:d1:eb:ef:dc:9b:48:f5:12:2d:57:af: 4a:ff:80:c9:78:9a:50:3b:bf:50:e6:8e:e9:b3:b8:6c: 91:b8:a2:8f:d1:74:c9:27:93:36:60:51:79:92:55:65: 2d:83:08:9f:4e:f1:07:79:57:c6:fc:60:cf:3d:c3:5a: 5a:6d:66:cf:ba:89:65:fb:21:8f:87:57:aa:fb:1f:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bd:8e:a4:ca:d7:c9:8f:8d:f4:0a:d4:9e:26:34:b7:a9: 28:34:a3:ba:b4:9f:c5:56:23:9a:b2:e9:6b:04:e8:03: 34:98:39:d3:7e:b0:9f:8b:fd:ed:2b:fd:b8:1b:17:2a: dc:3e:a0:e2:9a:62:00:98:86:ba:67:aa:2f:ce:87:6a: b9:ea:8a:88:73:06:fc:3d:11:69:95:29:fe:0e:fb:94: ec:b9:65:e6:2a:0c:d6:e2:bd:75:e8:5a:56:91:79:b1: 1d:1a:0a:e7:bd:06:39:d8:a6:4f:c6:8c:d4:31:9e:78: 8a:fd:77:71:d7:55:c9:fc:52:74:37:9c:e9:34:f2:a7: a2:73:c5:64:3c:3c:48:07:3f:1b:c3:c3:5f:c5:69:a3: 4a:f1:88:2a:8d:33:49:0f:a6:8a:78:26:4b:1c:e7:02: 6e:1a:20:c6:98:72:88:8b:23:6d:6b:81:d0:60:0e:cc: e3:60:d1:24:25:ce:d3:30:6a:0c:ee:8e:9c:44:78:73: 07:74:54:6a:45:56:88:1b:39:77:f6:c5:cc:36:10:e9: 95:d8:4e:37:b9:40:5c:59:51:08:b8:aa:a2:c6:db:a9: 6e:01:7f:93:1d:ea:ad:7c:54:b9:4e:8e:a0:65:9b:73: de:51:96:d8:a4:ee:76:25:ca:ea:b6:ab:99:07:91:d7 Fingerprint (SHA-256): BF:37:85:F2:C5:92:B3:FA:B0:EF:1C:54:7F:F2:91:12:94:4C:16:9A:D9:C7:07:03:F0:4B:61:6C:62:93:72:93 Fingerprint (SHA1): 31:22:43:B2:40:5B:E7:C6:AC:F1:B2:1F:1B:1D:56:DE:CD:94:78:74 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1175: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145496 (0x49157ed8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Thu Dec 26 14:56:53 2024 Not After : Wed Dec 26 14:56:53 2074 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:0b:5a:d5:f8:04:d9:41:e4:71:61:ea:81:c2:85:82: 11:9c:93:ec:2c:06:22:6c:53:01:ee:bb:90:6a:ab:1d: fb:ce:86:7b:8b:ac:d1:35:f7:88:2a:dc:84:02:46:b7: a1:07:45:ed:9e:89:77:b0:1b:a4:eb:1f:9b:b6:f4:68: 68:c8:e9:29:10:16:a1:ec:d7:87:ec:d3:4f:1b:dd:ff: f9:f7:6a:46:ba:fa:20:c8:93:d8:54:bb:d7:d1:ca:12: 1b:99:f6:f9:23:3f:d6:32:26:b8:d1:c7:55:41:cd:42: fc:a1:55:38:48:3d:57:94:7b:a8:49:39:ea:24:7c:ad: d9:0d:35:82:c9:15:63:cb:a9:5f:5e:bd:59:1e:67:ad: 32:ca:99:ee:fb:81:38:b6:88:b8:e1:9d:34:55:35:d2: 8a:8b:ee:2a:b4:c7:03:92:6d:a7:19:5c:0f:d8:ee:fa: 1e:27:9e:95:96:53:80:40:76:0d:be:e8:12:be:85:55: 56:3b:97:52:05:d9:18:5f:3e:55:a9:70:e7:3f:85:50: 4f:45:ef:09:77:ab:ef:8f:20:85:51:6f:f3:42:8a:58: 0f:81:c1:39:29:ca:4c:68:40:b5:96:43:86:28:ce:c8: d9:3d:c5:cd:85:c9:3a:97:3a:ca:9d:6c:79:aa:15:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:52:5a:61:3b:c0:fc:30:b2:47:41:e5:72:13:20:03: cf:53:5e:c6:dc:f7:0d:6b:82:cb:e1:cf:ea:9e:0d:69: 43:88:45:ce:19:e0:e4:e2:ca:d3:a6:11:e8:9f:03:a9: 56:96:c5:9d:21:f2:7c:dc:81:f2:c2:45:52:f9:6b:4c: 16:50:b5:80:5f:2c:24:44:3e:c8:4d:f6:3a:e1:df:ee: f2:6f:d4:2b:8a:2d:91:c7:8f:27:e6:3c:e5:2f:76:4d: ca:b2:b9:4b:5e:12:b3:9b:46:70:08:aa:ba:d5:7c:81: e6:c9:bd:8b:fc:84:01:fd:a1:61:c8:1d:2d:98:32:74: 50:a2:0e:1a:43:e0:41:0e:5b:62:b2:00:b7:11:65:cf: 72:87:81:fe:6a:e1:99:11:f3:79:9f:3b:a0:4e:af:bd: d0:49:a3:b6:01:18:42:a9:f5:3c:9b:7a:ea:ae:95:83: 75:1e:fc:c0:e8:2a:cb:ad:17:a5:3e:a3:00:3c:08:06: 66:35:b3:08:23:36:72:5f:76:7b:73:e6:8f:3e:a9:4d: 96:cc:df:79:63:26:11:fe:04:34:80:c6:ce:0a:e3:24: 85:57:96:22:3b:7e:cd:08:08:5a:c7:ce:0f:0b:45:07: d7:ef:a2:af:ed:c3:34:a3:45:6c:10:5d:fc:77:a5:7d Fingerprint (SHA-256): 99:A7:C4:03:D8:D6:59:DE:A1:E7:CC:0F:2B:28:58:BF:9E:35:D7:22:CF:59:D0:77:E3:AA:7C:57:B8:99:57:9F Fingerprint (SHA1): D5:17:4C:71:6E:4A:60:90:97:83:67:CE:23:76:7B:DB:6D:9D:34:4E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1176: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145497 (0x49157ed9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Thu Dec 26 14:56:53 2024 Not After : Wed Dec 26 14:56:53 2074 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:52:6a:f5:ef:b2:5a:2f:31:53:d7:25:00:fe:48:f7: fe:8a:61:47:a3:03:03:70:80:11:42:de:24:68:88:1e: f4:60:31:fc:68:cf:7e:97:d2:3c:a2:bd:04:dd:ac:49: b0:12:8b:d1:0f:95:cc:86:6f:49:39:63:0e:24:6c:b0: 8c:fb:57:e9:83:a8:c3:2d:4f:07:c2:41:88:32:bc:28: 2c:5d:7b:a2:2c:59:3d:5b:47:a1:86:b6:1e:21:f2:63: 53:4d:48:e9:d9:8f:e0:2f:65:e9:e6:8e:0f:bf:17:63: d4:67:93:c3:fa:24:06:84:b2:0b:dc:f0:cd:1c:d9:89: 11:99:0d:7a:90:2c:11:66:20:90:ee:21:45:60:e5:4c: 36:96:1f:67:22:d0:ee:af:0d:8c:b4:0d:4f:45:d2:0f: e0:5e:0f:ea:b1:48:54:e4:86:09:29:a3:86:cb:7c:a3: 05:a0:76:1e:f6:10:91:77:00:bf:56:d7:bc:3a:e0:66: e6:6f:b4:87:ce:ef:86:b9:0b:17:6b:ad:0c:50:76:2b: ab:f7:c6:7c:71:23:db:da:28:91:fb:10:4f:7c:32:20: 34:27:3a:9a:0c:a0:79:6f:5c:62:b0:0c:a9:e6:7a:e8: 6c:9c:6b:9a:12:49:1c:6d:8b:b3:ad:c0:38:be:b8:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:de:3b:87:0c:9b:59:a2:52:37:a6:33:6c:1e:52:80: f1:83:ca:c4:b6:15:c2:43:eb:1f:1a:42:f9:26:e7:06: e3:08:b7:7a:ce:04:43:ce:cf:4b:ea:81:1f:51:27:f1: 85:f3:1e:fb:c6:ff:f8:ce:0d:d4:a4:e0:21:4f:a1:b0: d7:25:ab:21:97:5c:ed:82:98:2c:1e:8d:07:ae:bc:78: 11:3d:24:3f:d3:d1:6b:f7:b0:8c:ce:df:c0:c3:d5:68: 93:33:f9:b9:73:8c:4a:a5:6a:ae:b6:3e:f3:0b:9a:0f: d1:d1:b0:75:75:72:f7:6a:39:12:e2:a0:e0:46:fe:89: 30:e5:99:c7:b7:26:45:cf:f2:0e:b0:27:70:9f:1a:b6: 3f:23:73:43:b8:43:8e:70:14:d2:84:81:0e:39:8d:33: ba:06:54:60:10:84:a9:08:33:a3:c5:fa:97:1f:d6:60: d7:a4:c1:3f:f7:ce:82:80:9d:5b:ac:c9:c2:6d:5d:28: 8e:bb:e6:61:c4:37:94:a7:36:65:2e:c5:26:4d:fc:7a: 1c:bc:94:e6:e8:87:8c:3d:ca:ce:74:a1:c6:35:59:b5: 95:cc:32:30:97:0a:dc:dd:e2:f8:b4:8d:e7:32:f0:c5: df:df:6c:f8:ef:14:9a:a9:4d:f3:58:26:e2:84:0b:72 Fingerprint (SHA-256): C9:77:AB:39:AF:AD:39:85:21:15:11:32:B1:E2:09:23:E0:0E:29:46:EE:D2:7F:50:76:48:CD:E5:3B:A2:24:5F Fingerprint (SHA1): BE:F1:00:23:61:08:C4:30:DA:20:E9:63:52:72:3F:D6:95:FA:9E:10 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1177: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145498 (0x49157eda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Thu Dec 26 14:56:54 2024 Not After : Wed Dec 26 14:56:54 2074 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:1a:df:e5:7e:47:7e:1a:ab:7c:5f:51:7f:14:82:59: 9b:52:77:9a:96:15:94:18:ae:ba:45:79:6f:77:53:23: 72:c2:1c:ac:ef:9f:1c:53:a8:c0:c6:bb:2d:0d:f0:50: 57:34:53:a4:c0:0f:fe:4a:3f:40:b6:20:b9:82:a2:eb: 05:57:7a:66:80:41:c5:27:1d:e2:87:5d:ac:06:0c:05: 74:d2:21:3a:31:85:29:8f:b7:98:1c:82:56:9c:ab:41: 6a:70:57:12:a3:17:aa:d1:c6:4b:5e:ae:e5:88:04:88: b5:38:75:23:5a:25:41:2e:a5:30:f5:68:11:82:c1:a9: a9:12:bb:af:a8:17:c9:69:e9:3d:22:c4:ea:60:8f:f9: 55:eb:f2:e7:2c:52:af:4d:8b:01:25:a7:cc:cc:a6:7c: 9f:98:50:e6:13:d0:77:5d:38:5a:b2:60:70:e6:9a:ba: 58:a6:fb:ef:e3:ec:3e:5e:f1:7c:50:f1:2c:c1:5c:59: 40:43:d9:04:87:b8:17:49:08:56:e5:65:3f:eb:ed:11: 0a:bf:e8:fd:f5:ea:74:91:27:01:87:e3:35:73:bf:d1: da:20:a6:36:04:b8:bf:a6:c5:3f:07:c5:5e:96:d8:b0: d8:5e:ca:48:d6:77:eb:e9:ce:ea:68:75:e6:f0:29:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:30:9a:8f:0c:c8:b1:63:5c:56:86:c9:c3:f2:97:91: 51:63:ff:0a:fe:bf:fa:e9:97:ae:db:87:67:41:74:f6: e9:fe:34:ad:19:b0:f2:fc:af:43:2f:4f:8f:72:b5:08: ab:bb:42:2a:75:c5:6b:91:03:fb:73:af:12:29:42:1d: a0:56:16:15:64:7f:0c:87:0b:ef:56:69:c8:bf:16:a8: 03:c1:09:69:60:07:7c:c3:69:f5:f3:cd:ab:24:a1:03: 2d:93:cb:3b:e0:ad:c3:ef:8a:42:b7:df:c8:bc:07:7c: f3:f3:83:63:43:3e:92:d3:6d:2d:fa:a3:49:ee:ff:39: cd:65:51:b0:08:f6:3c:e7:40:01:4f:dc:4d:19:75:6b: cb:35:a3:df:41:2d:48:dd:c1:26:3f:d3:b6:6f:e2:b6: 52:5f:a4:67:b8:55:ed:ac:c0:38:e4:07:e7:1f:b8:ef: 36:2d:30:cb:16:91:76:e0:22:b3:4e:ce:28:e5:ad:83: 07:03:b5:54:6b:01:39:ef:a8:9e:46:8f:b5:71:33:1b: b2:c8:21:d4:98:ca:4f:14:8f:17:67:64:12:21:00:03: b3:c3:78:31:b2:43:cd:c1:ef:8f:05:2e:11:7d:00:02: e0:7a:91:29:b1:83:68:75:3b:8b:9d:52:f6:3a:2d:52 Fingerprint (SHA-256): B0:35:BA:E3:4B:5E:A5:53:5C:9A:FF:1B:38:71:0F:28:AD:97:3E:06:A3:FF:7B:72:7E:FF:0D:2A:30:BF:96:31 Fingerprint (SHA1): 2A:DC:91:FD:A9:9F:2C:B2:E2:4F:78:90:55:2B:62:34:E9:03:E3:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1178: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145499 (0x49157edb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Thu Dec 26 14:56:55 2024 Not After : Wed Dec 26 14:56:55 2074 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:8e:02:00:2a:a7:7b:be:13:ae:18:ff:f7:4f:74:4e: 2f:fd:58:d1:8c:1b:34:67:07:f6:34:52:d3:ee:97:a7: 38:03:4c:85:92:fa:dc:06:10:5e:54:69:41:3a:92:a8: 54:64:69:82:c4:2a:40:f2:10:b6:fd:3d:1c:72:20:9b: 8e:f1:10:7f:15:f2:b7:b8:01:c7:4e:b8:ab:3b:07:8e: 04:cc:d4:ad:da:81:4f:46:cb:60:5a:71:1b:b5:23:fd: 86:0c:7c:20:b2:3e:08:8d:cb:f2:7f:86:91:86:43:fb: e0:1e:43:6a:7c:3a:70:72:89:64:8b:8c:bd:58:29:4a: 80:be:27:36:b1:e6:86:b5:ea:b8:26:f5:f2:2e:7b:37: e1:54:a1:4a:46:b4:fd:23:b1:7d:61:5b:11:19:12:42: 70:ca:93:5b:c4:e6:d9:f9:3c:51:33:36:a5:18:6f:dc: 76:cd:f9:8d:56:83:b2:63:7e:36:9e:84:43:92:06:50: 51:d7:9f:04:05:69:95:a2:26:07:1d:d5:3d:00:da:d5: d4:c9:46:44:16:fa:bd:8b:bc:9d:53:9e:68:55:8b:34: a4:58:0f:36:5e:7f:16:a6:57:1d:50:8a:91:81:be:a5: 88:10:63:db:6c:36:6d:34:de:79:02:e8:2d:0e:0d:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:5e:6c:36:37:9c:2f:52:22:23:07:ea:bf:6a:78:b2: 41:8d:ff:99:34:62:6f:38:f7:7f:28:37:d5:a2:80:02: 2a:ed:00:77:1c:77:f4:06:81:7c:cf:5e:e9:4e:25:63: ec:74:27:8a:5d:c1:7a:ff:fc:2d:74:3a:08:f4:8c:25: 21:23:cb:d0:3e:a5:0c:03:37:eb:89:b6:32:a2:69:e9: d5:74:8a:58:ed:f4:c9:68:29:af:af:7c:9c:61:df:23: 13:57:97:4e:f4:84:19:14:26:f6:20:c2:25:35:ac:f8: 5f:cd:57:e2:4d:b9:35:37:0e:93:c1:f1:cb:d7:d7:d5: fa:b5:86:cf:41:8e:f0:bb:88:17:89:d3:a8:f0:28:82: a4:65:f4:79:6a:18:7b:bc:6a:b2:26:b4:bf:91:54:7e: 01:37:b8:66:2a:b3:04:89:f9:f6:41:41:74:a6:c1:fc: a2:88:ea:f1:8a:e1:a2:82:3e:4f:99:e4:e9:d2:83:48: 07:a5:de:3a:4d:c6:ce:d3:3e:18:12:44:57:e9:f2:ea: bd:ec:11:d1:b7:fc:50:17:b8:45:f5:8d:11:8f:f3:a7: 68:3f:9d:6f:0a:3b:62:90:7e:65:e0:30:74:76:92:60: b7:9f:a1:98:d8:fe:17:77:ff:de:99:45:8d:76:dd:e8 Fingerprint (SHA-256): 67:DB:5A:7E:6F:CE:05:83:2A:58:EE:68:87:51:26:20:94:7F:F5:F6:33:43:EA:7D:FB:DB:10:FF:0C:AB:22:72 Fingerprint (SHA1): 8E:D4:13:43:F5:3F:18:04:7A:6B:B5:9C:55:0C:62:68:DC:D2:C9:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1179: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1180: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145514 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1181: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1182: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1183: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1184: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145515 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1185: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1186: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1187: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1188: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145516 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1189: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1190: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1191: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1192: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145517 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1193: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1194: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1195: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145514 (0x49157eea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:03 2024 Not After : Wed Dec 26 14:57:03 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:61:84:d2:3e:6f:63:4c:10:be:7d:5a:f7:f0:13:5e: b1:92:12:b2:66:a4:0e:5f:04:38:f0:00:4e:54:a7:9e: 96:76:7e:95:28:4e:c2:51:40:49:b5:33:33:d4:5d:2a: bb:dd:ab:c8:3d:ec:83:f4:86:e0:1f:c9:a2:8e:82:1d: ba:c8:60:bd:f7:69:e3:4a:96:84:ca:8f:8b:92:33:f6: 62:b6:92:45:cc:9d:de:16:46:7a:24:88:c6:78:97:1d: 4d:2e:64:10:e5:ba:d4:d1:b4:41:a9:5f:77:5c:37:4e: e1:26:0c:20:a4:3c:c3:e7:b8:e2:96:bc:7c:87:13:42: 9b:5a:45:d1:25:c7:38:f8:ad:df:18:75:41:29:34:4e: a6:ac:d1:2a:9b:26:2b:8c:04:0c:e8:f4:c7:8d:83:92: fc:21:3e:88:5a:02:c1:c2:d3:1c:2a:45:48:17:4e:a8: b1:49:4b:86:10:bc:17:e0:8b:09:31:94:27:af:bd:6a: a4:5c:ad:0b:3e:ec:bb:0d:26:4c:3f:04:1e:de:46:af: 60:2e:c1:1e:b8:ca:f6:72:85:b9:f1:78:dc:05:2d:b1: 38:6a:c4:5b:8c:62:b3:6f:ac:db:28:95:ed:eb:92:a0: 48:31:52:4c:c4:fe:32:82:23:b2:13:81:33:f5:fb:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:2b:f3:c4:dd:08:56:d6:83:1d:46:9b:ee:a2:e0:d7: 9d:8e:fa:ee:e0:4e:ac:8e:36:d1:01:63:47:e1:d9:c9: ec:f3:67:e1:5a:84:26:52:be:1d:4c:cd:be:8f:c2:ee: f5:e5:1a:41:63:ab:80:ff:e1:0e:01:e9:e5:69:28:75: cc:cf:c3:3a:75:15:98:46:51:33:92:d1:ce:f9:e8:5b: d0:e7:a6:44:db:b5:08:f1:b4:10:83:cf:db:c5:17:cd: 9f:6d:63:ce:2c:f1:9c:d1:51:f1:21:09:b4:d0:43:29: c3:2e:d4:9c:f3:64:1a:18:d5:af:f2:ba:44:27:b3:d9: fc:73:ce:06:19:41:ec:65:d6:2e:ba:27:d6:f3:87:ab: 39:92:03:3d:62:91:a9:6d:cf:01:28:44:21:84:dd:02: cb:5a:f0:e5:26:70:bd:71:96:85:77:a8:69:0d:f4:75: 41:b4:54:89:00:e6:95:61:53:68:e9:bc:57:93:5e:9e: 84:5a:ee:96:ce:b5:fd:31:39:1a:fc:79:af:26:75:ad: 61:f0:b2:d0:6e:51:ac:a9:8f:6a:98:9d:93:23:58:f7: b4:64:6b:61:d5:39:e8:bd:f6:73:ab:b0:27:2a:dd:ce: 8a:4f:19:81:f2:6a:59:a0:19:98:e4:1b:ad:55:52:ca Fingerprint (SHA-256): F9:75:CE:BD:63:CA:7C:4F:6E:6A:25:33:4C:CE:11:2D:CB:F6:41:0D:F1:4D:D9:4B:F7:F9:B8:D9:ED:E9:0D:E0 Fingerprint (SHA1): B2:E9:FB:21:CC:48:69:E5:63:D2:84:EF:4E:36:6A:AC:10:31:3E:C0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1196: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1197: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145515 (0x49157eeb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:04 2024 Not After : Wed Dec 26 14:57:04 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:f4:cd:29:ba:39:55:dc:4b:15:f4:73:2d:24:b5:26: e4:26:04:16:48:80:69:52:98:8a:18:11:36:c5:39:67: 27:1d:64:bd:2d:41:e5:b1:7e:86:a9:a9:f9:73:8b:de: 43:36:f5:79:88:3f:a2:5f:e6:d7:3c:0b:c9:17:03:c8: c2:fc:3f:97:90:27:10:47:c0:0f:33:58:63:5f:38:37: 7d:c5:17:4d:ac:0c:c4:27:c3:5a:d7:d3:f6:bd:1f:44: 21:19:37:e0:ba:b2:51:74:96:29:2e:56:5b:f2:9b:8e: 02:de:d1:0f:88:1f:8f:88:c3:90:20:f6:66:1b:98:29: 12:20:d7:db:b2:28:d7:f0:e5:0d:1c:1a:c3:cf:92:23: f0:94:a5:e9:6f:43:94:e3:0e:37:a7:5a:dd:7a:cd:cb: 3b:47:5f:6b:98:50:b0:ee:d5:eb:35:63:77:98:a5:4d: 66:f6:78:3f:7c:86:7a:f0:a3:60:46:ec:03:5d:f1:0b: 74:96:4e:75:d9:eb:3c:09:5c:b9:82:31:87:ac:1b:67: 72:2d:17:ab:a2:a7:2c:f9:37:70:7e:a6:08:7f:e6:e7: a8:8f:81:a9:f5:65:03:4b:17:d0:94:a9:ba:d4:21:6b: 76:bd:a9:78:85:d2:e9:6d:b1:0e:bd:98:5e:a7:20:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:6f:f3:ce:25:f9:02:c6:7d:a8:c5:b0:4b:5f:dd:2c: 0c:60:a7:ff:a1:06:c5:f1:9e:cf:18:39:92:3a:32:26: b1:ba:c9:4b:a9:e0:67:cd:83:3a:e5:20:f3:dc:fe:84: 55:88:1e:16:15:d0:b2:fe:1f:3c:9c:a7:a2:26:5b:dd: 8d:58:0d:5a:a8:90:16:3f:ad:9e:51:d9:c2:40:00:a9: 15:26:7f:af:90:16:91:78:47:d2:9e:55:2b:d4:e1:be: 6e:ea:e4:89:f1:ee:ce:6b:3a:cc:d1:bd:69:e7:dc:39: 2f:2b:96:2b:cc:c7:30:c9:7b:56:03:19:9c:88:30:0a: 64:3e:6d:f6:aa:b6:80:e6:7a:d4:38:bd:3d:b5:2d:83: 18:6d:56:9a:c4:57:47:8d:9e:de:1c:6f:02:fc:d7:5d: 4a:c1:9a:5c:70:72:57:06:54:d3:82:f2:f3:4f:7a:a4: 3d:a7:fa:45:5e:c9:fa:02:e8:32:fa:69:2e:8f:a3:aa: d9:37:19:05:a0:43:b7:4d:db:03:cf:b0:a0:25:0b:8a: fe:89:6c:1f:91:92:5e:5a:0c:52:8c:7a:4c:ec:50:a4: 4d:90:2c:da:44:46:1f:2a:94:79:ca:c0:98:8c:ad:a9: d3:02:9f:ea:19:1b:a5:a3:cc:df:28:a7:f4:2b:8d:c9 Fingerprint (SHA-256): 4F:DC:FA:5E:E7:92:08:ED:4B:F0:7F:FB:10:F5:75:A9:7B:AC:AF:63:F1:32:50:0C:24:4F:0B:51:A0:D9:4B:63 Fingerprint (SHA1): 93:45:BF:B2:DE:38:75:D5:A4:56:8B:0F:20:62:37:5C:C9:D1:C6:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1198: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1199: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145516 (0x49157eec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:57:06 2024 Not After : Wed Dec 26 14:57:06 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:3d:e8:9b:98:76:c9:9e:09:76:8a:bd:26:c6:8a:7e: 31:97:fc:26:6a:e3:04:35:56:33:6b:44:c5:58:1d:b9: 4c:e3:79:e7:85:b2:09:ba:b7:d1:25:77:fc:37:be:b4: 6f:bf:07:4e:e0:ea:94:7f:5e:4e:b1:21:11:2c:d6:03: d4:38:ec:ea:a4:7d:83:1a:71:94:d4:5d:96:3a:29:83: 51:f3:fa:df:90:d8:eb:2a:4f:7d:6e:44:8f:1b:9d:f3: 0b:33:be:1f:a5:f4:98:d9:d8:d9:73:c8:14:f7:b7:c9: df:3c:be:be:b0:09:fa:74:9d:ed:15:bb:16:e0:71:4e: 0b:52:3a:ab:87:9e:cf:4e:e2:58:be:9e:82:2e:7e:0a: 80:94:86:22:38:aa:14:2a:87:83:9d:61:57:de:d6:16: 75:7f:be:b0:c1:0a:e2:4a:84:36:a1:c5:5a:5e:91:79: 84:52:16:7b:4c:b8:8a:90:fc:b8:55:d6:00:a2:6d:d4: cd:c4:94:90:86:ca:7c:47:af:ea:03:d4:9b:67:32:7b: 04:29:9d:c5:32:41:70:40:19:8b:d6:6c:5c:49:98:fa: f9:61:13:49:f3:95:9d:9a:ac:de:71:96:dd:49:3d:18: 51:95:44:be:b5:58:11:20:6d:94:07:b8:d9:bd:4d:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:40:ea:78:5e:29:82:15:5e:83:0f:6b:62:e1:82:80: 7d:b1:84:a0:20:55:59:f3:48:28:81:4c:af:cd:27:5d: b7:d1:a1:29:76:58:f8:29:f4:ca:f0:b3:d6:f4:44:0b: 67:2f:54:ae:74:d5:a5:f3:b6:19:83:d4:44:53:9c:44: 58:26:b8:4a:a7:2c:7c:a9:74:b6:ad:68:25:d0:36:ac: b4:6b:fa:cb:de:e5:0c:b4:8c:37:ec:21:8a:1e:06:d5: e5:3e:b9:5a:94:0f:1b:8b:51:f2:46:54:09:2c:ed:ac: 2e:fe:79:e8:1c:cc:eb:9e:ec:8b:a5:ea:47:1c:3f:41: 3a:29:45:25:f1:fb:22:59:e4:f6:2e:af:29:c3:b4:12: 54:ce:5c:09:c0:bc:d5:c4:b7:24:31:4d:67:d8:d4:60: 4e:a4:c0:b2:77:3c:7f:93:45:05:21:9a:c4:71:04:9e: a9:27:3b:ad:48:3c:18:ca:d1:88:41:2d:c0:1f:f4:7d: f6:bb:db:46:0d:96:98:8c:6a:47:be:5b:ce:32:b3:9c: 23:d4:bc:bc:7f:1a:c1:3d:97:16:2d:33:37:e0:27:a3: 43:d3:a8:6b:de:a4:35:84:8e:37:ef:1b:5c:f4:0d:d9: 91:74:e4:27:76:05:50:40:1d:9a:1d:1d:d7:f1:c4:1c Fingerprint (SHA-256): 20:1A:52:46:DD:35:65:70:07:8A:8B:6A:C5:0E:70:5A:57:DA:EF:EE:6D:1E:FC:65:76:8F:DC:02:08:54:0D:97 Fingerprint (SHA1): 06:95:A7:8A:94:E8:35:67:D4:2E:0A:C4:32:D6:3F:1A:3B:E8:8B:13 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1200: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1201: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1202: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1203: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1204: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145514 (0x49157eea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:03 2024 Not After : Wed Dec 26 14:57:03 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:61:84:d2:3e:6f:63:4c:10:be:7d:5a:f7:f0:13:5e: b1:92:12:b2:66:a4:0e:5f:04:38:f0:00:4e:54:a7:9e: 96:76:7e:95:28:4e:c2:51:40:49:b5:33:33:d4:5d:2a: bb:dd:ab:c8:3d:ec:83:f4:86:e0:1f:c9:a2:8e:82:1d: ba:c8:60:bd:f7:69:e3:4a:96:84:ca:8f:8b:92:33:f6: 62:b6:92:45:cc:9d:de:16:46:7a:24:88:c6:78:97:1d: 4d:2e:64:10:e5:ba:d4:d1:b4:41:a9:5f:77:5c:37:4e: e1:26:0c:20:a4:3c:c3:e7:b8:e2:96:bc:7c:87:13:42: 9b:5a:45:d1:25:c7:38:f8:ad:df:18:75:41:29:34:4e: a6:ac:d1:2a:9b:26:2b:8c:04:0c:e8:f4:c7:8d:83:92: fc:21:3e:88:5a:02:c1:c2:d3:1c:2a:45:48:17:4e:a8: b1:49:4b:86:10:bc:17:e0:8b:09:31:94:27:af:bd:6a: a4:5c:ad:0b:3e:ec:bb:0d:26:4c:3f:04:1e:de:46:af: 60:2e:c1:1e:b8:ca:f6:72:85:b9:f1:78:dc:05:2d:b1: 38:6a:c4:5b:8c:62:b3:6f:ac:db:28:95:ed:eb:92:a0: 48:31:52:4c:c4:fe:32:82:23:b2:13:81:33:f5:fb:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:2b:f3:c4:dd:08:56:d6:83:1d:46:9b:ee:a2:e0:d7: 9d:8e:fa:ee:e0:4e:ac:8e:36:d1:01:63:47:e1:d9:c9: ec:f3:67:e1:5a:84:26:52:be:1d:4c:cd:be:8f:c2:ee: f5:e5:1a:41:63:ab:80:ff:e1:0e:01:e9:e5:69:28:75: cc:cf:c3:3a:75:15:98:46:51:33:92:d1:ce:f9:e8:5b: d0:e7:a6:44:db:b5:08:f1:b4:10:83:cf:db:c5:17:cd: 9f:6d:63:ce:2c:f1:9c:d1:51:f1:21:09:b4:d0:43:29: c3:2e:d4:9c:f3:64:1a:18:d5:af:f2:ba:44:27:b3:d9: fc:73:ce:06:19:41:ec:65:d6:2e:ba:27:d6:f3:87:ab: 39:92:03:3d:62:91:a9:6d:cf:01:28:44:21:84:dd:02: cb:5a:f0:e5:26:70:bd:71:96:85:77:a8:69:0d:f4:75: 41:b4:54:89:00:e6:95:61:53:68:e9:bc:57:93:5e:9e: 84:5a:ee:96:ce:b5:fd:31:39:1a:fc:79:af:26:75:ad: 61:f0:b2:d0:6e:51:ac:a9:8f:6a:98:9d:93:23:58:f7: b4:64:6b:61:d5:39:e8:bd:f6:73:ab:b0:27:2a:dd:ce: 8a:4f:19:81:f2:6a:59:a0:19:98:e4:1b:ad:55:52:ca Fingerprint (SHA-256): F9:75:CE:BD:63:CA:7C:4F:6E:6A:25:33:4C:CE:11:2D:CB:F6:41:0D:F1:4D:D9:4B:F7:F9:B8:D9:ED:E9:0D:E0 Fingerprint (SHA1): B2:E9:FB:21:CC:48:69:E5:63:D2:84:EF:4E:36:6A:AC:10:31:3E:C0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145515 (0x49157eeb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:04 2024 Not After : Wed Dec 26 14:57:04 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:f4:cd:29:ba:39:55:dc:4b:15:f4:73:2d:24:b5:26: e4:26:04:16:48:80:69:52:98:8a:18:11:36:c5:39:67: 27:1d:64:bd:2d:41:e5:b1:7e:86:a9:a9:f9:73:8b:de: 43:36:f5:79:88:3f:a2:5f:e6:d7:3c:0b:c9:17:03:c8: c2:fc:3f:97:90:27:10:47:c0:0f:33:58:63:5f:38:37: 7d:c5:17:4d:ac:0c:c4:27:c3:5a:d7:d3:f6:bd:1f:44: 21:19:37:e0:ba:b2:51:74:96:29:2e:56:5b:f2:9b:8e: 02:de:d1:0f:88:1f:8f:88:c3:90:20:f6:66:1b:98:29: 12:20:d7:db:b2:28:d7:f0:e5:0d:1c:1a:c3:cf:92:23: f0:94:a5:e9:6f:43:94:e3:0e:37:a7:5a:dd:7a:cd:cb: 3b:47:5f:6b:98:50:b0:ee:d5:eb:35:63:77:98:a5:4d: 66:f6:78:3f:7c:86:7a:f0:a3:60:46:ec:03:5d:f1:0b: 74:96:4e:75:d9:eb:3c:09:5c:b9:82:31:87:ac:1b:67: 72:2d:17:ab:a2:a7:2c:f9:37:70:7e:a6:08:7f:e6:e7: a8:8f:81:a9:f5:65:03:4b:17:d0:94:a9:ba:d4:21:6b: 76:bd:a9:78:85:d2:e9:6d:b1:0e:bd:98:5e:a7:20:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:6f:f3:ce:25:f9:02:c6:7d:a8:c5:b0:4b:5f:dd:2c: 0c:60:a7:ff:a1:06:c5:f1:9e:cf:18:39:92:3a:32:26: b1:ba:c9:4b:a9:e0:67:cd:83:3a:e5:20:f3:dc:fe:84: 55:88:1e:16:15:d0:b2:fe:1f:3c:9c:a7:a2:26:5b:dd: 8d:58:0d:5a:a8:90:16:3f:ad:9e:51:d9:c2:40:00:a9: 15:26:7f:af:90:16:91:78:47:d2:9e:55:2b:d4:e1:be: 6e:ea:e4:89:f1:ee:ce:6b:3a:cc:d1:bd:69:e7:dc:39: 2f:2b:96:2b:cc:c7:30:c9:7b:56:03:19:9c:88:30:0a: 64:3e:6d:f6:aa:b6:80:e6:7a:d4:38:bd:3d:b5:2d:83: 18:6d:56:9a:c4:57:47:8d:9e:de:1c:6f:02:fc:d7:5d: 4a:c1:9a:5c:70:72:57:06:54:d3:82:f2:f3:4f:7a:a4: 3d:a7:fa:45:5e:c9:fa:02:e8:32:fa:69:2e:8f:a3:aa: d9:37:19:05:a0:43:b7:4d:db:03:cf:b0:a0:25:0b:8a: fe:89:6c:1f:91:92:5e:5a:0c:52:8c:7a:4c:ec:50:a4: 4d:90:2c:da:44:46:1f:2a:94:79:ca:c0:98:8c:ad:a9: d3:02:9f:ea:19:1b:a5:a3:cc:df:28:a7:f4:2b:8d:c9 Fingerprint (SHA-256): 4F:DC:FA:5E:E7:92:08:ED:4B:F0:7F:FB:10:F5:75:A9:7B:AC:AF:63:F1:32:50:0C:24:4F:0B:51:A0:D9:4B:63 Fingerprint (SHA1): 93:45:BF:B2:DE:38:75:D5:A4:56:8B:0F:20:62:37:5C:C9:D1:C6:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145516 (0x49157eec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:57:06 2024 Not After : Wed Dec 26 14:57:06 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f0:3d:e8:9b:98:76:c9:9e:09:76:8a:bd:26:c6:8a:7e: 31:97:fc:26:6a:e3:04:35:56:33:6b:44:c5:58:1d:b9: 4c:e3:79:e7:85:b2:09:ba:b7:d1:25:77:fc:37:be:b4: 6f:bf:07:4e:e0:ea:94:7f:5e:4e:b1:21:11:2c:d6:03: d4:38:ec:ea:a4:7d:83:1a:71:94:d4:5d:96:3a:29:83: 51:f3:fa:df:90:d8:eb:2a:4f:7d:6e:44:8f:1b:9d:f3: 0b:33:be:1f:a5:f4:98:d9:d8:d9:73:c8:14:f7:b7:c9: df:3c:be:be:b0:09:fa:74:9d:ed:15:bb:16:e0:71:4e: 0b:52:3a:ab:87:9e:cf:4e:e2:58:be:9e:82:2e:7e:0a: 80:94:86:22:38:aa:14:2a:87:83:9d:61:57:de:d6:16: 75:7f:be:b0:c1:0a:e2:4a:84:36:a1:c5:5a:5e:91:79: 84:52:16:7b:4c:b8:8a:90:fc:b8:55:d6:00:a2:6d:d4: cd:c4:94:90:86:ca:7c:47:af:ea:03:d4:9b:67:32:7b: 04:29:9d:c5:32:41:70:40:19:8b:d6:6c:5c:49:98:fa: f9:61:13:49:f3:95:9d:9a:ac:de:71:96:dd:49:3d:18: 51:95:44:be:b5:58:11:20:6d:94:07:b8:d9:bd:4d:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:40:ea:78:5e:29:82:15:5e:83:0f:6b:62:e1:82:80: 7d:b1:84:a0:20:55:59:f3:48:28:81:4c:af:cd:27:5d: b7:d1:a1:29:76:58:f8:29:f4:ca:f0:b3:d6:f4:44:0b: 67:2f:54:ae:74:d5:a5:f3:b6:19:83:d4:44:53:9c:44: 58:26:b8:4a:a7:2c:7c:a9:74:b6:ad:68:25:d0:36:ac: b4:6b:fa:cb:de:e5:0c:b4:8c:37:ec:21:8a:1e:06:d5: e5:3e:b9:5a:94:0f:1b:8b:51:f2:46:54:09:2c:ed:ac: 2e:fe:79:e8:1c:cc:eb:9e:ec:8b:a5:ea:47:1c:3f:41: 3a:29:45:25:f1:fb:22:59:e4:f6:2e:af:29:c3:b4:12: 54:ce:5c:09:c0:bc:d5:c4:b7:24:31:4d:67:d8:d4:60: 4e:a4:c0:b2:77:3c:7f:93:45:05:21:9a:c4:71:04:9e: a9:27:3b:ad:48:3c:18:ca:d1:88:41:2d:c0:1f:f4:7d: f6:bb:db:46:0d:96:98:8c:6a:47:be:5b:ce:32:b3:9c: 23:d4:bc:bc:7f:1a:c1:3d:97:16:2d:33:37:e0:27:a3: 43:d3:a8:6b:de:a4:35:84:8e:37:ef:1b:5c:f4:0d:d9: 91:74:e4:27:76:05:50:40:1d:9a:1d:1d:d7:f1:c4:1c Fingerprint (SHA-256): 20:1A:52:46:DD:35:65:70:07:8A:8B:6A:C5:0E:70:5A:57:DA:EF:EE:6D:1E:FC:65:76:8F:DC:02:08:54:0D:97 Fingerprint (SHA1): 06:95:A7:8A:94:E8:35:67:D4:2E:0A:C4:32:D6:3F:1A:3B:E8:8B:13 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1209: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1210: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1211: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145518 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1212: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1213: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1214: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1215: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145519 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1216: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1217: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1218: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1219: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145520 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1220: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1221: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1222: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1223: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145521 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1224: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1225: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1226: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1227: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145522 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1228: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1229: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1230: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145518 (0x49157eee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c2:82:8d:75:b9:4c:fd:c7:7c:25:3b:60:42:65:b7: 4b:79:c5:28:e0:4e:95:98:b3:4c:8b:43:4e:8a:b5:b6: 75:2f:d9:52:53:08:68:e0:4d:c1:a7:f2:cf:86:38:24: 04:28:85:67:8e:86:e2:27:05:82:93:8c:3c:26:21:be: 05:57:cc:c9:35:a0:bf:ed:c0:b6:db:ea:cb:4f:6e:cf: f8:a9:d1:e1:2a:31:6b:c2:6c:37:19:1d:84:d9:dd:24: 8c:6c:f6:91:24:24:c8:fc:3b:4a:19:50:c0:99:8f:09: 63:19:b0:18:9c:6d:42:44:3e:2c:79:83:07:f7:aa:f2: 6b:91:fe:43:1e:9e:d5:e9:b9:86:bf:da:86:7a:77:40: 11:9a:11:72:d4:d5:84:92:a0:8d:27:2a:c3:fa:74:f5: 9d:71:ed:ca:27:29:39:5f:55:02:c9:5d:5d:a8:79:3c: 8a:fc:c3:47:54:48:f8:e3:37:0b:93:89:92:6f:29:ed: 3b:59:d8:a3:a0:15:5b:82:05:b0:af:fe:72:23:6a:d8: df:22:8d:79:56:dc:e9:a2:e8:ac:67:b4:33:39:68:e3: d0:3c:be:71:9b:fe:72:4d:3b:68:b9:6d:0d:7b:3f:6e: 05:f9:20:f7:10:fe:5f:43:33:1b:20:58:4d:c7:31:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:42:dc:9c:aa:80:5b:d6:57:56:3b:e8:82:dd:4b:4d: d4:38:80:68:3a:f0:b6:2b:37:d6:49:05:e0:9c:40:b2: 1a:ba:08:5e:1c:c6:cf:7f:98:0b:40:59:c7:01:76:58: cf:4b:17:4d:aa:4a:68:3d:82:79:95:e9:71:58:44:1d: e2:0e:7c:45:58:69:3e:6a:44:ea:0f:81:26:77:2a:55: d3:f5:64:7c:30:6e:e1:1c:27:68:30:7e:34:68:de:d2: 28:9b:8e:8b:f9:3f:ee:7e:46:8d:bf:2a:5b:2e:6f:96: 9d:ab:0e:07:b8:c0:06:ed:b0:37:1f:58:6b:85:1c:4a: 0e:6b:35:cb:67:28:75:9a:5a:d4:7f:bb:62:62:31:8d: bb:9b:20:87:5b:51:bd:c0:ad:6a:d8:3c:de:cf:c1:aa: 05:3d:61:a6:0e:33:a4:01:cf:9e:7b:44:5f:6c:05:7a: b6:7c:d1:e9:55:bb:d3:90:c8:69:1c:73:93:b8:2d:48: 69:f9:4c:c1:00:1f:dd:f7:57:fe:75:85:a7:c5:fd:48: 22:e3:2c:b5:ce:a4:1f:f6:39:8f:9a:0d:a1:88:4c:e9: 16:1a:e6:6b:4b:2a:d8:4b:90:8d:63:ac:d2:8d:4a:35: 80:a7:b3:68:79:a2:4b:ec:60:67:46:af:eb:f0:a3:0a Fingerprint (SHA-256): 43:12:EE:26:72:15:F8:A1:79:1B:D7:8C:C2:D0:25:B3:8F:79:2C:9A:E2:E7:9F:99:54:91:D7:1A:8A:86:A8:53 Fingerprint (SHA1): 96:90:A3:9B:19:13:85:22:74:97:E7:C8:5E:03:6C:63:20:DC:F5:0D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1231: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1232: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145519 (0x49157eef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:22:1b:b8:ae:36:e3:9f:c8:1e:b1:a6:39:09:ff:53: 43:28:22:57:a8:f6:f6:53:5a:9d:23:59:af:cc:6d:62: 18:6c:ff:f0:c2:17:bf:18:88:dd:e7:70:03:98:6d:8e: ed:ed:83:a7:f2:97:56:ae:cb:ae:57:ce:f1:32:ab:82: c9:08:6f:a3:45:5b:5b:34:2d:f2:c5:f6:d3:bd:16:cf: 51:6f:b7:e3:5f:80:e0:76:e8:e2:2d:dd:df:83:3b:64: 17:cf:21:f1:5d:78:d3:80:28:8d:33:f6:05:8e:c2:c8: e0:aa:bb:2f:17:90:04:7c:94:f4:b7:4f:cf:5c:c4:f1: f3:84:e3:c2:cd:05:fc:49:bc:94:d8:11:d3:74:9d:63: b5:14:29:65:e4:5c:4f:e8:d4:8e:53:5b:85:a2:1e:a9: 5f:81:08:52:05:67:38:d5:32:5b:40:f7:fd:12:ea:9d: 78:be:9c:58:e9:74:26:53:85:91:7d:fc:e9:cb:a4:7d: c0:47:b7:48:d6:46:a8:f5:d4:41:d7:4e:1a:e5:81:c4: 67:4e:0e:58:9c:03:d3:43:65:9c:5e:a5:ed:b8:13:c9: 9f:34:b5:b1:da:0c:c5:eb:c2:32:73:d9:af:74:82:01: 3a:7a:de:5d:d3:83:8d:92:8e:d0:f5:7b:fd:68:ef:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:9e:dc:18:f5:09:f1:8e:5a:72:cc:ca:e4:20:28:38: dc:25:76:20:96:77:3f:0d:58:2b:0c:6f:c6:75:fa:99: 00:72:e1:0d:7e:a7:bf:22:04:4f:2b:92:d9:d3:84:61: 34:8d:2b:6c:d3:dc:fe:9d:c1:06:7a:72:d5:cf:7a:a4: 69:71:7e:6b:dd:a9:6e:1c:2c:59:60:79:13:2a:00:eb: f3:1a:1f:e4:f4:c3:b9:ba:7d:c8:86:ef:d3:3e:aa:a6: 1f:86:d3:b5:88:f9:ca:0d:52:ec:ff:64:10:e4:af:a6: 7c:91:95:2b:32:4c:7e:10:47:a9:5d:80:58:4d:97:58: 76:82:b6:3c:cb:01:f6:bc:a1:f0:a1:81:f7:dd:07:07: ca:bc:42:ae:67:62:ec:28:7d:7f:a1:c1:0a:cb:69:99: 4e:83:49:da:57:d4:8c:11:da:03:05:e0:ee:b3:17:e9: 34:2d:e9:c4:aa:1f:a5:ff:36:80:7b:37:6b:de:c9:e3: ba:5c:bf:15:38:66:4d:ca:60:84:5e:20:cb:8f:12:92: 40:8b:aa:56:93:42:ff:68:85:83:7e:7c:22:79:49:36: 38:a4:39:7e:53:b2:14:26:3e:c8:42:fe:27:1b:5f:46: c0:89:30:43:fb:42:53:99:02:bf:9b:8d:23:df:8a:6b Fingerprint (SHA-256): C0:F2:FB:C4:E0:92:2D:40:86:56:66:22:1E:39:3E:CB:92:AF:42:15:15:49:ED:CD:5D:B7:71:98:49:69:8C:9B Fingerprint (SHA1): 8A:08:94:41:30:BA:50:D8:4A:14:D3:D6:7F:50:F5:1D:B6:E6:14:2A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1233: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1234: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145520 (0x49157ef0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:57:10 2024 Not After : Wed Dec 26 14:57:10 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:56:23:87:5f:1b:01:06:57:99:7f:09:d2:29:c6:2c: 77:50:70:77:52:9e:c7:1f:3b:0c:94:24:16:b4:23:16: 35:f6:c6:06:41:32:aa:4f:9d:1c:94:42:42:3d:64:e6: be:13:96:06:53:43:5e:3e:e3:17:8f:c7:f9:0d:3f:9b: 96:66:46:00:8b:70:89:cc:b5:9d:a9:03:7e:53:78:94: 56:31:f4:4b:9c:06:57:d1:5c:4a:15:41:d3:78:ae:1c: 6f:97:48:f6:b3:78:14:6b:20:c7:be:56:1b:17:c8:b4: 6d:26:61:1c:09:18:a9:7b:f1:c5:d5:72:27:01:8c:4f: 2c:32:44:c2:94:cc:65:4e:04:92:1d:62:6a:85:de:60: 9f:97:d5:75:ac:d2:2e:af:76:5a:e6:c1:44:db:a3:81: 1a:64:04:a5:1c:25:cd:64:23:14:75:7c:05:14:8d:85: cc:7a:52:e8:f0:e0:8d:6c:e8:3a:14:89:0e:93:1e:45: 4b:71:4d:d6:5a:79:47:64:92:82:58:c1:89:93:b8:c1: 6c:f6:05:a5:80:3f:98:72:c7:dc:6e:35:88:69:9f:b9: 90:59:0e:75:6f:05:15:aa:ec:f7:ab:35:c0:27:35:47: 74:5f:8a:35:93:64:44:c8:bb:77:2f:f4:06:a8:0d:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:a9:f3:14:d7:27:ea:12:85:c1:a6:97:b2:4f:ae:44: 18:c2:88:93:23:4a:ef:9d:5d:ed:01:32:cb:f3:09:a2: 38:68:9d:8f:0f:69:e5:19:16:81:b9:3f:b1:18:4e:02: 85:7d:2b:87:e7:81:99:0a:30:47:8f:ee:10:88:51:04: 14:b1:1b:d2:6e:84:1a:a8:47:fc:80:84:ad:fd:50:c6: fb:3f:e0:f8:25:4c:c0:50:c1:6e:4c:2d:a3:e4:f9:3d: 81:b8:43:97:ad:b2:ce:1c:b5:fd:00:43:e4:0b:7e:12: c6:30:8e:93:7a:13:16:a7:49:c7:3d:bf:ef:5a:2f:e2: f5:a2:eb:db:56:28:90:d0:a4:89:07:25:66:c5:78:62: df:10:c1:b7:d0:cd:17:aa:06:f1:e7:bd:e6:1c:fa:ce: 29:50:3d:40:e9:c9:1c:cd:a0:3c:76:36:fc:28:e4:e4: aa:4f:c2:01:14:0f:f7:87:62:f3:42:6e:66:2d:80:2b: 6e:47:3a:66:ec:00:b3:fa:77:70:97:a8:e0:98:49:4e: 6f:ba:da:53:be:25:37:2e:23:bc:4c:08:03:42:a1:cf: a7:80:6a:d6:23:1e:5b:59:ae:06:b4:39:13:f1:43:07: 3a:66:13:35:a7:5a:9c:80:c7:a3:bf:ea:c5:0e:bd:b3 Fingerprint (SHA-256): C1:58:C9:9E:B9:89:37:EA:31:F1:B7:6E:96:D0:03:63:D1:A7:44:35:8A:59:64:FE:66:13:35:06:DD:7E:15:96 Fingerprint (SHA1): DD:9B:07:2E:5E:42:1E:E6:0C:52:3B:9D:4F:15:34:FE:36:5B:99:81 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1235: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1236: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1237: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1238: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1239: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145518 (0x49157eee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c2:82:8d:75:b9:4c:fd:c7:7c:25:3b:60:42:65:b7: 4b:79:c5:28:e0:4e:95:98:b3:4c:8b:43:4e:8a:b5:b6: 75:2f:d9:52:53:08:68:e0:4d:c1:a7:f2:cf:86:38:24: 04:28:85:67:8e:86:e2:27:05:82:93:8c:3c:26:21:be: 05:57:cc:c9:35:a0:bf:ed:c0:b6:db:ea:cb:4f:6e:cf: f8:a9:d1:e1:2a:31:6b:c2:6c:37:19:1d:84:d9:dd:24: 8c:6c:f6:91:24:24:c8:fc:3b:4a:19:50:c0:99:8f:09: 63:19:b0:18:9c:6d:42:44:3e:2c:79:83:07:f7:aa:f2: 6b:91:fe:43:1e:9e:d5:e9:b9:86:bf:da:86:7a:77:40: 11:9a:11:72:d4:d5:84:92:a0:8d:27:2a:c3:fa:74:f5: 9d:71:ed:ca:27:29:39:5f:55:02:c9:5d:5d:a8:79:3c: 8a:fc:c3:47:54:48:f8:e3:37:0b:93:89:92:6f:29:ed: 3b:59:d8:a3:a0:15:5b:82:05:b0:af:fe:72:23:6a:d8: df:22:8d:79:56:dc:e9:a2:e8:ac:67:b4:33:39:68:e3: d0:3c:be:71:9b:fe:72:4d:3b:68:b9:6d:0d:7b:3f:6e: 05:f9:20:f7:10:fe:5f:43:33:1b:20:58:4d:c7:31:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:42:dc:9c:aa:80:5b:d6:57:56:3b:e8:82:dd:4b:4d: d4:38:80:68:3a:f0:b6:2b:37:d6:49:05:e0:9c:40:b2: 1a:ba:08:5e:1c:c6:cf:7f:98:0b:40:59:c7:01:76:58: cf:4b:17:4d:aa:4a:68:3d:82:79:95:e9:71:58:44:1d: e2:0e:7c:45:58:69:3e:6a:44:ea:0f:81:26:77:2a:55: d3:f5:64:7c:30:6e:e1:1c:27:68:30:7e:34:68:de:d2: 28:9b:8e:8b:f9:3f:ee:7e:46:8d:bf:2a:5b:2e:6f:96: 9d:ab:0e:07:b8:c0:06:ed:b0:37:1f:58:6b:85:1c:4a: 0e:6b:35:cb:67:28:75:9a:5a:d4:7f:bb:62:62:31:8d: bb:9b:20:87:5b:51:bd:c0:ad:6a:d8:3c:de:cf:c1:aa: 05:3d:61:a6:0e:33:a4:01:cf:9e:7b:44:5f:6c:05:7a: b6:7c:d1:e9:55:bb:d3:90:c8:69:1c:73:93:b8:2d:48: 69:f9:4c:c1:00:1f:dd:f7:57:fe:75:85:a7:c5:fd:48: 22:e3:2c:b5:ce:a4:1f:f6:39:8f:9a:0d:a1:88:4c:e9: 16:1a:e6:6b:4b:2a:d8:4b:90:8d:63:ac:d2:8d:4a:35: 80:a7:b3:68:79:a2:4b:ec:60:67:46:af:eb:f0:a3:0a Fingerprint (SHA-256): 43:12:EE:26:72:15:F8:A1:79:1B:D7:8C:C2:D0:25:B3:8F:79:2C:9A:E2:E7:9F:99:54:91:D7:1A:8A:86:A8:53 Fingerprint (SHA1): 96:90:A3:9B:19:13:85:22:74:97:E7:C8:5E:03:6C:63:20:DC:F5:0D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1240: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1241: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145519 (0x49157eef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:22:1b:b8:ae:36:e3:9f:c8:1e:b1:a6:39:09:ff:53: 43:28:22:57:a8:f6:f6:53:5a:9d:23:59:af:cc:6d:62: 18:6c:ff:f0:c2:17:bf:18:88:dd:e7:70:03:98:6d:8e: ed:ed:83:a7:f2:97:56:ae:cb:ae:57:ce:f1:32:ab:82: c9:08:6f:a3:45:5b:5b:34:2d:f2:c5:f6:d3:bd:16:cf: 51:6f:b7:e3:5f:80:e0:76:e8:e2:2d:dd:df:83:3b:64: 17:cf:21:f1:5d:78:d3:80:28:8d:33:f6:05:8e:c2:c8: e0:aa:bb:2f:17:90:04:7c:94:f4:b7:4f:cf:5c:c4:f1: f3:84:e3:c2:cd:05:fc:49:bc:94:d8:11:d3:74:9d:63: b5:14:29:65:e4:5c:4f:e8:d4:8e:53:5b:85:a2:1e:a9: 5f:81:08:52:05:67:38:d5:32:5b:40:f7:fd:12:ea:9d: 78:be:9c:58:e9:74:26:53:85:91:7d:fc:e9:cb:a4:7d: c0:47:b7:48:d6:46:a8:f5:d4:41:d7:4e:1a:e5:81:c4: 67:4e:0e:58:9c:03:d3:43:65:9c:5e:a5:ed:b8:13:c9: 9f:34:b5:b1:da:0c:c5:eb:c2:32:73:d9:af:74:82:01: 3a:7a:de:5d:d3:83:8d:92:8e:d0:f5:7b:fd:68:ef:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:9e:dc:18:f5:09:f1:8e:5a:72:cc:ca:e4:20:28:38: dc:25:76:20:96:77:3f:0d:58:2b:0c:6f:c6:75:fa:99: 00:72:e1:0d:7e:a7:bf:22:04:4f:2b:92:d9:d3:84:61: 34:8d:2b:6c:d3:dc:fe:9d:c1:06:7a:72:d5:cf:7a:a4: 69:71:7e:6b:dd:a9:6e:1c:2c:59:60:79:13:2a:00:eb: f3:1a:1f:e4:f4:c3:b9:ba:7d:c8:86:ef:d3:3e:aa:a6: 1f:86:d3:b5:88:f9:ca:0d:52:ec:ff:64:10:e4:af:a6: 7c:91:95:2b:32:4c:7e:10:47:a9:5d:80:58:4d:97:58: 76:82:b6:3c:cb:01:f6:bc:a1:f0:a1:81:f7:dd:07:07: ca:bc:42:ae:67:62:ec:28:7d:7f:a1:c1:0a:cb:69:99: 4e:83:49:da:57:d4:8c:11:da:03:05:e0:ee:b3:17:e9: 34:2d:e9:c4:aa:1f:a5:ff:36:80:7b:37:6b:de:c9:e3: ba:5c:bf:15:38:66:4d:ca:60:84:5e:20:cb:8f:12:92: 40:8b:aa:56:93:42:ff:68:85:83:7e:7c:22:79:49:36: 38:a4:39:7e:53:b2:14:26:3e:c8:42:fe:27:1b:5f:46: c0:89:30:43:fb:42:53:99:02:bf:9b:8d:23:df:8a:6b Fingerprint (SHA-256): C0:F2:FB:C4:E0:92:2D:40:86:56:66:22:1E:39:3E:CB:92:AF:42:15:15:49:ED:CD:5D:B7:71:98:49:69:8C:9B Fingerprint (SHA1): 8A:08:94:41:30:BA:50:D8:4A:14:D3:D6:7F:50:F5:1D:B6:E6:14:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1242: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1243: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145520 (0x49157ef0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:57:10 2024 Not After : Wed Dec 26 14:57:10 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:56:23:87:5f:1b:01:06:57:99:7f:09:d2:29:c6:2c: 77:50:70:77:52:9e:c7:1f:3b:0c:94:24:16:b4:23:16: 35:f6:c6:06:41:32:aa:4f:9d:1c:94:42:42:3d:64:e6: be:13:96:06:53:43:5e:3e:e3:17:8f:c7:f9:0d:3f:9b: 96:66:46:00:8b:70:89:cc:b5:9d:a9:03:7e:53:78:94: 56:31:f4:4b:9c:06:57:d1:5c:4a:15:41:d3:78:ae:1c: 6f:97:48:f6:b3:78:14:6b:20:c7:be:56:1b:17:c8:b4: 6d:26:61:1c:09:18:a9:7b:f1:c5:d5:72:27:01:8c:4f: 2c:32:44:c2:94:cc:65:4e:04:92:1d:62:6a:85:de:60: 9f:97:d5:75:ac:d2:2e:af:76:5a:e6:c1:44:db:a3:81: 1a:64:04:a5:1c:25:cd:64:23:14:75:7c:05:14:8d:85: cc:7a:52:e8:f0:e0:8d:6c:e8:3a:14:89:0e:93:1e:45: 4b:71:4d:d6:5a:79:47:64:92:82:58:c1:89:93:b8:c1: 6c:f6:05:a5:80:3f:98:72:c7:dc:6e:35:88:69:9f:b9: 90:59:0e:75:6f:05:15:aa:ec:f7:ab:35:c0:27:35:47: 74:5f:8a:35:93:64:44:c8:bb:77:2f:f4:06:a8:0d:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:a9:f3:14:d7:27:ea:12:85:c1:a6:97:b2:4f:ae:44: 18:c2:88:93:23:4a:ef:9d:5d:ed:01:32:cb:f3:09:a2: 38:68:9d:8f:0f:69:e5:19:16:81:b9:3f:b1:18:4e:02: 85:7d:2b:87:e7:81:99:0a:30:47:8f:ee:10:88:51:04: 14:b1:1b:d2:6e:84:1a:a8:47:fc:80:84:ad:fd:50:c6: fb:3f:e0:f8:25:4c:c0:50:c1:6e:4c:2d:a3:e4:f9:3d: 81:b8:43:97:ad:b2:ce:1c:b5:fd:00:43:e4:0b:7e:12: c6:30:8e:93:7a:13:16:a7:49:c7:3d:bf:ef:5a:2f:e2: f5:a2:eb:db:56:28:90:d0:a4:89:07:25:66:c5:78:62: df:10:c1:b7:d0:cd:17:aa:06:f1:e7:bd:e6:1c:fa:ce: 29:50:3d:40:e9:c9:1c:cd:a0:3c:76:36:fc:28:e4:e4: aa:4f:c2:01:14:0f:f7:87:62:f3:42:6e:66:2d:80:2b: 6e:47:3a:66:ec:00:b3:fa:77:70:97:a8:e0:98:49:4e: 6f:ba:da:53:be:25:37:2e:23:bc:4c:08:03:42:a1:cf: a7:80:6a:d6:23:1e:5b:59:ae:06:b4:39:13:f1:43:07: 3a:66:13:35:a7:5a:9c:80:c7:a3:bf:ea:c5:0e:bd:b3 Fingerprint (SHA-256): C1:58:C9:9E:B9:89:37:EA:31:F1:B7:6E:96:D0:03:63:D1:A7:44:35:8A:59:64:FE:66:13:35:06:DD:7E:15:96 Fingerprint (SHA1): DD:9B:07:2E:5E:42:1E:E6:0C:52:3B:9D:4F:15:34:FE:36:5B:99:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1244: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1245: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145518 (0x49157eee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c2:82:8d:75:b9:4c:fd:c7:7c:25:3b:60:42:65:b7: 4b:79:c5:28:e0:4e:95:98:b3:4c:8b:43:4e:8a:b5:b6: 75:2f:d9:52:53:08:68:e0:4d:c1:a7:f2:cf:86:38:24: 04:28:85:67:8e:86:e2:27:05:82:93:8c:3c:26:21:be: 05:57:cc:c9:35:a0:bf:ed:c0:b6:db:ea:cb:4f:6e:cf: f8:a9:d1:e1:2a:31:6b:c2:6c:37:19:1d:84:d9:dd:24: 8c:6c:f6:91:24:24:c8:fc:3b:4a:19:50:c0:99:8f:09: 63:19:b0:18:9c:6d:42:44:3e:2c:79:83:07:f7:aa:f2: 6b:91:fe:43:1e:9e:d5:e9:b9:86:bf:da:86:7a:77:40: 11:9a:11:72:d4:d5:84:92:a0:8d:27:2a:c3:fa:74:f5: 9d:71:ed:ca:27:29:39:5f:55:02:c9:5d:5d:a8:79:3c: 8a:fc:c3:47:54:48:f8:e3:37:0b:93:89:92:6f:29:ed: 3b:59:d8:a3:a0:15:5b:82:05:b0:af:fe:72:23:6a:d8: df:22:8d:79:56:dc:e9:a2:e8:ac:67:b4:33:39:68:e3: d0:3c:be:71:9b:fe:72:4d:3b:68:b9:6d:0d:7b:3f:6e: 05:f9:20:f7:10:fe:5f:43:33:1b:20:58:4d:c7:31:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:42:dc:9c:aa:80:5b:d6:57:56:3b:e8:82:dd:4b:4d: d4:38:80:68:3a:f0:b6:2b:37:d6:49:05:e0:9c:40:b2: 1a:ba:08:5e:1c:c6:cf:7f:98:0b:40:59:c7:01:76:58: cf:4b:17:4d:aa:4a:68:3d:82:79:95:e9:71:58:44:1d: e2:0e:7c:45:58:69:3e:6a:44:ea:0f:81:26:77:2a:55: d3:f5:64:7c:30:6e:e1:1c:27:68:30:7e:34:68:de:d2: 28:9b:8e:8b:f9:3f:ee:7e:46:8d:bf:2a:5b:2e:6f:96: 9d:ab:0e:07:b8:c0:06:ed:b0:37:1f:58:6b:85:1c:4a: 0e:6b:35:cb:67:28:75:9a:5a:d4:7f:bb:62:62:31:8d: bb:9b:20:87:5b:51:bd:c0:ad:6a:d8:3c:de:cf:c1:aa: 05:3d:61:a6:0e:33:a4:01:cf:9e:7b:44:5f:6c:05:7a: b6:7c:d1:e9:55:bb:d3:90:c8:69:1c:73:93:b8:2d:48: 69:f9:4c:c1:00:1f:dd:f7:57:fe:75:85:a7:c5:fd:48: 22:e3:2c:b5:ce:a4:1f:f6:39:8f:9a:0d:a1:88:4c:e9: 16:1a:e6:6b:4b:2a:d8:4b:90:8d:63:ac:d2:8d:4a:35: 80:a7:b3:68:79:a2:4b:ec:60:67:46:af:eb:f0:a3:0a Fingerprint (SHA-256): 43:12:EE:26:72:15:F8:A1:79:1B:D7:8C:C2:D0:25:B3:8F:79:2C:9A:E2:E7:9F:99:54:91:D7:1A:8A:86:A8:53 Fingerprint (SHA1): 96:90:A3:9B:19:13:85:22:74:97:E7:C8:5E:03:6C:63:20:DC:F5:0D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1246: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145518 (0x49157eee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c2:82:8d:75:b9:4c:fd:c7:7c:25:3b:60:42:65:b7: 4b:79:c5:28:e0:4e:95:98:b3:4c:8b:43:4e:8a:b5:b6: 75:2f:d9:52:53:08:68:e0:4d:c1:a7:f2:cf:86:38:24: 04:28:85:67:8e:86:e2:27:05:82:93:8c:3c:26:21:be: 05:57:cc:c9:35:a0:bf:ed:c0:b6:db:ea:cb:4f:6e:cf: f8:a9:d1:e1:2a:31:6b:c2:6c:37:19:1d:84:d9:dd:24: 8c:6c:f6:91:24:24:c8:fc:3b:4a:19:50:c0:99:8f:09: 63:19:b0:18:9c:6d:42:44:3e:2c:79:83:07:f7:aa:f2: 6b:91:fe:43:1e:9e:d5:e9:b9:86:bf:da:86:7a:77:40: 11:9a:11:72:d4:d5:84:92:a0:8d:27:2a:c3:fa:74:f5: 9d:71:ed:ca:27:29:39:5f:55:02:c9:5d:5d:a8:79:3c: 8a:fc:c3:47:54:48:f8:e3:37:0b:93:89:92:6f:29:ed: 3b:59:d8:a3:a0:15:5b:82:05:b0:af:fe:72:23:6a:d8: df:22:8d:79:56:dc:e9:a2:e8:ac:67:b4:33:39:68:e3: d0:3c:be:71:9b:fe:72:4d:3b:68:b9:6d:0d:7b:3f:6e: 05:f9:20:f7:10:fe:5f:43:33:1b:20:58:4d:c7:31:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:42:dc:9c:aa:80:5b:d6:57:56:3b:e8:82:dd:4b:4d: d4:38:80:68:3a:f0:b6:2b:37:d6:49:05:e0:9c:40:b2: 1a:ba:08:5e:1c:c6:cf:7f:98:0b:40:59:c7:01:76:58: cf:4b:17:4d:aa:4a:68:3d:82:79:95:e9:71:58:44:1d: e2:0e:7c:45:58:69:3e:6a:44:ea:0f:81:26:77:2a:55: d3:f5:64:7c:30:6e:e1:1c:27:68:30:7e:34:68:de:d2: 28:9b:8e:8b:f9:3f:ee:7e:46:8d:bf:2a:5b:2e:6f:96: 9d:ab:0e:07:b8:c0:06:ed:b0:37:1f:58:6b:85:1c:4a: 0e:6b:35:cb:67:28:75:9a:5a:d4:7f:bb:62:62:31:8d: bb:9b:20:87:5b:51:bd:c0:ad:6a:d8:3c:de:cf:c1:aa: 05:3d:61:a6:0e:33:a4:01:cf:9e:7b:44:5f:6c:05:7a: b6:7c:d1:e9:55:bb:d3:90:c8:69:1c:73:93:b8:2d:48: 69:f9:4c:c1:00:1f:dd:f7:57:fe:75:85:a7:c5:fd:48: 22:e3:2c:b5:ce:a4:1f:f6:39:8f:9a:0d:a1:88:4c:e9: 16:1a:e6:6b:4b:2a:d8:4b:90:8d:63:ac:d2:8d:4a:35: 80:a7:b3:68:79:a2:4b:ec:60:67:46:af:eb:f0:a3:0a Fingerprint (SHA-256): 43:12:EE:26:72:15:F8:A1:79:1B:D7:8C:C2:D0:25:B3:8F:79:2C:9A:E2:E7:9F:99:54:91:D7:1A:8A:86:A8:53 Fingerprint (SHA1): 96:90:A3:9B:19:13:85:22:74:97:E7:C8:5E:03:6C:63:20:DC:F5:0D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1247: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145519 (0x49157eef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:22:1b:b8:ae:36:e3:9f:c8:1e:b1:a6:39:09:ff:53: 43:28:22:57:a8:f6:f6:53:5a:9d:23:59:af:cc:6d:62: 18:6c:ff:f0:c2:17:bf:18:88:dd:e7:70:03:98:6d:8e: ed:ed:83:a7:f2:97:56:ae:cb:ae:57:ce:f1:32:ab:82: c9:08:6f:a3:45:5b:5b:34:2d:f2:c5:f6:d3:bd:16:cf: 51:6f:b7:e3:5f:80:e0:76:e8:e2:2d:dd:df:83:3b:64: 17:cf:21:f1:5d:78:d3:80:28:8d:33:f6:05:8e:c2:c8: e0:aa:bb:2f:17:90:04:7c:94:f4:b7:4f:cf:5c:c4:f1: f3:84:e3:c2:cd:05:fc:49:bc:94:d8:11:d3:74:9d:63: b5:14:29:65:e4:5c:4f:e8:d4:8e:53:5b:85:a2:1e:a9: 5f:81:08:52:05:67:38:d5:32:5b:40:f7:fd:12:ea:9d: 78:be:9c:58:e9:74:26:53:85:91:7d:fc:e9:cb:a4:7d: c0:47:b7:48:d6:46:a8:f5:d4:41:d7:4e:1a:e5:81:c4: 67:4e:0e:58:9c:03:d3:43:65:9c:5e:a5:ed:b8:13:c9: 9f:34:b5:b1:da:0c:c5:eb:c2:32:73:d9:af:74:82:01: 3a:7a:de:5d:d3:83:8d:92:8e:d0:f5:7b:fd:68:ef:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:9e:dc:18:f5:09:f1:8e:5a:72:cc:ca:e4:20:28:38: dc:25:76:20:96:77:3f:0d:58:2b:0c:6f:c6:75:fa:99: 00:72:e1:0d:7e:a7:bf:22:04:4f:2b:92:d9:d3:84:61: 34:8d:2b:6c:d3:dc:fe:9d:c1:06:7a:72:d5:cf:7a:a4: 69:71:7e:6b:dd:a9:6e:1c:2c:59:60:79:13:2a:00:eb: f3:1a:1f:e4:f4:c3:b9:ba:7d:c8:86:ef:d3:3e:aa:a6: 1f:86:d3:b5:88:f9:ca:0d:52:ec:ff:64:10:e4:af:a6: 7c:91:95:2b:32:4c:7e:10:47:a9:5d:80:58:4d:97:58: 76:82:b6:3c:cb:01:f6:bc:a1:f0:a1:81:f7:dd:07:07: ca:bc:42:ae:67:62:ec:28:7d:7f:a1:c1:0a:cb:69:99: 4e:83:49:da:57:d4:8c:11:da:03:05:e0:ee:b3:17:e9: 34:2d:e9:c4:aa:1f:a5:ff:36:80:7b:37:6b:de:c9:e3: ba:5c:bf:15:38:66:4d:ca:60:84:5e:20:cb:8f:12:92: 40:8b:aa:56:93:42:ff:68:85:83:7e:7c:22:79:49:36: 38:a4:39:7e:53:b2:14:26:3e:c8:42:fe:27:1b:5f:46: c0:89:30:43:fb:42:53:99:02:bf:9b:8d:23:df:8a:6b Fingerprint (SHA-256): C0:F2:FB:C4:E0:92:2D:40:86:56:66:22:1E:39:3E:CB:92:AF:42:15:15:49:ED:CD:5D:B7:71:98:49:69:8C:9B Fingerprint (SHA1): 8A:08:94:41:30:BA:50:D8:4A:14:D3:D6:7F:50:F5:1D:B6:E6:14:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1248: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145519 (0x49157eef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:09 2024 Not After : Wed Dec 26 14:57:09 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:22:1b:b8:ae:36:e3:9f:c8:1e:b1:a6:39:09:ff:53: 43:28:22:57:a8:f6:f6:53:5a:9d:23:59:af:cc:6d:62: 18:6c:ff:f0:c2:17:bf:18:88:dd:e7:70:03:98:6d:8e: ed:ed:83:a7:f2:97:56:ae:cb:ae:57:ce:f1:32:ab:82: c9:08:6f:a3:45:5b:5b:34:2d:f2:c5:f6:d3:bd:16:cf: 51:6f:b7:e3:5f:80:e0:76:e8:e2:2d:dd:df:83:3b:64: 17:cf:21:f1:5d:78:d3:80:28:8d:33:f6:05:8e:c2:c8: e0:aa:bb:2f:17:90:04:7c:94:f4:b7:4f:cf:5c:c4:f1: f3:84:e3:c2:cd:05:fc:49:bc:94:d8:11:d3:74:9d:63: b5:14:29:65:e4:5c:4f:e8:d4:8e:53:5b:85:a2:1e:a9: 5f:81:08:52:05:67:38:d5:32:5b:40:f7:fd:12:ea:9d: 78:be:9c:58:e9:74:26:53:85:91:7d:fc:e9:cb:a4:7d: c0:47:b7:48:d6:46:a8:f5:d4:41:d7:4e:1a:e5:81:c4: 67:4e:0e:58:9c:03:d3:43:65:9c:5e:a5:ed:b8:13:c9: 9f:34:b5:b1:da:0c:c5:eb:c2:32:73:d9:af:74:82:01: 3a:7a:de:5d:d3:83:8d:92:8e:d0:f5:7b:fd:68:ef:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:9e:dc:18:f5:09:f1:8e:5a:72:cc:ca:e4:20:28:38: dc:25:76:20:96:77:3f:0d:58:2b:0c:6f:c6:75:fa:99: 00:72:e1:0d:7e:a7:bf:22:04:4f:2b:92:d9:d3:84:61: 34:8d:2b:6c:d3:dc:fe:9d:c1:06:7a:72:d5:cf:7a:a4: 69:71:7e:6b:dd:a9:6e:1c:2c:59:60:79:13:2a:00:eb: f3:1a:1f:e4:f4:c3:b9:ba:7d:c8:86:ef:d3:3e:aa:a6: 1f:86:d3:b5:88:f9:ca:0d:52:ec:ff:64:10:e4:af:a6: 7c:91:95:2b:32:4c:7e:10:47:a9:5d:80:58:4d:97:58: 76:82:b6:3c:cb:01:f6:bc:a1:f0:a1:81:f7:dd:07:07: ca:bc:42:ae:67:62:ec:28:7d:7f:a1:c1:0a:cb:69:99: 4e:83:49:da:57:d4:8c:11:da:03:05:e0:ee:b3:17:e9: 34:2d:e9:c4:aa:1f:a5:ff:36:80:7b:37:6b:de:c9:e3: ba:5c:bf:15:38:66:4d:ca:60:84:5e:20:cb:8f:12:92: 40:8b:aa:56:93:42:ff:68:85:83:7e:7c:22:79:49:36: 38:a4:39:7e:53:b2:14:26:3e:c8:42:fe:27:1b:5f:46: c0:89:30:43:fb:42:53:99:02:bf:9b:8d:23:df:8a:6b Fingerprint (SHA-256): C0:F2:FB:C4:E0:92:2D:40:86:56:66:22:1E:39:3E:CB:92:AF:42:15:15:49:ED:CD:5D:B7:71:98:49:69:8C:9B Fingerprint (SHA1): 8A:08:94:41:30:BA:50:D8:4A:14:D3:D6:7F:50:F5:1D:B6:E6:14:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1249: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145520 (0x49157ef0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:57:10 2024 Not After : Wed Dec 26 14:57:10 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:56:23:87:5f:1b:01:06:57:99:7f:09:d2:29:c6:2c: 77:50:70:77:52:9e:c7:1f:3b:0c:94:24:16:b4:23:16: 35:f6:c6:06:41:32:aa:4f:9d:1c:94:42:42:3d:64:e6: be:13:96:06:53:43:5e:3e:e3:17:8f:c7:f9:0d:3f:9b: 96:66:46:00:8b:70:89:cc:b5:9d:a9:03:7e:53:78:94: 56:31:f4:4b:9c:06:57:d1:5c:4a:15:41:d3:78:ae:1c: 6f:97:48:f6:b3:78:14:6b:20:c7:be:56:1b:17:c8:b4: 6d:26:61:1c:09:18:a9:7b:f1:c5:d5:72:27:01:8c:4f: 2c:32:44:c2:94:cc:65:4e:04:92:1d:62:6a:85:de:60: 9f:97:d5:75:ac:d2:2e:af:76:5a:e6:c1:44:db:a3:81: 1a:64:04:a5:1c:25:cd:64:23:14:75:7c:05:14:8d:85: cc:7a:52:e8:f0:e0:8d:6c:e8:3a:14:89:0e:93:1e:45: 4b:71:4d:d6:5a:79:47:64:92:82:58:c1:89:93:b8:c1: 6c:f6:05:a5:80:3f:98:72:c7:dc:6e:35:88:69:9f:b9: 90:59:0e:75:6f:05:15:aa:ec:f7:ab:35:c0:27:35:47: 74:5f:8a:35:93:64:44:c8:bb:77:2f:f4:06:a8:0d:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:a9:f3:14:d7:27:ea:12:85:c1:a6:97:b2:4f:ae:44: 18:c2:88:93:23:4a:ef:9d:5d:ed:01:32:cb:f3:09:a2: 38:68:9d:8f:0f:69:e5:19:16:81:b9:3f:b1:18:4e:02: 85:7d:2b:87:e7:81:99:0a:30:47:8f:ee:10:88:51:04: 14:b1:1b:d2:6e:84:1a:a8:47:fc:80:84:ad:fd:50:c6: fb:3f:e0:f8:25:4c:c0:50:c1:6e:4c:2d:a3:e4:f9:3d: 81:b8:43:97:ad:b2:ce:1c:b5:fd:00:43:e4:0b:7e:12: c6:30:8e:93:7a:13:16:a7:49:c7:3d:bf:ef:5a:2f:e2: f5:a2:eb:db:56:28:90:d0:a4:89:07:25:66:c5:78:62: df:10:c1:b7:d0:cd:17:aa:06:f1:e7:bd:e6:1c:fa:ce: 29:50:3d:40:e9:c9:1c:cd:a0:3c:76:36:fc:28:e4:e4: aa:4f:c2:01:14:0f:f7:87:62:f3:42:6e:66:2d:80:2b: 6e:47:3a:66:ec:00:b3:fa:77:70:97:a8:e0:98:49:4e: 6f:ba:da:53:be:25:37:2e:23:bc:4c:08:03:42:a1:cf: a7:80:6a:d6:23:1e:5b:59:ae:06:b4:39:13:f1:43:07: 3a:66:13:35:a7:5a:9c:80:c7:a3:bf:ea:c5:0e:bd:b3 Fingerprint (SHA-256): C1:58:C9:9E:B9:89:37:EA:31:F1:B7:6E:96:D0:03:63:D1:A7:44:35:8A:59:64:FE:66:13:35:06:DD:7E:15:96 Fingerprint (SHA1): DD:9B:07:2E:5E:42:1E:E6:0C:52:3B:9D:4F:15:34:FE:36:5B:99:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1250: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145520 (0x49157ef0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:57:10 2024 Not After : Wed Dec 26 14:57:10 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:56:23:87:5f:1b:01:06:57:99:7f:09:d2:29:c6:2c: 77:50:70:77:52:9e:c7:1f:3b:0c:94:24:16:b4:23:16: 35:f6:c6:06:41:32:aa:4f:9d:1c:94:42:42:3d:64:e6: be:13:96:06:53:43:5e:3e:e3:17:8f:c7:f9:0d:3f:9b: 96:66:46:00:8b:70:89:cc:b5:9d:a9:03:7e:53:78:94: 56:31:f4:4b:9c:06:57:d1:5c:4a:15:41:d3:78:ae:1c: 6f:97:48:f6:b3:78:14:6b:20:c7:be:56:1b:17:c8:b4: 6d:26:61:1c:09:18:a9:7b:f1:c5:d5:72:27:01:8c:4f: 2c:32:44:c2:94:cc:65:4e:04:92:1d:62:6a:85:de:60: 9f:97:d5:75:ac:d2:2e:af:76:5a:e6:c1:44:db:a3:81: 1a:64:04:a5:1c:25:cd:64:23:14:75:7c:05:14:8d:85: cc:7a:52:e8:f0:e0:8d:6c:e8:3a:14:89:0e:93:1e:45: 4b:71:4d:d6:5a:79:47:64:92:82:58:c1:89:93:b8:c1: 6c:f6:05:a5:80:3f:98:72:c7:dc:6e:35:88:69:9f:b9: 90:59:0e:75:6f:05:15:aa:ec:f7:ab:35:c0:27:35:47: 74:5f:8a:35:93:64:44:c8:bb:77:2f:f4:06:a8:0d:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:a9:f3:14:d7:27:ea:12:85:c1:a6:97:b2:4f:ae:44: 18:c2:88:93:23:4a:ef:9d:5d:ed:01:32:cb:f3:09:a2: 38:68:9d:8f:0f:69:e5:19:16:81:b9:3f:b1:18:4e:02: 85:7d:2b:87:e7:81:99:0a:30:47:8f:ee:10:88:51:04: 14:b1:1b:d2:6e:84:1a:a8:47:fc:80:84:ad:fd:50:c6: fb:3f:e0:f8:25:4c:c0:50:c1:6e:4c:2d:a3:e4:f9:3d: 81:b8:43:97:ad:b2:ce:1c:b5:fd:00:43:e4:0b:7e:12: c6:30:8e:93:7a:13:16:a7:49:c7:3d:bf:ef:5a:2f:e2: f5:a2:eb:db:56:28:90:d0:a4:89:07:25:66:c5:78:62: df:10:c1:b7:d0:cd:17:aa:06:f1:e7:bd:e6:1c:fa:ce: 29:50:3d:40:e9:c9:1c:cd:a0:3c:76:36:fc:28:e4:e4: aa:4f:c2:01:14:0f:f7:87:62:f3:42:6e:66:2d:80:2b: 6e:47:3a:66:ec:00:b3:fa:77:70:97:a8:e0:98:49:4e: 6f:ba:da:53:be:25:37:2e:23:bc:4c:08:03:42:a1:cf: a7:80:6a:d6:23:1e:5b:59:ae:06:b4:39:13:f1:43:07: 3a:66:13:35:a7:5a:9c:80:c7:a3:bf:ea:c5:0e:bd:b3 Fingerprint (SHA-256): C1:58:C9:9E:B9:89:37:EA:31:F1:B7:6E:96:D0:03:63:D1:A7:44:35:8A:59:64:FE:66:13:35:06:DD:7E:15:96 Fingerprint (SHA1): DD:9B:07:2E:5E:42:1E:E6:0C:52:3B:9D:4F:15:34:FE:36:5B:99:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1251: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1252: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145523 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1253: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1254: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1255: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1256: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145524 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1257: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1258: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1259: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1260: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145525 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1261: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1262: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1263: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1264: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1226145526 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1265: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1266: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1267: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1268: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145527 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1269: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1270: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1271: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1272: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145528 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1273: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1274: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1275: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1276: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1226145529 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1277: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1278: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1279: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1280: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1281: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1282: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1283: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145523 (0x49157ef3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:15 2024 Not After : Wed Dec 26 14:57:15 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:38:0d:8a:5b:f7:f8:67:b7:6c:b6:b3:c5:c6:53:44: 67:b9:8c:5d:d2:d9:1a:ac:eb:22:8f:eb:59:95:d4:21: 80:69:f6:90:f3:35:11:c1:c7:00:cb:62:c5:89:6a:09: fd:5e:c5:d9:c7:41:de:d4:e9:ff:2b:c3:df:cc:e7:6e: a6:d8:6b:3b:eb:ee:70:64:8f:f3:2b:99:a3:21:cc:30: 31:50:a1:a6:b1:9f:bf:10:6f:a4:64:cf:7d:45:4e:b2: 21:1f:cc:35:dc:84:d2:09:c7:7e:76:9f:fe:37:7d:22: dc:0c:4e:63:b1:8c:24:79:7a:55:60:c6:ba:9e:7f:fc: da:e2:46:06:de:6e:d1:4d:4f:94:f3:69:fa:77:d4:88: aa:ab:f2:05:9a:82:20:da:ff:39:cd:8b:10:e2:4a:cb: ae:c4:35:eb:5e:96:7f:ad:35:7d:41:aa:95:b0:bf:67: f7:2a:79:a3:55:57:ba:69:ea:2f:82:15:9e:55:f7:76: 9d:6e:a6:50:7f:1d:9d:a5:de:b8:a5:c7:5f:e7:29:88: ff:9c:50:4e:47:43:95:ce:09:fc:81:8e:a6:9b:df:7a: e6:be:9c:e4:b5:2f:38:0f:18:5f:77:a4:92:c3:83:4e: f1:46:a8:b3:2c:1b:c9:f9:66:0d:d1:a1:ee:57:3f:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:08:34:4a:02:6b:06:3c:80:24:bf:1f:a7:02:f8:42: b0:ef:e5:93:e2:e0:17:3d:05:44:40:fa:8c:f1:4d:03: 17:3e:06:18:84:f5:82:fd:2e:83:2f:b7:6f:df:79:a8: 03:1c:87:90:d2:47:1a:ee:c3:a3:60:ad:79:22:f0:5e: 92:d8:29:49:85:1b:d7:3c:df:8b:ea:ef:cb:b8:c7:df: 54:70:0e:fb:c9:c1:a3:93:93:7f:82:bd:0e:72:ff:5b: c5:3c:e1:11:e7:b1:04:4f:b8:26:60:c8:34:fb:ee:bc: 98:a1:f7:1c:c9:68:f2:d8:21:b2:35:58:18:c5:35:ce: 12:1b:c2:93:c9:39:53:08:bf:55:3b:79:e4:e0:d7:f2: 2f:0d:4f:fe:cb:c6:7d:4c:28:83:23:68:94:f3:a4:a9: 6c:c7:0b:0c:eb:4a:2b:cf:5d:42:e9:39:6f:e2:43:1a: ab:21:dc:5d:43:47:59:d7:e9:e9:92:4e:0e:50:d9:ad: 29:ca:7d:0e:c2:90:0e:4b:26:9a:30:c8:a7:f4:01:6b: a9:05:76:a8:fa:dd:95:5a:fd:f0:65:5e:e8:1f:40:85: c3:3c:07:c3:bd:2a:65:3f:be:8e:88:c7:02:06:6d:16: 58:76:8f:34:7d:7a:1a:da:19:d6:e0:87:88:33:22:78 Fingerprint (SHA-256): 23:56:91:F9:2E:4A:D5:4A:2B:55:82:8D:10:D4:D1:30:CD:BA:81:DA:7E:79:18:B8:09:30:4E:E8:D4:91:AA:CF Fingerprint (SHA1): 74:9F:D1:DB:49:7E:FB:BF:77:0A:DD:D6:9C:07:78:29:D2:A4:56:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1284: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1285: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1286: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1287: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145523 (0x49157ef3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:15 2024 Not After : Wed Dec 26 14:57:15 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:38:0d:8a:5b:f7:f8:67:b7:6c:b6:b3:c5:c6:53:44: 67:b9:8c:5d:d2:d9:1a:ac:eb:22:8f:eb:59:95:d4:21: 80:69:f6:90:f3:35:11:c1:c7:00:cb:62:c5:89:6a:09: fd:5e:c5:d9:c7:41:de:d4:e9:ff:2b:c3:df:cc:e7:6e: a6:d8:6b:3b:eb:ee:70:64:8f:f3:2b:99:a3:21:cc:30: 31:50:a1:a6:b1:9f:bf:10:6f:a4:64:cf:7d:45:4e:b2: 21:1f:cc:35:dc:84:d2:09:c7:7e:76:9f:fe:37:7d:22: dc:0c:4e:63:b1:8c:24:79:7a:55:60:c6:ba:9e:7f:fc: da:e2:46:06:de:6e:d1:4d:4f:94:f3:69:fa:77:d4:88: aa:ab:f2:05:9a:82:20:da:ff:39:cd:8b:10:e2:4a:cb: ae:c4:35:eb:5e:96:7f:ad:35:7d:41:aa:95:b0:bf:67: f7:2a:79:a3:55:57:ba:69:ea:2f:82:15:9e:55:f7:76: 9d:6e:a6:50:7f:1d:9d:a5:de:b8:a5:c7:5f:e7:29:88: ff:9c:50:4e:47:43:95:ce:09:fc:81:8e:a6:9b:df:7a: e6:be:9c:e4:b5:2f:38:0f:18:5f:77:a4:92:c3:83:4e: f1:46:a8:b3:2c:1b:c9:f9:66:0d:d1:a1:ee:57:3f:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:08:34:4a:02:6b:06:3c:80:24:bf:1f:a7:02:f8:42: b0:ef:e5:93:e2:e0:17:3d:05:44:40:fa:8c:f1:4d:03: 17:3e:06:18:84:f5:82:fd:2e:83:2f:b7:6f:df:79:a8: 03:1c:87:90:d2:47:1a:ee:c3:a3:60:ad:79:22:f0:5e: 92:d8:29:49:85:1b:d7:3c:df:8b:ea:ef:cb:b8:c7:df: 54:70:0e:fb:c9:c1:a3:93:93:7f:82:bd:0e:72:ff:5b: c5:3c:e1:11:e7:b1:04:4f:b8:26:60:c8:34:fb:ee:bc: 98:a1:f7:1c:c9:68:f2:d8:21:b2:35:58:18:c5:35:ce: 12:1b:c2:93:c9:39:53:08:bf:55:3b:79:e4:e0:d7:f2: 2f:0d:4f:fe:cb:c6:7d:4c:28:83:23:68:94:f3:a4:a9: 6c:c7:0b:0c:eb:4a:2b:cf:5d:42:e9:39:6f:e2:43:1a: ab:21:dc:5d:43:47:59:d7:e9:e9:92:4e:0e:50:d9:ad: 29:ca:7d:0e:c2:90:0e:4b:26:9a:30:c8:a7:f4:01:6b: a9:05:76:a8:fa:dd:95:5a:fd:f0:65:5e:e8:1f:40:85: c3:3c:07:c3:bd:2a:65:3f:be:8e:88:c7:02:06:6d:16: 58:76:8f:34:7d:7a:1a:da:19:d6:e0:87:88:33:22:78 Fingerprint (SHA-256): 23:56:91:F9:2E:4A:D5:4A:2B:55:82:8D:10:D4:D1:30:CD:BA:81:DA:7E:79:18:B8:09:30:4E:E8:D4:91:AA:CF Fingerprint (SHA1): 74:9F:D1:DB:49:7E:FB:BF:77:0A:DD:D6:9C:07:78:29:D2:A4:56:22 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1288: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1289: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1290: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145530 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1292: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145531 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1226145532 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1226145533 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1226145534 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1226145535 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1226145536 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1226145537 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1226145538 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1226145539 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1226145540 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1226145541 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1226145542 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1226145543 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1226145544 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1226145545 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1226145546 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1226145547 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1226145548 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1226145549 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1226145550 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1226145551 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1226145552 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1382: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1226145553 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1383: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1384: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1385: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1386: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1226145554 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1387: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1388: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1389: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1390: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1226145555 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1391: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1392: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1393: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1394: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1226145556 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1395: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1396: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1397: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1398: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1226145557 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1399: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1400: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1401: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1402: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1226145558 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1403: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1404: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1405: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1406: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1226145559 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1407: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1408: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1409: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1410: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1411: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1412: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1413: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1414: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1415: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1416: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1417: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1418: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1419: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1420: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1421: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1422: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1423: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1424: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1425: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1426: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1427: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1428: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1429: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1430: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1431: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145530 (0x49157efa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:57:22 2024 Not After : Wed Dec 26 14:57:22 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 94:1f:d1:43:60:09:76:7c:c6:f6:49:69:93:4f:16:ba: 2e:35:0d:cc:e8:4c:99:5f:e5:35:7c:6d:63:bd:28:45: 21:97:3c:cb:d9:e0:1d:3d:f0:61:3c:2c:2f:4f:7b:29: 53:86:26:04:b3:69:12:cd:48:42:32:6f:da:ff:d1:32: d0:c7:84:fc:25:b0:45:94:b2:a7:17:f0:52:c1:3e:39: 00:3e:35:ea:68:72:91:ba:a9:6d:29:35:31:f6:8b:be: 65:03:11:49:f6:fa:0c:5f:ef:99:bc:09:f5:5e:19:f1: 39:a3:74:e1:ad:d8:45:69:b0:76:0a:2d:42:8e:64:73: 3e:1b:7d:36:96:d4:f1:67:c3:ef:8d:3c:6d:fa:e3:28: bd:fe:58:1b:10:99:70:a1:f1:71:d2:75:e3:d1:e7:9c: 84:48:95:35:48:95:1c:58:7a:f4:5b:6b:92:c8:c4:9e: 07:b3:6f:9e:2f:85:6b:c5:e9:f4:b6:8c:b9:a7:80:2c: c7:a0:d3:3c:8b:fb:99:7b:36:ec:47:19:1c:86:9a:6e: 7f:48:0b:72:d7:52:d3:cb:ed:60:0b:a6:8a:77:4b:ed: fc:dd:5e:da:81:1a:e8:a7:6e:5d:6b:88:37:10:6f:32: 57:3d:64:aa:f0:69:3c:11:06:35:26:29:83:a4:e8:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:0f:ee:3a:a5:cd:a4:c0:1b:a2:9d:46:81:e7:45:61: 03:71:df:bd:91:d7:7f:5e:e7:2e:71:a4:bc:e7:bc:c7: 6c:f4:0d:e1:c0:8d:7a:48:b0:a8:3c:ec:71:f0:da:13: a4:c3:1f:4d:4e:6f:56:fe:9d:7a:97:47:dc:70:a1:0a: 73:9f:23:d9:3d:76:ec:04:31:14:39:c2:a6:bf:79:fc: 1e:44:8b:9d:78:dd:ba:6d:fc:79:84:a1:40:3c:fb:05: 11:ee:fd:52:30:ce:88:0d:8d:85:bd:be:ea:ea:13:1d: d9:ea:6b:e9:fb:7e:39:4f:69:88:57:47:84:a6:d0:ee: a4:37:40:83:62:5b:09:be:6b:5f:53:34:b6:11:22:b4: 93:4d:2e:d3:ae:05:5e:7b:ca:94:f6:56:14:cb:e6:dc: 5c:a7:47:84:c5:d3:ab:3c:98:d7:18:88:92:79:ab:be: 4f:fa:ee:f2:3c:f1:32:92:30:8e:ad:71:0c:d5:56:2e: a7:76:ef:48:c8:92:3a:ae:7a:d5:59:e5:e3:9d:cf:50: 74:d8:72:10:aa:b7:28:fd:80:64:9d:16:eb:5f:91:7a: c9:e2:29:f1:74:8e:2d:60:d7:eb:1b:dc:2b:5b:90:cd: 39:93:ba:12:b5:46:7b:4e:5c:2f:3b:c5:fc:24:a7:9e Fingerprint (SHA-256): 5D:7B:F1:72:8F:34:3E:C6:ED:16:53:85:5B:59:DC:C2:5B:2C:5B:CE:4C:63:69:52:09:9A:FF:CB:52:39:9C:D4 Fingerprint (SHA1): 79:81:E6:B2:8D:F3:41:89:E5:CF:B3:DE:6A:CD:35:DE:85:84:47:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1432: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1433: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1434: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145560 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1435: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1436: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1437: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1438: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1226145561 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1439: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1440: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1441: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1442: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1226145562 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1443: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1444: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1445: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1446: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1226145563 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1447: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1448: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1449: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1450: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1226145564 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1451: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1452: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1453: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1454: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1226145565 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1455: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1456: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1457: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1458: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1226145566 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1459: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1460: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1461: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145560 (0x49157f18) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:50 2024 Not After : Wed Dec 26 14:57:50 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:c2:39:7a:56:43:e2:48:66:cc:a4:60:39:68:bb:02: 64:50:2a:84:65:16:6c:22:cb:d1:f5:6a:5f:ae:b2:bf: 09:43:be:06:a2:76:40:7f:4d:70:0a:8a:50:fa:2a:c2: d7:2f:99:b5:45:e6:63:43:2b:b6:3e:ee:21:b3:9f:07: c9:9e:fb:9b:e2:08:80:05:0a:a0:84:86:6e:98:b2:9a: ce:a1:81:d9:2e:e0:1a:c0:64:c1:c3:25:fd:67:41:b5: 19:79:cf:1a:0f:b8:a4:ac:6a:f9:4d:30:2c:22:db:d3: 3d:ba:01:1d:fe:55:81:af:a6:28:4f:f6:f1:2d:de:e6: 70:cc:71:c1:56:98:70:a4:3b:23:78:f8:59:45:85:bf: 66:02:60:b8:66:18:d4:9d:0b:37:c9:dd:f4:77:2e:c6: b6:9a:4b:f8:00:41:97:c1:a9:1a:b1:31:4d:4c:8f:40: e8:d7:e2:6b:41:9e:cd:4b:2d:e3:e6:bb:da:c4:da:14: 15:44:51:f9:7d:ba:d0:ac:63:6c:a1:28:88:f4:d9:01: 12:0c:66:5f:c5:f3:2c:66:6e:4e:b5:2a:84:fa:af:7f: 9d:e3:c4:42:4e:0e:b1:40:bc:c6:28:5d:83:11:ee:37: 80:d6:d1:28:b6:c9:eb:41:77:ee:bd:6c:ed:82:ca:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:eb:a9:33:59:56:3d:3f:ed:83:c6:c3:12:61:84:8b: 34:90:6c:49:6a:6c:a6:82:6a:d8:3a:a2:80:63:75:43: ce:4c:02:da:0f:c2:1c:c2:3c:4f:58:56:13:d3:bf:be: d6:34:e7:0d:0f:c5:62:9a:bb:c2:31:a0:c5:69:5f:6f: 32:37:35:90:77:4e:46:35:c5:76:36:32:a0:8f:7f:b3: a7:8b:d2:94:5b:50:c0:b0:e7:87:df:9c:a5:e1:24:7e: 8d:2c:c7:5e:1f:47:af:b5:7a:6e:72:2a:e4:fe:0b:9a: 57:75:fb:45:42:3a:42:a0:10:1b:c6:48:28:01:4d:0f: bd:d7:d4:47:6e:76:a1:0c:70:19:fd:91:4a:52:d9:40: ce:1f:e6:a2:cf:7b:ec:29:f2:45:9e:25:35:e5:a2:4a: e3:85:58:ba:cf:06:c8:d2:52:53:3f:5a:bb:d1:33:d0: 4c:7c:9a:3e:46:91:f0:ad:47:a2:97:c9:ac:65:81:1e: 34:7c:7e:88:fe:00:0c:7c:3f:f3:06:39:d0:71:44:3d: 2e:51:a6:b2:f7:a4:15:23:ea:2a:05:b3:29:7c:e8:44: 7d:b1:96:f2:49:1c:6b:fb:9e:f9:64:31:00:fd:a0:3d: 55:55:ca:5f:22:42:bd:3c:35:54:32:be:e9:ff:5e:44 Fingerprint (SHA-256): BC:C7:AA:04:27:CB:6D:67:14:48:6D:A6:C3:95:77:D4:A7:18:F7:4F:B0:1F:A0:BA:93:6E:77:0D:C7:D7:EA:04 Fingerprint (SHA1): 7D:8C:C6:D3:16:23:60:9C:82:A4:58:84:A9:D0:27:CD:85:D2:6B:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1462: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1463: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1465: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145560 (0x49157f18) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:50 2024 Not After : Wed Dec 26 14:57:50 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:c2:39:7a:56:43:e2:48:66:cc:a4:60:39:68:bb:02: 64:50:2a:84:65:16:6c:22:cb:d1:f5:6a:5f:ae:b2:bf: 09:43:be:06:a2:76:40:7f:4d:70:0a:8a:50:fa:2a:c2: d7:2f:99:b5:45:e6:63:43:2b:b6:3e:ee:21:b3:9f:07: c9:9e:fb:9b:e2:08:80:05:0a:a0:84:86:6e:98:b2:9a: ce:a1:81:d9:2e:e0:1a:c0:64:c1:c3:25:fd:67:41:b5: 19:79:cf:1a:0f:b8:a4:ac:6a:f9:4d:30:2c:22:db:d3: 3d:ba:01:1d:fe:55:81:af:a6:28:4f:f6:f1:2d:de:e6: 70:cc:71:c1:56:98:70:a4:3b:23:78:f8:59:45:85:bf: 66:02:60:b8:66:18:d4:9d:0b:37:c9:dd:f4:77:2e:c6: b6:9a:4b:f8:00:41:97:c1:a9:1a:b1:31:4d:4c:8f:40: e8:d7:e2:6b:41:9e:cd:4b:2d:e3:e6:bb:da:c4:da:14: 15:44:51:f9:7d:ba:d0:ac:63:6c:a1:28:88:f4:d9:01: 12:0c:66:5f:c5:f3:2c:66:6e:4e:b5:2a:84:fa:af:7f: 9d:e3:c4:42:4e:0e:b1:40:bc:c6:28:5d:83:11:ee:37: 80:d6:d1:28:b6:c9:eb:41:77:ee:bd:6c:ed:82:ca:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 86:eb:a9:33:59:56:3d:3f:ed:83:c6:c3:12:61:84:8b: 34:90:6c:49:6a:6c:a6:82:6a:d8:3a:a2:80:63:75:43: ce:4c:02:da:0f:c2:1c:c2:3c:4f:58:56:13:d3:bf:be: d6:34:e7:0d:0f:c5:62:9a:bb:c2:31:a0:c5:69:5f:6f: 32:37:35:90:77:4e:46:35:c5:76:36:32:a0:8f:7f:b3: a7:8b:d2:94:5b:50:c0:b0:e7:87:df:9c:a5:e1:24:7e: 8d:2c:c7:5e:1f:47:af:b5:7a:6e:72:2a:e4:fe:0b:9a: 57:75:fb:45:42:3a:42:a0:10:1b:c6:48:28:01:4d:0f: bd:d7:d4:47:6e:76:a1:0c:70:19:fd:91:4a:52:d9:40: ce:1f:e6:a2:cf:7b:ec:29:f2:45:9e:25:35:e5:a2:4a: e3:85:58:ba:cf:06:c8:d2:52:53:3f:5a:bb:d1:33:d0: 4c:7c:9a:3e:46:91:f0:ad:47:a2:97:c9:ac:65:81:1e: 34:7c:7e:88:fe:00:0c:7c:3f:f3:06:39:d0:71:44:3d: 2e:51:a6:b2:f7:a4:15:23:ea:2a:05:b3:29:7c:e8:44: 7d:b1:96:f2:49:1c:6b:fb:9e:f9:64:31:00:fd:a0:3d: 55:55:ca:5f:22:42:bd:3c:35:54:32:be:e9:ff:5e:44 Fingerprint (SHA-256): BC:C7:AA:04:27:CB:6D:67:14:48:6D:A6:C3:95:77:D4:A7:18:F7:4F:B0:1F:A0:BA:93:6E:77:0D:C7:D7:EA:04 Fingerprint (SHA1): 7D:8C:C6:D3:16:23:60:9C:82:A4:58:84:A9:D0:27:CD:85:D2:6B:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1466: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1467: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1468: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1469: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145567 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1470: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1471: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1472: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1473: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145568 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1474: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1475: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1476: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1477: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145569 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1478: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1479: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1480: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1481: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145570 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1482: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1483: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1484: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1485: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1486: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1487: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145567 (0x49157f1f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:56 2024 Not After : Wed Dec 26 14:57:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:76:40:58:b2:07:21:77:dd:ca:ec:76:ea:ad:17:09: 9d:c2:7d:1d:2e:83:f6:46:28:d3:d3:cd:a8:49:19:13: 99:3f:b7:35:c1:5a:82:12:67:e3:96:18:2f:ef:3f:f5: 65:0f:e5:f3:f9:d1:86:d8:f0:20:64:36:e4:19:5d:e9: 2b:25:11:60:d4:f2:b4:05:04:88:7b:65:f1:f3:60:7a: 09:51:de:21:7d:55:df:d0:ac:a2:a4:b1:14:5c:c9:a4: 4d:d4:0c:9f:9d:62:bf:9c:23:2e:5f:c9:65:23:7f:f0: 75:fd:b6:67:fd:4f:a9:06:5b:6e:91:cc:4c:24:d0:d5: 42:61:bf:a6:09:0b:9f:db:71:e9:4b:59:ce:89:fd:be: 6a:c8:cf:2b:69:0b:73:47:a7:1e:01:78:ab:e2:14:d9: 5e:a1:b4:45:c7:e7:97:9a:18:20:94:17:44:e5:ef:52: 21:88:c5:e3:ca:9d:67:39:e3:b7:27:f9:50:ef:2e:b4: 51:67:63:84:83:2a:bd:b4:b8:44:98:e1:90:3b:63:71: f6:59:81:09:2a:8d:00:e1:43:19:0d:af:17:a7:0c:65: d7:e6:82:d0:23:32:aa:be:85:bd:3d:ad:39:84:94:d3: 9f:9f:74:02:d7:d1:d2:05:e6:1a:5b:8d:66:ba:34:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:2c:09:b1:ee:f4:c7:43:f1:81:60:df:31:54:9d:c4: c5:6f:a3:a4:a8:a1:cf:25:b7:1b:4c:0a:97:85:8a:4b: 4c:5d:25:80:bd:34:dc:9c:39:4e:bb:ea:80:dd:d9:f3: 43:f7:5e:15:03:c5:11:58:ba:4e:5d:10:2f:4a:ea:a0: b7:6a:f2:d7:21:52:a2:3b:9e:b4:2f:e4:b6:39:ae:31: 15:71:a0:1d:b4:9e:9e:0f:ae:f5:4e:bf:5e:a7:40:4a: ec:d0:b9:e1:45:df:52:1e:95:3e:6e:ee:08:ee:2a:ba: 4e:a8:cb:46:70:c2:83:60:9a:b5:f5:bb:0d:29:ef:ec: 72:e7:cd:b9:8d:6a:74:3d:0e:fb:36:b9:66:19:3e:62: 5f:dd:9c:93:47:db:63:f3:b1:de:13:2d:f4:48:64:fb: 16:aa:b0:f1:66:a0:dc:cd:17:bd:77:e7:cf:37:dc:9e: e4:0f:b7:26:8c:bd:f4:13:26:01:6a:ad:f2:d0:24:86: 1f:ce:79:0c:df:71:e6:d9:40:12:88:f5:ff:2d:bd:02: b3:db:46:53:a1:e0:95:a6:4c:15:19:0e:3a:18:e5:25: 2a:78:28:fc:37:7a:cd:5f:77:b5:a6:31:d4:8d:d0:eb: 67:cd:e8:c7:a9:45:47:51:32:87:57:ca:3f:39:a5:eb Fingerprint (SHA-256): 12:57:89:35:99:D8:0E:6A:0D:C9:D4:3C:8A:DB:8C:A6:B4:11:3F:EC:0F:59:B5:1D:E7:BB:81:E1:63:86:83:F3 Fingerprint (SHA1): D1:40:C3:F1:30:7E:AF:22:C3:9A:99:19:41:88:74:DA:B8:CD:2C:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1488: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1489: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1490: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145568 (0x49157f20) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:57:57 2024 Not After : Wed Dec 26 14:57:57 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:ba:5b:c4:50:4e:34:b6:0d:ac:e6:8c:fc:f0:44:46: 3c:8d:78:1a:61:8e:20:3d:eb:30:8a:60:6d:95:4f:2c: f4:03:43:ae:1e:ff:9a:2c:1c:ea:57:65:9f:e4:01:1d: 6d:70:4a:18:c0:18:dc:58:67:5a:70:56:49:9d:99:65: 38:c7:a3:cf:06:ae:b4:3d:14:dc:a4:eb:89:c4:93:36: 35:d6:ae:ed:cd:a1:c4:ba:69:e6:76:48:04:93:a0:3a: f6:46:00:71:30:d1:25:22:be:b7:bc:0c:1c:ec:ae:59: 5b:3e:c9:92:96:26:17:ba:5a:28:55:a0:f7:f2:32:b7: bb:4a:3c:75:97:15:df:22:19:38:79:89:c6:21:e6:df: a9:48:67:09:72:26:98:8f:ec:f0:90:1d:ba:86:b6:9d: e6:fe:7e:e3:14:34:6e:fc:d1:e5:a4:c4:65:4b:98:70: 72:c3:c6:0a:9f:a3:73:0c:22:c1:2e:5d:b0:c9:51:cc: 1b:18:bf:b5:f5:4e:93:0e:77:9c:7f:dd:6f:39:8a:41: 15:39:36:db:cb:bb:72:4b:90:dc:2d:b5:f8:f2:97:49: 08:5d:68:b9:35:4b:00:ae:98:4d:e5:2f:63:d2:5d:7c: d1:83:7d:ad:8b:40:92:1f:03:fa:9b:0b:35:31:21:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 82:1f:7e:55:ce:43:57:ed:79:d0:50:92:aa:15:76:5c: 87:bb:6e:30:12:b8:0c:5d:c9:cb:29:9a:af:85:03:0f: 13:9f:22:7b:53:18:ef:94:78:7f:bb:a9:32:dc:c8:63: 8b:be:69:ac:49:23:40:de:50:e8:b1:aa:b6:e2:d4:a4: c8:c3:94:56:f3:0e:84:1f:51:d4:48:7c:0e:ef:f0:3c: bf:c5:d3:f3:d2:81:16:13:bf:49:2f:82:42:c9:8a:2e: a3:27:49:68:55:ae:30:05:86:c3:9f:61:02:58:71:06: 2e:68:92:da:c7:eb:f5:fd:a2:5d:b8:8c:e2:f9:16:e6: 08:28:5a:c5:fa:f9:6d:74:33:6a:8a:aa:d8:1a:aa:1b: 7d:2f:2b:96:fd:49:b3:8f:56:0a:04:e5:db:a7:76:90: 57:9e:2d:13:01:0c:dd:0a:42:e5:98:06:32:32:8b:8f: ee:1b:38:d7:59:83:a3:c7:b5:0a:d4:8a:fd:0e:3f:5f: 5e:07:dc:be:77:72:29:c0:19:4e:50:21:23:9f:bd:1b: 4c:84:f6:0a:0a:21:33:ff:06:f4:eb:20:fc:c2:1f:1e: 5e:16:9a:58:fc:75:4c:63:9c:0c:c0:b4:50:8f:2c:8e: 82:94:1d:c3:da:a2:c0:d8:4f:e3:fe:31:1c:7b:7c:73 Fingerprint (SHA-256): F0:8C:07:47:55:23:54:72:CE:37:DF:9A:F3:84:91:5D:78:31:85:06:47:6F:EA:B8:69:70:F2:DC:30:AC:A6:03 Fingerprint (SHA1): CC:90:95:A0:13:59:DF:5F:EF:85:3D:EC:B3:3D:D7:7E:93:91:18:5F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1491: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1492: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145569 (0x49157f21) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:57:58 2024 Not After : Wed Dec 26 14:57:58 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:af:03:48:b1:f1:08:4b:a1:a1:8b:b4:bf:78:e2:f9: 2e:47:3e:d3:f8:3e:36:6e:ef:be:07:23:8f:66:85:61: 1c:42:90:9b:ec:37:d4:aa:97:75:48:36:bb:05:a7:b7: 5a:cf:0f:d0:43:b6:bd:3d:79:03:c7:ec:5b:38:87:92: 40:03:ad:85:1f:ee:d6:df:24:f4:3d:e2:5e:51:12:d5: 6d:04:61:fe:6f:15:1e:05:a3:2b:5a:49:e1:57:97:cd: 17:af:d0:e5:0c:6f:cb:32:02:d5:99:2c:c4:6c:72:6f: 95:85:0b:0b:81:6a:13:0c:2a:0e:b6:96:14:b1:89:a1: 5e:12:65:7d:8e:ef:91:eb:aa:91:f1:10:89:5d:a4:f4: 41:13:78:3e:37:94:e7:bc:30:8e:00:ee:14:e1:80:89: a1:4d:d1:a8:22:a0:c7:86:03:17:6a:cf:40:b7:81:24: 91:59:bb:c9:4e:e3:8a:b6:5e:88:4f:94:7c:5f:e6:34: 4b:4c:42:34:07:f3:63:89:74:c5:83:1b:a6:a0:11:f3: 72:70:b1:3e:4f:2c:b3:da:8c:1c:df:8a:a5:fd:94:54: eb:fe:65:e0:88:2c:fc:57:1c:f8:a4:49:46:fa:62:a7: d8:cd:af:63:3a:39:ce:d0:e3:17:72:8d:9d:e5:c2:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:f9:71:73:4c:24:60:6e:e8:36:87:61:01:eb:f6:67: cb:c8:be:dd:21:5d:03:fe:13:c9:99:91:0a:3b:63:38: c5:b5:a2:3d:9d:2a:76:70:51:6e:50:b7:56:57:e3:42: 0d:83:a9:a4:04:a3:25:9b:e9:56:c2:8b:12:47:27:24: b3:42:67:36:fa:cf:fa:c3:34:e5:a4:ee:32:fe:13:28: c2:eb:8d:f5:84:69:74:dd:58:80:57:03:fb:c9:45:29: 47:09:e4:44:cf:0c:f9:98:36:58:3d:ad:a9:44:a1:3b: a6:d9:ab:2b:bc:f3:4e:60:4a:f7:90:a0:c7:b9:7e:54: b2:22:a9:ed:b3:45:20:4a:2d:7d:31:49:c8:b4:6e:db: e2:92:e3:20:f4:a4:d3:4f:70:f7:5c:27:68:53:2e:d4: 1e:15:4d:7c:10:c6:53:5c:82:3f:73:e3:bc:3f:4c:16: ec:40:b2:e5:77:d3:9d:5f:94:0d:49:b1:1e:c0:8b:34: 69:37:87:90:14:30:ea:7e:55:11:aa:fb:54:e9:3e:00: b9:db:b3:b1:e1:32:71:fb:a2:5b:95:1e:72:54:f5:74: a8:e0:65:bd:bc:04:81:98:28:10:01:c1:3a:9b:ea:ed: 5e:8b:ad:c1:c4:2e:e2:8e:fa:14:08:d8:ae:04:d4:60 Fingerprint (SHA-256): 4E:75:F8:CF:4E:C3:2E:A0:F7:85:6B:D1:5A:6F:8E:92:2C:13:52:85:34:AC:24:4F:1D:1B:77:D3:3B:68:AF:F7 Fingerprint (SHA1): 9C:F1:5C:24:AE:CA:F0:19:D6:63:A9:B3:61:5E:D2:6B:FC:94:18:53 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1493: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1494: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145571 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1495: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1496: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1497: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1498: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145572 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1499: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1500: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1501: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1502: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145573 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1503: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1504: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1505: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1506: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1226145574 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1507: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1508: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1509: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1510: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1226145575 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1511: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1512: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1513: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1514: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1515: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1516: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1517: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145571 (0x49157f23) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:01 2024 Not After : Wed Dec 26 14:58:01 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ca:90:a8:15:ab:37:9b:d6:7c:65:67:75:f0:c8:7f: ce:79:e4:a3:a1:ec:c1:28:ac:26:7b:62:a9:cd:8f:84: a4:1e:e7:b2:ef:af:ff:00:a1:0c:c2:fa:8d:7e:26:96: d6:59:0e:30:f0:d4:c6:69:9c:32:ec:89:9c:28:7f:ee: f6:13:af:b4:91:e6:75:c2:fa:4f:55:98:19:98:88:3e: de:4b:92:93:b6:d4:c0:d4:09:fa:93:71:72:11:c6:2f: 68:b5:e1:17:f9:1e:f2:fd:46:f7:56:c2:f1:fe:db:1a: be:13:42:59:5e:a5:19:56:07:ad:11:ac:df:10:27:d1: 14:76:84:7f:7c:da:56:3f:f8:9f:20:17:6a:37:60:d5: 9d:2e:b3:c2:b5:c2:a4:48:49:b4:77:a4:94:f3:42:eb: 4d:6a:b0:97:85:51:4f:1a:ac:9f:74:ba:17:a8:92:ad: c3:2d:d5:7d:78:35:55:45:66:10:44:ce:51:08:4e:29: 83:6b:ce:77:93:6c:74:1d:71:6b:8a:b3:9a:b6:15:2a: 6c:f6:3d:75:13:49:04:0a:d4:79:bf:e5:8e:00:98:33: 08:23:48:42:ba:50:55:49:6d:bb:94:dc:6c:69:77:56: 8f:31:8f:6d:6e:4b:19:d2:84:0a:32:94:d9:a9:7b:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:82:84:12:0b:39:5b:b5:5a:79:00:16:18:37:5b:65: cd:4d:b4:7c:c5:cb:a8:d7:8f:24:6b:c2:e5:4e:47:85: 1d:5a:3c:14:37:ad:70:6a:13:4f:ef:0e:49:83:b6:17: e9:59:ad:2a:c2:ad:2e:37:3d:e0:6b:78:45:ca:df:eb: 87:db:62:28:8c:64:51:3e:ee:07:ea:df:13:1e:d1:c4: d2:b1:b1:05:d0:de:6e:41:0f:a0:52:66:c8:f7:9a:72: ab:3e:41:59:9b:92:d5:f8:81:33:2d:fe:6a:84:9f:0e: 3e:27:a1:54:28:22:73:d0:1a:99:b5:dd:bf:eb:12:5c: 89:fc:15:0b:d4:60:7f:ae:62:5a:12:c1:9b:af:93:dd: d4:32:08:e6:01:3f:a8:7f:4e:6c:4c:55:59:a8:56:ac: 82:79:61:aa:e1:1e:33:dc:6d:dc:4b:b1:f4:77:70:95: 58:2b:ca:0a:1d:39:67:72:b0:70:0e:7c:be:a0:aa:e6: 5a:f3:37:2a:d9:d7:3b:2b:1f:f4:15:f9:c8:90:d6:f3: 0c:58:4c:c8:6f:8c:b9:29:9a:e3:9e:74:dd:c9:d1:3c: bd:bc:d5:0b:93:84:25:d4:d1:d4:1e:1f:21:96:93:71: 0e:12:01:fe:57:73:af:f5:21:ae:94:1e:e8:31:fb:54 Fingerprint (SHA-256): DE:F3:C7:3E:FE:C2:44:C0:29:36:17:68:A8:E9:A1:82:90:AA:89:DA:50:D9:4E:78:A7:A0:CD:A2:2A:A4:2C:07 Fingerprint (SHA1): 08:BF:6E:9E:15:C9:41:F0:F8:A3:93:B8:E1:DF:88:29:51:14:79:CC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1518: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1519: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145572 (0x49157f24) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:02 2024 Not After : Wed Dec 26 14:58:02 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:8f:78:bd:63:ae:35:c1:95:9f:46:43:b4:15:6d:63: ee:06:eb:ac:5b:8f:69:69:2d:8e:5b:1e:e5:27:5c:5f: 47:23:c0:82:31:6e:19:d7:5e:21:dd:bf:20:2c:ac:20: f5:3b:ca:d9:60:75:3c:57:98:30:36:5c:eb:22:02:46: 62:ed:1c:7b:98:ce:70:bc:fb:bd:28:68:7d:bb:e4:d0: e8:c8:bf:07:b4:48:ed:a3:b6:93:0a:35:d9:14:35:cc: 6f:f2:3b:df:bd:77:8a:c4:06:16:db:ca:19:75:ed:a7: cd:2c:8c:31:c2:3a:8f:50:4d:3d:3b:98:c5:32:8e:ab: a0:82:6b:c9:c0:5f:79:17:63:ec:ad:81:68:0b:a6:62: 24:66:ff:f6:b9:9a:fa:88:8f:0a:1d:57:4c:f9:72:42: a5:02:0a:e9:86:9f:b6:b8:3d:3c:96:13:08:72:3c:fe: 56:8c:5c:86:0f:d3:e5:ce:2d:32:46:a2:54:ea:4a:e9: 05:dc:74:8a:c9:16:0d:aa:a9:cd:e7:4d:f2:b6:d8:a6: 5b:56:3b:17:2e:f8:39:71:e0:9a:99:ca:0e:48:a8:52: 84:3d:ad:15:71:b2:85:4b:45:5e:67:24:40:08:b7:3a: ba:e9:ef:46:6e:8d:64:81:c5:55:39:1e:d6:6d:11:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:2e:e8:d6:25:70:d8:18:33:17:0d:ed:bb:e9:8c:22: 64:7d:3d:aa:7e:a3:76:be:ad:35:81:e5:8f:cd:2b:4a: 9f:b3:f8:d6:cc:68:62:f5:0a:04:32:4d:63:fd:13:16: 92:f4:d7:75:d7:61:b2:10:2f:4a:48:4d:29:26:bd:54: 60:1b:d7:ad:de:97:2a:73:5e:ce:ad:b0:e9:bf:45:eb: ac:57:aa:c4:76:10:01:ed:1a:f0:d8:d4:fe:e4:48:2f: 6f:16:af:fd:96:cc:c5:22:7b:c6:d7:a8:36:3b:3b:08: 4d:c7:51:e6:32:f0:cc:33:74:60:fe:d6:d0:a6:7e:30: e1:e6:29:3e:42:4a:ba:de:54:7e:83:10:88:52:20:7b: a8:b5:ea:c2:43:f4:8f:47:2d:bc:0c:3c:69:77:91:31: 7b:be:95:b1:30:02:84:4c:8d:bd:55:2d:ee:20:51:6e: 68:96:92:07:2c:45:b1:e1:a5:75:d9:31:eb:b1:52:88: 82:e3:f1:47:71:a5:e6:dd:ba:15:16:96:d5:40:8c:8d: 0c:24:fb:d1:d5:2f:17:27:a9:22:07:1c:2d:e2:83:f9: 9b:84:48:f1:b9:d6:d1:41:1a:39:da:38:fe:48:7b:a4: 55:dc:6d:95:29:d6:2b:ef:84:cb:fb:b7:4f:4a:5c:24 Fingerprint (SHA-256): EC:88:EF:9C:9E:9B:7F:FD:7B:5A:1E:9F:97:F0:DD:93:F0:FA:AB:D6:9C:A3:DA:E9:4E:0D:64:9D:A6:AA:10:D0 Fingerprint (SHA1): C3:93:CF:BB:09:FC:A2:63:71:E8:CD:D8:72:F3:6E:9A:6B:DF:BE:95 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1520: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1521: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1522: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145573 (0x49157f25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:58:02 2024 Not After : Wed Dec 26 14:58:02 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:74:fc:e7:ab:57:19:a3:36:d3:24:39:ac:bc:c4:ff: 3e:a1:c1:d9:1b:2a:a3:f0:5a:e2:cc:b7:31:37:72:df: 5f:54:7c:54:fd:09:d5:84:97:bd:07:51:9d:65:5e:7d: e5:b1:e0:f8:10:d7:47:45:e0:39:62:75:cc:05:db:b1: f4:a6:a1:99:48:24:66:f2:97:a7:df:33:f3:6e:a5:76: a0:0a:74:9c:b2:e1:5c:d1:cc:30:35:59:a0:8a:e5:ce: f2:7a:27:e4:e1:ab:9c:a1:1f:9f:d5:5f:1c:74:3e:f1: 90:87:57:8b:f8:e1:99:fa:52:1b:35:d9:40:8a:63:75: df:32:97:f9:3a:42:b8:60:a7:89:90:7e:f6:52:9b:32: de:b2:fc:a1:a9:79:25:74:35:4f:f8:e3:37:b2:f4:fb: 65:f5:43:a7:46:c7:7e:8c:2b:ce:1c:c5:47:e9:f2:d1: fc:0d:ab:43:f7:e0:63:59:c5:49:69:03:eb:3c:2c:4a: 0a:a0:56:cd:f1:74:f5:4a:ca:c0:27:ab:6d:bd:58:f9: 04:fa:06:8c:27:27:04:00:32:3e:4c:eb:35:4a:35:f9: 16:da:6c:87:ec:63:d6:95:b4:08:71:10:e9:31:23:a4: 62:b0:9d:b1:85:32:f7:48:44:0b:6f:b6:26:77:1c:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:7b:b5:87:88:35:62:d2:aa:66:4e:f0:39:fd:78:99: c7:2f:4a:82:17:57:2f:fc:c1:0b:da:25:2c:49:c7:1f: f7:3e:8c:5d:6d:3f:97:88:00:35:15:a9:17:b1:fa:2e: c6:70:54:8c:12:0d:2a:db:ae:45:c4:1a:4e:12:bc:16: ea:33:03:cf:ac:78:32:4d:18:fe:5e:99:5c:f4:99:09: b7:3e:b9:0b:95:dd:d2:7c:49:54:23:06:37:0e:db:cb: bd:d2:aa:53:70:4f:37:1e:65:d7:9f:10:8c:79:75:a4: b4:f4:7d:d6:24:45:76:ed:ce:e4:c1:35:93:84:cf:8f: d1:a2:99:0a:b4:cc:26:8e:08:28:e4:70:15:50:92:e8: 74:88:cc:9c:96:5b:13:a4:e0:58:fd:86:4f:67:54:a2: 6f:3d:25:fe:cf:4b:fb:d9:a2:a8:21:c0:d2:db:4d:8f: 5f:41:60:52:59:69:1e:fd:2e:d4:80:2c:3e:9f:b5:f5: 48:3d:69:5a:cc:78:17:71:53:30:54:71:c6:a4:9b:9a: 8e:ff:12:e8:6b:be:9b:2e:df:20:82:55:af:59:dd:ea: 60:ee:10:cd:00:98:f2:c7:ff:20:ab:5b:bb:0b:b3:e1: cb:06:a3:7d:09:20:52:0b:5e:52:7c:d3:7c:1e:9e:15 Fingerprint (SHA-256): 58:6C:57:66:EE:9C:12:A0:41:9D:67:7C:7D:A3:C2:1A:52:B3:05:8A:31:3A:8F:15:39:1B:53:12:2D:89:79:31 Fingerprint (SHA1): 6A:91:C4:09:9C:62:D4:99:F2:48:55:5C:BB:25:67:A2:E5:98:4D:90 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1523: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1524: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145576 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1525: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1526: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1527: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1528: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145577 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1529: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1530: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1531: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1532: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145578 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA1Root-1226145339.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1533: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1534: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1535: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1536: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145579 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1537: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1538: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1539: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145576 (0x49157f28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:05 2024 Not After : Wed Dec 26 14:58:05 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:8b:5d:75:ad:39:0f:a8:27:04:c4:c9:81:e7:07:1d: e4:74:02:9d:49:f6:61:f1:34:5c:87:a9:31:6a:22:a2: e5:18:f4:f7:5a:9a:e8:d2:db:b7:d0:c2:61:a0:34:6f: 66:26:e4:ba:b5:00:ca:b6:4c:e7:bc:ac:00:d8:ee:13: 1a:11:ea:27:32:8c:91:b4:09:37:6d:80:d5:a3:48:2c: e9:a1:f8:56:26:6e:7a:9a:2c:0f:80:b4:cf:6c:97:49: 46:57:33:cc:3c:ca:35:a7:7d:2a:8f:d8:4f:c3:8a:93: eb:39:ac:a5:f3:81:4c:62:9c:8f:77:f4:c9:8e:b7:eb: ac:56:47:c1:1b:d7:4c:19:20:50:79:3f:95:3c:c5:ad: 53:55:dc:73:dc:14:9c:da:82:f2:94:83:9c:d0:b2:c8: e8:7f:bd:00:e2:79:15:ff:cd:8b:2e:ec:2d:38:95:df: 43:ae:ba:48:a1:61:ff:82:5c:8c:f9:d9:e9:7c:2c:45: 39:68:57:dc:bf:9b:ba:42:31:1b:e6:48:74:4c:de:99: 9c:7e:ae:21:46:e5:d1:76:fe:16:d0:4d:e4:7f:33:a6: 7a:d7:94:39:c0:3a:82:b0:d7:af:af:a7:eb:66:97:de: 59:f3:26:4f:b4:01:f1:65:38:b0:0b:b6:ff:1e:cc:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:4d:e6:20:37:53:78:91:71:fc:98:d5:98:f2:83:55: d0:90:7b:d3:23:ac:e2:dc:35:90:71:be:b9:12:86:fd: b2:2f:4c:58:f9:05:0d:2a:be:fa:01:ba:58:87:66:43: de:45:f9:d0:3e:ee:34:f2:71:c5:8c:d0:73:2c:7e:67: 3f:49:c2:ef:4a:f6:87:90:94:b8:39:92:c1:ae:f3:3b: 9b:71:52:62:2f:5e:c9:fc:01:f4:6d:67:be:26:fb:93: a0:62:34:b3:9e:a5:5a:8a:34:34:d5:40:8e:7f:bd:4b: db:e6:e1:75:4b:6d:27:20:63:12:12:70:3e:34:d8:e5: 77:3b:0a:e6:f0:d0:e2:82:36:1e:6b:90:4b:7d:b1:bf: 82:c7:76:72:e6:29:b9:28:d3:e5:9e:07:c1:bf:2d:8f: 54:7c:1a:24:2a:91:e5:90:5d:90:00:6e:72:e1:52:f7: b7:b3:b8:a2:f7:99:1d:f6:19:ce:dd:f4:a2:20:e2:2b: a3:c5:76:08:02:12:b3:13:04:bf:ae:b9:bf:38:e8:57: 3a:a8:35:00:0e:06:b1:fd:ae:d7:80:89:0f:6f:97:19: 3b:22:2e:11:b8:87:16:b0:bd:3f:bc:c4:f0:33:76:99: 4c:f8:0a:68:f2:23:3b:96:f2:68:93:7a:30:57:0a:65 Fingerprint (SHA-256): 12:17:3B:43:9B:A4:A9:DD:77:4A:59:56:9A:DB:9B:54:6E:84:65:20:0B:5E:2B:A6:EE:B5:47:E0:C7:56:85:82 Fingerprint (SHA1): 9D:5D:19:47:07:2A:5E:4A:AE:F8:EB:10:B6:2C:3D:7D:02:2B:A2:3E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1540: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1541: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145580 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1543: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1544: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145581 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1546: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1547: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1548: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145582 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1549: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1550: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145583 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1551: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1552: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1553: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1554: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1555: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145584 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145340.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1557: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1558: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1559: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145585 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1560: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1561: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1562: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145580 (0x49157f2c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:58:09 2024 Not After : Wed Dec 26 14:58:09 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:84:0f:fb:9a:f1:39:4b:c9:30:df:e9:2a:c1:6a:a6: 5f:a2:5e:84:a1:f9:8d:a2:db:00:63:23:a7:de:4d:c7: ac:65:32:4d:f3:19:90:ad:ab:74:05:0f:85:72:26:53: 91:cd:2f:c7:ce:08:0b:69:d5:f3:6e:24:6f:2c:50:5e: 50:b7:47:56:a3:41:f9:c5:16:c6:b8:5d:95:fe:4e:9a: cf:13:52:61:2b:42:b4:32:9c:13:59:8c:68:56:e3:39: 37:a0:fa:53:01:23:71:14:4b:0b:7f:e4:aa:54:52:a9: 6f:80:6c:4e:ce:7f:cc:6c:25:d4:83:5c:49:1e:2d:ed: 16:8e:9c:39:11:26:b7:23:f2:9e:0a:09:c9:30:2c:eb: 0d:d6:8a:b0:79:3d:52:9a:70:6f:e6:c3:17:c5:e8:20: b0:1e:76:72:bf:18:5b:ab:b5:63:62:97:4d:ee:88:b0: ac:03:cc:68:61:f9:fe:b1:be:a1:3e:94:1c:5d:9c:71: 94:92:a7:ea:f7:e1:36:1b:51:fc:c0:a2:e5:8d:4b:b2: 1f:79:cf:b8:3e:e8:69:62:78:97:0b:72:d5:9a:1a:b6: d1:54:93:f2:3c:b1:cc:57:e6:46:68:7b:6e:65:db:5c: 5b:fd:7a:f7:ac:99:0b:f3:3b:bc:bc:04:43:75:e2:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:6e:fc:d9:c4:69:5d:33:31:79:6c:9c:1e:cf:46:db: d5:63:15:40:c5:89:f4:99:9f:c8:71:46:f9:39:ee:f6: c9:5d:13:da:d2:77:3c:06:a4:50:de:1e:ee:4f:f5:52: f9:99:79:9f:bf:1e:3a:3d:28:b7:f3:61:21:82:f0:ca: 8b:ae:f7:50:9f:f0:39:06:02:11:64:eb:34:f6:95:a1: 28:f5:72:ac:80:2d:40:57:f4:0e:e6:c4:49:84:f1:89: d6:52:ba:b7:3d:0e:d6:31:7a:b3:f7:4f:ca:2a:d2:5f: 82:58:7b:ce:bc:b0:e1:e2:39:bf:3c:b9:ec:4c:c4:6f: bb:f6:84:bc:bf:a9:d4:fa:7d:6a:e6:36:21:ea:60:f4: 15:30:41:32:b8:23:34:24:1f:df:88:8f:9d:f7:ac:df: d1:d7:ed:14:50:8b:4e:94:fb:84:9f:59:80:37:ac:6a: 56:89:35:7c:57:bc:a2:bf:49:8f:3a:c1:43:4a:d0:b7: c7:83:c0:e3:56:82:0c:98:c0:bb:01:c4:00:25:b1:f6: f6:d8:16:d3:46:a3:25:e1:84:da:ea:ab:f5:44:21:7b: c8:a8:9d:c8:f3:bd:9f:41:57:aa:d2:91:32:f5:03:7d: 68:04:32:98:c9:6e:01:71:b5:dc:9c:d1:8b:f0:ea:6c Fingerprint (SHA-256): 64:35:11:8F:6D:B3:A9:E9:DD:73:6B:D1:83:40:2E:39:FD:9E:AE:5C:2C:7D:DA:B2:1B:DD:32:7B:73:F4:2D:BD Fingerprint (SHA1): 73:A6:46:2D:17:8C:7D:C0:55:D2:64:45:58:11:70:7F:B3:DE:65:71 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1563: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145581 (0x49157f2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:58:09 2024 Not After : Wed Dec 26 14:58:09 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:aa:4f:d4:eb:5c:9f:17:f3:1b:56:d2:cc:21:b2:f8: e2:d8:be:ec:1c:90:9a:57:39:b8:46:42:6f:6e:dc:86: 76:93:3d:17:a9:11:ec:e8:6a:43:c7:d9:05:b9:94:97: 23:a8:22:1b:b8:9a:6b:87:52:c3:0d:52:d1:bb:c1:51: 7f:32:cc:9e:8d:b5:e5:7f:32:35:73:96:48:fd:d5:fc: a0:bb:c6:8d:df:bb:f1:97:17:82:e9:03:5e:43:44:fa: 35:01:a0:ad:9e:ab:21:5a:f3:5f:b6:23:97:36:c0:40: 34:18:20:31:b8:0c:07:c6:1d:6d:1e:f3:62:ac:0e:db: 96:b8:59:99:d3:82:ad:a4:0d:2b:2d:40:3d:cc:86:ab: 28:76:25:a6:02:9a:50:ca:69:0b:46:45:e0:a1:b3:61: 74:bb:7f:81:0f:a4:2d:70:94:af:d8:39:15:ea:d4:90: a0:68:46:c1:97:a8:18:8b:75:54:98:a0:24:bc:8e:a5: d1:d9:e3:40:cb:2f:87:9c:47:b4:09:04:fa:73:2c:eb: 4d:97:c9:98:47:60:e5:10:53:cc:02:eb:cf:27:c2:8c: 3a:9c:3f:35:0b:8e:10:72:e5:8f:84:ff:b4:3d:13:64: 75:55:1b:7a:7c:64:e7:45:27:85:51:60:4d:59:fa:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:f2:2a:8f:8f:af:2e:63:5a:a4:32:79:68:02:ca:82: 25:2c:8b:27:8d:6b:4b:99:f3:af:39:ab:7c:25:13:1e: 8c:d4:64:4a:57:6a:e3:10:9e:a6:bd:75:bf:8c:14:77: bd:c6:6a:34:f2:f3:9c:39:50:0e:ac:32:d7:b0:06:cc: 23:a9:dd:7c:1a:e4:54:ee:21:3f:ca:8e:49:d2:58:5e: b2:dd:92:50:22:69:03:2e:9d:44:20:69:19:e3:e8:77: 53:c8:33:60:83:1f:df:29:c8:b5:28:72:80:23:46:09: 04:b0:c9:5d:80:4f:6e:c7:01:3e:95:97:d7:24:02:a0: 36:b1:37:b6:04:7d:8b:0d:71:0e:d8:67:dd:f8:bc:38: 2e:70:ba:f7:08:47:c8:c1:da:68:bb:b6:4c:f9:95:4e: 7f:1c:d7:4d:9e:34:e5:bc:d9:6e:57:68:99:c5:8a:46: 60:d8:a6:1f:df:b2:cd:f8:ea:df:5c:d9:e7:10:77:25: 2a:26:4d:ae:79:9c:ee:9b:2d:cb:c9:5a:3f:f1:f9:38: c8:82:4d:90:f1:23:b9:e2:85:a5:61:3b:97:bd:a8:57: c8:24:41:50:39:35:5f:e0:72:13:c5:d9:05:9a:ad:c3: 2a:08:7c:06:8c:4d:64:34:79:c8:ae:bc:36:a9:08:1a Fingerprint (SHA-256): DC:81:37:19:37:D8:C3:85:DB:E0:C4:00:2E:31:F9:07:B7:9A:5C:A2:11:CD:31:65:7B:9D:F9:1F:34:5A:3E:10 Fingerprint (SHA1): 8D:DF:57:A3:82:E0:AB:9D:A5:B0:7A:48:95:CE:BB:14:8C:9D:00:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1564: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145581 (0x49157f2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:58:09 2024 Not After : Wed Dec 26 14:58:09 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:aa:4f:d4:eb:5c:9f:17:f3:1b:56:d2:cc:21:b2:f8: e2:d8:be:ec:1c:90:9a:57:39:b8:46:42:6f:6e:dc:86: 76:93:3d:17:a9:11:ec:e8:6a:43:c7:d9:05:b9:94:97: 23:a8:22:1b:b8:9a:6b:87:52:c3:0d:52:d1:bb:c1:51: 7f:32:cc:9e:8d:b5:e5:7f:32:35:73:96:48:fd:d5:fc: a0:bb:c6:8d:df:bb:f1:97:17:82:e9:03:5e:43:44:fa: 35:01:a0:ad:9e:ab:21:5a:f3:5f:b6:23:97:36:c0:40: 34:18:20:31:b8:0c:07:c6:1d:6d:1e:f3:62:ac:0e:db: 96:b8:59:99:d3:82:ad:a4:0d:2b:2d:40:3d:cc:86:ab: 28:76:25:a6:02:9a:50:ca:69:0b:46:45:e0:a1:b3:61: 74:bb:7f:81:0f:a4:2d:70:94:af:d8:39:15:ea:d4:90: a0:68:46:c1:97:a8:18:8b:75:54:98:a0:24:bc:8e:a5: d1:d9:e3:40:cb:2f:87:9c:47:b4:09:04:fa:73:2c:eb: 4d:97:c9:98:47:60:e5:10:53:cc:02:eb:cf:27:c2:8c: 3a:9c:3f:35:0b:8e:10:72:e5:8f:84:ff:b4:3d:13:64: 75:55:1b:7a:7c:64:e7:45:27:85:51:60:4d:59:fa:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:f2:2a:8f:8f:af:2e:63:5a:a4:32:79:68:02:ca:82: 25:2c:8b:27:8d:6b:4b:99:f3:af:39:ab:7c:25:13:1e: 8c:d4:64:4a:57:6a:e3:10:9e:a6:bd:75:bf:8c:14:77: bd:c6:6a:34:f2:f3:9c:39:50:0e:ac:32:d7:b0:06:cc: 23:a9:dd:7c:1a:e4:54:ee:21:3f:ca:8e:49:d2:58:5e: b2:dd:92:50:22:69:03:2e:9d:44:20:69:19:e3:e8:77: 53:c8:33:60:83:1f:df:29:c8:b5:28:72:80:23:46:09: 04:b0:c9:5d:80:4f:6e:c7:01:3e:95:97:d7:24:02:a0: 36:b1:37:b6:04:7d:8b:0d:71:0e:d8:67:dd:f8:bc:38: 2e:70:ba:f7:08:47:c8:c1:da:68:bb:b6:4c:f9:95:4e: 7f:1c:d7:4d:9e:34:e5:bc:d9:6e:57:68:99:c5:8a:46: 60:d8:a6:1f:df:b2:cd:f8:ea:df:5c:d9:e7:10:77:25: 2a:26:4d:ae:79:9c:ee:9b:2d:cb:c9:5a:3f:f1:f9:38: c8:82:4d:90:f1:23:b9:e2:85:a5:61:3b:97:bd:a8:57: c8:24:41:50:39:35:5f:e0:72:13:c5:d9:05:9a:ad:c3: 2a:08:7c:06:8c:4d:64:34:79:c8:ae:bc:36:a9:08:1a Fingerprint (SHA-256): DC:81:37:19:37:D8:C3:85:DB:E0:C4:00:2E:31:F9:07:B7:9A:5C:A2:11:CD:31:65:7B:9D:F9:1F:34:5A:3E:10 Fingerprint (SHA1): 8D:DF:57:A3:82:E0:AB:9D:A5:B0:7A:48:95:CE:BB:14:8C:9D:00:AE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1565: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1566: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145586 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1567: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1568: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1569: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145587 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1570: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1571: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1572: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1573: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145588 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1574: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1575: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145589 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1576: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1577: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1578: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1579: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1580: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145590 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145341.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1581: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1582: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1583: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1584: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145591 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1585: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1586: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1587: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1588: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145592 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-BridgeNavy-1226145342.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1589: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1590: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1591: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1592: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145593 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1593: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1595: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145586 (0x49157f32) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:58:13 2024 Not After : Wed Dec 26 14:58:13 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:8c:4e:d4:7c:7c:43:41:30:4a:dc:ca:53:fe:14:91: 7b:b3:de:78:8a:24:d1:2c:49:ab:47:ac:9b:da:8e:94: db:fd:fc:be:6f:46:91:e2:61:d5:15:43:84:5b:d9:07: 1d:5a:3e:5f:bb:11:ff:20:45:b1:3f:1b:20:c3:17:ab: 4d:8e:a3:a1:ec:5e:0c:a3:2a:f1:5e:a7:2e:f4:05:97: c4:3a:7a:0f:b5:57:07:6d:48:4b:b1:9e:f4:c9:34:bf: 9d:11:e1:6b:75:92:c8:ec:34:3c:b4:63:21:d6:8e:31: de:6e:ac:75:30:40:91:d1:44:92:39:cc:71:cf:2e:1a: f6:d9:de:d9:25:16:57:10:fd:ce:f1:63:bf:ca:cd:36: 2f:0c:f9:fb:dc:6a:89:35:14:c6:50:17:da:0f:32:2c: 1d:ea:db:2c:01:c1:80:1c:af:5f:1e:0e:0c:72:8a:85: 43:63:31:fe:89:4e:ea:03:22:2a:0b:b1:8a:5e:5e:64: e3:a9:85:d4:8c:ab:76:a3:e6:50:cd:0a:74:05:76:92: e6:11:f9:94:62:f2:ab:3b:25:50:78:fa:99:3c:de:c2: 31:49:d4:fc:29:ce:93:52:01:89:bc:bb:c5:ce:53:34: 4a:27:9d:fd:c8:30:fd:8a:e7:dc:d3:84:78:7e:01:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:84:d9:91:47:2b:d2:b3:8d:7a:b2:3e:ad:e2:30:c8: 22:b2:89:2c:86:ab:03:eb:4b:ba:f6:9e:d2:45:14:9b: 7e:e2:8d:5c:10:1a:4d:8b:20:00:95:12:cc:52:89:87: e8:67:47:03:9f:2a:c6:0a:e9:d6:8e:03:61:8c:71:5b: e3:fd:32:f8:82:a9:a5:3b:8a:ed:49:d2:12:87:98:1d: 0b:d1:8e:cb:8b:e9:49:08:5e:53:49:b5:14:cb:c9:06: 51:7a:a2:db:9c:c4:d3:b7:8f:cf:aa:40:48:9c:52:3d: 47:a4:7f:53:4b:15:07:e8:16:ad:6b:ae:55:b0:13:cb: e5:40:5f:06:38:ea:0e:e5:cb:f8:52:48:7d:8f:99:44: 29:b1:66:91:dc:33:dd:02:fa:c1:08:62:cb:85:98:49: 28:b7:d5:33:a7:1f:a8:ac:6a:e3:94:5b:b4:b9:b2:bd: 20:ef:3d:d4:3b:24:40:12:d0:0f:80:b5:14:35:39:88: c0:1c:a0:f2:be:13:3f:b9:ff:18:a1:91:b6:2f:a0:3e: ad:65:b2:ca:b4:00:ea:02:56:91:be:bd:f5:d9:a6:df: 2e:35:a2:b9:10:45:30:08:f6:88:b2:f1:1a:a5:e6:1e: da:66:e1:f7:8c:da:9a:b4:95:8e:74:ad:0c:1c:12:aa Fingerprint (SHA-256): F9:84:64:D1:FA:40:DC:24:EC:EE:A8:44:B5:34:BE:63:90:E6:CB:A3:47:9B:90:D5:E1:CE:15:F0:C5:0E:3E:F7 Fingerprint (SHA1): 18:40:D7:55:BF:DD:19:14:93:35:21:0E:A7:DC:A4:1D:14:38:8A:99 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1596: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145587 (0x49157f33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:58:14 2024 Not After : Wed Dec 26 14:58:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:a7:27:8c:8e:62:03:a1:da:ae:08:7a:ba:ae:58:da: f5:88:c6:14:30:eb:dd:b7:61:24:5b:95:f9:d1:dd:08: f5:f5:70:a1:2d:4f:37:07:68:60:6a:d9:b0:c9:f3:ab: 69:af:14:94:24:ab:d5:f9:39:89:29:97:3a:7d:8e:71: 64:20:b1:cf:a3:bc:1e:f2:b0:1b:49:b4:bb:d7:31:2a: 82:73:c9:22:bc:03:f9:bc:a1:6e:36:8e:35:1e:b6:99: 4b:45:2d:fb:00:d4:30:bc:c4:6b:93:b3:16:56:6c:e5: 6f:1f:56:b4:7b:5d:f2:d6:3b:29:c8:59:2b:e9:e8:a8: 30:96:74:39:76:f7:dd:4f:45:17:43:36:a3:70:5a:8c: f0:71:9d:c0:c6:61:2e:57:9d:b4:bc:25:25:54:54:e3: 35:2a:42:15:fb:ef:c4:3d:0a:bd:5d:30:99:32:c8:2e: 32:5a:50:e2:0f:58:2c:9f:f9:75:35:35:f8:77:10:cd: 7d:a8:a9:df:c9:00:26:84:c6:c4:d0:05:09:1b:c5:6d: 43:2a:f1:2d:fc:a6:c7:10:a0:ed:b1:26:7e:b0:a1:0c: 9e:d3:16:11:73:24:53:55:67:19:15:85:76:f7:15:8c: 42:76:21:3a:fe:46:ab:45:11:01:e8:3f:d2:da:9c:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:a5:4e:09:42:ea:73:8b:85:e3:c2:65:b3:4f:a0:fe: b0:98:07:bd:de:0c:cb:ea:5d:18:c5:9a:d0:a2:bc:d2: 65:7d:f1:0e:04:a6:ad:36:13:74:64:45:f1:af:7f:4f: bd:ca:14:c9:2f:45:e0:65:b6:8c:37:ed:5f:0f:28:aa: b5:bc:10:2a:0b:5e:18:b7:be:87:3e:36:a3:4b:b7:c3: 8c:88:e4:13:39:c7:2c:a3:f7:cf:1d:1d:47:70:6a:b7: cd:e0:d4:64:c5:5a:2e:7c:98:fd:a8:0f:18:de:8d:94: b4:ac:71:04:59:ed:0f:e8:13:d4:db:15:e9:7e:2f:fe: cd:d1:ff:ff:ab:9d:3b:20:a9:a2:78:28:ad:03:4b:88: c0:bc:9a:e7:f7:0c:aa:e0:d8:17:5c:be:d4:33:b9:14: c7:ad:7b:c6:e9:f2:2a:91:63:d5:85:75:4b:21:fd:c2: 0d:07:bd:08:6b:98:e3:60:cc:da:0b:13:b0:cc:82:ee: 4e:8d:ba:62:6e:44:5a:68:e2:e7:cd:1f:74:a8:3f:e7: dd:32:11:8c:31:49:29:1f:99:16:23:53:1c:7f:02:1f: 74:c5:57:56:5a:b8:ba:9f:ae:c8:0c:3c:42:f7:fa:14: 50:81:fe:ae:9e:dd:02:61:00:f5:08:2f:91:0a:c4:cb Fingerprint (SHA-256): 94:E6:01:09:7E:5D:40:C1:73:8A:E0:0B:30:83:87:46:07:31:86:B8:03:87:27:40:FC:09:6C:85:BF:7F:46:1C Fingerprint (SHA1): EA:81:71:75:7B:08:BF:EE:05:D0:CB:D4:5B:3C:84:EB:1D:B1:82:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1597: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145587 (0x49157f33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:58:14 2024 Not After : Wed Dec 26 14:58:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:a7:27:8c:8e:62:03:a1:da:ae:08:7a:ba:ae:58:da: f5:88:c6:14:30:eb:dd:b7:61:24:5b:95:f9:d1:dd:08: f5:f5:70:a1:2d:4f:37:07:68:60:6a:d9:b0:c9:f3:ab: 69:af:14:94:24:ab:d5:f9:39:89:29:97:3a:7d:8e:71: 64:20:b1:cf:a3:bc:1e:f2:b0:1b:49:b4:bb:d7:31:2a: 82:73:c9:22:bc:03:f9:bc:a1:6e:36:8e:35:1e:b6:99: 4b:45:2d:fb:00:d4:30:bc:c4:6b:93:b3:16:56:6c:e5: 6f:1f:56:b4:7b:5d:f2:d6:3b:29:c8:59:2b:e9:e8:a8: 30:96:74:39:76:f7:dd:4f:45:17:43:36:a3:70:5a:8c: f0:71:9d:c0:c6:61:2e:57:9d:b4:bc:25:25:54:54:e3: 35:2a:42:15:fb:ef:c4:3d:0a:bd:5d:30:99:32:c8:2e: 32:5a:50:e2:0f:58:2c:9f:f9:75:35:35:f8:77:10:cd: 7d:a8:a9:df:c9:00:26:84:c6:c4:d0:05:09:1b:c5:6d: 43:2a:f1:2d:fc:a6:c7:10:a0:ed:b1:26:7e:b0:a1:0c: 9e:d3:16:11:73:24:53:55:67:19:15:85:76:f7:15:8c: 42:76:21:3a:fe:46:ab:45:11:01:e8:3f:d2:da:9c:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:a5:4e:09:42:ea:73:8b:85:e3:c2:65:b3:4f:a0:fe: b0:98:07:bd:de:0c:cb:ea:5d:18:c5:9a:d0:a2:bc:d2: 65:7d:f1:0e:04:a6:ad:36:13:74:64:45:f1:af:7f:4f: bd:ca:14:c9:2f:45:e0:65:b6:8c:37:ed:5f:0f:28:aa: b5:bc:10:2a:0b:5e:18:b7:be:87:3e:36:a3:4b:b7:c3: 8c:88:e4:13:39:c7:2c:a3:f7:cf:1d:1d:47:70:6a:b7: cd:e0:d4:64:c5:5a:2e:7c:98:fd:a8:0f:18:de:8d:94: b4:ac:71:04:59:ed:0f:e8:13:d4:db:15:e9:7e:2f:fe: cd:d1:ff:ff:ab:9d:3b:20:a9:a2:78:28:ad:03:4b:88: c0:bc:9a:e7:f7:0c:aa:e0:d8:17:5c:be:d4:33:b9:14: c7:ad:7b:c6:e9:f2:2a:91:63:d5:85:75:4b:21:fd:c2: 0d:07:bd:08:6b:98:e3:60:cc:da:0b:13:b0:cc:82:ee: 4e:8d:ba:62:6e:44:5a:68:e2:e7:cd:1f:74:a8:3f:e7: dd:32:11:8c:31:49:29:1f:99:16:23:53:1c:7f:02:1f: 74:c5:57:56:5a:b8:ba:9f:ae:c8:0c:3c:42:f7:fa:14: 50:81:fe:ae:9e:dd:02:61:00:f5:08:2f:91:0a:c4:cb Fingerprint (SHA-256): 94:E6:01:09:7E:5D:40:C1:73:8A:E0:0B:30:83:87:46:07:31:86:B8:03:87:27:40:FC:09:6C:85:BF:7F:46:1C Fingerprint (SHA1): EA:81:71:75:7B:08:BF:EE:05:D0:CB:D4:5B:3C:84:EB:1D:B1:82:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1598: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1599: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145586 (0x49157f32) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:58:13 2024 Not After : Wed Dec 26 14:58:13 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:8c:4e:d4:7c:7c:43:41:30:4a:dc:ca:53:fe:14:91: 7b:b3:de:78:8a:24:d1:2c:49:ab:47:ac:9b:da:8e:94: db:fd:fc:be:6f:46:91:e2:61:d5:15:43:84:5b:d9:07: 1d:5a:3e:5f:bb:11:ff:20:45:b1:3f:1b:20:c3:17:ab: 4d:8e:a3:a1:ec:5e:0c:a3:2a:f1:5e:a7:2e:f4:05:97: c4:3a:7a:0f:b5:57:07:6d:48:4b:b1:9e:f4:c9:34:bf: 9d:11:e1:6b:75:92:c8:ec:34:3c:b4:63:21:d6:8e:31: de:6e:ac:75:30:40:91:d1:44:92:39:cc:71:cf:2e:1a: f6:d9:de:d9:25:16:57:10:fd:ce:f1:63:bf:ca:cd:36: 2f:0c:f9:fb:dc:6a:89:35:14:c6:50:17:da:0f:32:2c: 1d:ea:db:2c:01:c1:80:1c:af:5f:1e:0e:0c:72:8a:85: 43:63:31:fe:89:4e:ea:03:22:2a:0b:b1:8a:5e:5e:64: e3:a9:85:d4:8c:ab:76:a3:e6:50:cd:0a:74:05:76:92: e6:11:f9:94:62:f2:ab:3b:25:50:78:fa:99:3c:de:c2: 31:49:d4:fc:29:ce:93:52:01:89:bc:bb:c5:ce:53:34: 4a:27:9d:fd:c8:30:fd:8a:e7:dc:d3:84:78:7e:01:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:84:d9:91:47:2b:d2:b3:8d:7a:b2:3e:ad:e2:30:c8: 22:b2:89:2c:86:ab:03:eb:4b:ba:f6:9e:d2:45:14:9b: 7e:e2:8d:5c:10:1a:4d:8b:20:00:95:12:cc:52:89:87: e8:67:47:03:9f:2a:c6:0a:e9:d6:8e:03:61:8c:71:5b: e3:fd:32:f8:82:a9:a5:3b:8a:ed:49:d2:12:87:98:1d: 0b:d1:8e:cb:8b:e9:49:08:5e:53:49:b5:14:cb:c9:06: 51:7a:a2:db:9c:c4:d3:b7:8f:cf:aa:40:48:9c:52:3d: 47:a4:7f:53:4b:15:07:e8:16:ad:6b:ae:55:b0:13:cb: e5:40:5f:06:38:ea:0e:e5:cb:f8:52:48:7d:8f:99:44: 29:b1:66:91:dc:33:dd:02:fa:c1:08:62:cb:85:98:49: 28:b7:d5:33:a7:1f:a8:ac:6a:e3:94:5b:b4:b9:b2:bd: 20:ef:3d:d4:3b:24:40:12:d0:0f:80:b5:14:35:39:88: c0:1c:a0:f2:be:13:3f:b9:ff:18:a1:91:b6:2f:a0:3e: ad:65:b2:ca:b4:00:ea:02:56:91:be:bd:f5:d9:a6:df: 2e:35:a2:b9:10:45:30:08:f6:88:b2:f1:1a:a5:e6:1e: da:66:e1:f7:8c:da:9a:b4:95:8e:74:ad:0c:1c:12:aa Fingerprint (SHA-256): F9:84:64:D1:FA:40:DC:24:EC:EE:A8:44:B5:34:BE:63:90:E6:CB:A3:47:9B:90:D5:E1:CE:15:F0:C5:0E:3E:F7 Fingerprint (SHA1): 18:40:D7:55:BF:DD:19:14:93:35:21:0E:A7:DC:A4:1D:14:38:8A:99 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1600: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145587 (0x49157f33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:58:14 2024 Not After : Wed Dec 26 14:58:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:a7:27:8c:8e:62:03:a1:da:ae:08:7a:ba:ae:58:da: f5:88:c6:14:30:eb:dd:b7:61:24:5b:95:f9:d1:dd:08: f5:f5:70:a1:2d:4f:37:07:68:60:6a:d9:b0:c9:f3:ab: 69:af:14:94:24:ab:d5:f9:39:89:29:97:3a:7d:8e:71: 64:20:b1:cf:a3:bc:1e:f2:b0:1b:49:b4:bb:d7:31:2a: 82:73:c9:22:bc:03:f9:bc:a1:6e:36:8e:35:1e:b6:99: 4b:45:2d:fb:00:d4:30:bc:c4:6b:93:b3:16:56:6c:e5: 6f:1f:56:b4:7b:5d:f2:d6:3b:29:c8:59:2b:e9:e8:a8: 30:96:74:39:76:f7:dd:4f:45:17:43:36:a3:70:5a:8c: f0:71:9d:c0:c6:61:2e:57:9d:b4:bc:25:25:54:54:e3: 35:2a:42:15:fb:ef:c4:3d:0a:bd:5d:30:99:32:c8:2e: 32:5a:50:e2:0f:58:2c:9f:f9:75:35:35:f8:77:10:cd: 7d:a8:a9:df:c9:00:26:84:c6:c4:d0:05:09:1b:c5:6d: 43:2a:f1:2d:fc:a6:c7:10:a0:ed:b1:26:7e:b0:a1:0c: 9e:d3:16:11:73:24:53:55:67:19:15:85:76:f7:15:8c: 42:76:21:3a:fe:46:ab:45:11:01:e8:3f:d2:da:9c:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:a5:4e:09:42:ea:73:8b:85:e3:c2:65:b3:4f:a0:fe: b0:98:07:bd:de:0c:cb:ea:5d:18:c5:9a:d0:a2:bc:d2: 65:7d:f1:0e:04:a6:ad:36:13:74:64:45:f1:af:7f:4f: bd:ca:14:c9:2f:45:e0:65:b6:8c:37:ed:5f:0f:28:aa: b5:bc:10:2a:0b:5e:18:b7:be:87:3e:36:a3:4b:b7:c3: 8c:88:e4:13:39:c7:2c:a3:f7:cf:1d:1d:47:70:6a:b7: cd:e0:d4:64:c5:5a:2e:7c:98:fd:a8:0f:18:de:8d:94: b4:ac:71:04:59:ed:0f:e8:13:d4:db:15:e9:7e:2f:fe: cd:d1:ff:ff:ab:9d:3b:20:a9:a2:78:28:ad:03:4b:88: c0:bc:9a:e7:f7:0c:aa:e0:d8:17:5c:be:d4:33:b9:14: c7:ad:7b:c6:e9:f2:2a:91:63:d5:85:75:4b:21:fd:c2: 0d:07:bd:08:6b:98:e3:60:cc:da:0b:13:b0:cc:82:ee: 4e:8d:ba:62:6e:44:5a:68:e2:e7:cd:1f:74:a8:3f:e7: dd:32:11:8c:31:49:29:1f:99:16:23:53:1c:7f:02:1f: 74:c5:57:56:5a:b8:ba:9f:ae:c8:0c:3c:42:f7:fa:14: 50:81:fe:ae:9e:dd:02:61:00:f5:08:2f:91:0a:c4:cb Fingerprint (SHA-256): 94:E6:01:09:7E:5D:40:C1:73:8A:E0:0B:30:83:87:46:07:31:86:B8:03:87:27:40:FC:09:6C:85:BF:7F:46:1C Fingerprint (SHA1): EA:81:71:75:7B:08:BF:EE:05:D0:CB:D4:5B:3C:84:EB:1D:B1:82:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1601: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145587 (0x49157f33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:58:14 2024 Not After : Wed Dec 26 14:58:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:a7:27:8c:8e:62:03:a1:da:ae:08:7a:ba:ae:58:da: f5:88:c6:14:30:eb:dd:b7:61:24:5b:95:f9:d1:dd:08: f5:f5:70:a1:2d:4f:37:07:68:60:6a:d9:b0:c9:f3:ab: 69:af:14:94:24:ab:d5:f9:39:89:29:97:3a:7d:8e:71: 64:20:b1:cf:a3:bc:1e:f2:b0:1b:49:b4:bb:d7:31:2a: 82:73:c9:22:bc:03:f9:bc:a1:6e:36:8e:35:1e:b6:99: 4b:45:2d:fb:00:d4:30:bc:c4:6b:93:b3:16:56:6c:e5: 6f:1f:56:b4:7b:5d:f2:d6:3b:29:c8:59:2b:e9:e8:a8: 30:96:74:39:76:f7:dd:4f:45:17:43:36:a3:70:5a:8c: f0:71:9d:c0:c6:61:2e:57:9d:b4:bc:25:25:54:54:e3: 35:2a:42:15:fb:ef:c4:3d:0a:bd:5d:30:99:32:c8:2e: 32:5a:50:e2:0f:58:2c:9f:f9:75:35:35:f8:77:10:cd: 7d:a8:a9:df:c9:00:26:84:c6:c4:d0:05:09:1b:c5:6d: 43:2a:f1:2d:fc:a6:c7:10:a0:ed:b1:26:7e:b0:a1:0c: 9e:d3:16:11:73:24:53:55:67:19:15:85:76:f7:15:8c: 42:76:21:3a:fe:46:ab:45:11:01:e8:3f:d2:da:9c:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:a5:4e:09:42:ea:73:8b:85:e3:c2:65:b3:4f:a0:fe: b0:98:07:bd:de:0c:cb:ea:5d:18:c5:9a:d0:a2:bc:d2: 65:7d:f1:0e:04:a6:ad:36:13:74:64:45:f1:af:7f:4f: bd:ca:14:c9:2f:45:e0:65:b6:8c:37:ed:5f:0f:28:aa: b5:bc:10:2a:0b:5e:18:b7:be:87:3e:36:a3:4b:b7:c3: 8c:88:e4:13:39:c7:2c:a3:f7:cf:1d:1d:47:70:6a:b7: cd:e0:d4:64:c5:5a:2e:7c:98:fd:a8:0f:18:de:8d:94: b4:ac:71:04:59:ed:0f:e8:13:d4:db:15:e9:7e:2f:fe: cd:d1:ff:ff:ab:9d:3b:20:a9:a2:78:28:ad:03:4b:88: c0:bc:9a:e7:f7:0c:aa:e0:d8:17:5c:be:d4:33:b9:14: c7:ad:7b:c6:e9:f2:2a:91:63:d5:85:75:4b:21:fd:c2: 0d:07:bd:08:6b:98:e3:60:cc:da:0b:13:b0:cc:82:ee: 4e:8d:ba:62:6e:44:5a:68:e2:e7:cd:1f:74:a8:3f:e7: dd:32:11:8c:31:49:29:1f:99:16:23:53:1c:7f:02:1f: 74:c5:57:56:5a:b8:ba:9f:ae:c8:0c:3c:42:f7:fa:14: 50:81:fe:ae:9e:dd:02:61:00:f5:08:2f:91:0a:c4:cb Fingerprint (SHA-256): 94:E6:01:09:7E:5D:40:C1:73:8A:E0:0B:30:83:87:46:07:31:86:B8:03:87:27:40:FC:09:6C:85:BF:7F:46:1C Fingerprint (SHA1): EA:81:71:75:7B:08:BF:EE:05:D0:CB:D4:5B:3C:84:EB:1D:B1:82:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1602: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145594 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145595 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1226145596 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1226145597 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1226145598 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1226145599 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145600 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1628: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1629: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145601 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1630: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1631: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1632: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1633: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145602 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1634: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1635: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1636: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1637: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145603 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1638: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1639: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1640: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145594 (0x49157f3a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:58:20 2024 Not After : Wed Dec 26 14:58:20 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:07:47:69:04:46:60:2b:6f:63:2f:ac:62:6c:40:29: 99:22:63:b8:58:11:68:bb:9a:5f:a3:61:db:0c:fa:2f: 32:30:6b:9c:55:c7:7d:bd:16:01:ba:a3:49:10:06:ce: b1:65:e4:9c:40:96:b7:96:59:ba:00:d1:8d:9e:7f:a9: df:d8:1a:1a:f4:e1:79:30:42:d3:d0:28:5d:f6:d4:f6: 54:22:e0:f2:47:9b:98:50:c2:78:bf:4e:66:c8:e3:ba: ac:09:df:d5:fd:48:c6:21:73:2f:1b:c3:20:82:2c:bc: d1:91:51:b3:8c:00:49:50:80:98:70:69:84:90:b2:d5: 07:5d:8f:8f:b2:b9:40:77:bd:bd:73:84:9c:12:37:e5: 7f:da:3d:5b:29:5b:45:a8:38:ed:63:3b:3b:27:b6:67: c0:c5:af:1a:99:db:1e:89:37:a9:fa:5a:19:1f:68:16: ed:e6:5b:48:49:c0:b9:9a:a9:24:31:46:c4:e3:bd:46: 29:ab:e5:bb:6e:d3:36:48:ed:37:1d:33:2c:ef:a9:88: c4:c5:81:fd:53:20:94:76:cb:f3:4c:69:f7:5b:94:72: 00:a5:a4:9f:a2:cc:b3:7c:aa:4d:84:b3:e2:01:16:19: 56:31:a5:0d:5f:9b:90:df:0d:d5:69:42:d9:49:30:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:d2:ab:a5:84:01:80:f8:6c:0a:27:45:6c:7d:63:dc: 60:d4:a8:f3:77:3a:7f:48:0f:68:3a:08:62:61:0e:a7: 84:d5:73:bb:d1:2e:3a:31:81:3f:1f:b9:98:c5:c2:18: 54:ec:20:d0:5c:ad:e0:2b:43:6b:c4:24:ea:9d:77:20: 72:a8:ee:73:e4:dd:a3:da:00:d6:f4:6e:f6:fb:b3:ed: 12:f0:7a:9d:c9:31:54:07:b7:94:df:00:13:59:ab:3b: fb:1f:2e:15:49:ee:0f:f0:b6:f3:24:42:6a:7f:4f:a6: 77:30:cd:80:b4:15:4d:36:6e:dd:c4:29:bf:70:b2:34: 37:77:7e:d3:20:dd:a3:bc:06:f2:ac:d9:26:e1:36:dd: eb:0e:b9:d9:d5:a8:5a:9b:df:46:96:48:4d:93:77:ba: d1:09:2f:0b:3b:52:a7:69:15:62:24:b2:e7:26:df:7e: 92:3d:2e:55:f8:f7:1c:33:a1:36:35:87:b7:df:fd:6b: e6:c1:02:90:74:5f:c2:b9:5d:79:e5:34:1c:16:51:6c: 88:0d:18:43:b1:4b:1b:93:fe:72:d7:9b:ef:68:26:08: 26:00:8f:c1:dd:6d:0e:40:b6:41:16:88:0d:c7:c2:65: b4:4e:ae:fa:d8:29:c7:04:2d:cb:60:24:b5:f9:56:89 Fingerprint (SHA-256): FC:22:3D:3E:84:72:CF:BE:09:8A:79:7F:C4:DF:E8:DD:90:9C:BD:A5:E5:CB:E6:C0:16:BB:7C:27:8A:D6:B5:91 Fingerprint (SHA1): F9:18:CA:CC:39:8E:F7:9D:22:28:43:48:AD:12:E9:80:37:79:55:98 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1641: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1642: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1643: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1644: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1645: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1646: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1647: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1648: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1649: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145595 (0x49157f3b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:58:21 2024 Not After : Wed Dec 26 14:58:21 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:cb:67:6a:a9:fe:a1:0d:e3:a9:86:5a:4e:38:2d:12: b9:31:41:c8:16:96:fc:b9:d0:9a:a8:d2:1d:10:2e:70: 89:5b:3b:42:34:40:90:ff:fe:0c:79:31:ff:aa:4d:3f: 76:ec:37:f2:12:08:e8:f8:51:c0:a3:2a:e0:87:9d:85: 8a:ad:81:7e:19:3b:2f:f9:17:1e:4e:fe:cd:a7:73:b3: 20:8a:b5:83:1c:4f:e4:b9:d2:e2:f0:41:a2:79:47:1a: 8f:7b:ba:96:c9:ba:9b:d5:3e:42:f3:70:04:ec:d2:71: 34:14:4c:cf:36:f3:06:69:20:9c:3c:ef:1a:66:fe:c6: 7e:1d:04:0c:0e:cb:87:09:7d:f6:58:2d:86:ad:ab:30: a1:04:f5:82:f3:3f:e2:1c:52:b0:c0:a3:34:b8:d0:9c: c1:fa:f7:9d:69:24:20:40:a3:95:f3:7f:38:c9:46:61: b0:4d:43:f5:f8:d8:2b:34:3b:88:2b:07:a2:22:67:4b: 84:0f:cd:ee:9e:75:33:aa:30:0c:dd:6b:b2:6c:60:0a: 33:29:6e:06:ef:53:c2:78:8e:f5:7f:10:5f:b6:68:ef: 1b:05:ce:65:6d:e3:5e:54:58:50:49:48:75:36:ee:42: b2:96:51:b1:d0:3d:34:0d:38:c1:59:b9:87:9f:a0:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:21:ce:80:5a:b8:fb:a4:ee:6c:c9:8f:01:32:72:e5: 6f:a0:ec:65:25:ee:b8:68:5c:d0:ff:70:4a:25:cf:f7: 68:93:4a:b6:bf:a6:b1:54:91:66:22:eb:ef:47:aa:a9: 6f:b2:75:6e:b0:c2:c0:44:12:c0:b5:41:fa:fc:22:15: 7b:7b:78:86:7a:8f:19:91:4a:91:a9:56:29:dc:b5:a7: c7:e9:71:cc:fa:9a:99:1f:68:b5:5c:20:86:61:c2:a8: 7c:66:94:1c:a0:34:f2:b5:6a:5a:19:e1:67:d0:b7:4c: 73:5a:a5:7f:5b:b1:ea:f1:5a:3c:89:58:75:f9:65:df: 17:96:19:17:c1:33:b4:06:9c:c4:ce:32:32:81:b6:7e: 26:38:52:73:df:1a:a2:67:97:47:a2:fe:4a:5c:e3:a5: 49:e5:2b:63:3c:05:c6:fe:03:41:e3:55:34:a6:6f:c4: c7:6d:72:67:5e:35:60:e1:be:e2:2e:41:70:96:ab:ea: 54:98:26:1f:1a:a9:d6:db:2d:d2:97:f9:55:f6:4b:94: af:aa:2d:70:5b:bd:cb:c1:0d:59:30:b6:02:ae:8e:29: 2d:5f:8e:45:0d:66:c5:ca:dd:7d:e0:9d:85:1c:26:85: 0e:00:be:eb:3d:1f:4e:0c:13:af:48:67:ae:32:2e:5a Fingerprint (SHA-256): 31:4C:D4:2D:5A:BC:38:08:EC:98:22:49:DE:D2:AA:48:D2:4A:DD:BE:67:10:FC:99:9C:B9:13:D4:4C:0E:19:28 Fingerprint (SHA1): C5:0A:FA:4E:D8:78:D7:F8:8F:60:66:20:7A:80:C3:0B:7D:FA:26:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1650: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1651: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1652: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1653: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1654: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1655: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1656: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1657: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1658: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1659: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1660: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1661: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1662: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1663: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1664: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1665: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1666: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1667: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1668: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145604 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1669: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1670: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1671: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145605 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1675: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1676: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145606 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1677: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1678: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1679: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1680: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1226145607 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1681: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1682: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1683: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145608 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1685: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1687: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1226145609 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1689: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1691: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1226145610 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1693: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1695: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1226145611 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1697: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1699: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1226145612 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1701: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1703: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145604 (0x49157f44) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:30 2024 Not After : Wed Dec 26 14:58:30 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 96:b1:7b:fc:8d:3d:e1:0b:65:92:23:2f:1a:08:88:9e: c4:08:1d:32:98:4d:93:c4:a4:08:d5:6a:55:a1:89:e8: ec:b1:39:28:12:5b:e9:f1:cf:dd:12:91:0b:84:4c:35: 2b:0e:90:18:a3:6b:31:18:e3:d8:28:96:9e:7a:a7:94: a0:56:35:20:86:76:a9:61:09:b7:4b:a9:87:31:66:25: 1e:2b:a4:c2:8a:d5:93:91:32:6f:47:05:a9:bb:fe:55: 7e:55:4a:8c:c0:79:e6:6f:1e:87:fe:b9:77:03:b5:b2: 9c:b0:f8:5e:e2:a1:19:39:5f:d9:54:a0:0c:98:1e:50: 44:81:6b:cb:26:2b:64:ab:12:2c:aa:ae:69:66:88:07: 6b:2e:6d:fb:32:b0:26:b3:80:01:c3:10:c8:f7:d7:9a: 15:0e:08:62:5d:a9:62:10:ed:3e:91:8d:8c:9f:6d:60: d5:73:bd:0e:60:cc:b3:2f:31:1d:31:cb:5b:15:98:73: 5d:15:0c:66:cf:5b:42:63:ed:23:e0:05:94:46:da:ef: eb:6b:95:0c:eb:e3:bc:27:e8:37:8a:a3:94:51:ef:e4: 94:81:92:3b:66:b3:53:5f:80:8e:92:f4:c6:c1:48:6b: 50:de:22:62:7a:15:c5:dd:63:78:c2:18:56:29:1a:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:b7:af:91:9a:66:21:8f:72:ae:35:8b: be:f3:f1:04:04:d8:b0:ac:3f:2d:6e:18:54:c7:d6:02: b9:02:1c:2f:01:23:f8:eb:e4:c4:4a:3c:7a:af:ff:8e: 7d:89:df:cd:62:8b:3c:d4:2c:f1:15:f6:61:9a:b2 Fingerprint (SHA-256): 8C:0E:A7:18:14:19:18:68:0E:29:BF:C8:0A:88:41:61:97:33:50:75:27:33:21:AE:E4:E9:BF:AA:A6:27:A4:6E Fingerprint (SHA1): CD:89:A1:4B:48:BF:0C:85:88:B2:7D:8C:33:A8:05:62:3E:11:2B:3D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1704: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145604 (0x49157f44) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:30 2024 Not After : Wed Dec 26 14:58:30 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 96:b1:7b:fc:8d:3d:e1:0b:65:92:23:2f:1a:08:88:9e: c4:08:1d:32:98:4d:93:c4:a4:08:d5:6a:55:a1:89:e8: ec:b1:39:28:12:5b:e9:f1:cf:dd:12:91:0b:84:4c:35: 2b:0e:90:18:a3:6b:31:18:e3:d8:28:96:9e:7a:a7:94: a0:56:35:20:86:76:a9:61:09:b7:4b:a9:87:31:66:25: 1e:2b:a4:c2:8a:d5:93:91:32:6f:47:05:a9:bb:fe:55: 7e:55:4a:8c:c0:79:e6:6f:1e:87:fe:b9:77:03:b5:b2: 9c:b0:f8:5e:e2:a1:19:39:5f:d9:54:a0:0c:98:1e:50: 44:81:6b:cb:26:2b:64:ab:12:2c:aa:ae:69:66:88:07: 6b:2e:6d:fb:32:b0:26:b3:80:01:c3:10:c8:f7:d7:9a: 15:0e:08:62:5d:a9:62:10:ed:3e:91:8d:8c:9f:6d:60: d5:73:bd:0e:60:cc:b3:2f:31:1d:31:cb:5b:15:98:73: 5d:15:0c:66:cf:5b:42:63:ed:23:e0:05:94:46:da:ef: eb:6b:95:0c:eb:e3:bc:27:e8:37:8a:a3:94:51:ef:e4: 94:81:92:3b:66:b3:53:5f:80:8e:92:f4:c6:c1:48:6b: 50:de:22:62:7a:15:c5:dd:63:78:c2:18:56:29:1a:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:b7:af:91:9a:66:21:8f:72:ae:35:8b: be:f3:f1:04:04:d8:b0:ac:3f:2d:6e:18:54:c7:d6:02: b9:02:1c:2f:01:23:f8:eb:e4:c4:4a:3c:7a:af:ff:8e: 7d:89:df:cd:62:8b:3c:d4:2c:f1:15:f6:61:9a:b2 Fingerprint (SHA-256): 8C:0E:A7:18:14:19:18:68:0E:29:BF:C8:0A:88:41:61:97:33:50:75:27:33:21:AE:E4:E9:BF:AA:A6:27:A4:6E Fingerprint (SHA1): CD:89:A1:4B:48:BF:0C:85:88:B2:7D:8C:33:A8:05:62:3E:11:2B:3D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1705: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145604 (0x49157f44) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:30 2024 Not After : Wed Dec 26 14:58:30 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 96:b1:7b:fc:8d:3d:e1:0b:65:92:23:2f:1a:08:88:9e: c4:08:1d:32:98:4d:93:c4:a4:08:d5:6a:55:a1:89:e8: ec:b1:39:28:12:5b:e9:f1:cf:dd:12:91:0b:84:4c:35: 2b:0e:90:18:a3:6b:31:18:e3:d8:28:96:9e:7a:a7:94: a0:56:35:20:86:76:a9:61:09:b7:4b:a9:87:31:66:25: 1e:2b:a4:c2:8a:d5:93:91:32:6f:47:05:a9:bb:fe:55: 7e:55:4a:8c:c0:79:e6:6f:1e:87:fe:b9:77:03:b5:b2: 9c:b0:f8:5e:e2:a1:19:39:5f:d9:54:a0:0c:98:1e:50: 44:81:6b:cb:26:2b:64:ab:12:2c:aa:ae:69:66:88:07: 6b:2e:6d:fb:32:b0:26:b3:80:01:c3:10:c8:f7:d7:9a: 15:0e:08:62:5d:a9:62:10:ed:3e:91:8d:8c:9f:6d:60: d5:73:bd:0e:60:cc:b3:2f:31:1d:31:cb:5b:15:98:73: 5d:15:0c:66:cf:5b:42:63:ed:23:e0:05:94:46:da:ef: eb:6b:95:0c:eb:e3:bc:27:e8:37:8a:a3:94:51:ef:e4: 94:81:92:3b:66:b3:53:5f:80:8e:92:f4:c6:c1:48:6b: 50:de:22:62:7a:15:c5:dd:63:78:c2:18:56:29:1a:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:b7:af:91:9a:66:21:8f:72:ae:35:8b: be:f3:f1:04:04:d8:b0:ac:3f:2d:6e:18:54:c7:d6:02: b9:02:1c:2f:01:23:f8:eb:e4:c4:4a:3c:7a:af:ff:8e: 7d:89:df:cd:62:8b:3c:d4:2c:f1:15:f6:61:9a:b2 Fingerprint (SHA-256): 8C:0E:A7:18:14:19:18:68:0E:29:BF:C8:0A:88:41:61:97:33:50:75:27:33:21:AE:E4:E9:BF:AA:A6:27:A4:6E Fingerprint (SHA1): CD:89:A1:4B:48:BF:0C:85:88:B2:7D:8C:33:A8:05:62:3E:11:2B:3D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1706: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145604 (0x49157f44) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:30 2024 Not After : Wed Dec 26 14:58:30 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 96:b1:7b:fc:8d:3d:e1:0b:65:92:23:2f:1a:08:88:9e: c4:08:1d:32:98:4d:93:c4:a4:08:d5:6a:55:a1:89:e8: ec:b1:39:28:12:5b:e9:f1:cf:dd:12:91:0b:84:4c:35: 2b:0e:90:18:a3:6b:31:18:e3:d8:28:96:9e:7a:a7:94: a0:56:35:20:86:76:a9:61:09:b7:4b:a9:87:31:66:25: 1e:2b:a4:c2:8a:d5:93:91:32:6f:47:05:a9:bb:fe:55: 7e:55:4a:8c:c0:79:e6:6f:1e:87:fe:b9:77:03:b5:b2: 9c:b0:f8:5e:e2:a1:19:39:5f:d9:54:a0:0c:98:1e:50: 44:81:6b:cb:26:2b:64:ab:12:2c:aa:ae:69:66:88:07: 6b:2e:6d:fb:32:b0:26:b3:80:01:c3:10:c8:f7:d7:9a: 15:0e:08:62:5d:a9:62:10:ed:3e:91:8d:8c:9f:6d:60: d5:73:bd:0e:60:cc:b3:2f:31:1d:31:cb:5b:15:98:73: 5d:15:0c:66:cf:5b:42:63:ed:23:e0:05:94:46:da:ef: eb:6b:95:0c:eb:e3:bc:27:e8:37:8a:a3:94:51:ef:e4: 94:81:92:3b:66:b3:53:5f:80:8e:92:f4:c6:c1:48:6b: 50:de:22:62:7a:15:c5:dd:63:78:c2:18:56:29:1a:60 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:b7:af:91:9a:66:21:8f:72:ae:35:8b: be:f3:f1:04:04:d8:b0:ac:3f:2d:6e:18:54:c7:d6:02: b9:02:1c:2f:01:23:f8:eb:e4:c4:4a:3c:7a:af:ff:8e: 7d:89:df:cd:62:8b:3c:d4:2c:f1:15:f6:61:9a:b2 Fingerprint (SHA-256): 8C:0E:A7:18:14:19:18:68:0E:29:BF:C8:0A:88:41:61:97:33:50:75:27:33:21:AE:E4:E9:BF:AA:A6:27:A4:6E Fingerprint (SHA1): CD:89:A1:4B:48:BF:0C:85:88:B2:7D:8C:33:A8:05:62:3E:11:2B:3D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1707: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1708: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1709: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1710: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1711: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1712: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1713: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1715: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1716: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1717: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1719: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1720: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1721: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1722: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1723: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1724: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1725: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1726: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1727: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1728: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1729: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1730: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1731: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1732: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1733: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1734: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226145841Z nextupdate=20251226145841Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 14:58:41 2024 Next Update: Fri Dec 26 14:58:41 2025 CRL Extensions: chains.sh: #1735: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145841Z nextupdate=20251226145841Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:58:41 2024 Next Update: Fri Dec 26 14:58:41 2025 CRL Extensions: chains.sh: #1736: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226145842Z nextupdate=20251226145842Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 14:58:42 2024 Next Update: Fri Dec 26 14:58:42 2025 CRL Extensions: chains.sh: #1737: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226145842Z nextupdate=20251226145842Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 14:58:42 2024 Next Update: Fri Dec 26 14:58:42 2025 CRL Extensions: chains.sh: #1738: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226145843Z addcert 14 20241226145843Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 14:58:43 2024 Next Update: Fri Dec 26 14:58:42 2025 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Thu Dec 26 14:58:43 2024 CRL Extensions: chains.sh: #1739: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145844Z addcert 15 20241226145844Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:58:44 2024 Next Update: Fri Dec 26 14:58:41 2025 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Thu Dec 26 14:58:44 2024 CRL Extensions: chains.sh: #1740: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1741: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1742: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1743: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1744: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1745: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1746: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1747: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1748: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1749: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:36 2024 Not After : Wed Dec 26 14:58:36 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:92:1a:29:a6:80:a6:24:0a:d8:54:c1:3e:82:2d:94: 67:53:3e:0b:e8:d4:9f:1d:81:51:4e:23:da:d5:58:e9: 4c:0b:4d:20:a4:21:93:9e:b8:a1:07:10:ef:5a:7e:db: aa:ce:ba:78:c3:e8:89:e8:e7:7b:db:6d:da:d3:c1:0b: bb:7b:38:57:e1:6b:e4:d4:ec:9d:55:98:14:b4:cd:e6: a1:09:cd:f2:ca:b1:f1:8d:ee:61:fc:d8:82:d1:4c:d1: b7:8e:d1:ee:89:fb:de:01:f3:32:4e:aa:c8:de:b6:a1: 31:7f:6f:b3:5c:b4:31:3e:55:d0:f8:29:fd:2a:88:90: ee:8b:f8:d7:97:46:54:2d:46:18:3e:ea:63:36:05:7d: 15:58:d0:a9:07:b4:44:dd:e6:b6:4f:70:f5:31:f4:a5: 3d:2c:19:9f:ca:b0:c4:7c:51:6a:5f:f5:42:9e:fe:e7: 13:c4:d0:48:57:df:c4:5a:d0:d3:d1:de:63:d1:6e:21: e1:f3:da:7e:80:db:2a:62:dd:33:c3:00:c5:c2:58:c9: 0b:5b:23:36:34:39:29:94:f4:09:ef:4f:e2:a3:12:66: dd:bf:88:41:39:0b:2d:5e:64:c9:c8:88:5e:dc:24:87: 64:0a:bf:10:d0:e7:d0:73:49:5d:dd:47:ea:61:a4:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:4f:35:74:44:ac:30:90:5a:f9:9a:00:d0:e0:c0:dd: 94:b2:cf:0a:d5:97:93:db:9c:49:15:9b:04:e1:cb:78: 63:6f:ce:de:34:0d:6b:c1:de:50:bf:c7:0c:07:05:a9: cb:de:50:df:a7:43:57:35:72:9e:4d:e8:58:13:7d:1b: a1:78:b1:1f:b4:43:0f:b0:62:1e:0b:a6:35:d8:81:93: ca:68:32:ad:72:16:84:01:4b:b9:ce:4b:e5:d9:53:f8: da:7b:cb:ce:fc:ab:02:4e:52:8f:ff:2b:61:94:03:c5: c4:94:b8:04:76:ea:b4:10:b4:42:b8:68:1a:16:ef:38: 99:15:7a:8a:ad:cd:09:8a:3a:66:95:32:8d:74:99:a9: aa:dc:aa:de:40:c9:f9:af:34:16:1c:5a:2b:1f:a6:eb: d2:8c:39:d5:05:32:c1:78:3a:b2:80:07:9e:d2:f9:d0: 6c:15:31:e4:a2:d1:9a:23:99:64:d4:ef:69:38:2d:65: 28:02:0b:68:48:b1:ef:40:c2:05:b4:ed:98:62:e6:53: ef:aa:08:90:7d:53:06:26:8b:15:07:79:b0:6c:8a:83: 5e:21:ef:81:28:6a:95:ae:68:51:49:b2:08:80:c6:ea: 15:24:b7:73:ba:55:50:a5:ae:40:98:af:c6:ff:2a:97 Fingerprint (SHA-256): 3F:53:F8:8C:D1:B4:A6:51:21:FD:D3:D5:91:8D:B0:13:48:71:C2:4D:5F:01:F9:F6:A0:6F:F8:BA:32:8D:B0:C1 Fingerprint (SHA1): 7D:29:59:A1:87:BD:D3:9E:49:96:AD:7B:21:68:D1:23:A3:AC:2C:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1750: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1751: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:36 2024 Not After : Wed Dec 26 14:58:36 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:92:1a:29:a6:80:a6:24:0a:d8:54:c1:3e:82:2d:94: 67:53:3e:0b:e8:d4:9f:1d:81:51:4e:23:da:d5:58:e9: 4c:0b:4d:20:a4:21:93:9e:b8:a1:07:10:ef:5a:7e:db: aa:ce:ba:78:c3:e8:89:e8:e7:7b:db:6d:da:d3:c1:0b: bb:7b:38:57:e1:6b:e4:d4:ec:9d:55:98:14:b4:cd:e6: a1:09:cd:f2:ca:b1:f1:8d:ee:61:fc:d8:82:d1:4c:d1: b7:8e:d1:ee:89:fb:de:01:f3:32:4e:aa:c8:de:b6:a1: 31:7f:6f:b3:5c:b4:31:3e:55:d0:f8:29:fd:2a:88:90: ee:8b:f8:d7:97:46:54:2d:46:18:3e:ea:63:36:05:7d: 15:58:d0:a9:07:b4:44:dd:e6:b6:4f:70:f5:31:f4:a5: 3d:2c:19:9f:ca:b0:c4:7c:51:6a:5f:f5:42:9e:fe:e7: 13:c4:d0:48:57:df:c4:5a:d0:d3:d1:de:63:d1:6e:21: e1:f3:da:7e:80:db:2a:62:dd:33:c3:00:c5:c2:58:c9: 0b:5b:23:36:34:39:29:94:f4:09:ef:4f:e2:a3:12:66: dd:bf:88:41:39:0b:2d:5e:64:c9:c8:88:5e:dc:24:87: 64:0a:bf:10:d0:e7:d0:73:49:5d:dd:47:ea:61:a4:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:4f:35:74:44:ac:30:90:5a:f9:9a:00:d0:e0:c0:dd: 94:b2:cf:0a:d5:97:93:db:9c:49:15:9b:04:e1:cb:78: 63:6f:ce:de:34:0d:6b:c1:de:50:bf:c7:0c:07:05:a9: cb:de:50:df:a7:43:57:35:72:9e:4d:e8:58:13:7d:1b: a1:78:b1:1f:b4:43:0f:b0:62:1e:0b:a6:35:d8:81:93: ca:68:32:ad:72:16:84:01:4b:b9:ce:4b:e5:d9:53:f8: da:7b:cb:ce:fc:ab:02:4e:52:8f:ff:2b:61:94:03:c5: c4:94:b8:04:76:ea:b4:10:b4:42:b8:68:1a:16:ef:38: 99:15:7a:8a:ad:cd:09:8a:3a:66:95:32:8d:74:99:a9: aa:dc:aa:de:40:c9:f9:af:34:16:1c:5a:2b:1f:a6:eb: d2:8c:39:d5:05:32:c1:78:3a:b2:80:07:9e:d2:f9:d0: 6c:15:31:e4:a2:d1:9a:23:99:64:d4:ef:69:38:2d:65: 28:02:0b:68:48:b1:ef:40:c2:05:b4:ed:98:62:e6:53: ef:aa:08:90:7d:53:06:26:8b:15:07:79:b0:6c:8a:83: 5e:21:ef:81:28:6a:95:ae:68:51:49:b2:08:80:c6:ea: 15:24:b7:73:ba:55:50:a5:ae:40:98:af:c6:ff:2a:97 Fingerprint (SHA-256): 3F:53:F8:8C:D1:B4:A6:51:21:FD:D3:D5:91:8D:B0:13:48:71:C2:4D:5F:01:F9:F6:A0:6F:F8:BA:32:8D:B0:C1 Fingerprint (SHA1): 7D:29:59:A1:87:BD:D3:9E:49:96:AD:7B:21:68:D1:23:A3:AC:2C:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1752: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1753: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9535 -q -t 20 chains.sh: #1754: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1755: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1756: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #1757: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #1758: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145847Z nextupdate=20251226145847Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:58:47 2024 Next Update: Fri Dec 26 14:58:47 2025 CRL Extensions: chains.sh: #1759: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145848Z addcert 3 20241226145848Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:58:48 2024 Next Update: Fri Dec 26 14:58:47 2025 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 14:58:48 2024 CRL Extensions: chains.sh: #1760: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226145849Z addcert 4 20241226145849Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 14:58:49 2024 Next Update: Fri Dec 26 14:58:47 2025 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Thu Dec 26 14:58:49 2024 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 14:58:48 2024 CRL Extensions: chains.sh: #1761: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1762: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1763: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1764: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1765: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #1766: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1768: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #1769: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1770: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1771: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #1772: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #1773: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1774: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:32 2024 Not After : Wed Dec 26 14:53:32 2029 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:a6:8c:06:ff:d5:8b:08:1c:e3:3d:cb:6b:72:7a:a1: 0f:b9:a6:a1:84:8c:81:e3:50:0f:fa:92:0a:e1:18:33: 3d:59:b8:61:b5:a0:1e:55:31:f4:00:4e:9b:2c:d7:c3: 13:b9:52:94:3a:ce:79:f3:7c:43:86:d2:f8:68:5c:8f: 2b:47:24:5e:2b:35:4d:58:1c:30:79:a7:d6:e4:a3:e4: f4:a0:bb:92:89:c3:77:9c:2f:ff:7a:05:15:40:75:8e: fa:23:5f:20:28:5a:80:d7:37:52:41:c5:40:ff:94:24: e3:9d:24:91:62:1d:7a:8d:8f:c2:f0:99:5a:21:09:63: c8:89:c1:e3:6c:8d:30:bb:37:6b:57:09:b9:71:d2:e1: 7b:66:ab:ef:fa:83:3f:20:c9:35:a6:ac:57:37:aa:23: 73:1a:22:b6:5d:d4:07:8e:0e:2f:e6:a0:fe:92:d2:ea: 81:53:9a:fc:75:57:b6:9e:7e:ce:bb:59:53:89:9d:04: 24:f4:cb:c2:a1:e4:9e:ed:36:34:a8:32:3e:87:fa:ad: 6e:bb:9f:7c:95:77:2e:52:26:0d:73:a9:9b:98:ba:f2: e6:c9:88:fd:e5:26:ea:08:39:b4:57:a8:c6:f2:fa:46: f7:96:15:68:3e:3e:14:db:92:4c:96:e9:66:90:06:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9535/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:e8:2c:6b:8a:81:07:1d:1c:3e:7f:66:ec:57:a1:1b: c6:07:b4:66:e5:ca:2c:62:25:fe:a0:7c:11:05:06:d8: 08:56:50:08:af:2d:ad:54:e0:67:dd:72:67:37:dd:7a: f0:fc:f0:7d:24:1c:71:08:22:12:12:df:ba:ec:8d:44: 88:51:9c:25:d9:76:3c:81:98:a8:76:d3:bd:ea:ab:9f: 7b:e4:d1:bd:9c:e7:f6:34:02:27:b3:4c:0b:51:b2:38: 15:9e:d8:56:e1:c5:03:8f:6d:82:5b:e9:c0:17:39:76: 6b:1e:c2:2b:ac:ff:6d:39:e4:b5:1a:d1:99:3c:16:e1: be:40:d8:98:c6:e4:a6:10:ed:d1:95:f8:83:16:fe:83: 7b:9b:ac:34:d7:8d:46:18:a6:76:8c:53:f4:fd:e5:b2: 0b:1a:f4:4e:c4:3c:25:89:17:a4:22:05:c9:6c:83:dd: 09:2d:5f:22:64:95:fc:19:85:41:76:be:6f:78:ae:03: 21:3d:2f:ce:c1:09:13:b8:75:77:df:09:f3:8a:07:c2: b9:4f:04:cb:2a:74:e1:c6:1d:ba:ff:14:1c:42:10:94: 74:f9:4b:b9:fa:1c:72:b2:86:ff:61:2b:5c:14:be:5e: a8:f4:30:10:b7:23:6c:65:0e:09:cf:b6:f1:be:16:dd Fingerprint (SHA-256): 70:93:0C:46:0E:61:B9:C4:18:86:16:D0:04:74:5B:1D:0E:F9:A3:87:48:39:CA:5D:51:0B:76:98:06:28:64:DD Fingerprint (SHA1): 9D:E2:9E:AA:F5:38:27:30:35:12:D1:34:4D:E6:F4:2E:A8:66:E8:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #1775: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #1776: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1777: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1778: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #1779: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #1780: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #1781: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1782: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145613 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1783: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1784: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1785: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1786: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1226145614 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1787: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1788: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1789: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145372.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1790: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145343.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1791: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1792: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1793: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145372.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1794: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1226145615 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1795: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1796: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1797: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145372.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1798: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145344.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1799: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1800: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1801: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1802: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1226145616 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1803: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1804: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1805: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145372.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1806: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145345.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1807: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1808: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1809: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145372.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1810: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145346.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1811: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1812: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226145858Z nextupdate=20251226145858Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 14:58:58 2024 Next Update: Fri Dec 26 14:58:58 2025 CRL Extensions: chains.sh: #1813: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145858Z nextupdate=20251226145858Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:58:58 2024 Next Update: Fri Dec 26 14:58:58 2025 CRL Extensions: chains.sh: #1814: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226145859Z nextupdate=20251226145859Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 14:58:59 2024 Next Update: Fri Dec 26 14:58:59 2025 CRL Extensions: chains.sh: #1815: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226145859Z nextupdate=20251226145859Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 14:58:59 2024 Next Update: Fri Dec 26 14:58:59 2025 CRL Extensions: chains.sh: #1816: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145900Z addcert 20 20241226145900Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:59:00 2024 Next Update: Fri Dec 26 14:58:58 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 14:59:00 2024 CRL Extensions: chains.sh: #1817: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226145901Z addcert 40 20241226145901Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 14:59:01 2024 Next Update: Fri Dec 26 14:58:58 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 14:59:00 2024 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Thu Dec 26 14:59:01 2024 CRL Extensions: chains.sh: #1818: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1819: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1820: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1821: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145613 (0x49157f4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:52 2024 Not After : Wed Dec 26 14:58:52 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a9:23:a2:98:99:85:f3:21:96:ce:5e:d1:df:b3:88: 32:60:6b:11:ff:70:f3:81:43:26:2a:8b:c0:18:7e:18: 28:90:2b:6a:fc:1e:29:5e:fc:c2:d6:d1:2c:21:78:b7: c1:1e:04:0d:6c:63:71:16:21:66:0c:ec:c5:0c:49:b0: 1d:60:1d:38:b4:1e:bd:cc:df:94:7f:60:e9:f0:9a:f5: d5:32:8d:cf:1c:95:cd:7b:3b:80:67:3a:e4:d7:e3:d8: 2f:36:3b:8b:62:16:30:d1:b1:80:cf:c6:2c:ed:68:07: 98:f6:81:09:81:03:05:61:e4:3e:4c:fb:2d:79:83:e6: 5b:64:01:31:28:54:82:29:d7:5e:3b:24:a8:de:c7:03: fe:c8:90:d8:bc:05:73:6f:97:e7:27:e5:9e:87:99:a5: 55:19:2f:bb:68:b4:27:65:1f:84:fb:06:7d:53:f3:61: 55:08:9e:4b:1c:c8:b8:29:ca:80:30:e1:0b:fb:bc:2f: 27:71:32:9a:71:6a:d3:7a:81:ee:69:13:44:89:63:f0: 24:8d:a9:e3:bc:92:c1:f4:99:54:22:25:a8:ff:a2:ae: 86:c1:40:c8:a4:8b:f2:68:e7:92:4c:c1:61:a4:9a:dc: f3:94:03:ca:0c:9e:01:c2:73:7f:fe:d5:a9:3b:11:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:6c:7b:89:c9:ed:df:3a:a9:f7:61:5d:a6:d1:a9:85: 6e:63:45:73:bf:a3:b2:1f:08:93:3b:fa:68:ee:3b:ef: d0:23:1a:40:62:40:cf:24:2a:0f:ba:78:7a:7d:54:5b: d4:70:5c:21:e7:00:f8:95:23:1d:65:d2:e7:80:34:e6: 7f:b6:41:f0:ba:b1:8e:73:55:d1:04:62:8a:96:dc:d4: 1c:c8:06:64:f7:22:53:24:de:f2:e7:40:bc:77:44:15: 90:11:46:83:46:28:52:6d:72:c7:03:99:71:9d:79:a8: d7:8a:27:a3:9d:86:c9:bc:9d:ef:a0:b9:6e:17:ed:d2: 64:70:6d:aa:e7:1a:4d:f0:87:2d:d6:dc:b7:87:af:c5: 9b:3b:fb:d9:d2:85:8c:43:af:2e:56:5f:63:e1:68:86: 5b:44:35:89:96:27:64:e6:32:e8:5e:fe:b0:3c:ac:1c: a8:b4:1a:83:3f:3e:0d:ef:c8:9e:d3:47:77:51:38:0d: 96:11:84:65:05:6b:f1:25:65:7f:60:67:13:dc:d8:41: 0d:55:26:18:2a:b8:b9:df:a1:43:17:00:9b:35:e3:fa: d4:07:14:21:78:5d:5d:b1:c9:e8:4b:2e:f1:21:55:bf: 8e:d0:cd:52:9b:a6:a1:f7:90:72:7a:4a:5b:93:34:1c Fingerprint (SHA-256): 3A:42:C8:D6:2D:55:41:64:F7:9C:87:8E:6D:ED:00:5A:39:9E:AB:08:C9:F7:AA:22:4F:F2:C3:22:D1:DA:71:B1 Fingerprint (SHA1): 11:A9:16:ED:77:CC:9D:35:FB:9A:8B:77:F5:0A:39:FE:16:55:BB:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1822: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1823: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145613 (0x49157f4d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:58:52 2024 Not After : Wed Dec 26 14:58:52 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:a9:23:a2:98:99:85:f3:21:96:ce:5e:d1:df:b3:88: 32:60:6b:11:ff:70:f3:81:43:26:2a:8b:c0:18:7e:18: 28:90:2b:6a:fc:1e:29:5e:fc:c2:d6:d1:2c:21:78:b7: c1:1e:04:0d:6c:63:71:16:21:66:0c:ec:c5:0c:49:b0: 1d:60:1d:38:b4:1e:bd:cc:df:94:7f:60:e9:f0:9a:f5: d5:32:8d:cf:1c:95:cd:7b:3b:80:67:3a:e4:d7:e3:d8: 2f:36:3b:8b:62:16:30:d1:b1:80:cf:c6:2c:ed:68:07: 98:f6:81:09:81:03:05:61:e4:3e:4c:fb:2d:79:83:e6: 5b:64:01:31:28:54:82:29:d7:5e:3b:24:a8:de:c7:03: fe:c8:90:d8:bc:05:73:6f:97:e7:27:e5:9e:87:99:a5: 55:19:2f:bb:68:b4:27:65:1f:84:fb:06:7d:53:f3:61: 55:08:9e:4b:1c:c8:b8:29:ca:80:30:e1:0b:fb:bc:2f: 27:71:32:9a:71:6a:d3:7a:81:ee:69:13:44:89:63:f0: 24:8d:a9:e3:bc:92:c1:f4:99:54:22:25:a8:ff:a2:ae: 86:c1:40:c8:a4:8b:f2:68:e7:92:4c:c1:61:a4:9a:dc: f3:94:03:ca:0c:9e:01:c2:73:7f:fe:d5:a9:3b:11:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:6c:7b:89:c9:ed:df:3a:a9:f7:61:5d:a6:d1:a9:85: 6e:63:45:73:bf:a3:b2:1f:08:93:3b:fa:68:ee:3b:ef: d0:23:1a:40:62:40:cf:24:2a:0f:ba:78:7a:7d:54:5b: d4:70:5c:21:e7:00:f8:95:23:1d:65:d2:e7:80:34:e6: 7f:b6:41:f0:ba:b1:8e:73:55:d1:04:62:8a:96:dc:d4: 1c:c8:06:64:f7:22:53:24:de:f2:e7:40:bc:77:44:15: 90:11:46:83:46:28:52:6d:72:c7:03:99:71:9d:79:a8: d7:8a:27:a3:9d:86:c9:bc:9d:ef:a0:b9:6e:17:ed:d2: 64:70:6d:aa:e7:1a:4d:f0:87:2d:d6:dc:b7:87:af:c5: 9b:3b:fb:d9:d2:85:8c:43:af:2e:56:5f:63:e1:68:86: 5b:44:35:89:96:27:64:e6:32:e8:5e:fe:b0:3c:ac:1c: a8:b4:1a:83:3f:3e:0d:ef:c8:9e:d3:47:77:51:38:0d: 96:11:84:65:05:6b:f1:25:65:7f:60:67:13:dc:d8:41: 0d:55:26:18:2a:b8:b9:df:a1:43:17:00:9b:35:e3:fa: d4:07:14:21:78:5d:5d:b1:c9:e8:4b:2e:f1:21:55:bf: 8e:d0:cd:52:9b:a6:a1:f7:90:72:7a:4a:5b:93:34:1c Fingerprint (SHA-256): 3A:42:C8:D6:2D:55:41:64:F7:9C:87:8E:6D:ED:00:5A:39:9E:AB:08:C9:F7:AA:22:4F:F2:C3:22:D1:DA:71:B1 Fingerprint (SHA1): 11:A9:16:ED:77:CC:9D:35:FB:9A:8B:77:F5:0A:39:FE:16:55:BB:2E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1824: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1825: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1826: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145617 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1827: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1828: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1829: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1830: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145618 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1831: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1832: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1833: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1834: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145619 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1835: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1836: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1837: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1838: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1226145620 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1839: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1840: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1841: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145621 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1842: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1843: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1844: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1845: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1226145622 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1846: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1847: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1848: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1849: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1226145623 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1850: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1851: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1852: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1853: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1854: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145617 (0x49157f51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:03 2024 Not After : Wed Dec 26 14:59:03 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:59:13:f1:0b:a4:1b:43:86:38:dd:19:7a:3f:47:91: b8:e2:23:46:83:fd:f0:d0:99:b9:e8:17:6a:23:e7:f0: d2:40:37:a3:1f:26:d3:93:6d:89:03:07:fa:2d:f8:28: 6d:56:07:de:1d:03:4b:88:80:52:0a:ad:61:c9:7c:e3: 46:1e:84:f5:bc:f7:11:4b:92:0b:f3:ec:78:ef:d6:f6: 0f:18:cc:69:67:69:9f:92:44:62:82:00:68:09:87:18: 0d:cf:58:fb:0d:02:30:fa:70:7d:01:4d:26:87:84:9e: e5:84:18:ef:83:15:d3:58:dc:99:a2:dd:9e:67:e4:a4: 78:9d:22:50:d5:e2:6c:ec:9b:cc:b4:ae:24:0d:51:1c: 32:41:43:c5:f3:70:53:5b:db:e7:44:23:b2:9d:44:9e: 0d:d0:5a:00:49:39:0f:9e:17:6d:8a:83:15:75:68:ad: a0:14:d0:0d:87:5a:13:6f:fe:4f:67:f4:e7:35:19:9e: ab:95:8b:a3:5c:90:88:8f:18:44:e6:a5:7f:28:c6:9f: c1:65:3c:87:06:a4:d6:9d:23:2e:04:1f:f0:d4:5b:4b: 55:cb:26:f9:69:ac:93:37:26:ff:57:7a:1d:11:28:26: da:b9:c3:bf:7e:b2:45:5e:c8:57:d4:6c:6f:66:b4:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:91:ca:41:e0:4e:82:8a:cd:e7:6e:91:a6:9b:73:59: c9:e4:ae:07:68:af:0b:c6:18:92:93:5c:10:05:92:66: 73:b9:97:5c:fd:00:15:c3:3f:cd:2e:85:81:b8:db:3f: 32:61:98:f4:0b:6b:38:03:44:fe:f3:90:6f:f8:da:cf: 16:02:91:6d:77:ee:6f:e5:72:a2:12:6b:12:cc:4b:66: a4:18:43:e9:2f:9d:9d:73:2d:60:81:61:d3:9f:d4:7b: 0f:9e:18:61:92:3a:ec:a1:e7:79:fb:d7:6f:dd:2e:c6: 0f:21:11:da:03:a9:09:ff:b4:67:6a:c6:ca:e0:82:c7: 84:7d:16:f2:8a:82:40:1b:62:9e:f8:98:62:af:81:cb: 3f:d3:d7:4b:bf:98:aa:ef:45:48:7d:ac:bc:47:d7:8c: 8e:56:b2:47:bf:d7:fb:7c:f9:d5:1b:b3:fa:a8:6a:c0: 8d:f2:4f:2d:d4:16:fb:8f:68:7f:56:f4:fc:e0:ee:9a: 89:3e:d4:1f:29:6b:44:d1:7d:28:8d:59:f3:0e:cd:4e: e5:48:49:e9:86:2e:7c:63:95:a2:27:9e:c9:f6:db:87: 47:27:32:fd:7b:cb:43:3a:3b:7f:01:79:50:32:db:f8: 16:36:14:c7:ac:de:12:e5:a5:41:5a:0c:23:a2:a8:58 Fingerprint (SHA-256): 71:3D:49:2D:C5:D2:A9:43:AB:80:35:14:54:BA:90:7D:F7:BE:D3:2F:11:CC:97:D1:57:C3:C2:B0:9E:FF:62:16 Fingerprint (SHA1): 36:FD:78:B7:37:F7:8D:9B:44:14:1F:0E:BB:48:04:9F:07:39:ED:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1855: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145619 (0x49157f53) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:05 2024 Not After : Wed Dec 26 14:59:05 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:3e:c5:d7:b8:e8:ff:d2:c7:c3:7b:c4:e4:ce:7b:b6: ad:03:99:9c:84:e5:34:6d:0e:99:9e:80:58:86:a4:29: a1:a7:11:54:db:2b:f2:76:45:9d:e3:6c:ba:8a:63:c1: af:f2:c2:0a:e3:1b:46:1e:90:fe:d5:ec:8c:7d:40:e0: 70:3a:7c:e1:66:a8:31:74:11:73:ce:6c:43:cd:80:26: 1f:05:73:fb:f9:93:1b:67:0f:d9:9c:0c:ec:b3:6f:0b: 3f:e6:ea:81:43:52:0a:6e:01:48:6e:64:21:78:32:a7: 75:63:6a:65:e8:1e:be:2b:18:2f:a8:20:99:53:5e:84: 01:52:58:c0:79:49:f2:e4:ee:51:72:b1:0b:95:7f:ea: fc:7b:d2:4d:f3:64:61:bb:5c:df:7b:74:33:eb:e7:a4: 1c:56:4c:71:cb:63:25:9f:a8:81:74:30:3e:87:f8:eb: a1:18:48:ab:2a:d2:dc:14:14:e1:a9:dc:63:b5:26:7a: ef:42:d8:be:85:4b:eb:7c:fe:65:d2:78:75:23:63:b8: 94:d3:00:ab:73:70:ec:32:cf:a2:3c:cf:74:dd:aa:dc: 24:6e:21:54:9c:6c:6a:dc:d1:99:58:2e:20:10:77:b3: 96:f4:cf:59:dd:49:24:ad:b9:4e:ad:8e:b7:f6:2b:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:58:5c:ee:33:59:24:3b:2c:56:06:ad:7e:b9:e1:4f: 05:fa:fc:29:63:75:58:2a:f6:d8:af:3e:96:79:51:8f: c6:12:be:a5:51:4c:51:7c:13:87:c4:1f:ca:e7:b6:c7: 89:eb:7d:a2:74:da:39:87:59:94:e3:da:92:7d:13:fb: 42:62:96:e8:01:60:31:b9:df:3a:c7:f5:a4:ee:48:97: 72:b4:cd:10:8f:fb:2b:4d:eb:f1:be:cb:7c:4d:e6:d5: bf:d7:b9:2b:a0:60:c5:84:1b:49:e3:d8:8d:af:f3:1e: c1:48:0b:54:d0:ee:bf:26:27:04:3e:fa:8e:0a:56:4d: e9:88:a4:86:3e:f3:72:42:f3:38:45:5b:82:7a:1a:84: 23:8f:bb:79:4d:2a:5d:76:fa:46:e8:f2:2f:5d:df:6d: 04:07:2d:52:b0:1c:86:d4:0b:fa:c2:77:4e:f7:b0:b3: 62:8f:9c:ca:c4:f2:90:ca:ea:cd:81:65:21:6b:ae:78: 1c:f6:17:ef:d4:48:b5:41:e4:65:92:8a:38:3a:53:89: 6b:e8:15:18:ad:83:3e:32:a5:fa:b2:25:09:e8:a9:46: f9:1f:ed:fa:c6:da:81:06:d6:6e:6c:ed:c0:64:95:2b: 0d:1d:f3:93:4a:3d:d9:dd:e3:51:fa:ef:97:f4:d0:7d Fingerprint (SHA-256): 32:8C:02:EB:A8:03:02:B2:D9:2A:5B:A8:3C:19:74:1F:65:5B:C3:2F:27:97:D4:38:41:D4:7A:05:6C:BD:5D:4C Fingerprint (SHA1): E1:DA:BE:12:8C:EB:D8:E6:D8:62:E6:2B:9F:6A:EF:6F:6D:A8:63:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1856: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145617 (0x49157f51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:03 2024 Not After : Wed Dec 26 14:59:03 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:59:13:f1:0b:a4:1b:43:86:38:dd:19:7a:3f:47:91: b8:e2:23:46:83:fd:f0:d0:99:b9:e8:17:6a:23:e7:f0: d2:40:37:a3:1f:26:d3:93:6d:89:03:07:fa:2d:f8:28: 6d:56:07:de:1d:03:4b:88:80:52:0a:ad:61:c9:7c:e3: 46:1e:84:f5:bc:f7:11:4b:92:0b:f3:ec:78:ef:d6:f6: 0f:18:cc:69:67:69:9f:92:44:62:82:00:68:09:87:18: 0d:cf:58:fb:0d:02:30:fa:70:7d:01:4d:26:87:84:9e: e5:84:18:ef:83:15:d3:58:dc:99:a2:dd:9e:67:e4:a4: 78:9d:22:50:d5:e2:6c:ec:9b:cc:b4:ae:24:0d:51:1c: 32:41:43:c5:f3:70:53:5b:db:e7:44:23:b2:9d:44:9e: 0d:d0:5a:00:49:39:0f:9e:17:6d:8a:83:15:75:68:ad: a0:14:d0:0d:87:5a:13:6f:fe:4f:67:f4:e7:35:19:9e: ab:95:8b:a3:5c:90:88:8f:18:44:e6:a5:7f:28:c6:9f: c1:65:3c:87:06:a4:d6:9d:23:2e:04:1f:f0:d4:5b:4b: 55:cb:26:f9:69:ac:93:37:26:ff:57:7a:1d:11:28:26: da:b9:c3:bf:7e:b2:45:5e:c8:57:d4:6c:6f:66:b4:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:91:ca:41:e0:4e:82:8a:cd:e7:6e:91:a6:9b:73:59: c9:e4:ae:07:68:af:0b:c6:18:92:93:5c:10:05:92:66: 73:b9:97:5c:fd:00:15:c3:3f:cd:2e:85:81:b8:db:3f: 32:61:98:f4:0b:6b:38:03:44:fe:f3:90:6f:f8:da:cf: 16:02:91:6d:77:ee:6f:e5:72:a2:12:6b:12:cc:4b:66: a4:18:43:e9:2f:9d:9d:73:2d:60:81:61:d3:9f:d4:7b: 0f:9e:18:61:92:3a:ec:a1:e7:79:fb:d7:6f:dd:2e:c6: 0f:21:11:da:03:a9:09:ff:b4:67:6a:c6:ca:e0:82:c7: 84:7d:16:f2:8a:82:40:1b:62:9e:f8:98:62:af:81:cb: 3f:d3:d7:4b:bf:98:aa:ef:45:48:7d:ac:bc:47:d7:8c: 8e:56:b2:47:bf:d7:fb:7c:f9:d5:1b:b3:fa:a8:6a:c0: 8d:f2:4f:2d:d4:16:fb:8f:68:7f:56:f4:fc:e0:ee:9a: 89:3e:d4:1f:29:6b:44:d1:7d:28:8d:59:f3:0e:cd:4e: e5:48:49:e9:86:2e:7c:63:95:a2:27:9e:c9:f6:db:87: 47:27:32:fd:7b:cb:43:3a:3b:7f:01:79:50:32:db:f8: 16:36:14:c7:ac:de:12:e5:a5:41:5a:0c:23:a2:a8:58 Fingerprint (SHA-256): 71:3D:49:2D:C5:D2:A9:43:AB:80:35:14:54:BA:90:7D:F7:BE:D3:2F:11:CC:97:D1:57:C3:C2:B0:9E:FF:62:16 Fingerprint (SHA1): 36:FD:78:B7:37:F7:8D:9B:44:14:1F:0E:BB:48:04:9F:07:39:ED:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1857: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1858: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145617 (0x49157f51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:03 2024 Not After : Wed Dec 26 14:59:03 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:59:13:f1:0b:a4:1b:43:86:38:dd:19:7a:3f:47:91: b8:e2:23:46:83:fd:f0:d0:99:b9:e8:17:6a:23:e7:f0: d2:40:37:a3:1f:26:d3:93:6d:89:03:07:fa:2d:f8:28: 6d:56:07:de:1d:03:4b:88:80:52:0a:ad:61:c9:7c:e3: 46:1e:84:f5:bc:f7:11:4b:92:0b:f3:ec:78:ef:d6:f6: 0f:18:cc:69:67:69:9f:92:44:62:82:00:68:09:87:18: 0d:cf:58:fb:0d:02:30:fa:70:7d:01:4d:26:87:84:9e: e5:84:18:ef:83:15:d3:58:dc:99:a2:dd:9e:67:e4:a4: 78:9d:22:50:d5:e2:6c:ec:9b:cc:b4:ae:24:0d:51:1c: 32:41:43:c5:f3:70:53:5b:db:e7:44:23:b2:9d:44:9e: 0d:d0:5a:00:49:39:0f:9e:17:6d:8a:83:15:75:68:ad: a0:14:d0:0d:87:5a:13:6f:fe:4f:67:f4:e7:35:19:9e: ab:95:8b:a3:5c:90:88:8f:18:44:e6:a5:7f:28:c6:9f: c1:65:3c:87:06:a4:d6:9d:23:2e:04:1f:f0:d4:5b:4b: 55:cb:26:f9:69:ac:93:37:26:ff:57:7a:1d:11:28:26: da:b9:c3:bf:7e:b2:45:5e:c8:57:d4:6c:6f:66:b4:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:91:ca:41:e0:4e:82:8a:cd:e7:6e:91:a6:9b:73:59: c9:e4:ae:07:68:af:0b:c6:18:92:93:5c:10:05:92:66: 73:b9:97:5c:fd:00:15:c3:3f:cd:2e:85:81:b8:db:3f: 32:61:98:f4:0b:6b:38:03:44:fe:f3:90:6f:f8:da:cf: 16:02:91:6d:77:ee:6f:e5:72:a2:12:6b:12:cc:4b:66: a4:18:43:e9:2f:9d:9d:73:2d:60:81:61:d3:9f:d4:7b: 0f:9e:18:61:92:3a:ec:a1:e7:79:fb:d7:6f:dd:2e:c6: 0f:21:11:da:03:a9:09:ff:b4:67:6a:c6:ca:e0:82:c7: 84:7d:16:f2:8a:82:40:1b:62:9e:f8:98:62:af:81:cb: 3f:d3:d7:4b:bf:98:aa:ef:45:48:7d:ac:bc:47:d7:8c: 8e:56:b2:47:bf:d7:fb:7c:f9:d5:1b:b3:fa:a8:6a:c0: 8d:f2:4f:2d:d4:16:fb:8f:68:7f:56:f4:fc:e0:ee:9a: 89:3e:d4:1f:29:6b:44:d1:7d:28:8d:59:f3:0e:cd:4e: e5:48:49:e9:86:2e:7c:63:95:a2:27:9e:c9:f6:db:87: 47:27:32:fd:7b:cb:43:3a:3b:7f:01:79:50:32:db:f8: 16:36:14:c7:ac:de:12:e5:a5:41:5a:0c:23:a2:a8:58 Fingerprint (SHA-256): 71:3D:49:2D:C5:D2:A9:43:AB:80:35:14:54:BA:90:7D:F7:BE:D3:2F:11:CC:97:D1:57:C3:C2:B0:9E:FF:62:16 Fingerprint (SHA1): 36:FD:78:B7:37:F7:8D:9B:44:14:1F:0E:BB:48:04:9F:07:39:ED:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1859: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145619 (0x49157f53) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:05 2024 Not After : Wed Dec 26 14:59:05 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:3e:c5:d7:b8:e8:ff:d2:c7:c3:7b:c4:e4:ce:7b:b6: ad:03:99:9c:84:e5:34:6d:0e:99:9e:80:58:86:a4:29: a1:a7:11:54:db:2b:f2:76:45:9d:e3:6c:ba:8a:63:c1: af:f2:c2:0a:e3:1b:46:1e:90:fe:d5:ec:8c:7d:40:e0: 70:3a:7c:e1:66:a8:31:74:11:73:ce:6c:43:cd:80:26: 1f:05:73:fb:f9:93:1b:67:0f:d9:9c:0c:ec:b3:6f:0b: 3f:e6:ea:81:43:52:0a:6e:01:48:6e:64:21:78:32:a7: 75:63:6a:65:e8:1e:be:2b:18:2f:a8:20:99:53:5e:84: 01:52:58:c0:79:49:f2:e4:ee:51:72:b1:0b:95:7f:ea: fc:7b:d2:4d:f3:64:61:bb:5c:df:7b:74:33:eb:e7:a4: 1c:56:4c:71:cb:63:25:9f:a8:81:74:30:3e:87:f8:eb: a1:18:48:ab:2a:d2:dc:14:14:e1:a9:dc:63:b5:26:7a: ef:42:d8:be:85:4b:eb:7c:fe:65:d2:78:75:23:63:b8: 94:d3:00:ab:73:70:ec:32:cf:a2:3c:cf:74:dd:aa:dc: 24:6e:21:54:9c:6c:6a:dc:d1:99:58:2e:20:10:77:b3: 96:f4:cf:59:dd:49:24:ad:b9:4e:ad:8e:b7:f6:2b:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a9:58:5c:ee:33:59:24:3b:2c:56:06:ad:7e:b9:e1:4f: 05:fa:fc:29:63:75:58:2a:f6:d8:af:3e:96:79:51:8f: c6:12:be:a5:51:4c:51:7c:13:87:c4:1f:ca:e7:b6:c7: 89:eb:7d:a2:74:da:39:87:59:94:e3:da:92:7d:13:fb: 42:62:96:e8:01:60:31:b9:df:3a:c7:f5:a4:ee:48:97: 72:b4:cd:10:8f:fb:2b:4d:eb:f1:be:cb:7c:4d:e6:d5: bf:d7:b9:2b:a0:60:c5:84:1b:49:e3:d8:8d:af:f3:1e: c1:48:0b:54:d0:ee:bf:26:27:04:3e:fa:8e:0a:56:4d: e9:88:a4:86:3e:f3:72:42:f3:38:45:5b:82:7a:1a:84: 23:8f:bb:79:4d:2a:5d:76:fa:46:e8:f2:2f:5d:df:6d: 04:07:2d:52:b0:1c:86:d4:0b:fa:c2:77:4e:f7:b0:b3: 62:8f:9c:ca:c4:f2:90:ca:ea:cd:81:65:21:6b:ae:78: 1c:f6:17:ef:d4:48:b5:41:e4:65:92:8a:38:3a:53:89: 6b:e8:15:18:ad:83:3e:32:a5:fa:b2:25:09:e8:a9:46: f9:1f:ed:fa:c6:da:81:06:d6:6e:6c:ed:c0:64:95:2b: 0d:1d:f3:93:4a:3d:d9:dd:e3:51:fa:ef:97:f4:d0:7d Fingerprint (SHA-256): 32:8C:02:EB:A8:03:02:B2:D9:2A:5B:A8:3C:19:74:1F:65:5B:C3:2F:27:97:D4:38:41:D4:7A:05:6C:BD:5D:4C Fingerprint (SHA1): E1:DA:BE:12:8C:EB:D8:E6:D8:62:E6:2B:9F:6A:EF:6F:6D:A8:63:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1860: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1861: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1862: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1863: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145617 (0x49157f51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:03 2024 Not After : Wed Dec 26 14:59:03 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:59:13:f1:0b:a4:1b:43:86:38:dd:19:7a:3f:47:91: b8:e2:23:46:83:fd:f0:d0:99:b9:e8:17:6a:23:e7:f0: d2:40:37:a3:1f:26:d3:93:6d:89:03:07:fa:2d:f8:28: 6d:56:07:de:1d:03:4b:88:80:52:0a:ad:61:c9:7c:e3: 46:1e:84:f5:bc:f7:11:4b:92:0b:f3:ec:78:ef:d6:f6: 0f:18:cc:69:67:69:9f:92:44:62:82:00:68:09:87:18: 0d:cf:58:fb:0d:02:30:fa:70:7d:01:4d:26:87:84:9e: e5:84:18:ef:83:15:d3:58:dc:99:a2:dd:9e:67:e4:a4: 78:9d:22:50:d5:e2:6c:ec:9b:cc:b4:ae:24:0d:51:1c: 32:41:43:c5:f3:70:53:5b:db:e7:44:23:b2:9d:44:9e: 0d:d0:5a:00:49:39:0f:9e:17:6d:8a:83:15:75:68:ad: a0:14:d0:0d:87:5a:13:6f:fe:4f:67:f4:e7:35:19:9e: ab:95:8b:a3:5c:90:88:8f:18:44:e6:a5:7f:28:c6:9f: c1:65:3c:87:06:a4:d6:9d:23:2e:04:1f:f0:d4:5b:4b: 55:cb:26:f9:69:ac:93:37:26:ff:57:7a:1d:11:28:26: da:b9:c3:bf:7e:b2:45:5e:c8:57:d4:6c:6f:66:b4:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:91:ca:41:e0:4e:82:8a:cd:e7:6e:91:a6:9b:73:59: c9:e4:ae:07:68:af:0b:c6:18:92:93:5c:10:05:92:66: 73:b9:97:5c:fd:00:15:c3:3f:cd:2e:85:81:b8:db:3f: 32:61:98:f4:0b:6b:38:03:44:fe:f3:90:6f:f8:da:cf: 16:02:91:6d:77:ee:6f:e5:72:a2:12:6b:12:cc:4b:66: a4:18:43:e9:2f:9d:9d:73:2d:60:81:61:d3:9f:d4:7b: 0f:9e:18:61:92:3a:ec:a1:e7:79:fb:d7:6f:dd:2e:c6: 0f:21:11:da:03:a9:09:ff:b4:67:6a:c6:ca:e0:82:c7: 84:7d:16:f2:8a:82:40:1b:62:9e:f8:98:62:af:81:cb: 3f:d3:d7:4b:bf:98:aa:ef:45:48:7d:ac:bc:47:d7:8c: 8e:56:b2:47:bf:d7:fb:7c:f9:d5:1b:b3:fa:a8:6a:c0: 8d:f2:4f:2d:d4:16:fb:8f:68:7f:56:f4:fc:e0:ee:9a: 89:3e:d4:1f:29:6b:44:d1:7d:28:8d:59:f3:0e:cd:4e: e5:48:49:e9:86:2e:7c:63:95:a2:27:9e:c9:f6:db:87: 47:27:32:fd:7b:cb:43:3a:3b:7f:01:79:50:32:db:f8: 16:36:14:c7:ac:de:12:e5:a5:41:5a:0c:23:a2:a8:58 Fingerprint (SHA-256): 71:3D:49:2D:C5:D2:A9:43:AB:80:35:14:54:BA:90:7D:F7:BE:D3:2F:11:CC:97:D1:57:C3:C2:B0:9E:FF:62:16 Fingerprint (SHA1): 36:FD:78:B7:37:F7:8D:9B:44:14:1F:0E:BB:48:04:9F:07:39:ED:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1864: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145621 (0x49157f55) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 14:59:06 2024 Not After : Wed Dec 26 14:59:06 2074 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:c0:16:36:61:7a:95:bf:46:3c:da:00:73:09:7a:8f: 6e:b4:72:a5:2f:6a:98:6f:dc:41:2e:8b:48:98:9b:43: b2:cf:67:9b:53:d4:50:01:f4:b2:5b:6d:63:75:68:da: 3b:59:27:48:6b:aa:0d:c1:73:0c:6b:6b:89:47:c4:7d: 2a:32:d4:3a:d6:52:58:f8:9b:c2:b1:26:8b:77:27:37: 87:1d:c7:37:e1:36:14:28:80:d3:d3:cf:1e:a2:c4:1f: 35:0e:db:9e:08:99:d7:a4:82:c7:3d:f0:71:b3:0b:27: f6:f4:c3:8c:b2:b0:e9:cc:8c:e6:b8:49:8b:78:81:5e: 07:d8:08:41:96:f7:07:1a:95:9b:74:8b:7c:45:c6:cb: af:75:d6:60:53:00:67:71:ba:89:68:30:9c:6f:bf:5a: e3:75:3a:72:0b:e4:a2:fe:81:27:44:8e:49:a7:ac:58: 05:b0:bd:b3:8b:d5:2f:8d:7b:a9:1a:36:9c:49:e2:6a: 49:89:b6:92:eb:6b:59:8a:23:60:a5:14:08:7e:2b:80: 79:fb:82:d4:5a:9a:0f:7c:20:4f:3e:2a:40:c1:28:78: c9:79:6a:01:71:0d:6b:ea:e5:65:cc:32:a8:a3:a3:6f: a3:38:5e:6d:5c:b1:e4:ff:9b:e0:94:63:87:e6:fa:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:fe:54:87:bd:a8:07:dd:a2:3c:91:3d:a5:96:55:5e: 0d:f8:4f:25:b0:35:44:e7:26:9f:07:47:7a:4e:70:ea: 84:5a:52:bf:ef:82:18:cb:e1:7a:5a:fe:19:75:af:de: 63:42:cf:a0:89:0c:f7:d8:2a:fc:60:c5:51:a0:9d:c9: 04:9f:22:49:16:8a:a5:e8:08:59:a7:59:e6:fe:27:43: 89:59:7f:fa:3f:91:ab:1b:1e:cf:79:87:9d:40:7e:35: 35:57:da:d2:6e:63:f5:91:10:8b:c8:68:16:84:1e:06: 73:5d:4b:50:3b:82:65:56:cd:c5:6d:82:a3:5f:90:f8: ea:fd:79:5a:10:f2:3a:d2:ab:50:d3:0f:83:73:4d:a7: af:65:9d:3f:17:d9:87:61:6a:8f:a3:e1:c1:81:7b:81: b0:1b:7e:03:a9:3b:f8:f2:38:dd:29:a3:72:81:36:8c: 08:90:17:51:15:8e:a9:34:6b:8a:1b:e0:71:ec:72:cc: 86:ca:2e:ae:51:2f:fb:52:e4:e2:14:e7:63:58:02:75: 3b:01:96:df:f3:52:6a:d4:c1:b6:f5:cf:94:e0:f4:47: 77:85:34:25:99:17:3a:7c:89:e2:94:6f:ee:7a:ba:5f: 73:ba:61:e4:94:c8:77:60:c2:61:66:89:52:43:46:eb Fingerprint (SHA-256): BB:A4:32:20:92:37:A9:E8:34:9F:19:92:44:78:06:C0:05:6A:26:95:AE:75:96:04:C1:C5:C2:BF:63:F5:53:A9 Fingerprint (SHA1): B5:A5:04:DF:5E:ED:85:29:D7:3C:08:32:3D:31:14:CE:FA:86:A8:EE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1865: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145617 (0x49157f51) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:03 2024 Not After : Wed Dec 26 14:59:03 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:59:13:f1:0b:a4:1b:43:86:38:dd:19:7a:3f:47:91: b8:e2:23:46:83:fd:f0:d0:99:b9:e8:17:6a:23:e7:f0: d2:40:37:a3:1f:26:d3:93:6d:89:03:07:fa:2d:f8:28: 6d:56:07:de:1d:03:4b:88:80:52:0a:ad:61:c9:7c:e3: 46:1e:84:f5:bc:f7:11:4b:92:0b:f3:ec:78:ef:d6:f6: 0f:18:cc:69:67:69:9f:92:44:62:82:00:68:09:87:18: 0d:cf:58:fb:0d:02:30:fa:70:7d:01:4d:26:87:84:9e: e5:84:18:ef:83:15:d3:58:dc:99:a2:dd:9e:67:e4:a4: 78:9d:22:50:d5:e2:6c:ec:9b:cc:b4:ae:24:0d:51:1c: 32:41:43:c5:f3:70:53:5b:db:e7:44:23:b2:9d:44:9e: 0d:d0:5a:00:49:39:0f:9e:17:6d:8a:83:15:75:68:ad: a0:14:d0:0d:87:5a:13:6f:fe:4f:67:f4:e7:35:19:9e: ab:95:8b:a3:5c:90:88:8f:18:44:e6:a5:7f:28:c6:9f: c1:65:3c:87:06:a4:d6:9d:23:2e:04:1f:f0:d4:5b:4b: 55:cb:26:f9:69:ac:93:37:26:ff:57:7a:1d:11:28:26: da:b9:c3:bf:7e:b2:45:5e:c8:57:d4:6c:6f:66:b4:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:91:ca:41:e0:4e:82:8a:cd:e7:6e:91:a6:9b:73:59: c9:e4:ae:07:68:af:0b:c6:18:92:93:5c:10:05:92:66: 73:b9:97:5c:fd:00:15:c3:3f:cd:2e:85:81:b8:db:3f: 32:61:98:f4:0b:6b:38:03:44:fe:f3:90:6f:f8:da:cf: 16:02:91:6d:77:ee:6f:e5:72:a2:12:6b:12:cc:4b:66: a4:18:43:e9:2f:9d:9d:73:2d:60:81:61:d3:9f:d4:7b: 0f:9e:18:61:92:3a:ec:a1:e7:79:fb:d7:6f:dd:2e:c6: 0f:21:11:da:03:a9:09:ff:b4:67:6a:c6:ca:e0:82:c7: 84:7d:16:f2:8a:82:40:1b:62:9e:f8:98:62:af:81:cb: 3f:d3:d7:4b:bf:98:aa:ef:45:48:7d:ac:bc:47:d7:8c: 8e:56:b2:47:bf:d7:fb:7c:f9:d5:1b:b3:fa:a8:6a:c0: 8d:f2:4f:2d:d4:16:fb:8f:68:7f:56:f4:fc:e0:ee:9a: 89:3e:d4:1f:29:6b:44:d1:7d:28:8d:59:f3:0e:cd:4e: e5:48:49:e9:86:2e:7c:63:95:a2:27:9e:c9:f6:db:87: 47:27:32:fd:7b:cb:43:3a:3b:7f:01:79:50:32:db:f8: 16:36:14:c7:ac:de:12:e5:a5:41:5a:0c:23:a2:a8:58 Fingerprint (SHA-256): 71:3D:49:2D:C5:D2:A9:43:AB:80:35:14:54:BA:90:7D:F7:BE:D3:2F:11:CC:97:D1:57:C3:C2:B0:9E:FF:62:16 Fingerprint (SHA1): 36:FD:78:B7:37:F7:8D:9B:44:14:1F:0E:BB:48:04:9F:07:39:ED:A7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1866: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1867: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1868: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1869: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1870: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1871: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145622 (0x49157f56) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 14:59:07 2024 Not After : Wed Dec 26 14:59:07 2029 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:b1:f8:1a:62:f6:94:b9:66:5e:f0:0f:5c:1a:6c:13: 11:37:9a:28:3c:d0:19:51:64:c6:e3:60:04:88:d3:36: d4:35:fa:f8:22:f0:b2:4c:db:b4:a5:79:f2:5c:66:53: b7:bb:ad:36:75:c0:c7:59:e0:70:9e:ad:b1:c5:95:43: fe:59:a1:cb:3e:bf:54:f6:25:29:11:00:22:86:c6:f9: f9:c4:18:0e:c6:e1:c5:f7:d5:51:4b:46:11:1f:b5:71: 0e:e7:78:b3:3b:d3:98:df:6d:44:67:68:d0:6d:f2:0d: d4:3e:1b:1f:2d:d3:11:4b:81:17:19:05:db:f8:90:35: 03:f8:04:06:ed:7b:59:df:ac:70:4e:58:30:90:51:62: 20:fb:eb:57:45:b7:1b:47:8c:a9:b2:ba:f8:ce:dc:32: c6:86:d4:e1:3e:dc:7b:fe:96:4b:36:df:26:ee:21:00: d6:3a:24:2e:df:ac:60:e8:b1:ba:15:99:d8:89:71:61: 24:43:a1:cb:f2:57:9f:e8:36:64:ff:36:af:b9:50:30: ef:34:94:8e:c8:3b:f7:bf:36:83:25:4b:50:23:c2:21: 41:57:47:48:84:54:6e:23:c4:e8:19:08:22:53:d0:e2: 6d:f7:c1:b0:03:39:e4:cd:52:2d:48:ad:c5:20:48:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:41:34:66:82:03:7d:a1:c0:15:c5:ee:e1:c4:c5:e6: 8f:ea:2d:b2:83:fd:11:f7:dd:72:92:d2:65:cc:89:34: ce:2d:60:41:c5:9f:70:f9:b3:21:32:9f:c4:81:c2:5f: 8a:82:80:e5:7b:fe:9c:f1:21:0f:41:c0:f0:dd:56:e1: ad:98:d9:97:12:d1:40:af:b4:15:ec:c1:60:af:a0:a5: c5:fd:c1:59:80:ae:90:9e:69:67:c3:82:9c:6b:2d:08: 32:5f:b0:6a:b9:bf:50:70:4b:ec:bc:02:9b:2c:be:e4: 95:9d:ad:42:11:8b:01:48:b8:ae:18:f3:5d:c3:f8:c6: ac:93:b9:47:bd:2b:49:02:f0:3d:32:51:8e:37:c0:34: b0:86:4b:30:33:24:fe:97:e7:aa:94:13:1f:a8:8c:d0: 70:b3:69:01:30:7c:d4:f5:9e:8f:32:01:9d:17:49:c9: c3:f9:6a:51:fb:1c:3e:72:be:03:74:a5:59:db:72:fb: 61:b9:8d:30:30:55:4f:c6:e6:87:7c:5f:ed:54:8c:ac: e9:2b:ea:77:56:8f:28:63:fd:a6:76:56:96:b6:77:8e: 6e:61:19:d5:90:f9:0d:3c:0c:04:50:c2:07:b6:b1:95: 8d:32:d9:18:02:8c:f8:a4:f0:97:90:68:1d:10:dd:0f Fingerprint (SHA-256): CE:75:F4:9E:60:FC:CA:5C:CE:D4:0B:29:C7:5F:C8:6E:3F:BB:94:30:AF:53:9E:49:66:61:A0:C3:73:C5:5C:B2 Fingerprint (SHA1): 5F:EE:0D:AB:5F:AF:EA:84:F6:ED:14:05:F1:0C:E9:F2:C4:C8:D2:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1872: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1873: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1874: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1875: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1876: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1877: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1878: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1879: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1880: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1881: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1882: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #1883: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1884: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1885: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1886: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1887: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #1888: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1889: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1890: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1891: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #1892: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1893: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1894: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1895: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1896: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1897: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 90855 at Thu Dec 26 14:59:13 UTC 2024 kill -USR1 90855 httpserv: normal termination httpserv -b -p 9535 2>/dev/null; httpserv with PID 90855 killed at Thu Dec 26 14:59:13 UTC 2024 httpserv starting at Thu Dec 26 14:59:13 UTC 2024 httpserv -D -p 9535 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/aiahttp/http_pid.15633 & trying to connect to httpserv at Thu Dec 26 14:59:13 UTC 2024 tstclnt -4 -p 9535 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9535 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 102830 >/dev/null 2>/dev/null httpserv with PID 102830 found at Thu Dec 26 14:59:13 UTC 2024 httpserv with PID 102830 started at Thu Dec 26 14:59:13 UTC 2024 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1898: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1899: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145624 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1900: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1901: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1902: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145625 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1903: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1904: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1905: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1906: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145626 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1907: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1908: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145627 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1909: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1910: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1911: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1912: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1913: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1226145628 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1914: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1915: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1916: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1917: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1918: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145625 (0x49157f59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:59:14 2024 Not After : Wed Dec 26 14:59:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:24:c7:79:d5:37:84:12:6e:90:46:af:d3:c6:6d:65: e6:e5:92:a0:3b:1b:0e:f1:2e:95:62:f4:22:51:e4:94: 32:cb:0a:3e:fd:60:a7:69:a8:a0:61:be:d4:84:9b:f9: a5:ca:07:f5:08:8d:14:65:f9:2e:82:19:83:3f:00:72: 00:2e:65:3c:4f:b7:22:82:8e:1e:0f:71:0a:c7:90:74: e2:8f:3f:8f:36:5c:8f:ad:8f:cb:bc:ee:6b:b1:c3:ed: 95:25:ae:f9:57:5e:73:14:30:1f:00:81:b2:9b:a8:74: e8:73:fd:53:4d:f2:44:1c:13:89:6e:f8:59:8b:cb:47: 33:8e:dc:92:b4:a3:e9:3e:3c:cd:e9:99:86:02:1d:f2: 26:e0:be:9a:58:5a:02:82:be:e9:16:e6:6f:d2:cb:a5: 36:92:f2:5d:a0:b2:6b:30:31:b1:15:d1:87:cf:fa:9d: 99:a2:25:47:42:07:9e:06:90:2d:70:52:95:a1:35:c2: e5:1a:3b:82:49:d8:ec:11:b1:31:8f:68:4d:8f:18:23: 8d:5d:d3:94:88:96:57:c8:3e:2b:ea:d1:72:b3:cb:71: 46:0d:71:4d:b3:bf:12:ba:96:d5:6c:19:a0:29:f3:dc: 2e:83:5a:dd:19:eb:a6:17:39:7d:fd:12:cc:d7:2b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:ae:9f:ca:0e:97:94:d1:67:83:8a:32:c5:6d:b9:bc: c7:93:24:c6:94:73:51:d9:25:55:5a:35:6c:fc:f1:a4: e9:99:c7:88:a1:46:da:88:c8:1e:4d:2a:5c:7b:4c:fb: 1c:88:2e:e4:6d:99:3f:3a:76:3b:83:8c:a5:a9:85:2d: 0d:b7:20:79:ec:d1:2d:25:ee:65:1a:f7:3e:fb:4c:cd: d5:29:5d:a0:8a:66:3e:d3:97:a8:fd:46:f6:27:da:3e: 96:3f:75:60:26:6e:bd:de:c1:4b:62:50:24:a8:e5:56: cf:da:5c:78:21:22:8e:98:ec:54:0a:e2:e9:83:f5:ae: 03:92:15:ad:5a:f0:69:cf:ed:ae:9f:48:56:2e:19:00: 2e:94:4f:67:07:9e:94:df:a2:97:de:c2:c2:5a:23:6e: 62:42:52:0b:c1:2a:c1:3c:b5:d5:39:9b:c6:1c:56:b5: a8:4e:11:0d:73:35:4e:67:c8:a2:d4:f4:1c:0f:40:87: cd:81:e0:83:7f:a7:64:6b:25:d9:a1:14:d6:20:5d:cb: e5:b5:45:f4:25:c6:05:9a:93:55:54:a6:02:14:09:c6: 24:81:04:49:0e:08:05:a3:72:1b:67:94:5f:89:49:6f: 53:e2:fe:1c:b5:e2:5e:48:ba:4f:2a:c1:a3:fc:45:95 Fingerprint (SHA-256): F9:6E:40:3D:DB:0E:07:23:35:4B:DA:14:57:4D:3D:19:AB:7C:5C:84:C1:D8:E6:48:AA:69:B5:CB:56:70:16:23 Fingerprint (SHA1): B6:CB:D7:D0:A1:2F:99:48:0D:A5:C3:8A:8A:AB:2F:FF:2C:E7:83:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1919: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145624 (0x49157f58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:59:13 2024 Not After : Wed Dec 26 14:59:13 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f2:d6:ca:f9:77:88:2a:f8:c2:50:22:6a:6b:83:12: ea:07:96:49:ab:cc:52:e5:7d:1e:90:f4:21:61:8d:82: eb:28:a6:84:5b:12:05:2c:00:05:2b:83:44:01:d4:fd: 86:f7:72:c1:db:8e:98:00:25:de:db:a4:58:ba:c6:eb: 34:98:d4:91:a2:58:86:fc:ba:4f:d8:3a:c6:5b:f8:e7: 34:62:d2:e4:54:dd:34:94:8c:74:a3:62:b2:6d:34:ff: 86:a4:a6:74:1a:8c:d4:2b:09:38:92:43:5c:ea:4d:91: 27:7c:6f:67:94:25:f3:4e:0c:c2:98:0d:55:9d:82:71: ad:14:0b:5c:4f:01:c6:db:7c:e4:72:55:c1:92:d3:4d: aa:86:8e:5c:ca:a0:6a:45:77:89:3e:3a:23:b2:75:d9: 21:a7:9b:a2:ca:d9:98:4b:a0:4f:41:b7:58:4c:f9:08: 88:ae:b7:0f:76:d6:5f:8a:4c:82:39:e2:39:bb:75:70: 8a:05:0a:19:30:46:26:ea:c2:8a:6b:81:c1:c6:d7:6f: 9b:f2:cb:d8:40:f2:5b:12:4b:99:2d:be:14:2a:1d:fe: f0:71:43:31:e5:56:93:b8:59:d3:a4:b3:96:1f:37:98: 54:5d:00:8f:61:1d:e5:07:a3:cb:5a:e4:47:cf:c6:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:a1:65:43:c3:14:06:2f:7e:1f:5d:56:b8:87:6a:3c: 8e:ad:70:6a:17:7a:5c:1c:09:61:39:d7:b5:9a:3e:ff: 12:f8:5f:3e:6e:fd:38:fe:8d:27:ae:23:52:0b:96:69: f4:4a:d0:b7:43:c5:fd:34:8a:37:9a:d8:b2:da:ec:58: f2:9e:18:de:7f:ac:f9:f3:d9:96:2f:db:83:d4:b8:b7: 42:1f:63:1c:91:6e:4a:57:9f:ac:a2:0d:47:8c:ba:a7: 10:e5:35:92:c9:49:5f:31:1b:60:78:81:95:67:42:25: f7:f3:b2:7c:d5:da:3b:2f:5d:5f:ac:5a:31:ea:2c:22: 76:23:5d:ee:eb:51:2e:8f:89:76:d4:86:08:6c:2c:db: 86:c2:df:47:f1:1c:22:fe:8b:7c:5f:5f:c5:74:e2:ec: 8c:48:8d:44:e6:fa:01:6b:25:a0:87:b3:99:3d:ff:ed: 90:23:5e:1a:54:2d:f1:db:6e:9a:06:33:0d:a5:91:a6: e1:c2:5f:a0:d2:da:8b:a5:80:05:52:75:b3:e4:fb:86: b2:7a:92:de:00:e6:a8:22:4e:01:63:03:9b:49:71:60: f8:55:ae:62:7d:04:ae:ae:49:85:99:bc:a5:3d:9c:10: a8:50:b8:ce:ec:37:09:4f:01:24:08:a1:4f:55:8d:2b Fingerprint (SHA-256): 13:41:50:0A:E0:20:DC:34:1E:1B:78:9F:21:AA:86:F9:B4:98:49:AA:23:06:E7:77:1F:92:97:AC:C1:4B:46:76 Fingerprint (SHA1): 65:F0:DE:2E:83:6B:B4:07:D4:D0:96:42:A6:94:90:45:A7:26:6D:4A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1920: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1921: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1922: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1923: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145624 (0x49157f58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:59:13 2024 Not After : Wed Dec 26 14:59:13 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f2:d6:ca:f9:77:88:2a:f8:c2:50:22:6a:6b:83:12: ea:07:96:49:ab:cc:52:e5:7d:1e:90:f4:21:61:8d:82: eb:28:a6:84:5b:12:05:2c:00:05:2b:83:44:01:d4:fd: 86:f7:72:c1:db:8e:98:00:25:de:db:a4:58:ba:c6:eb: 34:98:d4:91:a2:58:86:fc:ba:4f:d8:3a:c6:5b:f8:e7: 34:62:d2:e4:54:dd:34:94:8c:74:a3:62:b2:6d:34:ff: 86:a4:a6:74:1a:8c:d4:2b:09:38:92:43:5c:ea:4d:91: 27:7c:6f:67:94:25:f3:4e:0c:c2:98:0d:55:9d:82:71: ad:14:0b:5c:4f:01:c6:db:7c:e4:72:55:c1:92:d3:4d: aa:86:8e:5c:ca:a0:6a:45:77:89:3e:3a:23:b2:75:d9: 21:a7:9b:a2:ca:d9:98:4b:a0:4f:41:b7:58:4c:f9:08: 88:ae:b7:0f:76:d6:5f:8a:4c:82:39:e2:39:bb:75:70: 8a:05:0a:19:30:46:26:ea:c2:8a:6b:81:c1:c6:d7:6f: 9b:f2:cb:d8:40:f2:5b:12:4b:99:2d:be:14:2a:1d:fe: f0:71:43:31:e5:56:93:b8:59:d3:a4:b3:96:1f:37:98: 54:5d:00:8f:61:1d:e5:07:a3:cb:5a:e4:47:cf:c6:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:a1:65:43:c3:14:06:2f:7e:1f:5d:56:b8:87:6a:3c: 8e:ad:70:6a:17:7a:5c:1c:09:61:39:d7:b5:9a:3e:ff: 12:f8:5f:3e:6e:fd:38:fe:8d:27:ae:23:52:0b:96:69: f4:4a:d0:b7:43:c5:fd:34:8a:37:9a:d8:b2:da:ec:58: f2:9e:18:de:7f:ac:f9:f3:d9:96:2f:db:83:d4:b8:b7: 42:1f:63:1c:91:6e:4a:57:9f:ac:a2:0d:47:8c:ba:a7: 10:e5:35:92:c9:49:5f:31:1b:60:78:81:95:67:42:25: f7:f3:b2:7c:d5:da:3b:2f:5d:5f:ac:5a:31:ea:2c:22: 76:23:5d:ee:eb:51:2e:8f:89:76:d4:86:08:6c:2c:db: 86:c2:df:47:f1:1c:22:fe:8b:7c:5f:5f:c5:74:e2:ec: 8c:48:8d:44:e6:fa:01:6b:25:a0:87:b3:99:3d:ff:ed: 90:23:5e:1a:54:2d:f1:db:6e:9a:06:33:0d:a5:91:a6: e1:c2:5f:a0:d2:da:8b:a5:80:05:52:75:b3:e4:fb:86: b2:7a:92:de:00:e6:a8:22:4e:01:63:03:9b:49:71:60: f8:55:ae:62:7d:04:ae:ae:49:85:99:bc:a5:3d:9c:10: a8:50:b8:ce:ec:37:09:4f:01:24:08:a1:4f:55:8d:2b Fingerprint (SHA-256): 13:41:50:0A:E0:20:DC:34:1E:1B:78:9F:21:AA:86:F9:B4:98:49:AA:23:06:E7:77:1F:92:97:AC:C1:4B:46:76 Fingerprint (SHA1): 65:F0:DE:2E:83:6B:B4:07:D4:D0:96:42:A6:94:90:45:A7:26:6D:4A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1924: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145625 (0x49157f59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:59:14 2024 Not After : Wed Dec 26 14:59:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:24:c7:79:d5:37:84:12:6e:90:46:af:d3:c6:6d:65: e6:e5:92:a0:3b:1b:0e:f1:2e:95:62:f4:22:51:e4:94: 32:cb:0a:3e:fd:60:a7:69:a8:a0:61:be:d4:84:9b:f9: a5:ca:07:f5:08:8d:14:65:f9:2e:82:19:83:3f:00:72: 00:2e:65:3c:4f:b7:22:82:8e:1e:0f:71:0a:c7:90:74: e2:8f:3f:8f:36:5c:8f:ad:8f:cb:bc:ee:6b:b1:c3:ed: 95:25:ae:f9:57:5e:73:14:30:1f:00:81:b2:9b:a8:74: e8:73:fd:53:4d:f2:44:1c:13:89:6e:f8:59:8b:cb:47: 33:8e:dc:92:b4:a3:e9:3e:3c:cd:e9:99:86:02:1d:f2: 26:e0:be:9a:58:5a:02:82:be:e9:16:e6:6f:d2:cb:a5: 36:92:f2:5d:a0:b2:6b:30:31:b1:15:d1:87:cf:fa:9d: 99:a2:25:47:42:07:9e:06:90:2d:70:52:95:a1:35:c2: e5:1a:3b:82:49:d8:ec:11:b1:31:8f:68:4d:8f:18:23: 8d:5d:d3:94:88:96:57:c8:3e:2b:ea:d1:72:b3:cb:71: 46:0d:71:4d:b3:bf:12:ba:96:d5:6c:19:a0:29:f3:dc: 2e:83:5a:dd:19:eb:a6:17:39:7d:fd:12:cc:d7:2b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:ae:9f:ca:0e:97:94:d1:67:83:8a:32:c5:6d:b9:bc: c7:93:24:c6:94:73:51:d9:25:55:5a:35:6c:fc:f1:a4: e9:99:c7:88:a1:46:da:88:c8:1e:4d:2a:5c:7b:4c:fb: 1c:88:2e:e4:6d:99:3f:3a:76:3b:83:8c:a5:a9:85:2d: 0d:b7:20:79:ec:d1:2d:25:ee:65:1a:f7:3e:fb:4c:cd: d5:29:5d:a0:8a:66:3e:d3:97:a8:fd:46:f6:27:da:3e: 96:3f:75:60:26:6e:bd:de:c1:4b:62:50:24:a8:e5:56: cf:da:5c:78:21:22:8e:98:ec:54:0a:e2:e9:83:f5:ae: 03:92:15:ad:5a:f0:69:cf:ed:ae:9f:48:56:2e:19:00: 2e:94:4f:67:07:9e:94:df:a2:97:de:c2:c2:5a:23:6e: 62:42:52:0b:c1:2a:c1:3c:b5:d5:39:9b:c6:1c:56:b5: a8:4e:11:0d:73:35:4e:67:c8:a2:d4:f4:1c:0f:40:87: cd:81:e0:83:7f:a7:64:6b:25:d9:a1:14:d6:20:5d:cb: e5:b5:45:f4:25:c6:05:9a:93:55:54:a6:02:14:09:c6: 24:81:04:49:0e:08:05:a3:72:1b:67:94:5f:89:49:6f: 53:e2:fe:1c:b5:e2:5e:48:ba:4f:2a:c1:a3:fc:45:95 Fingerprint (SHA-256): F9:6E:40:3D:DB:0E:07:23:35:4B:DA:14:57:4D:3D:19:AB:7C:5C:84:C1:D8:E6:48:AA:69:B5:CB:56:70:16:23 Fingerprint (SHA1): B6:CB:D7:D0:A1:2F:99:48:0D:A5:C3:8A:8A:AB:2F:FF:2C:E7:83:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1925: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1926: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1927: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1928: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1929: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1930: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145625 (0x49157f59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:59:14 2024 Not After : Wed Dec 26 14:59:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:24:c7:79:d5:37:84:12:6e:90:46:af:d3:c6:6d:65: e6:e5:92:a0:3b:1b:0e:f1:2e:95:62:f4:22:51:e4:94: 32:cb:0a:3e:fd:60:a7:69:a8:a0:61:be:d4:84:9b:f9: a5:ca:07:f5:08:8d:14:65:f9:2e:82:19:83:3f:00:72: 00:2e:65:3c:4f:b7:22:82:8e:1e:0f:71:0a:c7:90:74: e2:8f:3f:8f:36:5c:8f:ad:8f:cb:bc:ee:6b:b1:c3:ed: 95:25:ae:f9:57:5e:73:14:30:1f:00:81:b2:9b:a8:74: e8:73:fd:53:4d:f2:44:1c:13:89:6e:f8:59:8b:cb:47: 33:8e:dc:92:b4:a3:e9:3e:3c:cd:e9:99:86:02:1d:f2: 26:e0:be:9a:58:5a:02:82:be:e9:16:e6:6f:d2:cb:a5: 36:92:f2:5d:a0:b2:6b:30:31:b1:15:d1:87:cf:fa:9d: 99:a2:25:47:42:07:9e:06:90:2d:70:52:95:a1:35:c2: e5:1a:3b:82:49:d8:ec:11:b1:31:8f:68:4d:8f:18:23: 8d:5d:d3:94:88:96:57:c8:3e:2b:ea:d1:72:b3:cb:71: 46:0d:71:4d:b3:bf:12:ba:96:d5:6c:19:a0:29:f3:dc: 2e:83:5a:dd:19:eb:a6:17:39:7d:fd:12:cc:d7:2b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:ae:9f:ca:0e:97:94:d1:67:83:8a:32:c5:6d:b9:bc: c7:93:24:c6:94:73:51:d9:25:55:5a:35:6c:fc:f1:a4: e9:99:c7:88:a1:46:da:88:c8:1e:4d:2a:5c:7b:4c:fb: 1c:88:2e:e4:6d:99:3f:3a:76:3b:83:8c:a5:a9:85:2d: 0d:b7:20:79:ec:d1:2d:25:ee:65:1a:f7:3e:fb:4c:cd: d5:29:5d:a0:8a:66:3e:d3:97:a8:fd:46:f6:27:da:3e: 96:3f:75:60:26:6e:bd:de:c1:4b:62:50:24:a8:e5:56: cf:da:5c:78:21:22:8e:98:ec:54:0a:e2:e9:83:f5:ae: 03:92:15:ad:5a:f0:69:cf:ed:ae:9f:48:56:2e:19:00: 2e:94:4f:67:07:9e:94:df:a2:97:de:c2:c2:5a:23:6e: 62:42:52:0b:c1:2a:c1:3c:b5:d5:39:9b:c6:1c:56:b5: a8:4e:11:0d:73:35:4e:67:c8:a2:d4:f4:1c:0f:40:87: cd:81:e0:83:7f:a7:64:6b:25:d9:a1:14:d6:20:5d:cb: e5:b5:45:f4:25:c6:05:9a:93:55:54:a6:02:14:09:c6: 24:81:04:49:0e:08:05:a3:72:1b:67:94:5f:89:49:6f: 53:e2:fe:1c:b5:e2:5e:48:ba:4f:2a:c1:a3:fc:45:95 Fingerprint (SHA-256): F9:6E:40:3D:DB:0E:07:23:35:4B:DA:14:57:4D:3D:19:AB:7C:5C:84:C1:D8:E6:48:AA:69:B5:CB:56:70:16:23 Fingerprint (SHA1): B6:CB:D7:D0:A1:2F:99:48:0D:A5:C3:8A:8A:AB:2F:FF:2C:E7:83:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1931: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145625 (0x49157f59) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 14:59:14 2024 Not After : Wed Dec 26 14:59:14 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:24:c7:79:d5:37:84:12:6e:90:46:af:d3:c6:6d:65: e6:e5:92:a0:3b:1b:0e:f1:2e:95:62:f4:22:51:e4:94: 32:cb:0a:3e:fd:60:a7:69:a8:a0:61:be:d4:84:9b:f9: a5:ca:07:f5:08:8d:14:65:f9:2e:82:19:83:3f:00:72: 00:2e:65:3c:4f:b7:22:82:8e:1e:0f:71:0a:c7:90:74: e2:8f:3f:8f:36:5c:8f:ad:8f:cb:bc:ee:6b:b1:c3:ed: 95:25:ae:f9:57:5e:73:14:30:1f:00:81:b2:9b:a8:74: e8:73:fd:53:4d:f2:44:1c:13:89:6e:f8:59:8b:cb:47: 33:8e:dc:92:b4:a3:e9:3e:3c:cd:e9:99:86:02:1d:f2: 26:e0:be:9a:58:5a:02:82:be:e9:16:e6:6f:d2:cb:a5: 36:92:f2:5d:a0:b2:6b:30:31:b1:15:d1:87:cf:fa:9d: 99:a2:25:47:42:07:9e:06:90:2d:70:52:95:a1:35:c2: e5:1a:3b:82:49:d8:ec:11:b1:31:8f:68:4d:8f:18:23: 8d:5d:d3:94:88:96:57:c8:3e:2b:ea:d1:72:b3:cb:71: 46:0d:71:4d:b3:bf:12:ba:96:d5:6c:19:a0:29:f3:dc: 2e:83:5a:dd:19:eb:a6:17:39:7d:fd:12:cc:d7:2b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:ae:9f:ca:0e:97:94:d1:67:83:8a:32:c5:6d:b9:bc: c7:93:24:c6:94:73:51:d9:25:55:5a:35:6c:fc:f1:a4: e9:99:c7:88:a1:46:da:88:c8:1e:4d:2a:5c:7b:4c:fb: 1c:88:2e:e4:6d:99:3f:3a:76:3b:83:8c:a5:a9:85:2d: 0d:b7:20:79:ec:d1:2d:25:ee:65:1a:f7:3e:fb:4c:cd: d5:29:5d:a0:8a:66:3e:d3:97:a8:fd:46:f6:27:da:3e: 96:3f:75:60:26:6e:bd:de:c1:4b:62:50:24:a8:e5:56: cf:da:5c:78:21:22:8e:98:ec:54:0a:e2:e9:83:f5:ae: 03:92:15:ad:5a:f0:69:cf:ed:ae:9f:48:56:2e:19:00: 2e:94:4f:67:07:9e:94:df:a2:97:de:c2:c2:5a:23:6e: 62:42:52:0b:c1:2a:c1:3c:b5:d5:39:9b:c6:1c:56:b5: a8:4e:11:0d:73:35:4e:67:c8:a2:d4:f4:1c:0f:40:87: cd:81:e0:83:7f:a7:64:6b:25:d9:a1:14:d6:20:5d:cb: e5:b5:45:f4:25:c6:05:9a:93:55:54:a6:02:14:09:c6: 24:81:04:49:0e:08:05:a3:72:1b:67:94:5f:89:49:6f: 53:e2:fe:1c:b5:e2:5e:48:ba:4f:2a:c1:a3:fc:45:95 Fingerprint (SHA-256): F9:6E:40:3D:DB:0E:07:23:35:4B:DA:14:57:4D:3D:19:AB:7C:5C:84:C1:D8:E6:48:AA:69:B5:CB:56:70:16:23 Fingerprint (SHA1): B6:CB:D7:D0:A1:2F:99:48:0D:A5:C3:8A:8A:AB:2F:FF:2C:E7:83:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1932: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1933: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1934: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1935: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1936: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1937: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145624 (0x49157f58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:59:13 2024 Not After : Wed Dec 26 14:59:13 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f2:d6:ca:f9:77:88:2a:f8:c2:50:22:6a:6b:83:12: ea:07:96:49:ab:cc:52:e5:7d:1e:90:f4:21:61:8d:82: eb:28:a6:84:5b:12:05:2c:00:05:2b:83:44:01:d4:fd: 86:f7:72:c1:db:8e:98:00:25:de:db:a4:58:ba:c6:eb: 34:98:d4:91:a2:58:86:fc:ba:4f:d8:3a:c6:5b:f8:e7: 34:62:d2:e4:54:dd:34:94:8c:74:a3:62:b2:6d:34:ff: 86:a4:a6:74:1a:8c:d4:2b:09:38:92:43:5c:ea:4d:91: 27:7c:6f:67:94:25:f3:4e:0c:c2:98:0d:55:9d:82:71: ad:14:0b:5c:4f:01:c6:db:7c:e4:72:55:c1:92:d3:4d: aa:86:8e:5c:ca:a0:6a:45:77:89:3e:3a:23:b2:75:d9: 21:a7:9b:a2:ca:d9:98:4b:a0:4f:41:b7:58:4c:f9:08: 88:ae:b7:0f:76:d6:5f:8a:4c:82:39:e2:39:bb:75:70: 8a:05:0a:19:30:46:26:ea:c2:8a:6b:81:c1:c6:d7:6f: 9b:f2:cb:d8:40:f2:5b:12:4b:99:2d:be:14:2a:1d:fe: f0:71:43:31:e5:56:93:b8:59:d3:a4:b3:96:1f:37:98: 54:5d:00:8f:61:1d:e5:07:a3:cb:5a:e4:47:cf:c6:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:a1:65:43:c3:14:06:2f:7e:1f:5d:56:b8:87:6a:3c: 8e:ad:70:6a:17:7a:5c:1c:09:61:39:d7:b5:9a:3e:ff: 12:f8:5f:3e:6e:fd:38:fe:8d:27:ae:23:52:0b:96:69: f4:4a:d0:b7:43:c5:fd:34:8a:37:9a:d8:b2:da:ec:58: f2:9e:18:de:7f:ac:f9:f3:d9:96:2f:db:83:d4:b8:b7: 42:1f:63:1c:91:6e:4a:57:9f:ac:a2:0d:47:8c:ba:a7: 10:e5:35:92:c9:49:5f:31:1b:60:78:81:95:67:42:25: f7:f3:b2:7c:d5:da:3b:2f:5d:5f:ac:5a:31:ea:2c:22: 76:23:5d:ee:eb:51:2e:8f:89:76:d4:86:08:6c:2c:db: 86:c2:df:47:f1:1c:22:fe:8b:7c:5f:5f:c5:74:e2:ec: 8c:48:8d:44:e6:fa:01:6b:25:a0:87:b3:99:3d:ff:ed: 90:23:5e:1a:54:2d:f1:db:6e:9a:06:33:0d:a5:91:a6: e1:c2:5f:a0:d2:da:8b:a5:80:05:52:75:b3:e4:fb:86: b2:7a:92:de:00:e6:a8:22:4e:01:63:03:9b:49:71:60: f8:55:ae:62:7d:04:ae:ae:49:85:99:bc:a5:3d:9c:10: a8:50:b8:ce:ec:37:09:4f:01:24:08:a1:4f:55:8d:2b Fingerprint (SHA-256): 13:41:50:0A:E0:20:DC:34:1E:1B:78:9F:21:AA:86:F9:B4:98:49:AA:23:06:E7:77:1F:92:97:AC:C1:4B:46:76 Fingerprint (SHA1): 65:F0:DE:2E:83:6B:B4:07:D4:D0:96:42:A6:94:90:45:A7:26:6D:4A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1938: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145624 (0x49157f58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 14:59:13 2024 Not After : Wed Dec 26 14:59:13 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:f2:d6:ca:f9:77:88:2a:f8:c2:50:22:6a:6b:83:12: ea:07:96:49:ab:cc:52:e5:7d:1e:90:f4:21:61:8d:82: eb:28:a6:84:5b:12:05:2c:00:05:2b:83:44:01:d4:fd: 86:f7:72:c1:db:8e:98:00:25:de:db:a4:58:ba:c6:eb: 34:98:d4:91:a2:58:86:fc:ba:4f:d8:3a:c6:5b:f8:e7: 34:62:d2:e4:54:dd:34:94:8c:74:a3:62:b2:6d:34:ff: 86:a4:a6:74:1a:8c:d4:2b:09:38:92:43:5c:ea:4d:91: 27:7c:6f:67:94:25:f3:4e:0c:c2:98:0d:55:9d:82:71: ad:14:0b:5c:4f:01:c6:db:7c:e4:72:55:c1:92:d3:4d: aa:86:8e:5c:ca:a0:6a:45:77:89:3e:3a:23:b2:75:d9: 21:a7:9b:a2:ca:d9:98:4b:a0:4f:41:b7:58:4c:f9:08: 88:ae:b7:0f:76:d6:5f:8a:4c:82:39:e2:39:bb:75:70: 8a:05:0a:19:30:46:26:ea:c2:8a:6b:81:c1:c6:d7:6f: 9b:f2:cb:d8:40:f2:5b:12:4b:99:2d:be:14:2a:1d:fe: f0:71:43:31:e5:56:93:b8:59:d3:a4:b3:96:1f:37:98: 54:5d:00:8f:61:1d:e5:07:a3:cb:5a:e4:47:cf:c6:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:a1:65:43:c3:14:06:2f:7e:1f:5d:56:b8:87:6a:3c: 8e:ad:70:6a:17:7a:5c:1c:09:61:39:d7:b5:9a:3e:ff: 12:f8:5f:3e:6e:fd:38:fe:8d:27:ae:23:52:0b:96:69: f4:4a:d0:b7:43:c5:fd:34:8a:37:9a:d8:b2:da:ec:58: f2:9e:18:de:7f:ac:f9:f3:d9:96:2f:db:83:d4:b8:b7: 42:1f:63:1c:91:6e:4a:57:9f:ac:a2:0d:47:8c:ba:a7: 10:e5:35:92:c9:49:5f:31:1b:60:78:81:95:67:42:25: f7:f3:b2:7c:d5:da:3b:2f:5d:5f:ac:5a:31:ea:2c:22: 76:23:5d:ee:eb:51:2e:8f:89:76:d4:86:08:6c:2c:db: 86:c2:df:47:f1:1c:22:fe:8b:7c:5f:5f:c5:74:e2:ec: 8c:48:8d:44:e6:fa:01:6b:25:a0:87:b3:99:3d:ff:ed: 90:23:5e:1a:54:2d:f1:db:6e:9a:06:33:0d:a5:91:a6: e1:c2:5f:a0:d2:da:8b:a5:80:05:52:75:b3:e4:fb:86: b2:7a:92:de:00:e6:a8:22:4e:01:63:03:9b:49:71:60: f8:55:ae:62:7d:04:ae:ae:49:85:99:bc:a5:3d:9c:10: a8:50:b8:ce:ec:37:09:4f:01:24:08:a1:4f:55:8d:2b Fingerprint (SHA-256): 13:41:50:0A:E0:20:DC:34:1E:1B:78:9F:21:AA:86:F9:B4:98:49:AA:23:06:E7:77:1F:92:97:AC:C1:4B:46:76 Fingerprint (SHA1): 65:F0:DE:2E:83:6B:B4:07:D4:D0:96:42:A6:94:90:45:A7:26:6D:4A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1939: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1940: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145629 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1941: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1942: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1943: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145630 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1944: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1945: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1946: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145631 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1947: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1948: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1949: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145632 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1950: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1951: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1952: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145633 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1953: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1954: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1955: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145634 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1956: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1957: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1958: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145635 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1959: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1960: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1961: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145636 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1962: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1963: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1964: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145637 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1965: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1966: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1967: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1968: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1226145638 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1969: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1970: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1226145639 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1971: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1972: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1226145640 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1973: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1974: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1975: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1976: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1977: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1226145641 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1978: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1979: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1226145642 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1980: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1981: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1226145643 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1982: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1983: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1984: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1985: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1986: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1226145644 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1987: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1988: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1226145645 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1989: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1990: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1226145646 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1991: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1992: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1993: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1994: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1995: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1226145647 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1996: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1997: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1226145648 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1998: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1999: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1226145649 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2000: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2001: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #2002: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2003: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2004: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1226145650 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2005: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2006: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2007: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2008: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145651 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2009: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2010: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145629 (0x49157f5d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Thu Dec 26 14:59:19 2024 Not After : Wed Dec 26 14:59:19 2074 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:2b:f2:f4:a3:d6:5f:36:f6:0c:9c:22:ee:66:57:b4: 69:66:dc:19:ac:d9:c0:29:42:f7:2d:58:0e:9b:58:4d: c9:1e:58:3f:1d:f3:93:d3:c3:55:a8:e5:8e:0f:c6:78: 9b:8d:07:d4:e4:9d:b4:d5:09:be:5d:49:bb:02:36:cc: 90:8a:b4:63:18:6a:a7:89:16:6d:dc:e0:53:7a:58:7c: 2a:f6:63:d6:a7:46:a4:4c:e7:43:ee:71:bc:ae:a4:41: 00:72:e7:a5:46:3b:a9:98:7e:82:37:72:26:ba:bd:20: 1f:30:a4:a8:4a:10:88:ce:82:7d:6e:9f:a4:f9:f7:60: 4a:13:90:95:f0:9c:38:34:35:11:92:fe:69:a1:3d:49: 07:13:34:ef:19:c5:e9:20:e5:0a:cf:52:3f:a5:a7:27: b7:b6:ce:63:5d:c2:db:52:dd:cf:0e:cf:b3:54:9b:48: 7a:db:b4:df:20:48:5c:38:c8:f3:4b:75:a4:39:07:c8: 94:05:ac:b4:d6:27:3e:fe:ab:48:e3:79:81:fe:58:22: d9:0e:6c:5b:55:f4:8a:df:81:ef:2c:2f:ca:25:66:8d: bf:e1:1e:f9:30:18:66:03:b5:a4:fc:7c:af:ea:19:a5: 5a:8f:96:0e:cc:df:d2:60:a9:0e:c6:82:38:a4:85:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:75:97:d3:a6:4e:c2:49:ee:42:e0:a9:fb:07:4d:7b: e3:8f:9d:82:5c:e5:cb:56:9b:79:62:cc:14:e8:c1:13: 2f:9d:0e:8f:97:23:04:9d:d8:7d:ed:f6:c9:f5:f1:10: 07:f7:e0:fa:5e:ea:3d:ff:99:19:db:5f:7e:26:fe:5f: 90:e8:8a:8b:79:b0:4f:db:0b:60:57:2f:87:9c:6a:0b: 99:92:30:d3:02:5c:7c:5c:67:04:a8:c8:56:b0:bb:66: fd:ee:ee:ae:6b:56:9d:32:6c:c2:2c:ba:eb:9b:4f:d5: 98:df:5a:9c:5c:0b:af:ae:79:fe:3d:66:50:1f:dc:4a: 1e:5c:63:d9:84:bb:fa:3f:79:45:d5:d5:b3:91:d1:30: 0f:40:16:39:ba:76:7c:a7:c9:22:55:0d:e2:9f:85:1c: eb:c3:d0:84:b0:fd:45:ae:52:37:06:6b:36:63:d7:69: 38:03:87:89:47:05:96:b0:a1:64:7e:21:f9:d1:7b:d0: be:c3:8b:b2:29:24:15:be:b8:bb:ea:55:58:fe:12:b5: 8d:a9:48:0a:bc:ca:98:a6:b0:57:e4:7d:23:38:5d:ea: 0f:e8:f2:50:7c:07:6e:b0:25:4e:94:f6:b9:07:f0:cb: ee:54:e3:bd:4b:9e:6b:87:1e:10:97:a5:ab:9d:2a:be Fingerprint (SHA-256): 23:46:F2:0A:08:37:C5:18:B2:2D:15:FB:74:A8:D1:1F:FA:8E:A8:27:4C:EB:79:ED:73:F7:C6:71:02:A3:5D:36 Fingerprint (SHA1): B6:17:98:B3:82:CA:5C:97:62:ED:E3:67:74:CB:17:94:8B:6F:0A:E2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2011: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145630 (0x49157f5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Thu Dec 26 14:59:20 2024 Not After : Wed Dec 26 14:59:20 2074 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:d7:8b:35:89:4a:e1:f1:2a:3e:d9:f8:77:38:94:cc: 41:be:ec:20:52:86:fb:4a:fd:40:60:aa:16:bb:d1:1f: 6f:d0:7b:ba:5e:75:b2:8e:a9:ec:c9:a4:08:48:7f:b4: 8d:10:8b:61:ee:aa:8e:4a:18:3a:79:4d:18:cc:d1:eb: 95:eb:a4:df:fc:62:a5:ef:c7:a8:3d:57:d9:0e:9a:4d: 87:ef:8a:62:ff:06:95:b2:a5:32:e3:00:47:0d:0e:4d: d8:86:59:8f:62:37:83:15:8b:8a:f6:d5:81:43:92:cf: 0b:d3:9b:ae:cf:16:80:5e:80:97:5d:0a:d7:81:48:70: 43:2f:3e:d7:31:98:79:b7:50:71:a5:bb:26:15:a0:32: b4:d6:50:05:1b:b8:96:68:11:57:02:c6:f1:c6:19:79: c5:b9:41:ac:c8:31:c3:33:76:5c:bf:e4:c7:72:09:25: 00:9c:bb:71:b0:ef:7d:8b:1e:53:7f:92:46:7d:76:d7: 7a:f8:46:b1:2f:ef:de:b7:87:d8:cd:65:86:8f:5b:6f: bb:51:fe:53:e8:aa:c4:7b:ff:3b:e9:61:62:93:3a:61: 1d:b9:6d:72:7a:51:30:95:07:bd:ee:b8:ca:91:23:79: fe:b2:62:da:a9:b1:b4:0f:7d:44:2d:5b:ed:63:14:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:56:a2:63:b0:f7:44:03:26:55:de:f9:d4:12:6f:4e: 28:59:f1:1d:ff:87:84:a1:82:de:d6:7b:46:c7:cb:20: 2f:4a:de:d6:d7:7f:4a:6b:0d:73:42:c6:35:d6:12:b8: 1c:84:cd:78:a8:34:05:48:0c:70:f0:ca:ae:fc:6d:63: 25:bf:c2:51:f8:b2:5a:f1:34:07:61:99:0c:af:e0:fc: 6d:8f:36:e3:a6:55:84:fc:85:d9:b1:83:c8:b9:3a:b9: 7b:c1:d9:8d:de:6d:dc:46:00:e7:c3:e7:f9:d4:06:b6: 10:ca:07:78:47:c3:a8:1f:67:4d:81:8a:11:bc:67:c0: df:5e:15:93:93:12:a4:1e:41:83:c1:ef:b9:dd:d8:ea: 7a:d1:10:56:ee:a8:05:e5:54:24:c4:8a:eb:1e:56:ef: 3f:3a:ab:37:ec:25:23:e4:70:30:59:46:22:b6:5e:a4: f4:9c:35:e1:88:10:e6:73:c2:ca:a1:ea:81:7a:f6:a6: 43:4e:a1:f2:23:3d:6d:60:98:02:40:3c:db:2d:a5:57: 0a:8f:67:76:a7:68:a6:89:97:ed:0d:bb:2f:9b:54:c5: 40:30:51:e5:17:82:49:70:22:79:9e:eb:f6:f1:20:a7: e8:93:32:a7:4c:7c:73:17:f3:3f:e2:27:8a:c4:80:51 Fingerprint (SHA-256): B9:DB:F8:A9:B8:2F:32:A3:D8:9D:FE:41:B3:D2:B9:20:52:65:29:DC:F1:A0:97:6B:01:63:AF:EA:DD:81:71:80 Fingerprint (SHA1): C8:76:BC:49:33:92:CF:0E:A6:2A:8B:3D:F1:EA:4C:73:B1:4C:EA:8B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2012: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145631 (0x49157f5f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Thu Dec 26 14:59:21 2024 Not After : Wed Dec 26 14:59:21 2074 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:ff:50:df:22:ed:89:f0:d3:06:52:5d:c8:b2:98:6d: 9a:bd:61:50:65:1a:8d:5c:49:b7:92:e1:9d:c6:c2:93: ae:ff:86:6c:78:c2:dc:d6:53:af:d7:12:c0:92:6e:3d: 89:45:70:3f:3b:10:b8:1d:88:67:e8:41:cc:1c:4d:37: 6e:7c:1f:27:c4:2d:ec:7b:c0:16:fb:99:12:c4:56:f9: a3:48:41:ba:81:79:de:da:c7:f4:9b:09:55:f1:a6:8c: 07:a1:84:ca:d2:28:f4:72:95:e4:96:5f:10:ed:1e:84: 27:95:cc:2e:68:6c:f3:54:29:8e:9c:71:fa:32:9c:d9: 9a:cd:46:9a:69:79:6d:c4:cd:d7:1b:4b:8a:ff:81:f6: 8a:fc:b7:79:b1:20:f6:3f:a3:74:98:4c:54:6f:68:d0: 39:fb:b3:7e:ed:a7:8a:fc:11:50:5b:0a:3f:c0:71:44: 3d:19:45:72:02:26:cc:81:68:38:cd:8c:f5:6b:f6:8f: 5b:9e:4c:d1:aa:41:12:cc:fb:94:a4:ab:b2:c5:85:8c: a9:04:74:d8:db:ec:15:2e:2d:98:0f:4e:07:94:e4:df: 40:1d:65:ab:a9:03:e9:bd:c9:ff:61:59:cc:02:ae:fe: 4a:ff:ef:8a:30:7b:01:af:52:72:87:48:2f:4c:8d:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:93:54:c3:ee:76:64:06:2b:17:08:fb:9b:c5:8b:18: b8:4d:8f:24:8b:c9:0f:e0:81:c3:37:11:21:70:a8:74: 71:b6:91:68:fa:08:71:c8:cc:77:48:ca:da:ec:6a:4e: 3b:ed:7e:04:e1:c3:08:8c:fc:74:02:3e:78:1d:63:b2: 52:6e:70:c6:36:18:60:0d:5d:1b:a2:18:80:a5:44:db: a3:58:9e:a7:bc:01:42:4f:f4:c1:63:7c:fd:a6:69:b7: 2a:b7:50:1d:cc:95:02:2d:30:ae:d9:c1:1c:d1:3d:8e: d4:4a:50:a1:e6:dd:72:c7:73:b7:e1:72:6e:51:8b:e3: 1b:57:5b:2c:56:16:90:c5:5e:ba:a2:27:0b:7c:45:0c: d1:79:c5:0b:aa:99:cc:01:18:87:a9:f4:93:f9:d6:3b: d7:bd:50:69:37:3b:6b:c5:87:ef:13:ab:0c:ad:13:0b: b0:ab:f4:1e:d3:ff:79:58:dd:0b:bb:8e:c0:23:79:89: 73:ff:f5:ff:df:a8:a0:42:0d:8f:c5:10:25:9b:82:2e: 0b:0f:28:73:7d:2b:e3:f4:91:22:7e:37:09:d8:21:c1: 31:9f:9c:5d:2f:12:8e:fe:23:ff:e5:b0:71:26:dc:57: 66:86:96:61:a1:5f:b8:bc:b2:da:e8:aa:db:b2:2a:11 Fingerprint (SHA-256): 81:20:24:24:25:EC:31:C9:5B:94:AA:4C:80:09:F9:16:3E:D2:6A:0E:CB:A2:06:E6:9B:8C:9B:D8:B5:25:02:FF Fingerprint (SHA1): 56:3D:89:E1:61:09:1D:93:DE:B5:78:ED:36:93:CC:AF:1A:CB:09:F5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2013: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145632 (0x49157f60) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Thu Dec 26 14:59:21 2024 Not After : Wed Dec 26 14:59:21 2074 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ae:12:9c:b3:94:00:16:cb:89:2d:a0:d1:b7:cd:99: 53:b3:8e:0b:29:99:43:7c:f7:eb:81:2b:26:c4:f2:61: 6d:90:80:04:05:d7:8b:ee:30:13:44:c4:aa:36:a4:d1: 74:b2:4c:c8:d5:c9:74:41:62:19:45:f9:02:bd:75:72: e4:69:18:3b:19:7b:8d:e9:f0:8e:8b:43:ed:64:8a:21: 94:70:fa:b3:51:00:eb:07:28:c4:7b:96:e2:70:86:78: 1c:0d:d4:a5:41:84:6a:52:1e:85:49:96:51:c2:0e:1b: ee:30:2a:7c:44:3d:77:92:81:a2:69:df:9d:5c:ce:ea: 8b:da:fb:e9:20:09:ec:12:0e:0e:ff:11:10:f9:71:a1: 98:9d:46:44:9b:c0:5f:73:d4:5d:46:c8:fb:f0:29:7c: 88:1c:c4:f0:c1:a2:ae:d0:92:b2:ea:d4:f9:f9:5e:17: 6c:0c:7b:94:4f:65:45:b2:15:f2:82:0b:6f:f8:0c:d0: fa:7d:71:1f:fa:83:d7:be:d0:b2:98:ef:d8:a7:f5:15: d6:8a:3a:b9:6a:2f:cc:d2:65:18:bd:aa:e1:ca:e4:c9: a5:f0:b1:5b:61:b8:79:f1:df:94:af:f5:3f:b7:b3:ec: 60:00:44:80:bf:81:75:06:d5:ae:59:83:9c:26:b3:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:0d:e9:be:c2:84:f8:3a:82:98:2d:ab:02:3f:f9:cf: e4:d1:6f:1a:6d:8e:33:1b:a4:b3:f0:00:ca:be:38:47: e3:05:3a:b1:53:30:3b:66:c2:35:3c:0e:e7:db:c7:83: 70:4c:77:c9:a6:59:4a:af:bc:fc:b0:ee:8c:9e:f0:09: 23:a5:da:5c:92:b7:98:4e:3f:44:a4:a7:b8:c7:5d:dc: ba:84:63:51:22:45:ad:84:66:90:69:b4:e9:70:81:47: 61:4b:91:7b:dd:39:07:72:96:83:b4:30:b5:12:f2:c3: 72:ce:20:e2:50:cf:57:49:6d:e7:87:e7:ae:35:db:49: 5f:bf:8a:03:45:da:0d:b7:6f:f2:b8:36:6d:48:d4:7e: 7a:ad:23:1c:47:a2:97:01:db:73:24:13:56:3d:7e:96: 85:12:63:90:24:80:e5:54:59:df:0c:e6:dd:80:01:e2: 75:60:2d:3f:dd:94:e5:19:50:e4:b9:45:ae:07:be:0a: 05:1c:7d:6b:a4:6b:bd:aa:23:0e:c9:7c:3f:87:75:21: b4:1b:0f:0e:8b:29:50:5a:ce:f1:72:bb:fe:c7:5e:47: 4e:fa:44:d5:af:1e:61:77:ca:81:08:32:21:a3:44:86: 6d:83:18:f3:02:a3:0c:d3:19:4e:40:ce:76:67:c2:ce Fingerprint (SHA-256): CB:8A:82:BA:FD:90:9D:15:A7:C7:1E:86:53:42:68:2E:D1:6E:E6:A8:2C:4F:90:85:BC:E2:BD:0A:CF:D3:47:53 Fingerprint (SHA1): 93:FA:68:00:D0:83:31:A6:D4:79:15:AD:50:F2:F7:9A:17:61:BD:1C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2014: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145633 (0x49157f61) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Thu Dec 26 14:59:22 2024 Not After : Wed Dec 26 14:59:22 2074 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:e7:49:e4:40:30:3f:61:bd:41:36:1d:85:a5:cc:73: c5:7d:38:05:2f:bc:44:9b:f9:8d:ff:a2:d5:a3:43:bb: 04:23:67:c4:66:a6:b6:0e:e9:87:4a:4e:7f:37:90:b1: 15:fb:11:d6:9a:bc:08:da:4e:9b:1d:00:8f:0b:14:a0: 9a:66:0b:da:6a:e9:39:c7:34:d7:5d:c3:d0:ac:e5:df: 6b:4b:99:3a:32:2b:ef:cd:81:df:59:e9:40:e6:2f:67: 10:e0:b3:bb:e9:15:00:f5:aa:3f:7e:3e:6b:2a:36:31: 40:b7:44:ad:a4:91:7a:23:12:32:49:85:3b:28:c1:33: 13:a0:17:af:55:c8:f9:11:68:08:f0:de:5a:2d:f1:b4: 07:0e:a3:df:5c:0c:c8:7f:14:35:4e:5d:04:36:5a:98: 64:d9:cd:c9:77:b3:84:84:a0:bf:8e:fe:34:c3:b2:80: 96:ee:5e:70:ee:23:95:65:e1:8b:03:57:e9:10:24:48: 78:be:70:43:e1:6b:b7:aa:61:d0:69:9b:dd:b0:f9:88: 9b:82:4d:bb:64:78:22:0d:4a:de:0e:ff:4c:e9:fa:35: 6c:7d:88:99:5a:7b:9a:4a:9e:ed:f7:9b:b9:27:06:a8: e9:a4:ec:fd:b1:34:38:7c:cc:06:64:b4:f6:f8:da:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:f2:d1:72:2f:63:4b:23:c6:b3:d1:0a:58:ae:fd:58: e3:7e:fd:10:6c:3f:8c:69:92:7e:46:df:34:42:0a:a3: 31:66:44:61:bd:eb:b4:13:fe:66:95:bf:5f:f5:41:9b: 5d:ae:32:a0:26:17:3c:d3:64:c7:42:64:b0:15:80:e5: b5:49:02:7f:d8:ee:65:51:b9:3e:44:ba:21:67:8e:29: 22:83:ed:4c:a5:ee:8e:32:c0:d8:53:cc:3c:58:61:e8: d4:27:87:8e:f5:bb:10:9f:91:6f:18:f6:0e:ae:6d:fd: 63:b7:f1:a7:a3:df:54:5d:00:f7:bb:f9:6c:64:6b:8e: 8c:0a:22:cc:3a:0d:5a:02:af:08:cf:f6:8e:57:9e:22: d4:6f:8b:cb:f7:0a:b9:1d:a8:c8:ad:0f:cb:f9:b7:55: 0e:7a:84:ac:4b:c3:3a:7e:54:df:b1:7b:59:a2:da:a5: e7:df:4a:35:bd:91:a0:29:75:8d:3d:ad:21:86:42:2c: 84:e1:98:79:d9:c1:27:e5:d6:e7:66:d9:61:5b:d4:f6: 17:80:20:39:3f:10:a3:88:aa:5a:10:46:16:f5:63:bc: c8:bb:ee:1e:87:f7:ea:12:1a:25:78:98:52:6b:59:79: ff:28:5d:d1:d5:2e:f5:ee:14:83:39:59:41:e1:06:69 Fingerprint (SHA-256): EE:A4:AE:99:AA:01:65:5F:10:CA:9D:41:B3:8D:03:DB:63:34:43:63:8E:68:87:5C:8A:3F:8C:2F:52:5F:A4:67 Fingerprint (SHA1): B0:5A:41:C6:89:2A:B2:79:67:CD:3A:E7:F3:6C:DD:AF:D3:D5:62:A7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2015: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145634 (0x49157f62) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Thu Dec 26 14:59:23 2024 Not After : Wed Dec 26 14:59:23 2074 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f3:73:8e:00:e3:7a:e1:83:f1:24:02:3f:3c:81:6d:fe: a4:a2:2a:68:20:ed:77:65:73:35:5e:f1:88:89:5d:47: f8:70:e0:b8:7b:2b:2e:4d:58:90:1d:1c:89:51:a5:cc: 3d:8e:c6:94:09:19:b6:31:c1:65:95:20:70:47:ba:7d: 33:51:f1:fb:bb:42:81:06:a1:18:5e:9e:76:da:25:b2: da:8c:02:92:98:16:11:e9:62:e7:66:5a:8d:9b:7f:bd: 23:21:ff:55:ae:7d:1c:52:54:f8:7a:dd:4d:9a:7d:a8: 70:06:62:fb:37:5b:64:3e:dc:e0:90:e5:f9:51:20:ca: 7f:35:1a:6b:b7:af:6d:69:09:ee:27:53:f6:de:47:bd: 38:a5:91:a3:7a:3a:33:29:8b:b4:d2:69:1d:a3:2a:34: 25:6f:83:2b:f6:ed:98:b9:ef:e4:47:a9:af:a4:39:b2: 1d:9b:a0:58:fc:46:0a:37:e8:48:79:38:68:2b:e9:47: f8:c9:53:08:19:7c:cc:ed:bc:5f:90:6e:18:01:28:d2: f8:b8:2c:aa:88:24:2e:eb:b6:e9:f1:d5:18:41:35:54: 22:12:2d:45:03:7e:22:15:53:6b:d2:67:d9:d2:35:ea: d2:e8:12:65:c0:b7:57:24:f6:56:ee:27:f4:50:0c:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:cc:53:6f:a3:59:5f:ff:d4:ce:fe:2d:df:f5:74:60: b7:d7:30:d8:87:90:7c:fa:02:61:74:4e:7d:9c:04:9f: 49:36:96:d0:0d:67:16:f8:d8:28:01:b3:c0:ff:82:29: fe:26:32:da:61:85:ca:c7:a3:31:ca:a0:81:56:b2:60: ae:ba:4b:66:4e:db:41:43:94:b3:46:23:ec:91:28:18: 17:6f:b8:d1:02:73:2c:65:23:ee:43:ae:64:9f:c2:41: 1a:82:27:f9:c8:51:d7:5d:0b:16:33:81:f3:25:9f:f1: e7:28:5b:7c:b0:f1:07:18:75:2a:c9:64:a9:95:f9:52: ba:18:d5:38:fa:99:7d:d1:0a:0e:fd:02:42:70:d6:62: 29:0c:8a:04:44:f6:3c:2a:26:3c:8b:88:57:d7:4e:b7: 85:b3:65:2f:2b:2c:c8:23:87:1e:6c:cc:97:82:97:7d: 41:a2:80:7c:a9:42:72:76:d1:2d:a5:ac:9f:43:05:d7: 61:1b:58:60:75:c5:48:dd:ba:cd:bb:c9:52:da:16:4c: 5e:ea:6b:17:a9:1f:72:f4:29:af:61:21:16:6f:30:03: 52:2a:89:f3:5c:4c:01:74:c1:bf:90:b7:03:04:da:18: e4:c0:f8:e4:f7:75:9c:e2:52:bd:30:f2:82:a1:4b:29 Fingerprint (SHA-256): 4F:44:A5:43:4D:EF:43:75:12:AF:74:71:FA:FC:DA:3D:D4:B5:3F:DC:48:A4:4B:C7:67:5C:A2:E5:91:A0:BB:7D Fingerprint (SHA1): 51:D0:AC:1B:F7:8D:85:D5:2B:9A:58:AB:E7:53:C9:48:87:81:9B:0F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2016: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145635 (0x49157f63) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Thu Dec 26 14:59:24 2024 Not After : Wed Dec 26 14:59:24 2074 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:74:00:34:79:3d:78:2e:52:8e:6d:ca:cf:12:2f:db: 00:4e:1b:ae:ff:49:37:02:d9:c8:dc:bc:19:1e:0d:8a: 39:68:b3:5b:44:47:79:27:ba:c2:aa:b9:29:59:ec:86: 95:2e:94:41:26:40:3c:a6:b7:08:40:8b:d5:60:2e:9d: 64:0e:e1:ed:3c:c8:e6:84:64:74:a3:de:75:0a:b7:e9: f8:c6:4b:ba:5a:d0:19:fd:62:2c:a5:7d:8f:dc:8f:c1: d3:47:f0:4e:77:03:db:aa:46:7d:fa:f5:59:cc:82:da: b8:b5:20:50:ab:1c:4b:a6:d2:5e:c6:d9:df:73:70:ce: fe:26:44:96:86:32:d7:dd:56:d1:33:c1:a9:84:9e:86: 02:0f:96:3f:01:f0:01:d0:67:b4:28:29:08:fc:2a:9c: 82:e7:52:6b:48:c2:70:4c:12:af:50:75:ac:39:02:a4: c3:ed:ac:97:e4:0a:fd:1b:ce:36:0e:d2:23:f3:d2:cf: 0c:5a:66:7b:c8:a3:d6:ee:86:42:eb:ad:98:5e:a7:0e: 10:f5:b3:a5:a5:fd:9b:c8:b9:00:63:eb:5b:1f:bc:89: 24:07:5b:84:dc:39:72:bd:a4:18:ec:8a:a5:b0:83:ca: a7:9a:d5:48:0d:a7:a0:31:01:21:6c:ea:90:ea:a4:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:48:12:7f:44:45:3d:ed:65:1f:72:a2:aa:73:7d:68: 6e:d0:4a:a1:a2:80:b1:69:fa:68:7e:ab:2e:5b:fb:8c: ef:b4:9b:f6:15:b4:01:47:8f:4d:ce:1e:34:6a:8b:4a: d3:ef:e8:64:a6:61:90:58:ff:cb:6e:d8:02:b8:85:61: 1e:73:6e:82:1d:21:65:5c:06:fd:7b:80:fb:23:10:a2: 8f:1c:7d:8a:7b:0b:be:99:30:35:e5:fe:bf:f0:6d:8a: c2:19:f5:6d:0c:42:79:22:c5:b9:50:81:88:e4:02:1b: 3a:ef:af:d1:c3:ea:70:7c:e6:9f:32:0b:a4:31:35:62: 55:21:c9:f1:ec:ab:ab:1f:95:11:c6:7f:9c:12:a8:0c: ae:6b:ef:1b:4d:8e:92:88:0e:07:51:88:50:33:2c:f9: 7d:95:49:1e:c5:9c:9b:c9:78:a5:31:10:e6:e5:d7:ac: ba:6f:b2:70:a2:d3:2f:a3:4d:96:4b:42:ee:3e:c5:6d: 2d:df:28:7e:aa:bd:9c:52:ad:77:4a:bc:4f:bf:cc:2d: c4:ca:05:ea:8d:9e:70:7b:20:30:ce:ba:b4:49:8c:c1: 51:45:59:c2:3f:2a:45:a5:7b:54:a0:5b:b5:25:1c:48: 09:5c:f2:6e:3f:0d:10:3c:e6:c9:07:f1:f6:94:85:00 Fingerprint (SHA-256): 53:DE:DA:E7:74:3B:48:38:FE:75:F6:B5:CF:46:93:BC:63:27:6A:09:B8:D2:C6:A6:52:57:50:0B:3A:04:07:1E Fingerprint (SHA1): ED:79:05:EB:C2:ED:49:A4:CC:DD:16:56:67:C9:4C:5C:1B:55:E6:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2017: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145636 (0x49157f64) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Thu Dec 26 14:59:24 2024 Not After : Wed Dec 26 14:59:24 2074 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:e9:f2:27:53:c0:b5:ca:6f:4a:3d:f1:76:d5:b3:6f: da:73:da:73:08:6e:d1:d2:70:88:e4:57:6b:7e:d9:ea: 55:c9:c1:a1:ae:ec:99:09:d9:f4:27:e5:be:04:fc:53: ae:45:76:ff:15:dc:52:4c:d0:03:af:32:ea:dd:26:2e: b8:7d:7c:e2:12:0c:75:e8:05:25:cb:e5:dd:08:c5:21: 70:bc:b4:af:13:2a:ff:28:3a:88:1c:78:39:0f:43:52: 3e:af:c1:ba:cb:7a:69:74:65:e2:ce:89:25:90:62:80: 29:51:bc:9c:b5:a9:f7:16:26:39:2e:39:c1:a6:6d:41: e6:1f:98:02:9d:5b:55:73:1d:07:71:91:57:7d:d4:19: 47:2f:4d:f8:8e:76:dc:af:6c:33:be:d3:81:be:3c:bd: 64:fa:31:74:b8:3e:c4:32:e9:dd:2d:c4:aa:ad:db:79: 2f:e0:6e:cd:a6:4c:f6:3d:88:bc:68:f4:c3:c8:8b:14: f4:24:8c:ea:39:72:ed:bf:19:78:50:d1:84:6b:f0:dc: 66:e7:7f:ed:d0:05:9a:a6:5a:4a:d5:57:80:b8:16:07: 24:14:ce:d6:0b:ea:9e:80:00:a9:26:ec:64:16:f6:86: b3:f9:fa:c0:07:fd:b6:da:48:d8:e9:ea:db:f5:e3:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:22:5e:f9:18:79:e7:a4:4b:80:b0:aa:1c:0a:37:f1: e5:3d:7a:3a:d1:7b:34:92:2f:29:40:99:4b:82:2f:92: cd:54:ff:70:92:69:01:ed:8d:ed:2c:47:aa:21:de:2a: b9:5d:1f:07:82:e2:ca:40:84:44:e3:47:f0:7c:bf:c5: 4e:ba:80:89:d2:7c:42:43:b7:43:dd:63:49:8e:73:e6: c3:c3:af:b5:e1:36:90:9e:33:f2:44:ac:bd:ba:6c:4b: 3b:b0:d8:9d:24:2a:02:b2:84:0f:f4:01:f3:54:6e:77: 29:61:55:62:17:82:c4:4e:53:9e:ae:a5:c4:c7:d8:00: 50:a0:67:c1:f7:72:22:83:af:a2:32:fe:0d:40:50:5f: 91:9e:b7:31:13:db:0a:47:95:bf:da:7f:9c:78:0e:89: de:86:31:dc:e6:74:ca:a2:d2:86:70:87:8e:85:06:04: 1b:7b:50:7c:8c:72:0d:1b:d0:a8:b6:bf:98:b6:96:f7: 5a:24:df:e9:dc:be:a1:6f:c0:d2:e9:c9:78:6d:59:0d: 13:06:34:df:80:4e:71:07:19:60:f7:2c:a7:2e:f4:64: f7:a9:a8:e5:f6:65:29:bc:f9:9f:e4:7e:ca:35:31:94: d5:72:45:8b:48:a2:54:bd:3b:54:ba:4a:bc:6c:e3:f3 Fingerprint (SHA-256): 6A:DD:9F:E8:43:11:9A:B7:19:2A:2C:78:FD:58:57:47:41:7E:DC:2A:A3:A1:AE:97:A4:B0:2E:14:7D:A0:A0:3D Fingerprint (SHA1): FE:30:7F:DA:66:B0:A1:A2:37:07:B3:A5:55:04:88:2E:79:DF:AE:69 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2018: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145637 (0x49157f65) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Thu Dec 26 14:59:25 2024 Not After : Wed Dec 26 14:59:25 2074 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:98:af:59:15:e5:99:d7:c2:32:90:81:11:a1:14:e8: 7e:81:6a:8b:7d:a5:df:75:5b:66:e7:2f:aa:be:cb:64: 11:53:ff:e9:01:1e:3b:2b:29:f4:90:55:3f:cb:99:96: da:24:bd:ac:89:c8:fb:0d:bb:3a:2b:66:23:3a:fd:40: 11:0d:0b:19:73:70:a4:bc:7f:24:1c:1d:04:97:3b:f2: d4:f8:fe:0c:3a:ac:b1:c9:a3:92:56:a0:ee:5c:9f:85: 43:2f:49:6c:5c:e0:3e:21:4c:15:4d:d2:7a:1e:71:5b: f2:20:9c:21:e8:81:16:1e:d0:2a:4b:59:db:58:a1:d4: 68:e7:0f:8d:25:6a:a5:df:cd:77:89:ae:7e:fd:7e:f8: 3e:f8:30:27:a5:99:ec:59:b4:1e:0f:4e:22:43:87:38: 39:7f:9a:c5:c0:b5:33:0a:ee:0b:40:bd:b6:6a:ce:c2: 0b:1f:91:80:a9:ce:0d:18:92:cb:94:31:46:02:63:33: de:32:47:30:0a:18:d8:41:42:00:2f:56:67:b8:5c:b9: 70:50:5a:eb:f5:2a:9d:c6:bd:de:a9:c4:66:eb:b9:c1: 32:13:48:66:ed:36:9d:fb:9a:d5:7b:2f:85:cb:a7:f7: 95:d8:a1:5f:62:8d:ca:f6:20:2e:b0:5b:29:26:e6:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:12:d6:c9:82:5d:37:73:0c:b0:2c:df:3a:ae:d9:87: 84:fe:50:81:1d:70:9a:9f:f6:45:b5:b4:8a:c8:da:55: 2b:ed:b8:f7:e8:d1:6e:5a:d6:00:84:27:55:a1:a5:12: cb:be:7a:74:42:0c:89:4b:41:ba:57:78:f4:23:1f:f7: 16:c5:a9:65:d5:62:d7:c9:7c:e2:bc:1e:e1:43:fd:97: 50:6b:cd:e7:a7:1d:ed:ef:ab:12:00:d3:40:a7:83:7c: 80:8a:74:45:4f:f5:a4:7e:65:3f:58:e8:77:c9:fd:de: 43:ce:1b:5a:a3:b4:7d:da:d5:21:b4:93:3c:82:3e:28: 64:82:43:66:ba:42:18:a9:9d:6f:f3:e3:fc:a7:bd:4d: 8a:dc:54:56:bc:01:61:86:2f:94:50:3b:f2:d9:ca:0c: c5:5c:c0:73:32:55:1f:ca:4b:97:5e:33:91:74:ee:b4: 39:3f:40:59:00:fc:b5:bf:9d:c0:9d:4c:d1:d0:11:f3: 3a:08:85:4f:de:58:31:b5:0b:ed:5f:f5:1b:4f:96:b4: 9b:16:49:22:81:d9:6c:7b:2c:90:08:4f:35:09:31:c2: f4:cb:24:da:fa:4b:35:5d:ea:9c:22:83:f4:f5:b8:19: 0a:a8:0f:41:01:14:a0:fc:7f:22:8b:fa:5a:fc:67:e3 Fingerprint (SHA-256): EA:4E:D4:03:F4:C9:2C:09:99:85:67:EF:B4:D4:ED:11:86:46:A0:60:07:0C:2B:0A:69:0F:F1:40:3D:73:88:68 Fingerprint (SHA1): 2B:9D:EA:3F:C7:49:4E:13:79:E0:DF:42:ED:5F:EC:DD:F3:FC:11:5E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2019: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2020: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145652 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2021: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2022: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2023: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2024: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145653 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2025: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2026: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2027: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2028: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145654 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2029: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2030: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2031: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2032: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145655 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2033: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2034: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2035: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145652 (0x49157f74) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:34 2024 Not After : Wed Dec 26 14:59:34 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:2d:f9:16:42:a3:97:4f:6c:3f:d8:7d:fd:1c:cd:41: a9:61:c3:42:09:1f:a8:2a:46:e9:3e:13:59:9d:2e:28: d3:e3:32:f1:3c:9a:ab:31:b2:4a:80:d8:4a:68:73:66: d9:9f:8f:1c:3e:dd:fb:7e:04:2c:1b:cf:32:e4:05:33: 5c:07:59:09:86:6e:51:d5:3f:de:c9:f1:8a:71:84:4d: 70:fb:4d:03:32:a3:12:bf:b3:4e:64:e7:52:5d:6a:c2: ab:f0:63:d1:d5:35:e8:d4:c6:7a:f5:f3:3a:f3:f1:ae: c4:2e:8d:98:e4:c4:72:de:e8:b1:9a:f1:f9:26:ae:5f: 01:2c:5b:51:f4:7c:e9:3a:1b:96:af:e5:b0:60:96:e5: 77:04:7f:b8:a2:49:a1:d1:d3:99:4f:fc:03:ec:d1:f9: a5:01:02:13:2c:a7:6c:e2:fd:a3:0e:0f:5e:03:07:1c: b0:f6:4c:a0:65:33:d4:a5:4a:fc:04:36:9c:bf:04:1d: d9:d4:73:dc:09:bc:d5:f0:ad:36:0f:a8:d2:18:2d:72: 31:18:93:76:d1:a2:cb:c6:ee:f3:ce:90:b5:e0:52:37: 71:2f:a3:be:1a:e7:5b:37:35:6f:69:2a:35:01:35:d8: b5:58:be:7b:31:8f:09:c4:0a:a2:ab:ee:bf:1d:48:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:c7:02:a4:bc:09:95:e5:bb:33:cd:94:aa:3d:93:db: 7d:88:3e:6f:c1:f3:a6:30:44:b6:f0:00:6d:f7:74:8a: 5c:af:37:d9:5e:ea:1d:85:2a:50:bb:47:cc:4f:bb:a6: ae:df:97:fa:31:15:f3:97:0d:09:36:0c:a5:5b:1d:b9: c7:89:0a:b5:42:3c:18:cd:82:b7:b5:c3:6c:c6:67:23: 54:8c:60:ab:15:28:d8:d8:32:e8:7c:df:6c:5e:37:21: 17:c6:31:ef:e0:d5:de:22:0c:e8:35:7b:d5:6b:6a:44: 63:e6:57:4c:3a:2f:6f:d0:b2:5b:52:8e:2d:57:91:24: 62:61:d2:28:2b:c6:77:5a:26:3e:fc:94:e0:cf:3b:bd: bc:81:0a:3d:26:39:db:31:93:15:78:fd:81:5a:ff:51: 4d:4c:91:e6:89:cb:41:b8:92:f0:ac:2e:17:05:da:de: ad:98:73:ff:55:5e:a6:cb:a0:88:35:06:4d:d8:80:df: 22:32:d7:f9:1f:de:2c:e1:3a:29:f5:df:97:5d:41:d6: a0:6d:9f:82:67:4c:31:86:ee:a7:e6:32:e4:5f:a7:9d: a0:13:5e:e2:40:91:7f:70:f2:14:fd:29:f0:61:e3:be: 20:b1:dc:30:1f:2d:9b:ea:73:60:02:cb:5f:30:37:32 Fingerprint (SHA-256): 3C:68:64:5E:69:3A:30:83:1E:E1:84:6E:97:A4:CF:51:08:15:11:9B:4F:98:40:75:7A:75:B8:30:A7:AB:08:02 Fingerprint (SHA1): 20:95:7E:B8:60:CC:27:1B:EB:E5:60:65:3A:0F:1E:24:9D:D9:45:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2036: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2037: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145653 (0x49157f75) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:34 2024 Not After : Wed Dec 26 14:59:34 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ff:55:ba:59:4b:74:c9:2f:9a:ff:8b:89:66:0a:bc: 4e:3e:77:0e:c2:eb:75:35:6b:08:de:49:b0:4a:ad:37: 9c:f2:8e:53:15:45:e0:32:09:b5:ea:7c:40:e5:4f:02: 2f:22:09:64:e8:5c:20:dc:2c:b5:0c:01:e0:fc:44:cd: 47:ca:7a:ea:d0:42:f3:ff:e3:8a:6e:5c:0a:df:78:e0: 19:af:c6:ee:9a:55:d4:8b:1e:8d:d6:53:bc:cf:89:1f: dd:2a:50:f7:c5:8b:1d:8c:3b:ae:5c:1d:ac:20:66:3a: 51:64:99:bd:26:9c:2c:db:28:36:57:17:64:8e:55:66: 9c:67:50:b3:8f:2b:d2:43:ba:0d:92:e2:f9:5d:33:c7: 39:7d:5f:6d:d7:90:49:6b:07:75:37:13:ee:ff:52:24: 79:86:57:9f:ce:73:1b:6a:d3:b7:b2:49:86:88:9f:fd: 77:0b:b2:13:4f:30:c0:a5:77:64:c1:5c:a1:ca:68:51: 83:3f:c3:7d:fd:76:c1:3e:1a:bb:5c:5a:c1:fa:4a:eb: 75:32:68:52:10:10:92:e6:5a:d0:dc:66:b7:8f:ff:e8: 08:6f:3e:e0:c2:ac:0f:17:78:70:78:a0:9a:bf:fb:ee: 8f:3b:bf:24:20:24:54:74:b8:71:2f:c8:d8:8f:99:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:9c:e0:1c:f5:99:9c:9c:84:60:5b:0a:6a:d1:27:eb: a5:4c:9f:9a:1d:27:4a:34:c9:09:7a:da:dc:c1:f9:f2: 8a:58:c6:ef:32:b6:6b:05:7f:83:f9:e0:69:fc:f3:a0: fc:cc:9b:fa:c9:ae:01:45:1a:f1:b8:80:37:61:53:63: fe:db:e5:04:2e:dc:13:ae:03:5b:71:35:c7:1b:ae:f1: 33:66:2c:c7:f0:63:a5:e0:c9:a8:11:8d:58:d5:db:1a: 58:e0:27:1c:73:e4:11:e0:23:22:b1:d8:9b:52:45:b3: 14:80:e2:32:a0:93:6e:06:12:50:57:c1:2a:49:db:ba: c1:3d:26:b4:b7:c6:6d:05:ea:16:6c:be:ae:d0:69:9b: e7:8a:ac:6c:16:03:83:91:cd:10:66:0d:a2:25:8d:98: 43:dd:b9:80:72:1c:14:42:31:e4:b6:9a:3a:85:16:4f: f0:34:fb:de:0e:a6:42:c7:07:81:20:13:d3:79:b1:cc: 4e:d0:51:13:dc:42:41:ad:21:32:ab:dc:0e:f1:66:26: f5:ff:3f:c1:54:96:42:9d:2f:23:b4:10:57:5e:33:c8: e6:d2:fd:28:17:ac:dc:f8:dc:f8:23:5b:56:a8:4b:6a: c5:fb:3c:81:69:36:b7:60:c0:94:5d:14:57:5a:18:54 Fingerprint (SHA-256): 9E:E2:D6:50:83:75:72:47:0B:92:A1:1D:77:50:20:D0:11:19:8E:3D:1E:72:47:67:47:B6:6B:7F:51:F5:86:F5 Fingerprint (SHA1): 33:92:39:C4:39:D8:0F:73:B4:A3:85:86:76:77:16:88:28:F7:8D:3A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2038: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2039: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145654 (0x49157f76) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:35 2024 Not After : Wed Dec 26 14:59:35 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:86:92:0a:7b:43:1e:d8:0f:90:8c:4b:bc:b9:56:62: 40:2f:e3:e0:c7:fb:68:59:40:43:27:d4:4e:d8:9d:b3: c8:9a:d5:f7:22:87:75:8b:cd:10:ec:9f:ac:3a:51:c5: 81:d4:06:bc:59:35:d8:a8:82:1e:88:1a:e8:26:5a:9e: fc:bb:50:eb:0c:97:6a:4e:09:d4:48:a6:45:1c:f0:dd: bb:81:7e:e3:60:1b:98:e4:58:9f:c3:2d:60:23:68:59: 76:b8:57:d3:ef:d9:eb:cd:88:5e:84:eb:5e:90:52:b3: 0a:7b:71:62:30:99:e7:5b:4c:4a:41:e8:e7:6e:45:f2: 52:c7:35:67:e7:1a:27:93:e2:65:73:89:4d:aa:e3:e7: 5c:0d:1c:97:d6:0e:68:74:4c:4f:95:d4:a5:8a:70:c1: a5:f2:e9:3a:63:78:bb:d1:78:a3:26:bc:92:02:f1:c8: 51:c4:8e:da:32:d5:22:dd:82:c0:a9:12:41:9f:61:21: 77:c6:3b:47:eb:e0:0d:61:c7:67:ea:aa:b4:d0:23:0f: 19:59:7a:49:7a:05:b1:9a:36:b5:27:8e:a7:40:ec:be: f2:fd:6a:7e:99:04:55:9f:f6:fc:a2:d2:5f:bd:df:8b: ed:ea:8e:36:4d:d8:f0:4b:3c:67:62:aa:dc:c3:4d:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:fb:b0:f2:e7:49:6b:8e:8c:33:49:77:06:09:8a:f9: 2b:82:d7:b0:e3:08:78:9c:52:e5:94:b4:1c:75:dd:33: ca:b2:01:93:e0:d4:51:0a:39:83:83:89:91:05:8f:b1: bb:e6:1c:6a:7f:08:67:68:8f:bd:19:19:48:a6:d5:7b: 66:1d:f6:e0:ee:b9:bf:26:bf:e2:5f:80:9c:2e:20:ae: 7e:82:13:70:29:6b:48:8b:26:0e:42:56:d1:26:5f:9b: 47:b4:64:3b:26:ab:b0:68:4d:e8:45:b9:76:47:c5:3e: 35:3e:64:46:02:53:9d:e2:a8:24:ae:51:82:97:d7:7e: 26:1d:95:53:64:22:10:19:ce:54:a8:8b:30:2e:be:70: ee:c1:de:2b:45:66:d3:81:77:62:71:7a:9d:37:ba:3a: 75:0d:bc:84:36:95:bf:89:57:55:e4:b2:c2:da:9e:cd: 6d:f2:dd:c9:f9:b8:54:6d:da:c3:1c:71:53:58:96:f9: 2d:b0:fd:93:f4:e3:b7:ea:b6:2e:07:f7:e3:b9:68:e4: 5e:c6:f6:9e:f3:ea:3b:fb:eb:86:10:5f:1e:50:7c:73: 53:7f:66:3a:95:5e:16:86:b6:18:c6:10:72:96:22:bf: 68:94:52:c9:6b:78:2f:64:02:29:4b:7f:c6:49:8e:68 Fingerprint (SHA-256): CA:2E:EB:87:A6:AD:26:A7:4A:0A:F4:DE:25:BF:E8:09:CD:F6:6E:97:89:F9:EA:3E:30:D1:40:68:C0:36:23:07 Fingerprint (SHA1): 24:25:7C:33:B4:EC:0B:EE:71:53:1A:0A:BE:70:D9:B0:5C:91:BD:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2040: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2041: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2042: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2043: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2044: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145652 (0x49157f74) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:34 2024 Not After : Wed Dec 26 14:59:34 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:2d:f9:16:42:a3:97:4f:6c:3f:d8:7d:fd:1c:cd:41: a9:61:c3:42:09:1f:a8:2a:46:e9:3e:13:59:9d:2e:28: d3:e3:32:f1:3c:9a:ab:31:b2:4a:80:d8:4a:68:73:66: d9:9f:8f:1c:3e:dd:fb:7e:04:2c:1b:cf:32:e4:05:33: 5c:07:59:09:86:6e:51:d5:3f:de:c9:f1:8a:71:84:4d: 70:fb:4d:03:32:a3:12:bf:b3:4e:64:e7:52:5d:6a:c2: ab:f0:63:d1:d5:35:e8:d4:c6:7a:f5:f3:3a:f3:f1:ae: c4:2e:8d:98:e4:c4:72:de:e8:b1:9a:f1:f9:26:ae:5f: 01:2c:5b:51:f4:7c:e9:3a:1b:96:af:e5:b0:60:96:e5: 77:04:7f:b8:a2:49:a1:d1:d3:99:4f:fc:03:ec:d1:f9: a5:01:02:13:2c:a7:6c:e2:fd:a3:0e:0f:5e:03:07:1c: b0:f6:4c:a0:65:33:d4:a5:4a:fc:04:36:9c:bf:04:1d: d9:d4:73:dc:09:bc:d5:f0:ad:36:0f:a8:d2:18:2d:72: 31:18:93:76:d1:a2:cb:c6:ee:f3:ce:90:b5:e0:52:37: 71:2f:a3:be:1a:e7:5b:37:35:6f:69:2a:35:01:35:d8: b5:58:be:7b:31:8f:09:c4:0a:a2:ab:ee:bf:1d:48:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:c7:02:a4:bc:09:95:e5:bb:33:cd:94:aa:3d:93:db: 7d:88:3e:6f:c1:f3:a6:30:44:b6:f0:00:6d:f7:74:8a: 5c:af:37:d9:5e:ea:1d:85:2a:50:bb:47:cc:4f:bb:a6: ae:df:97:fa:31:15:f3:97:0d:09:36:0c:a5:5b:1d:b9: c7:89:0a:b5:42:3c:18:cd:82:b7:b5:c3:6c:c6:67:23: 54:8c:60:ab:15:28:d8:d8:32:e8:7c:df:6c:5e:37:21: 17:c6:31:ef:e0:d5:de:22:0c:e8:35:7b:d5:6b:6a:44: 63:e6:57:4c:3a:2f:6f:d0:b2:5b:52:8e:2d:57:91:24: 62:61:d2:28:2b:c6:77:5a:26:3e:fc:94:e0:cf:3b:bd: bc:81:0a:3d:26:39:db:31:93:15:78:fd:81:5a:ff:51: 4d:4c:91:e6:89:cb:41:b8:92:f0:ac:2e:17:05:da:de: ad:98:73:ff:55:5e:a6:cb:a0:88:35:06:4d:d8:80:df: 22:32:d7:f9:1f:de:2c:e1:3a:29:f5:df:97:5d:41:d6: a0:6d:9f:82:67:4c:31:86:ee:a7:e6:32:e4:5f:a7:9d: a0:13:5e:e2:40:91:7f:70:f2:14:fd:29:f0:61:e3:be: 20:b1:dc:30:1f:2d:9b:ea:73:60:02:cb:5f:30:37:32 Fingerprint (SHA-256): 3C:68:64:5E:69:3A:30:83:1E:E1:84:6E:97:A4:CF:51:08:15:11:9B:4F:98:40:75:7A:75:B8:30:A7:AB:08:02 Fingerprint (SHA1): 20:95:7E:B8:60:CC:27:1B:EB:E5:60:65:3A:0F:1E:24:9D:D9:45:37 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2045: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2046: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145653 (0x49157f75) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:34 2024 Not After : Wed Dec 26 14:59:34 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ff:55:ba:59:4b:74:c9:2f:9a:ff:8b:89:66:0a:bc: 4e:3e:77:0e:c2:eb:75:35:6b:08:de:49:b0:4a:ad:37: 9c:f2:8e:53:15:45:e0:32:09:b5:ea:7c:40:e5:4f:02: 2f:22:09:64:e8:5c:20:dc:2c:b5:0c:01:e0:fc:44:cd: 47:ca:7a:ea:d0:42:f3:ff:e3:8a:6e:5c:0a:df:78:e0: 19:af:c6:ee:9a:55:d4:8b:1e:8d:d6:53:bc:cf:89:1f: dd:2a:50:f7:c5:8b:1d:8c:3b:ae:5c:1d:ac:20:66:3a: 51:64:99:bd:26:9c:2c:db:28:36:57:17:64:8e:55:66: 9c:67:50:b3:8f:2b:d2:43:ba:0d:92:e2:f9:5d:33:c7: 39:7d:5f:6d:d7:90:49:6b:07:75:37:13:ee:ff:52:24: 79:86:57:9f:ce:73:1b:6a:d3:b7:b2:49:86:88:9f:fd: 77:0b:b2:13:4f:30:c0:a5:77:64:c1:5c:a1:ca:68:51: 83:3f:c3:7d:fd:76:c1:3e:1a:bb:5c:5a:c1:fa:4a:eb: 75:32:68:52:10:10:92:e6:5a:d0:dc:66:b7:8f:ff:e8: 08:6f:3e:e0:c2:ac:0f:17:78:70:78:a0:9a:bf:fb:ee: 8f:3b:bf:24:20:24:54:74:b8:71:2f:c8:d8:8f:99:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:9c:e0:1c:f5:99:9c:9c:84:60:5b:0a:6a:d1:27:eb: a5:4c:9f:9a:1d:27:4a:34:c9:09:7a:da:dc:c1:f9:f2: 8a:58:c6:ef:32:b6:6b:05:7f:83:f9:e0:69:fc:f3:a0: fc:cc:9b:fa:c9:ae:01:45:1a:f1:b8:80:37:61:53:63: fe:db:e5:04:2e:dc:13:ae:03:5b:71:35:c7:1b:ae:f1: 33:66:2c:c7:f0:63:a5:e0:c9:a8:11:8d:58:d5:db:1a: 58:e0:27:1c:73:e4:11:e0:23:22:b1:d8:9b:52:45:b3: 14:80:e2:32:a0:93:6e:06:12:50:57:c1:2a:49:db:ba: c1:3d:26:b4:b7:c6:6d:05:ea:16:6c:be:ae:d0:69:9b: e7:8a:ac:6c:16:03:83:91:cd:10:66:0d:a2:25:8d:98: 43:dd:b9:80:72:1c:14:42:31:e4:b6:9a:3a:85:16:4f: f0:34:fb:de:0e:a6:42:c7:07:81:20:13:d3:79:b1:cc: 4e:d0:51:13:dc:42:41:ad:21:32:ab:dc:0e:f1:66:26: f5:ff:3f:c1:54:96:42:9d:2f:23:b4:10:57:5e:33:c8: e6:d2:fd:28:17:ac:dc:f8:dc:f8:23:5b:56:a8:4b:6a: c5:fb:3c:81:69:36:b7:60:c0:94:5d:14:57:5a:18:54 Fingerprint (SHA-256): 9E:E2:D6:50:83:75:72:47:0B:92:A1:1D:77:50:20:D0:11:19:8E:3D:1E:72:47:67:47:B6:6B:7F:51:F5:86:F5 Fingerprint (SHA1): 33:92:39:C4:39:D8:0F:73:B4:A3:85:86:76:77:16:88:28:F7:8D:3A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2047: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2048: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145654 (0x49157f76) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:35 2024 Not After : Wed Dec 26 14:59:35 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:86:92:0a:7b:43:1e:d8:0f:90:8c:4b:bc:b9:56:62: 40:2f:e3:e0:c7:fb:68:59:40:43:27:d4:4e:d8:9d:b3: c8:9a:d5:f7:22:87:75:8b:cd:10:ec:9f:ac:3a:51:c5: 81:d4:06:bc:59:35:d8:a8:82:1e:88:1a:e8:26:5a:9e: fc:bb:50:eb:0c:97:6a:4e:09:d4:48:a6:45:1c:f0:dd: bb:81:7e:e3:60:1b:98:e4:58:9f:c3:2d:60:23:68:59: 76:b8:57:d3:ef:d9:eb:cd:88:5e:84:eb:5e:90:52:b3: 0a:7b:71:62:30:99:e7:5b:4c:4a:41:e8:e7:6e:45:f2: 52:c7:35:67:e7:1a:27:93:e2:65:73:89:4d:aa:e3:e7: 5c:0d:1c:97:d6:0e:68:74:4c:4f:95:d4:a5:8a:70:c1: a5:f2:e9:3a:63:78:bb:d1:78:a3:26:bc:92:02:f1:c8: 51:c4:8e:da:32:d5:22:dd:82:c0:a9:12:41:9f:61:21: 77:c6:3b:47:eb:e0:0d:61:c7:67:ea:aa:b4:d0:23:0f: 19:59:7a:49:7a:05:b1:9a:36:b5:27:8e:a7:40:ec:be: f2:fd:6a:7e:99:04:55:9f:f6:fc:a2:d2:5f:bd:df:8b: ed:ea:8e:36:4d:d8:f0:4b:3c:67:62:aa:dc:c3:4d:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:fb:b0:f2:e7:49:6b:8e:8c:33:49:77:06:09:8a:f9: 2b:82:d7:b0:e3:08:78:9c:52:e5:94:b4:1c:75:dd:33: ca:b2:01:93:e0:d4:51:0a:39:83:83:89:91:05:8f:b1: bb:e6:1c:6a:7f:08:67:68:8f:bd:19:19:48:a6:d5:7b: 66:1d:f6:e0:ee:b9:bf:26:bf:e2:5f:80:9c:2e:20:ae: 7e:82:13:70:29:6b:48:8b:26:0e:42:56:d1:26:5f:9b: 47:b4:64:3b:26:ab:b0:68:4d:e8:45:b9:76:47:c5:3e: 35:3e:64:46:02:53:9d:e2:a8:24:ae:51:82:97:d7:7e: 26:1d:95:53:64:22:10:19:ce:54:a8:8b:30:2e:be:70: ee:c1:de:2b:45:66:d3:81:77:62:71:7a:9d:37:ba:3a: 75:0d:bc:84:36:95:bf:89:57:55:e4:b2:c2:da:9e:cd: 6d:f2:dd:c9:f9:b8:54:6d:da:c3:1c:71:53:58:96:f9: 2d:b0:fd:93:f4:e3:b7:ea:b6:2e:07:f7:e3:b9:68:e4: 5e:c6:f6:9e:f3:ea:3b:fb:eb:86:10:5f:1e:50:7c:73: 53:7f:66:3a:95:5e:16:86:b6:18:c6:10:72:96:22:bf: 68:94:52:c9:6b:78:2f:64:02:29:4b:7f:c6:49:8e:68 Fingerprint (SHA-256): CA:2E:EB:87:A6:AD:26:A7:4A:0A:F4:DE:25:BF:E8:09:CD:F6:6E:97:89:F9:EA:3E:30:D1:40:68:C0:36:23:07 Fingerprint (SHA1): 24:25:7C:33:B4:EC:0B:EE:71:53:1A:0A:BE:70:D9:B0:5C:91:BD:37 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2049: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2050: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2051: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145656 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2052: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2053: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2054: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2055: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145657 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2056: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2057: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2058: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2059: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145658 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2060: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2061: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2062: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2063: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145659 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2064: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2065: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2066: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2067: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145660 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2068: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2069: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2070: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145656 (0x49157f78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:a0:f7:41:9b:2d:ab:25:48:d6:5f:54:78:5d:e6:69: e7:b1:09:84:c4:5f:87:1b:b9:6f:5e:1e:19:1e:bc:44: d1:24:d0:25:45:ef:d4:97:81:0d:27:ab:08:a5:a7:c3: ae:5a:51:53:ea:4f:80:8f:8b:75:f2:88:e2:c7:c7:3f: a0:be:c7:11:ef:26:fd:13:de:04:da:5d:42:2f:c7:0e: 1e:b2:0a:27:33:d8:5c:f7:82:91:b4:51:bd:5f:08:44: 94:77:1b:08:1c:8a:0f:6a:25:20:9a:68:7a:2d:36:08: 32:2a:a7:20:c4:bd:85:41:20:9f:3a:ae:2e:79:93:76: de:d8:81:82:47:b6:2e:a1:5d:10:8b:cd:50:dc:b5:55: 95:be:90:31:ca:7f:40:60:9c:f6:ae:50:b0:31:68:0f: 55:43:a3:6d:1d:1e:33:d9:5b:8f:e1:f8:5c:66:d0:62: 71:54:95:68:a2:29:9b:ac:fe:25:09:fe:92:59:82:3a: 85:b1:91:69:2b:dd:82:b7:ab:f4:25:ab:3d:ae:a3:d4: 1c:e1:6b:5f:fe:8b:76:3e:f9:f0:8c:9e:42:52:5b:ed: c5:b1:c0:47:35:88:dd:3a:76:63:7f:2e:77:4a:3f:2b: 91:97:35:03:1e:f9:2e:92:f6:49:d7:b9:95:b0:5e:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:c1:d4:b8:b0:49:cd:6e:3a:48:5c:6c:57:4c:52:eb: 6d:7c:07:e7:93:a8:91:b6:d4:c7:6b:2b:22:ba:1f:9a: ba:b9:6e:11:a5:ed:94:bf:1b:43:43:e0:54:a8:46:23: 35:a1:fd:29:6a:e0:49:d8:82:35:e6:36:b8:ca:ba:be: d6:6f:45:09:7e:7b:53:2f:1c:fe:44:d6:a8:f0:35:2a: 07:d3:67:fa:bb:81:b3:d3:e5:88:74:91:98:70:8c:43: a1:5e:19:c4:84:61:d4:ac:38:9f:69:37:77:d7:12:20: 5d:34:37:f5:38:21:a5:95:5b:c1:e8:ab:de:76:0f:7f: f2:e5:0a:76:5b:e0:fc:dd:76:fd:fd:07:a9:26:cb:9e: ab:8c:20:94:96:e7:7f:82:57:73:01:88:0d:f0:07:b4: 9d:46:59:53:5b:47:29:c6:9c:53:bd:8d:73:82:2c:c6: b9:d6:df:c9:19:9a:d5:fe:0a:04:66:16:4d:4d:3f:c2: 5e:67:da:65:14:c5:b5:80:a4:b7:5b:51:e3:53:c9:5e: 01:5b:e2:d2:ec:01:7f:78:39:df:3b:2b:84:8f:1f:96: e0:e2:ca:d8:44:ce:1c:0a:a9:b1:6c:0c:cf:01:4f:f2: 1c:38:22:c3:9a:2c:44:c1:b3:7f:b7:29:c1:73:5a:e4 Fingerprint (SHA-256): 6E:79:80:C0:D4:D7:C7:9F:A9:3B:82:4F:3F:27:00:9C:B7:A5:63:69:28:60:83:7A:3D:1C:81:C9:46:1D:9B:07 Fingerprint (SHA1): 24:8A:AB:05:1F:33:95:95:A8:BA:32:44:41:AD:B9:3C:A2:5F:FC:19 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2071: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2072: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145657 (0x49157f79) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:b6:bf:25:97:12:a7:5c:b9:bb:fb:ea:54:08:88:48: 33:94:f8:cf:2f:d4:e3:ad:43:5e:6d:db:82:6e:e8:3c: 33:c9:3f:38:97:ca:91:18:bb:78:87:52:f8:66:61:c8: db:c8:b8:ad:63:dc:63:b7:cb:9b:13:b9:95:47:9c:8d: 2f:0f:d7:9b:01:2b:b7:fa:86:37:e9:33:53:07:74:a5: 0a:0e:0c:84:d4:24:bc:36:7c:5c:e4:79:c2:ca:54:75: eb:38:3b:48:ad:15:70:6d:d4:e9:67:32:36:c4:03:c3: 21:18:ef:9d:f4:c0:59:97:d7:c4:23:bb:f7:b0:05:5d: 9c:a4:7f:d8:d6:82:f3:74:6a:50:51:63:9a:13:13:08: c0:da:ea:d1:20:dd:79:87:88:3c:69:63:54:04:f4:d4: eb:98:72:4a:95:fe:cc:c1:68:bb:50:e0:90:e4:b4:38: c3:d4:a3:b2:b9:76:f3:ff:72:cd:85:05:28:0d:3c:95: f9:e5:dc:49:93:36:f2:f6:83:87:d5:c3:a5:38:56:44: 6a:cb:89:78:bb:4b:02:e5:76:21:28:70:c8:41:ac:72: 48:15:0b:10:11:cf:2b:3a:54:dc:f0:9d:86:73:2e:50: e7:6d:08:a4:65:d9:a2:69:15:f0:1a:54:e2:80:dc:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:7a:ab:80:d4:83:d7:8e:f9:9b:79:d1:5a:3e:d6:76: 8d:49:12:dc:1d:ef:7e:d5:9b:45:3b:7a:27:28:19:c3: f8:eb:dc:23:ae:41:10:7b:d1:a1:e5:84:c1:2a:00:80: 0e:40:94:c1:6e:22:8b:91:ca:66:ac:79:03:15:31:e6: 15:5a:ea:07:9e:6d:b1:48:3f:f7:5c:55:ca:89:c2:7d: 8c:20:4a:99:5a:49:1b:8e:5c:97:f4:d1:e3:08:0b:c7: ed:6b:15:91:3a:15:92:7f:1b:13:c6:4d:7d:57:f8:28: 77:14:a9:43:cd:d2:1f:08:7c:3c:7d:bc:83:3d:cc:69: fa:6f:f3:54:44:e3:7f:6c:ec:58:98:18:c8:79:8f:3f: 6d:9d:cb:33:b8:44:51:de:8e:db:52:8a:21:43:bf:d9: 62:70:7e:06:06:d3:3a:ea:06:69:c6:d7:c9:38:4b:8c: 90:e5:80:e5:f9:63:89:da:f0:c8:90:dd:3b:c0:48:ca: e3:03:2b:16:d7:ff:37:7c:58:0f:a7:2d:e6:20:a0:5a: d7:aa:99:d0:f8:15:a2:42:e5:af:21:37:bf:cd:b9:e3: 22:be:92:23:53:02:67:27:51:47:05:b4:ff:f1:79:6f: dc:10:81:45:18:35:f1:86:15:0c:40:c8:aa:fe:d3:13 Fingerprint (SHA-256): 4E:07:B0:38:7D:9C:26:AE:80:FF:5F:3F:E8:D2:19:3A:C1:2B:C0:6F:38:89:8D:6C:CC:50:0E:42:B5:D3:37:CF Fingerprint (SHA1): FB:88:E0:66:79:8C:A7:3C:16:6C:A5:3D:CA:3F:F2:7C:D6:A1:BB:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2073: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2074: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145658 (0x49157f7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:39 2024 Not After : Wed Dec 26 14:59:39 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:43:8a:1a:8d:18:7c:24:ad:49:a1:6a:d0:46:a0:81: d6:20:93:8b:bf:de:1f:44:7e:f5:2a:57:60:8a:3a:5a: 23:36:26:36:93:d1:79:b7:53:eb:be:a1:34:0c:fd:37: 8d:68:1f:5d:8c:f0:55:37:0e:2d:ab:32:5e:0d:6b:c0: 7a:a2:47:07:37:32:8a:53:8b:cc:ee:16:cd:26:0f:43: 4a:18:1a:3d:31:7a:88:13:13:78:53:ba:dd:d1:29:7e: 34:33:2a:6b:3f:24:5e:30:27:e8:89:e0:45:b6:d0:ec: 3c:81:6f:30:d2:e1:02:17:62:21:fa:e3:11:bb:6f:e7: b8:3f:79:b0:1d:48:dc:99:4a:68:39:20:35:03:32:44: 5c:ca:1f:2e:53:5a:69:53:a9:3d:9d:83:89:ee:cf:cd: fa:16:56:66:41:59:6e:53:55:c1:90:9b:9c:ac:e7:25: ff:c6:c7:fa:32:0a:9d:95:37:07:b1:1c:23:a5:bd:fc: 67:27:a5:99:37:b7:43:06:4c:31:4d:ee:62:a1:30:4a: 92:8e:5b:d8:9b:35:b0:7b:64:04:8c:4a:b4:dd:24:c0: 35:ed:07:dd:42:fd:52:50:cd:a9:bb:3d:37:75:81:27: 2f:7c:6b:5f:99:5b:fb:ad:1f:66:d9:3e:c2:ec:8c:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:a9:b4:9f:ce:71:89:5e:5c:21:12:d1:9a:3b:8d:1c: e6:31:25:08:02:f7:24:20:4a:08:dd:3a:0d:c4:7d:75: 59:9a:29:7f:36:0f:19:07:b2:4a:d6:a4:6d:36:ea:3c: 49:20:ba:17:aa:3b:96:a5:cf:8c:00:f0:9d:8f:01:bb: 3c:db:8b:81:b7:dc:c8:10:c7:6c:e0:39:6f:0e:ec:90: b1:26:98:dd:5f:6d:08:4a:b1:92:49:64:d6:4c:6c:97: fe:e2:21:8e:af:84:d5:f3:db:8c:0a:f3:b9:7c:ff:e5: f7:cf:35:93:4c:5a:69:71:a7:01:1d:4e:ff:66:3a:8d: 60:ab:28:b8:7a:f3:39:f5:47:96:5c:a1:54:08:df:e0: 9d:07:2e:d3:21:a3:d2:6a:fb:36:41:9c:f1:70:b8:8a: 4c:c8:68:01:0f:81:43:13:fb:63:b8:ff:4e:a1:13:a5: 68:f1:7c:d1:87:55:a3:82:ce:8a:92:c0:b9:33:61:b1: 13:15:03:cb:96:cc:2d:73:48:73:63:ff:3d:bd:a3:68: 3f:a0:53:6a:b8:32:ed:dc:0a:cb:5f:31:7a:3b:ef:b0: 67:67:bb:1e:b7:ff:ca:9a:af:97:a7:a2:ac:00:71:da: 01:ac:76:7a:de:91:01:b3:c9:25:30:a0:14:f1:30:b3 Fingerprint (SHA-256): 64:A3:15:5D:6C:08:12:2E:B4:31:3A:6D:21:96:63:1B:0A:B0:FA:D8:AF:5A:C4:51:01:41:16:6A:63:AA:E2:DA Fingerprint (SHA1): FE:E2:4C:BA:41:D6:4F:B2:34:DA:14:A6:1D:1D:FE:1C:67:92:DB:53 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2075: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2076: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2077: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2078: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2079: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145656 (0x49157f78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:a0:f7:41:9b:2d:ab:25:48:d6:5f:54:78:5d:e6:69: e7:b1:09:84:c4:5f:87:1b:b9:6f:5e:1e:19:1e:bc:44: d1:24:d0:25:45:ef:d4:97:81:0d:27:ab:08:a5:a7:c3: ae:5a:51:53:ea:4f:80:8f:8b:75:f2:88:e2:c7:c7:3f: a0:be:c7:11:ef:26:fd:13:de:04:da:5d:42:2f:c7:0e: 1e:b2:0a:27:33:d8:5c:f7:82:91:b4:51:bd:5f:08:44: 94:77:1b:08:1c:8a:0f:6a:25:20:9a:68:7a:2d:36:08: 32:2a:a7:20:c4:bd:85:41:20:9f:3a:ae:2e:79:93:76: de:d8:81:82:47:b6:2e:a1:5d:10:8b:cd:50:dc:b5:55: 95:be:90:31:ca:7f:40:60:9c:f6:ae:50:b0:31:68:0f: 55:43:a3:6d:1d:1e:33:d9:5b:8f:e1:f8:5c:66:d0:62: 71:54:95:68:a2:29:9b:ac:fe:25:09:fe:92:59:82:3a: 85:b1:91:69:2b:dd:82:b7:ab:f4:25:ab:3d:ae:a3:d4: 1c:e1:6b:5f:fe:8b:76:3e:f9:f0:8c:9e:42:52:5b:ed: c5:b1:c0:47:35:88:dd:3a:76:63:7f:2e:77:4a:3f:2b: 91:97:35:03:1e:f9:2e:92:f6:49:d7:b9:95:b0:5e:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:c1:d4:b8:b0:49:cd:6e:3a:48:5c:6c:57:4c:52:eb: 6d:7c:07:e7:93:a8:91:b6:d4:c7:6b:2b:22:ba:1f:9a: ba:b9:6e:11:a5:ed:94:bf:1b:43:43:e0:54:a8:46:23: 35:a1:fd:29:6a:e0:49:d8:82:35:e6:36:b8:ca:ba:be: d6:6f:45:09:7e:7b:53:2f:1c:fe:44:d6:a8:f0:35:2a: 07:d3:67:fa:bb:81:b3:d3:e5:88:74:91:98:70:8c:43: a1:5e:19:c4:84:61:d4:ac:38:9f:69:37:77:d7:12:20: 5d:34:37:f5:38:21:a5:95:5b:c1:e8:ab:de:76:0f:7f: f2:e5:0a:76:5b:e0:fc:dd:76:fd:fd:07:a9:26:cb:9e: ab:8c:20:94:96:e7:7f:82:57:73:01:88:0d:f0:07:b4: 9d:46:59:53:5b:47:29:c6:9c:53:bd:8d:73:82:2c:c6: b9:d6:df:c9:19:9a:d5:fe:0a:04:66:16:4d:4d:3f:c2: 5e:67:da:65:14:c5:b5:80:a4:b7:5b:51:e3:53:c9:5e: 01:5b:e2:d2:ec:01:7f:78:39:df:3b:2b:84:8f:1f:96: e0:e2:ca:d8:44:ce:1c:0a:a9:b1:6c:0c:cf:01:4f:f2: 1c:38:22:c3:9a:2c:44:c1:b3:7f:b7:29:c1:73:5a:e4 Fingerprint (SHA-256): 6E:79:80:C0:D4:D7:C7:9F:A9:3B:82:4F:3F:27:00:9C:B7:A5:63:69:28:60:83:7A:3D:1C:81:C9:46:1D:9B:07 Fingerprint (SHA1): 24:8A:AB:05:1F:33:95:95:A8:BA:32:44:41:AD:B9:3C:A2:5F:FC:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2080: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2081: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145657 (0x49157f79) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:b6:bf:25:97:12:a7:5c:b9:bb:fb:ea:54:08:88:48: 33:94:f8:cf:2f:d4:e3:ad:43:5e:6d:db:82:6e:e8:3c: 33:c9:3f:38:97:ca:91:18:bb:78:87:52:f8:66:61:c8: db:c8:b8:ad:63:dc:63:b7:cb:9b:13:b9:95:47:9c:8d: 2f:0f:d7:9b:01:2b:b7:fa:86:37:e9:33:53:07:74:a5: 0a:0e:0c:84:d4:24:bc:36:7c:5c:e4:79:c2:ca:54:75: eb:38:3b:48:ad:15:70:6d:d4:e9:67:32:36:c4:03:c3: 21:18:ef:9d:f4:c0:59:97:d7:c4:23:bb:f7:b0:05:5d: 9c:a4:7f:d8:d6:82:f3:74:6a:50:51:63:9a:13:13:08: c0:da:ea:d1:20:dd:79:87:88:3c:69:63:54:04:f4:d4: eb:98:72:4a:95:fe:cc:c1:68:bb:50:e0:90:e4:b4:38: c3:d4:a3:b2:b9:76:f3:ff:72:cd:85:05:28:0d:3c:95: f9:e5:dc:49:93:36:f2:f6:83:87:d5:c3:a5:38:56:44: 6a:cb:89:78:bb:4b:02:e5:76:21:28:70:c8:41:ac:72: 48:15:0b:10:11:cf:2b:3a:54:dc:f0:9d:86:73:2e:50: e7:6d:08:a4:65:d9:a2:69:15:f0:1a:54:e2:80:dc:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:7a:ab:80:d4:83:d7:8e:f9:9b:79:d1:5a:3e:d6:76: 8d:49:12:dc:1d:ef:7e:d5:9b:45:3b:7a:27:28:19:c3: f8:eb:dc:23:ae:41:10:7b:d1:a1:e5:84:c1:2a:00:80: 0e:40:94:c1:6e:22:8b:91:ca:66:ac:79:03:15:31:e6: 15:5a:ea:07:9e:6d:b1:48:3f:f7:5c:55:ca:89:c2:7d: 8c:20:4a:99:5a:49:1b:8e:5c:97:f4:d1:e3:08:0b:c7: ed:6b:15:91:3a:15:92:7f:1b:13:c6:4d:7d:57:f8:28: 77:14:a9:43:cd:d2:1f:08:7c:3c:7d:bc:83:3d:cc:69: fa:6f:f3:54:44:e3:7f:6c:ec:58:98:18:c8:79:8f:3f: 6d:9d:cb:33:b8:44:51:de:8e:db:52:8a:21:43:bf:d9: 62:70:7e:06:06:d3:3a:ea:06:69:c6:d7:c9:38:4b:8c: 90:e5:80:e5:f9:63:89:da:f0:c8:90:dd:3b:c0:48:ca: e3:03:2b:16:d7:ff:37:7c:58:0f:a7:2d:e6:20:a0:5a: d7:aa:99:d0:f8:15:a2:42:e5:af:21:37:bf:cd:b9:e3: 22:be:92:23:53:02:67:27:51:47:05:b4:ff:f1:79:6f: dc:10:81:45:18:35:f1:86:15:0c:40:c8:aa:fe:d3:13 Fingerprint (SHA-256): 4E:07:B0:38:7D:9C:26:AE:80:FF:5F:3F:E8:D2:19:3A:C1:2B:C0:6F:38:89:8D:6C:CC:50:0E:42:B5:D3:37:CF Fingerprint (SHA1): FB:88:E0:66:79:8C:A7:3C:16:6C:A5:3D:CA:3F:F2:7C:D6:A1:BB:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2082: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2083: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145658 (0x49157f7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:39 2024 Not After : Wed Dec 26 14:59:39 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:43:8a:1a:8d:18:7c:24:ad:49:a1:6a:d0:46:a0:81: d6:20:93:8b:bf:de:1f:44:7e:f5:2a:57:60:8a:3a:5a: 23:36:26:36:93:d1:79:b7:53:eb:be:a1:34:0c:fd:37: 8d:68:1f:5d:8c:f0:55:37:0e:2d:ab:32:5e:0d:6b:c0: 7a:a2:47:07:37:32:8a:53:8b:cc:ee:16:cd:26:0f:43: 4a:18:1a:3d:31:7a:88:13:13:78:53:ba:dd:d1:29:7e: 34:33:2a:6b:3f:24:5e:30:27:e8:89:e0:45:b6:d0:ec: 3c:81:6f:30:d2:e1:02:17:62:21:fa:e3:11:bb:6f:e7: b8:3f:79:b0:1d:48:dc:99:4a:68:39:20:35:03:32:44: 5c:ca:1f:2e:53:5a:69:53:a9:3d:9d:83:89:ee:cf:cd: fa:16:56:66:41:59:6e:53:55:c1:90:9b:9c:ac:e7:25: ff:c6:c7:fa:32:0a:9d:95:37:07:b1:1c:23:a5:bd:fc: 67:27:a5:99:37:b7:43:06:4c:31:4d:ee:62:a1:30:4a: 92:8e:5b:d8:9b:35:b0:7b:64:04:8c:4a:b4:dd:24:c0: 35:ed:07:dd:42:fd:52:50:cd:a9:bb:3d:37:75:81:27: 2f:7c:6b:5f:99:5b:fb:ad:1f:66:d9:3e:c2:ec:8c:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:a9:b4:9f:ce:71:89:5e:5c:21:12:d1:9a:3b:8d:1c: e6:31:25:08:02:f7:24:20:4a:08:dd:3a:0d:c4:7d:75: 59:9a:29:7f:36:0f:19:07:b2:4a:d6:a4:6d:36:ea:3c: 49:20:ba:17:aa:3b:96:a5:cf:8c:00:f0:9d:8f:01:bb: 3c:db:8b:81:b7:dc:c8:10:c7:6c:e0:39:6f:0e:ec:90: b1:26:98:dd:5f:6d:08:4a:b1:92:49:64:d6:4c:6c:97: fe:e2:21:8e:af:84:d5:f3:db:8c:0a:f3:b9:7c:ff:e5: f7:cf:35:93:4c:5a:69:71:a7:01:1d:4e:ff:66:3a:8d: 60:ab:28:b8:7a:f3:39:f5:47:96:5c:a1:54:08:df:e0: 9d:07:2e:d3:21:a3:d2:6a:fb:36:41:9c:f1:70:b8:8a: 4c:c8:68:01:0f:81:43:13:fb:63:b8:ff:4e:a1:13:a5: 68:f1:7c:d1:87:55:a3:82:ce:8a:92:c0:b9:33:61:b1: 13:15:03:cb:96:cc:2d:73:48:73:63:ff:3d:bd:a3:68: 3f:a0:53:6a:b8:32:ed:dc:0a:cb:5f:31:7a:3b:ef:b0: 67:67:bb:1e:b7:ff:ca:9a:af:97:a7:a2:ac:00:71:da: 01:ac:76:7a:de:91:01:b3:c9:25:30:a0:14:f1:30:b3 Fingerprint (SHA-256): 64:A3:15:5D:6C:08:12:2E:B4:31:3A:6D:21:96:63:1B:0A:B0:FA:D8:AF:5A:C4:51:01:41:16:6A:63:AA:E2:DA Fingerprint (SHA1): FE:E2:4C:BA:41:D6:4F:B2:34:DA:14:A6:1D:1D:FE:1C:67:92:DB:53 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2084: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2085: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145656 (0x49157f78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:a0:f7:41:9b:2d:ab:25:48:d6:5f:54:78:5d:e6:69: e7:b1:09:84:c4:5f:87:1b:b9:6f:5e:1e:19:1e:bc:44: d1:24:d0:25:45:ef:d4:97:81:0d:27:ab:08:a5:a7:c3: ae:5a:51:53:ea:4f:80:8f:8b:75:f2:88:e2:c7:c7:3f: a0:be:c7:11:ef:26:fd:13:de:04:da:5d:42:2f:c7:0e: 1e:b2:0a:27:33:d8:5c:f7:82:91:b4:51:bd:5f:08:44: 94:77:1b:08:1c:8a:0f:6a:25:20:9a:68:7a:2d:36:08: 32:2a:a7:20:c4:bd:85:41:20:9f:3a:ae:2e:79:93:76: de:d8:81:82:47:b6:2e:a1:5d:10:8b:cd:50:dc:b5:55: 95:be:90:31:ca:7f:40:60:9c:f6:ae:50:b0:31:68:0f: 55:43:a3:6d:1d:1e:33:d9:5b:8f:e1:f8:5c:66:d0:62: 71:54:95:68:a2:29:9b:ac:fe:25:09:fe:92:59:82:3a: 85:b1:91:69:2b:dd:82:b7:ab:f4:25:ab:3d:ae:a3:d4: 1c:e1:6b:5f:fe:8b:76:3e:f9:f0:8c:9e:42:52:5b:ed: c5:b1:c0:47:35:88:dd:3a:76:63:7f:2e:77:4a:3f:2b: 91:97:35:03:1e:f9:2e:92:f6:49:d7:b9:95:b0:5e:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:c1:d4:b8:b0:49:cd:6e:3a:48:5c:6c:57:4c:52:eb: 6d:7c:07:e7:93:a8:91:b6:d4:c7:6b:2b:22:ba:1f:9a: ba:b9:6e:11:a5:ed:94:bf:1b:43:43:e0:54:a8:46:23: 35:a1:fd:29:6a:e0:49:d8:82:35:e6:36:b8:ca:ba:be: d6:6f:45:09:7e:7b:53:2f:1c:fe:44:d6:a8:f0:35:2a: 07:d3:67:fa:bb:81:b3:d3:e5:88:74:91:98:70:8c:43: a1:5e:19:c4:84:61:d4:ac:38:9f:69:37:77:d7:12:20: 5d:34:37:f5:38:21:a5:95:5b:c1:e8:ab:de:76:0f:7f: f2:e5:0a:76:5b:e0:fc:dd:76:fd:fd:07:a9:26:cb:9e: ab:8c:20:94:96:e7:7f:82:57:73:01:88:0d:f0:07:b4: 9d:46:59:53:5b:47:29:c6:9c:53:bd:8d:73:82:2c:c6: b9:d6:df:c9:19:9a:d5:fe:0a:04:66:16:4d:4d:3f:c2: 5e:67:da:65:14:c5:b5:80:a4:b7:5b:51:e3:53:c9:5e: 01:5b:e2:d2:ec:01:7f:78:39:df:3b:2b:84:8f:1f:96: e0:e2:ca:d8:44:ce:1c:0a:a9:b1:6c:0c:cf:01:4f:f2: 1c:38:22:c3:9a:2c:44:c1:b3:7f:b7:29:c1:73:5a:e4 Fingerprint (SHA-256): 6E:79:80:C0:D4:D7:C7:9F:A9:3B:82:4F:3F:27:00:9C:B7:A5:63:69:28:60:83:7A:3D:1C:81:C9:46:1D:9B:07 Fingerprint (SHA1): 24:8A:AB:05:1F:33:95:95:A8:BA:32:44:41:AD:B9:3C:A2:5F:FC:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2086: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145656 (0x49157f78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:a0:f7:41:9b:2d:ab:25:48:d6:5f:54:78:5d:e6:69: e7:b1:09:84:c4:5f:87:1b:b9:6f:5e:1e:19:1e:bc:44: d1:24:d0:25:45:ef:d4:97:81:0d:27:ab:08:a5:a7:c3: ae:5a:51:53:ea:4f:80:8f:8b:75:f2:88:e2:c7:c7:3f: a0:be:c7:11:ef:26:fd:13:de:04:da:5d:42:2f:c7:0e: 1e:b2:0a:27:33:d8:5c:f7:82:91:b4:51:bd:5f:08:44: 94:77:1b:08:1c:8a:0f:6a:25:20:9a:68:7a:2d:36:08: 32:2a:a7:20:c4:bd:85:41:20:9f:3a:ae:2e:79:93:76: de:d8:81:82:47:b6:2e:a1:5d:10:8b:cd:50:dc:b5:55: 95:be:90:31:ca:7f:40:60:9c:f6:ae:50:b0:31:68:0f: 55:43:a3:6d:1d:1e:33:d9:5b:8f:e1:f8:5c:66:d0:62: 71:54:95:68:a2:29:9b:ac:fe:25:09:fe:92:59:82:3a: 85:b1:91:69:2b:dd:82:b7:ab:f4:25:ab:3d:ae:a3:d4: 1c:e1:6b:5f:fe:8b:76:3e:f9:f0:8c:9e:42:52:5b:ed: c5:b1:c0:47:35:88:dd:3a:76:63:7f:2e:77:4a:3f:2b: 91:97:35:03:1e:f9:2e:92:f6:49:d7:b9:95:b0:5e:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:c1:d4:b8:b0:49:cd:6e:3a:48:5c:6c:57:4c:52:eb: 6d:7c:07:e7:93:a8:91:b6:d4:c7:6b:2b:22:ba:1f:9a: ba:b9:6e:11:a5:ed:94:bf:1b:43:43:e0:54:a8:46:23: 35:a1:fd:29:6a:e0:49:d8:82:35:e6:36:b8:ca:ba:be: d6:6f:45:09:7e:7b:53:2f:1c:fe:44:d6:a8:f0:35:2a: 07:d3:67:fa:bb:81:b3:d3:e5:88:74:91:98:70:8c:43: a1:5e:19:c4:84:61:d4:ac:38:9f:69:37:77:d7:12:20: 5d:34:37:f5:38:21:a5:95:5b:c1:e8:ab:de:76:0f:7f: f2:e5:0a:76:5b:e0:fc:dd:76:fd:fd:07:a9:26:cb:9e: ab:8c:20:94:96:e7:7f:82:57:73:01:88:0d:f0:07:b4: 9d:46:59:53:5b:47:29:c6:9c:53:bd:8d:73:82:2c:c6: b9:d6:df:c9:19:9a:d5:fe:0a:04:66:16:4d:4d:3f:c2: 5e:67:da:65:14:c5:b5:80:a4:b7:5b:51:e3:53:c9:5e: 01:5b:e2:d2:ec:01:7f:78:39:df:3b:2b:84:8f:1f:96: e0:e2:ca:d8:44:ce:1c:0a:a9:b1:6c:0c:cf:01:4f:f2: 1c:38:22:c3:9a:2c:44:c1:b3:7f:b7:29:c1:73:5a:e4 Fingerprint (SHA-256): 6E:79:80:C0:D4:D7:C7:9F:A9:3B:82:4F:3F:27:00:9C:B7:A5:63:69:28:60:83:7A:3D:1C:81:C9:46:1D:9B:07 Fingerprint (SHA1): 24:8A:AB:05:1F:33:95:95:A8:BA:32:44:41:AD:B9:3C:A2:5F:FC:19 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2087: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145657 (0x49157f79) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:b6:bf:25:97:12:a7:5c:b9:bb:fb:ea:54:08:88:48: 33:94:f8:cf:2f:d4:e3:ad:43:5e:6d:db:82:6e:e8:3c: 33:c9:3f:38:97:ca:91:18:bb:78:87:52:f8:66:61:c8: db:c8:b8:ad:63:dc:63:b7:cb:9b:13:b9:95:47:9c:8d: 2f:0f:d7:9b:01:2b:b7:fa:86:37:e9:33:53:07:74:a5: 0a:0e:0c:84:d4:24:bc:36:7c:5c:e4:79:c2:ca:54:75: eb:38:3b:48:ad:15:70:6d:d4:e9:67:32:36:c4:03:c3: 21:18:ef:9d:f4:c0:59:97:d7:c4:23:bb:f7:b0:05:5d: 9c:a4:7f:d8:d6:82:f3:74:6a:50:51:63:9a:13:13:08: c0:da:ea:d1:20:dd:79:87:88:3c:69:63:54:04:f4:d4: eb:98:72:4a:95:fe:cc:c1:68:bb:50:e0:90:e4:b4:38: c3:d4:a3:b2:b9:76:f3:ff:72:cd:85:05:28:0d:3c:95: f9:e5:dc:49:93:36:f2:f6:83:87:d5:c3:a5:38:56:44: 6a:cb:89:78:bb:4b:02:e5:76:21:28:70:c8:41:ac:72: 48:15:0b:10:11:cf:2b:3a:54:dc:f0:9d:86:73:2e:50: e7:6d:08:a4:65:d9:a2:69:15:f0:1a:54:e2:80:dc:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:7a:ab:80:d4:83:d7:8e:f9:9b:79:d1:5a:3e:d6:76: 8d:49:12:dc:1d:ef:7e:d5:9b:45:3b:7a:27:28:19:c3: f8:eb:dc:23:ae:41:10:7b:d1:a1:e5:84:c1:2a:00:80: 0e:40:94:c1:6e:22:8b:91:ca:66:ac:79:03:15:31:e6: 15:5a:ea:07:9e:6d:b1:48:3f:f7:5c:55:ca:89:c2:7d: 8c:20:4a:99:5a:49:1b:8e:5c:97:f4:d1:e3:08:0b:c7: ed:6b:15:91:3a:15:92:7f:1b:13:c6:4d:7d:57:f8:28: 77:14:a9:43:cd:d2:1f:08:7c:3c:7d:bc:83:3d:cc:69: fa:6f:f3:54:44:e3:7f:6c:ec:58:98:18:c8:79:8f:3f: 6d:9d:cb:33:b8:44:51:de:8e:db:52:8a:21:43:bf:d9: 62:70:7e:06:06:d3:3a:ea:06:69:c6:d7:c9:38:4b:8c: 90:e5:80:e5:f9:63:89:da:f0:c8:90:dd:3b:c0:48:ca: e3:03:2b:16:d7:ff:37:7c:58:0f:a7:2d:e6:20:a0:5a: d7:aa:99:d0:f8:15:a2:42:e5:af:21:37:bf:cd:b9:e3: 22:be:92:23:53:02:67:27:51:47:05:b4:ff:f1:79:6f: dc:10:81:45:18:35:f1:86:15:0c:40:c8:aa:fe:d3:13 Fingerprint (SHA-256): 4E:07:B0:38:7D:9C:26:AE:80:FF:5F:3F:E8:D2:19:3A:C1:2B:C0:6F:38:89:8D:6C:CC:50:0E:42:B5:D3:37:CF Fingerprint (SHA1): FB:88:E0:66:79:8C:A7:3C:16:6C:A5:3D:CA:3F:F2:7C:D6:A1:BB:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2088: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145657 (0x49157f79) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 14:59:38 2024 Not After : Wed Dec 26 14:59:38 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:b6:bf:25:97:12:a7:5c:b9:bb:fb:ea:54:08:88:48: 33:94:f8:cf:2f:d4:e3:ad:43:5e:6d:db:82:6e:e8:3c: 33:c9:3f:38:97:ca:91:18:bb:78:87:52:f8:66:61:c8: db:c8:b8:ad:63:dc:63:b7:cb:9b:13:b9:95:47:9c:8d: 2f:0f:d7:9b:01:2b:b7:fa:86:37:e9:33:53:07:74:a5: 0a:0e:0c:84:d4:24:bc:36:7c:5c:e4:79:c2:ca:54:75: eb:38:3b:48:ad:15:70:6d:d4:e9:67:32:36:c4:03:c3: 21:18:ef:9d:f4:c0:59:97:d7:c4:23:bb:f7:b0:05:5d: 9c:a4:7f:d8:d6:82:f3:74:6a:50:51:63:9a:13:13:08: c0:da:ea:d1:20:dd:79:87:88:3c:69:63:54:04:f4:d4: eb:98:72:4a:95:fe:cc:c1:68:bb:50:e0:90:e4:b4:38: c3:d4:a3:b2:b9:76:f3:ff:72:cd:85:05:28:0d:3c:95: f9:e5:dc:49:93:36:f2:f6:83:87:d5:c3:a5:38:56:44: 6a:cb:89:78:bb:4b:02:e5:76:21:28:70:c8:41:ac:72: 48:15:0b:10:11:cf:2b:3a:54:dc:f0:9d:86:73:2e:50: e7:6d:08:a4:65:d9:a2:69:15:f0:1a:54:e2:80:dc:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:7a:ab:80:d4:83:d7:8e:f9:9b:79:d1:5a:3e:d6:76: 8d:49:12:dc:1d:ef:7e:d5:9b:45:3b:7a:27:28:19:c3: f8:eb:dc:23:ae:41:10:7b:d1:a1:e5:84:c1:2a:00:80: 0e:40:94:c1:6e:22:8b:91:ca:66:ac:79:03:15:31:e6: 15:5a:ea:07:9e:6d:b1:48:3f:f7:5c:55:ca:89:c2:7d: 8c:20:4a:99:5a:49:1b:8e:5c:97:f4:d1:e3:08:0b:c7: ed:6b:15:91:3a:15:92:7f:1b:13:c6:4d:7d:57:f8:28: 77:14:a9:43:cd:d2:1f:08:7c:3c:7d:bc:83:3d:cc:69: fa:6f:f3:54:44:e3:7f:6c:ec:58:98:18:c8:79:8f:3f: 6d:9d:cb:33:b8:44:51:de:8e:db:52:8a:21:43:bf:d9: 62:70:7e:06:06:d3:3a:ea:06:69:c6:d7:c9:38:4b:8c: 90:e5:80:e5:f9:63:89:da:f0:c8:90:dd:3b:c0:48:ca: e3:03:2b:16:d7:ff:37:7c:58:0f:a7:2d:e6:20:a0:5a: d7:aa:99:d0:f8:15:a2:42:e5:af:21:37:bf:cd:b9:e3: 22:be:92:23:53:02:67:27:51:47:05:b4:ff:f1:79:6f: dc:10:81:45:18:35:f1:86:15:0c:40:c8:aa:fe:d3:13 Fingerprint (SHA-256): 4E:07:B0:38:7D:9C:26:AE:80:FF:5F:3F:E8:D2:19:3A:C1:2B:C0:6F:38:89:8D:6C:CC:50:0E:42:B5:D3:37:CF Fingerprint (SHA1): FB:88:E0:66:79:8C:A7:3C:16:6C:A5:3D:CA:3F:F2:7C:D6:A1:BB:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2089: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145658 (0x49157f7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:39 2024 Not After : Wed Dec 26 14:59:39 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:43:8a:1a:8d:18:7c:24:ad:49:a1:6a:d0:46:a0:81: d6:20:93:8b:bf:de:1f:44:7e:f5:2a:57:60:8a:3a:5a: 23:36:26:36:93:d1:79:b7:53:eb:be:a1:34:0c:fd:37: 8d:68:1f:5d:8c:f0:55:37:0e:2d:ab:32:5e:0d:6b:c0: 7a:a2:47:07:37:32:8a:53:8b:cc:ee:16:cd:26:0f:43: 4a:18:1a:3d:31:7a:88:13:13:78:53:ba:dd:d1:29:7e: 34:33:2a:6b:3f:24:5e:30:27:e8:89:e0:45:b6:d0:ec: 3c:81:6f:30:d2:e1:02:17:62:21:fa:e3:11:bb:6f:e7: b8:3f:79:b0:1d:48:dc:99:4a:68:39:20:35:03:32:44: 5c:ca:1f:2e:53:5a:69:53:a9:3d:9d:83:89:ee:cf:cd: fa:16:56:66:41:59:6e:53:55:c1:90:9b:9c:ac:e7:25: ff:c6:c7:fa:32:0a:9d:95:37:07:b1:1c:23:a5:bd:fc: 67:27:a5:99:37:b7:43:06:4c:31:4d:ee:62:a1:30:4a: 92:8e:5b:d8:9b:35:b0:7b:64:04:8c:4a:b4:dd:24:c0: 35:ed:07:dd:42:fd:52:50:cd:a9:bb:3d:37:75:81:27: 2f:7c:6b:5f:99:5b:fb:ad:1f:66:d9:3e:c2:ec:8c:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:a9:b4:9f:ce:71:89:5e:5c:21:12:d1:9a:3b:8d:1c: e6:31:25:08:02:f7:24:20:4a:08:dd:3a:0d:c4:7d:75: 59:9a:29:7f:36:0f:19:07:b2:4a:d6:a4:6d:36:ea:3c: 49:20:ba:17:aa:3b:96:a5:cf:8c:00:f0:9d:8f:01:bb: 3c:db:8b:81:b7:dc:c8:10:c7:6c:e0:39:6f:0e:ec:90: b1:26:98:dd:5f:6d:08:4a:b1:92:49:64:d6:4c:6c:97: fe:e2:21:8e:af:84:d5:f3:db:8c:0a:f3:b9:7c:ff:e5: f7:cf:35:93:4c:5a:69:71:a7:01:1d:4e:ff:66:3a:8d: 60:ab:28:b8:7a:f3:39:f5:47:96:5c:a1:54:08:df:e0: 9d:07:2e:d3:21:a3:d2:6a:fb:36:41:9c:f1:70:b8:8a: 4c:c8:68:01:0f:81:43:13:fb:63:b8:ff:4e:a1:13:a5: 68:f1:7c:d1:87:55:a3:82:ce:8a:92:c0:b9:33:61:b1: 13:15:03:cb:96:cc:2d:73:48:73:63:ff:3d:bd:a3:68: 3f:a0:53:6a:b8:32:ed:dc:0a:cb:5f:31:7a:3b:ef:b0: 67:67:bb:1e:b7:ff:ca:9a:af:97:a7:a2:ac:00:71:da: 01:ac:76:7a:de:91:01:b3:c9:25:30:a0:14:f1:30:b3 Fingerprint (SHA-256): 64:A3:15:5D:6C:08:12:2E:B4:31:3A:6D:21:96:63:1B:0A:B0:FA:D8:AF:5A:C4:51:01:41:16:6A:63:AA:E2:DA Fingerprint (SHA1): FE:E2:4C:BA:41:D6:4F:B2:34:DA:14:A6:1D:1D:FE:1C:67:92:DB:53 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2090: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145658 (0x49157f7a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 14:59:39 2024 Not After : Wed Dec 26 14:59:39 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:43:8a:1a:8d:18:7c:24:ad:49:a1:6a:d0:46:a0:81: d6:20:93:8b:bf:de:1f:44:7e:f5:2a:57:60:8a:3a:5a: 23:36:26:36:93:d1:79:b7:53:eb:be:a1:34:0c:fd:37: 8d:68:1f:5d:8c:f0:55:37:0e:2d:ab:32:5e:0d:6b:c0: 7a:a2:47:07:37:32:8a:53:8b:cc:ee:16:cd:26:0f:43: 4a:18:1a:3d:31:7a:88:13:13:78:53:ba:dd:d1:29:7e: 34:33:2a:6b:3f:24:5e:30:27:e8:89:e0:45:b6:d0:ec: 3c:81:6f:30:d2:e1:02:17:62:21:fa:e3:11:bb:6f:e7: b8:3f:79:b0:1d:48:dc:99:4a:68:39:20:35:03:32:44: 5c:ca:1f:2e:53:5a:69:53:a9:3d:9d:83:89:ee:cf:cd: fa:16:56:66:41:59:6e:53:55:c1:90:9b:9c:ac:e7:25: ff:c6:c7:fa:32:0a:9d:95:37:07:b1:1c:23:a5:bd:fc: 67:27:a5:99:37:b7:43:06:4c:31:4d:ee:62:a1:30:4a: 92:8e:5b:d8:9b:35:b0:7b:64:04:8c:4a:b4:dd:24:c0: 35:ed:07:dd:42:fd:52:50:cd:a9:bb:3d:37:75:81:27: 2f:7c:6b:5f:99:5b:fb:ad:1f:66:d9:3e:c2:ec:8c:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:a9:b4:9f:ce:71:89:5e:5c:21:12:d1:9a:3b:8d:1c: e6:31:25:08:02:f7:24:20:4a:08:dd:3a:0d:c4:7d:75: 59:9a:29:7f:36:0f:19:07:b2:4a:d6:a4:6d:36:ea:3c: 49:20:ba:17:aa:3b:96:a5:cf:8c:00:f0:9d:8f:01:bb: 3c:db:8b:81:b7:dc:c8:10:c7:6c:e0:39:6f:0e:ec:90: b1:26:98:dd:5f:6d:08:4a:b1:92:49:64:d6:4c:6c:97: fe:e2:21:8e:af:84:d5:f3:db:8c:0a:f3:b9:7c:ff:e5: f7:cf:35:93:4c:5a:69:71:a7:01:1d:4e:ff:66:3a:8d: 60:ab:28:b8:7a:f3:39:f5:47:96:5c:a1:54:08:df:e0: 9d:07:2e:d3:21:a3:d2:6a:fb:36:41:9c:f1:70:b8:8a: 4c:c8:68:01:0f:81:43:13:fb:63:b8:ff:4e:a1:13:a5: 68:f1:7c:d1:87:55:a3:82:ce:8a:92:c0:b9:33:61:b1: 13:15:03:cb:96:cc:2d:73:48:73:63:ff:3d:bd:a3:68: 3f:a0:53:6a:b8:32:ed:dc:0a:cb:5f:31:7a:3b:ef:b0: 67:67:bb:1e:b7:ff:ca:9a:af:97:a7:a2:ac:00:71:da: 01:ac:76:7a:de:91:01:b3:c9:25:30:a0:14:f1:30:b3 Fingerprint (SHA-256): 64:A3:15:5D:6C:08:12:2E:B4:31:3A:6D:21:96:63:1B:0A:B0:FA:D8:AF:5A:C4:51:01:41:16:6A:63:AA:E2:DA Fingerprint (SHA1): FE:E2:4C:BA:41:D6:4F:B2:34:DA:14:A6:1D:1D:FE:1C:67:92:DB:53 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2091: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2092: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145661 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2093: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2094: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2095: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2096: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145662 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2097: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2098: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2099: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2100: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145663 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2101: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2102: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2103: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2104: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1226145664 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2105: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2106: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2107: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2108: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145665 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2109: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2110: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2111: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2112: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145666 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2113: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2114: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #2115: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2116: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1226145667 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2117: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2118: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2119: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #2120: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #2121: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2122: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #2123: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145661 (0x49157f7d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:43 2024 Not After : Wed Dec 26 14:59:43 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b4:80:b3:98:7c:fd:2a:44:83:c5:74:cd:b4:0e:e6: 49:c2:65:4d:48:89:57:71:22:1e:cb:19:28:f1:fe:ea: 22:0c:dd:db:14:b8:0f:93:bb:25:56:7a:08:a2:ff:63: 43:84:9e:de:59:17:c6:64:86:ea:c0:e1:52:eb:80:d8: 7d:71:65:fd:da:1e:9c:c8:b3:67:ea:e0:8e:9d:5e:81: 44:30:c6:ff:7f:db:8e:34:cb:25:c2:d7:e4:25:35:9a: 88:13:51:04:05:a0:37:57:b2:6b:fa:17:96:b4:5f:63: be:30:22:00:cf:af:2d:ba:28:ef:8b:c8:4c:d7:df:7b: b9:63:78:c7:8b:0d:53:db:38:82:ac:f3:c6:95:ed:da: 14:42:dd:01:16:12:4c:1e:de:48:a6:18:f8:9a:c7:55: ff:b5:40:88:c1:df:98:fc:10:22:c6:18:5a:45:1c:e3: be:14:8d:98:ca:af:56:b3:b8:7d:0d:10:5d:b6:e6:a2: 49:89:87:74:65:2c:2e:bd:9f:7f:4f:43:01:f8:c1:b6: 1d:ef:f5:43:dd:a3:c0:c5:74:27:63:51:bb:61:06:83: 00:d1:aa:25:6f:1f:43:b7:94:d8:4f:0c:9c:ce:cb:f5: e7:5b:41:f9:1b:f2:59:ab:e1:0b:ed:22:c6:46:fe:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:5b:ba:a8:f0:cc:51:99:39:16:6b:26:ea:07:03:00: f1:54:f2:d7:8a:6f:17:e3:67:6f:50:51:fc:d2:69:e9: 66:60:b5:79:2c:f4:84:cf:04:fe:3e:52:9f:16:56:1f: e5:86:da:c5:1a:2b:83:77:74:20:a9:48:ea:10:66:b9: ec:dc:a4:a7:d9:31:09:03:cd:2d:1c:58:5e:7c:a0:cc: 0b:4d:59:b0:65:87:e1:f9:82:53:bd:a9:ef:9e:ce:93: a5:d2:7b:ef:b2:f8:e3:e7:b8:a9:83:2a:07:2e:7d:5e: 62:52:db:b3:4d:d7:ec:d4:c2:83:69:33:55:97:99:46: 9d:91:c8:c6:b9:92:44:79:f3:79:83:3d:48:2b:34:31: b7:c8:e5:4b:92:3c:a9:34:4f:87:5f:ce:34:17:9a:43: 57:1b:ac:bf:17:72:47:dd:fa:a6:3e:d4:27:a0:cc:78: 01:e6:91:e0:45:08:2f:51:a3:84:ed:c9:91:9e:21:a8: 39:b0:7a:4b:f5:46:a2:dd:73:2d:48:ef:ff:ed:a9:a0: e7:a5:85:88:1f:61:de:15:5b:bb:38:ee:04:d8:3e:9b: 69:ce:a3:de:de:46:42:89:9a:db:74:2b:d9:11:cc:c3: 71:4e:91:87:82:11:dc:be:5c:71:5a:67:7c:44:24:4f Fingerprint (SHA-256): 69:96:B3:49:2E:62:43:B1:E2:58:26:D8:9B:D5:8C:B6:D0:89:80:88:08:7C:4D:82:F2:E1:37:D2:C5:6D:4D:87 Fingerprint (SHA1): C6:2B:79:D2:DE:7F:BF:FA:06:DF:6C:44:86:41:0D:F6:A7:15:05:CD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2124: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2125: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2126: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2127: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145661 (0x49157f7d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:43 2024 Not After : Wed Dec 26 14:59:43 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:b4:80:b3:98:7c:fd:2a:44:83:c5:74:cd:b4:0e:e6: 49:c2:65:4d:48:89:57:71:22:1e:cb:19:28:f1:fe:ea: 22:0c:dd:db:14:b8:0f:93:bb:25:56:7a:08:a2:ff:63: 43:84:9e:de:59:17:c6:64:86:ea:c0:e1:52:eb:80:d8: 7d:71:65:fd:da:1e:9c:c8:b3:67:ea:e0:8e:9d:5e:81: 44:30:c6:ff:7f:db:8e:34:cb:25:c2:d7:e4:25:35:9a: 88:13:51:04:05:a0:37:57:b2:6b:fa:17:96:b4:5f:63: be:30:22:00:cf:af:2d:ba:28:ef:8b:c8:4c:d7:df:7b: b9:63:78:c7:8b:0d:53:db:38:82:ac:f3:c6:95:ed:da: 14:42:dd:01:16:12:4c:1e:de:48:a6:18:f8:9a:c7:55: ff:b5:40:88:c1:df:98:fc:10:22:c6:18:5a:45:1c:e3: be:14:8d:98:ca:af:56:b3:b8:7d:0d:10:5d:b6:e6:a2: 49:89:87:74:65:2c:2e:bd:9f:7f:4f:43:01:f8:c1:b6: 1d:ef:f5:43:dd:a3:c0:c5:74:27:63:51:bb:61:06:83: 00:d1:aa:25:6f:1f:43:b7:94:d8:4f:0c:9c:ce:cb:f5: e7:5b:41:f9:1b:f2:59:ab:e1:0b:ed:22:c6:46:fe:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:5b:ba:a8:f0:cc:51:99:39:16:6b:26:ea:07:03:00: f1:54:f2:d7:8a:6f:17:e3:67:6f:50:51:fc:d2:69:e9: 66:60:b5:79:2c:f4:84:cf:04:fe:3e:52:9f:16:56:1f: e5:86:da:c5:1a:2b:83:77:74:20:a9:48:ea:10:66:b9: ec:dc:a4:a7:d9:31:09:03:cd:2d:1c:58:5e:7c:a0:cc: 0b:4d:59:b0:65:87:e1:f9:82:53:bd:a9:ef:9e:ce:93: a5:d2:7b:ef:b2:f8:e3:e7:b8:a9:83:2a:07:2e:7d:5e: 62:52:db:b3:4d:d7:ec:d4:c2:83:69:33:55:97:99:46: 9d:91:c8:c6:b9:92:44:79:f3:79:83:3d:48:2b:34:31: b7:c8:e5:4b:92:3c:a9:34:4f:87:5f:ce:34:17:9a:43: 57:1b:ac:bf:17:72:47:dd:fa:a6:3e:d4:27:a0:cc:78: 01:e6:91:e0:45:08:2f:51:a3:84:ed:c9:91:9e:21:a8: 39:b0:7a:4b:f5:46:a2:dd:73:2d:48:ef:ff:ed:a9:a0: e7:a5:85:88:1f:61:de:15:5b:bb:38:ee:04:d8:3e:9b: 69:ce:a3:de:de:46:42:89:9a:db:74:2b:d9:11:cc:c3: 71:4e:91:87:82:11:dc:be:5c:71:5a:67:7c:44:24:4f Fingerprint (SHA-256): 69:96:B3:49:2E:62:43:B1:E2:58:26:D8:9B:D5:8C:B6:D0:89:80:88:08:7C:4D:82:F2:E1:37:D2:C5:6D:4D:87 Fingerprint (SHA1): C6:2B:79:D2:DE:7F:BF:FA:06:DF:6C:44:86:41:0D:F6:A7:15:05:CD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2128: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2129: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2130: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145668 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2131: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2132: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2133: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2134: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145669 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2135: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2136: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #2137: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2138: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1226145670 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2139: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2140: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #2141: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2142: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1226145671 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2143: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2144: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2145: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2146: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1226145672 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2147: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2148: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #2149: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2150: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1226145673 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2151: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2152: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #2153: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2154: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1226145674 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2155: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2156: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2157: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2158: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1226145675 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2159: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2160: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #2161: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2162: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1226145676 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2163: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2164: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #2165: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2166: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1226145677 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2167: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2168: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #2169: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2170: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1226145678 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2171: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2172: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #2173: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2174: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1226145679 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2175: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2176: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #2177: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2178: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1226145680 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2179: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2180: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #2181: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2182: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1226145681 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2183: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2184: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #2185: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2186: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1226145682 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2187: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2188: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #2189: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2190: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1226145683 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2191: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2192: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #2193: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2194: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1226145684 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2195: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2196: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #2197: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2198: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1226145685 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2199: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2200: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #2201: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2202: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1226145686 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2203: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2204: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #2205: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2206: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1226145687 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2207: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2208: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #2209: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2210: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1226145688 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2211: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2212: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #2213: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2214: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1226145689 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2215: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2216: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #2217: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2218: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1226145690 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2219: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2220: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #2221: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2222: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1226145691 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2223: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2224: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #2225: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2226: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1226145692 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2227: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2228: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #2229: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2230: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1226145693 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2231: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2232: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #2233: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2234: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1226145694 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2235: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2236: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #2237: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2238: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1226145695 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2239: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2240: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #2241: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2242: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1226145696 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2243: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2244: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #2245: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2246: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1226145697 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2247: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2248: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2249: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2250: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2251: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2252: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2253: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2254: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2255: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2256: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2257: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2258: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2259: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2260: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2261: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2262: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2263: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2264: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2265: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2266: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2267: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2268: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2269: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2270: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2271: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145668 (0x49157f84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 14:59:49 2024 Not After : Wed Dec 26 14:59:49 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:13:51:a0:60:f1:3f:45:d0:ad:65:a1:47:fa:33:a8: d4:b9:33:65:80:49:8c:72:ff:75:68:17:54:5d:25:d1: c2:26:c7:9e:de:4e:f1:eb:bf:63:e7:2e:a4:db:71:80: 97:49:a3:17:b0:db:37:af:38:57:06:af:63:ec:37:ab: 42:67:64:46:bb:f9:98:89:66:18:7f:e4:bb:4b:31:8e: d9:69:d7:b1:49:83:9b:c3:60:a2:93:78:bb:e5:3b:ed: e1:4a:0f:49:0c:cf:ae:63:74:88:f2:f1:6d:41:43:05: 0a:69:66:e6:8a:7f:81:2a:1f:20:05:f4:ca:38:a0:ce: 50:ad:fe:a6:70:b9:04:cc:e1:ad:57:48:9e:2d:9f:f7: f8:ab:75:ff:a6:c2:83:22:64:c8:21:bf:bf:f1:5f:43: 0a:93:3b:e6:4a:15:63:25:46:7c:13:d5:15:dc:2e:ce: 61:b4:4f:96:51:e5:96:78:07:07:c9:02:3a:a9:36:47: a9:5b:6c:2c:c9:dc:83:af:f3:ca:d4:e9:8e:b7:f0:0b: d8:38:27:40:2a:ec:83:e7:54:2c:31:3b:1f:f2:29:cc: 78:78:db:bc:73:4a:22:a5:17:58:26:7b:f0:1f:58:3b: 7a:f8:2c:04:47:be:9a:f1:a4:1b:d0:22:fa:d8:75:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:79:ad:f6:6a:e8:53:20:e8:ba:9f:6c:12:c8:5e:af: c4:81:73:4c:0d:24:00:d0:a8:de:6e:a1:f1:eb:78:ff: f8:ca:ed:b7:e7:83:34:0f:bc:dc:e9:8f:d9:4c:8d:21: 9f:bc:00:35:87:3d:7b:98:4f:c6:5e:5e:b5:f9:a7:af: 2f:b9:ee:d3:2f:10:82:23:8e:b3:90:89:9e:09:b5:f8: 2c:74:66:87:00:d1:70:df:43:bc:64:90:48:84:7a:91: e0:5a:f4:7c:c1:37:48:60:7a:48:d5:6e:e3:8f:b6:56: 22:ac:67:f0:b7:62:dc:f2:73:07:e6:ff:ec:e7:aa:38: d0:fc:0e:76:a0:3c:2d:74:ee:e5:8b:cb:23:fb:f1:ba: 24:f2:c2:88:b2:eb:96:2e:42:3c:ab:80:7e:b8:ea:ee: 16:29:e2:39:50:03:c4:48:6a:c2:9a:04:20:af:03:7d: 91:ef:0a:8a:43:3c:b7:5a:48:db:70:96:df:50:29:37: 11:00:ce:de:f9:ec:46:c3:8e:31:81:f1:3c:04:bb:8f: 1e:1d:43:62:a8:57:e9:93:f0:3d:21:e1:7d:eb:61:04: 06:5d:d9:f6:ef:e7:5e:cc:74:42:ce:3c:96:41:51:f5: 1a:1e:36:d7:6b:57:28:fe:cc:1c:fe:04:56:52:a1:ed Fingerprint (SHA-256): 9D:85:E1:A2:E6:56:97:F3:E7:72:41:E2:8A:8E:6F:AA:E9:AD:61:D5:C5:1A:8B:AC:09:51:08:3E:05:04:E6:D4 Fingerprint (SHA1): 3A:52:32:FD:C9:0C:0F:C5:25:FF:B3:15:26:EE:A6:FC:A1:E5:66:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #2272: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2273: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2274: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145698 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2275: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2276: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #2277: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2278: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1226145699 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2279: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2280: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #2281: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2282: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1226145700 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2283: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2284: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #2285: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2286: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1226145701 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2287: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2288: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #2289: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2290: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1226145702 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2291: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2292: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #2293: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2294: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1226145703 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2295: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2296: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #2297: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2298: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1226145704 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2299: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2300: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2301: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145698 (0x49157fa2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:15 2024 Not After : Wed Dec 26 15:00:15 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:de:6f:c0:bc:2a:81:ac:78:f8:ac:c0:c3:bd:8e:6b: 61:16:ce:8d:8d:e2:c5:57:96:08:7b:36:1a:8f:27:5d: 91:88:32:33:68:4e:49:2b:b2:eb:1e:44:7d:16:c7:52: dc:99:54:a2:97:10:9d:20:f0:2c:80:60:a2:ca:e1:27: 90:5f:05:d0:bd:15:5a:1b:70:f5:bf:b3:62:ba:df:b2: 54:dd:b9:68:4b:79:70:2a:38:dc:d4:43:d8:56:b4:c4: 23:e3:ee:c2:9d:d5:38:71:bc:9e:91:2c:1c:cd:c0:8c: 8f:4c:f7:dd:b0:0c:44:1e:e1:a4:64:14:7d:55:c6:38: 31:9d:d3:a1:2f:31:b4:a4:d7:99:87:c4:de:fb:bb:62: 16:61:70:e9:e1:74:82:60:af:e2:20:d6:46:55:4b:29: 38:f0:7f:f5:60:2b:65:bd:4a:e0:8f:b1:57:89:80:ca: 2d:f5:a9:7d:0e:a5:5c:7e:b1:d6:97:f1:18:2d:79:be: ca:75:b3:d6:6e:64:e8:ab:39:6c:d4:2f:d7:e4:25:d1: 73:e3:76:70:7f:98:8a:9d:09:cc:a3:f9:1d:8b:b3:f4: 17:64:79:55:a3:3a:b1:35:da:85:05:fc:e2:03:b3:42: 0b:eb:1b:04:77:33:06:e0:64:eb:30:e6:39:bd:56:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:02:bd:bd:5c:55:25:f1:8a:dc:5c:ba:a7:6f:76:d5: a2:ab:06:b2:07:9d:67:3a:03:03:92:8c:53:4e:9f:52: 27:6a:29:72:3f:8a:c3:ee:55:24:55:e5:ef:9a:a8:74: 00:f0:17:9c:ca:d0:7e:37:e7:4f:86:61:76:c7:60:1f: 2f:33:2d:00:f2:23:24:d1:08:98:c6:8b:3b:30:d3:c3: 89:8b:61:ad:fd:24:d8:11:6a:e5:a6:4c:1e:df:f5:30: e6:ca:3f:1b:5f:ee:11:52:dc:b8:3d:12:b4:02:2a:1c: 0a:9f:23:5b:be:82:30:27:39:90:36:37:db:a8:ad:c5: c7:ec:fc:77:0a:da:db:9c:7a:c2:fe:d6:41:8b:11:cf: 33:27:e2:e3:bd:f9:3c:23:ec:d9:0b:bd:23:c8:ca:fe: 21:81:4f:c6:1d:d3:20:01:46:35:15:c4:d0:d7:eb:53: 43:25:6d:59:b8:8e:dd:85:91:0e:c1:26:2f:96:22:6c: 11:91:78:92:f8:d9:e5:3b:15:cc:88:fe:99:81:dc:52: c5:06:5d:c0:63:f3:b5:53:3a:27:83:c5:78:2a:85:e2: f2:c6:8c:14:d1:47:03:6f:4a:53:c5:8a:35:b4:44:0e: b5:67:d6:2a:8b:c4:a8:32:ea:5a:79:c0:39:35:d0:41 Fingerprint (SHA-256): 34:2D:33:61:01:CD:A3:EA:1D:6C:98:8B:66:AE:96:90:9E:06:0C:28:4C:25:8F:1A:25:88:42:0C:FA:EF:15:C5 Fingerprint (SHA1): 7B:8D:F1:BB:D0:47:C7:9E:98:60:8B:5F:3B:A4:71:89:94:AE:47:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #2302: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2303: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2304: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2305: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145698 (0x49157fa2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:15 2024 Not After : Wed Dec 26 15:00:15 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:de:6f:c0:bc:2a:81:ac:78:f8:ac:c0:c3:bd:8e:6b: 61:16:ce:8d:8d:e2:c5:57:96:08:7b:36:1a:8f:27:5d: 91:88:32:33:68:4e:49:2b:b2:eb:1e:44:7d:16:c7:52: dc:99:54:a2:97:10:9d:20:f0:2c:80:60:a2:ca:e1:27: 90:5f:05:d0:bd:15:5a:1b:70:f5:bf:b3:62:ba:df:b2: 54:dd:b9:68:4b:79:70:2a:38:dc:d4:43:d8:56:b4:c4: 23:e3:ee:c2:9d:d5:38:71:bc:9e:91:2c:1c:cd:c0:8c: 8f:4c:f7:dd:b0:0c:44:1e:e1:a4:64:14:7d:55:c6:38: 31:9d:d3:a1:2f:31:b4:a4:d7:99:87:c4:de:fb:bb:62: 16:61:70:e9:e1:74:82:60:af:e2:20:d6:46:55:4b:29: 38:f0:7f:f5:60:2b:65:bd:4a:e0:8f:b1:57:89:80:ca: 2d:f5:a9:7d:0e:a5:5c:7e:b1:d6:97:f1:18:2d:79:be: ca:75:b3:d6:6e:64:e8:ab:39:6c:d4:2f:d7:e4:25:d1: 73:e3:76:70:7f:98:8a:9d:09:cc:a3:f9:1d:8b:b3:f4: 17:64:79:55:a3:3a:b1:35:da:85:05:fc:e2:03:b3:42: 0b:eb:1b:04:77:33:06:e0:64:eb:30:e6:39:bd:56:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:02:bd:bd:5c:55:25:f1:8a:dc:5c:ba:a7:6f:76:d5: a2:ab:06:b2:07:9d:67:3a:03:03:92:8c:53:4e:9f:52: 27:6a:29:72:3f:8a:c3:ee:55:24:55:e5:ef:9a:a8:74: 00:f0:17:9c:ca:d0:7e:37:e7:4f:86:61:76:c7:60:1f: 2f:33:2d:00:f2:23:24:d1:08:98:c6:8b:3b:30:d3:c3: 89:8b:61:ad:fd:24:d8:11:6a:e5:a6:4c:1e:df:f5:30: e6:ca:3f:1b:5f:ee:11:52:dc:b8:3d:12:b4:02:2a:1c: 0a:9f:23:5b:be:82:30:27:39:90:36:37:db:a8:ad:c5: c7:ec:fc:77:0a:da:db:9c:7a:c2:fe:d6:41:8b:11:cf: 33:27:e2:e3:bd:f9:3c:23:ec:d9:0b:bd:23:c8:ca:fe: 21:81:4f:c6:1d:d3:20:01:46:35:15:c4:d0:d7:eb:53: 43:25:6d:59:b8:8e:dd:85:91:0e:c1:26:2f:96:22:6c: 11:91:78:92:f8:d9:e5:3b:15:cc:88:fe:99:81:dc:52: c5:06:5d:c0:63:f3:b5:53:3a:27:83:c5:78:2a:85:e2: f2:c6:8c:14:d1:47:03:6f:4a:53:c5:8a:35:b4:44:0e: b5:67:d6:2a:8b:c4:a8:32:ea:5a:79:c0:39:35:d0:41 Fingerprint (SHA-256): 34:2D:33:61:01:CD:A3:EA:1D:6C:98:8B:66:AE:96:90:9E:06:0C:28:4C:25:8F:1A:25:88:42:0C:FA:EF:15:C5 Fingerprint (SHA1): 7B:8D:F1:BB:D0:47:C7:9E:98:60:8B:5F:3B:A4:71:89:94:AE:47:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #2306: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2307: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2308: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2309: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145705 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2310: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2311: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2312: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2313: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145706 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2314: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2315: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2316: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2317: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145707 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2318: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2319: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2320: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2321: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145708 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2322: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2323: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2324: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2325: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2326: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2327: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145705 (0x49157fa9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:23 2024 Not After : Wed Dec 26 15:00:23 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:91:2f:98:86:68:74:9b:48:c8:74:76:1b:53:c2:2d: 34:e7:91:51:69:d3:37:3b:2e:b0:b0:5a:18:50:13:85: ce:09:6a:57:7c:63:27:ba:dd:2a:c5:07:34:99:06:15: f6:5a:bc:7b:6e:d3:00:db:41:f6:63:d2:f1:c7:66:18: 6e:0a:ac:a3:dc:33:96:9e:55:d5:b7:51:4b:2b:f9:89: 87:c7:04:26:78:f5:06:9f:47:50:88:9e:a0:e7:ce:26: cd:0b:e3:c6:c1:f6:ad:92:f0:f2:9c:4d:78:2d:22:a8: 53:7c:39:91:4b:3e:6e:c7:6a:4f:9e:2b:30:32:b2:3d: 3e:3e:bf:6b:72:63:e2:40:b8:81:bc:a7:7f:5f:b1:29: e3:06:0e:3c:e2:eb:36:5b:22:3a:61:04:bc:07:5f:eb: 3a:a4:83:8f:26:3d:cf:a2:3a:fe:bb:57:7f:e2:c1:e0: 96:fe:eb:60:0e:90:21:21:18:7e:2f:a6:2c:4a:03:87: 42:33:03:78:ca:70:cb:59:e3:71:b5:cb:ac:70:ce:e5: 2f:81:d3:b2:ff:f3:e9:78:28:8e:43:06:b1:1e:f8:98: ac:3c:74:f6:78:d8:da:de:4f:25:39:83:cb:a6:c8:1f: b2:2b:8a:3a:00:d4:db:90:c0:ba:76:39:7f:7e:cc:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 26:33:fd:7a:7e:4e:44:72:9b:b9:71:44:0a:1b:c7:58: a6:0f:d2:47:85:cd:cc:60:0b:84:c6:79:50:10:4b:a1: 93:53:15:68:b0:2e:8a:d2:f8:89:93:35:ba:fb:71:3b: 06:43:a3:9e:97:0f:ae:ae:7e:e9:6b:d6:6b:d2:22:1c: 71:72:66:a0:48:94:49:96:60:c4:f5:28:24:fe:23:80: f1:7e:13:d6:26:b9:b9:8c:7e:93:b7:b4:60:86:8a:6f: 92:b8:ed:e1:6e:0b:98:4a:7f:ec:5c:55:de:79:31:69: b2:52:85:62:ae:4e:da:c5:a7:95:81:65:f4:06:33:28: 3c:2c:25:67:9b:c7:e2:64:88:e5:6b:eb:c3:8b:23:ff: f5:4c:94:03:d1:d0:bf:6b:0f:2d:f8:de:5f:5a:4e:ba: 70:ef:97:84:7a:fd:b5:be:2d:f2:ac:83:36:db:69:27: 2c:54:1a:06:1c:18:a9:91:0e:03:88:00:8a:1b:b7:1b: 95:77:8b:9d:9e:08:ba:05:95:b1:41:ee:0b:11:8f:b1: 09:da:f5:a8:ba:2f:53:68:7c:3d:62:65:3e:d8:86:7e: 98:64:ac:18:1b:25:b7:f2:a1:50:f5:ab:62:c1:03:b0: 39:8a:d4:c8:6f:42:cc:64:78:6e:a0:f4:e5:f3:73:da Fingerprint (SHA-256): 07:F3:AF:3E:B2:C3:2F:93:38:02:66:54:B2:03:9F:1A:77:A1:91:48:EF:02:1C:7D:22:AA:EC:2D:D0:68:A9:4E Fingerprint (SHA1): 30:27:4C:C8:48:CF:FA:66:9F:CE:71:E7:5D:01:96:D6:62:31:5C:1B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2328: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2329: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2330: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145706 (0x49157faa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:23 2024 Not After : Wed Dec 26 15:00:23 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:7c:aa:34:86:5d:fc:11:e5:bc:90:75:27:31:4e:b1: 32:f3:6e:00:2a:3d:a1:31:1a:c0:c3:f7:24:cf:a1:0c: bd:b1:6c:f7:50:9a:9e:13:bd:5e:e9:02:2c:54:34:e7: 8a:32:a3:f2:f3:03:f0:ce:65:83:fe:47:09:ef:7e:03: c3:d2:b8:a8:dd:a2:18:db:ac:00:fb:4a:81:02:a4:cd: fc:4d:ae:f0:74:55:51:98:29:4e:8f:df:e3:90:fb:c1: d8:3b:9e:08:28:13:d5:53:b2:67:fe:ad:94:69:1d:6b: 2c:b5:81:86:a8:76:c1:df:8c:63:5c:d1:0b:b6:33:10: a2:ff:51:e3:a2:de:64:41:a4:0a:23:8e:94:38:04:1e: a5:87:5f:9b:9b:ce:d2:c2:e3:57:d7:f8:40:14:14:89: e8:3b:ef:d6:82:72:1e:e6:25:80:76:4c:39:1b:f7:3e: e8:98:d7:34:b8:55:6d:48:f4:cc:2d:92:94:c9:89:cd: 92:b5:00:a8:4a:aa:bc:66:0e:6c:80:0f:1f:7f:b6:03: 66:53:06:cf:7c:e9:8e:a9:ab:48:58:5e:67:97:e9:87: 43:a1:8f:ee:cb:e2:c9:c1:78:33:e1:ae:3e:05:ec:b2: d6:16:3e:14:5e:4d:55:8e:d6:6d:e8:08:38:f8:5e:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:1d:f6:14:8c:4e:0f:3c:40:cf:8a:74:1f:d3:fc:43: 3b:8c:46:36:be:be:a3:04:83:2f:56:4d:23:67:2c:87: cf:14:41:36:65:aa:be:6d:07:cb:47:ff:34:21:35:c5: 80:73:67:1c:2c:6e:db:c3:a5:79:d8:4e:b0:93:db:f0: 99:b1:c9:89:aa:bc:49:5c:f0:33:4f:35:38:40:bd:43: 65:3f:27:28:71:65:6b:51:90:ec:55:8f:91:69:53:85: b2:8f:9d:d9:9a:04:19:66:05:13:b6:45:12:7f:c5:76: 1f:7a:42:b2:99:fa:ea:96:ab:c0:c3:81:f5:39:b9:f2: 58:4b:18:ac:f9:57:ff:ff:82:96:12:51:b5:3f:19:22: ca:68:a7:13:90:44:37:33:51:99:ad:52:85:3c:c2:36: 76:13:bd:95:74:09:b3:32:ae:b7:31:ce:6b:da:39:55: a0:1e:6c:20:fe:bd:b0:38:3e:b1:d3:57:3b:0f:30:12: 02:cf:dc:d0:b4:21:00:dc:a3:b5:0f:b0:82:c2:bd:50: 3c:4d:eb:34:d2:fa:f2:3b:34:a8:07:33:4d:51:d2:c2: 82:70:cc:8f:c0:60:46:99:5a:a0:4a:8a:f8:34:e2:93: 5b:2c:b1:f8:f5:20:07:b8:0a:d0:c9:1a:d5:f7:22:26 Fingerprint (SHA-256): FD:06:F8:ED:A7:91:9D:7E:4D:41:77:60:D6:73:4B:F3:A3:39:F6:83:0F:B9:29:4C:21:05:C5:FA:05:76:41:1A Fingerprint (SHA1): 1D:D6:B9:4B:CF:DD:BE:54:01:36:44:12:ED:09:F6:A6:F3:5F:D4:4B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2331: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2332: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145707 (0x49157fab) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:00:24 2024 Not After : Wed Dec 26 15:00:24 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:7f:b9:3e:ce:2a:54:00:02:42:af:96:fb:e1:0f:37: 62:30:b3:ec:a7:d7:70:23:f7:f9:80:80:af:0d:aa:61: ca:9b:ad:25:e6:26:12:f6:d3:d5:3e:41:5f:93:15:fd: 61:79:70:f9:82:c0:99:82:9f:d5:56:28:47:9d:c4:4f: 81:1b:c9:d0:aa:4a:82:6c:bd:34:2b:46:bd:25:7f:49: 3d:3a:4a:be:c4:50:58:61:f9:b0:79:33:05:b5:db:bf: 61:35:23:78:d1:e8:47:e7:3f:19:1f:59:ab:13:bf:2d: 7b:b8:83:e1:d8:b6:a1:86:a0:06:46:50:4a:6b:38:97: 87:83:3b:5b:0b:1f:f3:09:d3:54:34:d8:1e:8e:39:4e: 6f:31:0c:3d:a5:cf:3b:e5:79:46:7b:60:a4:dd:e8:9f: 41:f0:64:f2:3a:6c:9f:9a:1d:b4:2a:3d:78:94:f6:91: b3:c2:84:19:d2:6b:84:3b:bd:1e:d3:21:34:f5:f0:62: 12:e7:10:cf:e0:1d:a4:6f:a9:c8:5d:88:ed:24:6f:88: 04:f6:3c:57:c5:3a:b7:3b:e6:5f:b1:d2:23:86:18:6e: 9c:33:4c:1a:48:37:12:97:67:81:ac:ea:5b:f5:e5:ae: 5c:c5:0d:c9:b6:fa:35:55:88:10:f6:85:6d:28:bc:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:cf:4b:6f:e9:7e:09:9b:03:ef:42:fa:64:b7:54:7b: 74:a0:f7:68:98:9e:15:2d:d9:88:1b:92:47:23:8e:e7: ca:f4:c6:c5:97:91:db:44:22:49:72:ab:66:92:84:5c: 38:1d:5e:10:b0:22:db:86:dc:06:3f:b9:20:f2:9a:6f: 47:6f:cf:63:c4:a2:7a:45:c3:c7:d3:69:37:76:50:bb: 73:1c:e6:35:05:83:be:44:f6:d3:07:cd:d1:7e:73:f6: 78:e8:b0:06:16:20:0b:98:b0:4b:86:53:8e:77:b4:eb: c2:1e:81:8e:5a:1a:ec:5f:b4:ef:58:ec:7c:9a:5a:ce: 29:04:a1:32:a4:e9:94:a2:12:13:7a:a4:60:8b:51:78: b9:bb:ee:35:db:05:a6:34:60:6d:09:ee:aa:c5:bd:0c: 05:2c:c2:e8:db:ee:57:f6:88:f8:e9:5a:e3:1d:c0:b8: da:30:7c:b1:98:51:72:0c:7a:98:64:ef:a8:44:f4:70: a2:84:1f:f6:9e:fb:e8:be:ae:79:35:ea:84:d4:bd:aa: 2b:1a:81:fe:e3:86:db:53:7a:81:f5:be:6d:c7:e5:6a: 07:e4:c0:75:35:be:28:1b:9a:7c:99:43:ac:83:48:7c: d9:c6:d7:bb:c8:84:02:2b:28:6d:2b:8d:f4:64:43:bc Fingerprint (SHA-256): F9:7E:E1:B7:C4:99:A9:AF:43:11:91:C8:82:52:D9:1F:BE:22:26:0E:A0:8B:F3:14:92:49:6B:37:DD:EC:7B:D6 Fingerprint (SHA1): AD:7C:FD:B4:86:40:67:BA:FC:5C:DA:6B:1E:34:52:C0:EE:B9:9D:A5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2333: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2334: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145709 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2335: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2336: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2337: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2338: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145710 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2339: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2340: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2341: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2342: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145711 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2343: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2344: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2345: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2346: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1226145712 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2347: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2348: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2349: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2350: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1226145713 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2351: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2352: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2353: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2354: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2355: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2356: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #2357: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145709 (0x49157fad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:26 2024 Not After : Wed Dec 26 15:00:26 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:d3:53:e6:08:6a:45:55:14:ec:0c:63:5c:b5:b7:42: 22:06:3d:c6:c6:74:cd:af:69:a6:2e:3e:ec:1d:4f:b1: fe:fa:c0:32:20:a4:57:41:9b:f4:ba:47:52:1a:b1:25: 0e:40:ef:84:5b:20:ce:11:84:22:49:6d:4f:fd:4f:56: 95:74:7a:e6:3b:64:74:6e:8a:70:7b:db:61:3b:09:fe: 71:5d:eb:a5:74:8a:16:c1:6d:2b:01:7a:e4:06:b8:29: 51:50:1e:f3:58:ea:6e:17:bf:9d:f3:a5:7f:8c:a7:79: f1:18:e0:41:a9:d0:e9:06:ac:26:46:0c:dd:6e:0e:73: 8c:c5:68:8a:06:c4:84:1e:d4:76:90:40:2a:8e:de:d1: ca:6c:bc:df:be:34:9b:66:67:8e:22:c2:5e:3c:0c:75: a6:33:34:ac:1d:8a:29:7f:76:89:24:68:c8:c5:c3:f2: 2d:90:05:6d:7c:ba:13:47:7d:2e:97:e5:f6:de:44:67: 5b:40:40:0a:70:dd:e8:76:5c:66:c6:c2:81:6f:dd:e4: 6a:53:4e:c9:1c:2f:ff:b2:82:47:d5:91:99:ea:df:a1: 9f:d8:04:c1:57:79:dc:7a:90:7f:69:d6:b1:ca:04:c5: 55:f5:9a:96:e8:30:66:89:ad:4c:bb:f3:c2:02:26:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 38:9d:dd:a2:92:3e:24:f0:e5:51:1b:5c:fa:60:71:82: e2:65:f4:f0:7e:83:85:aa:cf:11:8c:b6:aa:fc:d3:ad: f5:a7:5b:5c:12:ef:9c:02:fb:56:13:7d:04:6d:05:15: ef:1c:ff:bd:b3:20:1e:4c:b0:ea:d0:6a:36:02:93:f3: ba:6d:90:4d:68:04:f4:5f:ee:d4:46:35:ea:d4:d1:a4: ab:88:86:dc:4b:bd:70:11:ad:48:f9:c5:7e:36:8b:98: 3c:0b:63:37:23:64:bd:65:85:5b:c4:f8:51:41:5d:cf: 1c:8e:e8:6d:94:ff:c0:78:cd:d4:9c:2e:f0:67:02:78: 68:f7:75:3c:bf:d6:d4:6a:d1:5a:9f:44:e6:7b:3c:c4: 99:e3:2b:21:f8:b7:d2:31:74:1a:d2:2d:cf:1c:94:91: b2:2f:f1:8a:88:ff:83:67:5c:80:e4:1d:91:4d:83:65: 6b:0e:3b:e2:5b:cf:ad:1b:c8:07:b1:3f:51:96:ad:71: ca:4a:48:48:96:40:4c:a4:38:75:2c:19:13:cf:e0:69: 0f:24:be:31:b3:0e:ac:08:d9:f6:d2:a8:b7:7f:f0:61: 59:2b:7b:a3:77:9f:97:6d:be:e1:31:ff:78:be:5a:2d: ec:5c:39:c7:a6:3c:1e:ff:db:58:f2:78:31:51:df:cd Fingerprint (SHA-256): 23:F5:30:36:F0:75:91:E1:6C:4C:57:78:2E:DF:6A:26:6B:03:8F:A2:35:26:BD:AD:86:60:AB:42:05:D7:3E:C3 Fingerprint (SHA1): A8:38:16:26:95:3F:6D:68:83:1F:74:34:E0:3B:E1:9F:E9:CF:07:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2358: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2359: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145710 (0x49157fae) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:27 2024 Not After : Wed Dec 26 15:00:27 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:ac:ed:8e:f2:65:78:a8:68:86:f6:89:d2:44:75:ce: 64:21:68:7c:4a:63:28:f6:11:8f:7a:7c:34:67:e8:3b: c0:63:93:9b:27:7f:e0:97:e4:7a:01:7b:40:11:c5:f7: 4b:de:bf:0f:db:ea:63:8c:14:b8:90:38:23:e3:f1:56: 7f:39:30:6d:e5:43:1f:76:93:65:57:f8:c9:82:d2:6e: 9e:80:39:80:85:c0:01:c2:d2:0c:23:0b:49:be:fa:35: f2:20:9f:93:15:39:39:53:bb:94:0a:7e:f1:57:86:31: 41:5a:11:50:bc:79:b1:77:3c:69:eb:85:3e:ca:84:2c: f3:4e:c9:ac:58:44:9e:7f:58:cc:ae:32:18:52:cb:1e: 6a:2f:50:f5:0c:4e:09:4c:11:fc:7e:65:6a:42:a6:10: ef:d6:59:e7:5f:74:70:47:9f:3e:4c:b8:8c:40:5f:82: d2:3b:0e:9d:b3:ed:46:9c:b6:66:d8:64:3d:03:79:7b: 4b:fa:9b:e6:68:22:45:47:92:c2:da:5d:f3:60:51:ab: 40:42:11:9a:fc:27:69:62:7e:93:6e:7f:af:5f:94:8b: 47:9b:ae:71:41:6a:0c:33:c6:78:8f:ba:9a:5e:76:6c: aa:3c:0c:0e:fa:fc:f5:05:31:b1:b1:fd:27:01:e7:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1c:ac:f0:aa:6d:b8:33:60:a7:9e:5f:20:35:93:6d:1d: 65:f1:d4:48:6a:82:55:08:47:38:c0:d9:74:98:76:4b: a1:99:83:4b:f9:76:25:6e:bf:fc:13:75:46:77:6a:83: 88:b7:b7:41:5a:42:61:26:64:6d:89:fe:59:fc:5b:3b: 1f:4b:df:e6:19:aa:0f:e5:f2:c0:8e:45:0b:06:09:05: 93:ee:96:ab:b5:bf:9f:f8:62:3c:a7:ee:c9:da:1d:6a: f6:b3:0b:69:25:6d:0d:2c:76:bd:44:48:c8:d1:e7:4e: b2:14:cb:37:e6:9b:9a:02:70:ee:6d:a0:3f:58:25:1e: 04:54:a8:dc:48:31:22:4e:a9:f1:27:ee:b3:59:b8:12: b2:f3:2f:21:fa:c4:a8:4a:ac:1c:ef:87:f1:3d:8c:64: 3e:6f:b8:fd:af:9d:69:ad:2c:ea:23:59:0f:12:11:7a: 74:c6:21:05:c3:2e:79:65:32:b7:f1:8f:ec:20:8b:3b: 26:d8:08:06:73:85:56:21:5b:24:8d:c2:9e:4b:c5:f2: 74:99:36:69:8a:bc:4b:78:4a:21:2f:ab:6d:86:0c:8a: 1c:87:42:c7:d5:49:b6:f6:a7:ef:b4:85:1d:e2:23:29: b5:9f:19:26:95:67:13:09:ba:cf:8e:89:7e:4f:8a:65 Fingerprint (SHA-256): D5:EA:B5:CA:49:AE:98:37:C3:9A:93:38:E8:9C:DB:B6:1A:70:2D:D8:62:49:52:CE:E0:CF:F1:B8:22:4A:A7:56 Fingerprint (SHA1): A2:D1:C5:C5:6E:B6:EE:1D:BF:BB:B4:4A:D9:33:17:ED:F8:85:D2:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2360: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2361: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2362: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145711 (0x49157faf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:00:28 2024 Not After : Wed Dec 26 15:00:28 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:98:18:fd:99:c9:d8:a4:44:bd:ff:0b:37:3a:a8:6f: 15:dd:f2:08:68:70:ee:f9:8e:93:b1:20:25:a0:13:39: b4:22:e5:13:e6:4b:53:e3:d3:e3:e3:f0:f1:d1:37:b8: 1e:93:64:ea:49:85:d1:bf:0f:45:5d:92:a9:49:8e:58: 01:8f:8c:e9:2a:ad:05:24:9f:b1:f1:81:6b:25:08:92: 6b:e5:4f:05:d3:4b:4c:1a:11:58:20:69:d8:89:b8:55: 59:ff:0d:01:0a:95:67:3e:73:b7:98:0e:f7:9c:c0:82: e9:9d:eb:1a:22:d0:0f:11:15:ef:68:8c:bf:fd:b7:06: e7:30:74:1c:ec:ac:59:04:4b:36:37:6b:1d:23:85:69: 07:6e:84:2a:16:12:06:02:6f:f5:09:54:11:79:42:cc: ee:42:5c:67:fd:5f:b2:ce:06:3a:f6:44:9f:77:1a:a8: df:68:87:79:53:25:5c:5e:6d:9e:14:3f:76:6d:3d:af: a0:8e:a2:90:3e:1b:21:82:d9:5a:07:91:50:19:ba:70: ae:0e:e7:c6:bd:87:37:ac:15:d7:ce:d1:36:66:aa:fc: 25:3a:69:33:84:93:5f:42:7b:66:6c:1a:bd:fc:c7:e3: e0:1b:ce:60:88:17:f3:9c:80:09:77:1e:70:90:f3:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:98:ff:e1:3b:3e:24:2a:19:76:c9:40:c4:af:61:47: c5:1f:f7:4e:7d:d5:52:4d:e9:81:76:0c:9b:3f:5b:23: 7b:38:9e:82:13:da:70:71:05:ba:e3:9f:22:df:07:4e: 90:63:c1:0e:b9:89:58:9c:af:63:05:49:f4:3a:08:a6: cf:5a:09:bd:0b:cb:ba:4c:cc:86:07:cf:44:cb:73:a4: 29:04:a7:a0:8a:5a:04:f5:49:12:7d:3b:66:99:2c:01: 8c:0f:0c:45:bf:42:34:5d:ef:a0:71:7b:cf:0c:64:22: cf:25:d4:df:df:a6:15:ce:c1:f3:34:b4:45:be:45:b2: 00:f3:c8:af:ba:bb:f6:b4:26:35:48:58:c0:df:05:d8: 7f:fc:26:f4:92:3f:9e:33:be:ad:3d:5f:3a:51:8f:49: cd:60:bc:c2:8f:8d:1a:e0:f2:dc:10:5b:db:c8:df:7a: e4:fe:aa:b2:9e:9a:69:4e:7b:3c:4c:56:3d:ee:33:23: c1:7a:b2:fa:12:51:15:b4:52:04:d1:cc:e3:19:fb:f7: a1:d2:0e:d3:7c:7f:f4:34:24:41:42:30:6e:54:86:5d: a7:63:51:e5:a1:35:0b:c6:ea:e8:b2:d2:da:0a:12:cd: 92:55:e5:8a:ae:f9:c4:f7:03:e1:7a:39:20:0f:86:2d Fingerprint (SHA-256): 6C:3F:08:B9:81:92:36:91:40:14:41:61:D2:3C:29:96:0B:02:D5:81:1F:65:7F:3B:CD:9E:0D:AA:31:FF:75:CF Fingerprint (SHA1): 84:20:7E:F5:C1:0C:24:51:A9:68:D4:90:0F:38:64:2C:F4:37:FB:57 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #2363: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2364: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145714 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2365: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2366: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2367: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2368: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145715 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2369: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2370: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2371: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2372: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145716 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA1Root-1226145347.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2373: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2374: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2375: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2376: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145717 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2377: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2378: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #2379: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145714 (0x49157fb2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:31 2024 Not After : Wed Dec 26 15:00:31 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:46:65:d7:42:02:1a:39:8f:8b:8a:14:9d:ed:ef:23: 4f:43:76:bb:4a:9b:cf:35:43:43:6c:30:8c:cc:3b:43: 80:25:36:87:ae:61:ac:2e:dd:ff:7e:f3:4d:d1:58:2c: 60:c9:a5:27:38:d2:10:4f:66:13:c2:29:9f:05:2f:8a: 72:54:b8:45:e8:c3:d0:07:9f:33:4a:df:7a:08:d3:b1: 01:ed:32:fa:e0:7c:bb:43:ff:24:2a:14:ae:19:62:4c: 97:79:7c:77:a0:4c:30:3f:f2:84:51:07:b3:a6:57:4f: 43:b7:2e:b1:20:65:7a:ad:ce:85:0e:ee:fb:bc:83:fd: 9b:83:02:f7:e3:b5:ee:57:58:21:f4:3d:18:d9:7a:d0: 51:db:e6:0e:d4:72:1d:4e:52:57:22:aa:cd:fb:1e:42: ea:df:6b:18:4e:c0:7a:bd:a0:35:04:a5:a2:b2:d3:dc: 73:97:f5:2f:99:8b:ac:88:e3:69:75:08:dc:d7:98:85: 32:18:49:0f:da:f0:24:47:a7:51:1f:6f:51:ff:8f:3d: 87:81:bf:ec:f8:22:b7:0b:09:95:76:53:d5:c0:1c:72: 72:f1:56:04:a1:4c:90:ff:0f:2b:b5:b3:ab:4f:40:40: d3:a4:22:d9:ec:94:30:9b:c5:54:3c:de:64:42:59:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 02:2e:ce:0e:3b:94:4f:5d:74:c4:8a:53:b1:a4:63:70: 70:db:d4:cc:e9:8f:45:b5:10:fa:14:80:66:db:43:30: bd:05:64:97:0e:42:d9:ba:3a:74:fc:32:59:14:26:f5: 8a:86:10:c3:68:e4:69:36:5e:27:ad:61:71:bc:a3:b3: 62:66:67:21:e6:7f:48:75:1e:e0:26:2f:47:c1:88:0f: 12:78:9d:bd:a8:d4:3a:8a:b0:f5:fa:f7:7a:ad:4a:e1: 92:19:61:78:63:ea:a7:e2:02:07:76:b1:a4:35:9b:80: 4a:d0:70:ad:65:0e:74:3b:be:d1:22:35:3d:47:23:d8: d1:0e:72:25:de:b7:6c:fd:22:65:60:30:ee:36:7e:b2: a5:b4:ac:a6:b1:5e:6a:ea:67:ca:fa:d2:24:22:bc:80: 8d:d7:41:7e:c7:84:a0:24:26:40:16:05:35:a3:a2:12: 15:f0:52:34:65:35:19:f9:a8:65:f5:33:1b:33:e7:04: 44:66:74:cd:a0:5e:be:56:4e:34:c5:49:3b:f0:87:61: a9:61:f9:49:79:e1:1d:0f:d4:af:1e:89:e6:62:38:e5: fb:47:2a:82:36:8f:88:90:a2:eb:f1:52:a5:18:ce:d1: 01:b7:12:a2:33:e8:dc:2a:79:6f:75:6f:3e:d3:f3:db Fingerprint (SHA-256): F0:7B:44:21:BE:F6:EE:1E:7C:50:00:56:C1:4C:C8:1F:6F:BB:F9:E1:71:2C:64:CF:E0:63:ED:2A:F2:51:23:4F Fingerprint (SHA1): 9A:33:F3:9F:D6:47:AD:21:F7:3B:B3:66:88:66:40:84:29:8E:25:64 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2380: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2381: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145718 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2382: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2383: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2384: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145719 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2385: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2386: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2387: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2388: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145720 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2389: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2390: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145721 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2391: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2392: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2393: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2394: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2395: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145722 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145348.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2396: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2397: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2398: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2399: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145723 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2400: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2401: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2402: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145718 (0x49157fb6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:00:35 2024 Not After : Wed Dec 26 15:00:35 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 92:e1:96:19:bf:f4:ba:56:7d:d1:fb:96:82:fd:8b:1d: dd:81:ed:51:bc:54:b6:6c:31:fd:ce:b5:5f:57:79:2a: 92:a2:d8:8b:29:a8:79:46:49:ea:70:ea:8b:01:a4:ec: 5a:7f:27:f7:03:1c:f8:18:c0:ec:b0:90:e3:ab:1f:2c: 99:af:07:8e:92:ba:b8:d7:78:7b:33:ef:49:8e:e8:6a: 6a:51:c1:9c:6b:5a:71:b0:2a:97:36:28:f5:fe:cc:c2: d7:8b:6a:d3:4f:07:c0:b4:7a:43:da:19:db:22:b6:3f: ee:80:73:1a:e9:3a:af:e2:da:81:13:8b:53:04:67:b9: a7:f0:02:27:4e:2c:e4:6a:4e:3f:db:6a:60:4f:58:f8: 32:e1:66:b7:dc:be:14:16:09:fa:a0:b2:6c:a8:79:f5: d0:ad:6a:7d:3d:47:6b:2d:9e:56:6c:9b:d7:83:46:7e: 82:e5:c2:a3:e5:01:ce:f4:0e:95:ef:3c:67:2c:b9:35: d0:7e:74:44:92:93:96:78:15:5b:38:e6:1c:92:da:af: 32:b4:6d:e3:d3:78:c0:03:6f:1f:1d:03:cf:9d:6c:cd: 28:9b:32:83:51:7b:6d:89:e9:88:b9:8f:57:c3:8d:69: d6:54:ba:6f:19:d4:30:ab:8a:85:a4:68:df:b0:eb:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:eb:3c:0f:92:d7:56:b0:19:62:a3:55:e8:4e:22:a7: 18:73:43:8f:98:ea:af:7a:2c:5c:ba:f0:25:e8:48:90: da:cf:be:43:54:d8:6e:a3:f8:04:40:4f:17:24:17:be: bd:b1:da:63:cf:97:61:af:87:0b:a3:2d:e3:f6:94:39: d2:14:ff:13:7d:df:17:72:81:58:f6:1c:d3:2b:4e:c7: 7d:e7:0c:ad:87:44:96:42:45:3b:86:65:77:c4:fa:fe: 1a:b8:2b:18:e3:8b:ed:ca:48:68:2c:3e:ef:1d:f4:c9: 20:bc:f2:ef:ed:ba:6c:c8:9e:5c:6f:55:69:2e:10:92: 9c:e0:b6:71:ef:8b:c1:6d:81:84:17:e4:ef:c0:42:f6: 1a:ce:30:ea:1e:8e:b7:e7:3c:f6:6d:5f:e2:bc:c4:49: 97:94:46:c1:48:e9:13:c5:d5:9f:b3:45:40:6f:8a:14: af:fc:7e:90:32:41:b8:dd:86:9b:7f:70:77:ab:f6:0a: 4d:e6:d8:81:83:a4:ed:86:a2:95:27:b4:22:c8:4f:f4: 0e:50:aa:54:2f:e3:46:fe:b5:8c:11:39:d0:b1:d9:05: af:52:f6:bb:b8:eb:9d:f2:42:c1:e6:3f:c4:d1:bb:2e: c7:54:28:60:3a:c6:00:d8:7b:44:ea:87:f1:21:71:02 Fingerprint (SHA-256): E9:8C:A7:18:C5:D1:D9:56:CF:6B:69:B2:BE:A2:F5:86:FC:DC:06:14:22:66:35:A0:B9:50:8F:8E:99:47:F6:C2 Fingerprint (SHA1): 28:20:1A:5C:A7:60:D2:33:E4:CF:2A:35:2D:E0:92:92:C9:39:25:0D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2403: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145719 (0x49157fb7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:00:36 2024 Not After : Wed Dec 26 15:00:36 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:6e:3b:5a:ae:3f:ec:36:c5:31:d3:2d:af:d8:e7:54: 01:e8:c8:b9:35:6c:7a:72:ac:c4:e7:44:65:42:bb:5c: d5:85:a7:f5:e2:fe:5a:f6:5b:8c:4d:da:fb:36:a9:53: 42:d2:c7:a1:04:41:b8:c5:32:48:bc:ff:b7:d6:c8:6b: e6:a4:f0:8c:cf:af:ac:e5:5e:18:49:06:02:22:a4:6b: da:93:bd:a5:bb:13:2c:0b:c4:42:16:21:f2:46:f4:ae: 42:d6:6c:e6:65:e5:cd:bd:95:98:39:33:f9:80:1e:bc: 53:da:78:d6:db:b1:3c:85:2d:3f:7f:b1:87:08:65:f4: 7b:b3:10:f0:2e:2e:1b:9a:61:c7:a4:22:4d:17:6c:9a: ef:7e:b4:16:51:d5:7b:36:fc:13:15:e2:0c:50:44:f3: 0e:f3:9c:71:d3:f8:00:f9:a0:95:96:da:6c:bc:29:71: 43:df:36:e3:1e:89:86:7a:76:dd:c5:b3:5a:39:61:09: 24:c9:fb:36:bb:0b:65:c6:93:e9:76:b7:2a:0e:d4:56: 0c:90:83:26:7c:64:21:95:14:9a:40:0e:86:f0:21:b3: 89:b3:17:1f:33:fb:d5:ce:47:6d:22:fb:4f:3a:41:6b: ea:8d:6f:44:d5:87:79:4f:c9:77:44:83:fc:11:be:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:f8:38:96:55:1f:19:dd:26:37:6d:73:77:e9:c2:8c: 9f:c7:cb:03:2a:23:db:e9:65:b1:b9:c2:87:45:e6:e4: 86:94:26:82:eb:b1:cb:30:1c:ee:5f:d4:0f:15:a8:5b: 05:33:d5:ad:bd:51:4c:59:df:d6:4a:18:e1:c9:32:f4: 30:75:32:1b:55:35:e4:e6:36:70:ee:12:c3:10:a3:5c: b4:34:c3:8e:56:62:7d:e1:0c:10:5e:9b:79:d4:37:d7: ef:c0:96:0f:ac:a0:bb:04:27:7d:bd:e2:23:88:65:6d: 56:0a:8c:3e:97:d0:fe:b2:86:6c:bb:6f:c3:bc:0f:e9: 47:c6:b2:d2:9e:8e:ff:6d:38:58:4d:b2:64:b1:e0:4b: 44:ce:89:8e:2d:23:73:39:eb:c8:9b:fd:a3:12:b7:91: 98:57:e7:e0:43:5b:61:d1:0e:91:fc:a8:28:f0:3e:b7: 95:e4:23:b2:6f:42:ef:f9:a3:60:07:53:fe:a0:50:8b: fa:11:b4:81:1d:d8:79:8b:ee:b1:86:89:ee:15:ab:f7: ae:88:63:b2:05:c3:5b:33:dc:ed:bc:f3:dc:d0:f2:cb: a6:d3:f2:27:7e:a1:df:b0:60:ae:d9:b3:d4:7b:c3:00: ee:10:2a:50:03:da:f8:98:8d:f3:14:90:b8:cb:fe:bb Fingerprint (SHA-256): 65:5B:A6:DE:A0:0E:EA:92:6F:35:06:77:FB:4E:58:B7:5D:E4:37:E1:C9:BF:88:AE:CC:61:48:B3:4C:45:48:6F Fingerprint (SHA1): AA:A6:35:F6:BF:CA:6E:B6:CE:40:9D:18:D5:7B:71:4F:B9:AC:9F:8E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2404: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145719 (0x49157fb7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:00:36 2024 Not After : Wed Dec 26 15:00:36 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:6e:3b:5a:ae:3f:ec:36:c5:31:d3:2d:af:d8:e7:54: 01:e8:c8:b9:35:6c:7a:72:ac:c4:e7:44:65:42:bb:5c: d5:85:a7:f5:e2:fe:5a:f6:5b:8c:4d:da:fb:36:a9:53: 42:d2:c7:a1:04:41:b8:c5:32:48:bc:ff:b7:d6:c8:6b: e6:a4:f0:8c:cf:af:ac:e5:5e:18:49:06:02:22:a4:6b: da:93:bd:a5:bb:13:2c:0b:c4:42:16:21:f2:46:f4:ae: 42:d6:6c:e6:65:e5:cd:bd:95:98:39:33:f9:80:1e:bc: 53:da:78:d6:db:b1:3c:85:2d:3f:7f:b1:87:08:65:f4: 7b:b3:10:f0:2e:2e:1b:9a:61:c7:a4:22:4d:17:6c:9a: ef:7e:b4:16:51:d5:7b:36:fc:13:15:e2:0c:50:44:f3: 0e:f3:9c:71:d3:f8:00:f9:a0:95:96:da:6c:bc:29:71: 43:df:36:e3:1e:89:86:7a:76:dd:c5:b3:5a:39:61:09: 24:c9:fb:36:bb:0b:65:c6:93:e9:76:b7:2a:0e:d4:56: 0c:90:83:26:7c:64:21:95:14:9a:40:0e:86:f0:21:b3: 89:b3:17:1f:33:fb:d5:ce:47:6d:22:fb:4f:3a:41:6b: ea:8d:6f:44:d5:87:79:4f:c9:77:44:83:fc:11:be:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:f8:38:96:55:1f:19:dd:26:37:6d:73:77:e9:c2:8c: 9f:c7:cb:03:2a:23:db:e9:65:b1:b9:c2:87:45:e6:e4: 86:94:26:82:eb:b1:cb:30:1c:ee:5f:d4:0f:15:a8:5b: 05:33:d5:ad:bd:51:4c:59:df:d6:4a:18:e1:c9:32:f4: 30:75:32:1b:55:35:e4:e6:36:70:ee:12:c3:10:a3:5c: b4:34:c3:8e:56:62:7d:e1:0c:10:5e:9b:79:d4:37:d7: ef:c0:96:0f:ac:a0:bb:04:27:7d:bd:e2:23:88:65:6d: 56:0a:8c:3e:97:d0:fe:b2:86:6c:bb:6f:c3:bc:0f:e9: 47:c6:b2:d2:9e:8e:ff:6d:38:58:4d:b2:64:b1:e0:4b: 44:ce:89:8e:2d:23:73:39:eb:c8:9b:fd:a3:12:b7:91: 98:57:e7:e0:43:5b:61:d1:0e:91:fc:a8:28:f0:3e:b7: 95:e4:23:b2:6f:42:ef:f9:a3:60:07:53:fe:a0:50:8b: fa:11:b4:81:1d:d8:79:8b:ee:b1:86:89:ee:15:ab:f7: ae:88:63:b2:05:c3:5b:33:dc:ed:bc:f3:dc:d0:f2:cb: a6:d3:f2:27:7e:a1:df:b0:60:ae:d9:b3:d4:7b:c3:00: ee:10:2a:50:03:da:f8:98:8d:f3:14:90:b8:cb:fe:bb Fingerprint (SHA-256): 65:5B:A6:DE:A0:0E:EA:92:6F:35:06:77:FB:4E:58:B7:5D:E4:37:E1:C9:BF:88:AE:CC:61:48:B3:4C:45:48:6F Fingerprint (SHA1): AA:A6:35:F6:BF:CA:6E:B6:CE:40:9D:18:D5:7B:71:4F:B9:AC:9F:8E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2405: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2406: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145724 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2407: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2408: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2409: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145725 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2410: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2411: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2412: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2413: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145726 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2414: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2415: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145727 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2416: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2417: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2418: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2419: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2420: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145728 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145349.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2421: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2422: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2423: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2424: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145729 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2425: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2426: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2427: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2428: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145730 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-BridgeNavy-1226145350.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2429: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2430: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2431: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2432: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145731 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2433: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2434: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2435: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145724 (0x49157fbc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:00:40 2024 Not After : Wed Dec 26 15:00:40 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:c6:b6:6a:05:74:e1:aa:f8:34:b8:05:e1:e7:1b:05: e2:02:4c:a8:26:eb:1b:bb:34:f2:ec:a6:f9:a6:3b:79: 28:3e:2e:f4:a8:a5:ef:56:3a:29:46:fe:b0:14:88:fd: 7d:c8:30:0b:30:90:19:ea:86:87:0b:8f:81:bc:94:d8: 2b:24:c8:26:a4:ce:3a:10:26:76:6f:10:ac:f5:cd:51: 95:3f:4a:f7:5e:3d:f0:66:13:d0:f8:19:1d:8b:da:18: b6:ff:1d:e2:97:35:ef:11:2f:50:66:c5:d6:52:af:d0: 4f:4e:c1:0e:a2:ec:b5:25:68:6d:8d:b5:a2:ce:71:9e: e2:8d:4a:86:e3:8b:c6:51:c9:5c:ee:89:c6:6e:b2:6b: b4:1b:bd:a8:eb:06:de:9d:20:16:a8:2d:61:9b:9f:ee: 88:fd:b7:cb:49:68:27:5b:1c:66:42:fb:0d:da:b3:a4: 17:78:f4:f8:e3:2a:cd:08:43:bf:9f:a2:69:83:f2:bd: d1:28:77:a7:62:f1:3d:25:71:e3:9e:05:c5:89:87:59: 6a:1a:d2:1a:b6:03:c3:ae:fb:aa:ab:44:4d:9f:54:84: 75:f5:8b:82:c8:b4:4a:de:c5:5d:37:e8:ec:c9:81:91: 43:7f:74:20:46:8e:49:ca:db:a9:35:51:8f:c7:b2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:98:fe:a6:3b:bb:d4:f1:c8:03:b2:51:7d:09:26:de: ea:4a:57:13:f1:96:4f:7e:ee:db:3a:ec:9a:cd:d0:1c: 4a:2e:09:ba:31:19:b1:c7:06:52:30:54:6f:cc:f7:60: 45:d2:37:3e:e2:71:fd:bd:10:4f:b5:c5:11:8d:73:89: 08:04:17:81:da:77:7f:6f:5a:5d:77:97:0c:73:8f:23: d6:38:b7:57:f2:05:8b:97:49:61:48:13:12:75:f5:20: f2:a9:5b:ba:cf:f9:86:6c:8d:fa:e8:6a:00:01:db:6e: 38:76:c2:0d:95:94:3e:5e:65:46:54:a0:83:13:35:47: d2:1c:1a:cd:2c:4d:db:aa:7c:b0:3c:47:80:af:8f:a4: f9:c2:08:9a:4a:01:4d:04:43:f5:3b:7e:7a:96:ef:72: a0:cc:d5:3a:8f:62:ff:46:b5:c5:3f:48:74:9e:d4:e0: 4f:10:b8:81:23:92:90:c3:c2:31:0c:b8:d0:35:6f:1d: 61:bf:73:36:05:43:6b:6a:be:a2:2d:5c:e9:91:e5:3d: f4:48:af:a4:8a:1c:92:f9:d6:81:4b:c5:90:f1:c6:86: 86:6a:6f:9a:1f:ff:ff:ee:74:81:41:34:99:82:1c:33: 73:db:d4:d9:90:f9:52:1e:75:4c:3a:b6:3d:f4:51:f4 Fingerprint (SHA-256): EA:A9:1F:DE:E4:4F:C9:2C:31:F0:86:FF:EE:60:59:C9:94:FB:D9:2D:69:AF:1E:7A:D8:88:30:6D:3D:5E:2B:3E Fingerprint (SHA1): ED:8F:B7:4F:18:F3:4C:20:98:EB:8F:30:50:31:6E:78:94:1B:13:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2436: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145725 (0x49157fbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:00:40 2024 Not After : Wed Dec 26 15:00:40 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:43:55:f1:24:72:28:89:ad:89:92:e2:7e:24:e2:ea: d1:9a:a7:2a:b3:4e:b4:1f:d1:41:5b:ed:47:ef:40:19: 99:5e:34:63:a6:32:71:c5:49:b3:c2:5a:4d:1c:f4:e4: 6b:f8:f6:d5:b1:5b:aa:ae:f9:a8:a0:63:58:95:cd:29: 2a:cb:57:10:0e:f0:2b:01:b1:bf:c8:38:b0:4c:21:7b: 95:f2:27:96:6f:e8:df:6c:a3:cb:e2:a2:14:41:ef:de: c6:f5:4d:33:ea:c7:ba:47:e1:6b:9e:f3:51:e9:61:dc: ba:f9:fd:1b:45:7f:be:b7:3e:50:41:cb:bd:53:d0:e2: ea:c8:45:95:83:7b:00:e5:58:ab:c6:1e:4f:fa:e8:85: a7:67:4e:ed:5e:f7:32:40:a5:b0:4f:67:e4:9e:e7:67: 7a:5f:3b:32:5a:a7:a5:93:f6:29:b5:97:96:27:6f:6c: d9:95:b0:d2:7b:cd:7f:a3:67:e1:80:c4:d2:fd:02:14: 55:af:a3:91:5e:58:7c:8e:16:94:b3:6b:19:c1:43:a4: 85:be:d2:b8:54:28:f5:13:f4:72:8b:b4:19:63:e4:c9: 26:81:68:1b:d8:24:c1:15:7f:b9:84:0d:1b:09:15:f7: 5a:57:ec:ce:6f:c9:93:fc:e4:b4:33:37:24:b5:1e:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:76:03:bf:6b:d7:58:63:46:59:f2:40:c2:1b:cd:81: 85:0e:aa:b1:dc:61:8c:c5:ef:d2:22:a8:e6:50:f9:5e: 11:83:4c:8e:01:51:b0:42:85:87:3b:3f:4f:be:23:b9: 4c:00:94:3d:54:c2:6e:02:57:0b:78:f1:7f:56:db:3b: e7:58:81:32:21:0a:a1:74:a7:68:10:d7:72:bf:18:1a: a8:3c:d5:fd:ed:f2:05:b2:6b:59:35:bd:32:1b:64:d0: c6:55:c2:cc:44:e1:df:41:d0:a5:20:ca:54:67:0a:fc: 28:28:8e:29:5e:8b:12:db:3d:77:dc:52:54:36:8d:50: 9f:92:6d:3f:ca:39:ef:9f:52:c0:5c:a9:b0:a2:d2:1c: 7f:93:98:c8:a4:af:07:46:f2:a7:19:1c:1e:2e:85:15: 70:0d:2f:1b:d2:fa:53:94:25:57:6e:c7:91:4e:35:35: 74:51:10:06:8c:47:80:0b:53:74:47:6b:78:da:be:e8: 09:56:c4:50:b5:8c:39:a5:79:ef:4c:a9:ab:70:e4:9a: ec:fe:45:7e:d8:40:a1:cf:4c:59:db:f2:2a:01:b4:67: 4d:b5:37:a6:a6:ab:de:27:38:03:ca:a3:eb:f5:bd:b4: a3:9b:0c:4d:db:57:22:ef:4e:75:60:dc:f2:53:e2:05 Fingerprint (SHA-256): 46:4A:29:1B:A8:2A:58:A1:F3:C4:CD:BE:74:39:DA:A8:76:79:64:F5:36:D9:FB:D7:A8:17:0C:DF:DE:61:DC:56 Fingerprint (SHA1): E4:92:72:CF:9B:A1:EA:D0:2E:8F:93:F4:E8:56:EA:A1:B6:C5:0D:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2437: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145725 (0x49157fbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:00:40 2024 Not After : Wed Dec 26 15:00:40 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:43:55:f1:24:72:28:89:ad:89:92:e2:7e:24:e2:ea: d1:9a:a7:2a:b3:4e:b4:1f:d1:41:5b:ed:47:ef:40:19: 99:5e:34:63:a6:32:71:c5:49:b3:c2:5a:4d:1c:f4:e4: 6b:f8:f6:d5:b1:5b:aa:ae:f9:a8:a0:63:58:95:cd:29: 2a:cb:57:10:0e:f0:2b:01:b1:bf:c8:38:b0:4c:21:7b: 95:f2:27:96:6f:e8:df:6c:a3:cb:e2:a2:14:41:ef:de: c6:f5:4d:33:ea:c7:ba:47:e1:6b:9e:f3:51:e9:61:dc: ba:f9:fd:1b:45:7f:be:b7:3e:50:41:cb:bd:53:d0:e2: ea:c8:45:95:83:7b:00:e5:58:ab:c6:1e:4f:fa:e8:85: a7:67:4e:ed:5e:f7:32:40:a5:b0:4f:67:e4:9e:e7:67: 7a:5f:3b:32:5a:a7:a5:93:f6:29:b5:97:96:27:6f:6c: d9:95:b0:d2:7b:cd:7f:a3:67:e1:80:c4:d2:fd:02:14: 55:af:a3:91:5e:58:7c:8e:16:94:b3:6b:19:c1:43:a4: 85:be:d2:b8:54:28:f5:13:f4:72:8b:b4:19:63:e4:c9: 26:81:68:1b:d8:24:c1:15:7f:b9:84:0d:1b:09:15:f7: 5a:57:ec:ce:6f:c9:93:fc:e4:b4:33:37:24:b5:1e:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:76:03:bf:6b:d7:58:63:46:59:f2:40:c2:1b:cd:81: 85:0e:aa:b1:dc:61:8c:c5:ef:d2:22:a8:e6:50:f9:5e: 11:83:4c:8e:01:51:b0:42:85:87:3b:3f:4f:be:23:b9: 4c:00:94:3d:54:c2:6e:02:57:0b:78:f1:7f:56:db:3b: e7:58:81:32:21:0a:a1:74:a7:68:10:d7:72:bf:18:1a: a8:3c:d5:fd:ed:f2:05:b2:6b:59:35:bd:32:1b:64:d0: c6:55:c2:cc:44:e1:df:41:d0:a5:20:ca:54:67:0a:fc: 28:28:8e:29:5e:8b:12:db:3d:77:dc:52:54:36:8d:50: 9f:92:6d:3f:ca:39:ef:9f:52:c0:5c:a9:b0:a2:d2:1c: 7f:93:98:c8:a4:af:07:46:f2:a7:19:1c:1e:2e:85:15: 70:0d:2f:1b:d2:fa:53:94:25:57:6e:c7:91:4e:35:35: 74:51:10:06:8c:47:80:0b:53:74:47:6b:78:da:be:e8: 09:56:c4:50:b5:8c:39:a5:79:ef:4c:a9:ab:70:e4:9a: ec:fe:45:7e:d8:40:a1:cf:4c:59:db:f2:2a:01:b4:67: 4d:b5:37:a6:a6:ab:de:27:38:03:ca:a3:eb:f5:bd:b4: a3:9b:0c:4d:db:57:22:ef:4e:75:60:dc:f2:53:e2:05 Fingerprint (SHA-256): 46:4A:29:1B:A8:2A:58:A1:F3:C4:CD:BE:74:39:DA:A8:76:79:64:F5:36:D9:FB:D7:A8:17:0C:DF:DE:61:DC:56 Fingerprint (SHA1): E4:92:72:CF:9B:A1:EA:D0:2E:8F:93:F4:E8:56:EA:A1:B6:C5:0D:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2438: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #2439: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145724 (0x49157fbc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:00:40 2024 Not After : Wed Dec 26 15:00:40 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:c6:b6:6a:05:74:e1:aa:f8:34:b8:05:e1:e7:1b:05: e2:02:4c:a8:26:eb:1b:bb:34:f2:ec:a6:f9:a6:3b:79: 28:3e:2e:f4:a8:a5:ef:56:3a:29:46:fe:b0:14:88:fd: 7d:c8:30:0b:30:90:19:ea:86:87:0b:8f:81:bc:94:d8: 2b:24:c8:26:a4:ce:3a:10:26:76:6f:10:ac:f5:cd:51: 95:3f:4a:f7:5e:3d:f0:66:13:d0:f8:19:1d:8b:da:18: b6:ff:1d:e2:97:35:ef:11:2f:50:66:c5:d6:52:af:d0: 4f:4e:c1:0e:a2:ec:b5:25:68:6d:8d:b5:a2:ce:71:9e: e2:8d:4a:86:e3:8b:c6:51:c9:5c:ee:89:c6:6e:b2:6b: b4:1b:bd:a8:eb:06:de:9d:20:16:a8:2d:61:9b:9f:ee: 88:fd:b7:cb:49:68:27:5b:1c:66:42:fb:0d:da:b3:a4: 17:78:f4:f8:e3:2a:cd:08:43:bf:9f:a2:69:83:f2:bd: d1:28:77:a7:62:f1:3d:25:71:e3:9e:05:c5:89:87:59: 6a:1a:d2:1a:b6:03:c3:ae:fb:aa:ab:44:4d:9f:54:84: 75:f5:8b:82:c8:b4:4a:de:c5:5d:37:e8:ec:c9:81:91: 43:7f:74:20:46:8e:49:ca:db:a9:35:51:8f:c7:b2:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:98:fe:a6:3b:bb:d4:f1:c8:03:b2:51:7d:09:26:de: ea:4a:57:13:f1:96:4f:7e:ee:db:3a:ec:9a:cd:d0:1c: 4a:2e:09:ba:31:19:b1:c7:06:52:30:54:6f:cc:f7:60: 45:d2:37:3e:e2:71:fd:bd:10:4f:b5:c5:11:8d:73:89: 08:04:17:81:da:77:7f:6f:5a:5d:77:97:0c:73:8f:23: d6:38:b7:57:f2:05:8b:97:49:61:48:13:12:75:f5:20: f2:a9:5b:ba:cf:f9:86:6c:8d:fa:e8:6a:00:01:db:6e: 38:76:c2:0d:95:94:3e:5e:65:46:54:a0:83:13:35:47: d2:1c:1a:cd:2c:4d:db:aa:7c:b0:3c:47:80:af:8f:a4: f9:c2:08:9a:4a:01:4d:04:43:f5:3b:7e:7a:96:ef:72: a0:cc:d5:3a:8f:62:ff:46:b5:c5:3f:48:74:9e:d4:e0: 4f:10:b8:81:23:92:90:c3:c2:31:0c:b8:d0:35:6f:1d: 61:bf:73:36:05:43:6b:6a:be:a2:2d:5c:e9:91:e5:3d: f4:48:af:a4:8a:1c:92:f9:d6:81:4b:c5:90:f1:c6:86: 86:6a:6f:9a:1f:ff:ff:ee:74:81:41:34:99:82:1c:33: 73:db:d4:d9:90:f9:52:1e:75:4c:3a:b6:3d:f4:51:f4 Fingerprint (SHA-256): EA:A9:1F:DE:E4:4F:C9:2C:31:F0:86:FF:EE:60:59:C9:94:FB:D9:2D:69:AF:1E:7A:D8:88:30:6D:3D:5E:2B:3E Fingerprint (SHA1): ED:8F:B7:4F:18:F3:4C:20:98:EB:8F:30:50:31:6E:78:94:1B:13:E5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2440: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145725 (0x49157fbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:00:40 2024 Not After : Wed Dec 26 15:00:40 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:43:55:f1:24:72:28:89:ad:89:92:e2:7e:24:e2:ea: d1:9a:a7:2a:b3:4e:b4:1f:d1:41:5b:ed:47:ef:40:19: 99:5e:34:63:a6:32:71:c5:49:b3:c2:5a:4d:1c:f4:e4: 6b:f8:f6:d5:b1:5b:aa:ae:f9:a8:a0:63:58:95:cd:29: 2a:cb:57:10:0e:f0:2b:01:b1:bf:c8:38:b0:4c:21:7b: 95:f2:27:96:6f:e8:df:6c:a3:cb:e2:a2:14:41:ef:de: c6:f5:4d:33:ea:c7:ba:47:e1:6b:9e:f3:51:e9:61:dc: ba:f9:fd:1b:45:7f:be:b7:3e:50:41:cb:bd:53:d0:e2: ea:c8:45:95:83:7b:00:e5:58:ab:c6:1e:4f:fa:e8:85: a7:67:4e:ed:5e:f7:32:40:a5:b0:4f:67:e4:9e:e7:67: 7a:5f:3b:32:5a:a7:a5:93:f6:29:b5:97:96:27:6f:6c: d9:95:b0:d2:7b:cd:7f:a3:67:e1:80:c4:d2:fd:02:14: 55:af:a3:91:5e:58:7c:8e:16:94:b3:6b:19:c1:43:a4: 85:be:d2:b8:54:28:f5:13:f4:72:8b:b4:19:63:e4:c9: 26:81:68:1b:d8:24:c1:15:7f:b9:84:0d:1b:09:15:f7: 5a:57:ec:ce:6f:c9:93:fc:e4:b4:33:37:24:b5:1e:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:76:03:bf:6b:d7:58:63:46:59:f2:40:c2:1b:cd:81: 85:0e:aa:b1:dc:61:8c:c5:ef:d2:22:a8:e6:50:f9:5e: 11:83:4c:8e:01:51:b0:42:85:87:3b:3f:4f:be:23:b9: 4c:00:94:3d:54:c2:6e:02:57:0b:78:f1:7f:56:db:3b: e7:58:81:32:21:0a:a1:74:a7:68:10:d7:72:bf:18:1a: a8:3c:d5:fd:ed:f2:05:b2:6b:59:35:bd:32:1b:64:d0: c6:55:c2:cc:44:e1:df:41:d0:a5:20:ca:54:67:0a:fc: 28:28:8e:29:5e:8b:12:db:3d:77:dc:52:54:36:8d:50: 9f:92:6d:3f:ca:39:ef:9f:52:c0:5c:a9:b0:a2:d2:1c: 7f:93:98:c8:a4:af:07:46:f2:a7:19:1c:1e:2e:85:15: 70:0d:2f:1b:d2:fa:53:94:25:57:6e:c7:91:4e:35:35: 74:51:10:06:8c:47:80:0b:53:74:47:6b:78:da:be:e8: 09:56:c4:50:b5:8c:39:a5:79:ef:4c:a9:ab:70:e4:9a: ec:fe:45:7e:d8:40:a1:cf:4c:59:db:f2:2a:01:b4:67: 4d:b5:37:a6:a6:ab:de:27:38:03:ca:a3:eb:f5:bd:b4: a3:9b:0c:4d:db:57:22:ef:4e:75:60:dc:f2:53:e2:05 Fingerprint (SHA-256): 46:4A:29:1B:A8:2A:58:A1:F3:C4:CD:BE:74:39:DA:A8:76:79:64:F5:36:D9:FB:D7:A8:17:0C:DF:DE:61:DC:56 Fingerprint (SHA1): E4:92:72:CF:9B:A1:EA:D0:2E:8F:93:F4:E8:56:EA:A1:B6:C5:0D:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2441: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145725 (0x49157fbd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:00:40 2024 Not After : Wed Dec 26 15:00:40 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:43:55:f1:24:72:28:89:ad:89:92:e2:7e:24:e2:ea: d1:9a:a7:2a:b3:4e:b4:1f:d1:41:5b:ed:47:ef:40:19: 99:5e:34:63:a6:32:71:c5:49:b3:c2:5a:4d:1c:f4:e4: 6b:f8:f6:d5:b1:5b:aa:ae:f9:a8:a0:63:58:95:cd:29: 2a:cb:57:10:0e:f0:2b:01:b1:bf:c8:38:b0:4c:21:7b: 95:f2:27:96:6f:e8:df:6c:a3:cb:e2:a2:14:41:ef:de: c6:f5:4d:33:ea:c7:ba:47:e1:6b:9e:f3:51:e9:61:dc: ba:f9:fd:1b:45:7f:be:b7:3e:50:41:cb:bd:53:d0:e2: ea:c8:45:95:83:7b:00:e5:58:ab:c6:1e:4f:fa:e8:85: a7:67:4e:ed:5e:f7:32:40:a5:b0:4f:67:e4:9e:e7:67: 7a:5f:3b:32:5a:a7:a5:93:f6:29:b5:97:96:27:6f:6c: d9:95:b0:d2:7b:cd:7f:a3:67:e1:80:c4:d2:fd:02:14: 55:af:a3:91:5e:58:7c:8e:16:94:b3:6b:19:c1:43:a4: 85:be:d2:b8:54:28:f5:13:f4:72:8b:b4:19:63:e4:c9: 26:81:68:1b:d8:24:c1:15:7f:b9:84:0d:1b:09:15:f7: 5a:57:ec:ce:6f:c9:93:fc:e4:b4:33:37:24:b5:1e:cd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:76:03:bf:6b:d7:58:63:46:59:f2:40:c2:1b:cd:81: 85:0e:aa:b1:dc:61:8c:c5:ef:d2:22:a8:e6:50:f9:5e: 11:83:4c:8e:01:51:b0:42:85:87:3b:3f:4f:be:23:b9: 4c:00:94:3d:54:c2:6e:02:57:0b:78:f1:7f:56:db:3b: e7:58:81:32:21:0a:a1:74:a7:68:10:d7:72:bf:18:1a: a8:3c:d5:fd:ed:f2:05:b2:6b:59:35:bd:32:1b:64:d0: c6:55:c2:cc:44:e1:df:41:d0:a5:20:ca:54:67:0a:fc: 28:28:8e:29:5e:8b:12:db:3d:77:dc:52:54:36:8d:50: 9f:92:6d:3f:ca:39:ef:9f:52:c0:5c:a9:b0:a2:d2:1c: 7f:93:98:c8:a4:af:07:46:f2:a7:19:1c:1e:2e:85:15: 70:0d:2f:1b:d2:fa:53:94:25:57:6e:c7:91:4e:35:35: 74:51:10:06:8c:47:80:0b:53:74:47:6b:78:da:be:e8: 09:56:c4:50:b5:8c:39:a5:79:ef:4c:a9:ab:70:e4:9a: ec:fe:45:7e:d8:40:a1:cf:4c:59:db:f2:2a:01:b4:67: 4d:b5:37:a6:a6:ab:de:27:38:03:ca:a3:eb:f5:bd:b4: a3:9b:0c:4d:db:57:22:ef:4e:75:60:dc:f2:53:e2:05 Fingerprint (SHA-256): 46:4A:29:1B:A8:2A:58:A1:F3:C4:CD:BE:74:39:DA:A8:76:79:64:F5:36:D9:FB:D7:A8:17:0C:DF:DE:61:DC:56 Fingerprint (SHA1): E4:92:72:CF:9B:A1:EA:D0:2E:8F:93:F4:E8:56:EA:A1:B6:C5:0D:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2442: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2443: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145732 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2444: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2445: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2446: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145733 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2447: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2448: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #2449: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2450: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1226145734 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2451: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2452: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #2453: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2454: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1226145735 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2455: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2456: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2457: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2458: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1226145736 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2459: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2460: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1226145737 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #2461: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2462: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #2463: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2464: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2465: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145738 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2466: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2467: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2468: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2469: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145739 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2470: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2471: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2472: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2473: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145740 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2474: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2475: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2476: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2477: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145741 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2478: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2479: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2480: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145732 (0x49157fc4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:00:46 2024 Not After : Wed Dec 26 15:00:46 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:ef:cb:f3:be:59:d1:ea:27:67:5f:6c:21:89:51:1e: 88:02:50:33:b7:b4:af:3b:86:3a:04:d2:27:d3:1a:c4: 34:22:b2:5b:4d:63:bb:4b:81:77:db:65:e2:d0:15:da: e2:f7:88:6d:1b:1c:22:ee:44:58:8b:fd:14:1e:3d:b3: 12:f0:10:9e:be:5e:94:e6:f6:16:8d:a2:d7:88:03:ef: 17:32:f1:06:2b:3b:f6:4c:f9:0a:2d:10:04:4b:9a:4d: 7a:7c:6b:1b:7e:15:a8:ab:79:9f:3c:2b:52:95:1d:5a: 63:6e:48:cd:bd:75:93:d2:3c:25:02:46:84:c4:05:0a: f3:fa:ae:2a:ff:a6:ba:84:dd:15:79:b4:cd:df:bb:30: f4:10:26:60:36:6c:8f:f2:88:f8:83:aa:a0:d1:a8:50: 1e:0a:f0:03:ba:08:09:0a:6e:c1:b7:05:3b:50:b4:44: ef:de:ce:ed:81:5b:69:25:04:0e:7c:d2:10:87:72:1f: 46:01:dd:e6:8d:4a:76:76:a2:de:cd:46:cf:f9:8c:d7: af:07:94:8b:1f:6f:15:4e:50:c2:03:cc:4b:1c:ab:aa: d2:f7:4b:bc:fb:f9:0a:cd:e3:6b:2d:dd:4f:6b:17:8d: 80:d7:6c:c0:1a:3a:c2:53:94:1c:80:57:56:a8:ab:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:1e:fa:84:08:ba:ce:d0:e8:f7:31:4b:d1:14:5d:ef: 48:6d:4b:c0:d8:6a:38:20:88:d3:93:39:ef:1e:98:a8: f4:0e:e3:95:a3:87:7b:74:ed:93:e5:0a:ea:59:0a:9c: 35:7f:f5:3e:5a:42:45:67:73:9f:e0:38:29:b3:f3:d8: 00:f5:03:65:70:60:35:65:5f:88:26:c8:a3:fe:e0:b2: 61:14:29:da:37:e3:9d:99:0d:75:e2:4b:c4:bd:bd:62: d3:1d:f4:52:a7:4b:14:84:13:fc:d9:c7:ab:20:88:f7: d7:b5:55:cd:74:7e:15:18:08:1e:6f:32:1c:2c:cd:f4: 3e:c8:5c:ce:7b:db:3d:e4:02:7e:72:35:af:fc:29:05: 1a:12:e6:77:7a:f2:dd:ce:98:11:30:a5:90:23:d7:62: ea:0a:df:53:e5:c8:ad:45:45:05:ad:c6:1c:6a:c7:9a: a2:8b:6c:9b:e7:28:eb:9f:29:5d:fe:ed:ee:81:3e:d7: 27:79:6e:9d:c0:39:71:4b:83:7b:af:01:5e:47:c8:eb: 44:15:e1:f6:bc:b1:05:34:c7:cf:8f:aa:b1:60:63:76: e4:dc:fa:10:a3:3f:31:3c:07:ec:65:6b:6b:1e:6f:fa: 9d:15:fc:ca:50:99:55:cb:45:e2:b3:1d:81:ef:dc:53 Fingerprint (SHA-256): D7:A2:57:EA:5E:CD:1F:AE:35:CC:6E:2E:B7:0E:E5:B0:07:93:53:12:43:19:E5:DD:BC:3A:EB:84:21:7F:AC:56 Fingerprint (SHA1): 45:0A:83:70:2E:AF:34:2E:75:D3:9F:FA:CE:4C:12:93:44:56:B3:2E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #2481: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2482: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2483: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2484: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2485: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2486: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2487: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2488: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2489: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145733 (0x49157fc5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:00:47 2024 Not After : Wed Dec 26 15:00:47 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:f6:61:03:3c:69:43:24:b8:3d:ec:1c:e8:a6:48:8a: 53:09:9f:72:0b:fe:31:8b:fe:36:c1:87:b6:17:fd:67: c5:a9:41:aa:c7:24:bc:30:b7:f8:9a:e8:cc:b4:a7:e0: 92:53:94:f3:38:ef:ac:bb:77:67:ca:a6:7d:4b:db:7c: 68:2e:25:53:d5:75:ae:bc:cb:04:04:1e:b6:9d:d6:37: d4:06:1c:ca:db:37:f7:4e:2e:68:5e:c6:0c:f7:16:dc: fe:5c:22:82:3d:95:a9:8c:6a:99:73:97:a7:92:a2:62: 11:a5:6c:58:94:8a:13:9d:b0:f9:71:d7:40:bc:99:5c: ab:b7:8b:fe:fe:0c:56:3f:cc:48:59:0f:c0:cf:f8:d0: 0e:60:7a:78:30:bc:21:1e:83:06:d4:80:e7:5f:6a:74: de:a4:74:6e:2d:ca:87:72:2e:e1:d4:91:bb:c3:19:39: b4:ee:71:9d:3f:05:c0:a6:c4:5e:56:93:63:d9:d5:53: b2:61:6d:0e:5c:d8:5b:d1:ea:89:c9:7c:97:83:7b:d2: d5:6d:9b:98:c2:55:46:e3:8b:82:71:6d:49:4b:14:05: 31:58:6b:87:d2:c7:40:0d:28:db:09:75:8f:f7:ec:9a: fb:e1:38:63:41:fa:43:5f:85:be:fb:a9:4f:60:3b:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2b:ea:d8:d4:ed:7d:9a:ae:2e:5c:b6:b4:91:2b:db:d5: e3:75:0a:f7:10:f8:7d:e4:49:61:1b:10:58:71:ad:14: 4c:4d:da:f6:7d:c2:a2:76:2a:08:d8:23:c8:db:d2:f4: 9d:fb:e1:13:37:fb:a3:ce:24:14:86:bb:63:26:0a:d0: 0f:45:3c:25:d7:23:04:85:49:e6:0a:40:5c:f5:46:07: fa:43:d9:45:5e:ce:30:e2:a9:29:ce:ef:86:be:51:1b: 72:d7:5f:39:ef:b5:37:d2:43:0b:fa:b2:4c:0c:2a:da: 73:4d:32:c4:13:d1:94:0c:9f:f9:ed:bc:77:b1:ea:89: 16:c7:09:f9:03:19:33:a5:99:74:1f:d8:03:d2:cc:af: c0:c3:1a:61:6e:ee:79:35:42:19:12:9f:6b:f4:47:66: 60:61:38:fa:f2:06:da:4b:23:d8:ed:1a:0c:6e:d2:c0: 7b:e3:a4:69:e0:dc:c5:d7:ce:e8:c6:91:92:4c:81:f1: fc:75:2c:8a:6f:f1:ad:e7:7c:ff:bb:29:33:8d:a6:ab: 6c:a9:ca:5b:25:80:f9:70:1c:59:48:e1:a3:66:9c:b7: 05:7e:77:df:0c:3b:f1:fb:a5:21:aa:bb:ee:e9:17:a7: 8b:9a:1e:ea:e8:cc:6e:d0:8d:9d:67:ed:86:30:29:b7 Fingerprint (SHA-256): F1:56:DC:66:AA:DB:DB:90:DD:55:C8:DF:CD:92:6E:49:32:9C:40:38:8D:7F:5D:01:91:25:6E:B4:F2:43:57:B9 Fingerprint (SHA1): F9:27:2F:F6:1F:CD:1A:71:C7:22:E6:4B:A1:91:E9:AC:30:8B:5B:99 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #2490: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2491: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2492: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2493: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2494: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2495: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2496: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #2497: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #2498: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #2499: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #2500: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #2501: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #2502: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #2503: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #2504: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #2505: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #2506: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #2507: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2508: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145742 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2509: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2510: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2511: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2512: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145743 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2513: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2514: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2515: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2516: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145744 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2517: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2518: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2519: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2520: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1226145745 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2521: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2522: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2523: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2524: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145746 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2525: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2526: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2527: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2528: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1226145747 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2529: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2530: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #2531: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2532: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1226145748 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2533: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2534: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #2535: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2536: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1226145749 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2537: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2538: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #2539: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2540: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1226145750 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2541: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2542: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2543: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145742 (0x49157fce) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:56 2024 Not After : Wed Dec 26 15:00:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 88:22:88:55:88:6e:4d:f7:fa:c6:c5:2c:a5:ef:1f:de: 02:af:c8:ab:52:f4:a6:f5:f6:5d:57:bd:44:6f:5a:ab: a3:ee:61:02:6f:27:2e:db:7d:08:4a:fb:9d:01:f9:fb: eb:c0:f8:22:f6:96:c6:66:1a:17:5b:4c:47:36:c9:8b: 02:f4:e2:ee:e1:b9:80:f4:e7:1b:22:e3:da:c3:04:da: 50:7b:2d:29:eb:87:27:4d:e5:13:ce:eb:20:7e:b0:1b: 87:86:a1:65:10:6d:b4:de:16:ef:a9:52:2d:1a:58:dd: a8:df:99:7a:27:b3:93:c9:c7:0a:66:f1:8f:ab:0d:b3: c6:31:ab:24:17:f5:87:e1:64:49:b6:24:a8:79:86:59: 19:31:8b:7b:ae:2f:d9:9d:89:79:65:b7:5c:74:e7:93: 1e:ef:7e:3e:c6:d3:59:04:9f:ae:c2:67:34:6f:54:d2: f2:18:a9:0d:dc:7c:f4:a6:6e:81:2a:1d:64:25:f6:3d: f8:3a:2e:46:b0:61:7e:de:34:aa:9b:57:85:f8:32:2a: cc:88:1b:91:a6:cb:cd:74:3d:2c:11:57:7e:2d:fc:7e: 9d:f9:0f:ad:59:e1:6a:4c:76:59:17:fc:17:11:72:27: db:e5:6e:46:c8:81:2c:7a:33:6b:c2:f7:2c:f7:fb:8f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:4f:c6:49:57:f0:eb:56:d0:ad:6d:d4:c7: 10:9b:58:3a:12:3d:d7:59:f9:c4:78:9c:90:2a:a2:e8: 02:1d:00:88:e7:18:0f:33:64:75:e8:da:7a:6e:01:35: 98:90:03:bf:e5:2e:8f:47:da:a6:01:e1:f2:f1:71 Fingerprint (SHA-256): 52:57:C9:22:48:34:62:2D:2A:FB:F0:C1:AD:8B:97:89:AB:18:97:D8:45:E2:C7:93:E3:79:46:AC:8B:F8:D3:38 Fingerprint (SHA1): FD:25:5C:4B:C4:3E:DE:18:7A:85:FB:4D:1F:FC:B6:AF:99:1F:FC:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2544: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145742 (0x49157fce) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:56 2024 Not After : Wed Dec 26 15:00:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 88:22:88:55:88:6e:4d:f7:fa:c6:c5:2c:a5:ef:1f:de: 02:af:c8:ab:52:f4:a6:f5:f6:5d:57:bd:44:6f:5a:ab: a3:ee:61:02:6f:27:2e:db:7d:08:4a:fb:9d:01:f9:fb: eb:c0:f8:22:f6:96:c6:66:1a:17:5b:4c:47:36:c9:8b: 02:f4:e2:ee:e1:b9:80:f4:e7:1b:22:e3:da:c3:04:da: 50:7b:2d:29:eb:87:27:4d:e5:13:ce:eb:20:7e:b0:1b: 87:86:a1:65:10:6d:b4:de:16:ef:a9:52:2d:1a:58:dd: a8:df:99:7a:27:b3:93:c9:c7:0a:66:f1:8f:ab:0d:b3: c6:31:ab:24:17:f5:87:e1:64:49:b6:24:a8:79:86:59: 19:31:8b:7b:ae:2f:d9:9d:89:79:65:b7:5c:74:e7:93: 1e:ef:7e:3e:c6:d3:59:04:9f:ae:c2:67:34:6f:54:d2: f2:18:a9:0d:dc:7c:f4:a6:6e:81:2a:1d:64:25:f6:3d: f8:3a:2e:46:b0:61:7e:de:34:aa:9b:57:85:f8:32:2a: cc:88:1b:91:a6:cb:cd:74:3d:2c:11:57:7e:2d:fc:7e: 9d:f9:0f:ad:59:e1:6a:4c:76:59:17:fc:17:11:72:27: db:e5:6e:46:c8:81:2c:7a:33:6b:c2:f7:2c:f7:fb:8f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:4f:c6:49:57:f0:eb:56:d0:ad:6d:d4:c7: 10:9b:58:3a:12:3d:d7:59:f9:c4:78:9c:90:2a:a2:e8: 02:1d:00:88:e7:18:0f:33:64:75:e8:da:7a:6e:01:35: 98:90:03:bf:e5:2e:8f:47:da:a6:01:e1:f2:f1:71 Fingerprint (SHA-256): 52:57:C9:22:48:34:62:2D:2A:FB:F0:C1:AD:8B:97:89:AB:18:97:D8:45:E2:C7:93:E3:79:46:AC:8B:F8:D3:38 Fingerprint (SHA1): FD:25:5C:4B:C4:3E:DE:18:7A:85:FB:4D:1F:FC:B6:AF:99:1F:FC:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2545: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145742 (0x49157fce) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:56 2024 Not After : Wed Dec 26 15:00:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 88:22:88:55:88:6e:4d:f7:fa:c6:c5:2c:a5:ef:1f:de: 02:af:c8:ab:52:f4:a6:f5:f6:5d:57:bd:44:6f:5a:ab: a3:ee:61:02:6f:27:2e:db:7d:08:4a:fb:9d:01:f9:fb: eb:c0:f8:22:f6:96:c6:66:1a:17:5b:4c:47:36:c9:8b: 02:f4:e2:ee:e1:b9:80:f4:e7:1b:22:e3:da:c3:04:da: 50:7b:2d:29:eb:87:27:4d:e5:13:ce:eb:20:7e:b0:1b: 87:86:a1:65:10:6d:b4:de:16:ef:a9:52:2d:1a:58:dd: a8:df:99:7a:27:b3:93:c9:c7:0a:66:f1:8f:ab:0d:b3: c6:31:ab:24:17:f5:87:e1:64:49:b6:24:a8:79:86:59: 19:31:8b:7b:ae:2f:d9:9d:89:79:65:b7:5c:74:e7:93: 1e:ef:7e:3e:c6:d3:59:04:9f:ae:c2:67:34:6f:54:d2: f2:18:a9:0d:dc:7c:f4:a6:6e:81:2a:1d:64:25:f6:3d: f8:3a:2e:46:b0:61:7e:de:34:aa:9b:57:85:f8:32:2a: cc:88:1b:91:a6:cb:cd:74:3d:2c:11:57:7e:2d:fc:7e: 9d:f9:0f:ad:59:e1:6a:4c:76:59:17:fc:17:11:72:27: db:e5:6e:46:c8:81:2c:7a:33:6b:c2:f7:2c:f7:fb:8f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:4f:c6:49:57:f0:eb:56:d0:ad:6d:d4:c7: 10:9b:58:3a:12:3d:d7:59:f9:c4:78:9c:90:2a:a2:e8: 02:1d:00:88:e7:18:0f:33:64:75:e8:da:7a:6e:01:35: 98:90:03:bf:e5:2e:8f:47:da:a6:01:e1:f2:f1:71 Fingerprint (SHA-256): 52:57:C9:22:48:34:62:2D:2A:FB:F0:C1:AD:8B:97:89:AB:18:97:D8:45:E2:C7:93:E3:79:46:AC:8B:F8:D3:38 Fingerprint (SHA1): FD:25:5C:4B:C4:3E:DE:18:7A:85:FB:4D:1F:FC:B6:AF:99:1F:FC:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #2546: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145742 (0x49157fce) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:00:56 2024 Not After : Wed Dec 26 15:00:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 88:22:88:55:88:6e:4d:f7:fa:c6:c5:2c:a5:ef:1f:de: 02:af:c8:ab:52:f4:a6:f5:f6:5d:57:bd:44:6f:5a:ab: a3:ee:61:02:6f:27:2e:db:7d:08:4a:fb:9d:01:f9:fb: eb:c0:f8:22:f6:96:c6:66:1a:17:5b:4c:47:36:c9:8b: 02:f4:e2:ee:e1:b9:80:f4:e7:1b:22:e3:da:c3:04:da: 50:7b:2d:29:eb:87:27:4d:e5:13:ce:eb:20:7e:b0:1b: 87:86:a1:65:10:6d:b4:de:16:ef:a9:52:2d:1a:58:dd: a8:df:99:7a:27:b3:93:c9:c7:0a:66:f1:8f:ab:0d:b3: c6:31:ab:24:17:f5:87:e1:64:49:b6:24:a8:79:86:59: 19:31:8b:7b:ae:2f:d9:9d:89:79:65:b7:5c:74:e7:93: 1e:ef:7e:3e:c6:d3:59:04:9f:ae:c2:67:34:6f:54:d2: f2:18:a9:0d:dc:7c:f4:a6:6e:81:2a:1d:64:25:f6:3d: f8:3a:2e:46:b0:61:7e:de:34:aa:9b:57:85:f8:32:2a: cc:88:1b:91:a6:cb:cd:74:3d:2c:11:57:7e:2d:fc:7e: 9d:f9:0f:ad:59:e1:6a:4c:76:59:17:fc:17:11:72:27: db:e5:6e:46:c8:81:2c:7a:33:6b:c2:f7:2c:f7:fb:8f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:4f:c6:49:57:f0:eb:56:d0:ad:6d:d4:c7: 10:9b:58:3a:12:3d:d7:59:f9:c4:78:9c:90:2a:a2:e8: 02:1d:00:88:e7:18:0f:33:64:75:e8:da:7a:6e:01:35: 98:90:03:bf:e5:2e:8f:47:da:a6:01:e1:f2:f1:71 Fingerprint (SHA-256): 52:57:C9:22:48:34:62:2D:2A:FB:F0:C1:AD:8B:97:89:AB:18:97:D8:45:E2:C7:93:E3:79:46:AC:8B:F8:D3:38 Fingerprint (SHA1): FD:25:5C:4B:C4:3E:DE:18:7A:85:FB:4D:1F:FC:B6:AF:99:1F:FC:E7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #2547: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2548: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2549: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2550: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2551: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2552: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2553: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2554: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2555: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2556: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2557: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2558: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2559: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2560: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2561: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2562: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #2563: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2564: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2565: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2566: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2567: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2568: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2569: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2570: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2571: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2572: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2573: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2574: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226150106Z nextupdate=20251226150106Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 15:01:06 2024 Next Update: Fri Dec 26 15:01:06 2025 CRL Extensions: chains.sh: #2575: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150106Z nextupdate=20251226150106Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:01:06 2024 Next Update: Fri Dec 26 15:01:06 2025 CRL Extensions: chains.sh: #2576: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226150106Z nextupdate=20251226150106Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 15:01:06 2024 Next Update: Fri Dec 26 15:01:06 2025 CRL Extensions: chains.sh: #2577: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226150106Z nextupdate=20251226150106Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 15:01:06 2024 Next Update: Fri Dec 26 15:01:06 2025 CRL Extensions: chains.sh: #2578: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226150107Z addcert 14 20241226150107Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 15:01:07 2024 Next Update: Fri Dec 26 15:01:06 2025 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Thu Dec 26 15:01:07 2024 CRL Extensions: chains.sh: #2579: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150108Z addcert 15 20241226150108Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:01:08 2024 Next Update: Fri Dec 26 15:01:06 2025 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Thu Dec 26 15:01:08 2024 CRL Extensions: chains.sh: #2580: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2581: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2582: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2583: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #2584: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #2585: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #2586: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #2587: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #2588: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #2589: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:01 2024 Not After : Wed Dec 26 15:01:01 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:ea:d8:99:56:39:87:d8:36:3f:07:97:c1:b5:a2:a7: 21:22:38:22:16:db:6b:c5:eb:89:e2:06:03:56:5b:fe: b3:ba:ad:1e:90:64:d2:19:c6:e0:86:87:6d:27:74:11: 9d:ff:f7:e2:58:ac:2c:81:ce:b2:16:91:59:b2:90:f5: dd:eb:7a:eb:96:d7:44:3e:c2:37:16:06:a8:f1:6a:f2: d3:1e:7a:3f:b5:cd:94:c9:e9:b2:2f:ca:c9:f3:74:8d: 29:a1:97:70:a8:3b:30:3f:78:40:3c:52:a0:7a:73:cf: a8:02:df:ee:bd:53:a6:7c:b4:9a:01:dd:c3:2c:26:bb: 63:02:f2:ef:6c:4f:53:18:ac:ea:b1:f6:15:71:29:43: 53:0c:d8:2f:9d:fe:70:8a:8f:1d:df:f9:66:79:01:b2: 9a:29:a6:29:e9:7a:6c:f1:ff:e2:8c:bf:43:25:41:8d: 6b:cb:dd:e2:41:49:37:c5:ef:a2:16:70:69:e0:5c:d7: 47:ca:1a:69:cc:58:26:ad:ff:d8:92:e9:77:7c:08:6a: 4c:d1:bd:11:cd:da:5d:b1:c9:ab:c0:0a:d0:3e:b1:3e: 72:6f:a7:a0:0b:20:42:99:6d:70:c1:85:3e:b1:bb:b8: 24:b4:ee:5f:5c:e2:76:01:41:f9:dc:9f:dd:03:9f:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:9b:f3:04:a0:15:05:80:49:39:e9:86:fd:f8:35:6d: db:85:6c:88:74:03:84:86:cf:3e:cd:3b:ea:1d:56:0b: de:2d:57:f1:58:20:53:69:ef:45:de:b2:58:bc:eb:9f: b5:2c:49:53:71:d8:40:9a:65:94:42:04:08:da:1c:a0: af:cb:e4:a9:fc:a6:e8:a9:e5:29:d0:4b:07:70:e0:ae: fc:35:70:45:6b:9b:60:52:9d:3e:48:e9:fe:53:2e:af: bc:4b:6e:e8:f2:86:97:d5:f5:1b:4d:8a:03:99:90:be: 52:ed:0e:f5:b0:a7:ae:90:9e:76:0c:8b:5e:c6:b6:cf: d8:8b:15:57:ea:c0:e9:95:9a:b3:2d:1c:a6:fd:69:02: af:95:37:23:8b:45:8a:7e:92:99:b1:fd:1b:73:da:5b: ef:75:39:26:b6:bd:e9:1a:25:18:ff:83:68:ad:fe:00: 7b:93:86:49:58:44:1e:47:7a:db:70:67:3a:04:89:40: b2:bc:92:c1:05:f7:6e:99:ae:77:f6:4e:bc:6f:e3:04: 2f:37:19:d8:04:ac:13:04:be:53:a1:a3:14:a7:c2:fa: 4a:66:9c:f7:9f:11:b8:26:81:75:04:da:74:86:e7:ef: 53:8e:59:2a:47:5e:85:d2:16:6a:b6:d7:19:53:e0:38 Fingerprint (SHA-256): 72:3B:AD:D0:2C:A5:39:11:A5:67:67:1F:98:DB:A6:70:D7:C7:C2:F1:2A:F2:C2:A9:59:6C:E3:53:A5:80:E0:FF Fingerprint (SHA1): 8D:53:C2:E8:25:A4:5C:14:D6:D7:E2:07:CD:13:10:26:87:C2:8B:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2590: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2591: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:01 2024 Not After : Wed Dec 26 15:01:01 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:ea:d8:99:56:39:87:d8:36:3f:07:97:c1:b5:a2:a7: 21:22:38:22:16:db:6b:c5:eb:89:e2:06:03:56:5b:fe: b3:ba:ad:1e:90:64:d2:19:c6:e0:86:87:6d:27:74:11: 9d:ff:f7:e2:58:ac:2c:81:ce:b2:16:91:59:b2:90:f5: dd:eb:7a:eb:96:d7:44:3e:c2:37:16:06:a8:f1:6a:f2: d3:1e:7a:3f:b5:cd:94:c9:e9:b2:2f:ca:c9:f3:74:8d: 29:a1:97:70:a8:3b:30:3f:78:40:3c:52:a0:7a:73:cf: a8:02:df:ee:bd:53:a6:7c:b4:9a:01:dd:c3:2c:26:bb: 63:02:f2:ef:6c:4f:53:18:ac:ea:b1:f6:15:71:29:43: 53:0c:d8:2f:9d:fe:70:8a:8f:1d:df:f9:66:79:01:b2: 9a:29:a6:29:e9:7a:6c:f1:ff:e2:8c:bf:43:25:41:8d: 6b:cb:dd:e2:41:49:37:c5:ef:a2:16:70:69:e0:5c:d7: 47:ca:1a:69:cc:58:26:ad:ff:d8:92:e9:77:7c:08:6a: 4c:d1:bd:11:cd:da:5d:b1:c9:ab:c0:0a:d0:3e:b1:3e: 72:6f:a7:a0:0b:20:42:99:6d:70:c1:85:3e:b1:bb:b8: 24:b4:ee:5f:5c:e2:76:01:41:f9:dc:9f:dd:03:9f:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:9b:f3:04:a0:15:05:80:49:39:e9:86:fd:f8:35:6d: db:85:6c:88:74:03:84:86:cf:3e:cd:3b:ea:1d:56:0b: de:2d:57:f1:58:20:53:69:ef:45:de:b2:58:bc:eb:9f: b5:2c:49:53:71:d8:40:9a:65:94:42:04:08:da:1c:a0: af:cb:e4:a9:fc:a6:e8:a9:e5:29:d0:4b:07:70:e0:ae: fc:35:70:45:6b:9b:60:52:9d:3e:48:e9:fe:53:2e:af: bc:4b:6e:e8:f2:86:97:d5:f5:1b:4d:8a:03:99:90:be: 52:ed:0e:f5:b0:a7:ae:90:9e:76:0c:8b:5e:c6:b6:cf: d8:8b:15:57:ea:c0:e9:95:9a:b3:2d:1c:a6:fd:69:02: af:95:37:23:8b:45:8a:7e:92:99:b1:fd:1b:73:da:5b: ef:75:39:26:b6:bd:e9:1a:25:18:ff:83:68:ad:fe:00: 7b:93:86:49:58:44:1e:47:7a:db:70:67:3a:04:89:40: b2:bc:92:c1:05:f7:6e:99:ae:77:f6:4e:bc:6f:e3:04: 2f:37:19:d8:04:ac:13:04:be:53:a1:a3:14:a7:c2:fa: 4a:66:9c:f7:9f:11:b8:26:81:75:04:da:74:86:e7:ef: 53:8e:59:2a:47:5e:85:d2:16:6a:b6:d7:19:53:e0:38 Fingerprint (SHA-256): 72:3B:AD:D0:2C:A5:39:11:A5:67:67:1F:98:DB:A6:70:D7:C7:C2:F1:2A:F2:C2:A9:59:6C:E3:53:A5:80:E0:FF Fingerprint (SHA1): 8D:53:C2:E8:25:A4:5C:14:D6:D7:E2:07:CD:13:10:26:87:C2:8B:0B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2592: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2593: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9535 -q -t 20 chains.sh: #2594: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #2595: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2596: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #2597: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #2598: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226150110Z nextupdate=20251226150110Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 15:01:10 2024 Next Update: Fri Dec 26 15:01:10 2025 CRL Extensions: chains.sh: #2599: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226150111Z addcert 3 20241226150111Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 15:01:11 2024 Next Update: Fri Dec 26 15:01:10 2025 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 15:01:11 2024 CRL Extensions: chains.sh: #2600: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226150112Z addcert 4 20241226150112Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 15:01:12 2024 Next Update: Fri Dec 26 15:01:10 2025 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Thu Dec 26 15:01:12 2024 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 15:01:11 2024 CRL Extensions: chains.sh: #2601: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2602: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2603: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2604: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2605: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #2606: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2607: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2608: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #2609: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2610: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2611: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #2612: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #2613: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2614: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:32 2024 Not After : Wed Dec 26 14:53:32 2029 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:a6:8c:06:ff:d5:8b:08:1c:e3:3d:cb:6b:72:7a:a1: 0f:b9:a6:a1:84:8c:81:e3:50:0f:fa:92:0a:e1:18:33: 3d:59:b8:61:b5:a0:1e:55:31:f4:00:4e:9b:2c:d7:c3: 13:b9:52:94:3a:ce:79:f3:7c:43:86:d2:f8:68:5c:8f: 2b:47:24:5e:2b:35:4d:58:1c:30:79:a7:d6:e4:a3:e4: f4:a0:bb:92:89:c3:77:9c:2f:ff:7a:05:15:40:75:8e: fa:23:5f:20:28:5a:80:d7:37:52:41:c5:40:ff:94:24: e3:9d:24:91:62:1d:7a:8d:8f:c2:f0:99:5a:21:09:63: c8:89:c1:e3:6c:8d:30:bb:37:6b:57:09:b9:71:d2:e1: 7b:66:ab:ef:fa:83:3f:20:c9:35:a6:ac:57:37:aa:23: 73:1a:22:b6:5d:d4:07:8e:0e:2f:e6:a0:fe:92:d2:ea: 81:53:9a:fc:75:57:b6:9e:7e:ce:bb:59:53:89:9d:04: 24:f4:cb:c2:a1:e4:9e:ed:36:34:a8:32:3e:87:fa:ad: 6e:bb:9f:7c:95:77:2e:52:26:0d:73:a9:9b:98:ba:f2: e6:c9:88:fd:e5:26:ea:08:39:b4:57:a8:c6:f2:fa:46: f7:96:15:68:3e:3e:14:db:92:4c:96:e9:66:90:06:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9535/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:e8:2c:6b:8a:81:07:1d:1c:3e:7f:66:ec:57:a1:1b: c6:07:b4:66:e5:ca:2c:62:25:fe:a0:7c:11:05:06:d8: 08:56:50:08:af:2d:ad:54:e0:67:dd:72:67:37:dd:7a: f0:fc:f0:7d:24:1c:71:08:22:12:12:df:ba:ec:8d:44: 88:51:9c:25:d9:76:3c:81:98:a8:76:d3:bd:ea:ab:9f: 7b:e4:d1:bd:9c:e7:f6:34:02:27:b3:4c:0b:51:b2:38: 15:9e:d8:56:e1:c5:03:8f:6d:82:5b:e9:c0:17:39:76: 6b:1e:c2:2b:ac:ff:6d:39:e4:b5:1a:d1:99:3c:16:e1: be:40:d8:98:c6:e4:a6:10:ed:d1:95:f8:83:16:fe:83: 7b:9b:ac:34:d7:8d:46:18:a6:76:8c:53:f4:fd:e5:b2: 0b:1a:f4:4e:c4:3c:25:89:17:a4:22:05:c9:6c:83:dd: 09:2d:5f:22:64:95:fc:19:85:41:76:be:6f:78:ae:03: 21:3d:2f:ce:c1:09:13:b8:75:77:df:09:f3:8a:07:c2: b9:4f:04:cb:2a:74:e1:c6:1d:ba:ff:14:1c:42:10:94: 74:f9:4b:b9:fa:1c:72:b2:86:ff:61:2b:5c:14:be:5e: a8:f4:30:10:b7:23:6c:65:0e:09:cf:b6:f1:be:16:dd Fingerprint (SHA-256): 70:93:0C:46:0E:61:B9:C4:18:86:16:D0:04:74:5B:1D:0E:F9:A3:87:48:39:CA:5D:51:0B:76:98:06:28:64:DD Fingerprint (SHA1): 9D:E2:9E:AA:F5:38:27:30:35:12:D1:34:4D:E6:F4:2E:A8:66:E8:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #2615: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #2616: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2617: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2618: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #2619: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #2620: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #2621: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2622: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145751 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2623: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2624: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #2625: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2626: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1226145752 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2627: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2628: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2629: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145392.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2630: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145351.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2631: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2632: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #2633: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145392.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2634: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1226145753 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2635: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2636: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2637: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145392.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2638: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145352.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2639: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2640: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #2641: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2642: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1226145754 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2643: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2644: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2645: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145392.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2646: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145353.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2647: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2648: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2649: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145392.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #2650: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145354.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #2651: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2652: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226150121Z nextupdate=20251226150121Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 15:01:21 2024 Next Update: Fri Dec 26 15:01:21 2025 CRL Extensions: chains.sh: #2653: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150121Z nextupdate=20251226150121Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:01:21 2024 Next Update: Fri Dec 26 15:01:21 2025 CRL Extensions: chains.sh: #2654: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226150121Z nextupdate=20251226150121Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 15:01:21 2024 Next Update: Fri Dec 26 15:01:21 2025 CRL Extensions: chains.sh: #2655: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226150122Z nextupdate=20251226150122Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 15:01:22 2024 Next Update: Fri Dec 26 15:01:22 2025 CRL Extensions: chains.sh: #2656: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150123Z addcert 20 20241226150123Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:01:23 2024 Next Update: Fri Dec 26 15:01:21 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 15:01:23 2024 CRL Extensions: chains.sh: #2657: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150124Z addcert 40 20241226150124Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:01:24 2024 Next Update: Fri Dec 26 15:01:21 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 15:01:23 2024 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Thu Dec 26 15:01:24 2024 CRL Extensions: chains.sh: #2658: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2659: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2660: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #2661: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145751 (0x49157fd7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:15 2024 Not After : Wed Dec 26 15:01:15 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:81:07:19:7c:a8:8c:20:d4:82:a4:76:b4:85:be:19: a5:b4:6e:01:a4:87:e9:ec:7e:cf:1f:6b:7b:56:bc:20: 0e:14:18:8e:04:91:a7:b6:2a:f1:e6:fc:dd:0e:eb:f5: 6e:3e:8b:6e:6e:0f:d9:ee:89:f1:d5:d1:f1:df:96:95: e8:3b:3b:27:bc:d9:7e:42:48:ea:18:cf:30:f0:1b:13: d6:e9:f4:68:fe:31:76:94:68:5a:52:0c:85:f5:17:ff: db:90:d3:9f:1a:bb:fb:a4:05:c6:8e:d3:1a:3b:ce:9b: a5:c5:33:b4:d2:cd:b0:6c:8a:76:4b:81:df:66:87:5c: bd:37:2e:85:47:e6:0d:86:10:c2:91:46:ce:b9:7d:5e: 72:e2:fb:2d:6a:8c:03:dc:6b:62:de:28:62:97:41:03: 6e:d0:3c:fa:8a:39:ec:01:09:26:20:66:13:97:6f:62: 0f:85:8a:dc:86:45:2c:6f:8e:d4:f0:cc:31:f5:58:2d: c7:1b:a1:69:9f:3a:7e:38:0d:fb:32:3a:fa:7a:72:0e: 54:7e:85:c2:03:4f:66:46:4f:b6:a1:98:99:02:72:4e: be:ce:b6:12:c1:f4:50:4f:f0:19:da:66:e8:36:ed:a5: cf:ec:5f:2c:08:f6:41:fa:38:da:14:4b:b1:53:62:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:7a:de:bc:03:d0:26:56:52:55:9d:59:ea:77:78:c5: 9d:38:19:ad:fc:fb:6b:79:99:4a:9a:53:46:c9:99:dc: a4:a1:8f:94:b9:35:5c:d5:3c:9f:de:fe:a4:df:73:fa: 52:22:ee:7e:19:7b:43:ae:6a:46:41:12:e3:76:c1:09: 56:ca:b3:15:ac:cb:cd:af:0c:a6:ee:7f:28:e2:06:72: 8a:86:7f:51:bd:d4:86:29:1a:99:b4:59:f7:36:8a:3b: 76:8d:80:16:b7:38:f5:72:51:56:3b:82:71:59:b1:54: 61:2f:a4:27:c7:dc:75:3a:eb:a7:3d:30:dc:e3:c2:0a: 73:ec:2b:7c:bf:83:ef:d9:73:a6:14:20:3c:c5:a8:10: 5d:a6:a5:70:ae:50:3a:f0:37:b8:3f:10:eb:6c:f8:b5: 0f:bc:b8:40:e7:e5:76:3b:9e:4c:45:76:85:ef:42:e2: 45:28:77:2b:71:6e:8b:f7:8b:29:7d:1d:6b:cf:9f:98: d8:0f:61:14:49:ca:dd:5a:06:43:68:9c:29:6e:be:28: 91:3f:74:15:04:f3:b8:1f:95:0b:af:be:6c:e2:d1:66: 75:b6:be:a5:a1:b6:6d:14:ad:8b:74:24:80:d5:eb:97: df:47:db:e0:93:58:a6:de:2d:9f:37:6d:1a:4d:fe:5b Fingerprint (SHA-256): DE:28:4F:39:8D:92:32:5B:97:D3:28:71:0B:CE:F8:13:EC:26:DD:C6:77:D5:E4:9C:E0:79:F1:AE:75:AF:EC:01 Fingerprint (SHA1): F1:61:CA:07:6B:00:19:A5:01:1F:1A:87:C2:35:93:B7:FD:BF:E9:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2662: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2663: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145751 (0x49157fd7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:15 2024 Not After : Wed Dec 26 15:01:15 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:81:07:19:7c:a8:8c:20:d4:82:a4:76:b4:85:be:19: a5:b4:6e:01:a4:87:e9:ec:7e:cf:1f:6b:7b:56:bc:20: 0e:14:18:8e:04:91:a7:b6:2a:f1:e6:fc:dd:0e:eb:f5: 6e:3e:8b:6e:6e:0f:d9:ee:89:f1:d5:d1:f1:df:96:95: e8:3b:3b:27:bc:d9:7e:42:48:ea:18:cf:30:f0:1b:13: d6:e9:f4:68:fe:31:76:94:68:5a:52:0c:85:f5:17:ff: db:90:d3:9f:1a:bb:fb:a4:05:c6:8e:d3:1a:3b:ce:9b: a5:c5:33:b4:d2:cd:b0:6c:8a:76:4b:81:df:66:87:5c: bd:37:2e:85:47:e6:0d:86:10:c2:91:46:ce:b9:7d:5e: 72:e2:fb:2d:6a:8c:03:dc:6b:62:de:28:62:97:41:03: 6e:d0:3c:fa:8a:39:ec:01:09:26:20:66:13:97:6f:62: 0f:85:8a:dc:86:45:2c:6f:8e:d4:f0:cc:31:f5:58:2d: c7:1b:a1:69:9f:3a:7e:38:0d:fb:32:3a:fa:7a:72:0e: 54:7e:85:c2:03:4f:66:46:4f:b6:a1:98:99:02:72:4e: be:ce:b6:12:c1:f4:50:4f:f0:19:da:66:e8:36:ed:a5: cf:ec:5f:2c:08:f6:41:fa:38:da:14:4b:b1:53:62:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:7a:de:bc:03:d0:26:56:52:55:9d:59:ea:77:78:c5: 9d:38:19:ad:fc:fb:6b:79:99:4a:9a:53:46:c9:99:dc: a4:a1:8f:94:b9:35:5c:d5:3c:9f:de:fe:a4:df:73:fa: 52:22:ee:7e:19:7b:43:ae:6a:46:41:12:e3:76:c1:09: 56:ca:b3:15:ac:cb:cd:af:0c:a6:ee:7f:28:e2:06:72: 8a:86:7f:51:bd:d4:86:29:1a:99:b4:59:f7:36:8a:3b: 76:8d:80:16:b7:38:f5:72:51:56:3b:82:71:59:b1:54: 61:2f:a4:27:c7:dc:75:3a:eb:a7:3d:30:dc:e3:c2:0a: 73:ec:2b:7c:bf:83:ef:d9:73:a6:14:20:3c:c5:a8:10: 5d:a6:a5:70:ae:50:3a:f0:37:b8:3f:10:eb:6c:f8:b5: 0f:bc:b8:40:e7:e5:76:3b:9e:4c:45:76:85:ef:42:e2: 45:28:77:2b:71:6e:8b:f7:8b:29:7d:1d:6b:cf:9f:98: d8:0f:61:14:49:ca:dd:5a:06:43:68:9c:29:6e:be:28: 91:3f:74:15:04:f3:b8:1f:95:0b:af:be:6c:e2:d1:66: 75:b6:be:a5:a1:b6:6d:14:ad:8b:74:24:80:d5:eb:97: df:47:db:e0:93:58:a6:de:2d:9f:37:6d:1a:4d:fe:5b Fingerprint (SHA-256): DE:28:4F:39:8D:92:32:5B:97:D3:28:71:0B:CE:F8:13:EC:26:DD:C6:77:D5:E4:9C:E0:79:F1:AE:75:AF:EC:01 Fingerprint (SHA1): F1:61:CA:07:6B:00:19:A5:01:1F:1A:87:C2:35:93:B7:FD:BF:E9:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #2664: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #2665: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2666: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145755 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2667: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2668: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2669: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2670: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145756 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2671: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2672: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2673: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2674: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145757 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2675: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2676: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2677: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2678: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1226145758 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2679: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2680: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #2681: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145759 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2682: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #2683: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #2684: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2685: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1226145760 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2686: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2687: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2688: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2689: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1226145761 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2690: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2691: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #2692: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #2693: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #2694: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145755 (0x49157fdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:01:25 2024 Not After : Wed Dec 26 15:01:25 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:bf:ef:bf:36:47:fb:1c:28:77:e1:e8:36:43:47:a6: e2:2c:14:f3:9a:9f:06:10:69:29:9d:a9:82:10:a2:f9: a6:ce:a3:b3:12:31:20:90:1e:c5:3f:49:1c:f7:39:99: bf:14:5f:13:0d:79:9b:8d:f0:8e:07:db:5a:0d:47:af: d2:1d:15:39:35:4a:38:92:8b:db:a5:99:36:9a:80:b5: 04:b2:c7:41:ae:76:2a:ae:e3:64:d8:98:80:73:76:b1: 98:3b:d5:f4:c4:e6:de:06:62:0c:f0:0f:52:50:dc:b7: 20:e5:91:d5:5b:1d:2f:e4:3b:8a:6a:ee:92:58:e0:87: 13:2f:ff:69:fb:ca:de:50:58:21:80:8e:2a:81:24:63: 06:57:bc:0d:97:b7:60:e5:33:67:32:ce:28:4a:67:00: 56:02:51:f3:f3:2e:5d:89:98:79:57:1e:93:9f:5a:a6: 5e:48:5b:7c:64:03:ff:40:f1:78:e7:a7:70:c6:91:86: 6a:bc:c8:c8:c2:5c:16:f3:a8:94:e9:c7:ad:42:ce:46: 36:60:f6:88:ba:f5:f4:70:d3:e4:8c:a4:bb:06:60:a3: 4a:28:bf:62:2b:07:82:46:45:cf:2b:10:fd:fd:0a:3d: 55:36:75:b6:46:01:cf:0b:a1:b2:a0:62:3c:6e:68:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:b1:3b:cf:49:18:0a:b7:d7:79:58:b8:af:36:1e:ab: 16:d9:e8:e9:d7:20:69:89:3d:6f:36:fa:8c:b8:a1:2f: 17:ce:2c:d7:83:bd:bb:72:6d:a6:1a:f4:e7:6d:ee:16: da:82:74:d7:7b:05:2e:d2:65:af:c1:47:ca:72:04:b5: 83:ac:74:38:78:24:f3:77:18:f6:c7:ed:64:65:f4:ec: 57:97:24:84:20:5f:f0:f9:b4:88:be:f9:e9:11:5a:29: ab:c4:7c:e1:43:c2:5a:e7:fb:18:42:bb:91:40:9f:00: b2:f1:ef:14:c4:54:6f:3f:09:7b:34:fd:0f:2c:01:17: f7:41:87:7e:b8:e5:d5:20:3a:da:e8:28:d0:0d:c0:18: b3:f4:36:4b:36:6d:fe:6d:88:0d:a3:a9:5e:6d:a1:bd: 6f:34:21:eb:d1:4d:ed:d8:ad:fa:c3:24:fb:0d:e1:1c: 7d:8c:39:a8:03:9b:1d:77:40:16:eb:db:61:8b:f0:1c: ef:3c:5b:c8:36:e6:90:41:df:f8:b1:95:5a:32:ab:15: 41:2f:f7:79:e5:a9:55:92:84:a2:bc:69:fd:4c:3c:48: d5:75:ff:95:84:40:0b:8f:53:06:b4:f0:48:6a:d1:d5: c0:76:00:39:6b:4f:ac:91:8c:ef:5a:d9:75:50:51:92 Fingerprint (SHA-256): 64:87:BC:EB:EB:58:B6:CF:C7:DB:EB:FA:4B:0D:89:FF:65:B2:19:97:F1:02:94:DE:27:2A:19:04:6B:03:5D:48 Fingerprint (SHA1): B0:3B:90:AE:8D:79:3C:0A:FA:35:0C:F0:74:27:F6:4C:86:06:1A:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2695: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145757 (0x49157fdd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:01:27 2024 Not After : Wed Dec 26 15:01:27 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8f:16:81:a1:68:15:c3:28:3d:ca:a0:4d:61:99:98: bd:da:a5:30:bf:3b:91:ff:79:96:fc:b6:85:de:a8:e9: f9:c4:7c:19:f3:61:e1:30:27:62:48:cc:d8:a1:f7:00: ae:da:b0:9d:00:a1:c5:b9:52:53:41:c2:29:bf:a5:1e: 60:a9:82:78:45:8b:da:76:9c:a1:d2:6a:15:c8:7f:37: 20:aa:5c:49:97:13:c1:c2:60:7c:09:cc:db:1b:70:63: 5b:46:09:46:18:55:e2:c7:19:28:f7:7b:ff:87:a4:6f: d0:72:41:78:b3:9c:1d:d5:1f:89:d7:e7:95:2f:16:01: e0:9f:0e:90:bd:a8:4f:e9:4c:22:03:64:95:3a:78:54: 41:67:91:39:a0:03:64:8d:df:a0:ba:12:4a:6d:09:42: 34:2e:05:f9:7a:fb:4f:ca:ae:54:57:03:95:65:93:60: a3:5d:9d:77:2d:6b:e4:7e:8b:3f:c6:bd:88:60:1f:19: 7a:3c:69:58:e9:7a:01:8b:5d:20:86:d1:4d:73:ea:b0: 5e:8e:8b:cb:cd:bf:16:08:2c:ca:c9:82:e0:19:35:0a: 7f:bc:e9:1d:00:96:b1:c7:0f:03:ac:b9:ad:e1:7f:ac: 8a:22:70:f6:d3:cb:74:f1:c8:75:df:c8:00:0a:a4:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:87:11:d1:3e:73:0b:f6:fe:ba:b1:1b:79:ce:95:1a: 49:85:b5:2b:d1:2d:17:5a:9d:08:ee:dc:52:e2:d0:e9: 7e:f4:1b:e4:2d:e1:5b:51:67:f0:c5:4e:c2:fb:51:56: 1c:fa:a7:d0:f6:e2:f8:f7:2d:f7:58:71:13:f0:43:0a: bd:f4:c1:a3:44:da:d6:8c:2f:d3:49:87:90:32:dd:ee: 8c:f6:2b:6e:80:42:68:0f:b0:78:d0:a2:94:1a:e5:ca: 66:cb:99:d6:bb:3d:e7:f6:16:42:3f:bd:4f:4e:02:29: 86:18:1e:56:10:fa:e4:e9:72:80:9f:02:d1:72:a4:f9: 43:98:91:e8:50:57:6b:9f:50:8e:aa:05:87:29:0e:4d: 94:93:2b:f3:39:6e:db:7a:65:b5:c8:d9:07:1c:0b:84: 6e:b5:42:04:02:3b:0d:53:5d:f8:ba:13:ba:34:59:d1: 60:20:b3:b7:8b:aa:68:0a:c7:15:1b:1b:2f:c8:7a:dd: d4:7a:77:d5:0e:b7:8f:68:7d:db:a1:67:23:bf:62:1d: 7e:24:c5:65:58:17:b4:3b:28:7c:c9:76:b0:48:28:82: f1:50:68:c3:22:b1:50:14:f6:49:f3:7b:1a:5c:83:dd: 0e:61:8e:bb:b9:df:b3:6e:fd:29:08:30:4c:58:86:a5 Fingerprint (SHA-256): 71:10:3F:08:13:58:EA:DE:B3:D8:C0:62:BC:5A:76:69:E4:1E:09:42:99:C8:49:E3:DF:91:87:5F:FB:98:D0:74 Fingerprint (SHA1): C0:80:74:A1:E5:50:5B:8D:29:F1:E8:B5:75:96:A0:00:71:2B:52:24 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #2696: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145755 (0x49157fdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:01:25 2024 Not After : Wed Dec 26 15:01:25 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:bf:ef:bf:36:47:fb:1c:28:77:e1:e8:36:43:47:a6: e2:2c:14:f3:9a:9f:06:10:69:29:9d:a9:82:10:a2:f9: a6:ce:a3:b3:12:31:20:90:1e:c5:3f:49:1c:f7:39:99: bf:14:5f:13:0d:79:9b:8d:f0:8e:07:db:5a:0d:47:af: d2:1d:15:39:35:4a:38:92:8b:db:a5:99:36:9a:80:b5: 04:b2:c7:41:ae:76:2a:ae:e3:64:d8:98:80:73:76:b1: 98:3b:d5:f4:c4:e6:de:06:62:0c:f0:0f:52:50:dc:b7: 20:e5:91:d5:5b:1d:2f:e4:3b:8a:6a:ee:92:58:e0:87: 13:2f:ff:69:fb:ca:de:50:58:21:80:8e:2a:81:24:63: 06:57:bc:0d:97:b7:60:e5:33:67:32:ce:28:4a:67:00: 56:02:51:f3:f3:2e:5d:89:98:79:57:1e:93:9f:5a:a6: 5e:48:5b:7c:64:03:ff:40:f1:78:e7:a7:70:c6:91:86: 6a:bc:c8:c8:c2:5c:16:f3:a8:94:e9:c7:ad:42:ce:46: 36:60:f6:88:ba:f5:f4:70:d3:e4:8c:a4:bb:06:60:a3: 4a:28:bf:62:2b:07:82:46:45:cf:2b:10:fd:fd:0a:3d: 55:36:75:b6:46:01:cf:0b:a1:b2:a0:62:3c:6e:68:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:b1:3b:cf:49:18:0a:b7:d7:79:58:b8:af:36:1e:ab: 16:d9:e8:e9:d7:20:69:89:3d:6f:36:fa:8c:b8:a1:2f: 17:ce:2c:d7:83:bd:bb:72:6d:a6:1a:f4:e7:6d:ee:16: da:82:74:d7:7b:05:2e:d2:65:af:c1:47:ca:72:04:b5: 83:ac:74:38:78:24:f3:77:18:f6:c7:ed:64:65:f4:ec: 57:97:24:84:20:5f:f0:f9:b4:88:be:f9:e9:11:5a:29: ab:c4:7c:e1:43:c2:5a:e7:fb:18:42:bb:91:40:9f:00: b2:f1:ef:14:c4:54:6f:3f:09:7b:34:fd:0f:2c:01:17: f7:41:87:7e:b8:e5:d5:20:3a:da:e8:28:d0:0d:c0:18: b3:f4:36:4b:36:6d:fe:6d:88:0d:a3:a9:5e:6d:a1:bd: 6f:34:21:eb:d1:4d:ed:d8:ad:fa:c3:24:fb:0d:e1:1c: 7d:8c:39:a8:03:9b:1d:77:40:16:eb:db:61:8b:f0:1c: ef:3c:5b:c8:36:e6:90:41:df:f8:b1:95:5a:32:ab:15: 41:2f:f7:79:e5:a9:55:92:84:a2:bc:69:fd:4c:3c:48: d5:75:ff:95:84:40:0b:8f:53:06:b4:f0:48:6a:d1:d5: c0:76:00:39:6b:4f:ac:91:8c:ef:5a:d9:75:50:51:92 Fingerprint (SHA-256): 64:87:BC:EB:EB:58:B6:CF:C7:DB:EB:FA:4B:0D:89:FF:65:B2:19:97:F1:02:94:DE:27:2A:19:04:6B:03:5D:48 Fingerprint (SHA1): B0:3B:90:AE:8D:79:3C:0A:FA:35:0C:F0:74:27:F6:4C:86:06:1A:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2697: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #2698: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145755 (0x49157fdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:01:25 2024 Not After : Wed Dec 26 15:01:25 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:bf:ef:bf:36:47:fb:1c:28:77:e1:e8:36:43:47:a6: e2:2c:14:f3:9a:9f:06:10:69:29:9d:a9:82:10:a2:f9: a6:ce:a3:b3:12:31:20:90:1e:c5:3f:49:1c:f7:39:99: bf:14:5f:13:0d:79:9b:8d:f0:8e:07:db:5a:0d:47:af: d2:1d:15:39:35:4a:38:92:8b:db:a5:99:36:9a:80:b5: 04:b2:c7:41:ae:76:2a:ae:e3:64:d8:98:80:73:76:b1: 98:3b:d5:f4:c4:e6:de:06:62:0c:f0:0f:52:50:dc:b7: 20:e5:91:d5:5b:1d:2f:e4:3b:8a:6a:ee:92:58:e0:87: 13:2f:ff:69:fb:ca:de:50:58:21:80:8e:2a:81:24:63: 06:57:bc:0d:97:b7:60:e5:33:67:32:ce:28:4a:67:00: 56:02:51:f3:f3:2e:5d:89:98:79:57:1e:93:9f:5a:a6: 5e:48:5b:7c:64:03:ff:40:f1:78:e7:a7:70:c6:91:86: 6a:bc:c8:c8:c2:5c:16:f3:a8:94:e9:c7:ad:42:ce:46: 36:60:f6:88:ba:f5:f4:70:d3:e4:8c:a4:bb:06:60:a3: 4a:28:bf:62:2b:07:82:46:45:cf:2b:10:fd:fd:0a:3d: 55:36:75:b6:46:01:cf:0b:a1:b2:a0:62:3c:6e:68:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:b1:3b:cf:49:18:0a:b7:d7:79:58:b8:af:36:1e:ab: 16:d9:e8:e9:d7:20:69:89:3d:6f:36:fa:8c:b8:a1:2f: 17:ce:2c:d7:83:bd:bb:72:6d:a6:1a:f4:e7:6d:ee:16: da:82:74:d7:7b:05:2e:d2:65:af:c1:47:ca:72:04:b5: 83:ac:74:38:78:24:f3:77:18:f6:c7:ed:64:65:f4:ec: 57:97:24:84:20:5f:f0:f9:b4:88:be:f9:e9:11:5a:29: ab:c4:7c:e1:43:c2:5a:e7:fb:18:42:bb:91:40:9f:00: b2:f1:ef:14:c4:54:6f:3f:09:7b:34:fd:0f:2c:01:17: f7:41:87:7e:b8:e5:d5:20:3a:da:e8:28:d0:0d:c0:18: b3:f4:36:4b:36:6d:fe:6d:88:0d:a3:a9:5e:6d:a1:bd: 6f:34:21:eb:d1:4d:ed:d8:ad:fa:c3:24:fb:0d:e1:1c: 7d:8c:39:a8:03:9b:1d:77:40:16:eb:db:61:8b:f0:1c: ef:3c:5b:c8:36:e6:90:41:df:f8:b1:95:5a:32:ab:15: 41:2f:f7:79:e5:a9:55:92:84:a2:bc:69:fd:4c:3c:48: d5:75:ff:95:84:40:0b:8f:53:06:b4:f0:48:6a:d1:d5: c0:76:00:39:6b:4f:ac:91:8c:ef:5a:d9:75:50:51:92 Fingerprint (SHA-256): 64:87:BC:EB:EB:58:B6:CF:C7:DB:EB:FA:4B:0D:89:FF:65:B2:19:97:F1:02:94:DE:27:2A:19:04:6B:03:5D:48 Fingerprint (SHA1): B0:3B:90:AE:8D:79:3C:0A:FA:35:0C:F0:74:27:F6:4C:86:06:1A:5C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2699: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145757 (0x49157fdd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:01:27 2024 Not After : Wed Dec 26 15:01:27 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8f:16:81:a1:68:15:c3:28:3d:ca:a0:4d:61:99:98: bd:da:a5:30:bf:3b:91:ff:79:96:fc:b6:85:de:a8:e9: f9:c4:7c:19:f3:61:e1:30:27:62:48:cc:d8:a1:f7:00: ae:da:b0:9d:00:a1:c5:b9:52:53:41:c2:29:bf:a5:1e: 60:a9:82:78:45:8b:da:76:9c:a1:d2:6a:15:c8:7f:37: 20:aa:5c:49:97:13:c1:c2:60:7c:09:cc:db:1b:70:63: 5b:46:09:46:18:55:e2:c7:19:28:f7:7b:ff:87:a4:6f: d0:72:41:78:b3:9c:1d:d5:1f:89:d7:e7:95:2f:16:01: e0:9f:0e:90:bd:a8:4f:e9:4c:22:03:64:95:3a:78:54: 41:67:91:39:a0:03:64:8d:df:a0:ba:12:4a:6d:09:42: 34:2e:05:f9:7a:fb:4f:ca:ae:54:57:03:95:65:93:60: a3:5d:9d:77:2d:6b:e4:7e:8b:3f:c6:bd:88:60:1f:19: 7a:3c:69:58:e9:7a:01:8b:5d:20:86:d1:4d:73:ea:b0: 5e:8e:8b:cb:cd:bf:16:08:2c:ca:c9:82:e0:19:35:0a: 7f:bc:e9:1d:00:96:b1:c7:0f:03:ac:b9:ad:e1:7f:ac: 8a:22:70:f6:d3:cb:74:f1:c8:75:df:c8:00:0a:a4:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:87:11:d1:3e:73:0b:f6:fe:ba:b1:1b:79:ce:95:1a: 49:85:b5:2b:d1:2d:17:5a:9d:08:ee:dc:52:e2:d0:e9: 7e:f4:1b:e4:2d:e1:5b:51:67:f0:c5:4e:c2:fb:51:56: 1c:fa:a7:d0:f6:e2:f8:f7:2d:f7:58:71:13:f0:43:0a: bd:f4:c1:a3:44:da:d6:8c:2f:d3:49:87:90:32:dd:ee: 8c:f6:2b:6e:80:42:68:0f:b0:78:d0:a2:94:1a:e5:ca: 66:cb:99:d6:bb:3d:e7:f6:16:42:3f:bd:4f:4e:02:29: 86:18:1e:56:10:fa:e4:e9:72:80:9f:02:d1:72:a4:f9: 43:98:91:e8:50:57:6b:9f:50:8e:aa:05:87:29:0e:4d: 94:93:2b:f3:39:6e:db:7a:65:b5:c8:d9:07:1c:0b:84: 6e:b5:42:04:02:3b:0d:53:5d:f8:ba:13:ba:34:59:d1: 60:20:b3:b7:8b:aa:68:0a:c7:15:1b:1b:2f:c8:7a:dd: d4:7a:77:d5:0e:b7:8f:68:7d:db:a1:67:23:bf:62:1d: 7e:24:c5:65:58:17:b4:3b:28:7c:c9:76:b0:48:28:82: f1:50:68:c3:22:b1:50:14:f6:49:f3:7b:1a:5c:83:dd: 0e:61:8e:bb:b9:df:b3:6e:fd:29:08:30:4c:58:86:a5 Fingerprint (SHA-256): 71:10:3F:08:13:58:EA:DE:B3:D8:C0:62:BC:5A:76:69:E4:1E:09:42:99:C8:49:E3:DF:91:87:5F:FB:98:D0:74 Fingerprint (SHA1): C0:80:74:A1:E5:50:5B:8D:29:F1:E8:B5:75:96:A0:00:71:2B:52:24 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #2700: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #2701: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #2702: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #2703: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145755 (0x49157fdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:01:25 2024 Not After : Wed Dec 26 15:01:25 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:bf:ef:bf:36:47:fb:1c:28:77:e1:e8:36:43:47:a6: e2:2c:14:f3:9a:9f:06:10:69:29:9d:a9:82:10:a2:f9: a6:ce:a3:b3:12:31:20:90:1e:c5:3f:49:1c:f7:39:99: bf:14:5f:13:0d:79:9b:8d:f0:8e:07:db:5a:0d:47:af: d2:1d:15:39:35:4a:38:92:8b:db:a5:99:36:9a:80:b5: 04:b2:c7:41:ae:76:2a:ae:e3:64:d8:98:80:73:76:b1: 98:3b:d5:f4:c4:e6:de:06:62:0c:f0:0f:52:50:dc:b7: 20:e5:91:d5:5b:1d:2f:e4:3b:8a:6a:ee:92:58:e0:87: 13:2f:ff:69:fb:ca:de:50:58:21:80:8e:2a:81:24:63: 06:57:bc:0d:97:b7:60:e5:33:67:32:ce:28:4a:67:00: 56:02:51:f3:f3:2e:5d:89:98:79:57:1e:93:9f:5a:a6: 5e:48:5b:7c:64:03:ff:40:f1:78:e7:a7:70:c6:91:86: 6a:bc:c8:c8:c2:5c:16:f3:a8:94:e9:c7:ad:42:ce:46: 36:60:f6:88:ba:f5:f4:70:d3:e4:8c:a4:bb:06:60:a3: 4a:28:bf:62:2b:07:82:46:45:cf:2b:10:fd:fd:0a:3d: 55:36:75:b6:46:01:cf:0b:a1:b2:a0:62:3c:6e:68:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:b1:3b:cf:49:18:0a:b7:d7:79:58:b8:af:36:1e:ab: 16:d9:e8:e9:d7:20:69:89:3d:6f:36:fa:8c:b8:a1:2f: 17:ce:2c:d7:83:bd:bb:72:6d:a6:1a:f4:e7:6d:ee:16: da:82:74:d7:7b:05:2e:d2:65:af:c1:47:ca:72:04:b5: 83:ac:74:38:78:24:f3:77:18:f6:c7:ed:64:65:f4:ec: 57:97:24:84:20:5f:f0:f9:b4:88:be:f9:e9:11:5a:29: ab:c4:7c:e1:43:c2:5a:e7:fb:18:42:bb:91:40:9f:00: b2:f1:ef:14:c4:54:6f:3f:09:7b:34:fd:0f:2c:01:17: f7:41:87:7e:b8:e5:d5:20:3a:da:e8:28:d0:0d:c0:18: b3:f4:36:4b:36:6d:fe:6d:88:0d:a3:a9:5e:6d:a1:bd: 6f:34:21:eb:d1:4d:ed:d8:ad:fa:c3:24:fb:0d:e1:1c: 7d:8c:39:a8:03:9b:1d:77:40:16:eb:db:61:8b:f0:1c: ef:3c:5b:c8:36:e6:90:41:df:f8:b1:95:5a:32:ab:15: 41:2f:f7:79:e5:a9:55:92:84:a2:bc:69:fd:4c:3c:48: d5:75:ff:95:84:40:0b:8f:53:06:b4:f0:48:6a:d1:d5: c0:76:00:39:6b:4f:ac:91:8c:ef:5a:d9:75:50:51:92 Fingerprint (SHA-256): 64:87:BC:EB:EB:58:B6:CF:C7:DB:EB:FA:4B:0D:89:FF:65:B2:19:97:F1:02:94:DE:27:2A:19:04:6B:03:5D:48 Fingerprint (SHA1): B0:3B:90:AE:8D:79:3C:0A:FA:35:0C:F0:74:27:F6:4C:86:06:1A:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2704: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145759 (0x49157fdf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 15:01:28 2024 Not After : Wed Dec 26 15:01:28 2074 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:a3:3f:18:93:df:f3:6e:1f:96:98:72:34:fb:e9:1a: 24:d3:8e:3f:0f:65:44:ae:4b:be:9d:25:ae:9f:b8:e8: 06:44:2d:4f:8e:3f:2d:59:d1:e4:62:bb:e7:2c:46:52: 29:84:b8:c2:98:9b:43:7b:68:c0:11:eb:e0:c2:95:a0: dc:a8:84:ef:20:fb:29:48:5a:23:16:02:9b:69:14:a2: 41:5c:75:25:ed:2b:c0:ff:88:fa:ee:34:3e:4e:57:be: 39:40:71:81:b3:53:b5:a5:dd:49:39:46:b2:4d:db:e5: ba:f8:8e:02:e6:0a:19:d5:66:da:68:cb:a6:d7:5b:07: 8d:ab:ea:6d:44:0c:71:40:7f:c5:0c:b6:7c:f3:c4:6a: e1:6d:4a:9e:c0:b2:07:a0:a9:88:00:3b:ea:a3:1b:a1: af:61:90:dd:fc:64:70:2c:53:5b:f0:d0:0d:da:8a:c4: 63:2c:d6:07:d7:d1:fd:69:49:05:0c:9f:5b:0f:30:61: cb:39:f6:c2:c0:0d:4a:89:ad:ea:1b:03:a4:c9:21:64: 0e:d8:46:3b:e4:56:ca:49:e9:c4:46:9f:eb:e3:53:68: a5:ed:4d:a4:8e:ab:dd:b0:41:05:07:e7:f3:a3:0a:33: 26:15:75:9c:36:6a:bc:21:23:d9:1e:a9:bb:71:42:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:a1:8a:b3:5e:ed:c5:9f:c7:17:52:82:da:24:2f:84: f1:47:40:9e:c8:bc:0c:a0:51:c6:76:ae:c0:bb:55:f0: 79:1b:75:a3:f5:b0:8a:91:23:ec:6f:d9:4c:04:2a:5a: 0b:7d:4f:e7:eb:31:d7:63:8f:be:a4:25:6d:59:01:2b: ef:46:6a:60:67:09:1c:14:aa:20:03:3e:81:b6:36:fc: 02:08:80:fe:8c:10:a4:bf:2b:c4:28:d3:96:0e:00:fd: 41:ee:22:66:85:73:ca:0b:e6:98:e9:3c:f6:d1:bc:61: 7a:b7:25:50:00:05:8e:b1:be:36:fa:1c:16:10:ca:58: bc:49:f4:3a:e2:40:29:a9:be:12:4a:5d:2f:16:95:58: a5:c1:da:68:25:bf:c1:b3:47:2b:e6:1a:5d:e9:97:76: 87:a4:92:80:23:3b:39:69:2d:e2:84:20:e9:16:ef:5f: 95:00:d4:0b:61:12:46:cf:58:37:f3:db:53:ab:53:49: e8:40:78:fc:97:22:28:52:96:53:b1:ce:8b:42:65:8d: 35:fa:b4:36:09:f3:c0:e1:22:cb:c0:46:64:7e:70:d5: 16:ae:79:c5:9d:0a:94:cb:29:d1:b6:9e:63:35:33:e2: 59:fc:97:81:2f:d2:f5:55:37:d8:cd:20:f8:b2:05:52 Fingerprint (SHA-256): 94:1F:70:9E:B0:8A:58:11:BE:F0:B2:F0:BF:CA:FC:74:CA:CC:55:2D:F4:01:3F:ED:FC:C7:00:D8:F3:F9:BE:92 Fingerprint (SHA1): D6:81:87:55:57:BB:95:45:7B:1E:D9:16:9D:AA:88:A4:AA:1E:34:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #2705: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145755 (0x49157fdb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:01:25 2024 Not After : Wed Dec 26 15:01:25 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:bf:ef:bf:36:47:fb:1c:28:77:e1:e8:36:43:47:a6: e2:2c:14:f3:9a:9f:06:10:69:29:9d:a9:82:10:a2:f9: a6:ce:a3:b3:12:31:20:90:1e:c5:3f:49:1c:f7:39:99: bf:14:5f:13:0d:79:9b:8d:f0:8e:07:db:5a:0d:47:af: d2:1d:15:39:35:4a:38:92:8b:db:a5:99:36:9a:80:b5: 04:b2:c7:41:ae:76:2a:ae:e3:64:d8:98:80:73:76:b1: 98:3b:d5:f4:c4:e6:de:06:62:0c:f0:0f:52:50:dc:b7: 20:e5:91:d5:5b:1d:2f:e4:3b:8a:6a:ee:92:58:e0:87: 13:2f:ff:69:fb:ca:de:50:58:21:80:8e:2a:81:24:63: 06:57:bc:0d:97:b7:60:e5:33:67:32:ce:28:4a:67:00: 56:02:51:f3:f3:2e:5d:89:98:79:57:1e:93:9f:5a:a6: 5e:48:5b:7c:64:03:ff:40:f1:78:e7:a7:70:c6:91:86: 6a:bc:c8:c8:c2:5c:16:f3:a8:94:e9:c7:ad:42:ce:46: 36:60:f6:88:ba:f5:f4:70:d3:e4:8c:a4:bb:06:60:a3: 4a:28:bf:62:2b:07:82:46:45:cf:2b:10:fd:fd:0a:3d: 55:36:75:b6:46:01:cf:0b:a1:b2:a0:62:3c:6e:68:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:b1:3b:cf:49:18:0a:b7:d7:79:58:b8:af:36:1e:ab: 16:d9:e8:e9:d7:20:69:89:3d:6f:36:fa:8c:b8:a1:2f: 17:ce:2c:d7:83:bd:bb:72:6d:a6:1a:f4:e7:6d:ee:16: da:82:74:d7:7b:05:2e:d2:65:af:c1:47:ca:72:04:b5: 83:ac:74:38:78:24:f3:77:18:f6:c7:ed:64:65:f4:ec: 57:97:24:84:20:5f:f0:f9:b4:88:be:f9:e9:11:5a:29: ab:c4:7c:e1:43:c2:5a:e7:fb:18:42:bb:91:40:9f:00: b2:f1:ef:14:c4:54:6f:3f:09:7b:34:fd:0f:2c:01:17: f7:41:87:7e:b8:e5:d5:20:3a:da:e8:28:d0:0d:c0:18: b3:f4:36:4b:36:6d:fe:6d:88:0d:a3:a9:5e:6d:a1:bd: 6f:34:21:eb:d1:4d:ed:d8:ad:fa:c3:24:fb:0d:e1:1c: 7d:8c:39:a8:03:9b:1d:77:40:16:eb:db:61:8b:f0:1c: ef:3c:5b:c8:36:e6:90:41:df:f8:b1:95:5a:32:ab:15: 41:2f:f7:79:e5:a9:55:92:84:a2:bc:69:fd:4c:3c:48: d5:75:ff:95:84:40:0b:8f:53:06:b4:f0:48:6a:d1:d5: c0:76:00:39:6b:4f:ac:91:8c:ef:5a:d9:75:50:51:92 Fingerprint (SHA-256): 64:87:BC:EB:EB:58:B6:CF:C7:DB:EB:FA:4B:0D:89:FF:65:B2:19:97:F1:02:94:DE:27:2A:19:04:6B:03:5D:48 Fingerprint (SHA1): B0:3B:90:AE:8D:79:3C:0A:FA:35:0C:F0:74:27:F6:4C:86:06:1A:5C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2706: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #2707: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #2708: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #2709: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #2710: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #2711: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145760 (0x49157fe0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 15:01:29 2024 Not After : Wed Dec 26 15:01:29 2029 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:71:0d:db:2f:b1:58:5e:65:ed:42:4c:b9:ae:b0:d4: 89:f0:9c:38:f3:21:ea:d6:35:0d:ba:3b:c3:b0:64:25: e9:f9:fb:a5:10:54:f8:ba:36:77:3a:45:40:65:d4:76: 6e:e0:f0:7b:00:48:9c:5c:1b:41:64:33:fd:67:0c:65: 83:b0:78:98:f5:e5:7c:57:27:82:50:ff:5b:aa:cd:e7: fb:83:1a:ee:00:b5:d5:9b:ed:bd:b4:4c:aa:93:83:1b: 75:1c:4a:f6:1f:33:06:f1:81:4c:21:9e:69:e0:93:f0: 73:25:54:6a:90:2c:cd:b0:99:ea:bb:99:e4:c4:d7:f0: df:f1:e9:42:3b:a6:62:7f:de:99:64:ba:4d:98:cd:e3: 78:ed:ba:ad:7a:36:a0:cc:8b:7c:ac:e2:0f:d8:de:72: e7:e7:92:e2:a6:79:49:d1:27:40:b6:26:2f:f8:e7:7a: f5:89:56:8b:09:00:e3:54:2f:ed:48:d7:ee:69:8e:4b: af:d0:39:f6:e9:53:4d:ae:70:34:71:1d:05:c2:78:93: 3d:fe:27:04:d2:e1:41:e9:1d:0e:22:6e:4c:30:da:32: ab:05:dd:9e:e6:68:65:71:cc:df:24:04:5c:72:81:a7: 2f:1d:ba:69:25:86:5a:a3:e9:cf:63:75:ae:3d:36:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:1f:b4:f2:9e:07:a9:86:e7:2a:37:71:1e:94:89:3b: 55:b2:af:c3:f9:0d:13:cc:4d:c5:a2:93:ee:ff:8c:13: 9e:cc:38:cd:9d:ee:42:a7:6d:36:97:05:2b:2c:7d:86: 76:83:90:6d:cd:9c:a2:c4:3f:53:cc:88:6a:aa:b8:76: e3:fc:1f:0a:8d:3a:2c:bd:a5:58:d4:d4:7f:8f:eb:d0: dc:da:d6:9e:ed:02:a1:e7:02:ec:ad:5e:c2:aa:e3:99: e4:90:f0:f4:aa:7c:88:bc:15:0d:c5:a2:8c:4e:d3:2a: 41:4e:3f:4f:23:08:47:72:c9:f3:11:36:be:23:db:44: 17:af:df:ec:fe:02:8c:4b:c3:8f:84:19:4e:21:97:18: fb:a2:13:c2:52:d9:0f:d8:11:86:ff:25:bd:48:5a:ca: 93:77:1e:65:d0:99:48:39:f8:88:01:85:58:8b:48:67: bf:0f:bf:73:2a:ec:9c:42:a8:1a:a4:e5:3e:e1:d8:9b: 54:28:20:8f:87:5e:c0:bd:95:9b:fa:9b:3d:23:c7:c4: fa:8f:72:ca:25:fe:68:d1:87:5a:45:ea:cf:1f:eb:f9: be:67:a7:9d:93:1d:02:51:73:0b:24:e4:98:76:1c:b4: 20:53:d9:f7:ec:d3:53:a4:fe:8b:3f:ee:5b:2d:95:3b Fingerprint (SHA-256): AE:18:3E:FA:56:B0:57:6A:67:F9:61:A8:55:F4:3A:9C:03:1E:5C:45:2C:FE:54:00:A7:CE:D6:60:B0:0D:DA:B7 Fingerprint (SHA1): 41:76:AB:C1:FD:B5:CE:CF:F4:8C:2C:DB:8F:34:A1:0B:85:1C:74:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #2712: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #2713: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #2714: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #2715: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #2716: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #2717: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2718: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2719: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #2720: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2721: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2722: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #2723: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2724: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2725: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2726: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2727: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #2728: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2729: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2730: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2731: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #2732: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2733: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #2734: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #2735: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #2736: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #2737: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 102830 at Thu Dec 26 15:01:35 UTC 2024 kill -USR1 102830 httpserv: normal termination httpserv -b -p 9535 2>/dev/null; httpserv with PID 102830 killed at Thu Dec 26 15:01:35 UTC 2024 httpserv starting at Thu Dec 26 15:01:35 UTC 2024 httpserv -D -p 9535 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/aiahttp/http_pid.15633 & trying to connect to httpserv at Thu Dec 26 15:01:35 UTC 2024 tstclnt -4 -p 9535 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:9535 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 114803 >/dev/null 2>/dev/null httpserv with PID 114803 found at Thu Dec 26 15:01:35 UTC 2024 httpserv with PID 114803 started at Thu Dec 26 15:01:35 UTC 2024 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #2738: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #2739: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145762 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2740: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #2741: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #2742: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145763 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2743: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #2744: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #2745: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2746: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145764 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2747: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2748: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145765 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2749: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2750: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #2751: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2752: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2753: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1226145766 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2754: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2755: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2756: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #2757: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #2758: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145763 (0x49157fe3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:66:e7:3d:48:5c:05:92:bd:e8:00:3b:8b:ba:73: 51:1c:34:e2:6b:4a:79:b3:ca:bb:80:c9:42:57:bd:00: 0d:ef:9f:c1:d0:7d:26:13:bb:84:36:a2:f1:38:01:a3: 80:cd:d6:fc:81:56:31:23:d5:27:f1:11:3c:75:aa:e0: 8f:e0:5d:93:25:ec:15:dc:b0:c2:59:c3:1c:af:00:8b: 82:a4:6f:17:0f:0d:25:cf:98:ab:c2:2f:d0:e2:03:c5: 25:b4:a7:48:ab:aa:6d:db:e9:c2:50:0b:67:3b:45:84: 39:c6:3f:35:b6:de:82:21:ff:35:92:a6:a4:fe:a5:d6: b3:85:0f:ab:77:07:ad:5f:0a:6f:3f:f2:f1:ea:ed:7d: 1d:1a:0b:2e:7b:89:3a:10:45:c6:e7:e7:32:01:0d:0b: 8a:4f:77:97:86:cd:1d:f5:1f:ec:33:c7:f1:52:24:c6: e7:1c:b2:16:d2:82:4f:8d:2d:3e:56:c2:96:2f:53:22: c5:e1:50:2e:ba:6f:8e:01:f7:9f:24:ea:d1:90:79:e7: 08:83:02:11:c0:2b:91:b4:3a:ae:5c:2d:d6:d4:34:2a: c9:32:17:66:76:f8:c1:23:71:13:83:16:79:57:f6:ad: 6a:9f:46:03:59:ca:ac:31:29:a3:9b:5e:7d:e4:98:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:01:4f:58:55:a2:d4:23:68:8a:4d:3b:98:7d:65:6e: 8f:bf:33:86:a0:92:ba:34:b1:67:cf:d4:03:4a:f9:f0: 5d:3f:93:38:3e:61:b5:f9:e5:5e:91:41:a1:2b:77:53: 96:da:9f:23:f7:6e:17:af:0a:e0:22:cc:d3:e3:a0:db: bf:c2:09:b6:a2:8f:57:70:de:d0:f0:5b:61:6d:f9:0d: 72:cc:a5:aa:a3:3b:e2:38:1d:57:a8:9f:0d:fe:9c:35: 8e:89:00:9d:c8:4f:f2:60:3a:08:5f:76:33:8d:0f:66: 17:d3:2e:96:7f:68:73:5f:ac:a5:89:b1:1f:82:1a:c9: f0:d5:02:67:cb:b5:c1:34:31:5d:e5:25:73:14:8d:c1: d5:8f:89:82:53:61:73:94:0b:1f:9c:7b:09:c5:95:5c: 92:c3:fa:5d:3f:88:6c:5c:a3:8b:49:54:9d:36:03:9f: 2e:00:6b:ce:e1:fb:93:d0:dc:f7:9a:a9:14:80:d3:00: f0:7e:d6:7e:b4:4d:59:d8:5b:b1:25:59:5e:dc:77:fe: a1:cc:ab:b4:9d:ed:a4:0c:37:8e:e6:7d:6f:f2:24:74: 50:ab:a2:11:83:a5:0a:6d:15:3f:35:0e:96:a6:39:c8: 16:4f:44:01:e5:86:e6:3c:e0:b7:5e:45:5e:0a:35:6a Fingerprint (SHA-256): 34:50:8D:D2:E7:7A:DD:72:22:BD:24:6F:BC:EF:F6:E4:77:02:F4:A4:70:6A:20:1E:C0:14:D2:5B:E7:6E:44:80 Fingerprint (SHA1): 8A:4A:C9:42:8B:24:09:6B:95:32:53:D6:F7:57:B4:94:9C:AE:94:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2759: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145762 (0x49157fe2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:68:62:2c:69:91:09:7e:c8:34:a7:c2:de:84:b5:81: 4d:c3:b4:c7:a2:6e:6f:15:21:bd:f9:53:c0:df:6b:30: 0b:d6:52:1d:87:2b:6d:81:22:8c:3d:20:4c:b9:1e:e1: a4:89:2d:74:26:7d:28:2d:fe:27:16:27:42:10:a5:46: af:fa:51:64:3c:7c:3b:5b:fa:48:57:8b:15:e3:73:fe: 73:9f:55:6d:58:0f:86:97:3e:ee:c6:c2:b0:76:f1:79: 7d:18:a1:18:88:d4:64:c3:61:10:bb:1d:b5:a3:b3:77: 29:3b:0f:55:49:e4:2c:35:38:c2:16:8a:e3:ca:b2:23: f2:36:8b:38:c8:92:e6:1c:a4:f7:47:7b:da:02:64:93: dd:56:ae:27:3a:a7:80:54:40:2b:3f:62:75:40:c0:d9: e1:8a:56:d5:b9:5b:66:f1:fd:c1:ca:e2:11:78:c1:84: 02:e3:6c:4e:7f:ea:3f:07:5b:84:c4:d9:5a:dd:8a:d2: 5d:8e:d5:ee:32:7f:97:ae:01:72:c4:90:31:ac:46:26: 0a:b3:c9:4a:b8:1d:49:54:9c:3e:5f:d7:60:96:52:83: 95:1e:cf:5b:0b:cb:e2:c2:5b:7b:0c:12:9e:47:00:6a: b0:2d:86:b8:aa:16:fe:d9:53:aa:d1:8d:a6:cb:02:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:c5:27:fa:2e:97:19:a4:77:cc:19:fc:c6:32:ae:1f: 6f:e4:28:f4:5b:66:41:93:96:e0:cb:77:c4:ed:4b:91: 3a:90:c3:63:90:4e:16:a5:3a:1f:ef:43:53:d0:4f:7a: 6e:57:5b:ef:be:9f:f9:f2:dd:1a:67:95:cc:0a:83:fb: 97:80:88:0a:db:c1:d0:64:2e:90:3e:cd:00:21:fe:75: 0a:46:2f:e4:a6:52:56:5f:c1:57:84:74:86:0b:4e:5c: 66:85:60:ab:71:ce:74:b9:20:ec:d5:09:6f:d9:1f:ad: 3a:ae:93:45:bd:8d:e0:14:7f:1c:a0:05:af:85:49:aa: ed:a8:78:b7:66:13:ef:78:91:47:1c:78:e7:87:97:ac: f7:cd:e0:ce:2f:03:ce:f7:43:2c:e8:30:21:3c:a5:29: 95:e1:bb:7b:65:0e:ac:cd:8b:b6:b2:fb:4c:b7:ed:64: 93:d4:25:00:d9:df:be:9b:17:1e:8f:43:d8:49:bc:e0: 66:84:2e:1b:08:d4:c2:7e:06:da:85:18:0f:fc:42:9f: d4:48:7b:62:a5:76:9e:87:c2:fa:e5:48:f4:6e:24:8d: 47:13:3b:26:08:02:b4:5b:34:dc:1d:3b:4e:70:d4:0d: 00:7a:a0:ab:ef:39:bc:fe:a6:3d:7b:a1:63:ea:8d:bb Fingerprint (SHA-256): F3:9D:6E:91:20:51:92:EA:1E:14:1C:83:8D:0F:44:78:55:B7:0B:0B:FC:9B:76:CA:CC:03:E3:EB:4C:23:7E:EB Fingerprint (SHA1): FB:49:A4:4B:60:A9:E3:03:23:C1:F9:04:DC:82:E4:8B:8A:0B:9B:F1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2760: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2761: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #2762: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #2763: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145762 (0x49157fe2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:68:62:2c:69:91:09:7e:c8:34:a7:c2:de:84:b5:81: 4d:c3:b4:c7:a2:6e:6f:15:21:bd:f9:53:c0:df:6b:30: 0b:d6:52:1d:87:2b:6d:81:22:8c:3d:20:4c:b9:1e:e1: a4:89:2d:74:26:7d:28:2d:fe:27:16:27:42:10:a5:46: af:fa:51:64:3c:7c:3b:5b:fa:48:57:8b:15:e3:73:fe: 73:9f:55:6d:58:0f:86:97:3e:ee:c6:c2:b0:76:f1:79: 7d:18:a1:18:88:d4:64:c3:61:10:bb:1d:b5:a3:b3:77: 29:3b:0f:55:49:e4:2c:35:38:c2:16:8a:e3:ca:b2:23: f2:36:8b:38:c8:92:e6:1c:a4:f7:47:7b:da:02:64:93: dd:56:ae:27:3a:a7:80:54:40:2b:3f:62:75:40:c0:d9: e1:8a:56:d5:b9:5b:66:f1:fd:c1:ca:e2:11:78:c1:84: 02:e3:6c:4e:7f:ea:3f:07:5b:84:c4:d9:5a:dd:8a:d2: 5d:8e:d5:ee:32:7f:97:ae:01:72:c4:90:31:ac:46:26: 0a:b3:c9:4a:b8:1d:49:54:9c:3e:5f:d7:60:96:52:83: 95:1e:cf:5b:0b:cb:e2:c2:5b:7b:0c:12:9e:47:00:6a: b0:2d:86:b8:aa:16:fe:d9:53:aa:d1:8d:a6:cb:02:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:c5:27:fa:2e:97:19:a4:77:cc:19:fc:c6:32:ae:1f: 6f:e4:28:f4:5b:66:41:93:96:e0:cb:77:c4:ed:4b:91: 3a:90:c3:63:90:4e:16:a5:3a:1f:ef:43:53:d0:4f:7a: 6e:57:5b:ef:be:9f:f9:f2:dd:1a:67:95:cc:0a:83:fb: 97:80:88:0a:db:c1:d0:64:2e:90:3e:cd:00:21:fe:75: 0a:46:2f:e4:a6:52:56:5f:c1:57:84:74:86:0b:4e:5c: 66:85:60:ab:71:ce:74:b9:20:ec:d5:09:6f:d9:1f:ad: 3a:ae:93:45:bd:8d:e0:14:7f:1c:a0:05:af:85:49:aa: ed:a8:78:b7:66:13:ef:78:91:47:1c:78:e7:87:97:ac: f7:cd:e0:ce:2f:03:ce:f7:43:2c:e8:30:21:3c:a5:29: 95:e1:bb:7b:65:0e:ac:cd:8b:b6:b2:fb:4c:b7:ed:64: 93:d4:25:00:d9:df:be:9b:17:1e:8f:43:d8:49:bc:e0: 66:84:2e:1b:08:d4:c2:7e:06:da:85:18:0f:fc:42:9f: d4:48:7b:62:a5:76:9e:87:c2:fa:e5:48:f4:6e:24:8d: 47:13:3b:26:08:02:b4:5b:34:dc:1d:3b:4e:70:d4:0d: 00:7a:a0:ab:ef:39:bc:fe:a6:3d:7b:a1:63:ea:8d:bb Fingerprint (SHA-256): F3:9D:6E:91:20:51:92:EA:1E:14:1C:83:8D:0F:44:78:55:B7:0B:0B:FC:9B:76:CA:CC:03:E3:EB:4C:23:7E:EB Fingerprint (SHA1): FB:49:A4:4B:60:A9:E3:03:23:C1:F9:04:DC:82:E4:8B:8A:0B:9B:F1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2764: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145763 (0x49157fe3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:66:e7:3d:48:5c:05:92:bd:e8:00:3b:8b:ba:73: 51:1c:34:e2:6b:4a:79:b3:ca:bb:80:c9:42:57:bd:00: 0d:ef:9f:c1:d0:7d:26:13:bb:84:36:a2:f1:38:01:a3: 80:cd:d6:fc:81:56:31:23:d5:27:f1:11:3c:75:aa:e0: 8f:e0:5d:93:25:ec:15:dc:b0:c2:59:c3:1c:af:00:8b: 82:a4:6f:17:0f:0d:25:cf:98:ab:c2:2f:d0:e2:03:c5: 25:b4:a7:48:ab:aa:6d:db:e9:c2:50:0b:67:3b:45:84: 39:c6:3f:35:b6:de:82:21:ff:35:92:a6:a4:fe:a5:d6: b3:85:0f:ab:77:07:ad:5f:0a:6f:3f:f2:f1:ea:ed:7d: 1d:1a:0b:2e:7b:89:3a:10:45:c6:e7:e7:32:01:0d:0b: 8a:4f:77:97:86:cd:1d:f5:1f:ec:33:c7:f1:52:24:c6: e7:1c:b2:16:d2:82:4f:8d:2d:3e:56:c2:96:2f:53:22: c5:e1:50:2e:ba:6f:8e:01:f7:9f:24:ea:d1:90:79:e7: 08:83:02:11:c0:2b:91:b4:3a:ae:5c:2d:d6:d4:34:2a: c9:32:17:66:76:f8:c1:23:71:13:83:16:79:57:f6:ad: 6a:9f:46:03:59:ca:ac:31:29:a3:9b:5e:7d:e4:98:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:01:4f:58:55:a2:d4:23:68:8a:4d:3b:98:7d:65:6e: 8f:bf:33:86:a0:92:ba:34:b1:67:cf:d4:03:4a:f9:f0: 5d:3f:93:38:3e:61:b5:f9:e5:5e:91:41:a1:2b:77:53: 96:da:9f:23:f7:6e:17:af:0a:e0:22:cc:d3:e3:a0:db: bf:c2:09:b6:a2:8f:57:70:de:d0:f0:5b:61:6d:f9:0d: 72:cc:a5:aa:a3:3b:e2:38:1d:57:a8:9f:0d:fe:9c:35: 8e:89:00:9d:c8:4f:f2:60:3a:08:5f:76:33:8d:0f:66: 17:d3:2e:96:7f:68:73:5f:ac:a5:89:b1:1f:82:1a:c9: f0:d5:02:67:cb:b5:c1:34:31:5d:e5:25:73:14:8d:c1: d5:8f:89:82:53:61:73:94:0b:1f:9c:7b:09:c5:95:5c: 92:c3:fa:5d:3f:88:6c:5c:a3:8b:49:54:9d:36:03:9f: 2e:00:6b:ce:e1:fb:93:d0:dc:f7:9a:a9:14:80:d3:00: f0:7e:d6:7e:b4:4d:59:d8:5b:b1:25:59:5e:dc:77:fe: a1:cc:ab:b4:9d:ed:a4:0c:37:8e:e6:7d:6f:f2:24:74: 50:ab:a2:11:83:a5:0a:6d:15:3f:35:0e:96:a6:39:c8: 16:4f:44:01:e5:86:e6:3c:e0:b7:5e:45:5e:0a:35:6a Fingerprint (SHA-256): 34:50:8D:D2:E7:7A:DD:72:22:BD:24:6F:BC:EF:F6:E4:77:02:F4:A4:70:6A:20:1E:C0:14:D2:5B:E7:6E:44:80 Fingerprint (SHA1): 8A:4A:C9:42:8B:24:09:6B:95:32:53:D6:F7:57:B4:94:9C:AE:94:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2765: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #2766: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #2767: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2768: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2769: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #2770: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145763 (0x49157fe3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:66:e7:3d:48:5c:05:92:bd:e8:00:3b:8b:ba:73: 51:1c:34:e2:6b:4a:79:b3:ca:bb:80:c9:42:57:bd:00: 0d:ef:9f:c1:d0:7d:26:13:bb:84:36:a2:f1:38:01:a3: 80:cd:d6:fc:81:56:31:23:d5:27:f1:11:3c:75:aa:e0: 8f:e0:5d:93:25:ec:15:dc:b0:c2:59:c3:1c:af:00:8b: 82:a4:6f:17:0f:0d:25:cf:98:ab:c2:2f:d0:e2:03:c5: 25:b4:a7:48:ab:aa:6d:db:e9:c2:50:0b:67:3b:45:84: 39:c6:3f:35:b6:de:82:21:ff:35:92:a6:a4:fe:a5:d6: b3:85:0f:ab:77:07:ad:5f:0a:6f:3f:f2:f1:ea:ed:7d: 1d:1a:0b:2e:7b:89:3a:10:45:c6:e7:e7:32:01:0d:0b: 8a:4f:77:97:86:cd:1d:f5:1f:ec:33:c7:f1:52:24:c6: e7:1c:b2:16:d2:82:4f:8d:2d:3e:56:c2:96:2f:53:22: c5:e1:50:2e:ba:6f:8e:01:f7:9f:24:ea:d1:90:79:e7: 08:83:02:11:c0:2b:91:b4:3a:ae:5c:2d:d6:d4:34:2a: c9:32:17:66:76:f8:c1:23:71:13:83:16:79:57:f6:ad: 6a:9f:46:03:59:ca:ac:31:29:a3:9b:5e:7d:e4:98:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:01:4f:58:55:a2:d4:23:68:8a:4d:3b:98:7d:65:6e: 8f:bf:33:86:a0:92:ba:34:b1:67:cf:d4:03:4a:f9:f0: 5d:3f:93:38:3e:61:b5:f9:e5:5e:91:41:a1:2b:77:53: 96:da:9f:23:f7:6e:17:af:0a:e0:22:cc:d3:e3:a0:db: bf:c2:09:b6:a2:8f:57:70:de:d0:f0:5b:61:6d:f9:0d: 72:cc:a5:aa:a3:3b:e2:38:1d:57:a8:9f:0d:fe:9c:35: 8e:89:00:9d:c8:4f:f2:60:3a:08:5f:76:33:8d:0f:66: 17:d3:2e:96:7f:68:73:5f:ac:a5:89:b1:1f:82:1a:c9: f0:d5:02:67:cb:b5:c1:34:31:5d:e5:25:73:14:8d:c1: d5:8f:89:82:53:61:73:94:0b:1f:9c:7b:09:c5:95:5c: 92:c3:fa:5d:3f:88:6c:5c:a3:8b:49:54:9d:36:03:9f: 2e:00:6b:ce:e1:fb:93:d0:dc:f7:9a:a9:14:80:d3:00: f0:7e:d6:7e:b4:4d:59:d8:5b:b1:25:59:5e:dc:77:fe: a1:cc:ab:b4:9d:ed:a4:0c:37:8e:e6:7d:6f:f2:24:74: 50:ab:a2:11:83:a5:0a:6d:15:3f:35:0e:96:a6:39:c8: 16:4f:44:01:e5:86:e6:3c:e0:b7:5e:45:5e:0a:35:6a Fingerprint (SHA-256): 34:50:8D:D2:E7:7A:DD:72:22:BD:24:6F:BC:EF:F6:E4:77:02:F4:A4:70:6A:20:1E:C0:14:D2:5B:E7:6E:44:80 Fingerprint (SHA1): 8A:4A:C9:42:8B:24:09:6B:95:32:53:D6:F7:57:B4:94:9C:AE:94:C2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2771: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145763 (0x49157fe3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4d:66:e7:3d:48:5c:05:92:bd:e8:00:3b:8b:ba:73: 51:1c:34:e2:6b:4a:79:b3:ca:bb:80:c9:42:57:bd:00: 0d:ef:9f:c1:d0:7d:26:13:bb:84:36:a2:f1:38:01:a3: 80:cd:d6:fc:81:56:31:23:d5:27:f1:11:3c:75:aa:e0: 8f:e0:5d:93:25:ec:15:dc:b0:c2:59:c3:1c:af:00:8b: 82:a4:6f:17:0f:0d:25:cf:98:ab:c2:2f:d0:e2:03:c5: 25:b4:a7:48:ab:aa:6d:db:e9:c2:50:0b:67:3b:45:84: 39:c6:3f:35:b6:de:82:21:ff:35:92:a6:a4:fe:a5:d6: b3:85:0f:ab:77:07:ad:5f:0a:6f:3f:f2:f1:ea:ed:7d: 1d:1a:0b:2e:7b:89:3a:10:45:c6:e7:e7:32:01:0d:0b: 8a:4f:77:97:86:cd:1d:f5:1f:ec:33:c7:f1:52:24:c6: e7:1c:b2:16:d2:82:4f:8d:2d:3e:56:c2:96:2f:53:22: c5:e1:50:2e:ba:6f:8e:01:f7:9f:24:ea:d1:90:79:e7: 08:83:02:11:c0:2b:91:b4:3a:ae:5c:2d:d6:d4:34:2a: c9:32:17:66:76:f8:c1:23:71:13:83:16:79:57:f6:ad: 6a:9f:46:03:59:ca:ac:31:29:a3:9b:5e:7d:e4:98:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:01:4f:58:55:a2:d4:23:68:8a:4d:3b:98:7d:65:6e: 8f:bf:33:86:a0:92:ba:34:b1:67:cf:d4:03:4a:f9:f0: 5d:3f:93:38:3e:61:b5:f9:e5:5e:91:41:a1:2b:77:53: 96:da:9f:23:f7:6e:17:af:0a:e0:22:cc:d3:e3:a0:db: bf:c2:09:b6:a2:8f:57:70:de:d0:f0:5b:61:6d:f9:0d: 72:cc:a5:aa:a3:3b:e2:38:1d:57:a8:9f:0d:fe:9c:35: 8e:89:00:9d:c8:4f:f2:60:3a:08:5f:76:33:8d:0f:66: 17:d3:2e:96:7f:68:73:5f:ac:a5:89:b1:1f:82:1a:c9: f0:d5:02:67:cb:b5:c1:34:31:5d:e5:25:73:14:8d:c1: d5:8f:89:82:53:61:73:94:0b:1f:9c:7b:09:c5:95:5c: 92:c3:fa:5d:3f:88:6c:5c:a3:8b:49:54:9d:36:03:9f: 2e:00:6b:ce:e1:fb:93:d0:dc:f7:9a:a9:14:80:d3:00: f0:7e:d6:7e:b4:4d:59:d8:5b:b1:25:59:5e:dc:77:fe: a1:cc:ab:b4:9d:ed:a4:0c:37:8e:e6:7d:6f:f2:24:74: 50:ab:a2:11:83:a5:0a:6d:15:3f:35:0e:96:a6:39:c8: 16:4f:44:01:e5:86:e6:3c:e0:b7:5e:45:5e:0a:35:6a Fingerprint (SHA-256): 34:50:8D:D2:E7:7A:DD:72:22:BD:24:6F:BC:EF:F6:E4:77:02:F4:A4:70:6A:20:1E:C0:14:D2:5B:E7:6E:44:80 Fingerprint (SHA1): 8A:4A:C9:42:8B:24:09:6B:95:32:53:D6:F7:57:B4:94:9C:AE:94:C2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2772: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #2773: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #2774: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #2775: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2776: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #2777: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145762 (0x49157fe2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:68:62:2c:69:91:09:7e:c8:34:a7:c2:de:84:b5:81: 4d:c3:b4:c7:a2:6e:6f:15:21:bd:f9:53:c0:df:6b:30: 0b:d6:52:1d:87:2b:6d:81:22:8c:3d:20:4c:b9:1e:e1: a4:89:2d:74:26:7d:28:2d:fe:27:16:27:42:10:a5:46: af:fa:51:64:3c:7c:3b:5b:fa:48:57:8b:15:e3:73:fe: 73:9f:55:6d:58:0f:86:97:3e:ee:c6:c2:b0:76:f1:79: 7d:18:a1:18:88:d4:64:c3:61:10:bb:1d:b5:a3:b3:77: 29:3b:0f:55:49:e4:2c:35:38:c2:16:8a:e3:ca:b2:23: f2:36:8b:38:c8:92:e6:1c:a4:f7:47:7b:da:02:64:93: dd:56:ae:27:3a:a7:80:54:40:2b:3f:62:75:40:c0:d9: e1:8a:56:d5:b9:5b:66:f1:fd:c1:ca:e2:11:78:c1:84: 02:e3:6c:4e:7f:ea:3f:07:5b:84:c4:d9:5a:dd:8a:d2: 5d:8e:d5:ee:32:7f:97:ae:01:72:c4:90:31:ac:46:26: 0a:b3:c9:4a:b8:1d:49:54:9c:3e:5f:d7:60:96:52:83: 95:1e:cf:5b:0b:cb:e2:c2:5b:7b:0c:12:9e:47:00:6a: b0:2d:86:b8:aa:16:fe:d9:53:aa:d1:8d:a6:cb:02:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:c5:27:fa:2e:97:19:a4:77:cc:19:fc:c6:32:ae:1f: 6f:e4:28:f4:5b:66:41:93:96:e0:cb:77:c4:ed:4b:91: 3a:90:c3:63:90:4e:16:a5:3a:1f:ef:43:53:d0:4f:7a: 6e:57:5b:ef:be:9f:f9:f2:dd:1a:67:95:cc:0a:83:fb: 97:80:88:0a:db:c1:d0:64:2e:90:3e:cd:00:21:fe:75: 0a:46:2f:e4:a6:52:56:5f:c1:57:84:74:86:0b:4e:5c: 66:85:60:ab:71:ce:74:b9:20:ec:d5:09:6f:d9:1f:ad: 3a:ae:93:45:bd:8d:e0:14:7f:1c:a0:05:af:85:49:aa: ed:a8:78:b7:66:13:ef:78:91:47:1c:78:e7:87:97:ac: f7:cd:e0:ce:2f:03:ce:f7:43:2c:e8:30:21:3c:a5:29: 95:e1:bb:7b:65:0e:ac:cd:8b:b6:b2:fb:4c:b7:ed:64: 93:d4:25:00:d9:df:be:9b:17:1e:8f:43:d8:49:bc:e0: 66:84:2e:1b:08:d4:c2:7e:06:da:85:18:0f:fc:42:9f: d4:48:7b:62:a5:76:9e:87:c2:fa:e5:48:f4:6e:24:8d: 47:13:3b:26:08:02:b4:5b:34:dc:1d:3b:4e:70:d4:0d: 00:7a:a0:ab:ef:39:bc:fe:a6:3d:7b:a1:63:ea:8d:bb Fingerprint (SHA-256): F3:9D:6E:91:20:51:92:EA:1E:14:1C:83:8D:0F:44:78:55:B7:0B:0B:FC:9B:76:CA:CC:03:E3:EB:4C:23:7E:EB Fingerprint (SHA1): FB:49:A4:4B:60:A9:E3:03:23:C1:F9:04:DC:82:E4:8B:8A:0B:9B:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2778: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145762 (0x49157fe2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:01:36 2024 Not After : Wed Dec 26 15:01:36 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:68:62:2c:69:91:09:7e:c8:34:a7:c2:de:84:b5:81: 4d:c3:b4:c7:a2:6e:6f:15:21:bd:f9:53:c0:df:6b:30: 0b:d6:52:1d:87:2b:6d:81:22:8c:3d:20:4c:b9:1e:e1: a4:89:2d:74:26:7d:28:2d:fe:27:16:27:42:10:a5:46: af:fa:51:64:3c:7c:3b:5b:fa:48:57:8b:15:e3:73:fe: 73:9f:55:6d:58:0f:86:97:3e:ee:c6:c2:b0:76:f1:79: 7d:18:a1:18:88:d4:64:c3:61:10:bb:1d:b5:a3:b3:77: 29:3b:0f:55:49:e4:2c:35:38:c2:16:8a:e3:ca:b2:23: f2:36:8b:38:c8:92:e6:1c:a4:f7:47:7b:da:02:64:93: dd:56:ae:27:3a:a7:80:54:40:2b:3f:62:75:40:c0:d9: e1:8a:56:d5:b9:5b:66:f1:fd:c1:ca:e2:11:78:c1:84: 02:e3:6c:4e:7f:ea:3f:07:5b:84:c4:d9:5a:dd:8a:d2: 5d:8e:d5:ee:32:7f:97:ae:01:72:c4:90:31:ac:46:26: 0a:b3:c9:4a:b8:1d:49:54:9c:3e:5f:d7:60:96:52:83: 95:1e:cf:5b:0b:cb:e2:c2:5b:7b:0c:12:9e:47:00:6a: b0:2d:86:b8:aa:16:fe:d9:53:aa:d1:8d:a6:cb:02:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:c5:27:fa:2e:97:19:a4:77:cc:19:fc:c6:32:ae:1f: 6f:e4:28:f4:5b:66:41:93:96:e0:cb:77:c4:ed:4b:91: 3a:90:c3:63:90:4e:16:a5:3a:1f:ef:43:53:d0:4f:7a: 6e:57:5b:ef:be:9f:f9:f2:dd:1a:67:95:cc:0a:83:fb: 97:80:88:0a:db:c1:d0:64:2e:90:3e:cd:00:21:fe:75: 0a:46:2f:e4:a6:52:56:5f:c1:57:84:74:86:0b:4e:5c: 66:85:60:ab:71:ce:74:b9:20:ec:d5:09:6f:d9:1f:ad: 3a:ae:93:45:bd:8d:e0:14:7f:1c:a0:05:af:85:49:aa: ed:a8:78:b7:66:13:ef:78:91:47:1c:78:e7:87:97:ac: f7:cd:e0:ce:2f:03:ce:f7:43:2c:e8:30:21:3c:a5:29: 95:e1:bb:7b:65:0e:ac:cd:8b:b6:b2:fb:4c:b7:ed:64: 93:d4:25:00:d9:df:be:9b:17:1e:8f:43:d8:49:bc:e0: 66:84:2e:1b:08:d4:c2:7e:06:da:85:18:0f:fc:42:9f: d4:48:7b:62:a5:76:9e:87:c2:fa:e5:48:f4:6e:24:8d: 47:13:3b:26:08:02:b4:5b:34:dc:1d:3b:4e:70:d4:0d: 00:7a:a0:ab:ef:39:bc:fe:a6:3d:7b:a1:63:ea:8d:bb Fingerprint (SHA-256): F3:9D:6E:91:20:51:92:EA:1E:14:1C:83:8D:0F:44:78:55:B7:0B:0B:FC:9B:76:CA:CC:03:E3:EB:4C:23:7E:EB Fingerprint (SHA1): FB:49:A4:4B:60:A9:E3:03:23:C1:F9:04:DC:82:E4:8B:8A:0B:9B:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #2779: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #2780: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145767 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2781: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #2782: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #2783: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145768 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2784: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #2785: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #2786: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145769 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2787: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #2788: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #2789: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145770 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2790: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #2791: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #2792: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145771 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2793: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #2794: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #2795: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145772 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2796: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #2797: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #2798: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145773 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2799: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #2800: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #2801: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145774 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2802: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #2803: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #2804: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145775 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2805: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #2806: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #2807: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2808: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1226145776 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2809: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2810: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1226145777 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2811: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2812: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1226145778 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2813: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2814: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #2815: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #2816: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2817: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1226145779 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2818: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2819: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1226145780 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2820: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2821: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1226145781 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2822: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2823: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #2824: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #2825: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2826: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1226145782 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2827: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2828: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1226145783 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2829: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2830: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1226145784 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2831: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2832: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #2833: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #2834: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2835: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1226145785 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2836: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2837: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1226145786 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2838: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2839: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1226145787 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2840: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2841: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #2842: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2843: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2844: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1226145788 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2845: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2846: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2847: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2848: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145789 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #2849: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2850: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145767 (0x49157fe7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Thu Dec 26 15:01:42 2024 Not After : Wed Dec 26 15:01:42 2074 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dc:50:40:1f:d2:b7:44:bb:b4:b3:93:50:e5:e0:13:fb: 88:4c:e6:be:8e:55:e6:47:f1:14:ca:e7:88:37:f7:9b: 72:a3:9a:69:7b:b2:75:25:46:dc:cb:e7:40:d5:25:ff: c6:93:04:29:bc:77:27:dd:32:ec:15:00:f4:b5:7b:84: 3d:08:1f:42:b9:71:f6:9b:87:4d:6c:34:f9:51:f2:63: 3f:66:ce:c4:9b:1c:43:d0:17:ae:88:7e:a2:7e:31:a5: 77:a8:ea:38:c5:c0:1a:cc:00:a3:3f:34:3a:11:fa:37: 86:e3:91:04:02:86:f7:a9:48:eb:7d:c9:83:b8:13:63: 62:82:cc:cb:9b:e0:8b:25:7d:44:ca:90:6f:d2:d7:05: 96:2c:8a:11:89:c9:75:ee:ff:36:a6:15:82:43:51:df: 7c:48:5f:82:56:8b:11:bf:97:1b:e8:11:bc:c0:c5:bd: 75:83:d9:1c:8c:9d:86:ad:e3:b1:fb:ce:85:ee:98:4c: 8e:75:8f:69:57:0e:56:52:e4:44:8b:c9:23:62:c6:e4: d6:e4:29:9b:3c:13:e5:37:70:29:d9:60:d8:ce:4e:79: 7f:c5:ca:1b:56:80:b9:bf:18:24:67:08:87:ff:15:89: a8:16:ea:1a:c3:10:62:10:02:d2:e9:af:2d:67:81:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 73:d5:8c:98:40:d7:54:a3:57:28:6b:58:8b:b3:b0:05: 7e:26:78:48:21:1a:fb:b4:1c:31:74:1e:33:51:58:ed: c0:ee:ff:f4:a3:ad:12:b5:a6:d9:9c:24:82:09:43:73: 96:06:6c:b0:f2:4a:25:cf:2a:61:71:ef:35:36:90:f3: 06:d9:45:b6:0e:09:11:93:d1:6f:37:eb:60:32:5d:f5: 06:b7:43:62:45:6f:5b:36:85:94:43:0d:11:00:d9:dd: bd:d1:87:5d:48:c2:5e:54:59:ef:5c:e2:db:d1:5b:9f: 79:bb:4c:c2:73:21:a8:48:ca:3a:cf:a2:ed:1d:2a:ef: cd:2b:2f:9d:0a:9d:e7:fe:4c:a6:d9:92:b1:92:71:73: b0:a6:ba:c9:15:a9:09:5f:dd:71:01:d4:ae:19:34:eb: ce:58:2e:a5:e6:9c:35:07:9a:f8:5a:f1:f9:35:23:df: 86:20:92:35:2a:9e:7b:84:f1:5e:5b:7b:31:9a:a8:87: 80:36:a7:c4:c8:9d:d4:a5:4d:10:32:33:c9:d4:64:71: 4f:a1:ef:dd:d5:1a:5f:a5:5d:5e:68:31:6d:c5:e2:aa: 9f:62:1e:2c:94:aa:d7:f5:7a:0a:d1:3e:8d:a5:e5:a3: 46:18:bd:87:46:5d:58:86:c3:e5:c7:1e:a8:33:24:c3 Fingerprint (SHA-256): 78:FE:0E:CF:C0:1E:55:43:EA:2B:92:5E:A3:34:F3:F9:0A:91:96:21:64:F3:C0:CB:DB:08:22:83:A5:3B:5D:64 Fingerprint (SHA1): 2A:50:B3:D5:58:D1:61:FC:59:27:8F:62:0C:71:01:21:B8:C6:E3:71 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2851: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145768 (0x49157fe8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Thu Dec 26 15:01:43 2024 Not After : Wed Dec 26 15:01:43 2074 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:c3:2f:be:50:1b:aa:67:64:9c:5d:4a:94:9c:90:e0: 6d:a6:30:c9:7f:f5:9b:be:2b:91:33:d3:c7:26:2e:5b: 75:8f:cd:6c:fe:db:f0:3a:ea:82:1f:c1:91:c8:94:b8: f2:cf:eb:08:78:ad:37:4e:a5:7d:b2:ee:c2:f7:f9:e6: 0d:1e:52:32:8c:a4:d7:25:2a:4b:e5:c5:55:d3:5e:92: b0:a1:82:24:9a:e9:02:67:1f:55:8b:38:cf:c5:1d:0b: b0:96:ac:0e:9f:35:dd:57:cf:39:b7:61:01:7f:99:7f: e2:f5:76:8b:0f:1c:fb:84:bf:b9:20:30:03:66:f9:d4: 7d:24:ed:5a:c2:2b:39:a3:be:3d:4c:b3:97:24:73:c0: 12:5b:9f:32:95:07:a4:20:ae:df:92:9c:0b:b4:6c:bc: 48:5d:af:01:91:ce:d7:d3:41:bd:6a:c1:8d:1f:58:42: 7b:37:bf:5c:95:51:b3:40:ad:48:43:40:15:2c:b6:95: 56:91:e5:c9:30:04:4c:74:26:29:fd:f8:74:5b:f7:e1: a0:b3:67:08:ef:b8:ee:89:5f:89:41:bf:3b:37:d9:24: 74:09:f0:fc:18:d7:ee:11:3e:65:0d:3c:55:ba:67:4a: 50:99:b1:85:0e:b0:42:8e:ed:f6:5f:43:67:3b:18:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ce:da:ba:18:5a:c8:87:a4:dd:a9:7a:ac:ee:86:a1:e8: 5e:54:e2:31:46:34:8c:0f:16:af:8f:59:ff:70:f4:8f: 75:05:d1:f2:1f:e5:2b:08:84:0b:b1:06:b9:7c:74:42: e5:a2:ce:f5:e1:cb:cc:da:b6:83:fa:81:97:f7:24:3c: 0f:c7:9c:18:2f:ad:a6:b8:7b:f0:36:b6:0b:ae:d2:41: 1a:89:3e:c1:44:d9:d7:d0:ba:f5:72:60:f5:14:23:60: 0c:d2:65:f8:b9:6a:1d:6b:6c:7f:be:da:ba:d8:33:48: 7c:3f:66:5a:d8:e3:44:77:b0:5a:e1:2e:89:0a:96:d8: a0:c6:2c:28:e6:b6:86:74:02:f8:99:b5:96:66:06:12: f5:1b:41:de:d9:b7:32:8d:1e:54:7f:5c:3b:b3:44:6f: 94:e4:59:af:98:b8:49:a4:70:41:66:c7:d4:5d:8c:da: 2e:27:e3:eb:19:04:0c:0b:5c:04:d3:ff:14:aa:f0:44: 2a:cd:8c:a9:64:11:43:12:6e:19:31:85:fb:e2:95:36: be:ce:65:d9:5d:b0:b1:bb:94:9b:fe:67:65:e3:bf:ea: 6d:0f:f0:49:2d:1f:a7:b4:66:fd:82:0d:eb:54:07:02: 80:53:ad:40:63:96:84:45:0e:8c:82:56:42:82:39:00 Fingerprint (SHA-256): A9:64:C6:11:6F:6B:23:D6:93:12:E5:9E:A3:85:42:1F:51:A3:9C:53:50:4B:60:75:FB:E7:41:2A:14:33:1F:6E Fingerprint (SHA1): C9:9E:F3:60:56:BC:42:D9:09:61:7D:38:26:4A:2B:5C:CB:96:75:AF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2852: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145769 (0x49157fe9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Thu Dec 26 15:01:43 2024 Not After : Wed Dec 26 15:01:43 2074 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:b7:1c:2a:e4:3d:11:a6:c6:75:40:2a:9a:e0:ee:b3: 4e:20:3e:b0:54:c8:d5:cd:e6:b2:a9:23:4f:c0:a7:54: 61:09:e5:f2:f3:a8:11:a9:c1:e2:c0:6d:80:24:8b:11: 32:9d:85:85:a6:0d:c5:5b:02:a4:30:e6:b2:56:29:6d: a2:cf:f6:6c:05:3d:e2:11:f0:2d:77:9e:84:77:96:9b: 92:d9:a9:e2:84:04:4f:4f:69:3d:7b:de:cd:0d:15:02: 56:95:20:4f:1f:c3:23:8d:47:a9:1f:7e:d9:cb:24:02: 18:1a:b6:0d:ce:dd:b7:ab:f8:11:01:df:63:23:f5:72: 41:24:9e:29:eb:53:96:59:43:93:9c:aa:d9:a2:b6:4b: 31:c7:e5:41:0c:0b:7b:91:2b:40:70:4d:14:94:74:cc: 4c:57:d0:19:82:2d:a5:3e:be:d4:c7:72:b4:05:42:71: 3e:a9:02:b8:12:d5:08:2a:b8:36:a4:02:14:cc:e0:8a: b2:59:b3:de:a2:d3:35:25:8c:bd:28:45:37:da:8b:16: cd:d5:ea:ae:38:1a:58:c4:58:10:ee:d5:3a:9b:90:0e: c1:e3:58:e2:0e:62:40:7a:bb:8a:03:75:fd:c6:be:6d: 45:6b:8b:1b:1d:ba:8a:52:8c:d9:22:c4:98:df:05:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 98:84:6d:44:8e:7f:1c:66:5f:42:6a:b7:7b:2e:74:a1: 93:6c:ac:24:3d:18:3d:cc:05:f2:6f:f6:ae:1a:b9:98: 74:e0:18:ac:dd:45:92:28:14:17:95:6c:e9:b2:8e:b1: 3d:6a:db:d6:7b:20:25:be:8a:6c:fe:fa:1f:f5:0e:7e: ec:fe:cc:94:25:cf:3f:f6:f2:3c:f6:0f:19:b3:0b:9d: 07:e0:e4:16:a9:3d:46:d5:06:99:d4:8d:c7:f5:3c:62: 9e:eb:f9:93:c1:1f:37:9e:a6:19:92:76:6e:24:a9:75: e3:5b:22:80:d7:b7:69:5c:bb:e7:9a:63:26:f6:92:70: 43:ec:05:68:c5:ec:44:47:b6:f0:2b:77:03:ee:27:65: 07:71:8f:64:b0:ef:3f:44:74:2f:b9:01:8a:d0:c8:e9: d2:3b:99:4a:f4:7d:26:df:02:ae:10:73:07:b1:3e:a4: 1c:a0:78:6d:f7:85:a5:a1:1e:c9:d6:7d:14:10:3f:cc: ac:c9:6e:16:ea:a7:b3:c0:21:02:45:87:64:03:00:ed: ff:e2:31:cc:9e:aa:4a:4e:28:30:84:17:bd:c7:e5:ae: d7:55:2b:a6:15:ac:27:a3:98:29:b8:16:8c:e8:11:4b: 05:e9:01:f4:c8:83:13:b3:9a:39:d9:83:0d:2c:9f:59 Fingerprint (SHA-256): 37:B6:94:23:EF:16:D7:D8:9D:BD:7C:6D:7D:F9:1C:60:D3:0A:5A:D7:3F:07:41:7D:07:FB:D3:2F:7D:4E:3A:6D Fingerprint (SHA1): 0E:D7:01:5F:B4:BA:54:89:FD:CC:B9:5D:38:65:82:9D:1D:8D:90:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #2853: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145770 (0x49157fea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Thu Dec 26 15:01:44 2024 Not After : Wed Dec 26 15:01:44 2074 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:dd:04:0e:31:76:0c:1f:66:56:e2:25:59:df:c6:96: 75:83:0f:68:8c:b1:59:df:66:79:c0:1a:99:b0:d0:d2: ad:e0:50:60:f9:15:c3:6e:26:ba:22:b6:3d:d5:8a:39: 4a:bc:f5:8b:08:50:c5:95:6c:4c:90:2d:7d:43:5e:26: 8b:b5:59:4b:e7:88:e9:79:11:f6:6a:22:44:1b:98:cf: 73:ad:54:d0:42:55:64:9b:75:a4:18:5c:6f:3d:db:49: 50:a8:f9:59:64:1a:ac:5b:06:9a:aa:c4:34:63:42:de: 80:d8:ff:27:b1:68:15:8d:31:ed:91:45:c3:9f:30:b0: 65:ab:fe:1e:17:5a:2f:c9:6a:6f:07:70:9f:a5:51:aa: e1:c6:c7:03:e7:62:40:a3:47:61:dd:26:f5:e7:f2:33: b8:2c:b8:41:c9:27:87:6d:7d:a7:00:8d:d4:3d:1b:2e: 8e:75:a4:9f:08:72:b9:1e:7d:c4:bd:61:75:b4:6b:aa: 7d:f2:1f:a0:fe:f6:25:1c:3f:af:37:c3:cb:d6:59:09: 86:c5:b1:4a:85:e5:2c:2d:9e:37:e6:53:c8:3e:14:7d: 7a:0a:0e:7b:11:82:16:ca:d4:32:05:89:a9:a5:2e:28: a5:83:f1:31:1f:fa:2c:03:19:9f:14:16:44:f8:92:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e8:41:ca:fa:be:65:58:77:4a:a0:df:88:cc:89:cc: dc:61:32:02:98:f5:ba:c3:01:52:98:10:20:54:68:57: a4:14:b6:4b:e5:90:58:0d:3d:bd:58:bf:61:e5:1f:9a: 89:fd:ff:20:07:b6:15:32:9e:60:71:23:09:68:fb:51: cf:0d:1f:2f:bf:c7:30:3e:9c:e8:24:a0:93:77:c7:f0: 73:bb:a9:50:a2:d6:37:cd:50:8d:e1:b1:1a:c9:c9:ff: ee:e5:01:95:60:dc:b1:22:43:0f:bf:42:2f:f5:0f:4b: 17:f7:c2:85:b2:32:47:2b:46:2e:26:96:36:74:e0:de: ae:8b:da:0f:7f:e4:15:36:e5:9a:69:67:e2:08:3e:15: 37:61:89:1a:4e:01:c2:e7:41:a7:72:c2:ff:04:31:3d: 2f:07:39:e9:b6:f1:49:c3:18:9e:41:b4:09:47:69:94: 29:08:45:77:f1:c7:c0:05:1a:40:a2:5b:b4:25:98:5d: 5e:61:3b:7c:a7:21:e7:8a:95:67:7b:81:1a:b7:c2:5c: 78:b8:2b:8d:ba:de:cc:53:e5:88:11:45:3a:09:66:8c: b5:53:6e:a6:6f:12:c2:45:91:b8:e9:57:6e:d4:bc:61: b3:f9:a9:de:f7:4e:6f:5e:fa:ba:45:a2:c2:08:bd:46 Fingerprint (SHA-256): D2:14:B1:3C:1E:B9:ED:42:7E:C2:20:68:66:55:21:22:F4:FF:73:E0:9C:56:EA:C7:CB:1E:85:76:67:41:31:E8 Fingerprint (SHA1): F1:2E:5D:6C:21:C0:ED:82:62:F8:D5:A8:73:5B:47:AD:0F:3E:95:2A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2854: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145771 (0x49157feb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Thu Dec 26 15:01:45 2024 Not After : Wed Dec 26 15:01:45 2074 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:2e:db:f4:0c:6a:65:b6:7f:cb:e3:2b:e5:e9:90:8c: d8:5d:00:2f:b9:f5:71:eb:57:07:c5:fe:94:83:74:b8: 23:b9:35:4f:ef:b4:a1:c2:78:09:86:41:6e:b9:b0:a7: e5:84:0b:bd:6c:93:3b:28:0a:c5:8d:73:45:77:dd:72: 5a:b0:b8:31:7f:9f:32:83:ff:25:a8:7e:0f:97:87:02: fb:02:cf:52:8f:2b:a8:f0:28:5d:05:b6:1d:70:75:14: c6:9d:11:5e:99:ec:6f:05:79:31:eb:0d:ec:25:d3:1f: e9:c6:99:b4:b8:2d:ad:6c:b2:80:76:fd:5b:db:85:e0: 21:02:ec:33:03:fa:00:e6:ec:82:f9:13:cc:80:43:66: b6:a2:e1:6e:b6:ed:28:7b:bb:0a:26:20:39:87:07:e8: cb:11:d0:31:52:46:4f:00:95:41:7c:13:87:9e:07:fa: 86:73:a2:82:45:81:64:3b:d4:f7:e8:a1:64:e5:e6:6e: 70:14:69:3d:5a:30:b7:0c:0d:b0:c6:0b:9d:a5:33:14: 4e:5c:bc:b7:9a:d7:a7:7d:ed:6b:11:b2:c1:e7:d9:85: f2:e7:37:5d:fc:9f:e5:75:80:08:44:0e:15:a5:5b:3c: 0f:ab:cc:9e:c4:84:61:6a:85:58:75:7b:ab:b2:9f:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a4:66:b4:80:0e:ec:47:23:8c:11:4b:20:dd:20:c9:55: b5:40:88:22:88:f8:c3:a7:ca:5e:48:ab:28:a2:64:e8: b7:b5:16:0f:c1:5f:7e:9c:d3:e6:1e:dc:db:28:ca:68: a2:1d:2f:71:32:ae:37:05:2e:94:4d:1f:ab:a6:a7:c0: 71:ff:ac:5d:f8:42:fa:d7:ff:36:36:43:f2:b3:e1:15: d2:49:52:60:a9:e2:fc:63:76:29:bc:97:44:9d:46:41: 2d:22:71:54:ea:be:32:7c:0b:8f:36:d5:69:16:07:85: 8a:50:09:27:ec:56:e4:49:2f:bc:92:39:0d:91:5e:c6: e0:6a:63:ac:17:fc:bc:d1:f5:b8:84:29:a6:0c:80:6c: db:6a:5c:95:df:ea:3f:e7:3d:a2:09:0b:93:68:fa:65: 9e:b4:14:28:1a:38:b5:f5:a9:4b:23:30:e0:33:dd:b1: 3a:2c:da:a4:43:92:be:45:1a:6a:f2:c1:e0:ad:96:7b: 26:02:52:8b:5b:1a:7f:33:a1:a2:fd:36:34:ae:82:ba: bf:ae:f6:65:46:88:2c:83:c2:48:3c:1d:64:72:8c:8a: 4a:e7:0a:a7:2e:62:92:ea:41:50:2b:5c:4b:19:e7:95: cb:86:1b:32:37:6b:02:99:9e:8e:d3:1c:72:4d:d1:99 Fingerprint (SHA-256): 8F:C8:87:0F:DA:84:07:40:E6:FC:29:6D:B2:0D:60:00:62:12:E0:4B:D6:2C:C5:2F:2E:EB:0B:FF:78:CB:C8:87 Fingerprint (SHA1): 41:84:07:00:AE:43:8D:F9:FD:DC:35:2C:16:78:1D:67:6B:71:6E:3B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2855: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145772 (0x49157fec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Thu Dec 26 15:01:45 2024 Not After : Wed Dec 26 15:01:45 2074 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:a9:77:c1:06:07:5e:b9:5a:ed:f5:0e:e7:46:d4:6b: ed:eb:15:a7:0a:22:2a:18:c0:eb:33:10:fa:65:a9:91: a4:9b:3e:b6:c9:fa:22:0e:bb:6b:dc:6f:6e:10:77:90: 19:79:89:14:ee:28:2f:7f:5b:cc:07:e0:5b:d0:48:21: 36:2c:6c:2e:be:51:58:7d:a3:f6:32:5b:3b:c9:0b:0c: 5e:92:61:82:9c:e9:0a:72:76:9f:f4:f5:f9:49:ac:06: f1:15:5e:ab:ba:f3:95:ad:4c:b8:dd:23:9b:8a:f3:a9: e6:14:32:c8:91:f0:53:ac:08:a0:82:39:e7:12:ea:ad: e4:dc:c7:4f:ad:4c:db:92:a3:04:20:6b:c1:e9:0b:8d: 6a:9f:0e:54:be:36:f2:89:e7:0d:84:2f:8b:ea:c2:e5: a9:9b:68:19:57:f6:6e:fc:66:f2:2e:ce:e6:71:f4:1c: 17:08:06:c4:cc:e9:0d:85:1d:0a:47:ea:96:8b:03:7c: 48:22:50:bc:cb:12:dd:31:40:b7:ec:12:1b:a6:b0:f6: d4:71:cb:9d:ad:6a:e0:e7:12:12:9e:3d:48:20:2a:ac: 2f:91:de:de:72:1b:f0:5f:6d:a1:e7:06:b2:4d:07:9f: 77:52:fc:6c:87:1c:25:18:6a:3b:67:47:91:27:ef:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:e0:50:c4:43:65:bc:14:08:1f:b6:08:4f:f5:86:43: a6:fc:ce:3b:a6:fd:33:e3:6e:1f:4e:2d:4b:36:cf:6c: 67:d5:94:0b:d6:c5:08:81:bc:02:45:05:df:65:d4:9c: d4:ee:fa:da:54:9d:69:83:1d:07:c5:61:de:d8:6d:38: 86:37:f3:4d:67:cf:ef:b4:a1:43:35:cc:ca:e3:9d:f1: 74:ae:a4:a1:95:d5:5e:1e:af:c3:41:2c:f9:97:21:24: b7:07:75:d1:8e:47:0f:46:67:a8:41:d3:bb:b4:2b:91: a0:c6:99:d7:70:9c:14:37:48:49:e9:37:be:bd:59:ea: bf:3b:7e:10:c7:5e:bb:14:69:40:6d:b1:b3:6e:88:82: 14:58:58:96:1e:37:97:2a:9e:15:59:f0:12:7d:e4:d9: b2:e8:65:a1:9d:34:ec:b3:7d:0d:c4:e6:67:20:99:db: 22:b8:d5:21:fc:0b:ed:4d:d0:0b:cd:3d:87:f3:4d:75: ae:5c:7c:b8:a8:7d:2b:28:4a:72:7f:05:4c:2d:82:e4: a9:82:28:81:7d:a7:02:c9:49:f3:2a:76:5f:67:1a:9f: e6:23:9c:fb:ee:8c:97:4d:ff:3a:34:0c:6b:74:3c:2a: bf:01:ef:30:ca:f1:99:1a:53:dc:d2:8b:28:44:22:7e Fingerprint (SHA-256): C7:FF:B2:55:FE:7F:C8:DB:45:FC:AE:B6:28:65:B2:87:5D:39:D3:55:E3:6B:58:69:45:37:D9:1B:05:5B:D7:0C Fingerprint (SHA1): 46:71:0F:37:62:C1:53:10:FE:2B:B2:CF:02:7F:CD:12:06:CE:1C:FE Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #2856: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145773 (0x49157fed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Thu Dec 26 15:01:46 2024 Not After : Wed Dec 26 15:01:46 2074 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:a2:07:ba:9c:68:37:ed:e8:98:22:42:59:05:76:e4: d0:c5:5b:55:84:22:85:a9:d2:5f:62:2d:12:12:ec:56: 3b:3f:94:dd:05:2e:1e:18:3f:43:96:26:95:c0:da:8c: d0:bb:dc:bd:bf:b4:f1:70:9e:2b:55:a6:74:0a:5b:84: ce:0a:28:c6:c5:73:9f:9b:0b:dc:d6:78:c2:30:a1:da: 7a:d7:7e:4f:87:6b:87:eb:64:9a:e7:44:ab:c9:ed:39: d4:a9:67:a0:bd:53:2c:bf:e5:9a:9e:1d:be:60:f6:00: 84:69:39:87:05:62:3d:8d:f4:31:4e:50:fa:05:93:29: 42:35:f9:71:64:af:e1:df:52:5a:8b:c2:28:d7:be:cb: c9:e7:f3:3b:50:04:f6:51:58:c8:a8:0c:90:e9:d9:a2: 95:68:d5:96:14:54:22:4a:8a:e0:cf:c4:17:b9:b0:ec: 6b:26:1b:57:21:73:f3:b2:2a:d6:de:cb:0c:e1:70:b5: b1:d0:b5:d8:0e:22:b7:89:4e:69:89:a9:73:dd:99:a1: 1c:da:ef:7c:b1:19:92:c5:c3:c1:4e:69:0b:c9:bb:29: 0e:ca:b7:8b:e7:83:59:fc:84:9b:45:3f:a9:a7:fa:8b: db:70:28:81:cf:10:f1:67:fc:6e:a3:d4:17:12:6e:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:29:ed:4c:21:86:e7:14:ab:00:9a:e3:7f:d1:cf:5b: 99:27:c6:7b:d8:49:75:78:a0:92:54:7b:da:68:66:1b: 76:6e:33:a2:18:37:42:b2:04:77:8d:c3:1c:2a:87:03: 25:5b:52:aa:b5:6d:a6:b5:5c:4d:09:1b:04:28:5e:82: 27:47:be:ce:60:00:7c:61:44:ed:07:4c:dc:a9:ad:c3: 19:42:0c:dc:c9:b3:0a:29:43:bf:62:fb:a7:dd:99:59: 5e:07:63:10:90:12:84:a6:73:32:de:a2:d8:3e:4c:ee: 53:39:63:90:b6:b3:f5:b9:79:f0:17:82:0b:84:13:26: 3a:6d:df:65:cd:4b:21:12:db:9f:9f:e0:f2:02:40:1d: b2:d5:d4:3e:3d:a8:9c:df:cb:7b:b8:22:ef:74:9c:4c: b9:f9:3e:73:b6:42:8c:a1:cd:31:0a:e6:39:ad:c7:f3: 7c:d3:84:c9:d5:6e:9c:84:1d:73:70:7d:17:25:29:da: e5:a1:53:46:2d:d3:e8:5b:4e:00:ea:6e:cb:e5:8f:28: 90:c4:47:9f:29:32:2a:17:8a:86:7d:a8:db:f8:b3:7e: 82:f7:ca:5c:40:90:c2:af:a4:72:a8:02:28:5e:cd:51: 35:af:fd:54:ab:04:90:6c:4c:01:4b:e6:f3:24:ec:4e Fingerprint (SHA-256): 8A:12:BB:AA:AE:C0:CC:2D:DA:89:E2:1E:80:6C:3B:92:22:48:D9:19:24:94:FF:D4:89:C5:4A:F4:B5:E4:A3:D0 Fingerprint (SHA1): 26:07:42:8C:78:D2:9A:9C:B0:FD:9F:AB:A3:9E:26:78:FB:FB:B4:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2857: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145774 (0x49157fee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Thu Dec 26 15:01:47 2024 Not After : Wed Dec 26 15:01:47 2074 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 99:fd:60:d8:01:f8:f0:29:a6:bc:98:89:a0:d4:ab:2b: aa:01:ce:77:8a:39:2e:09:f6:3d:8d:73:fe:98:99:1a: 39:bd:a2:86:c8:f2:74:18:0e:d6:49:a0:10:f5:f1:34: 3d:41:d4:08:ed:60:c2:a4:6d:f5:52:a5:96:7b:48:d2: 56:b0:29:b3:20:52:d5:66:24:c8:c5:65:88:63:a3:ef: 52:41:f7:45:0b:0f:6c:41:67:77:ba:e4:36:11:c5:7e: 51:78:2c:bc:07:ee:5a:df:f0:25:08:93:65:d5:56:db: fd:09:68:e7:7c:ba:34:d3:3d:31:2a:3a:34:f3:0e:94: 2f:7d:6d:56:bb:42:19:bc:1f:48:3c:80:e8:f8:d9:a6: a7:5d:76:55:6e:bf:c5:1c:84:33:55:15:69:16:fc:98: 71:24:a5:b4:78:36:84:ed:46:5a:59:5c:29:00:06:fc: e9:60:25:54:81:91:1a:cd:e5:da:2b:40:2e:62:df:23: ef:9a:cf:1c:ef:2f:ba:4c:7b:e9:f6:c5:c3:d4:f8:23: 9f:3b:22:42:08:ce:ba:59:87:bd:b1:b7:ab:d2:6e:f2: e7:71:64:ae:16:cc:bd:9f:03:de:d6:05:a8:f3:27:a1: de:61:31:b5:49:00:6f:c0:d8:92:f6:8a:7f:5a:80:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:f4:42:41:41:c4:e4:eb:7f:55:50:a4:8a:c4:dd:cc: d7:2c:3c:62:23:5c:90:d6:8d:1c:dd:bd:0f:10:48:47: bc:76:f2:40:63:c7:75:79:61:df:66:a8:6b:17:63:92: 9c:72:9d:24:5c:2b:4c:97:90:88:1d:72:3b:ca:4f:b1: b8:ec:24:8f:37:e8:38:33:b3:9f:06:90:a6:36:cb:70: 28:4d:7a:a2:02:91:85:68:70:68:ef:7b:a6:70:48:d9: 0f:2f:92:38:13:65:8b:10:e0:08:f1:c8:0a:a8:12:08: 6f:a0:49:64:7e:16:5e:d9:94:a8:d0:13:bf:eb:4d:21: 8d:47:61:34:87:b0:8c:14:20:76:fa:fa:a9:1a:72:93: bc:1e:c0:fc:2b:d1:d9:40:77:45:7d:41:03:49:c6:89: a9:59:13:3c:42:4d:ae:de:d5:8e:b7:3e:dd:a8:fc:13: ec:b6:bd:61:04:22:ef:43:d5:7e:c9:9a:fb:42:b3:de: d4:d8:46:79:01:45:5f:a5:0e:27:75:34:f8:6a:8f:06: 54:71:3b:21:6a:06:1f:c5:06:11:15:19:fd:8d:00:e5: e4:7c:8c:c2:c2:e7:e7:85:0c:3d:de:6e:ea:33:49:7a: 0d:c4:33:a6:0c:02:50:f5:2b:a0:e0:ba:26:ad:7f:df Fingerprint (SHA-256): 6C:EA:BF:CC:9A:3C:9A:B4:FD:46:B4:A3:50:74:3F:76:CD:B0:D0:40:5E:D4:59:87:84:CC:9F:52:46:E6:70:59 Fingerprint (SHA1): 73:E5:FD:B8:02:A2:26:B2:12:1C:AE:65:A7:8F:98:55:3F:D3:02:F6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2858: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145775 (0x49157fef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Thu Dec 26 15:01:48 2024 Not After : Wed Dec 26 15:01:48 2074 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:c1:1d:15:0d:2a:b7:48:9f:f7:0e:f7:05:fe:47:6d: 1e:f6:f5:c8:81:e7:96:fc:c3:0f:ad:1b:ae:ce:58:91: 00:b1:fe:05:9e:8e:27:f3:d9:aa:b6:91:4c:e2:d0:e8: 9b:91:0b:86:49:dd:58:84:42:05:03:95:2a:11:1b:90: c8:56:f1:22:61:ec:31:12:4a:6e:50:2c:8d:01:c0:f3: 1d:d3:72:11:5a:92:52:49:a3:e1:35:37:48:e0:4e:6e: 4e:cc:6a:d5:98:3a:5b:45:b4:ce:bd:31:48:16:09:1a: 6a:46:9a:7a:d2:f2:ee:76:c8:f2:60:0b:a8:60:a5:21: cc:73:45:ad:56:f6:0b:9e:af:35:6d:1a:1b:fd:42:07: 52:31:d6:61:ed:e1:84:33:5b:eb:7a:83:48:66:cb:77: 38:61:01:dd:5e:cd:b4:ec:31:44:57:35:d1:d7:2c:fd: f9:06:65:de:de:af:de:54:31:7f:77:c7:0b:1b:ec:50: a7:f6:dc:ca:3b:e0:a9:89:fc:76:48:04:e0:f0:6f:6b: d7:70:02:3a:fe:dd:94:2f:b9:d9:20:a1:40:0c:45:d7: 1b:3a:04:c6:a8:d6:3a:32:20:21:6e:f9:80:61:42:e0: 03:68:06:a0:b9:eb:c5:1e:42:08:a0:0f:d0:58:4d:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:a3:76:4a:95:64:4f:c7:4a:8a:6a:31:b6:ac:1b:7d: 5e:88:96:7e:aa:80:8e:9c:90:0a:e5:bc:07:80:ae:dd: 4e:25:b4:9d:04:cc:05:d3:74:9e:21:c7:88:08:e1:67: fe:b3:29:d7:9b:54:dc:09:8b:8d:63:ac:29:b9:3c:a9: fb:6b:36:05:63:42:81:35:62:8c:35:b7:5c:15:c6:eb: ff:31:41:88:89:44:79:69:75:be:e9:51:cf:8f:bb:f5: fb:20:89:ad:a1:40:bf:4a:82:87:ce:cc:9b:6e:f1:d3: 13:b0:a9:5b:f1:d5:bd:81:e0:e7:6e:d6:45:e5:e7:46: 19:27:fa:f2:c4:da:e8:b0:c0:a3:4c:8e:e8:8d:9e:c6: c4:0d:d0:61:7e:bf:38:57:c6:4e:2f:ea:48:5f:59:dd: 51:ae:f3:df:97:41:03:09:3c:b8:05:e3:8f:e4:ff:50: 49:fc:1c:9f:17:e8:58:56:94:b8:96:e2:6e:ad:0f:a4: ca:bd:07:50:64:f8:14:85:0b:ae:f6:d9:2a:1e:64:ad: e5:54:0a:18:cd:e3:a1:45:71:a9:6c:63:6b:2a:70:7c: 7d:ed:7b:24:ce:01:aa:90:19:0a:0d:a5:04:0e:a2:f2: 41:e9:a6:8d:dd:06:c8:54:cb:40:72:86:86:eb:ff:37 Fingerprint (SHA-256): AD:6F:03:F2:CE:E7:75:69:B4:07:C6:00:3C:BC:36:DC:A8:C1:29:6D:47:7D:5D:F6:9E:B2:30:1B:97:21:EF:D6 Fingerprint (SHA1): 8D:9A:38:0C:D3:A8:60:91:34:D1:C4:F2:DD:70:C9:04:C3:0E:C1:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #2859: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2860: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145790 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2861: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2862: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2863: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2864: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145791 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2865: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2866: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2867: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2868: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145792 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2869: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2870: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #2871: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2872: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145793 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2873: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2874: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2875: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145790 (0x49157ffe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:56 2024 Not After : Wed Dec 26 15:01:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:db:f5:c2:f2:cb:d0:1c:f4:a5:95:8a:e7:98:8a:0d: ac:90:7c:58:31:10:2f:10:67:bb:0c:ee:6a:0d:83:3a: cc:20:a4:78:6b:43:9a:d2:9a:f8:46:d2:3b:40:39:61: 7a:52:d8:0a:b0:e0:6e:d8:8a:98:ac:5c:6d:b3:76:1a: a2:a6:22:5b:01:c2:2b:7f:9d:51:0a:ed:3e:7f:1d:05: 58:7e:06:37:af:ac:11:ad:7e:f0:c4:88:cd:8f:5e:1a: bb:06:98:6a:13:00:67:d6:bd:6f:2c:36:0f:81:11:de: 6f:f6:58:b3:92:91:4c:50:98:ae:19:b0:d4:01:db:95: 22:79:c6:49:c8:c4:dd:95:ec:a1:f3:f6:29:ab:40:4a: 21:39:60:c8:a7:14:21:e1:b1:55:62:c3:39:03:54:2b: 58:e0:e5:e1:b3:82:20:a5:75:7b:91:38:b8:4f:35:7c: 06:23:89:17:62:7f:16:2a:e8:ef:d9:eb:be:8c:a9:5d: 19:07:02:e6:3b:5b:0c:fd:5c:f6:2d:97:91:82:09:38: df:e5:1c:eb:bd:3b:6e:0c:9d:36:ee:91:38:af:92:48: 80:d0:a1:4e:58:3a:7a:51:b5:ad:63:0d:55:fc:65:43: 52:1a:53:80:78:cc:1b:85:ed:7a:71:75:0d:f1:17:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:c0:da:2c:75:c5:55:de:36:05:db:bc:0b:14:ee:03: 74:c0:da:f1:80:0c:e9:7f:14:28:fd:e2:a1:d1:ff:c1: a2:c7:6b:1b:89:a1:8e:8f:c7:a4:c8:d0:91:02:0e:ae: 41:7b:af:59:26:99:1a:75:db:5c:30:05:06:9b:52:13: 8e:c5:60:22:82:20:09:5a:35:70:c0:06:d3:db:66:14: f1:1e:ab:fb:64:00:d2:f0:e4:4e:1f:9c:26:d1:01:08: 9d:85:5a:83:04:bf:c4:ec:4e:87:d0:3d:ab:c0:3e:cd: 1f:67:a9:67:9f:0b:da:4b:0b:3d:f1:1f:e6:89:c8:50: 2f:90:f7:e6:12:96:10:7b:24:ed:1f:37:8f:5a:cf:99: 50:a3:89:07:fc:ec:00:1a:0d:9e:f2:27:99:3d:88:d1: 20:45:d8:de:3f:d3:28:38:c8:74:75:c5:b3:8b:cd:c7: a2:ea:79:c8:12:e7:c1:9c:66:8b:42:52:33:63:66:96: d4:5c:ef:ac:4f:17:b3:28:b8:22:13:2e:95:33:c3:18: 8f:1d:78:84:a2:b5:b3:32:13:d4:45:b5:df:37:c6:2e: 4f:af:5a:78:f7:e8:76:99:f6:1d:88:1a:92:13:57:97: 36:ff:bb:fc:3f:be:ba:82:07:81:a7:38:19:30:32:9b Fingerprint (SHA-256): 4C:E0:86:53:34:9F:98:88:86:13:60:7B:8F:6D:67:5F:6B:69:56:9F:B0:0F:53:EB:19:D0:24:E4:AE:9D:39:1F Fingerprint (SHA1): 25:67:3C:A7:5E:26:95:F5:5A:3C:8F:F6:A6:E6:38:63:95:F2:B8:41 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2876: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2877: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145791 (0x49157fff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:57 2024 Not After : Wed Dec 26 15:01:57 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:71:75:27:81:97:08:a1:c8:ec:5b:1d:c3:8a:25:51: 1f:62:f3:97:18:15:b0:ff:52:f2:e0:ae:31:7c:47:dd: 60:84:a6:2c:15:37:68:0c:81:f0:90:c2:5e:f0:84:59: 51:12:38:ca:3e:20:44:a1:e4:e9:bb:24:cb:42:79:4e: 81:21:71:7f:b2:3c:92:98:69:ba:79:58:ed:59:f0:8f: a4:df:f9:ec:d2:22:28:94:6a:a2:07:61:28:fe:51:24: db:b6:a1:cf:ec:88:ec:61:4f:1b:e5:3f:ac:d1:77:17: 2e:df:3f:42:8d:bf:8d:3e:9b:54:27:ca:ef:7e:8c:5a: 8b:0d:cd:3a:48:c0:1b:44:03:75:3c:65:1b:1a:23:db: 28:ef:62:0f:00:0b:fa:1f:72:63:c3:43:4c:41:91:80: 81:42:0a:43:c4:f5:2b:24:b8:b0:a6:ae:bf:a9:35:a9: 1e:d0:c5:68:2e:a3:d6:c5:c5:e1:85:f5:5c:c7:28:1b: 33:fa:49:24:44:f8:84:38:f3:55:7e:d3:e3:4c:b3:5a: d2:d5:9a:ca:d0:12:95:e9:48:59:b7:cd:5c:8b:25:92: 65:ac:74:cb:dd:7c:4a:a3:ad:81:6b:0f:be:34:1b:c0: af:c5:14:19:a3:96:95:6f:1c:df:22:a6:76:03:6d:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:54:73:11:37:df:c5:ac:94:be:36:e0:63:84:ca:47: d9:d3:98:af:0d:65:f2:28:82:ee:0c:da:a0:11:9f:5d: a0:57:0d:f4:a1:9f:f7:4b:8d:40:b3:4f:40:82:fe:e6: b8:07:e4:ac:35:5a:d2:0c:80:e0:e0:af:f4:6a:2e:a1: f7:69:f6:7d:69:a9:92:2f:11:0e:d6:7e:d3:fd:b7:12: c6:de:f2:e6:ad:9a:4e:fe:1e:c9:b4:5c:bc:c9:97:e6: b3:ea:dc:fb:75:a2:28:c6:83:ba:38:c1:46:dc:b8:45: 3f:dc:fb:a2:72:4c:8a:88:81:cb:e5:31:b2:26:bc:47: e6:cf:93:62:82:7a:62:9c:b7:bc:98:e5:62:0c:4b:a5: dd:23:9b:f9:dc:c1:99:6e:f1:7d:00:5b:58:38:11:54: 3a:6c:4b:91:dc:06:5b:ce:24:d4:4c:b6:12:af:4e:06: b2:dd:4d:73:70:44:9e:ed:86:d6:c1:34:a5:9e:f2:d1: 46:1f:c6:89:79:a9:71:fd:05:b0:2a:a9:89:1b:97:a8: 2a:cc:1d:9f:14:b6:6f:2b:59:6b:d5:38:8d:04:29:ba: cb:54:63:e8:f3:2f:f1:01:c7:12:b2:bb:84:20:c1:0d: bf:05:ae:1f:b6:2b:9f:71:74:aa:e6:c5:59:25:6e:bc Fingerprint (SHA-256): 2B:68:8B:F6:2A:09:A5:F9:65:79:F9:2A:78:9F:00:73:BE:11:A4:29:6C:8D:D7:F7:C0:A9:F9:6F:F5:7B:98:5D Fingerprint (SHA1): 0B:C3:01:EB:02:CB:D7:20:71:47:63:64:70:C8:3F:2F:F1:24:38:A9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2878: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2879: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145792 (0x49158000) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:01:58 2024 Not After : Wed Dec 26 15:01:58 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:5e:73:55:32:67:90:17:13:1a:99:ce:8d:c5:66:c3: 79:bf:24:c8:c3:73:d8:80:56:8f:45:01:a5:56:ce:2a: 50:14:5b:12:bc:6c:e1:69:a4:95:5d:f9:f4:12:0a:47: 86:7d:f0:c0:13:cd:31:32:16:e2:9b:f4:7f:5c:81:a2: 6a:3e:ce:85:8e:cb:e4:6b:98:a0:81:8c:73:72:ad:85: 15:1a:83:58:43:f7:76:d1:e2:1b:0c:7a:bb:c0:86:7c: 1e:f4:7c:ab:a9:b0:f5:df:96:d8:8e:25:06:9a:17:bd: f4:db:f1:e8:ac:32:36:28:f7:57:29:26:a6:d3:fc:f9: bd:d6:2a:00:dd:a1:55:98:07:b4:01:03:29:06:5a:85: c4:e0:91:8a:64:c6:c7:d2:03:b9:b2:f5:45:1e:10:28: 1d:0f:c7:0a:65:c6:be:6c:36:40:d4:fa:1f:65:79:b1: ff:9a:3a:7b:d8:cc:e5:b8:33:2b:09:95:b1:25:47:db: de:85:c3:f9:1c:d5:cd:d1:e8:88:5d:6d:57:ac:b7:35: 2f:fb:65:ed:6b:5c:5c:8b:5d:32:00:86:0b:e0:84:e0: 2b:cf:19:dd:90:1b:26:dd:97:91:9a:8a:04:be:5e:00: 77:c1:0d:0b:86:3e:40:57:98:15:4e:ee:11:5f:cd:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:9f:67:e3:5e:00:b9:66:6e:fc:f5:26:49:1e:a2:14: 0d:44:e5:60:9a:f5:c6:06:d8:7d:b3:1a:6e:fb:59:a9: bd:0b:97:72:c6:9a:53:6e:4a:f6:06:b2:15:6e:fe:db: 2a:00:f9:ee:ee:fb:4b:9d:82:bc:b6:c3:75:b2:7a:28: 98:e2:4e:42:47:aa:82:48:3f:20:a6:60:21:27:db:b2: 88:57:bd:9f:b5:f2:55:18:d2:1d:aa:88:4f:23:08:33: 1e:15:2e:d1:3c:52:e0:2d:4c:f6:f6:d5:e5:e5:b3:0a: 4d:b6:da:3f:32:71:6b:99:f3:9f:a1:fa:eb:dd:b6:cd: 38:d1:51:35:21:5f:df:7d:8a:4c:e5:83:6e:25:a8:bf: ca:78:96:4d:a7:d9:5c:76:40:de:4c:20:84:15:53:11: ee:be:d1:f1:c0:1f:16:53:49:3a:8b:bf:49:2c:46:e9: 2a:da:36:f0:91:d6:7e:2e:a2:03:34:45:0a:62:20:28: 60:5f:f3:e2:82:05:cc:3c:f2:12:62:96:6f:d4:8a:d4: de:d1:92:07:1d:af:e2:e9:f3:a9:14:d0:10:6f:fd:2b: 5a:87:c6:ce:79:6c:c0:70:f2:bd:f9:8d:16:7d:a2:37: 31:8e:b8:cd:4f:e0:0d:34:81:28:eb:f8:1e:ca:ac:b0 Fingerprint (SHA-256): 05:C9:42:D6:E2:91:8C:5D:69:89:59:BD:87:B7:67:4A:D4:99:2E:BB:F6:2F:A4:51:1A:B1:0B:E3:63:37:38:49 Fingerprint (SHA1): 7E:72:5B:19:FF:67:2A:C0:AC:06:B2:F8:20:8D:64:DC:AC:30:E9:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2880: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2881: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2882: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2883: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2884: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145790 (0x49157ffe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:56 2024 Not After : Wed Dec 26 15:01:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:db:f5:c2:f2:cb:d0:1c:f4:a5:95:8a:e7:98:8a:0d: ac:90:7c:58:31:10:2f:10:67:bb:0c:ee:6a:0d:83:3a: cc:20:a4:78:6b:43:9a:d2:9a:f8:46:d2:3b:40:39:61: 7a:52:d8:0a:b0:e0:6e:d8:8a:98:ac:5c:6d:b3:76:1a: a2:a6:22:5b:01:c2:2b:7f:9d:51:0a:ed:3e:7f:1d:05: 58:7e:06:37:af:ac:11:ad:7e:f0:c4:88:cd:8f:5e:1a: bb:06:98:6a:13:00:67:d6:bd:6f:2c:36:0f:81:11:de: 6f:f6:58:b3:92:91:4c:50:98:ae:19:b0:d4:01:db:95: 22:79:c6:49:c8:c4:dd:95:ec:a1:f3:f6:29:ab:40:4a: 21:39:60:c8:a7:14:21:e1:b1:55:62:c3:39:03:54:2b: 58:e0:e5:e1:b3:82:20:a5:75:7b:91:38:b8:4f:35:7c: 06:23:89:17:62:7f:16:2a:e8:ef:d9:eb:be:8c:a9:5d: 19:07:02:e6:3b:5b:0c:fd:5c:f6:2d:97:91:82:09:38: df:e5:1c:eb:bd:3b:6e:0c:9d:36:ee:91:38:af:92:48: 80:d0:a1:4e:58:3a:7a:51:b5:ad:63:0d:55:fc:65:43: 52:1a:53:80:78:cc:1b:85:ed:7a:71:75:0d:f1:17:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:c0:da:2c:75:c5:55:de:36:05:db:bc:0b:14:ee:03: 74:c0:da:f1:80:0c:e9:7f:14:28:fd:e2:a1:d1:ff:c1: a2:c7:6b:1b:89:a1:8e:8f:c7:a4:c8:d0:91:02:0e:ae: 41:7b:af:59:26:99:1a:75:db:5c:30:05:06:9b:52:13: 8e:c5:60:22:82:20:09:5a:35:70:c0:06:d3:db:66:14: f1:1e:ab:fb:64:00:d2:f0:e4:4e:1f:9c:26:d1:01:08: 9d:85:5a:83:04:bf:c4:ec:4e:87:d0:3d:ab:c0:3e:cd: 1f:67:a9:67:9f:0b:da:4b:0b:3d:f1:1f:e6:89:c8:50: 2f:90:f7:e6:12:96:10:7b:24:ed:1f:37:8f:5a:cf:99: 50:a3:89:07:fc:ec:00:1a:0d:9e:f2:27:99:3d:88:d1: 20:45:d8:de:3f:d3:28:38:c8:74:75:c5:b3:8b:cd:c7: a2:ea:79:c8:12:e7:c1:9c:66:8b:42:52:33:63:66:96: d4:5c:ef:ac:4f:17:b3:28:b8:22:13:2e:95:33:c3:18: 8f:1d:78:84:a2:b5:b3:32:13:d4:45:b5:df:37:c6:2e: 4f:af:5a:78:f7:e8:76:99:f6:1d:88:1a:92:13:57:97: 36:ff:bb:fc:3f:be:ba:82:07:81:a7:38:19:30:32:9b Fingerprint (SHA-256): 4C:E0:86:53:34:9F:98:88:86:13:60:7B:8F:6D:67:5F:6B:69:56:9F:B0:0F:53:EB:19:D0:24:E4:AE:9D:39:1F Fingerprint (SHA1): 25:67:3C:A7:5E:26:95:F5:5A:3C:8F:F6:A6:E6:38:63:95:F2:B8:41 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2885: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2886: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145791 (0x49157fff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:01:57 2024 Not After : Wed Dec 26 15:01:57 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:71:75:27:81:97:08:a1:c8:ec:5b:1d:c3:8a:25:51: 1f:62:f3:97:18:15:b0:ff:52:f2:e0:ae:31:7c:47:dd: 60:84:a6:2c:15:37:68:0c:81:f0:90:c2:5e:f0:84:59: 51:12:38:ca:3e:20:44:a1:e4:e9:bb:24:cb:42:79:4e: 81:21:71:7f:b2:3c:92:98:69:ba:79:58:ed:59:f0:8f: a4:df:f9:ec:d2:22:28:94:6a:a2:07:61:28:fe:51:24: db:b6:a1:cf:ec:88:ec:61:4f:1b:e5:3f:ac:d1:77:17: 2e:df:3f:42:8d:bf:8d:3e:9b:54:27:ca:ef:7e:8c:5a: 8b:0d:cd:3a:48:c0:1b:44:03:75:3c:65:1b:1a:23:db: 28:ef:62:0f:00:0b:fa:1f:72:63:c3:43:4c:41:91:80: 81:42:0a:43:c4:f5:2b:24:b8:b0:a6:ae:bf:a9:35:a9: 1e:d0:c5:68:2e:a3:d6:c5:c5:e1:85:f5:5c:c7:28:1b: 33:fa:49:24:44:f8:84:38:f3:55:7e:d3:e3:4c:b3:5a: d2:d5:9a:ca:d0:12:95:e9:48:59:b7:cd:5c:8b:25:92: 65:ac:74:cb:dd:7c:4a:a3:ad:81:6b:0f:be:34:1b:c0: af:c5:14:19:a3:96:95:6f:1c:df:22:a6:76:03:6d:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:54:73:11:37:df:c5:ac:94:be:36:e0:63:84:ca:47: d9:d3:98:af:0d:65:f2:28:82:ee:0c:da:a0:11:9f:5d: a0:57:0d:f4:a1:9f:f7:4b:8d:40:b3:4f:40:82:fe:e6: b8:07:e4:ac:35:5a:d2:0c:80:e0:e0:af:f4:6a:2e:a1: f7:69:f6:7d:69:a9:92:2f:11:0e:d6:7e:d3:fd:b7:12: c6:de:f2:e6:ad:9a:4e:fe:1e:c9:b4:5c:bc:c9:97:e6: b3:ea:dc:fb:75:a2:28:c6:83:ba:38:c1:46:dc:b8:45: 3f:dc:fb:a2:72:4c:8a:88:81:cb:e5:31:b2:26:bc:47: e6:cf:93:62:82:7a:62:9c:b7:bc:98:e5:62:0c:4b:a5: dd:23:9b:f9:dc:c1:99:6e:f1:7d:00:5b:58:38:11:54: 3a:6c:4b:91:dc:06:5b:ce:24:d4:4c:b6:12:af:4e:06: b2:dd:4d:73:70:44:9e:ed:86:d6:c1:34:a5:9e:f2:d1: 46:1f:c6:89:79:a9:71:fd:05:b0:2a:a9:89:1b:97:a8: 2a:cc:1d:9f:14:b6:6f:2b:59:6b:d5:38:8d:04:29:ba: cb:54:63:e8:f3:2f:f1:01:c7:12:b2:bb:84:20:c1:0d: bf:05:ae:1f:b6:2b:9f:71:74:aa:e6:c5:59:25:6e:bc Fingerprint (SHA-256): 2B:68:8B:F6:2A:09:A5:F9:65:79:F9:2A:78:9F:00:73:BE:11:A4:29:6C:8D:D7:F7:C0:A9:F9:6F:F5:7B:98:5D Fingerprint (SHA1): 0B:C3:01:EB:02:CB:D7:20:71:47:63:64:70:C8:3F:2F:F1:24:38:A9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2887: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2888: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145792 (0x49158000) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:01:58 2024 Not After : Wed Dec 26 15:01:58 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:5e:73:55:32:67:90:17:13:1a:99:ce:8d:c5:66:c3: 79:bf:24:c8:c3:73:d8:80:56:8f:45:01:a5:56:ce:2a: 50:14:5b:12:bc:6c:e1:69:a4:95:5d:f9:f4:12:0a:47: 86:7d:f0:c0:13:cd:31:32:16:e2:9b:f4:7f:5c:81:a2: 6a:3e:ce:85:8e:cb:e4:6b:98:a0:81:8c:73:72:ad:85: 15:1a:83:58:43:f7:76:d1:e2:1b:0c:7a:bb:c0:86:7c: 1e:f4:7c:ab:a9:b0:f5:df:96:d8:8e:25:06:9a:17:bd: f4:db:f1:e8:ac:32:36:28:f7:57:29:26:a6:d3:fc:f9: bd:d6:2a:00:dd:a1:55:98:07:b4:01:03:29:06:5a:85: c4:e0:91:8a:64:c6:c7:d2:03:b9:b2:f5:45:1e:10:28: 1d:0f:c7:0a:65:c6:be:6c:36:40:d4:fa:1f:65:79:b1: ff:9a:3a:7b:d8:cc:e5:b8:33:2b:09:95:b1:25:47:db: de:85:c3:f9:1c:d5:cd:d1:e8:88:5d:6d:57:ac:b7:35: 2f:fb:65:ed:6b:5c:5c:8b:5d:32:00:86:0b:e0:84:e0: 2b:cf:19:dd:90:1b:26:dd:97:91:9a:8a:04:be:5e:00: 77:c1:0d:0b:86:3e:40:57:98:15:4e:ee:11:5f:cd:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:9f:67:e3:5e:00:b9:66:6e:fc:f5:26:49:1e:a2:14: 0d:44:e5:60:9a:f5:c6:06:d8:7d:b3:1a:6e:fb:59:a9: bd:0b:97:72:c6:9a:53:6e:4a:f6:06:b2:15:6e:fe:db: 2a:00:f9:ee:ee:fb:4b:9d:82:bc:b6:c3:75:b2:7a:28: 98:e2:4e:42:47:aa:82:48:3f:20:a6:60:21:27:db:b2: 88:57:bd:9f:b5:f2:55:18:d2:1d:aa:88:4f:23:08:33: 1e:15:2e:d1:3c:52:e0:2d:4c:f6:f6:d5:e5:e5:b3:0a: 4d:b6:da:3f:32:71:6b:99:f3:9f:a1:fa:eb:dd:b6:cd: 38:d1:51:35:21:5f:df:7d:8a:4c:e5:83:6e:25:a8:bf: ca:78:96:4d:a7:d9:5c:76:40:de:4c:20:84:15:53:11: ee:be:d1:f1:c0:1f:16:53:49:3a:8b:bf:49:2c:46:e9: 2a:da:36:f0:91:d6:7e:2e:a2:03:34:45:0a:62:20:28: 60:5f:f3:e2:82:05:cc:3c:f2:12:62:96:6f:d4:8a:d4: de:d1:92:07:1d:af:e2:e9:f3:a9:14:d0:10:6f:fd:2b: 5a:87:c6:ce:79:6c:c0:70:f2:bd:f9:8d:16:7d:a2:37: 31:8e:b8:cd:4f:e0:0d:34:81:28:eb:f8:1e:ca:ac:b0 Fingerprint (SHA-256): 05:C9:42:D6:E2:91:8C:5D:69:89:59:BD:87:B7:67:4A:D4:99:2E:BB:F6:2F:A4:51:1A:B1:0B:E3:63:37:38:49 Fingerprint (SHA1): 7E:72:5B:19:FF:67:2A:C0:AC:06:B2:F8:20:8D:64:DC:AC:30:E9:78 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #2889: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2890: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #2891: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145794 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2892: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #2893: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2894: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2895: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145795 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2896: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2897: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2898: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2899: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145796 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2900: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2901: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2902: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2903: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145797 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2904: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2905: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2906: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2907: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145798 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2908: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2909: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2910: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145794 (0x49158002) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:01 2024 Not After : Wed Dec 26 15:02:01 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:84:d6:05:3b:9e:cf:73:68:0b:ea:5c:96:88:6b:a1: ca:5a:26:e3:e5:db:ba:7f:ad:6e:49:6b:a2:87:88:13: 0b:dd:f8:e0:82:5c:0f:69:38:12:cb:21:aa:fd:4d:b8: d3:39:4d:90:7e:2e:46:59:b4:98:99:c6:68:54:f8:19: 07:69:27:44:2a:fc:7c:94:59:a3:be:d4:8b:2d:18:f6: d6:a9:f9:ac:64:4b:bb:aa:e0:86:fc:b0:f0:c8:54:e4: cb:7a:ba:2f:f3:6f:5d:f7:18:8a:6f:90:d4:c2:51:8b: 96:50:c0:1c:a6:95:d1:46:8d:43:4b:15:03:99:23:7c: 79:48:45:16:4c:f4:a8:2b:1d:27:92:9b:e9:92:62:8d: ae:0d:f3:18:67:d5:40:45:9e:80:72:48:8f:4b:bb:19: a6:23:55:ec:a8:dd:1f:ee:1c:87:8a:1d:38:df:3d:15: fe:b8:94:3a:e6:3b:02:84:12:56:57:95:dd:43:a4:f2: 9a:7e:34:d6:70:d3:0f:0f:0d:f8:66:8f:bd:64:66:0c: 2d:8f:06:61:00:c9:e1:fc:f9:c3:b5:e9:3a:2c:52:cb: 7e:1c:68:14:e6:c9:5f:bb:2b:03:4e:a0:1f:17:77:5a: 97:26:20:5a:28:2a:f1:d3:2a:64:ee:c6:59:ed:b0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:13:e1:b0:41:ec:56:b2:ba:53:f7:4c:08:4e:a2:ce: a8:62:18:1d:26:fa:bc:aa:38:a7:bb:b9:29:85:04:3e: e6:74:4c:67:62:96:54:d2:4f:58:30:21:c5:51:7c:15: d0:8e:7f:a5:17:33:80:63:ae:1a:0b:83:a5:6a:6a:39: ea:35:f5:13:54:23:c4:b1:16:9d:b4:0c:14:61:68:9a: bf:28:38:80:49:11:93:b1:97:9e:7b:76:37:5a:e2:aa: df:21:8e:b4:7f:f5:a6:52:7f:fa:0b:73:f8:2f:41:4b: 2c:16:73:56:82:6d:b9:a8:1e:70:ae:85:b9:12:0a:bb: 82:b1:4a:e2:c5:bf:1f:b1:af:e2:fa:e4:e6:0b:90:88: c8:9f:be:ce:b9:06:30:a0:70:b4:7d:2e:24:b7:b7:c2: f4:f7:26:49:87:d6:1d:49:b1:3a:08:91:00:fb:d0:c0: b4:d3:35:1c:2d:8e:f7:04:55:92:b0:30:b8:99:aa:81: 98:23:3f:ef:ac:9d:fe:b9:5e:5b:20:48:a2:2c:ad:2c: 2d:01:71:b3:17:14:34:88:00:15:e8:85:c0:cf:0d:f3: 9d:86:95:44:b6:e1:8f:8c:84:70:54:4e:f2:58:b8:c4: a8:02:62:48:71:2f:c3:30:66:6e:f5:4f:c7:0e:43:81 Fingerprint (SHA-256): A0:AE:97:F4:E1:26:57:9E:8B:58:15:83:1A:56:DF:0F:56:08:EB:3F:A5:73:B1:12:B7:3C:42:32:21:52:F1:A5 Fingerprint (SHA1): DE:F7:9E:71:25:1F:28:5D:1A:FF:26:28:D5:32:B3:43:A6:C6:71:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2911: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2912: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145795 (0x49158003) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:02 2024 Not After : Wed Dec 26 15:02:02 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:3c:b9:61:89:4a:c7:30:2a:9c:cb:84:0c:8d:41:b6: 1e:0e:88:d6:e6:f1:94:74:43:22:36:d8:23:a5:97:56: 4c:9f:d3:bc:07:3b:b6:64:a1:92:92:e4:cb:56:9e:5b: 02:5a:14:e1:81:1e:b5:f1:93:6a:e4:ba:62:6a:4f:dc: bd:27:13:ca:14:38:0a:18:2c:21:62:c6:2b:57:b8:e1: eb:ab:6a:70:b2:e5:98:a2:8c:50:64:64:fd:d0:40:c2: 6d:99:c4:ad:99:ae:42:2e:aa:b9:99:94:60:ba:ec:8e: e6:0d:14:ac:96:81:b7:f5:63:ab:ca:f3:5e:77:82:61: 55:7e:34:81:9e:61:1b:22:69:d2:75:ee:e2:7e:5f:19: c0:4f:50:2e:0f:88:dd:9c:5d:0d:83:14:be:60:5a:d9: 31:6a:55:fb:b2:96:cc:98:c5:ea:04:71:e6:a2:9e:63: 85:1a:3b:4a:e6:5e:a8:1d:72:52:1a:80:89:94:36:88: 30:76:80:cd:9c:8a:93:d5:72:77:ab:3a:da:1e:87:f3: 21:f3:63:dc:2d:5e:e3:8e:e5:d7:c5:ac:1b:88:e1:9f: 48:46:ab:44:c2:9d:aa:2e:14:df:82:13:9e:d8:11:77: 26:4f:a1:dc:0b:2e:df:1a:6b:0f:10:95:2f:38:88:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:49:40:d5:a7:7c:75:73:d6:04:bc:8b:cb:67:95:ac: 41:cc:49:1e:db:6d:42:8d:21:7a:df:3e:02:49:b0:af: 6f:a5:9c:15:d3:ab:81:07:ee:72:63:ae:7c:c4:0c:9c: fd:77:f0:ec:58:24:30:41:5f:0a:42:45:53:9a:b4:ce: 86:9e:c3:b2:1e:f3:19:b2:22:4f:a2:9a:bc:f3:1a:85: 18:d1:9a:43:d3:a8:b2:02:df:43:d8:08:11:52:02:91: e6:49:8c:d9:8d:1b:fc:f8:9b:e9:5b:d4:fa:fa:8d:c5: eb:41:76:03:ea:c7:a1:25:5b:cc:3c:e4:bc:91:6e:e2: 05:f9:24:b8:65:6e:52:0c:77:ac:6d:14:1a:0e:49:5c: 65:cc:cf:00:cd:34:6e:bf:86:fc:b3:e2:6f:71:36:a1: 43:45:d5:8c:f3:4d:bd:65:b9:93:50:a9:a4:23:a0:11: e0:ae:d8:35:f7:ff:66:fa:ec:97:ee:93:7a:87:b6:62: e8:b4:fe:45:e3:18:b1:dd:0c:1e:f5:fa:1f:e5:85:db: 2a:c5:cf:47:9b:05:ba:71:f0:08:d7:4c:24:fe:e1:c1: 21:93:aa:db:c7:1d:db:b0:f1:43:f9:28:75:aa:ef:7a: 1e:4a:59:96:8b:73:33:f6:1b:82:ea:94:e8:78:86:b2 Fingerprint (SHA-256): 48:31:CD:C6:1A:6A:46:C9:A6:AF:57:2D:66:04:38:44:7A:59:9B:D2:78:13:C3:E3:15:FF:5C:6E:C0:45:27:69 Fingerprint (SHA1): A2:EB:05:C8:3B:C9:22:1F:B3:D9:76:C8:1D:9A:49:F5:88:7E:77:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2913: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2914: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145796 (0x49158004) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:02:03 2024 Not After : Wed Dec 26 15:02:03 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:b8:cc:31:b0:5e:01:e5:1e:36:68:36:17:ce:d9:cd: 90:3c:30:ce:93:2f:ae:63:08:c9:68:be:b9:81:52:84: 82:be:21:dd:02:e5:51:2a:1e:bc:04:96:41:dc:e0:37: 6d:42:10:2a:fc:52:13:64:37:cf:31:29:a0:5b:11:c5: 25:77:66:70:4b:7d:65:62:35:fc:d0:ca:6a:37:6e:cb: 83:3a:a2:41:5d:cf:10:b9:15:7d:6f:f8:ec:9d:9d:f0: 85:fe:3e:2d:76:cd:ed:ef:43:a8:b7:e8:78:6a:95:40: 5d:28:45:4b:a6:21:30:87:bc:14:23:6e:78:fc:f6:7f: f0:c8:5f:d9:99:e4:41:c8:aa:33:00:7b:d9:7e:40:08: 3f:47:ac:5d:27:2a:c2:5d:8d:56:a5:1b:c2:6c:91:04: f8:3d:24:73:01:4f:5b:9b:45:98:0b:2b:6a:57:67:51: 0d:f0:08:9c:c7:e6:07:9d:8f:67:b6:ad:fa:c5:c1:e5: 3b:3a:a8:79:cc:80:5c:01:7a:d3:40:79:ca:a3:0b:1e: 1c:24:c5:3b:83:4b:f6:84:ce:76:76:91:ff:48:b4:23: 1d:2d:8b:c0:10:f7:53:db:23:d7:b6:45:eb:2a:4f:40: 06:24:59:d7:bf:4f:a9:c5:78:37:62:77:fb:1d:77:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:b9:e3:8d:a9:8e:9d:88:ce:ba:8d:49:1e:92:97:92: fe:df:3c:88:a8:f9:a9:f7:c4:fe:c9:7e:db:ab:2a:f2: 3b:ef:85:7d:4d:c6:4d:77:4b:26:b9:23:0d:42:40:78: 85:61:91:2e:62:e3:1e:46:ef:1e:15:d6:f5:4e:70:d2: 7c:d6:67:e3:71:81:2e:4a:10:3c:2c:dc:f4:17:96:22: 05:1e:05:52:56:3b:68:20:8d:d0:99:6d:da:f1:bf:b7: 47:29:4e:76:2d:bf:37:95:f1:15:1c:ff:c2:bb:75:9f: 17:8d:d9:8a:2b:a9:cf:21:59:56:c1:28:e0:cf:8c:c0: f0:f5:6e:52:3f:17:5e:29:ec:15:9e:4b:6b:da:4e:13: 66:10:b6:56:ff:7b:19:0b:31:5e:db:92:07:49:c0:5f: cc:bd:95:bc:c5:dd:95:f2:2c:f3:c4:16:2f:f2:1a:35: 48:0e:4c:24:07:74:f8:27:27:de:c4:0d:b6:18:8d:7e: 49:e4:3f:a7:04:bb:ee:a1:82:01:50:08:e8:b7:bc:f2: b7:5d:aa:b3:8b:ee:f1:4d:9f:3d:03:ad:3f:c4:3b:fe: 1e:f0:bc:79:5e:24:94:81:17:c4:09:ad:63:ef:6d:a2: 29:a9:b1:2c:43:07:b8:ea:71:33:7d:c7:19:8c:ed:59 Fingerprint (SHA-256): D5:DC:06:2A:10:77:29:41:D5:DD:BF:C0:A6:C1:BD:2B:60:5D:0C:7A:69:62:6C:A4:54:1F:C2:5E:55:26:06:B9 Fingerprint (SHA1): 5D:15:89:74:CA:54:ED:C6:9E:55:98:A3:D3:4C:31:00:BE:B0:6A:49 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2915: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2916: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #2917: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #2918: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2919: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145794 (0x49158002) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:01 2024 Not After : Wed Dec 26 15:02:01 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:84:d6:05:3b:9e:cf:73:68:0b:ea:5c:96:88:6b:a1: ca:5a:26:e3:e5:db:ba:7f:ad:6e:49:6b:a2:87:88:13: 0b:dd:f8:e0:82:5c:0f:69:38:12:cb:21:aa:fd:4d:b8: d3:39:4d:90:7e:2e:46:59:b4:98:99:c6:68:54:f8:19: 07:69:27:44:2a:fc:7c:94:59:a3:be:d4:8b:2d:18:f6: d6:a9:f9:ac:64:4b:bb:aa:e0:86:fc:b0:f0:c8:54:e4: cb:7a:ba:2f:f3:6f:5d:f7:18:8a:6f:90:d4:c2:51:8b: 96:50:c0:1c:a6:95:d1:46:8d:43:4b:15:03:99:23:7c: 79:48:45:16:4c:f4:a8:2b:1d:27:92:9b:e9:92:62:8d: ae:0d:f3:18:67:d5:40:45:9e:80:72:48:8f:4b:bb:19: a6:23:55:ec:a8:dd:1f:ee:1c:87:8a:1d:38:df:3d:15: fe:b8:94:3a:e6:3b:02:84:12:56:57:95:dd:43:a4:f2: 9a:7e:34:d6:70:d3:0f:0f:0d:f8:66:8f:bd:64:66:0c: 2d:8f:06:61:00:c9:e1:fc:f9:c3:b5:e9:3a:2c:52:cb: 7e:1c:68:14:e6:c9:5f:bb:2b:03:4e:a0:1f:17:77:5a: 97:26:20:5a:28:2a:f1:d3:2a:64:ee:c6:59:ed:b0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:13:e1:b0:41:ec:56:b2:ba:53:f7:4c:08:4e:a2:ce: a8:62:18:1d:26:fa:bc:aa:38:a7:bb:b9:29:85:04:3e: e6:74:4c:67:62:96:54:d2:4f:58:30:21:c5:51:7c:15: d0:8e:7f:a5:17:33:80:63:ae:1a:0b:83:a5:6a:6a:39: ea:35:f5:13:54:23:c4:b1:16:9d:b4:0c:14:61:68:9a: bf:28:38:80:49:11:93:b1:97:9e:7b:76:37:5a:e2:aa: df:21:8e:b4:7f:f5:a6:52:7f:fa:0b:73:f8:2f:41:4b: 2c:16:73:56:82:6d:b9:a8:1e:70:ae:85:b9:12:0a:bb: 82:b1:4a:e2:c5:bf:1f:b1:af:e2:fa:e4:e6:0b:90:88: c8:9f:be:ce:b9:06:30:a0:70:b4:7d:2e:24:b7:b7:c2: f4:f7:26:49:87:d6:1d:49:b1:3a:08:91:00:fb:d0:c0: b4:d3:35:1c:2d:8e:f7:04:55:92:b0:30:b8:99:aa:81: 98:23:3f:ef:ac:9d:fe:b9:5e:5b:20:48:a2:2c:ad:2c: 2d:01:71:b3:17:14:34:88:00:15:e8:85:c0:cf:0d:f3: 9d:86:95:44:b6:e1:8f:8c:84:70:54:4e:f2:58:b8:c4: a8:02:62:48:71:2f:c3:30:66:6e:f5:4f:c7:0e:43:81 Fingerprint (SHA-256): A0:AE:97:F4:E1:26:57:9E:8B:58:15:83:1A:56:DF:0F:56:08:EB:3F:A5:73:B1:12:B7:3C:42:32:21:52:F1:A5 Fingerprint (SHA1): DE:F7:9E:71:25:1F:28:5D:1A:FF:26:28:D5:32:B3:43:A6:C6:71:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2920: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2921: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145795 (0x49158003) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:02 2024 Not After : Wed Dec 26 15:02:02 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:3c:b9:61:89:4a:c7:30:2a:9c:cb:84:0c:8d:41:b6: 1e:0e:88:d6:e6:f1:94:74:43:22:36:d8:23:a5:97:56: 4c:9f:d3:bc:07:3b:b6:64:a1:92:92:e4:cb:56:9e:5b: 02:5a:14:e1:81:1e:b5:f1:93:6a:e4:ba:62:6a:4f:dc: bd:27:13:ca:14:38:0a:18:2c:21:62:c6:2b:57:b8:e1: eb:ab:6a:70:b2:e5:98:a2:8c:50:64:64:fd:d0:40:c2: 6d:99:c4:ad:99:ae:42:2e:aa:b9:99:94:60:ba:ec:8e: e6:0d:14:ac:96:81:b7:f5:63:ab:ca:f3:5e:77:82:61: 55:7e:34:81:9e:61:1b:22:69:d2:75:ee:e2:7e:5f:19: c0:4f:50:2e:0f:88:dd:9c:5d:0d:83:14:be:60:5a:d9: 31:6a:55:fb:b2:96:cc:98:c5:ea:04:71:e6:a2:9e:63: 85:1a:3b:4a:e6:5e:a8:1d:72:52:1a:80:89:94:36:88: 30:76:80:cd:9c:8a:93:d5:72:77:ab:3a:da:1e:87:f3: 21:f3:63:dc:2d:5e:e3:8e:e5:d7:c5:ac:1b:88:e1:9f: 48:46:ab:44:c2:9d:aa:2e:14:df:82:13:9e:d8:11:77: 26:4f:a1:dc:0b:2e:df:1a:6b:0f:10:95:2f:38:88:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:49:40:d5:a7:7c:75:73:d6:04:bc:8b:cb:67:95:ac: 41:cc:49:1e:db:6d:42:8d:21:7a:df:3e:02:49:b0:af: 6f:a5:9c:15:d3:ab:81:07:ee:72:63:ae:7c:c4:0c:9c: fd:77:f0:ec:58:24:30:41:5f:0a:42:45:53:9a:b4:ce: 86:9e:c3:b2:1e:f3:19:b2:22:4f:a2:9a:bc:f3:1a:85: 18:d1:9a:43:d3:a8:b2:02:df:43:d8:08:11:52:02:91: e6:49:8c:d9:8d:1b:fc:f8:9b:e9:5b:d4:fa:fa:8d:c5: eb:41:76:03:ea:c7:a1:25:5b:cc:3c:e4:bc:91:6e:e2: 05:f9:24:b8:65:6e:52:0c:77:ac:6d:14:1a:0e:49:5c: 65:cc:cf:00:cd:34:6e:bf:86:fc:b3:e2:6f:71:36:a1: 43:45:d5:8c:f3:4d:bd:65:b9:93:50:a9:a4:23:a0:11: e0:ae:d8:35:f7:ff:66:fa:ec:97:ee:93:7a:87:b6:62: e8:b4:fe:45:e3:18:b1:dd:0c:1e:f5:fa:1f:e5:85:db: 2a:c5:cf:47:9b:05:ba:71:f0:08:d7:4c:24:fe:e1:c1: 21:93:aa:db:c7:1d:db:b0:f1:43:f9:28:75:aa:ef:7a: 1e:4a:59:96:8b:73:33:f6:1b:82:ea:94:e8:78:86:b2 Fingerprint (SHA-256): 48:31:CD:C6:1A:6A:46:C9:A6:AF:57:2D:66:04:38:44:7A:59:9B:D2:78:13:C3:E3:15:FF:5C:6E:C0:45:27:69 Fingerprint (SHA1): A2:EB:05:C8:3B:C9:22:1F:B3:D9:76:C8:1D:9A:49:F5:88:7E:77:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2922: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2923: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145796 (0x49158004) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:02:03 2024 Not After : Wed Dec 26 15:02:03 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:b8:cc:31:b0:5e:01:e5:1e:36:68:36:17:ce:d9:cd: 90:3c:30:ce:93:2f:ae:63:08:c9:68:be:b9:81:52:84: 82:be:21:dd:02:e5:51:2a:1e:bc:04:96:41:dc:e0:37: 6d:42:10:2a:fc:52:13:64:37:cf:31:29:a0:5b:11:c5: 25:77:66:70:4b:7d:65:62:35:fc:d0:ca:6a:37:6e:cb: 83:3a:a2:41:5d:cf:10:b9:15:7d:6f:f8:ec:9d:9d:f0: 85:fe:3e:2d:76:cd:ed:ef:43:a8:b7:e8:78:6a:95:40: 5d:28:45:4b:a6:21:30:87:bc:14:23:6e:78:fc:f6:7f: f0:c8:5f:d9:99:e4:41:c8:aa:33:00:7b:d9:7e:40:08: 3f:47:ac:5d:27:2a:c2:5d:8d:56:a5:1b:c2:6c:91:04: f8:3d:24:73:01:4f:5b:9b:45:98:0b:2b:6a:57:67:51: 0d:f0:08:9c:c7:e6:07:9d:8f:67:b6:ad:fa:c5:c1:e5: 3b:3a:a8:79:cc:80:5c:01:7a:d3:40:79:ca:a3:0b:1e: 1c:24:c5:3b:83:4b:f6:84:ce:76:76:91:ff:48:b4:23: 1d:2d:8b:c0:10:f7:53:db:23:d7:b6:45:eb:2a:4f:40: 06:24:59:d7:bf:4f:a9:c5:78:37:62:77:fb:1d:77:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:b9:e3:8d:a9:8e:9d:88:ce:ba:8d:49:1e:92:97:92: fe:df:3c:88:a8:f9:a9:f7:c4:fe:c9:7e:db:ab:2a:f2: 3b:ef:85:7d:4d:c6:4d:77:4b:26:b9:23:0d:42:40:78: 85:61:91:2e:62:e3:1e:46:ef:1e:15:d6:f5:4e:70:d2: 7c:d6:67:e3:71:81:2e:4a:10:3c:2c:dc:f4:17:96:22: 05:1e:05:52:56:3b:68:20:8d:d0:99:6d:da:f1:bf:b7: 47:29:4e:76:2d:bf:37:95:f1:15:1c:ff:c2:bb:75:9f: 17:8d:d9:8a:2b:a9:cf:21:59:56:c1:28:e0:cf:8c:c0: f0:f5:6e:52:3f:17:5e:29:ec:15:9e:4b:6b:da:4e:13: 66:10:b6:56:ff:7b:19:0b:31:5e:db:92:07:49:c0:5f: cc:bd:95:bc:c5:dd:95:f2:2c:f3:c4:16:2f:f2:1a:35: 48:0e:4c:24:07:74:f8:27:27:de:c4:0d:b6:18:8d:7e: 49:e4:3f:a7:04:bb:ee:a1:82:01:50:08:e8:b7:bc:f2: b7:5d:aa:b3:8b:ee:f1:4d:9f:3d:03:ad:3f:c4:3b:fe: 1e:f0:bc:79:5e:24:94:81:17:c4:09:ad:63:ef:6d:a2: 29:a9:b1:2c:43:07:b8:ea:71:33:7d:c7:19:8c:ed:59 Fingerprint (SHA-256): D5:DC:06:2A:10:77:29:41:D5:DD:BF:C0:A6:C1:BD:2B:60:5D:0C:7A:69:62:6C:A4:54:1F:C2:5E:55:26:06:B9 Fingerprint (SHA1): 5D:15:89:74:CA:54:ED:C6:9E:55:98:A3:D3:4C:31:00:BE:B0:6A:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #2924: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2925: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145794 (0x49158002) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:01 2024 Not After : Wed Dec 26 15:02:01 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:84:d6:05:3b:9e:cf:73:68:0b:ea:5c:96:88:6b:a1: ca:5a:26:e3:e5:db:ba:7f:ad:6e:49:6b:a2:87:88:13: 0b:dd:f8:e0:82:5c:0f:69:38:12:cb:21:aa:fd:4d:b8: d3:39:4d:90:7e:2e:46:59:b4:98:99:c6:68:54:f8:19: 07:69:27:44:2a:fc:7c:94:59:a3:be:d4:8b:2d:18:f6: d6:a9:f9:ac:64:4b:bb:aa:e0:86:fc:b0:f0:c8:54:e4: cb:7a:ba:2f:f3:6f:5d:f7:18:8a:6f:90:d4:c2:51:8b: 96:50:c0:1c:a6:95:d1:46:8d:43:4b:15:03:99:23:7c: 79:48:45:16:4c:f4:a8:2b:1d:27:92:9b:e9:92:62:8d: ae:0d:f3:18:67:d5:40:45:9e:80:72:48:8f:4b:bb:19: a6:23:55:ec:a8:dd:1f:ee:1c:87:8a:1d:38:df:3d:15: fe:b8:94:3a:e6:3b:02:84:12:56:57:95:dd:43:a4:f2: 9a:7e:34:d6:70:d3:0f:0f:0d:f8:66:8f:bd:64:66:0c: 2d:8f:06:61:00:c9:e1:fc:f9:c3:b5:e9:3a:2c:52:cb: 7e:1c:68:14:e6:c9:5f:bb:2b:03:4e:a0:1f:17:77:5a: 97:26:20:5a:28:2a:f1:d3:2a:64:ee:c6:59:ed:b0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:13:e1:b0:41:ec:56:b2:ba:53:f7:4c:08:4e:a2:ce: a8:62:18:1d:26:fa:bc:aa:38:a7:bb:b9:29:85:04:3e: e6:74:4c:67:62:96:54:d2:4f:58:30:21:c5:51:7c:15: d0:8e:7f:a5:17:33:80:63:ae:1a:0b:83:a5:6a:6a:39: ea:35:f5:13:54:23:c4:b1:16:9d:b4:0c:14:61:68:9a: bf:28:38:80:49:11:93:b1:97:9e:7b:76:37:5a:e2:aa: df:21:8e:b4:7f:f5:a6:52:7f:fa:0b:73:f8:2f:41:4b: 2c:16:73:56:82:6d:b9:a8:1e:70:ae:85:b9:12:0a:bb: 82:b1:4a:e2:c5:bf:1f:b1:af:e2:fa:e4:e6:0b:90:88: c8:9f:be:ce:b9:06:30:a0:70:b4:7d:2e:24:b7:b7:c2: f4:f7:26:49:87:d6:1d:49:b1:3a:08:91:00:fb:d0:c0: b4:d3:35:1c:2d:8e:f7:04:55:92:b0:30:b8:99:aa:81: 98:23:3f:ef:ac:9d:fe:b9:5e:5b:20:48:a2:2c:ad:2c: 2d:01:71:b3:17:14:34:88:00:15:e8:85:c0:cf:0d:f3: 9d:86:95:44:b6:e1:8f:8c:84:70:54:4e:f2:58:b8:c4: a8:02:62:48:71:2f:c3:30:66:6e:f5:4f:c7:0e:43:81 Fingerprint (SHA-256): A0:AE:97:F4:E1:26:57:9E:8B:58:15:83:1A:56:DF:0F:56:08:EB:3F:A5:73:B1:12:B7:3C:42:32:21:52:F1:A5 Fingerprint (SHA1): DE:F7:9E:71:25:1F:28:5D:1A:FF:26:28:D5:32:B3:43:A6:C6:71:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2926: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145794 (0x49158002) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:01 2024 Not After : Wed Dec 26 15:02:01 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:84:d6:05:3b:9e:cf:73:68:0b:ea:5c:96:88:6b:a1: ca:5a:26:e3:e5:db:ba:7f:ad:6e:49:6b:a2:87:88:13: 0b:dd:f8:e0:82:5c:0f:69:38:12:cb:21:aa:fd:4d:b8: d3:39:4d:90:7e:2e:46:59:b4:98:99:c6:68:54:f8:19: 07:69:27:44:2a:fc:7c:94:59:a3:be:d4:8b:2d:18:f6: d6:a9:f9:ac:64:4b:bb:aa:e0:86:fc:b0:f0:c8:54:e4: cb:7a:ba:2f:f3:6f:5d:f7:18:8a:6f:90:d4:c2:51:8b: 96:50:c0:1c:a6:95:d1:46:8d:43:4b:15:03:99:23:7c: 79:48:45:16:4c:f4:a8:2b:1d:27:92:9b:e9:92:62:8d: ae:0d:f3:18:67:d5:40:45:9e:80:72:48:8f:4b:bb:19: a6:23:55:ec:a8:dd:1f:ee:1c:87:8a:1d:38:df:3d:15: fe:b8:94:3a:e6:3b:02:84:12:56:57:95:dd:43:a4:f2: 9a:7e:34:d6:70:d3:0f:0f:0d:f8:66:8f:bd:64:66:0c: 2d:8f:06:61:00:c9:e1:fc:f9:c3:b5:e9:3a:2c:52:cb: 7e:1c:68:14:e6:c9:5f:bb:2b:03:4e:a0:1f:17:77:5a: 97:26:20:5a:28:2a:f1:d3:2a:64:ee:c6:59:ed:b0:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:13:e1:b0:41:ec:56:b2:ba:53:f7:4c:08:4e:a2:ce: a8:62:18:1d:26:fa:bc:aa:38:a7:bb:b9:29:85:04:3e: e6:74:4c:67:62:96:54:d2:4f:58:30:21:c5:51:7c:15: d0:8e:7f:a5:17:33:80:63:ae:1a:0b:83:a5:6a:6a:39: ea:35:f5:13:54:23:c4:b1:16:9d:b4:0c:14:61:68:9a: bf:28:38:80:49:11:93:b1:97:9e:7b:76:37:5a:e2:aa: df:21:8e:b4:7f:f5:a6:52:7f:fa:0b:73:f8:2f:41:4b: 2c:16:73:56:82:6d:b9:a8:1e:70:ae:85:b9:12:0a:bb: 82:b1:4a:e2:c5:bf:1f:b1:af:e2:fa:e4:e6:0b:90:88: c8:9f:be:ce:b9:06:30:a0:70:b4:7d:2e:24:b7:b7:c2: f4:f7:26:49:87:d6:1d:49:b1:3a:08:91:00:fb:d0:c0: b4:d3:35:1c:2d:8e:f7:04:55:92:b0:30:b8:99:aa:81: 98:23:3f:ef:ac:9d:fe:b9:5e:5b:20:48:a2:2c:ad:2c: 2d:01:71:b3:17:14:34:88:00:15:e8:85:c0:cf:0d:f3: 9d:86:95:44:b6:e1:8f:8c:84:70:54:4e:f2:58:b8:c4: a8:02:62:48:71:2f:c3:30:66:6e:f5:4f:c7:0e:43:81 Fingerprint (SHA-256): A0:AE:97:F4:E1:26:57:9E:8B:58:15:83:1A:56:DF:0F:56:08:EB:3F:A5:73:B1:12:B7:3C:42:32:21:52:F1:A5 Fingerprint (SHA1): DE:F7:9E:71:25:1F:28:5D:1A:FF:26:28:D5:32:B3:43:A6:C6:71:A8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2927: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145795 (0x49158003) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:02 2024 Not After : Wed Dec 26 15:02:02 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:3c:b9:61:89:4a:c7:30:2a:9c:cb:84:0c:8d:41:b6: 1e:0e:88:d6:e6:f1:94:74:43:22:36:d8:23:a5:97:56: 4c:9f:d3:bc:07:3b:b6:64:a1:92:92:e4:cb:56:9e:5b: 02:5a:14:e1:81:1e:b5:f1:93:6a:e4:ba:62:6a:4f:dc: bd:27:13:ca:14:38:0a:18:2c:21:62:c6:2b:57:b8:e1: eb:ab:6a:70:b2:e5:98:a2:8c:50:64:64:fd:d0:40:c2: 6d:99:c4:ad:99:ae:42:2e:aa:b9:99:94:60:ba:ec:8e: e6:0d:14:ac:96:81:b7:f5:63:ab:ca:f3:5e:77:82:61: 55:7e:34:81:9e:61:1b:22:69:d2:75:ee:e2:7e:5f:19: c0:4f:50:2e:0f:88:dd:9c:5d:0d:83:14:be:60:5a:d9: 31:6a:55:fb:b2:96:cc:98:c5:ea:04:71:e6:a2:9e:63: 85:1a:3b:4a:e6:5e:a8:1d:72:52:1a:80:89:94:36:88: 30:76:80:cd:9c:8a:93:d5:72:77:ab:3a:da:1e:87:f3: 21:f3:63:dc:2d:5e:e3:8e:e5:d7:c5:ac:1b:88:e1:9f: 48:46:ab:44:c2:9d:aa:2e:14:df:82:13:9e:d8:11:77: 26:4f:a1:dc:0b:2e:df:1a:6b:0f:10:95:2f:38:88:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:49:40:d5:a7:7c:75:73:d6:04:bc:8b:cb:67:95:ac: 41:cc:49:1e:db:6d:42:8d:21:7a:df:3e:02:49:b0:af: 6f:a5:9c:15:d3:ab:81:07:ee:72:63:ae:7c:c4:0c:9c: fd:77:f0:ec:58:24:30:41:5f:0a:42:45:53:9a:b4:ce: 86:9e:c3:b2:1e:f3:19:b2:22:4f:a2:9a:bc:f3:1a:85: 18:d1:9a:43:d3:a8:b2:02:df:43:d8:08:11:52:02:91: e6:49:8c:d9:8d:1b:fc:f8:9b:e9:5b:d4:fa:fa:8d:c5: eb:41:76:03:ea:c7:a1:25:5b:cc:3c:e4:bc:91:6e:e2: 05:f9:24:b8:65:6e:52:0c:77:ac:6d:14:1a:0e:49:5c: 65:cc:cf:00:cd:34:6e:bf:86:fc:b3:e2:6f:71:36:a1: 43:45:d5:8c:f3:4d:bd:65:b9:93:50:a9:a4:23:a0:11: e0:ae:d8:35:f7:ff:66:fa:ec:97:ee:93:7a:87:b6:62: e8:b4:fe:45:e3:18:b1:dd:0c:1e:f5:fa:1f:e5:85:db: 2a:c5:cf:47:9b:05:ba:71:f0:08:d7:4c:24:fe:e1:c1: 21:93:aa:db:c7:1d:db:b0:f1:43:f9:28:75:aa:ef:7a: 1e:4a:59:96:8b:73:33:f6:1b:82:ea:94:e8:78:86:b2 Fingerprint (SHA-256): 48:31:CD:C6:1A:6A:46:C9:A6:AF:57:2D:66:04:38:44:7A:59:9B:D2:78:13:C3:E3:15:FF:5C:6E:C0:45:27:69 Fingerprint (SHA1): A2:EB:05:C8:3B:C9:22:1F:B3:D9:76:C8:1D:9A:49:F5:88:7E:77:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2928: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145795 (0x49158003) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:02 2024 Not After : Wed Dec 26 15:02:02 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:3c:b9:61:89:4a:c7:30:2a:9c:cb:84:0c:8d:41:b6: 1e:0e:88:d6:e6:f1:94:74:43:22:36:d8:23:a5:97:56: 4c:9f:d3:bc:07:3b:b6:64:a1:92:92:e4:cb:56:9e:5b: 02:5a:14:e1:81:1e:b5:f1:93:6a:e4:ba:62:6a:4f:dc: bd:27:13:ca:14:38:0a:18:2c:21:62:c6:2b:57:b8:e1: eb:ab:6a:70:b2:e5:98:a2:8c:50:64:64:fd:d0:40:c2: 6d:99:c4:ad:99:ae:42:2e:aa:b9:99:94:60:ba:ec:8e: e6:0d:14:ac:96:81:b7:f5:63:ab:ca:f3:5e:77:82:61: 55:7e:34:81:9e:61:1b:22:69:d2:75:ee:e2:7e:5f:19: c0:4f:50:2e:0f:88:dd:9c:5d:0d:83:14:be:60:5a:d9: 31:6a:55:fb:b2:96:cc:98:c5:ea:04:71:e6:a2:9e:63: 85:1a:3b:4a:e6:5e:a8:1d:72:52:1a:80:89:94:36:88: 30:76:80:cd:9c:8a:93:d5:72:77:ab:3a:da:1e:87:f3: 21:f3:63:dc:2d:5e:e3:8e:e5:d7:c5:ac:1b:88:e1:9f: 48:46:ab:44:c2:9d:aa:2e:14:df:82:13:9e:d8:11:77: 26:4f:a1:dc:0b:2e:df:1a:6b:0f:10:95:2f:38:88:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:49:40:d5:a7:7c:75:73:d6:04:bc:8b:cb:67:95:ac: 41:cc:49:1e:db:6d:42:8d:21:7a:df:3e:02:49:b0:af: 6f:a5:9c:15:d3:ab:81:07:ee:72:63:ae:7c:c4:0c:9c: fd:77:f0:ec:58:24:30:41:5f:0a:42:45:53:9a:b4:ce: 86:9e:c3:b2:1e:f3:19:b2:22:4f:a2:9a:bc:f3:1a:85: 18:d1:9a:43:d3:a8:b2:02:df:43:d8:08:11:52:02:91: e6:49:8c:d9:8d:1b:fc:f8:9b:e9:5b:d4:fa:fa:8d:c5: eb:41:76:03:ea:c7:a1:25:5b:cc:3c:e4:bc:91:6e:e2: 05:f9:24:b8:65:6e:52:0c:77:ac:6d:14:1a:0e:49:5c: 65:cc:cf:00:cd:34:6e:bf:86:fc:b3:e2:6f:71:36:a1: 43:45:d5:8c:f3:4d:bd:65:b9:93:50:a9:a4:23:a0:11: e0:ae:d8:35:f7:ff:66:fa:ec:97:ee:93:7a:87:b6:62: e8:b4:fe:45:e3:18:b1:dd:0c:1e:f5:fa:1f:e5:85:db: 2a:c5:cf:47:9b:05:ba:71:f0:08:d7:4c:24:fe:e1:c1: 21:93:aa:db:c7:1d:db:b0:f1:43:f9:28:75:aa:ef:7a: 1e:4a:59:96:8b:73:33:f6:1b:82:ea:94:e8:78:86:b2 Fingerprint (SHA-256): 48:31:CD:C6:1A:6A:46:C9:A6:AF:57:2D:66:04:38:44:7A:59:9B:D2:78:13:C3:E3:15:FF:5C:6E:C0:45:27:69 Fingerprint (SHA1): A2:EB:05:C8:3B:C9:22:1F:B3:D9:76:C8:1D:9A:49:F5:88:7E:77:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #2929: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145796 (0x49158004) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:02:03 2024 Not After : Wed Dec 26 15:02:03 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:b8:cc:31:b0:5e:01:e5:1e:36:68:36:17:ce:d9:cd: 90:3c:30:ce:93:2f:ae:63:08:c9:68:be:b9:81:52:84: 82:be:21:dd:02:e5:51:2a:1e:bc:04:96:41:dc:e0:37: 6d:42:10:2a:fc:52:13:64:37:cf:31:29:a0:5b:11:c5: 25:77:66:70:4b:7d:65:62:35:fc:d0:ca:6a:37:6e:cb: 83:3a:a2:41:5d:cf:10:b9:15:7d:6f:f8:ec:9d:9d:f0: 85:fe:3e:2d:76:cd:ed:ef:43:a8:b7:e8:78:6a:95:40: 5d:28:45:4b:a6:21:30:87:bc:14:23:6e:78:fc:f6:7f: f0:c8:5f:d9:99:e4:41:c8:aa:33:00:7b:d9:7e:40:08: 3f:47:ac:5d:27:2a:c2:5d:8d:56:a5:1b:c2:6c:91:04: f8:3d:24:73:01:4f:5b:9b:45:98:0b:2b:6a:57:67:51: 0d:f0:08:9c:c7:e6:07:9d:8f:67:b6:ad:fa:c5:c1:e5: 3b:3a:a8:79:cc:80:5c:01:7a:d3:40:79:ca:a3:0b:1e: 1c:24:c5:3b:83:4b:f6:84:ce:76:76:91:ff:48:b4:23: 1d:2d:8b:c0:10:f7:53:db:23:d7:b6:45:eb:2a:4f:40: 06:24:59:d7:bf:4f:a9:c5:78:37:62:77:fb:1d:77:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:b9:e3:8d:a9:8e:9d:88:ce:ba:8d:49:1e:92:97:92: fe:df:3c:88:a8:f9:a9:f7:c4:fe:c9:7e:db:ab:2a:f2: 3b:ef:85:7d:4d:c6:4d:77:4b:26:b9:23:0d:42:40:78: 85:61:91:2e:62:e3:1e:46:ef:1e:15:d6:f5:4e:70:d2: 7c:d6:67:e3:71:81:2e:4a:10:3c:2c:dc:f4:17:96:22: 05:1e:05:52:56:3b:68:20:8d:d0:99:6d:da:f1:bf:b7: 47:29:4e:76:2d:bf:37:95:f1:15:1c:ff:c2:bb:75:9f: 17:8d:d9:8a:2b:a9:cf:21:59:56:c1:28:e0:cf:8c:c0: f0:f5:6e:52:3f:17:5e:29:ec:15:9e:4b:6b:da:4e:13: 66:10:b6:56:ff:7b:19:0b:31:5e:db:92:07:49:c0:5f: cc:bd:95:bc:c5:dd:95:f2:2c:f3:c4:16:2f:f2:1a:35: 48:0e:4c:24:07:74:f8:27:27:de:c4:0d:b6:18:8d:7e: 49:e4:3f:a7:04:bb:ee:a1:82:01:50:08:e8:b7:bc:f2: b7:5d:aa:b3:8b:ee:f1:4d:9f:3d:03:ad:3f:c4:3b:fe: 1e:f0:bc:79:5e:24:94:81:17:c4:09:ad:63:ef:6d:a2: 29:a9:b1:2c:43:07:b8:ea:71:33:7d:c7:19:8c:ed:59 Fingerprint (SHA-256): D5:DC:06:2A:10:77:29:41:D5:DD:BF:C0:A6:C1:BD:2B:60:5D:0C:7A:69:62:6C:A4:54:1F:C2:5E:55:26:06:B9 Fingerprint (SHA1): 5D:15:89:74:CA:54:ED:C6:9E:55:98:A3:D3:4C:31:00:BE:B0:6A:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2930: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145796 (0x49158004) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:02:03 2024 Not After : Wed Dec 26 15:02:03 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:b8:cc:31:b0:5e:01:e5:1e:36:68:36:17:ce:d9:cd: 90:3c:30:ce:93:2f:ae:63:08:c9:68:be:b9:81:52:84: 82:be:21:dd:02:e5:51:2a:1e:bc:04:96:41:dc:e0:37: 6d:42:10:2a:fc:52:13:64:37:cf:31:29:a0:5b:11:c5: 25:77:66:70:4b:7d:65:62:35:fc:d0:ca:6a:37:6e:cb: 83:3a:a2:41:5d:cf:10:b9:15:7d:6f:f8:ec:9d:9d:f0: 85:fe:3e:2d:76:cd:ed:ef:43:a8:b7:e8:78:6a:95:40: 5d:28:45:4b:a6:21:30:87:bc:14:23:6e:78:fc:f6:7f: f0:c8:5f:d9:99:e4:41:c8:aa:33:00:7b:d9:7e:40:08: 3f:47:ac:5d:27:2a:c2:5d:8d:56:a5:1b:c2:6c:91:04: f8:3d:24:73:01:4f:5b:9b:45:98:0b:2b:6a:57:67:51: 0d:f0:08:9c:c7:e6:07:9d:8f:67:b6:ad:fa:c5:c1:e5: 3b:3a:a8:79:cc:80:5c:01:7a:d3:40:79:ca:a3:0b:1e: 1c:24:c5:3b:83:4b:f6:84:ce:76:76:91:ff:48:b4:23: 1d:2d:8b:c0:10:f7:53:db:23:d7:b6:45:eb:2a:4f:40: 06:24:59:d7:bf:4f:a9:c5:78:37:62:77:fb:1d:77:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:b9:e3:8d:a9:8e:9d:88:ce:ba:8d:49:1e:92:97:92: fe:df:3c:88:a8:f9:a9:f7:c4:fe:c9:7e:db:ab:2a:f2: 3b:ef:85:7d:4d:c6:4d:77:4b:26:b9:23:0d:42:40:78: 85:61:91:2e:62:e3:1e:46:ef:1e:15:d6:f5:4e:70:d2: 7c:d6:67:e3:71:81:2e:4a:10:3c:2c:dc:f4:17:96:22: 05:1e:05:52:56:3b:68:20:8d:d0:99:6d:da:f1:bf:b7: 47:29:4e:76:2d:bf:37:95:f1:15:1c:ff:c2:bb:75:9f: 17:8d:d9:8a:2b:a9:cf:21:59:56:c1:28:e0:cf:8c:c0: f0:f5:6e:52:3f:17:5e:29:ec:15:9e:4b:6b:da:4e:13: 66:10:b6:56:ff:7b:19:0b:31:5e:db:92:07:49:c0:5f: cc:bd:95:bc:c5:dd:95:f2:2c:f3:c4:16:2f:f2:1a:35: 48:0e:4c:24:07:74:f8:27:27:de:c4:0d:b6:18:8d:7e: 49:e4:3f:a7:04:bb:ee:a1:82:01:50:08:e8:b7:bc:f2: b7:5d:aa:b3:8b:ee:f1:4d:9f:3d:03:ad:3f:c4:3b:fe: 1e:f0:bc:79:5e:24:94:81:17:c4:09:ad:63:ef:6d:a2: 29:a9:b1:2c:43:07:b8:ea:71:33:7d:c7:19:8c:ed:59 Fingerprint (SHA-256): D5:DC:06:2A:10:77:29:41:D5:DD:BF:C0:A6:C1:BD:2B:60:5D:0C:7A:69:62:6C:A4:54:1F:C2:5E:55:26:06:B9 Fingerprint (SHA1): 5D:15:89:74:CA:54:ED:C6:9E:55:98:A3:D3:4C:31:00:BE:B0:6A:49 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #2931: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2932: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145799 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2933: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2934: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2935: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2936: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145800 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2937: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2938: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #2939: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2940: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145801 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2941: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2942: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #2943: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2944: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1226145802 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2945: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2946: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #2947: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2948: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1226145803 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2949: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2950: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #2951: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2952: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1226145804 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2953: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2954: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #2955: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2956: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1226145805 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2957: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2958: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #2959: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #2960: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #2961: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #2962: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #2963: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145799 (0x49158007) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:07 2024 Not After : Wed Dec 26 15:02:07 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:42:d8:59:5b:6c:ae:67:af:09:fd:ed:ae:65:de:c6: 0d:bc:d7:e5:fc:cf:5e:fd:d9:75:ca:d4:73:e9:a3:81: c8:1e:ca:35:bc:ef:1e:49:95:ce:c1:6a:28:b7:59:76: 1a:ef:a4:ce:93:76:ea:19:ea:80:b5:5b:1c:67:99:58: 90:fb:b4:85:91:8f:84:21:00:b5:0c:2b:6f:31:13:f0: 6e:1a:af:c4:c2:53:c1:38:0e:a5:84:4c:d7:78:9d:d7: 13:0d:a2:f8:c2:c6:e5:b3:46:83:64:f9:1c:74:7a:51: df:81:e2:c6:2c:75:8e:6f:b7:ea:18:ab:7d:6b:ea:53: 88:a4:85:9a:12:ec:cd:c0:75:76:e4:4e:2a:dd:12:10: c9:48:ae:6e:de:aa:b8:79:6c:da:d5:8d:ac:17:bb:72: 8a:a4:5e:4f:f7:3c:5d:3a:92:01:2e:86:b1:a7:6d:fe: 48:76:38:77:80:d5:0c:fd:01:ef:d5:0c:3a:3d:0b:0a: bb:53:b6:e0:bf:d2:5c:c5:c9:8f:67:7d:92:51:5c:88: c8:1f:22:69:a0:d3:f7:84:7d:a5:47:6e:7d:f1:79:51: f7:4d:c2:f9:15:3c:6e:bc:5d:38:16:01:a7:75:74:72: 16:ca:90:01:eb:fd:ff:6f:3c:2e:b0:f8:61:17:50:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:40:09:27:3b:ed:a2:db:aa:f1:12:78:9d:f8:83:2c: 86:42:d1:c4:78:6d:e8:0d:6d:37:86:04:af:cc:0e:4d: 32:d9:31:7a:3e:f4:b8:47:ca:11:4e:dd:82:0f:63:3c: 30:fd:71:73:68:53:bb:df:f6:fc:77:88:41:98:16:f7: 56:ab:c4:05:b5:0c:2f:79:61:ee:f9:dd:9f:0b:f7:bd: a9:13:8a:91:d5:24:7f:36:4d:d0:3d:86:bd:77:b6:54: f3:fc:19:d9:93:7e:31:e8:41:84:03:5c:70:3f:e6:15: 6a:4e:c8:fe:34:17:71:fa:c1:00:ce:6f:09:98:0b:57: 04:dc:9f:5b:f1:e4:8a:92:65:57:06:d8:74:16:94:89: 42:4a:9c:d1:db:b3:d0:cb:c9:d1:e0:61:14:6e:a0:ff: 40:d7:65:e0:a8:59:dc:54:44:eb:78:b3:0d:a5:a6:fc: dc:d5:3f:cb:30:ea:6d:08:85:32:50:6e:14:3b:4f:34: 22:29:a8:03:24:96:2c:d8:81:40:c1:e2:59:f1:db:8f: 50:38:a1:c2:51:fb:cf:da:19:0b:7d:f0:81:96:a3:0b: 3f:5c:18:a8:b5:41:b5:b5:43:1f:33:a6:a4:04:4d:e5: 80:e5:ff:da:a1:16:9f:d4:01:2e:5f:3f:9f:49:40:06 Fingerprint (SHA-256): 44:FA:3D:17:3A:4C:62:94:E2:64:9F:B6:92:41:9C:C9:43:F7:66:5C:23:2F:FE:5D:C6:72:0E:7E:C3:D0:EC:70 Fingerprint (SHA1): 92:3F:DC:8F:7F:B5:C2:D7:D7:5C:FC:39:F2:3B:F4:70:49:62:C0:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2964: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2965: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2966: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2967: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145799 (0x49158007) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:07 2024 Not After : Wed Dec 26 15:02:07 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:42:d8:59:5b:6c:ae:67:af:09:fd:ed:ae:65:de:c6: 0d:bc:d7:e5:fc:cf:5e:fd:d9:75:ca:d4:73:e9:a3:81: c8:1e:ca:35:bc:ef:1e:49:95:ce:c1:6a:28:b7:59:76: 1a:ef:a4:ce:93:76:ea:19:ea:80:b5:5b:1c:67:99:58: 90:fb:b4:85:91:8f:84:21:00:b5:0c:2b:6f:31:13:f0: 6e:1a:af:c4:c2:53:c1:38:0e:a5:84:4c:d7:78:9d:d7: 13:0d:a2:f8:c2:c6:e5:b3:46:83:64:f9:1c:74:7a:51: df:81:e2:c6:2c:75:8e:6f:b7:ea:18:ab:7d:6b:ea:53: 88:a4:85:9a:12:ec:cd:c0:75:76:e4:4e:2a:dd:12:10: c9:48:ae:6e:de:aa:b8:79:6c:da:d5:8d:ac:17:bb:72: 8a:a4:5e:4f:f7:3c:5d:3a:92:01:2e:86:b1:a7:6d:fe: 48:76:38:77:80:d5:0c:fd:01:ef:d5:0c:3a:3d:0b:0a: bb:53:b6:e0:bf:d2:5c:c5:c9:8f:67:7d:92:51:5c:88: c8:1f:22:69:a0:d3:f7:84:7d:a5:47:6e:7d:f1:79:51: f7:4d:c2:f9:15:3c:6e:bc:5d:38:16:01:a7:75:74:72: 16:ca:90:01:eb:fd:ff:6f:3c:2e:b0:f8:61:17:50:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:40:09:27:3b:ed:a2:db:aa:f1:12:78:9d:f8:83:2c: 86:42:d1:c4:78:6d:e8:0d:6d:37:86:04:af:cc:0e:4d: 32:d9:31:7a:3e:f4:b8:47:ca:11:4e:dd:82:0f:63:3c: 30:fd:71:73:68:53:bb:df:f6:fc:77:88:41:98:16:f7: 56:ab:c4:05:b5:0c:2f:79:61:ee:f9:dd:9f:0b:f7:bd: a9:13:8a:91:d5:24:7f:36:4d:d0:3d:86:bd:77:b6:54: f3:fc:19:d9:93:7e:31:e8:41:84:03:5c:70:3f:e6:15: 6a:4e:c8:fe:34:17:71:fa:c1:00:ce:6f:09:98:0b:57: 04:dc:9f:5b:f1:e4:8a:92:65:57:06:d8:74:16:94:89: 42:4a:9c:d1:db:b3:d0:cb:c9:d1:e0:61:14:6e:a0:ff: 40:d7:65:e0:a8:59:dc:54:44:eb:78:b3:0d:a5:a6:fc: dc:d5:3f:cb:30:ea:6d:08:85:32:50:6e:14:3b:4f:34: 22:29:a8:03:24:96:2c:d8:81:40:c1:e2:59:f1:db:8f: 50:38:a1:c2:51:fb:cf:da:19:0b:7d:f0:81:96:a3:0b: 3f:5c:18:a8:b5:41:b5:b5:43:1f:33:a6:a4:04:4d:e5: 80:e5:ff:da:a1:16:9f:d4:01:2e:5f:3f:9f:49:40:06 Fingerprint (SHA-256): 44:FA:3D:17:3A:4C:62:94:E2:64:9F:B6:92:41:9C:C9:43:F7:66:5C:23:2F:FE:5D:C6:72:0E:7E:C3:D0:EC:70 Fingerprint (SHA1): 92:3F:DC:8F:7F:B5:C2:D7:D7:5C:FC:39:F2:3B:F4:70:49:62:C0:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #2968: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #2969: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #2970: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145806 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2971: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #2972: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #2973: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2974: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145807 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #2975: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2976: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #2977: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2978: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1226145808 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2979: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2980: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #2981: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2982: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1226145809 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2983: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2984: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #2985: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2986: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1226145810 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2987: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2988: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #2989: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2990: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1226145811 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2991: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2992: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #2993: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2994: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1226145812 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2995: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #2996: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #2997: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #2998: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1226145813 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #2999: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3000: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #3001: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3002: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1226145814 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3003: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3004: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #3005: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3006: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1226145815 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3007: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3008: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3009: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3010: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1226145816 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3011: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3012: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #3013: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3014: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1226145817 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3015: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3016: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #3017: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3018: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1226145818 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3019: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3020: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3021: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3022: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1226145819 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3023: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3024: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #3025: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3026: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1226145820 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3027: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3028: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #3029: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3030: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1226145821 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3031: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3032: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #3033: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3034: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1226145822 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3035: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3036: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #3037: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3038: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1226145823 --extCP --extIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #3039: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3040: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #3041: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3042: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1226145824 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3043: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3044: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #3045: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3046: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1226145825 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3047: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3048: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #3049: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3050: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1226145826 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3051: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3052: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #3053: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3054: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1226145827 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3055: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3056: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #3057: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3058: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1226145828 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3059: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3060: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #3061: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3062: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1226145829 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3063: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3064: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #3065: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3066: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1226145830 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3067: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3068: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #3069: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3070: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1226145831 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3071: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3072: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #3073: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3074: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1226145832 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3075: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3076: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #3077: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3078: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1226145833 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3079: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3080: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #3081: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3082: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1226145834 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3083: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3084: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #3085: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3086: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1226145835 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3087: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3088: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3089: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3090: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3091: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3092: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3093: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3094: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3095: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3096: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3097: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3098: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3099: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3100: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3101: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3102: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3103: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3104: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3105: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3106: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3107: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3108: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3109: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3110: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3111: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145806 (0x4915800e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:02:13 2024 Not After : Wed Dec 26 15:02:13 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:84:19:c0:10:7e:f2:d1:15:a4:67:7f:2d:8d:81:bf: 7b:d7:c2:1e:95:7e:03:0c:d9:7a:f8:33:cc:38:1a:81: 9f:92:50:34:39:53:27:ea:f8:29:9b:76:88:7c:0f:8b: ed:b5:ca:b7:c4:f7:da:e9:23:bc:8c:57:08:0f:a6:b7: f4:ce:84:9e:c3:52:13:db:29:fd:3b:50:d5:10:d0:0f: 19:b8:dd:4a:1a:78:56:90:3f:d2:83:b0:f8:01:27:07: cb:b1:04:d6:fe:87:f9:a8:38:16:b7:7a:e4:46:bf:a8: 52:51:17:68:41:5c:97:48:2b:05:75:e8:d5:db:41:27: 9e:1c:02:e5:a9:8f:25:80:e3:48:39:be:f2:20:8d:7c: 59:97:ce:35:c3:45:07:74:90:e4:f4:41:21:3d:bb:0b: f0:a8:6f:87:f2:95:2a:7e:9d:a8:55:a1:2c:2f:f6:cc: d1:fd:34:e9:89:30:de:f2:5b:5b:6f:2a:e9:e5:fe:ad: d9:50:36:d8:8a:2c:95:c5:55:24:0f:46:8b:10:5b:c7: 85:82:7c:5a:c7:0e:4d:70:35:45:64:2a:18:03:d6:d7: 33:e2:12:8e:17:a6:91:bc:ff:f8:b0:c2:89:d6:97:c1: 5a:75:27:bd:69:2c:62:2a:cd:90:3f:de:51:ba:96:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:ab:fd:40:b5:70:1a:fc:e5:20:52:c8:55:65:dc:f6: 31:55:bb:9d:69:ea:59:fa:4b:35:06:e6:d3:1c:14:39: 09:34:65:8b:71:82:3f:b3:50:23:3e:e6:bc:32:4a:50: 7c:62:08:0f:8e:77:e5:83:60:1e:b4:85:12:c7:1f:f6: 73:5e:eb:76:3c:42:9c:29:9d:26:f6:4e:f2:33:31:46: ab:ce:4b:7b:87:d5:50:ff:2c:03:84:96:34:96:ee:23: 88:52:67:16:12:4c:80:48:99:a1:a3:e5:df:93:4b:90: 1c:15:dd:3b:e2:58:fb:bd:73:ea:ea:b5:70:83:ab:32: d1:5b:89:7b:64:5c:de:d5:ec:01:de:00:02:1e:6f:1c: 91:71:89:8c:6b:1a:26:fb:cb:7c:22:f4:b5:8e:d1:b6: 36:49:6d:12:f2:c3:fb:11:c0:c2:cb:19:5b:97:4d:08: 69:94:85:61:7a:33:1c:5d:a7:7a:8c:aa:c0:35:10:d7: f5:ed:36:20:99:3d:34:3a:34:ed:55:2b:89:39:31:63: 95:1a:ed:d0:60:48:b3:be:a8:7a:bf:5a:8d:61:de:68: 21:ec:9a:c8:18:ed:fc:da:ae:00:50:3d:3c:de:f9:11: 19:ac:ac:89:dd:a6:b1:14:4d:b3:72:5e:2e:32:a3:c6 Fingerprint (SHA-256): 96:84:48:78:CF:4D:16:47:23:1C:9D:07:CC:4D:CC:2F:B6:86:87:DA:BA:F4:7E:88:59:CC:7C:25:13:FB:48:F4 Fingerprint (SHA1): 22:06:BF:D4:0F:E4:EB:EA:F3:7C:E1:DB:13:AC:33:59:A9:9C:69:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #3112: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3113: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3114: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145836 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3115: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3116: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #3117: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3118: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1226145837 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3119: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3120: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #3121: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3122: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1226145838 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3123: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3124: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #3125: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3126: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1226145839 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3127: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3128: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #3129: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3130: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1226145840 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3131: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3132: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #3133: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3134: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1226145841 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3135: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3136: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #3137: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3138: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1226145842 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3139: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3140: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3141: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145836 (0x4915802c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:41 2024 Not After : Wed Dec 26 15:02:41 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4d:87:f8:62:04:02:a4:d8:da:3d:1b:6f:80:3e:29: 41:04:38:6f:08:7a:c9:ae:f7:cf:cb:ed:a8:72:87:58: 47:19:b4:23:3a:53:23:1d:10:6f:66:a9:6c:fd:fc:ba: 0e:e3:37:73:bd:32:d0:69:31:7c:07:bb:81:c4:e0:fb: 8c:e2:6b:9a:19:f5:2a:c1:c5:35:a6:06:e6:64:5c:15: d9:97:ae:de:f3:50:ce:9e:ae:fb:c4:55:54:8a:26:b0: df:f4:72:74:0b:fd:a5:8c:52:88:b4:82:90:ec:ec:aa: 0e:8f:1d:c5:de:78:a2:e3:60:4e:8e:0c:9d:8b:b9:5c: 18:8e:6f:bd:cd:38:55:eb:48:98:57:fe:49:eb:86:00: f4:c7:5e:55:a5:9b:d2:aa:ad:0e:69:d5:bb:95:75:43: 38:55:29:ed:77:0e:20:0b:cc:57:c3:4f:d9:00:e5:af: 0a:1f:88:7d:de:b1:ec:66:98:be:a3:c0:9a:a9:bd:40: 71:90:a9:4d:da:cb:a9:b4:28:c8:2a:ae:38:35:8b:6f: f6:b6:85:06:bf:69:23:76:47:85:db:6f:aa:7c:8e:b7: b2:5f:ac:9a:5b:8e:aa:54:7f:3b:54:06:79:22:b0:75: e8:27:01:93:13:4f:c1:4d:ed:e9:10:aa:4b:97:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:49:8c:be:39:60:93:7c:87:0c:ca:6d:8a:95:54:a0: f5:11:ca:18:e0:d8:f2:9c:6e:cb:b9:f1:6f:49:73:fe: 1f:41:68:00:87:12:1b:ac:22:15:62:e7:25:64:4e:f7: 69:fe:30:4e:da:d8:02:45:72:b5:a5:67:1e:37:2b:d6: 3b:89:0e:20:f4:d9:fe:f4:f7:0f:03:f3:24:f7:58:47: 98:33:61:33:6e:84:dd:db:6f:e1:c5:3c:16:a4:00:ea: 9e:68:78:fd:66:48:56:ab:3c:0e:81:e3:14:c4:ff:43: 1a:9d:2f:b9:0d:cc:d5:ea:02:c7:cb:66:42:02:38:f3: fa:29:91:10:b9:20:f5:03:a1:16:e2:c3:15:d3:f3:49: 5d:7a:72:6e:25:b3:59:cc:2b:36:91:72:98:dc:b3:16: 62:46:ec:1e:99:b1:a9:5f:d2:32:79:20:5a:0a:e8:38: 01:a7:4c:c0:9a:3b:79:30:76:4e:82:db:ef:69:43:b2: b7:18:0c:40:d4:ec:a5:42:5f:8f:ea:71:12:8d:ba:e2: 93:ec:dc:cc:39:00:e5:36:a6:3a:5a:8d:a3:a4:3f:a5: d8:ca:63:e8:42:30:73:c6:a2:82:e9:b1:fc:ce:54:43: 21:50:a5:9a:44:8c:b4:72:0e:49:b3:37:81:21:25:5a Fingerprint (SHA-256): 95:5E:28:34:03:20:A3:6F:D3:F0:8E:95:D2:AC:C2:F3:55:14:01:DC:FF:1A:B1:57:66:70:37:7A:FA:C6:A3:10 Fingerprint (SHA1): 67:98:86:2F:4E:B0:B3:FF:2B:74:AC:57:89:62:75:9E:2C:C0:05:38 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3142: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3143: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3144: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3145: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145836 (0x4915802c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:41 2024 Not After : Wed Dec 26 15:02:41 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:4d:87:f8:62:04:02:a4:d8:da:3d:1b:6f:80:3e:29: 41:04:38:6f:08:7a:c9:ae:f7:cf:cb:ed:a8:72:87:58: 47:19:b4:23:3a:53:23:1d:10:6f:66:a9:6c:fd:fc:ba: 0e:e3:37:73:bd:32:d0:69:31:7c:07:bb:81:c4:e0:fb: 8c:e2:6b:9a:19:f5:2a:c1:c5:35:a6:06:e6:64:5c:15: d9:97:ae:de:f3:50:ce:9e:ae:fb:c4:55:54:8a:26:b0: df:f4:72:74:0b:fd:a5:8c:52:88:b4:82:90:ec:ec:aa: 0e:8f:1d:c5:de:78:a2:e3:60:4e:8e:0c:9d:8b:b9:5c: 18:8e:6f:bd:cd:38:55:eb:48:98:57:fe:49:eb:86:00: f4:c7:5e:55:a5:9b:d2:aa:ad:0e:69:d5:bb:95:75:43: 38:55:29:ed:77:0e:20:0b:cc:57:c3:4f:d9:00:e5:af: 0a:1f:88:7d:de:b1:ec:66:98:be:a3:c0:9a:a9:bd:40: 71:90:a9:4d:da:cb:a9:b4:28:c8:2a:ae:38:35:8b:6f: f6:b6:85:06:bf:69:23:76:47:85:db:6f:aa:7c:8e:b7: b2:5f:ac:9a:5b:8e:aa:54:7f:3b:54:06:79:22:b0:75: e8:27:01:93:13:4f:c1:4d:ed:e9:10:aa:4b:97:6d:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 33:49:8c:be:39:60:93:7c:87:0c:ca:6d:8a:95:54:a0: f5:11:ca:18:e0:d8:f2:9c:6e:cb:b9:f1:6f:49:73:fe: 1f:41:68:00:87:12:1b:ac:22:15:62:e7:25:64:4e:f7: 69:fe:30:4e:da:d8:02:45:72:b5:a5:67:1e:37:2b:d6: 3b:89:0e:20:f4:d9:fe:f4:f7:0f:03:f3:24:f7:58:47: 98:33:61:33:6e:84:dd:db:6f:e1:c5:3c:16:a4:00:ea: 9e:68:78:fd:66:48:56:ab:3c:0e:81:e3:14:c4:ff:43: 1a:9d:2f:b9:0d:cc:d5:ea:02:c7:cb:66:42:02:38:f3: fa:29:91:10:b9:20:f5:03:a1:16:e2:c3:15:d3:f3:49: 5d:7a:72:6e:25:b3:59:cc:2b:36:91:72:98:dc:b3:16: 62:46:ec:1e:99:b1:a9:5f:d2:32:79:20:5a:0a:e8:38: 01:a7:4c:c0:9a:3b:79:30:76:4e:82:db:ef:69:43:b2: b7:18:0c:40:d4:ec:a5:42:5f:8f:ea:71:12:8d:ba:e2: 93:ec:dc:cc:39:00:e5:36:a6:3a:5a:8d:a3:a4:3f:a5: d8:ca:63:e8:42:30:73:c6:a2:82:e9:b1:fc:ce:54:43: 21:50:a5:9a:44:8c:b4:72:0e:49:b3:37:81:21:25:5a Fingerprint (SHA-256): 95:5E:28:34:03:20:A3:6F:D3:F0:8E:95:D2:AC:C2:F3:55:14:01:DC:FF:1A:B1:57:66:70:37:7A:FA:C6:A3:10 Fingerprint (SHA1): 67:98:86:2F:4E:B0:B3:FF:2B:74:AC:57:89:62:75:9E:2C:C0:05:38 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #3146: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3147: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3148: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3149: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145843 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3150: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3151: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3152: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3153: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145844 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3154: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3155: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3156: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3157: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145845 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3158: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3159: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3160: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3161: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145846 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3162: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3163: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3164: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3165: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3166: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3167: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145843 (0x49158033) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:47 2024 Not After : Wed Dec 26 15:02:47 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:a4:18:d5:8f:65:dc:52:80:7c:8c:b5:e5:b8:13:84: 02:f1:b4:72:04:80:b0:b1:b1:bf:15:93:04:4d:98:be: 99:7b:f9:b0:59:57:9b:ec:c4:ec:74:3e:fc:f7:b6:f9: 73:31:4a:bf:26:47:da:d5:4f:c9:3c:22:c8:af:fc:7e: c5:f4:47:d8:c0:c7:1a:63:07:d1:db:e0:40:e9:b1:7e: 3e:22:27:2d:dc:62:ba:51:59:a1:85:f8:98:4a:d0:99: 9b:1c:70:79:35:19:1d:24:ac:6e:9c:b1:a3:5c:5d:be: 8d:b7:15:51:dd:3d:c5:8e:bd:25:5f:9f:f5:10:f5:ba: 91:40:37:38:38:2f:5f:4d:b9:2d:f9:42:e6:88:ca:00: cb:5b:14:cc:ad:04:cc:35:67:f3:f6:27:88:d1:90:ca: 57:f3:b3:5b:2f:1f:51:f8:16:54:3e:ee:f2:7c:1f:90: 1f:46:86:9f:21:2d:7a:ba:e8:5f:e7:87:e2:a0:ad:98: de:af:21:1e:f5:c8:17:9a:96:fd:db:a7:a0:a8:cb:22: 7c:2b:b0:1d:7c:32:67:ac:f7:bd:ab:c0:0e:1a:5d:9a: 7e:04:63:3b:93:71:d6:86:9d:28:d9:10:91:e4:04:3d: 1f:01:7b:f3:53:4d:e1:f2:d2:8f:20:b7:75:67:09:11 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:61:3a:b1:b8:89:12:a8:50:8e:8a:2c:f1:b7:20:f3: 5e:e4:e6:ee:a1:d2:67:47:22:46:e9:0d:bb:30:dd:9e: 3d:73:af:e9:46:53:e1:9d:67:4a:2a:36:ed:35:ff:88: cd:b2:dd:e1:f0:cb:70:fa:60:0f:de:06:09:4b:5a:a7: 0d:9b:b7:7c:7f:ab:06:af:00:cc:d7:ae:f1:a9:4c:97: 44:e7:86:f2:1a:25:a8:45:c6:96:83:b7:03:86:f1:4b: b9:1a:aa:1d:20:76:0d:9a:88:9a:9b:85:d3:b8:6a:3f: 9a:c5:17:9a:b6:d1:57:da:4a:59:f0:bc:18:ec:15:fb: 00:25:32:b1:46:59:fe:9a:9b:ad:75:46:17:5c:22:00: a9:24:ad:44:d3:0d:31:89:14:59:05:4d:4a:e8:7c:f7: f8:74:94:65:6b:3e:82:e8:12:91:a8:ea:02:21:fc:a3: 2f:3b:db:8c:b3:21:df:59:e0:89:12:15:93:00:60:e2: b5:6e:08:bb:dc:49:61:93:27:9e:9a:72:3f:04:41:23: cc:5c:10:2a:78:38:e6:23:87:36:75:b3:66:79:8a:3d: a6:e0:9c:71:47:97:df:6b:a4:b4:96:ac:8d:5c:89:19: bc:b9:b0:55:85:58:2a:73:23:f0:16:21:c2:2e:2f:ff Fingerprint (SHA-256): 11:E6:BC:8F:C3:11:B9:84:B8:84:BF:3C:DB:95:A8:8A:76:94:1D:FB:0D:44:A4:94:81:72:5B:68:E0:18:00:DB Fingerprint (SHA1): 18:9B:8F:C9:3B:25:E5:FD:3B:20:FF:83:4C:3F:95:55:A7:05:E8:0F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3168: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3169: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3170: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145844 (0x49158034) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:48 2024 Not After : Wed Dec 26 15:02:48 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:33:fd:8b:3a:cd:3e:c9:62:70:f7:a1:59:03:4c:38: ef:04:36:30:e7:ce:71:90:d9:44:89:d5:bc:ab:c5:d5: 8f:7b:6b:c1:8e:5a:1e:5e:71:5b:95:19:09:47:8d:72: 51:3a:a7:ec:3c:18:96:e5:14:91:89:c4:d2:85:26:86: b9:d3:0c:ee:b3:66:f2:4a:5b:0d:da:cc:11:fc:3b:70: 3a:cd:ad:7b:92:83:46:44:36:b5:ca:60:8d:ff:06:f6: 87:23:2d:b1:ec:c1:c4:a5:82:66:18:e5:00:1a:93:a4: 63:99:67:88:bf:cd:ca:34:4d:4f:2f:cd:f3:1f:1e:2c: 40:03:9d:45:80:54:4a:b9:07:78:ab:3e:e1:5d:d9:28: fc:61:53:e3:96:e4:5c:9b:db:2f:76:cc:70:73:ba:b7: a7:84:3f:79:f0:a7:10:88:2a:3b:c3:1e:e6:3f:9c:cf: 94:e4:3a:2c:72:42:90:6f:6c:b9:cc:53:cc:d8:75:24: 3a:97:cc:ad:44:5c:cb:4e:ba:5d:4e:1b:13:a1:a1:38: cd:a1:cb:57:4e:ea:a5:db:43:95:cc:25:1d:62:59:41: 2c:b5:e4:b2:27:bc:fc:9f:0f:16:9d:54:12:3f:66:2a: 34:8b:b5:8e:74:1d:1d:eb:82:a7:f9:d0:ff:56:ae:2d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:82:97:4c:32:40:06:d9:03:c9:f2:44:e5:be:67:09: 30:78:39:ec:6b:e0:69:25:9c:0f:d6:20:5b:95:f2:9e: 5a:c4:44:11:a1:d5:12:0b:b3:49:6e:7d:96:78:0d:98: 17:8d:23:40:26:34:92:83:85:20:4b:48:14:e4:a2:b6: 21:2d:67:41:63:6b:2c:06:1c:40:3c:97:11:9e:b0:ec: d7:40:18:2c:2a:e1:64:e8:a7:a1:5f:d0:b7:b3:16:9e: cf:24:d6:a1:c7:46:f0:d1:fe:3a:5e:8a:5d:c8:79:12: 29:8b:aa:dd:65:ad:a1:aa:d0:a7:99:0e:cb:d0:4c:7a: 51:82:9d:2d:0a:e3:b0:23:c9:01:00:fe:02:30:fa:d3: 10:43:01:7b:c4:19:0d:75:55:d0:bb:e2:a0:a2:77:19: dc:3c:31:ec:33:eb:01:90:32:b9:4e:f4:89:82:5c:3b: c8:2c:30:14:50:55:cc:2a:be:6b:63:a1:a0:2c:94:8f: 98:fb:32:10:c0:fe:c7:6a:ae:16:46:ce:a8:a9:15:5e: 0f:6c:0b:41:83:2d:2e:d8:69:55:ee:f6:db:02:e7:5b: fb:ab:71:f4:8d:f9:55:74:27:da:6b:35:fc:e8:5d:ea: 63:88:2a:12:a3:99:1f:b6:e6:b8:c3:54:f2:1d:0b:33 Fingerprint (SHA-256): 01:0A:10:ED:6A:28:C7:8E:67:5A:F8:94:D4:3B:A4:72:51:66:3A:27:8F:41:D6:6A:56:D6:29:BF:AA:3F:B3:51 Fingerprint (SHA1): F8:34:CF:36:B2:90:10:96:B7:14:C0:B1:35:DB:49:63:3B:7F:B3:28 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3171: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3172: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145845 (0x49158035) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:02:49 2024 Not After : Wed Dec 26 15:02:49 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:f3:ce:b7:7b:79:8e:8c:cf:a8:e1:29:95:80:b7:b6: d5:91:ce:35:6e:ce:ee:59:d4:29:14:21:c3:77:cf:49: c8:c1:75:03:25:8b:69:b8:14:18:c5:6d:24:5e:1e:f8: 61:83:3f:8e:b8:ae:54:cb:9c:bd:76:14:95:8b:a5:7b: a3:24:a5:e2:6c:f2:5e:8a:b2:44:5d:52:6b:9c:e0:33: 97:42:89:e3:f4:78:7a:43:77:89:5b:66:61:13:1c:de: c2:cc:14:86:28:f5:99:0b:71:36:57:2b:c6:eb:a9:42: f7:fa:f8:dc:0c:f5:d4:b1:65:3e:52:6c:c8:66:61:2d: c8:be:a9:38:69:a4:5b:7e:18:61:e8:50:37:68:87:c4: 4b:32:d1:d8:fb:d9:65:9b:93:f6:77:a6:02:1a:5d:47: 5f:f3:3f:2c:1a:d8:a6:0b:bd:e0:64:06:74:0a:c2:de: 7d:70:a4:b1:d2:03:35:c2:6f:46:de:80:22:b1:e0:47: 49:ed:0b:94:58:d8:7d:c7:72:cf:ab:27:bb:45:60:8b: 32:ff:29:35:0b:c9:1e:3d:80:df:a6:0b:99:10:2d:84: 78:ce:1b:51:a9:cb:7e:e3:d2:11:dc:0a:b2:81:26:cf: af:f7:8f:67:05:5c:98:14:ae:6e:5e:4f:79:c4:d8:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:90:1a:b1:77:3e:33:88:ce:c9:f5:3a:39:99:e4:25: 24:d2:49:e6:46:70:ab:91:c9:b1:7d:96:a0:57:0b:50: cf:5e:7b:26:77:3f:79:6f:1c:37:66:cd:b3:3a:57:e8: 34:77:0d:30:41:15:d8:7a:dc:3d:99:5e:dc:f5:87:cb: fc:46:54:57:86:15:1c:f8:86:17:84:c3:5d:37:32:26: cd:65:03:90:a5:cb:bc:93:0f:c2:cc:6e:d6:e6:89:1c: 64:48:b0:c0:06:4d:1a:ff:15:c1:81:21:bf:dc:4c:c1: 98:96:15:01:5b:81:9d:65:2e:d6:77:dd:48:19:0e:95: ee:d9:fb:c1:cc:87:e5:68:4d:4b:db:b1:f1:d9:8a:63: 9c:e0:17:ff:21:c9:b0:c1:89:f1:29:95:89:6d:62:24: 9b:be:66:20:4d:c9:3a:7c:7f:6e:e5:33:47:ad:e7:c7: e2:89:19:e7:86:23:3e:ab:d4:7e:2c:04:d5:ba:bd:73: a0:f4:49:95:d7:5e:25:10:35:7a:ae:45:c2:ef:10:71: 36:86:63:ae:3e:ee:d9:d9:7f:39:f3:a7:45:ea:3f:8b: cc:a4:07:4a:fd:bb:8b:3d:87:e1:32:a7:e3:63:0a:bf: cb:3e:8e:32:a2:9b:ea:33:d8:dc:bb:15:10:d3:7e:ad Fingerprint (SHA-256): 17:EF:64:2A:BF:36:65:D1:7B:42:F7:5B:12:01:A0:81:CA:CA:A7:84:AD:63:74:A4:54:C1:35:E6:13:A6:AC:9D Fingerprint (SHA1): 75:56:49:A4:AD:D6:1B:A9:4E:0A:9F:F1:F2:D2:BB:FE:1B:29:62:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #3173: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3174: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145847 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3175: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3176: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3177: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3178: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145848 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3179: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3180: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3181: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3182: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145849 --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3183: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3184: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3185: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3186: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1226145850 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3187: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3188: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3189: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3190: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1226145851 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3191: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3192: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3193: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #3194: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #3195: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #3196: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #3197: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145847 (0x49158037) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:52 2024 Not After : Wed Dec 26 15:02:52 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:ca:4c:7a:2a:c0:49:1c:31:88:22:7b:ff:05:06:02: 6a:26:5d:2a:c8:71:5c:46:79:13:18:d4:99:56:6d:13: 88:47:4d:1f:0a:04:23:e6:76:1d:f2:6c:f0:51:39:06: a1:a6:19:4b:8b:2d:6c:bb:ef:02:94:af:d6:7a:57:c8: 38:e7:fa:65:ca:ae:53:c8:6a:07:ae:ea:b3:02:22:6f: d6:a7:96:cb:31:92:69:bd:92:93:f8:aa:84:33:c5:4e: c6:5e:59:a3:12:2a:1a:ce:9a:08:b4:74:4d:05:a2:c0: 2b:3b:3c:4c:8f:e1:0b:4b:a6:4f:4b:13:e0:01:6d:ff: 72:8d:b9:ea:21:11:59:4c:00:9d:a5:49:ba:3d:a6:53: c5:af:92:a1:0f:bf:a0:61:ec:e1:86:7d:fd:27:0e:bc: e1:3b:da:82:22:9f:3a:ff:1d:4f:12:da:4d:e9:85:24: b7:f6:94:4d:32:61:6b:06:dd:20:df:00:80:de:be:55: 4f:b2:cf:bf:17:91:b4:2c:82:f1:14:00:f7:e5:e1:3d: 8e:bd:01:66:89:f5:b4:b8:41:51:2b:4f:f3:1e:6c:a9: 38:93:e7:85:0c:b4:18:47:5f:fe:d1:82:40:87:54:66: 39:0e:e6:fb:36:d5:be:c2:db:05:c3:49:ac:71:e5:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:69:10:27:d0:08:85:ad:74:a1:c3:dd:23:74:c2:32: 3c:46:08:08:66:5d:c6:63:4e:f3:98:4c:e8:79:44:58: 8a:89:11:86:92:ae:e3:30:bc:2a:b7:18:e8:b7:20:91: 7d:9e:da:1b:63:0b:ec:6a:63:cd:ab:9d:79:4c:1b:ef: 3a:a5:46:63:ee:ab:e1:34:d0:28:99:17:ca:39:6d:2b: 1f:98:4e:d4:de:34:77:83:9d:0c:d3:cf:98:15:26:f4: 87:c0:c0:b2:f3:e2:4d:fb:25:c4:c5:a5:54:00:87:65: c4:c1:14:00:cc:52:8f:0f:41:74:91:06:ae:04:d4:a0: e6:89:a0:0d:f2:61:59:1e:30:87:0b:b5:f4:9f:02:04: f4:7a:96:c4:82:c4:50:8e:1d:73:a1:16:8f:ad:c1:8c: 2b:48:25:29:85:1c:b3:be:3d:41:bb:6f:1a:0c:d7:6a: 32:6c:32:28:1a:78:4e:b7:ca:1f:4e:8b:c8:c4:07:5b: a0:f5:e3:58:2d:ae:3e:94:ca:ca:6c:c0:bd:bd:fd:f7: a8:2b:e8:fd:27:17:88:7d:3a:76:ae:33:1a:c7:94:50: 24:7b:64:e3:89:86:23:f0:f7:d0:8b:d2:9b:f5:47:70: 54:9a:a4:ea:e0:9a:d1:d2:6b:8f:fd:f6:ba:2c:8b:06 Fingerprint (SHA-256): 2B:E1:25:C7:05:3C:79:23:5D:EC:D1:0F:58:72:CF:4B:C8:43:28:C1:6A:53:DE:BE:21:B8:9B:06:07:DF:4A:9C Fingerprint (SHA1): E1:3F:82:53:B4:59:38:A3:AE:53:03:19:CB:44:38:FF:A7:86:74:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3198: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3199: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145848 (0x49158038) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:52 2024 Not After : Wed Dec 26 15:02:52 2029 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:75:cd:fe:a7:31:1d:44:47:5d:8f:a6:b6:eb:88:c3: 8e:25:97:d5:fa:9b:ba:59:76:6f:03:4d:cc:ec:8d:a5: 87:e8:16:9e:90:ba:e7:c9:ec:66:1d:9e:73:d2:e4:47: 85:5a:46:79:e0:8f:50:96:c0:19:da:24:f8:b5:22:11: bb:b6:62:07:31:a5:75:10:2c:18:9f:e5:72:f9:3b:ad: 68:08:d1:9e:c6:47:9e:af:2d:7c:75:78:f0:69:09:eb: be:24:e0:af:1b:d5:46:88:ce:92:b2:02:db:fd:66:66: 91:02:7b:80:60:98:1f:9f:fc:19:04:3c:bf:30:bf:09: 1d:c2:9d:3f:56:a8:ea:e0:ff:ac:10:82:9f:2b:d8:9e: 40:45:e3:ea:60:aa:f5:8f:c3:a1:36:16:d8:cc:a3:31: d6:53:67:73:68:7d:08:c3:be:03:48:dc:ea:45:a3:64: 00:77:01:e3:ba:e7:78:77:ed:e0:d2:55:ec:7d:7e:34: c7:35:75:2f:65:7b:4a:31:68:58:25:8a:7d:bd:f9:b1: 9c:89:b0:28:84:b6:46:cc:f2:54:a3:9e:e2:ec:12:a5: 21:e1:60:df:aa:4e:0c:c4:1e:b9:1c:25:f8:30:ca:3d: f7:b4:04:c7:17:81:3b:7d:56:8c:e0:49:3f:dc:16:95 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: cc:53:b1:57:a6:d3:a6:cd:f4:7c:15:03:ce:ec:c1:ee: 42:ae:1f:66:8e:d0:38:b3:9c:82:bb:af:a5:c2:91:e4: f5:26:a6:ed:aa:20:c2:78:83:bc:77:d1:9a:a5:a8:25: be:6b:89:f5:d8:ff:04:6a:a8:2c:d0:4e:fa:4c:f8:d2: 88:2c:a0:88:5a:24:7f:b2:f0:04:af:78:5d:00:98:b9: 23:c0:4f:9d:25:bc:c6:67:3c:5a:9e:2c:6a:c1:bd:77: 6b:68:e6:7d:6b:40:00:80:b0:8a:e6:a7:b3:34:7a:9d: 0e:06:8f:7b:a6:3c:d2:c0:f2:a6:f5:55:73:a1:55:38: f5:65:d4:a7:cd:d5:2e:50:f0:29:7a:e5:3d:44:85:68: 70:44:cf:6d:89:90:17:d2:a3:39:4a:e8:b4:d8:f6:cd: 3b:51:a6:fb:95:ac:b3:35:ce:1f:02:24:b0:32:49:17: 4e:e2:9e:a2:69:06:e5:fe:d2:f6:23:00:8e:38:6a:2b: 58:b0:ea:f5:b9:61:49:db:73:ec:f2:15:45:6f:66:03: 94:19:2c:93:80:f1:c9:b9:5d:fc:0f:c3:d9:9b:49:43: 93:48:52:5a:25:e3:ae:70:bb:aa:28:5e:6f:35:2b:4e: 98:96:ba:ed:04:be:28:cf:df:b3:56:c2:3a:8d:26:6f Fingerprint (SHA-256): E9:D3:BA:5A:5E:4A:5F:D0:50:2B:83:41:A4:6D:42:93:13:5C:B4:12:38:8A:6F:09:09:BE:AC:7E:13:98:3A:2F Fingerprint (SHA1): 68:FC:4C:D1:FF:85:7C:CC:B2:B3:9F:74:EF:84:42:C2:27:6A:DD:F8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3200: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3201: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3202: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145849 (0x49158039) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:02:53 2024 Not After : Wed Dec 26 15:02:53 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:77:3f:3c:90:d4:f1:80:9d:ba:61:ac:b4:39:ae:fb: 4d:a4:1a:df:6d:8b:26:97:05:e0:2d:05:08:3d:86:85: 88:8c:37:98:1d:54:6b:f9:0e:91:6e:5b:c2:d0:fa:4a: 9e:3d:4a:f9:77:a9:45:46:ec:86:06:b7:f7:45:6a:82: 8d:77:43:e6:b2:84:ef:e0:b9:c7:cf:48:a9:18:c4:34: 65:55:09:50:74:c8:84:51:ac:b0:3d:27:2e:d1:a5:73: e0:90:1e:4e:51:64:c6:da:08:b7:be:1f:11:b0:36:09: 86:e8:be:2e:38:d9:12:33:cb:5f:cd:86:f4:4b:1a:3c: bd:35:ac:5f:26:98:73:5d:bc:df:ba:56:f1:c2:4b:c7: 24:7a:b3:ee:99:50:54:00:38:86:a7:a2:c3:d3:17:8f: 02:10:96:eb:fe:d3:d6:99:ba:b3:fa:b3:8f:96:b9:cb: e7:f5:ae:3b:16:bf:0d:48:0a:03:15:ba:2d:50:ba:71: 37:90:49:51:23:6b:3e:50:f8:ce:5c:07:39:19:f8:9e: 28:a1:c4:a0:37:b3:ab:79:2f:b4:98:0f:a2:e5:12:3e: 4c:8c:7f:40:89:f4:7a:9b:3f:82:bc:a6:1f:5a:af:3b: 5b:54:4f:64:1f:d7:5e:0b:3a:cf:ca:5e:0c:59:04:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:5b:a9:ef:97:f3:af:46:a2:d2:fa:f4:2d:ab:b2:d9: 05:9a:8c:ec:fd:65:11:fa:3e:0b:33:91:d0:b3:f4:87: c5:93:3f:c4:1c:34:5d:8c:88:e8:b2:f1:cc:1d:1d:21: 1c:91:8f:71:c6:26:65:61:a4:26:87:03:e1:f8:c4:12: 95:e5:dc:31:a3:24:e1:fe:40:9a:19:2c:56:23:50:03: 04:52:e7:76:98:6a:03:9d:dd:fd:1f:fe:35:db:78:30: d5:56:45:81:2b:91:6d:1b:89:5d:e6:ea:e1:1c:b4:86: 1b:1c:1b:cc:63:11:21:af:72:ec:49:24:46:85:48:e6: ee:b2:c5:ac:3f:40:ff:94:93:8b:d0:11:3d:c5:c8:6d: 5e:7e:a4:0f:38:9e:63:34:42:b4:29:9c:fe:54:d0:48: a2:d1:05:2d:81:fb:8d:5e:0a:9e:e3:44:43:55:a1:6f: 5d:5b:96:fb:cb:85:c8:9c:c2:d5:12:33:82:c5:66:98: 4e:c9:0e:f1:af:85:e8:ed:0f:ff:2e:83:1d:d3:62:b2: 19:d5:a5:9e:4f:84:f1:8c:73:a5:e1:96:ac:ce:15:b6: 03:e9:c2:67:91:65:a7:a5:b0:85:5a:96:81:62:71:01: b7:a8:e9:49:36:d7:47:98:dc:5b:ec:0b:cc:ac:55:f9 Fingerprint (SHA-256): EA:9A:3A:86:82:C4:E2:8B:19:C2:2A:15:71:62:9B:67:8A:B1:90:E9:89:DC:32:BB:0F:1C:02:4A:ED:58:50:D4 Fingerprint (SHA1): 77:A3:18:C1:B8:19:6A:E4:05:5C:CD:36:1B:C7:15:D3:A0:19:80:EA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3203: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3204: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145852 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3205: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3206: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3207: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3208: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145853 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3209: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3210: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3211: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3212: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145854 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA1Root-1226145355.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3213: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3214: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #3215: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3216: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1226145855 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3217: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3218: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #3219: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145852 (0x4915803c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:02:56 2024 Not After : Wed Dec 26 15:02:56 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:40:12:d4:32:74:cf:65:15:a0:c0:47:8b:43:d2:b1: f7:e7:0b:32:6a:58:3a:1e:a4:f6:3a:96:f0:bf:e6:2e: a6:e9:98:8b:79:68:0f:c1:55:6f:00:46:68:a4:fc:7f: 24:c8:2f:c6:d9:01:4a:9a:0b:64:90:7e:29:2a:c5:fc: 71:81:08:ec:ad:d3:e5:e2:28:13:fc:d9:4a:f3:3e:d7: 4e:2b:cf:d6:0a:6c:6a:7a:83:06:3e:3c:84:c9:6b:97: 5e:65:17:df:aa:01:b1:83:c3:54:7e:ae:97:b2:6c:f4: 9b:60:54:d2:b3:a2:85:0b:f2:8b:4f:c3:f5:bf:b6:ab: b3:98:38:a4:16:b5:63:2e:d9:e1:68:72:d8:63:87:24: 80:2b:de:b7:3c:6d:a1:6d:dc:ef:2b:fe:fe:82:e9:2e: 2f:aa:4d:c9:31:a8:38:2e:b6:09:24:7b:0f:33:f4:a2: 87:92:44:a0:cd:c3:4b:be:80:9e:c0:30:3a:6b:75:1c: 1e:f7:c9:93:14:cf:77:60:3d:81:ec:ff:7e:17:81:c6: 74:27:ea:2e:48:6f:49:6e:b2:b1:78:b3:45:9b:14:5a: 71:a9:2c:0c:59:90:f6:f8:3b:31:75:05:73:95:85:c3: 44:c3:03:80:05:05:57:26:ec:a4:cc:6c:f8:a7:59:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:52:e2:d2:cd:03:06:9b:c4:26:63:4f:90:b8:55:95: b5:07:4d:80:0b:a2:19:c3:49:5c:ae:a8:6e:1f:d8:ab: 24:23:41:43:16:bf:1b:6d:a1:7f:fb:fc:7f:56:6b:18: 1a:af:8e:26:40:a0:d8:1b:11:05:f2:37:7f:fd:81:5d: a1:61:30:4b:08:e6:cd:73:33:e2:a9:c1:99:58:59:cc: 10:fa:f9:71:0f:4a:7d:bb:8f:be:b7:13:cd:d7:7e:c8: 64:f7:ca:0f:70:a1:80:14:27:b0:e8:d5:3a:d0:93:50: 10:7d:ee:6d:9f:ed:bc:f1:dd:7c:41:22:6a:43:90:1b: 67:79:a2:22:92:31:a0:7f:43:64:a2:10:cb:23:a9:16: d7:a4:eb:23:e2:1b:12:59:fd:d0:f5:ba:cb:66:da:fb: 31:47:c4:79:b2:20:1f:f4:84:d8:99:c5:15:ce:a4:ff: e1:a9:e5:6a:26:63:dd:85:4e:92:ba:ad:98:7e:bc:24: 5b:bd:31:89:b1:1d:35:5b:6d:98:10:d1:20:a4:fd:30: a1:49:29:86:38:28:c1:22:4d:ab:0a:54:0c:ce:be:89: 25:3c:72:53:6f:3e:7c:81:81:d1:bb:21:ee:17:1e:af: 94:88:85:b8:8c:2a:96:84:45:e0:2f:8e:8d:6e:c9:29 Fingerprint (SHA-256): 3C:8F:23:FC:F8:B5:76:D4:B7:2A:21:15:5D:DB:E2:A0:DB:57:66:92:C6:BA:25:7A:89:31:6F:6B:6B:AB:58:04 Fingerprint (SHA1): BE:A6:02:D0:37:EC:3B:46:97:6D:FE:82:0C:E0:24:C6:6F:CD:30:16 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3220: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3221: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145856 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3222: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3223: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3224: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145857 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3225: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3226: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3227: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3228: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145858 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3229: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3230: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145859 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3231: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3232: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3233: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3234: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3235: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145860 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145356.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3236: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3237: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3238: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3239: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145861 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3240: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3241: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3242: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145856 (0x49158040) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:02:59 2024 Not After : Wed Dec 26 15:02:59 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:5c:64:e3:cc:42:1c:f3:0f:2e:1a:65:14:d8:6c:31: f1:8c:37:c2:d8:41:bc:ad:af:40:5a:58:45:d9:19:2a: 0d:46:3b:17:4d:c9:9d:3f:e0:13:7f:09:1c:18:ad:0c: f2:b2:d3:41:22:c8:bf:fc:04:24:a8:33:57:1e:4c:66: 39:5f:df:18:b6:88:20:19:68:ec:00:d0:c8:e2:a5:0b: b3:44:6a:63:62:44:9f:be:8d:e6:47:18:87:b1:e8:b2: b4:22:10:0f:7b:19:4c:6b:36:c5:ad:f3:41:4b:f8:7e: 6d:12:aa:52:67:cb:3d:da:c0:ad:bc:62:82:13:18:91: 69:9d:c9:0a:bf:0e:f4:3f:4a:2a:f5:75:cf:1d:5e:22: 83:ec:7e:49:f4:a3:71:0d:65:bb:44:c6:c6:d8:0c:0d: e7:09:2c:d2:c1:fa:cd:96:51:da:1b:26:63:69:6b:7f: 71:f4:9a:18:4e:63:52:54:d6:7f:c7:73:b1:5e:27:87: fb:c2:1d:ee:45:17:42:aa:df:f8:75:42:c8:4f:5c:3d: 07:9d:7d:ae:5c:f2:53:f1:e3:16:60:23:c1:46:55:97: 9c:80:25:c9:3d:56:46:23:7d:9d:68:dd:a4:33:3c:ed: 4c:b4:aa:98:ac:80:f2:0b:8d:b9:5c:5c:9c:c8:14:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:6d:01:aa:2b:a0:b2:ed:a0:f0:7d:a0:0d:6c:0b:c3: a9:35:de:91:4c:51:37:55:80:f1:02:44:2b:f7:ec:60: b6:18:36:cf:f8:4b:5e:1a:27:ef:fa:ee:05:3b:71:76: d9:6a:c4:51:0c:c6:18:ba:62:0b:41:56:15:c0:63:1c: cd:b3:ab:59:75:95:76:5e:75:56:d1:52:91:61:27:8a: 0a:f5:ae:36:3f:90:64:02:63:72:77:fa:b1:de:7e:26: d7:5f:2c:60:1b:70:3b:1e:be:91:5e:f1:84:92:cc:8c: 8d:d0:a9:93:80:98:9c:97:fb:6a:18:50:f4:f4:c1:40: e7:21:df:11:5a:4b:d4:87:14:11:80:50:47:d4:5a:71: f1:7d:47:66:9c:77:96:03:3d:43:18:b2:b1:87:6e:26: ff:a0:83:11:71:79:5d:11:47:f1:bf:f7:65:2b:5b:c9: 33:5c:73:94:9f:94:e0:fb:de:ca:f0:c2:4e:1e:3f:78: 53:d8:20:ed:d4:12:f6:52:c4:ef:30:e8:0a:90:eb:de: 75:6d:92:77:39:09:ec:2b:f6:91:c9:64:62:70:c6:73: 46:78:d3:94:64:5f:be:9b:be:ff:73:dd:72:71:42:b3: bc:02:d8:5d:cb:99:d1:2c:b3:bd:c5:4f:23:1d:a4:04 Fingerprint (SHA-256): F0:EB:1F:36:07:CC:75:99:82:04:8B:C5:E1:0A:27:F1:5C:B8:44:54:E7:C6:44:87:3E:8F:20:31:23:EB:01:1D Fingerprint (SHA1): 56:7E:44:13:41:9C:AE:82:0C:6E:14:9C:FB:06:23:9B:86:5C:E2:46 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3243: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145857 (0x49158041) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:03:00 2024 Not After : Wed Dec 26 15:03:00 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:de:f3:b3:08:cc:74:ca:22:cb:9e:7a:2a:f7:6b: 70:25:f9:be:ce:e6:52:2c:71:a6:cf:f3:43:a0:be:8f: a9:a4:fa:11:97:cb:27:b6:6a:07:91:98:b2:23:77:31: 27:1c:46:fe:84:e1:31:5a:b0:79:d3:34:5a:a7:b6:7e: 18:3c:59:ce:49:64:93:50:15:c0:aa:16:18:3a:51:a5: 01:dd:dd:87:25:a3:cb:2f:97:74:8c:1f:0d:0d:05:1a: b0:32:00:9a:30:19:cd:7d:dc:0d:f2:3b:f7:43:61:0c: 63:1f:31:75:a8:e2:e7:7d:a1:77:bd:1e:f9:f5:8f:ec: c8:e9:07:2f:6d:a0:43:73:e6:f0:05:2f:9e:21:41:2c: 5c:33:fd:38:22:86:89:27:1e:55:27:8b:c3:9a:45:78: 38:2b:47:0a:51:53:fc:ff:d9:1c:ba:70:52:f6:09:3a: 32:92:bf:91:e4:7d:f2:45:ea:95:c3:60:4e:f4:f9:31: e4:af:1d:95:ac:e0:a0:c7:a7:0b:f5:14:31:b0:b7:b1: 0a:ab:25:20:17:35:c8:80:1e:fc:92:0c:0d:e7:4f:c9: 72:a4:8c:b5:c3:02:be:0a:9b:a0:15:ed:83:79:f8:e4: 51:3b:e1:de:a4:e4:77:38:77:93:53:25:4b:e8:17:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:35:30:e0:1b:98:39:fc:9c:fe:c1:03:82:7e:ec:00: 9f:62:e5:76:8a:bb:b0:ca:31:0d:fc:04:83:f4:36:d3: ff:ee:85:5f:1b:a3:a5:18:c7:a5:37:3e:1c:e2:6f:76: f9:b0:83:e3:d2:f9:ed:b4:82:0e:65:ce:76:14:77:16: 28:13:73:fe:df:45:8a:9e:b5:95:e0:77:12:fa:02:ab: de:fa:71:93:95:3f:d1:37:ef:5a:5c:65:3a:2e:76:9d: 9a:92:6d:39:52:02:c8:d7:c5:b8:97:fb:db:9d:9a:da: a2:a0:84:97:88:c4:74:28:01:66:54:55:b7:18:37:7f: a8:46:9d:df:94:c0:bc:ad:cd:f1:27:b4:ad:5f:e3:19: 3e:d5:30:10:60:f3:09:13:bd:03:c9:3b:3b:21:9b:f1: 20:4e:3a:f5:d5:d0:2a:fc:d8:2c:bd:f0:11:de:90:8e: 9f:f1:76:bf:03:3c:67:8b:c7:4d:67:c5:b9:27:fc:0f: ff:94:47:d2:d7:21:99:59:dc:04:c4:e3:e7:21:e5:cc: be:46:ca:ab:28:45:a5:c0:9f:2b:b6:22:17:53:b7:42: eb:37:ea:91:f4:6a:80:a8:cb:d6:11:de:2c:91:86:01: 05:db:47:71:49:13:e0:a8:b1:72:4c:4f:f1:e2:94:48 Fingerprint (SHA-256): 7D:E2:10:DB:97:DE:65:2C:31:5B:23:64:62:1C:E6:B5:9C:8D:7C:4C:EC:74:52:C7:F3:D9:9C:CD:45:27:0B:CD Fingerprint (SHA1): 16:BB:C7:E2:6E:1F:E0:CA:E6:7A:29:63:A9:F3:A8:70:15:DA:C3:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3244: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145857 (0x49158041) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:03:00 2024 Not After : Wed Dec 26 15:03:00 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:fd:de:f3:b3:08:cc:74:ca:22:cb:9e:7a:2a:f7:6b: 70:25:f9:be:ce:e6:52:2c:71:a6:cf:f3:43:a0:be:8f: a9:a4:fa:11:97:cb:27:b6:6a:07:91:98:b2:23:77:31: 27:1c:46:fe:84:e1:31:5a:b0:79:d3:34:5a:a7:b6:7e: 18:3c:59:ce:49:64:93:50:15:c0:aa:16:18:3a:51:a5: 01:dd:dd:87:25:a3:cb:2f:97:74:8c:1f:0d:0d:05:1a: b0:32:00:9a:30:19:cd:7d:dc:0d:f2:3b:f7:43:61:0c: 63:1f:31:75:a8:e2:e7:7d:a1:77:bd:1e:f9:f5:8f:ec: c8:e9:07:2f:6d:a0:43:73:e6:f0:05:2f:9e:21:41:2c: 5c:33:fd:38:22:86:89:27:1e:55:27:8b:c3:9a:45:78: 38:2b:47:0a:51:53:fc:ff:d9:1c:ba:70:52:f6:09:3a: 32:92:bf:91:e4:7d:f2:45:ea:95:c3:60:4e:f4:f9:31: e4:af:1d:95:ac:e0:a0:c7:a7:0b:f5:14:31:b0:b7:b1: 0a:ab:25:20:17:35:c8:80:1e:fc:92:0c:0d:e7:4f:c9: 72:a4:8c:b5:c3:02:be:0a:9b:a0:15:ed:83:79:f8:e4: 51:3b:e1:de:a4:e4:77:38:77:93:53:25:4b:e8:17:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:35:30:e0:1b:98:39:fc:9c:fe:c1:03:82:7e:ec:00: 9f:62:e5:76:8a:bb:b0:ca:31:0d:fc:04:83:f4:36:d3: ff:ee:85:5f:1b:a3:a5:18:c7:a5:37:3e:1c:e2:6f:76: f9:b0:83:e3:d2:f9:ed:b4:82:0e:65:ce:76:14:77:16: 28:13:73:fe:df:45:8a:9e:b5:95:e0:77:12:fa:02:ab: de:fa:71:93:95:3f:d1:37:ef:5a:5c:65:3a:2e:76:9d: 9a:92:6d:39:52:02:c8:d7:c5:b8:97:fb:db:9d:9a:da: a2:a0:84:97:88:c4:74:28:01:66:54:55:b7:18:37:7f: a8:46:9d:df:94:c0:bc:ad:cd:f1:27:b4:ad:5f:e3:19: 3e:d5:30:10:60:f3:09:13:bd:03:c9:3b:3b:21:9b:f1: 20:4e:3a:f5:d5:d0:2a:fc:d8:2c:bd:f0:11:de:90:8e: 9f:f1:76:bf:03:3c:67:8b:c7:4d:67:c5:b9:27:fc:0f: ff:94:47:d2:d7:21:99:59:dc:04:c4:e3:e7:21:e5:cc: be:46:ca:ab:28:45:a5:c0:9f:2b:b6:22:17:53:b7:42: eb:37:ea:91:f4:6a:80:a8:cb:d6:11:de:2c:91:86:01: 05:db:47:71:49:13:e0:a8:b1:72:4c:4f:f1:e2:94:48 Fingerprint (SHA-256): 7D:E2:10:DB:97:DE:65:2C:31:5B:23:64:62:1C:E6:B5:9C:8D:7C:4C:EC:74:52:C7:F3:D9:9C:CD:45:27:0B:CD Fingerprint (SHA1): 16:BB:C7:E2:6E:1F:E0:CA:E6:7A:29:63:A9:F3:A8:70:15:DA:C3:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3245: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3246: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145862 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3247: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3248: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3249: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145863 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3250: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3251: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3252: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3253: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1226145864 -7 Bridge@Army < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3254: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3255: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1226145865 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3256: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3257: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #3258: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3259: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3260: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145866 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-Bridge-1226145357.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3261: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3262: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3263: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3264: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145867 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3265: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3266: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3267: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3268: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145868 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-BridgeNavy-1226145358.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3269: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3270: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3271: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3272: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145869 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3273: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3274: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #3275: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145862 (0x49158046) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:03:03 2024 Not After : Wed Dec 26 15:03:03 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:fe:70:53:3e:78:89:c9:ff:87:8c:3e:22:47:19:7c: 1d:51:bf:16:95:00:d3:20:5f:d8:81:4c:95:ab:c2:24: 89:8f:67:97:bc:07:5a:89:3e:b7:bc:fc:3a:f4:39:7e: 13:9f:c7:73:95:77:30:63:db:d9:ed:1b:eb:cd:0f:e2: d0:7e:aa:b9:30:34:11:f6:5b:77:59:38:c2:ea:ed:74: c4:45:98:d5:39:ab:d6:69:37:37:ca:93:d2:93:98:0b: 63:8a:a4:6e:ea:33:e7:dd:33:9d:f8:99:9a:4b:8c:92: 0e:a7:11:44:47:98:f2:30:4e:37:d4:48:89:6a:49:fe: f2:91:28:07:ef:ac:c3:3e:1c:37:84:7a:39:b9:4e:e6: 34:13:52:76:73:e8:89:15:50:6d:11:b3:57:e0:50:c4: 4d:c4:8e:d2:25:9a:7e:b3:6f:1a:4a:9c:1f:c5:1e:97: 69:68:fe:a0:a4:4d:92:36:7e:85:0c:e3:98:79:cc:4f: 82:ed:a3:9b:47:1b:d6:24:7e:d0:1c:ed:66:42:10:1e: d9:22:9c:d5:d9:2f:4b:19:94:7d:89:41:10:2e:0e:2c: a6:6c:99:a7:5e:3b:ff:8f:92:10:7c:68:e4:5d:d5:72: 4c:ce:a7:3c:fc:2f:29:c3:e2:a0:e6:5a:04:91:70:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:a4:ac:9e:3a:ee:f6:fc:43:fe:d9:12:dd:3f:2a:2e: 5b:ef:fe:1b:73:1b:04:f1:51:ef:9e:b6:ce:ad:02:78: ed:ff:ea:ac:0a:04:17:c5:18:42:0c:a7:27:54:22:7f: fd:a3:52:b1:e7:51:85:d6:17:40:96:2e:aa:1e:21:6b: ef:a0:71:24:dd:f9:9c:ae:88:ff:e3:ac:05:dc:a7:09: 7b:2b:16:28:bb:8f:52:f9:b7:73:b2:80:65:0f:e6:cc: 62:21:0d:4e:56:58:08:6e:8c:b9:48:98:ed:c0:c2:a7: 7c:69:1d:91:e3:30:e8:b4:f7:75:b6:f3:90:50:27:44: e2:b1:7a:6a:ab:34:ec:3a:8c:05:f8:89:c7:9a:76:cd: e5:93:d6:2e:c0:59:5f:89:f4:49:01:e5:f5:8e:6c:b4: 22:a9:7a:8c:df:2a:4c:86:4c:bc:e7:2e:3b:35:97:74: 93:ab:9f:82:22:cd:d9:c6:62:f4:04:d5:7b:dd:19:a6: d8:29:2f:a0:7b:98:06:d0:96:86:32:96:4f:73:d2:5d: 3b:7a:19:22:40:a3:5e:f6:d1:5a:e0:06:0d:99:29:78: dc:41:bd:5c:43:8d:4b:e9:9c:03:4a:ba:04:78:5e:92: 2c:40:cd:d3:5c:14:f4:36:d3:f5:d6:f5:ef:d8:ac:6b Fingerprint (SHA-256): 8A:E9:2A:AB:CD:C7:F3:87:54:C8:72:35:66:B4:9B:D3:7D:41:A2:8F:6E:18:03:A8:87:7D:23:74:29:FF:19:4A Fingerprint (SHA1): F4:32:0D:F7:00:28:F1:EE:A0:06:CE:C1:49:3B:87:EF:E1:C9:76:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3276: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145863 (0x49158047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:03:04 2024 Not After : Wed Dec 26 15:03:04 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:cc:12:d2:f5:e6:31:8a:80:e5:90:bf:74:df:87:d9: 68:36:67:5c:c5:e6:dd:b4:eb:01:b4:f5:21:cb:eb:3c: 15:e4:0e:e1:b9:90:b9:8d:52:03:6d:54:92:ed:57:5d: 4e:b1:fb:5c:21:1f:fc:9e:1f:7c:33:f6:e7:8d:0f:a1: ea:79:da:4f:e0:4b:95:86:4e:1d:e0:02:11:a3:51:56: ca:65:42:13:20:7d:f1:54:4f:52:f1:6b:21:7f:b1:c1: 8e:8e:34:aa:4e:ee:29:0f:78:a2:9d:72:58:0a:99:3c: 46:8e:4e:b2:eb:2b:02:86:ad:c5:51:3b:10:17:4e:b9: 33:52:5c:40:f6:8d:d7:14:a5:cf:68:39:11:62:3b:0f: 9e:f2:0b:bd:44:07:5b:a1:b2:c7:fe:a2:c1:21:52:e1: 28:e9:c7:8b:56:0b:4b:95:35:f3:0a:5d:61:89:3e:29: 7d:ca:db:61:22:34:ba:1d:b3:d6:cc:0f:87:d3:ba:79: ae:42:c3:bf:9c:63:96:2c:ac:3a:4f:7c:f9:d8:ea:56: a3:e7:67:75:d6:71:a7:aa:67:33:c2:8b:0e:e2:2f:cc: 70:d9:e0:bd:14:58:ab:e3:0c:ae:84:66:ad:37:f5:de: be:98:df:65:c6:c1:aa:5e:4b:6d:f6:d0:dd:c8:6a:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:ba:93:06:ac:51:bb:46:74:90:c8:f2:10:eb:9c:2d: 41:ca:9f:a8:34:3e:a3:f2:57:89:b3:e2:d0:df:ab:d0: 89:49:80:5c:30:3d:4d:62:88:8b:a4:77:a5:57:90:33: 30:7f:a7:c5:b9:24:90:4a:56:20:b0:40:a6:e1:1f:22: 33:1e:17:25:2a:a6:ca:f6:a9:f2:de:31:c7:1c:f8:ae: 9f:8f:a3:14:fc:89:de:86:1f:ba:09:d9:98:f4:74:32: 5a:65:3a:3f:27:56:3e:22:a2:0a:34:ab:8f:c1:7c:0c: 51:bc:10:07:46:65:02:a2:96:34:f3:e9:5e:44:9d:53: b8:bc:87:fc:ab:0b:52:a8:04:62:ff:e3:0e:62:66:c9: 17:4c:ff:0b:f4:01:57:3e:01:f0:e2:6f:31:d3:98:2d: cc:4e:91:13:84:50:37:03:c7:6d:9f:79:f5:7c:b2:38: 8c:87:10:6c:b1:95:7d:40:e7:77:c0:dc:dc:59:bd:06: 41:06:da:f0:e2:80:84:32:bf:04:09:ff:3e:d5:32:1d: f1:3b:77:10:51:f4:92:7e:62:54:8e:5a:36:cc:2b:f2: 64:5c:40:65:62:47:29:06:c9:01:75:f9:6f:15:ae:b8: fc:53:71:42:ea:50:50:f3:98:54:9f:63:f2:20:b2:83 Fingerprint (SHA-256): DE:D1:41:43:2D:63:84:74:6A:3F:AD:50:CB:11:99:74:40:37:B3:C6:FA:45:9B:1B:25:5B:1F:FF:A1:10:2C:ED Fingerprint (SHA1): 46:F5:6B:39:EC:8A:04:84:E1:42:E0:98:BA:45:49:C7:E0:1B:72:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3277: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145863 (0x49158047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:03:04 2024 Not After : Wed Dec 26 15:03:04 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:cc:12:d2:f5:e6:31:8a:80:e5:90:bf:74:df:87:d9: 68:36:67:5c:c5:e6:dd:b4:eb:01:b4:f5:21:cb:eb:3c: 15:e4:0e:e1:b9:90:b9:8d:52:03:6d:54:92:ed:57:5d: 4e:b1:fb:5c:21:1f:fc:9e:1f:7c:33:f6:e7:8d:0f:a1: ea:79:da:4f:e0:4b:95:86:4e:1d:e0:02:11:a3:51:56: ca:65:42:13:20:7d:f1:54:4f:52:f1:6b:21:7f:b1:c1: 8e:8e:34:aa:4e:ee:29:0f:78:a2:9d:72:58:0a:99:3c: 46:8e:4e:b2:eb:2b:02:86:ad:c5:51:3b:10:17:4e:b9: 33:52:5c:40:f6:8d:d7:14:a5:cf:68:39:11:62:3b:0f: 9e:f2:0b:bd:44:07:5b:a1:b2:c7:fe:a2:c1:21:52:e1: 28:e9:c7:8b:56:0b:4b:95:35:f3:0a:5d:61:89:3e:29: 7d:ca:db:61:22:34:ba:1d:b3:d6:cc:0f:87:d3:ba:79: ae:42:c3:bf:9c:63:96:2c:ac:3a:4f:7c:f9:d8:ea:56: a3:e7:67:75:d6:71:a7:aa:67:33:c2:8b:0e:e2:2f:cc: 70:d9:e0:bd:14:58:ab:e3:0c:ae:84:66:ad:37:f5:de: be:98:df:65:c6:c1:aa:5e:4b:6d:f6:d0:dd:c8:6a:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:ba:93:06:ac:51:bb:46:74:90:c8:f2:10:eb:9c:2d: 41:ca:9f:a8:34:3e:a3:f2:57:89:b3:e2:d0:df:ab:d0: 89:49:80:5c:30:3d:4d:62:88:8b:a4:77:a5:57:90:33: 30:7f:a7:c5:b9:24:90:4a:56:20:b0:40:a6:e1:1f:22: 33:1e:17:25:2a:a6:ca:f6:a9:f2:de:31:c7:1c:f8:ae: 9f:8f:a3:14:fc:89:de:86:1f:ba:09:d9:98:f4:74:32: 5a:65:3a:3f:27:56:3e:22:a2:0a:34:ab:8f:c1:7c:0c: 51:bc:10:07:46:65:02:a2:96:34:f3:e9:5e:44:9d:53: b8:bc:87:fc:ab:0b:52:a8:04:62:ff:e3:0e:62:66:c9: 17:4c:ff:0b:f4:01:57:3e:01:f0:e2:6f:31:d3:98:2d: cc:4e:91:13:84:50:37:03:c7:6d:9f:79:f5:7c:b2:38: 8c:87:10:6c:b1:95:7d:40:e7:77:c0:dc:dc:59:bd:06: 41:06:da:f0:e2:80:84:32:bf:04:09:ff:3e:d5:32:1d: f1:3b:77:10:51:f4:92:7e:62:54:8e:5a:36:cc:2b:f2: 64:5c:40:65:62:47:29:06:c9:01:75:f9:6f:15:ae:b8: fc:53:71:42:ea:50:50:f3:98:54:9f:63:f2:20:b2:83 Fingerprint (SHA-256): DE:D1:41:43:2D:63:84:74:6A:3F:AD:50:CB:11:99:74:40:37:B3:C6:FA:45:9B:1B:25:5B:1F:FF:A1:10:2C:ED Fingerprint (SHA1): 46:F5:6B:39:EC:8A:04:84:E1:42:E0:98:BA:45:49:C7:E0:1B:72:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3278: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #3279: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145862 (0x49158046) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:03:03 2024 Not After : Wed Dec 26 15:03:03 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:fe:70:53:3e:78:89:c9:ff:87:8c:3e:22:47:19:7c: 1d:51:bf:16:95:00:d3:20:5f:d8:81:4c:95:ab:c2:24: 89:8f:67:97:bc:07:5a:89:3e:b7:bc:fc:3a:f4:39:7e: 13:9f:c7:73:95:77:30:63:db:d9:ed:1b:eb:cd:0f:e2: d0:7e:aa:b9:30:34:11:f6:5b:77:59:38:c2:ea:ed:74: c4:45:98:d5:39:ab:d6:69:37:37:ca:93:d2:93:98:0b: 63:8a:a4:6e:ea:33:e7:dd:33:9d:f8:99:9a:4b:8c:92: 0e:a7:11:44:47:98:f2:30:4e:37:d4:48:89:6a:49:fe: f2:91:28:07:ef:ac:c3:3e:1c:37:84:7a:39:b9:4e:e6: 34:13:52:76:73:e8:89:15:50:6d:11:b3:57:e0:50:c4: 4d:c4:8e:d2:25:9a:7e:b3:6f:1a:4a:9c:1f:c5:1e:97: 69:68:fe:a0:a4:4d:92:36:7e:85:0c:e3:98:79:cc:4f: 82:ed:a3:9b:47:1b:d6:24:7e:d0:1c:ed:66:42:10:1e: d9:22:9c:d5:d9:2f:4b:19:94:7d:89:41:10:2e:0e:2c: a6:6c:99:a7:5e:3b:ff:8f:92:10:7c:68:e4:5d:d5:72: 4c:ce:a7:3c:fc:2f:29:c3:e2:a0:e6:5a:04:91:70:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bf:a4:ac:9e:3a:ee:f6:fc:43:fe:d9:12:dd:3f:2a:2e: 5b:ef:fe:1b:73:1b:04:f1:51:ef:9e:b6:ce:ad:02:78: ed:ff:ea:ac:0a:04:17:c5:18:42:0c:a7:27:54:22:7f: fd:a3:52:b1:e7:51:85:d6:17:40:96:2e:aa:1e:21:6b: ef:a0:71:24:dd:f9:9c:ae:88:ff:e3:ac:05:dc:a7:09: 7b:2b:16:28:bb:8f:52:f9:b7:73:b2:80:65:0f:e6:cc: 62:21:0d:4e:56:58:08:6e:8c:b9:48:98:ed:c0:c2:a7: 7c:69:1d:91:e3:30:e8:b4:f7:75:b6:f3:90:50:27:44: e2:b1:7a:6a:ab:34:ec:3a:8c:05:f8:89:c7:9a:76:cd: e5:93:d6:2e:c0:59:5f:89:f4:49:01:e5:f5:8e:6c:b4: 22:a9:7a:8c:df:2a:4c:86:4c:bc:e7:2e:3b:35:97:74: 93:ab:9f:82:22:cd:d9:c6:62:f4:04:d5:7b:dd:19:a6: d8:29:2f:a0:7b:98:06:d0:96:86:32:96:4f:73:d2:5d: 3b:7a:19:22:40:a3:5e:f6:d1:5a:e0:06:0d:99:29:78: dc:41:bd:5c:43:8d:4b:e9:9c:03:4a:ba:04:78:5e:92: 2c:40:cd:d3:5c:14:f4:36:d3:f5:d6:f5:ef:d8:ac:6b Fingerprint (SHA-256): 8A:E9:2A:AB:CD:C7:F3:87:54:C8:72:35:66:B4:9B:D3:7D:41:A2:8F:6E:18:03:A8:87:7D:23:74:29:FF:19:4A Fingerprint (SHA1): F4:32:0D:F7:00:28:F1:EE:A0:06:CE:C1:49:3B:87:EF:E1:C9:76:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3280: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145863 (0x49158047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:03:04 2024 Not After : Wed Dec 26 15:03:04 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:cc:12:d2:f5:e6:31:8a:80:e5:90:bf:74:df:87:d9: 68:36:67:5c:c5:e6:dd:b4:eb:01:b4:f5:21:cb:eb:3c: 15:e4:0e:e1:b9:90:b9:8d:52:03:6d:54:92:ed:57:5d: 4e:b1:fb:5c:21:1f:fc:9e:1f:7c:33:f6:e7:8d:0f:a1: ea:79:da:4f:e0:4b:95:86:4e:1d:e0:02:11:a3:51:56: ca:65:42:13:20:7d:f1:54:4f:52:f1:6b:21:7f:b1:c1: 8e:8e:34:aa:4e:ee:29:0f:78:a2:9d:72:58:0a:99:3c: 46:8e:4e:b2:eb:2b:02:86:ad:c5:51:3b:10:17:4e:b9: 33:52:5c:40:f6:8d:d7:14:a5:cf:68:39:11:62:3b:0f: 9e:f2:0b:bd:44:07:5b:a1:b2:c7:fe:a2:c1:21:52:e1: 28:e9:c7:8b:56:0b:4b:95:35:f3:0a:5d:61:89:3e:29: 7d:ca:db:61:22:34:ba:1d:b3:d6:cc:0f:87:d3:ba:79: ae:42:c3:bf:9c:63:96:2c:ac:3a:4f:7c:f9:d8:ea:56: a3:e7:67:75:d6:71:a7:aa:67:33:c2:8b:0e:e2:2f:cc: 70:d9:e0:bd:14:58:ab:e3:0c:ae:84:66:ad:37:f5:de: be:98:df:65:c6:c1:aa:5e:4b:6d:f6:d0:dd:c8:6a:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:ba:93:06:ac:51:bb:46:74:90:c8:f2:10:eb:9c:2d: 41:ca:9f:a8:34:3e:a3:f2:57:89:b3:e2:d0:df:ab:d0: 89:49:80:5c:30:3d:4d:62:88:8b:a4:77:a5:57:90:33: 30:7f:a7:c5:b9:24:90:4a:56:20:b0:40:a6:e1:1f:22: 33:1e:17:25:2a:a6:ca:f6:a9:f2:de:31:c7:1c:f8:ae: 9f:8f:a3:14:fc:89:de:86:1f:ba:09:d9:98:f4:74:32: 5a:65:3a:3f:27:56:3e:22:a2:0a:34:ab:8f:c1:7c:0c: 51:bc:10:07:46:65:02:a2:96:34:f3:e9:5e:44:9d:53: b8:bc:87:fc:ab:0b:52:a8:04:62:ff:e3:0e:62:66:c9: 17:4c:ff:0b:f4:01:57:3e:01:f0:e2:6f:31:d3:98:2d: cc:4e:91:13:84:50:37:03:c7:6d:9f:79:f5:7c:b2:38: 8c:87:10:6c:b1:95:7d:40:e7:77:c0:dc:dc:59:bd:06: 41:06:da:f0:e2:80:84:32:bf:04:09:ff:3e:d5:32:1d: f1:3b:77:10:51:f4:92:7e:62:54:8e:5a:36:cc:2b:f2: 64:5c:40:65:62:47:29:06:c9:01:75:f9:6f:15:ae:b8: fc:53:71:42:ea:50:50:f3:98:54:9f:63:f2:20:b2:83 Fingerprint (SHA-256): DE:D1:41:43:2D:63:84:74:6A:3F:AD:50:CB:11:99:74:40:37:B3:C6:FA:45:9B:1B:25:5B:1F:FF:A1:10:2C:ED Fingerprint (SHA1): 46:F5:6B:39:EC:8A:04:84:E1:42:E0:98:BA:45:49:C7:E0:1B:72:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3281: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145863 (0x49158047) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:03:04 2024 Not After : Wed Dec 26 15:03:04 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:cc:12:d2:f5:e6:31:8a:80:e5:90:bf:74:df:87:d9: 68:36:67:5c:c5:e6:dd:b4:eb:01:b4:f5:21:cb:eb:3c: 15:e4:0e:e1:b9:90:b9:8d:52:03:6d:54:92:ed:57:5d: 4e:b1:fb:5c:21:1f:fc:9e:1f:7c:33:f6:e7:8d:0f:a1: ea:79:da:4f:e0:4b:95:86:4e:1d:e0:02:11:a3:51:56: ca:65:42:13:20:7d:f1:54:4f:52:f1:6b:21:7f:b1:c1: 8e:8e:34:aa:4e:ee:29:0f:78:a2:9d:72:58:0a:99:3c: 46:8e:4e:b2:eb:2b:02:86:ad:c5:51:3b:10:17:4e:b9: 33:52:5c:40:f6:8d:d7:14:a5:cf:68:39:11:62:3b:0f: 9e:f2:0b:bd:44:07:5b:a1:b2:c7:fe:a2:c1:21:52:e1: 28:e9:c7:8b:56:0b:4b:95:35:f3:0a:5d:61:89:3e:29: 7d:ca:db:61:22:34:ba:1d:b3:d6:cc:0f:87:d3:ba:79: ae:42:c3:bf:9c:63:96:2c:ac:3a:4f:7c:f9:d8:ea:56: a3:e7:67:75:d6:71:a7:aa:67:33:c2:8b:0e:e2:2f:cc: 70:d9:e0:bd:14:58:ab:e3:0c:ae:84:66:ad:37:f5:de: be:98:df:65:c6:c1:aa:5e:4b:6d:f6:d0:dd:c8:6a:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:ba:93:06:ac:51:bb:46:74:90:c8:f2:10:eb:9c:2d: 41:ca:9f:a8:34:3e:a3:f2:57:89:b3:e2:d0:df:ab:d0: 89:49:80:5c:30:3d:4d:62:88:8b:a4:77:a5:57:90:33: 30:7f:a7:c5:b9:24:90:4a:56:20:b0:40:a6:e1:1f:22: 33:1e:17:25:2a:a6:ca:f6:a9:f2:de:31:c7:1c:f8:ae: 9f:8f:a3:14:fc:89:de:86:1f:ba:09:d9:98:f4:74:32: 5a:65:3a:3f:27:56:3e:22:a2:0a:34:ab:8f:c1:7c:0c: 51:bc:10:07:46:65:02:a2:96:34:f3:e9:5e:44:9d:53: b8:bc:87:fc:ab:0b:52:a8:04:62:ff:e3:0e:62:66:c9: 17:4c:ff:0b:f4:01:57:3e:01:f0:e2:6f:31:d3:98:2d: cc:4e:91:13:84:50:37:03:c7:6d:9f:79:f5:7c:b2:38: 8c:87:10:6c:b1:95:7d:40:e7:77:c0:dc:dc:59:bd:06: 41:06:da:f0:e2:80:84:32:bf:04:09:ff:3e:d5:32:1d: f1:3b:77:10:51:f4:92:7e:62:54:8e:5a:36:cc:2b:f2: 64:5c:40:65:62:47:29:06:c9:01:75:f9:6f:15:ae:b8: fc:53:71:42:ea:50:50:f3:98:54:9f:63:f2:20:b2:83 Fingerprint (SHA-256): DE:D1:41:43:2D:63:84:74:6A:3F:AD:50:CB:11:99:74:40:37:B3:C6:FA:45:9B:1B:25:5B:1F:FF:A1:10:2C:ED Fingerprint (SHA1): 46:F5:6B:39:EC:8A:04:84:E1:42:E0:98:BA:45:49:C7:E0:1B:72:FC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #3282: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #3283: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145870 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3284: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #3285: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #3286: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145871 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3287: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #3288: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #3289: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3290: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1226145872 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3291: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3292: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #3293: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3294: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1226145873 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3295: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3296: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #3297: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3298: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1226145874 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3299: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3300: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1226145875 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #3301: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3302: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #3303: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3304: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3305: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1226145876 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3306: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3307: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3308: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3309: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1226145877 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3310: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3311: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3312: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3313: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145878 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3314: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3315: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3316: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3317: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145879 --extCP < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #3318: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3319: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3320: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145870 (0x4915804e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Thu Dec 26 15:03:10 2024 Not After : Wed Dec 26 15:03:10 2074 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:88:2d:c6:38:0b:f1:37:76:79:62:45:92:a8:76:a4: a1:18:f2:4d:5d:53:85:b3:56:4a:16:5d:01:cc:94:fd: ab:94:26:84:19:c7:7d:dd:15:4c:9a:af:95:80:42:0a: 49:5b:de:77:d4:12:9c:7d:12:23:8a:97:c8:b6:1d:ee: 6e:49:16:e9:be:e5:1a:92:4d:66:75:55:a3:8e:bc:74: 27:a5:2e:f4:b2:34:06:2b:46:65:61:cc:f4:0a:07:c0: 22:9c:4c:ae:f0:87:69:7f:2a:a9:a5:4a:ab:d0:0d:a4: 9c:e5:14:34:3a:bd:4e:2e:ad:05:77:08:08:7d:fd:81: 13:dd:57:96:5d:f4:99:65:16:4f:29:20:dd:22:e5:e8: df:56:bd:9e:70:6c:65:79:ef:aa:fb:ff:3a:28:5e:51: a9:fc:28:ba:bf:42:f9:38:2e:b8:9c:b9:8d:fa:e1:16: a7:85:2e:ce:e9:34:ad:da:9c:c1:ae:c7:e2:17:40:83: cb:7f:06:51:7e:94:f1:b4:aa:be:4f:97:61:14:03:c4: 46:9f:22:57:bb:44:d2:30:ef:15:1b:e0:aa:d2:4a:e8: b5:e0:bd:b5:f5:7c:ed:1b:a7:b7:54:3c:b7:d0:99:28: f6:0f:6e:f9:f1:56:db:6a:18:99:a8:33:ef:e1:ec:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:1c:5e:47:87:f7:85:ff:a7:19:3c:3c:68:6d:f6:0c: fc:4e:a7:72:76:05:61:a4:51:99:1b:20:62:80:72:76: cd:8c:41:9d:d2:9a:15:9b:c8:b4:c8:0d:0b:9a:00:07: 00:75:b9:03:9f:d1:77:a0:17:64:b5:a1:80:f4:a4:a1: 97:6a:ae:0c:ca:5c:c0:07:2f:31:44:65:f9:4e:12:94: d8:71:82:6c:3b:e9:0f:c4:66:a5:08:64:53:bb:41:a5: b7:3c:9e:4f:27:54:0d:16:10:35:5e:61:58:98:55:ae: 8a:57:e5:7f:00:be:2f:4a:1e:9f:04:71:21:b9:8f:23: 2d:04:a2:ba:ba:1f:90:e3:0a:85:eb:81:57:8f:60:43: 9e:e4:b1:ec:03:63:eb:e7:a7:0b:5a:b6:3a:8c:9a:41: 50:ea:3c:0f:50:de:ed:d6:1a:e9:c3:b0:6a:03:5a:9c: f8:c5:b8:90:bb:0c:4e:f2:7e:5b:36:63:04:ec:a3:b6: 48:36:9b:d7:9d:94:5f:0f:5a:ae:8b:61:cf:57:3a:98: f8:a5:22:dd:86:bf:2c:58:eb:37:42:66:ff:8a:18:df: 05:f5:a4:de:32:06:de:f2:a2:8b:68:ae:c8:61:8c:88: 83:05:c8:b0:41:2d:0d:01:35:4f:8f:47:73:fc:c5:96 Fingerprint (SHA-256): 88:14:B4:76:F5:8C:36:15:E9:76:29:7A:FC:CC:86:EE:74:12:BD:2E:19:FB:DE:50:19:08:7F:8E:5C:42:06:39 Fingerprint (SHA1): 9D:3E:60:5D:0F:DF:D4:76:8A:D4:66:2B:9F:06:0C:6E:9E:3A:90:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #3321: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3322: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3323: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3324: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3325: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3326: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3327: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3328: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3329: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145871 (0x4915804f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Thu Dec 26 15:03:10 2024 Not After : Wed Dec 26 15:03:10 2074 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:fc:af:ff:6e:1f:c0:be:4c:fe:dc:e5:4d:28:83:89: 92:3d:5e:54:05:1a:5b:11:97:19:e5:05:52:7c:a0:1e: 32:c2:ac:16:81:db:55:0e:2c:a6:2f:2d:ea:6e:6b:99: 3b:2d:d6:a5:05:c2:10:f2:81:36:b7:36:8b:35:f1:3c: f8:06:82:89:38:49:7e:89:b9:ee:98:b7:67:48:1a:c4: 18:74:f9:9f:95:b4:67:87:9b:3d:08:f5:fc:fc:82:24: f7:b8:5e:84:cd:2d:cd:ed:fa:9f:4a:ba:f1:c5:61:d7: 7e:1a:05:70:dc:2b:5a:4e:a7:3e:57:96:14:c9:d3:09: c7:61:4f:fd:01:3b:ce:0b:12:cf:c8:74:37:4e:66:21: bd:b7:a4:1c:79:8a:ea:0d:c9:3c:59:b6:dc:80:b9:c3: ae:4f:17:8d:d4:eb:9c:91:54:e2:41:f4:e9:c7:0a:06: 74:14:68:e6:12:04:c8:d8:8f:19:72:26:93:d9:7d:56: a4:83:34:a8:57:a2:fa:07:8e:54:21:02:6f:f5:04:89: b1:33:43:7c:a5:20:4d:57:67:96:e9:e9:73:d0:c5:f4: c0:28:bd:fc:ba:eb:bb:64:01:d3:e6:c6:61:c6:21:95: 21:57:82:cd:3d:3f:b9:e2:1e:64:d9:87:12:3f:ae:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:7d:a5:c3:34:86:9d:9c:af:42:75:50:60:a8:99:67: b5:8a:9e:2a:67:de:fd:d3:39:40:72:24:3c:57:42:54: 2e:23:81:32:0e:49:99:e6:d2:a9:e5:c6:36:a2:1c:65: 2b:c6:77:33:26:ac:19:9c:02:31:7b:a9:f3:49:a0:84: 0e:90:30:2e:45:5b:e3:c8:39:50:12:64:30:8a:54:f4: b7:a2:4b:7c:2e:29:51:4a:0d:1b:d1:e7:f3:1e:17:46: c5:0d:6e:af:66:24:84:a3:13:52:21:d4:d1:cf:fe:9e: 60:d5:57:10:9f:68:c5:6f:d9:80:d9:95:84:44:1b:70: a3:22:3f:96:9a:95:bd:38:85:96:bf:2d:7d:a2:ad:f4: 5d:36:a6:40:02:72:5a:77:b1:db:05:44:f0:d8:59:57: 47:86:2b:c6:8c:77:d4:9f:14:50:e2:0b:75:d5:e3:0d: d7:3d:54:93:c9:ae:ef:16:ec:35:8c:e6:4a:1d:48:2b: d8:a5:df:2b:6a:05:d7:03:e2:99:76:5d:fc:2d:76:13: 24:fa:9b:e8:cb:5b:99:2c:3b:b1:1b:16:4d:89:f3:27: 76:83:38:af:48:0b:0b:87:ea:de:32:0d:e1:7e:63:e0: 71:d8:35:0b:9d:68:69:0a:68:4e:ca:5b:ca:3e:3f:40 Fingerprint (SHA-256): 12:9D:D4:77:C2:B7:4E:7C:2F:4D:A6:57:DB:4C:B5:4C:AA:C6:63:C4:C3:68:29:9A:C7:0E:92:D7:6B:90:A2:64 Fingerprint (SHA1): 69:6E:B5:96:05:51:28:44:DD:A1:C7:8B:35:5F:3A:C1:8E:5A:61:C6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #3330: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3331: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3332: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3333: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3334: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #3335: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3336: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #3337: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #3338: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #3339: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #3340: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #3341: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #3342: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #3343: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3344: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #3345: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #3346: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #3347: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3348: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145880 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3349: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3350: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3351: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3352: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1226145881 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3353: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3354: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3355: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3356: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1226145882 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3357: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3358: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3359: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3360: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1226145883 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3361: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3362: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3363: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3364: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1226145884 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3365: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3366: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #3367: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3368: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1226145885 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3369: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3370: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #3371: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3372: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1226145886 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3373: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3374: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #3375: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3376: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1226145887 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3377: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3378: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #3379: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3380: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1226145888 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3381: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3382: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3383: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145880 (0x49158058) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:19 2024 Not After : Wed Dec 26 15:03:19 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:a0:ac:b5:20:04:5b:6a:82:16:03:70:2d:a0:5e:67: 91:08:58:4a:b2:e6:7e:ca:07:da:4c:e3:43:73:b8:65: 3c:27:47:f0:49:fc:48:82:17:31:5a:a1:e7:86:f5:10: bd:16:69:1d:ec:2c:3a:ff:dd:89:f1:cd:4b:50:f3:56: da:61:cd:a3:f5:cf:68:67:54:15:3d:ab:05:77:fa:c3: 16:38:ad:6d:e7:0c:3d:cc:ae:54:dd:34:1a:90:8d:91: 04:73:76:ac:57:cc:0d:e0:01:4c:e6:f0:6e:7c:bd:b6: cf:ba:d9:39:39:3b:14:d9:e3:ca:78:ca:7e:1e:b7:25: 62:2c:ea:81:a0:97:8e:66:46:69:80:5c:2e:bc:9e:b7: b2:c7:7a:2f:fa:c5:51:f5:5c:3f:53:ba:6f:9c:af:7c: bc:32:97:69:66:20:00:cf:77:aa:ed:40:34:e8:ef:98: 93:03:38:d5:21:1e:4f:8d:02:84:3b:b0:52:f2:a4:a5: 7a:4e:8b:36:e9:a0:15:ee:50:76:2f:de:c9:f6:69:68: 80:38:1e:0c:0e:43:e6:45:3a:88:61:9f:f6:e8:90:1d: 60:bf:b4:d6:6f:3f:5b:be:2a:2c:91:b6:13:95:f6:77: 53:8a:91:62:06:c7:20:6f:18:d7:44:74:ae:9f:93:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:32:a4:ad:05:d0:76:18:1e:54:1e:f0:f3: fe:18:d7:8f:e3:4b:08:5c:f3:3c:51:73:57:85:ad:39: 02:1c:1f:6f:90:e1:9f:df:fc:34:14:47:fb:3c:36:b3: a4:06:fb:5d:b6:55:62:7e:2f:59:1f:82:b9:1d Fingerprint (SHA-256): C5:B9:2F:75:F0:9F:C0:1F:26:B9:63:89:2A:BB:06:E3:9C:2B:E0:0F:0E:10:85:0A:8A:91:EF:17:D5:FF:05:26 Fingerprint (SHA1): F6:14:FB:7A:C8:EC:C6:C0:51:80:25:EE:E7:D5:39:8A:C6:DB:96:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3384: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145880 (0x49158058) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:19 2024 Not After : Wed Dec 26 15:03:19 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:a0:ac:b5:20:04:5b:6a:82:16:03:70:2d:a0:5e:67: 91:08:58:4a:b2:e6:7e:ca:07:da:4c:e3:43:73:b8:65: 3c:27:47:f0:49:fc:48:82:17:31:5a:a1:e7:86:f5:10: bd:16:69:1d:ec:2c:3a:ff:dd:89:f1:cd:4b:50:f3:56: da:61:cd:a3:f5:cf:68:67:54:15:3d:ab:05:77:fa:c3: 16:38:ad:6d:e7:0c:3d:cc:ae:54:dd:34:1a:90:8d:91: 04:73:76:ac:57:cc:0d:e0:01:4c:e6:f0:6e:7c:bd:b6: cf:ba:d9:39:39:3b:14:d9:e3:ca:78:ca:7e:1e:b7:25: 62:2c:ea:81:a0:97:8e:66:46:69:80:5c:2e:bc:9e:b7: b2:c7:7a:2f:fa:c5:51:f5:5c:3f:53:ba:6f:9c:af:7c: bc:32:97:69:66:20:00:cf:77:aa:ed:40:34:e8:ef:98: 93:03:38:d5:21:1e:4f:8d:02:84:3b:b0:52:f2:a4:a5: 7a:4e:8b:36:e9:a0:15:ee:50:76:2f:de:c9:f6:69:68: 80:38:1e:0c:0e:43:e6:45:3a:88:61:9f:f6:e8:90:1d: 60:bf:b4:d6:6f:3f:5b:be:2a:2c:91:b6:13:95:f6:77: 53:8a:91:62:06:c7:20:6f:18:d7:44:74:ae:9f:93:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:32:a4:ad:05:d0:76:18:1e:54:1e:f0:f3: fe:18:d7:8f:e3:4b:08:5c:f3:3c:51:73:57:85:ad:39: 02:1c:1f:6f:90:e1:9f:df:fc:34:14:47:fb:3c:36:b3: a4:06:fb:5d:b6:55:62:7e:2f:59:1f:82:b9:1d Fingerprint (SHA-256): C5:B9:2F:75:F0:9F:C0:1F:26:B9:63:89:2A:BB:06:E3:9C:2B:E0:0F:0E:10:85:0A:8A:91:EF:17:D5:FF:05:26 Fingerprint (SHA1): F6:14:FB:7A:C8:EC:C6:C0:51:80:25:EE:E7:D5:39:8A:C6:DB:96:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #3385: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145880 (0x49158058) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:19 2024 Not After : Wed Dec 26 15:03:19 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:a0:ac:b5:20:04:5b:6a:82:16:03:70:2d:a0:5e:67: 91:08:58:4a:b2:e6:7e:ca:07:da:4c:e3:43:73:b8:65: 3c:27:47:f0:49:fc:48:82:17:31:5a:a1:e7:86:f5:10: bd:16:69:1d:ec:2c:3a:ff:dd:89:f1:cd:4b:50:f3:56: da:61:cd:a3:f5:cf:68:67:54:15:3d:ab:05:77:fa:c3: 16:38:ad:6d:e7:0c:3d:cc:ae:54:dd:34:1a:90:8d:91: 04:73:76:ac:57:cc:0d:e0:01:4c:e6:f0:6e:7c:bd:b6: cf:ba:d9:39:39:3b:14:d9:e3:ca:78:ca:7e:1e:b7:25: 62:2c:ea:81:a0:97:8e:66:46:69:80:5c:2e:bc:9e:b7: b2:c7:7a:2f:fa:c5:51:f5:5c:3f:53:ba:6f:9c:af:7c: bc:32:97:69:66:20:00:cf:77:aa:ed:40:34:e8:ef:98: 93:03:38:d5:21:1e:4f:8d:02:84:3b:b0:52:f2:a4:a5: 7a:4e:8b:36:e9:a0:15:ee:50:76:2f:de:c9:f6:69:68: 80:38:1e:0c:0e:43:e6:45:3a:88:61:9f:f6:e8:90:1d: 60:bf:b4:d6:6f:3f:5b:be:2a:2c:91:b6:13:95:f6:77: 53:8a:91:62:06:c7:20:6f:18:d7:44:74:ae:9f:93:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:32:a4:ad:05:d0:76:18:1e:54:1e:f0:f3: fe:18:d7:8f:e3:4b:08:5c:f3:3c:51:73:57:85:ad:39: 02:1c:1f:6f:90:e1:9f:df:fc:34:14:47:fb:3c:36:b3: a4:06:fb:5d:b6:55:62:7e:2f:59:1f:82:b9:1d Fingerprint (SHA-256): C5:B9:2F:75:F0:9F:C0:1F:26:B9:63:89:2A:BB:06:E3:9C:2B:E0:0F:0E:10:85:0A:8A:91:EF:17:D5:FF:05:26 Fingerprint (SHA1): F6:14:FB:7A:C8:EC:C6:C0:51:80:25:EE:E7:D5:39:8A:C6:DB:96:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #3386: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145880 (0x49158058) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:19 2024 Not After : Wed Dec 26 15:03:19 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 79:a0:ac:b5:20:04:5b:6a:82:16:03:70:2d:a0:5e:67: 91:08:58:4a:b2:e6:7e:ca:07:da:4c:e3:43:73:b8:65: 3c:27:47:f0:49:fc:48:82:17:31:5a:a1:e7:86:f5:10: bd:16:69:1d:ec:2c:3a:ff:dd:89:f1:cd:4b:50:f3:56: da:61:cd:a3:f5:cf:68:67:54:15:3d:ab:05:77:fa:c3: 16:38:ad:6d:e7:0c:3d:cc:ae:54:dd:34:1a:90:8d:91: 04:73:76:ac:57:cc:0d:e0:01:4c:e6:f0:6e:7c:bd:b6: cf:ba:d9:39:39:3b:14:d9:e3:ca:78:ca:7e:1e:b7:25: 62:2c:ea:81:a0:97:8e:66:46:69:80:5c:2e:bc:9e:b7: b2:c7:7a:2f:fa:c5:51:f5:5c:3f:53:ba:6f:9c:af:7c: bc:32:97:69:66:20:00:cf:77:aa:ed:40:34:e8:ef:98: 93:03:38:d5:21:1e:4f:8d:02:84:3b:b0:52:f2:a4:a5: 7a:4e:8b:36:e9:a0:15:ee:50:76:2f:de:c9:f6:69:68: 80:38:1e:0c:0e:43:e6:45:3a:88:61:9f:f6:e8:90:1d: 60:bf:b4:d6:6f:3f:5b:be:2a:2c:91:b6:13:95:f6:77: 53:8a:91:62:06:c7:20:6f:18:d7:44:74:ae:9f:93:2c Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:32:a4:ad:05:d0:76:18:1e:54:1e:f0:f3: fe:18:d7:8f:e3:4b:08:5c:f3:3c:51:73:57:85:ad:39: 02:1c:1f:6f:90:e1:9f:df:fc:34:14:47:fb:3c:36:b3: a4:06:fb:5d:b6:55:62:7e:2f:59:1f:82:b9:1d Fingerprint (SHA-256): C5:B9:2F:75:F0:9F:C0:1F:26:B9:63:89:2A:BB:06:E3:9C:2B:E0:0F:0E:10:85:0A:8A:91:EF:17:D5:FF:05:26 Fingerprint (SHA1): F6:14:FB:7A:C8:EC:C6:C0:51:80:25:EE:E7:D5:39:8A:C6:DB:96:A0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #3387: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3388: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3389: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3390: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3391: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3392: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3393: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3394: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3395: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3396: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3397: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3398: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3399: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3400: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3401: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3402: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #3403: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3404: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3405: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3406: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3407: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3408: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3409: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3410: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3411: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3412: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3413: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3414: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226150330Z nextupdate=20251226150330Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 15:03:30 2024 Next Update: Fri Dec 26 15:03:30 2025 CRL Extensions: chains.sh: #3415: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150331Z nextupdate=20251226150331Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:03:31 2024 Next Update: Fri Dec 26 15:03:31 2025 CRL Extensions: chains.sh: #3416: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226150331Z nextupdate=20251226150331Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 15:03:31 2024 Next Update: Fri Dec 26 15:03:31 2025 CRL Extensions: chains.sh: #3417: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226150331Z nextupdate=20251226150331Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 15:03:31 2024 Next Update: Fri Dec 26 15:03:31 2025 CRL Extensions: chains.sh: #3418: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226150332Z addcert 14 20241226150332Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 15:03:32 2024 Next Update: Fri Dec 26 15:03:31 2025 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Thu Dec 26 15:03:32 2024 CRL Extensions: chains.sh: #3419: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150333Z addcert 15 20241226150333Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:03:33 2024 Next Update: Fri Dec 26 15:03:31 2025 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Thu Dec 26 15:03:33 2024 CRL Extensions: chains.sh: #3420: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3421: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3422: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3423: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #3424: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #3425: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #3426: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #3427: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #3428: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #3429: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:25 2024 Not After : Wed Dec 26 15:03:25 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:af:72:e4:b5:f5:3f:ae:3c:47:aa:c5:c0:31:db:eb: c4:54:20:8f:97:a1:27:f3:76:65:39:79:57:fa:50:aa: bf:5d:72:23:7d:12:76:b5:cb:de:cb:00:eb:8f:d6:b3: e5:ba:d0:f4:84:00:45:7f:ac:69:5c:fd:08:26:da:94: 03:79:76:2b:9a:99:7f:1d:3a:71:94:f6:c6:3f:c6:59: ee:1b:d5:de:50:89:53:70:72:49:9f:85:25:a9:74:76: a5:cf:8c:c0:74:b0:71:7a:4d:e1:7e:55:99:34:99:61: 56:ed:af:d0:9f:ee:23:9a:d9:16:8c:df:1b:0e:98:4b: 34:bd:f0:e2:a4:c0:2a:63:47:ad:dc:27:70:3c:a3:92: d0:9e:15:ca:9b:bc:32:09:2c:b6:ca:c4:8c:96:84:27: ed:74:c3:0a:bb:4a:a6:e4:93:25:83:e2:8c:92:82:1d: d8:3b:7f:a2:2a:c7:61:5a:a5:c2:bd:6f:ea:e2:32:28: cb:1e:43:5b:f2:65:e3:93:c7:ce:11:d1:d0:c8:8c:a3: bb:95:a7:c9:0c:cd:75:f9:45:d4:1a:0f:10:7f:14:2b: 7e:5d:80:99:44:f1:83:03:07:98:4b:b5:fd:8b:c6:ed: 2b:ad:14:6e:16:2c:22:0f:e2:95:c9:df:77:3e:0a:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:85:ce:0c:14:38:59:4f:da:84:d1:7b:ba:dd:19:ad: 54:e9:9f:29:ce:3c:98:db:b8:8e:8b:eb:01:e0:e1:4a: 2c:e9:4c:ff:df:90:89:76:a9:98:79:eb:0f:40:52:c1: e9:41:2e:60:d2:48:af:63:e5:0e:3b:f1:df:8b:41:8d: a5:94:56:a5:4e:42:fd:ee:b3:57:b9:a9:3b:1a:c0:fc: 24:25:25:08:9b:5f:b3:df:e8:d3:0e:0d:bc:ce:91:07: 9d:9a:d4:ab:ce:f0:04:e5:f5:08:f1:b1:ee:0f:31:ba: f9:12:3e:d2:47:59:ed:ac:e4:d2:aa:59:7f:6c:9d:7d: 57:e5:be:66:8c:06:20:f5:53:27:df:fd:06:42:34:1d: fd:5b:2d:3a:95:bb:af:aa:b7:4c:f7:e7:c8:7d:e3:18: b9:d2:53:87:8d:b7:01:fa:cc:4b:94:0c:f2:cb:c2:d8: 30:f1:b1:fb:28:8e:65:b0:dc:41:7f:6e:cf:4a:ed:44: 02:4a:94:bd:31:55:cb:a5:3d:5b:7b:b1:55:29:a1:0e: 58:01:c2:5a:c0:00:9c:92:e3:14:a8:40:46:62:37:f2: b9:70:69:24:21:8f:99:02:c5:26:3b:37:84:b4:96:52: ba:7d:5d:8d:50:bd:c7:44:2d:45:f7:d8:14:b8:03:82 Fingerprint (SHA-256): B0:CA:E0:A4:DB:6C:6B:9D:EA:B2:2E:6F:A2:1A:DF:9C:47:15:EE:32:54:AC:33:F4:1B:6A:99:AD:0D:FE:71:3F Fingerprint (SHA1): 43:03:E0:A0:EF:48:8D:0F:AE:C9:1A:0A:B2:29:F2:60:07:A3:B0:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3430: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3431: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:25 2024 Not After : Wed Dec 26 15:03:25 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:af:72:e4:b5:f5:3f:ae:3c:47:aa:c5:c0:31:db:eb: c4:54:20:8f:97:a1:27:f3:76:65:39:79:57:fa:50:aa: bf:5d:72:23:7d:12:76:b5:cb:de:cb:00:eb:8f:d6:b3: e5:ba:d0:f4:84:00:45:7f:ac:69:5c:fd:08:26:da:94: 03:79:76:2b:9a:99:7f:1d:3a:71:94:f6:c6:3f:c6:59: ee:1b:d5:de:50:89:53:70:72:49:9f:85:25:a9:74:76: a5:cf:8c:c0:74:b0:71:7a:4d:e1:7e:55:99:34:99:61: 56:ed:af:d0:9f:ee:23:9a:d9:16:8c:df:1b:0e:98:4b: 34:bd:f0:e2:a4:c0:2a:63:47:ad:dc:27:70:3c:a3:92: d0:9e:15:ca:9b:bc:32:09:2c:b6:ca:c4:8c:96:84:27: ed:74:c3:0a:bb:4a:a6:e4:93:25:83:e2:8c:92:82:1d: d8:3b:7f:a2:2a:c7:61:5a:a5:c2:bd:6f:ea:e2:32:28: cb:1e:43:5b:f2:65:e3:93:c7:ce:11:d1:d0:c8:8c:a3: bb:95:a7:c9:0c:cd:75:f9:45:d4:1a:0f:10:7f:14:2b: 7e:5d:80:99:44:f1:83:03:07:98:4b:b5:fd:8b:c6:ed: 2b:ad:14:6e:16:2c:22:0f:e2:95:c9:df:77:3e:0a:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:85:ce:0c:14:38:59:4f:da:84:d1:7b:ba:dd:19:ad: 54:e9:9f:29:ce:3c:98:db:b8:8e:8b:eb:01:e0:e1:4a: 2c:e9:4c:ff:df:90:89:76:a9:98:79:eb:0f:40:52:c1: e9:41:2e:60:d2:48:af:63:e5:0e:3b:f1:df:8b:41:8d: a5:94:56:a5:4e:42:fd:ee:b3:57:b9:a9:3b:1a:c0:fc: 24:25:25:08:9b:5f:b3:df:e8:d3:0e:0d:bc:ce:91:07: 9d:9a:d4:ab:ce:f0:04:e5:f5:08:f1:b1:ee:0f:31:ba: f9:12:3e:d2:47:59:ed:ac:e4:d2:aa:59:7f:6c:9d:7d: 57:e5:be:66:8c:06:20:f5:53:27:df:fd:06:42:34:1d: fd:5b:2d:3a:95:bb:af:aa:b7:4c:f7:e7:c8:7d:e3:18: b9:d2:53:87:8d:b7:01:fa:cc:4b:94:0c:f2:cb:c2:d8: 30:f1:b1:fb:28:8e:65:b0:dc:41:7f:6e:cf:4a:ed:44: 02:4a:94:bd:31:55:cb:a5:3d:5b:7b:b1:55:29:a1:0e: 58:01:c2:5a:c0:00:9c:92:e3:14:a8:40:46:62:37:f2: b9:70:69:24:21:8f:99:02:c5:26:3b:37:84:b4:96:52: ba:7d:5d:8d:50:bd:c7:44:2d:45:f7:d8:14:b8:03:82 Fingerprint (SHA-256): B0:CA:E0:A4:DB:6C:6B:9D:EA:B2:2E:6F:A2:1A:DF:9C:47:15:EE:32:54:AC:33:F4:1B:6A:99:AD:0D:FE:71:3F Fingerprint (SHA1): 43:03:E0:A0:EF:48:8D:0F:AE:C9:1A:0A:B2:29:F2:60:07:A3:B0:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3432: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3433: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED tstclnt -4 -h localhost.localdomain -p 9535 -q -t 20 chains.sh: #3434: Test that OCSP server is reachable - PASSED chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #3435: OCSP: Creating DB OCSPRootDB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRootDB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRootDB -f OCSPRootDB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3436: OCSP: Importing certificate OCSPRoot.der to OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #3437: OCSP: Creating DB OCSPCA1DB - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/pk12util -d OCSPCA1DB -i ../OCSPD/OCSPCA1.p12 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #3438: OCSP: Importing p12 key OCSPCA1.p12 to OCSPCA1DB database - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226150336Z nextupdate=20251226150336Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 15:03:36 2024 Next Update: Fri Dec 26 15:03:36 2025 CRL Extensions: chains.sh: #3439: OCSP: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226150337Z addcert 3 20241226150337Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 15:03:37 2024 Next Update: Fri Dec 26 15:03:36 2025 Entry 1 (0x1): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 15:03:37 2024 CRL Extensions: chains.sh: #3440: OCSP: Revoking certificate with SN 3 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20241226150338Z addcert 4 20241226150338Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Thu Dec 26 15:03:38 2024 Next Update: Fri Dec 26 15:03:36 2025 Entry 1 (0x1): Serial Number: 4 (0x4) Revocation Date: Thu Dec 26 15:03:38 2024 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Thu Dec 26 15:03:37 2024 CRL Extensions: chains.sh: #3441: OCSP: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3442: OCSP: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3443: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE15 EE,O=OCSPEE15,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3444: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3445: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE21 EE,O=OCSPEE21,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #3446: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3447: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g chain -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3448: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g chain -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE31 EE,O=OCSPEE31,C=US" Certificate 2 Subject: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" Returned value is 0, expected result is pass chains.sh: #3449: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE31OCSPCA3.der ../OCSPD/OCSPCA3OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3450: OCSP: Verifying certificate(s) OCSPEE31OCSPCA3.cert OCSPCA3OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -h requireFreshInfo -m ocsp -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s doNotUse ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3451: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s doNotUse -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s forbidFetching ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE12 EE,O=OCSPEE12,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #3452: OCSP: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s forbidFetching -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE15OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8071: The OCSP server experienced an internal error. Returned value is 1, expected result is fail chains.sh: #3453: OCSP: Verifying certificate(s) OCSPEE15OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot vfychain -d OCSPRootDB -pp -vv -g leaf -m ocsp -s failIfNoInfo ../OCSPD/OCSPEE21OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3454: OCSP: Verifying certificate(s) OCSPEE21OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRootDB -pp -g leaf -m ocsp -s failIfNoInfo -t OCSPRoot - PASSED chains.sh: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 vfychain -d OCSPCA1DB -pp -vv -g leaf -h testLocalInfoFirst -m ocsp ../OCSPD/OCSPEE13OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der -t OCSPCA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:32 2024 Not After : Wed Dec 26 14:53:32 2029 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:a6:8c:06:ff:d5:8b:08:1c:e3:3d:cb:6b:72:7a:a1: 0f:b9:a6:a1:84:8c:81:e3:50:0f:fa:92:0a:e1:18:33: 3d:59:b8:61:b5:a0:1e:55:31:f4:00:4e:9b:2c:d7:c3: 13:b9:52:94:3a:ce:79:f3:7c:43:86:d2:f8:68:5c:8f: 2b:47:24:5e:2b:35:4d:58:1c:30:79:a7:d6:e4:a3:e4: f4:a0:bb:92:89:c3:77:9c:2f:ff:7a:05:15:40:75:8e: fa:23:5f:20:28:5a:80:d7:37:52:41:c5:40:ff:94:24: e3:9d:24:91:62:1d:7a:8d:8f:c2:f0:99:5a:21:09:63: c8:89:c1:e3:6c:8d:30:bb:37:6b:57:09:b9:71:d2:e1: 7b:66:ab:ef:fa:83:3f:20:c9:35:a6:ac:57:37:aa:23: 73:1a:22:b6:5d:d4:07:8e:0e:2f:e6:a0:fe:92:d2:ea: 81:53:9a:fc:75:57:b6:9e:7e:ce:bb:59:53:89:9d:04: 24:f4:cb:c2:a1:e4:9e:ed:36:34:a8:32:3e:87:fa:ad: 6e:bb:9f:7c:95:77:2e:52:26:0d:73:a9:9b:98:ba:f2: e6:c9:88:fd:e5:26:ea:08:39:b4:57:a8:c6:f2:fa:46: f7:96:15:68:3e:3e:14:db:92:4c:96:e9:66:90:06:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Authority Information Access Method: PKIX Online Certificate Status Protocol Location: URI: "http://localhost.localdomain:9535/ocsp" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:e8:2c:6b:8a:81:07:1d:1c:3e:7f:66:ec:57:a1:1b: c6:07:b4:66:e5:ca:2c:62:25:fe:a0:7c:11:05:06:d8: 08:56:50:08:af:2d:ad:54:e0:67:dd:72:67:37:dd:7a: f0:fc:f0:7d:24:1c:71:08:22:12:12:df:ba:ec:8d:44: 88:51:9c:25:d9:76:3c:81:98:a8:76:d3:bd:ea:ab:9f: 7b:e4:d1:bd:9c:e7:f6:34:02:27:b3:4c:0b:51:b2:38: 15:9e:d8:56:e1:c5:03:8f:6d:82:5b:e9:c0:17:39:76: 6b:1e:c2:2b:ac:ff:6d:39:e4:b5:1a:d1:99:3c:16:e1: be:40:d8:98:c6:e4:a6:10:ed:d1:95:f8:83:16:fe:83: 7b:9b:ac:34:d7:8d:46:18:a6:76:8c:53:f4:fd:e5:b2: 0b:1a:f4:4e:c4:3c:25:89:17:a4:22:05:c9:6c:83:dd: 09:2d:5f:22:64:95:fc:19:85:41:76:be:6f:78:ae:03: 21:3d:2f:ce:c1:09:13:b8:75:77:df:09:f3:8a:07:c2: b9:4f:04:cb:2a:74:e1:c6:1d:ba:ff:14:1c:42:10:94: 74:f9:4b:b9:fa:1c:72:b2:86:ff:61:2b:5c:14:be:5e: a8:f4:30:10:b7:23:6c:65:0e:09:cf:b6:f1:be:16:dd Fingerprint (SHA-256): 70:93:0C:46:0E:61:B9:C4:18:86:16:D0:04:74:5B:1D:0E:F9:A3:87:48:39:CA:5D:51:0B:76:98:06:28:64:DD Fingerprint (SHA1): 9D:E2:9E:AA:F5:38:27:30:35:12:D1:34:4D:E6:F4:2E:A8:66:E8:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User Certificate 1 Subject: "CN=OCSPEE13 EE,O=OCSPEE13,C=US" Returned value is 0, expected result is pass chains.sh: #3455: OCSP: Verifying certificate(s) OCSPEE13OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d OCSPCA1DB -pp -g leaf -h testLocalInfoFirst -m ocsp -t OCSPCA1 - PASSED chains.sh: Creating DB OCSPRoot1DB certutil -N -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd chains.sh: #3456: OCSP: Creating DB OCSPRoot1DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot1DB database certutil -A -n OCSPRoot -t "CT,C,C" -d OCSPRoot1DB -f OCSPRoot1DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3457: OCSP: Importing certificate OCSPRoot.der to OCSPRoot1DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot1DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3458: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot1DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB OCSPRoot2DB certutil -N -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd chains.sh: #3459: OCSP: Creating DB OCSPRoot2DB - PASSED chains.sh: Importing certificate OCSPRoot.der to OCSPRoot2DB database certutil -A -n OCSPRoot -t "T,," -d OCSPRoot2DB -f OCSPRoot2DB/dbpasswd -i ../OCSPD/OCSPRoot.der chains.sh: #3460: OCSP: Importing certificate OCSPRoot.der to OCSPRoot2DB database - PASSED chains.sh: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot vfychain -d OCSPRoot2DB -pp -vv -g chain -m ocsp -g leaf -m ocsp ../OCSPD/OCSPEE23OCSPCA2.der ../OCSPD/OCSPCA2OCSPRoot.der -t OCSPRoot Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145331 (0x49157e33) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Thu Dec 26 14:53:30 2024 Not After : Wed Dec 26 14:53:30 2074 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:2e:06:05:bf:c1:72:ef:09:7f:32:fe:04:2b:af:9e: 14:45:b3:8a:99:3a:db:af:cd:43:c9:f0:4f:2d:81:3e: 02:df:65:c2:f1:93:df:12:57:b6:75:b3:28:56:3e:b0: 64:5b:b2:a3:90:70:60:b0:af:5f:a6:31:fd:b6:99:a2: 91:26:8a:63:34:62:b1:26:a1:d2:19:ec:a3:f4:61:c1: 5a:80:93:57:66:29:b6:e4:9f:c2:c4:23:15:53:53:46: f5:b1:e1:57:d5:ef:28:eb:a2:71:e9:a9:2d:6a:ec:a0: 30:6b:bf:31:e0:04:ed:7a:d5:6a:01:78:ee:1f:8f:5e: fd:61:53:85:86:d1:49:16:3d:b1:0a:91:ed:ee:04:11: 91:8e:1f:d2:8c:c7:e8:a7:17:9b:0c:d2:8a:e5:fe:f4: 6a:2f:5d:e9:39:c9:60:75:99:a1:ae:f7:dd:2b:91:43: 67:00:b5:05:d9:c8:b4:50:ad:68:b9:da:05:8a:14:50: 8c:12:4f:6b:31:4c:bf:78:50:f4:4a:f0:70:8c:ee:60: 57:3a:a8:c9:5d:8b:df:46:c5:ae:9f:2a:81:bc:87:7e: 5a:30:6d:1b:8d:ea:5d:9d:2d:cb:b0:aa:04:91:99:63: f9:06:c7:16:91:79:86:d7:1c:db:6f:4f:a8:a4:ec:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c7:1b:cc:e8:11:8b:6b:85:ad:2b:45:e2:7f:9c:d9:ae: cc:88:23:71:c4:93:65:74:64:8d:8f:8f:cb:dc:6b:22: 1b:7b:83:57:00:f5:14:a0:ee:10:60:eb:93:19:b7:32: ae:99:79:29:d8:41:d8:1c:62:95:14:dd:4d:16:61:1a: 5c:a6:d8:da:40:40:2a:5c:54:f9:31:ba:8d:e7:59:08: da:79:40:3c:70:73:08:97:74:2f:f3:ee:19:9d:22:b4: 2f:f4:66:9e:b9:75:1e:ce:e9:f1:3b:19:e1:83:3a:3b: 52:17:96:b9:c1:9a:aa:c0:e7:f2:4f:12:68:4a:44:8c: 17:38:da:5d:d8:89:10:ac:13:cb:94:0d:00:59:8c:34: 03:99:55:ff:25:dd:82:d3:87:a0:21:71:b2:b4:2a:29: 09:27:ce:4a:e8:ab:97:40:7a:a8:3a:71:8f:96:28:df: d6:54:90:b5:29:c5:9e:d4:51:02:36:58:df:8c:06:59: 49:c3:1f:93:a2:d2:c2:86:80:73:2a:45:a1:66:11:59: c5:57:34:77:04:fe:ae:19:05:b6:57:1f:6d:2c:e9:f7: 94:6b:1c:97:1b:4c:cf:5f:fc:8d:a0:63:9d:60:e1:99: 19:f6:cc:04:df:16:f3:92:ce:5e:14:d2:b9:ec:9f:88 Fingerprint (SHA-256): 06:94:FB:10:48:BB:1C:AB:85:0E:79:18:ED:AC:3E:85:FB:33:23:C5:FA:76:BD:3B:0F:69:B9:F9:50:6E:EE:D8 Fingerprint (SHA1): 1E:FC:DA:9B:28:02:52:F9:7E:9C:B0:7B:C4:7A:08:36:3A:38:EB:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted Client CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=OCSPEE23 EE,O=OCSPEE23,C=US" Certificate 2 Subject: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" Returned value is 0, expected result is pass chains.sh: #3461: OCSP: Verifying certificate(s) OCSPEE23OCSPCA2.cert OCSPCA2OCSPRoot.cert with flags -d OCSPRoot2DB -pp -g chain -m ocsp -g leaf -m ocsp -t OCSPRoot - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #3462: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145889 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3463: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #3464: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #3465: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3466: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1226145890 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3467: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3468: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3469: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145412.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3470: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145359.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3471: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3472: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #3473: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145412.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3474: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1226145891 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3475: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3476: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3477: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145412.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3478: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145360.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3479: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3480: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #3481: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3482: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1226145892 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3483: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3484: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3485: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145412.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3486: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145361.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3487: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3488: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3489: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:9535/localhost-15633-CA0-1226145412.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #3490: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:9535/localhost-15633-CA0Root-1226145362.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #3491: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3492: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20241226150347Z nextupdate=20251226150347Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Thu Dec 26 15:03:47 2024 Next Update: Fri Dec 26 15:03:47 2025 CRL Extensions: chains.sh: #3493: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150347Z nextupdate=20251226150347Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:03:47 2024 Next Update: Fri Dec 26 15:03:47 2025 CRL Extensions: chains.sh: #3494: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20241226150347Z nextupdate=20251226150347Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Thu Dec 26 15:03:47 2024 Next Update: Fri Dec 26 15:03:47 2025 CRL Extensions: chains.sh: #3495: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20241226150347Z nextupdate=20251226150347Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Thu Dec 26 15:03:47 2024 Next Update: Fri Dec 26 15:03:47 2025 CRL Extensions: chains.sh: #3496: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150348Z addcert 20 20241226150348Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:03:48 2024 Next Update: Fri Dec 26 15:03:47 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 15:03:48 2024 CRL Extensions: chains.sh: #3497: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20241226150349Z addcert 40 20241226150349Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Thu Dec 26 15:03:49 2024 Next Update: Fri Dec 26 15:03:47 2025 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Thu Dec 26 15:03:48 2024 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Thu Dec 26 15:03:49 2024 CRL Extensions: chains.sh: #3498: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #3499: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3500: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #3501: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145889 (0x49158061) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:41 2024 Not After : Wed Dec 26 15:03:41 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:3d:1e:ed:3b:ac:a2:02:50:4c:51:ab:38:30:f1:7f: 08:5b:e1:15:02:7e:58:53:2c:d7:09:93:46:e5:4e:12: 73:f7:cb:c8:62:df:a0:fb:f8:eb:25:86:81:c9:c7:10: 42:61:0c:1d:da:56:c7:b8:c6:0e:51:34:fa:11:bd:2c: 6c:18:11:76:a3:3f:48:4d:11:85:4d:c9:a9:d6:60:33: 6e:d1:f9:a9:39:25:ec:ae:c3:61:e1:64:59:5e:84:b4: 06:55:75:43:b4:6e:29:e9:98:37:14:1c:82:40:cc:0b: a9:71:26:06:cf:8a:bc:d4:e2:cc:be:11:73:36:51:bf: 32:9c:b3:5a:37:27:c3:47:19:24:72:b5:e6:32:83:82: c4:6d:8f:b8:41:53:b5:33:dd:f0:05:3a:3c:69:5e:ed: 91:4d:44:88:93:99:3b:5f:12:b7:2b:6d:04:56:a1:87: f8:45:3e:b1:96:60:1a:45:61:a7:7d:d1:27:f9:02:30: ed:96:4d:53:70:04:6d:d3:59:35:82:f3:cb:d2:a8:c4: 03:05:3c:b5:58:74:92:2a:36:b8:2f:db:f1:e4:79:5c: 75:ae:8b:fb:76:53:8d:ec:45:34:d6:c2:72:4a:82:a0: 2f:26:99:47:16:2d:19:f4:7b:46:a1:6d:93:06:2f:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:b6:90:60:46:62:cc:38:c2:be:16:c2:e0:f5:71:00: 11:4c:7b:9f:e4:54:2d:ec:55:a5:2d:8d:fc:60:0f:71: 8b:8a:89:ae:23:88:ae:ec:de:36:ae:46:0a:13:31:04: df:9b:4e:a4:92:6d:0c:fb:93:c7:e0:d2:a2:d9:9c:08: d9:8b:4c:20:2c:1a:ef:55:49:20:22:f9:ba:94:89:f8: de:38:14:2e:00:7b:7d:ec:23:07:5b:3f:a6:d2:0e:ef: 6b:22:5c:20:3f:5f:dd:bc:11:e9:c5:fb:6f:60:3e:1e: 6c:c2:4e:37:1d:4e:37:f8:37:b5:ea:8c:51:96:31:8c: 79:3d:61:5c:14:a8:2c:10:64:07:23:a9:56:03:27:af: 5b:ee:64:57:76:0b:02:37:75:b3:a5:3f:b6:b8:f2:0b: 7a:d1:aa:70:0e:b2:09:5c:cd:fb:3c:07:b3:06:b7:3d: 05:d4:0e:77:c4:2a:c1:e5:cf:6a:4b:c7:de:5b:cd:34: 5d:bd:56:84:82:d5:1b:92:8d:b1:9b:b6:da:97:89:e6: c3:b9:30:bf:54:b5:8a:35:04:9e:2e:d3:a1:5a:eb:db: 8a:be:98:24:80:b6:de:1b:f1:81:eb:00:62:18:87:d0: 80:11:86:b8:2c:45:c7:42:f6:c2:ef:16:16:0c:4f:b5 Fingerprint (SHA-256): 9C:C5:20:62:4F:98:44:B6:B1:B4:C3:F3:32:B7:54:C6:0D:B6:2D:90:54:6F:7E:FF:76:51:96:D8:85:C8:0E:C7 Fingerprint (SHA1): 35:A3:DD:2D:BE:61:4A:60:A8:48:F9:8A:B4:4D:1F:44:68:68:B2:08 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3502: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3503: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145889 (0x49158061) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Thu Dec 26 15:03:41 2024 Not After : Wed Dec 26 15:03:41 2074 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9c:3d:1e:ed:3b:ac:a2:02:50:4c:51:ab:38:30:f1:7f: 08:5b:e1:15:02:7e:58:53:2c:d7:09:93:46:e5:4e:12: 73:f7:cb:c8:62:df:a0:fb:f8:eb:25:86:81:c9:c7:10: 42:61:0c:1d:da:56:c7:b8:c6:0e:51:34:fa:11:bd:2c: 6c:18:11:76:a3:3f:48:4d:11:85:4d:c9:a9:d6:60:33: 6e:d1:f9:a9:39:25:ec:ae:c3:61:e1:64:59:5e:84:b4: 06:55:75:43:b4:6e:29:e9:98:37:14:1c:82:40:cc:0b: a9:71:26:06:cf:8a:bc:d4:e2:cc:be:11:73:36:51:bf: 32:9c:b3:5a:37:27:c3:47:19:24:72:b5:e6:32:83:82: c4:6d:8f:b8:41:53:b5:33:dd:f0:05:3a:3c:69:5e:ed: 91:4d:44:88:93:99:3b:5f:12:b7:2b:6d:04:56:a1:87: f8:45:3e:b1:96:60:1a:45:61:a7:7d:d1:27:f9:02:30: ed:96:4d:53:70:04:6d:d3:59:35:82:f3:cb:d2:a8:c4: 03:05:3c:b5:58:74:92:2a:36:b8:2f:db:f1:e4:79:5c: 75:ae:8b:fb:76:53:8d:ec:45:34:d6:c2:72:4a:82:a0: 2f:26:99:47:16:2d:19:f4:7b:46:a1:6d:93:06:2f:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:b6:90:60:46:62:cc:38:c2:be:16:c2:e0:f5:71:00: 11:4c:7b:9f:e4:54:2d:ec:55:a5:2d:8d:fc:60:0f:71: 8b:8a:89:ae:23:88:ae:ec:de:36:ae:46:0a:13:31:04: df:9b:4e:a4:92:6d:0c:fb:93:c7:e0:d2:a2:d9:9c:08: d9:8b:4c:20:2c:1a:ef:55:49:20:22:f9:ba:94:89:f8: de:38:14:2e:00:7b:7d:ec:23:07:5b:3f:a6:d2:0e:ef: 6b:22:5c:20:3f:5f:dd:bc:11:e9:c5:fb:6f:60:3e:1e: 6c:c2:4e:37:1d:4e:37:f8:37:b5:ea:8c:51:96:31:8c: 79:3d:61:5c:14:a8:2c:10:64:07:23:a9:56:03:27:af: 5b:ee:64:57:76:0b:02:37:75:b3:a5:3f:b6:b8:f2:0b: 7a:d1:aa:70:0e:b2:09:5c:cd:fb:3c:07:b3:06:b7:3d: 05:d4:0e:77:c4:2a:c1:e5:cf:6a:4b:c7:de:5b:cd:34: 5d:bd:56:84:82:d5:1b:92:8d:b1:9b:b6:da:97:89:e6: c3:b9:30:bf:54:b5:8a:35:04:9e:2e:d3:a1:5a:eb:db: 8a:be:98:24:80:b6:de:1b:f1:81:eb:00:62:18:87:d0: 80:11:86:b8:2c:45:c7:42:f6:c2:ef:16:16:0c:4f:b5 Fingerprint (SHA-256): 9C:C5:20:62:4F:98:44:B6:B1:B4:C3:F3:32:B7:54:C6:0D:B6:2D:90:54:6F:7E:FF:76:51:96:D8:85:C8:0E:C7 Fingerprint (SHA1): 35:A3:DD:2D:BE:61:4A:60:A8:48:F9:8A:B4:4D:1F:44:68:68:B2:08 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #3504: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #3505: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #3506: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145893 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3507: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #3508: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #3509: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3510: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1226145894 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3511: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3512: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #3513: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3514: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1226145895 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3515: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3516: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #3517: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3518: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1226145896 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3519: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3520: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #3521: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -m 1226145897 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #3522: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #3523: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #3524: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3525: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1226145898 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3526: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3527: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #3528: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #3529: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1226145899 < /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #3530: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #3531: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #3532: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #3533: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #3534: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145893 (0x49158065) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:03:50 2024 Not After : Wed Dec 26 15:03:50 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:d0:a2:8a:7a:a5:41:95:6c:77:82:ed:47:b8:c2:34: ca:37:63:e2:b3:e3:a2:c5:20:80:22:84:96:0d:cc:09: e7:7b:9c:11:fd:fa:46:a2:56:19:74:0d:80:a9:b1:81: c2:d7:fe:21:3a:be:89:56:93:5e:ba:41:65:71:a5:fc: 1e:4b:94:45:03:60:c9:d7:16:e2:f6:25:2f:bb:c7:3d: c8:9d:bd:22:7a:9f:d4:e2:da:a4:03:6e:0e:42:aa:57: 42:e0:78:06:95:d6:55:a1:67:43:c3:d4:3f:ff:a0:72: 99:f3:e7:5a:ec:52:52:2a:1d:25:29:25:ef:1b:d2:1e: 04:9e:a3:21:20:a8:d0:19:97:8c:46:a5:c7:a9:59:27: d2:ce:2d:e1:a1:83:dd:0a:44:aa:60:1f:de:28:0a:58: c1:3f:00:ce:d9:cb:42:4b:40:04:b0:ea:ac:31:b7:e1: 83:e1:a0:1a:fb:cf:df:b9:68:06:00:a7:35:0d:3d:23: 4f:f3:86:99:04:4d:d1:fe:07:e7:5d:bc:3e:cb:18:f3: 43:66:f1:c4:1a:02:09:09:3b:90:ee:36:f9:81:6b:17: 52:13:4a:0b:02:10:93:37:c3:6f:ff:d3:25:0e:19:63: b9:c9:79:93:69:fa:6f:46:e0:a0:9b:c8:e7:6d:76:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:89:5f:de:26:01:e9:d6:f8:fe:1a:bc:f8:3e:8f:e7: 44:b9:e8:de:40:b7:64:9f:73:f8:0e:1c:7c:64:54:f6: 61:53:0d:ca:e4:71:3c:91:27:59:14:f3:ba:8b:ee:04: 01:b7:2b:2d:5c:92:95:02:f3:6c:11:69:da:ba:0c:f5: d0:e0:5f:d1:f5:00:02:8e:28:bb:0d:2d:80:ab:35:6b: 2a:f5:2d:ce:d0:21:ef:c3:90:72:3c:d6:4c:3e:9a:55: 08:96:44:02:b6:9f:87:9e:ac:6b:fb:88:47:1b:90:aa: 2d:90:d4:6a:28:2d:59:0e:bb:f7:25:40:ec:fb:35:45: 2d:88:51:21:e2:cc:25:7f:15:e1:b6:d0:37:fa:22:2a: 69:66:42:a1:39:cf:d1:a9:f1:c1:2a:3d:47:ac:6a:fb: 0c:55:ac:e0:85:9c:67:ca:42:d9:9f:c6:17:cb:c9:e1: b0:81:67:f2:b8:81:ca:70:83:ff:79:0c:f8:69:98:02: ff:47:a0:ab:72:d5:dc:1b:12:ff:70:f9:93:e5:ee:79: c3:89:62:be:f9:48:88:9c:dc:20:38:5a:34:38:0c:f9: ed:9b:59:04:5f:40:cc:38:fb:09:57:26:16:98:d8:24: 6c:17:c7:b3:eb:2e:f0:31:60:f7:45:1d:21:55:61:c9 Fingerprint (SHA-256): 14:93:8F:08:69:DB:30:29:AE:37:F8:47:67:1A:20:AB:0F:C2:B0:C0:27:8E:18:49:6C:54:A4:95:E3:1E:CD:6C Fingerprint (SHA1): F9:D6:66:F5:74:A4:F6:9E:D3:E3:5D:C1:7B:F3:75:88:4B:49:48:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3535: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145895 (0x49158067) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:03:52 2024 Not After : Wed Dec 26 15:03:52 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:36:1d:4f:d0:30:8d:3e:ca:63:d4:9f:5c:28:aa:c6: 20:80:7b:d0:b0:29:f5:2f:75:8f:c5:81:bd:87:89:f4: 8b:5d:b1:9a:e0:20:ca:2a:30:b7:fa:14:e4:26:9f:6e: c9:03:1e:55:88:60:1b:b2:2b:c5:14:22:65:00:2a:18: 7b:f6:41:52:e2:97:15:e7:d4:2a:b5:17:52:4a:05:59: d1:e2:2e:bb:d0:12:11:5a:0c:9e:de:0d:c0:5e:d4:be: 33:9d:6a:db:12:0f:57:96:01:c5:e1:f7:0c:17:04:60: 16:4e:e6:ad:9f:b6:52:3e:e2:91:00:e7:94:1f:64:ad: bd:21:16:b1:2c:56:ee:af:2e:5d:f0:45:cb:7c:98:a5: dd:9a:eb:bb:40:cc:7d:d3:7b:3a:38:cd:47:e3:f1:75: 38:ea:ba:4b:f3:82:c0:2b:a1:ee:23:58:1a:cd:cc:28: 38:50:c5:42:4e:f5:0a:ed:93:72:6e:cf:aa:c4:0a:8a: 52:43:33:d2:98:2d:da:a6:e6:46:68:a0:e5:d5:77:39: fa:44:7d:32:05:f4:73:9a:07:25:27:c0:4f:01:82:7a: bd:ee:80:80:e7:83:8b:90:1d:69:c6:d8:1c:11:d7:f4: ef:8a:eb:0f:6f:31:74:4d:2a:2a:7b:99:b8:b8:9e:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:a4:91:c1:b9:58:a5:3c:0a:dc:16:26:99:0b:94:45: 60:dd:22:c3:9e:f8:ac:98:c0:a9:53:af:8e:90:e9:a9: a6:e9:44:08:e2:87:7c:46:24:57:3e:e3:10:72:87:25: a6:0d:1b:f2:cf:5c:e7:b3:74:a2:9a:67:e0:13:5d:ab: de:1d:66:26:7d:13:52:d3:17:5e:5f:da:4f:aa:d4:8d: 80:39:9c:32:a5:8b:7e:77:5f:12:63:22:17:34:94:d9: 47:ee:f0:0f:f6:59:3c:90:b8:41:83:4f:60:ea:2f:e6: 32:97:41:f9:c2:88:46:c5:c5:48:4e:7e:b0:ad:3e:bc: 71:4d:6a:55:fc:21:7c:b4:f9:3c:ef:9f:8b:d0:35:eb: fc:59:4c:53:20:fa:37:5b:5a:bd:cf:96:42:a2:56:0b: 34:e0:33:0c:80:b6:95:08:78:58:56:02:fb:0b:ec:f8: 10:08:3f:ea:e1:27:aa:71:ee:c8:2c:57:b8:08:09:f3: 8f:c1:d5:b9:c0:95:ea:cc:6c:bb:8e:c6:8a:7b:dd:1d: a6:3d:4a:97:7d:7d:66:0f:b9:ee:2e:41:9d:b6:ed:63: b9:63:7d:f3:8a:60:77:93:69:33:7d:c1:b9:dd:52:68: 63:38:45:95:61:6a:68:31:86:83:9e:e4:0f:40:bd:2f Fingerprint (SHA-256): A9:4F:AF:6C:84:03:DE:61:25:FA:D9:03:56:69:72:1B:EA:EE:61:1A:36:98:F7:8D:F6:61:D9:88:23:72:5B:AE Fingerprint (SHA1): 9F:69:B7:DF:1F:46:C4:73:7F:65:A0:3F:92:D7:4D:03:C4:CA:92:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3536: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145893 (0x49158065) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:03:50 2024 Not After : Wed Dec 26 15:03:50 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:d0:a2:8a:7a:a5:41:95:6c:77:82:ed:47:b8:c2:34: ca:37:63:e2:b3:e3:a2:c5:20:80:22:84:96:0d:cc:09: e7:7b:9c:11:fd:fa:46:a2:56:19:74:0d:80:a9:b1:81: c2:d7:fe:21:3a:be:89:56:93:5e:ba:41:65:71:a5:fc: 1e:4b:94:45:03:60:c9:d7:16:e2:f6:25:2f:bb:c7:3d: c8:9d:bd:22:7a:9f:d4:e2:da:a4:03:6e:0e:42:aa:57: 42:e0:78:06:95:d6:55:a1:67:43:c3:d4:3f:ff:a0:72: 99:f3:e7:5a:ec:52:52:2a:1d:25:29:25:ef:1b:d2:1e: 04:9e:a3:21:20:a8:d0:19:97:8c:46:a5:c7:a9:59:27: d2:ce:2d:e1:a1:83:dd:0a:44:aa:60:1f:de:28:0a:58: c1:3f:00:ce:d9:cb:42:4b:40:04:b0:ea:ac:31:b7:e1: 83:e1:a0:1a:fb:cf:df:b9:68:06:00:a7:35:0d:3d:23: 4f:f3:86:99:04:4d:d1:fe:07:e7:5d:bc:3e:cb:18:f3: 43:66:f1:c4:1a:02:09:09:3b:90:ee:36:f9:81:6b:17: 52:13:4a:0b:02:10:93:37:c3:6f:ff:d3:25:0e:19:63: b9:c9:79:93:69:fa:6f:46:e0:a0:9b:c8:e7:6d:76:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:89:5f:de:26:01:e9:d6:f8:fe:1a:bc:f8:3e:8f:e7: 44:b9:e8:de:40:b7:64:9f:73:f8:0e:1c:7c:64:54:f6: 61:53:0d:ca:e4:71:3c:91:27:59:14:f3:ba:8b:ee:04: 01:b7:2b:2d:5c:92:95:02:f3:6c:11:69:da:ba:0c:f5: d0:e0:5f:d1:f5:00:02:8e:28:bb:0d:2d:80:ab:35:6b: 2a:f5:2d:ce:d0:21:ef:c3:90:72:3c:d6:4c:3e:9a:55: 08:96:44:02:b6:9f:87:9e:ac:6b:fb:88:47:1b:90:aa: 2d:90:d4:6a:28:2d:59:0e:bb:f7:25:40:ec:fb:35:45: 2d:88:51:21:e2:cc:25:7f:15:e1:b6:d0:37:fa:22:2a: 69:66:42:a1:39:cf:d1:a9:f1:c1:2a:3d:47:ac:6a:fb: 0c:55:ac:e0:85:9c:67:ca:42:d9:9f:c6:17:cb:c9:e1: b0:81:67:f2:b8:81:ca:70:83:ff:79:0c:f8:69:98:02: ff:47:a0:ab:72:d5:dc:1b:12:ff:70:f9:93:e5:ee:79: c3:89:62:be:f9:48:88:9c:dc:20:38:5a:34:38:0c:f9: ed:9b:59:04:5f:40:cc:38:fb:09:57:26:16:98:d8:24: 6c:17:c7:b3:eb:2e:f0:31:60:f7:45:1d:21:55:61:c9 Fingerprint (SHA-256): 14:93:8F:08:69:DB:30:29:AE:37:F8:47:67:1A:20:AB:0F:C2:B0:C0:27:8E:18:49:6C:54:A4:95:E3:1E:CD:6C Fingerprint (SHA1): F9:D6:66:F5:74:A4:F6:9E:D3:E3:5D:C1:7B:F3:75:88:4B:49:48:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3537: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #3538: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145893 (0x49158065) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:03:50 2024 Not After : Wed Dec 26 15:03:50 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:d0:a2:8a:7a:a5:41:95:6c:77:82:ed:47:b8:c2:34: ca:37:63:e2:b3:e3:a2:c5:20:80:22:84:96:0d:cc:09: e7:7b:9c:11:fd:fa:46:a2:56:19:74:0d:80:a9:b1:81: c2:d7:fe:21:3a:be:89:56:93:5e:ba:41:65:71:a5:fc: 1e:4b:94:45:03:60:c9:d7:16:e2:f6:25:2f:bb:c7:3d: c8:9d:bd:22:7a:9f:d4:e2:da:a4:03:6e:0e:42:aa:57: 42:e0:78:06:95:d6:55:a1:67:43:c3:d4:3f:ff:a0:72: 99:f3:e7:5a:ec:52:52:2a:1d:25:29:25:ef:1b:d2:1e: 04:9e:a3:21:20:a8:d0:19:97:8c:46:a5:c7:a9:59:27: d2:ce:2d:e1:a1:83:dd:0a:44:aa:60:1f:de:28:0a:58: c1:3f:00:ce:d9:cb:42:4b:40:04:b0:ea:ac:31:b7:e1: 83:e1:a0:1a:fb:cf:df:b9:68:06:00:a7:35:0d:3d:23: 4f:f3:86:99:04:4d:d1:fe:07:e7:5d:bc:3e:cb:18:f3: 43:66:f1:c4:1a:02:09:09:3b:90:ee:36:f9:81:6b:17: 52:13:4a:0b:02:10:93:37:c3:6f:ff:d3:25:0e:19:63: b9:c9:79:93:69:fa:6f:46:e0:a0:9b:c8:e7:6d:76:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:89:5f:de:26:01:e9:d6:f8:fe:1a:bc:f8:3e:8f:e7: 44:b9:e8:de:40:b7:64:9f:73:f8:0e:1c:7c:64:54:f6: 61:53:0d:ca:e4:71:3c:91:27:59:14:f3:ba:8b:ee:04: 01:b7:2b:2d:5c:92:95:02:f3:6c:11:69:da:ba:0c:f5: d0:e0:5f:d1:f5:00:02:8e:28:bb:0d:2d:80:ab:35:6b: 2a:f5:2d:ce:d0:21:ef:c3:90:72:3c:d6:4c:3e:9a:55: 08:96:44:02:b6:9f:87:9e:ac:6b:fb:88:47:1b:90:aa: 2d:90:d4:6a:28:2d:59:0e:bb:f7:25:40:ec:fb:35:45: 2d:88:51:21:e2:cc:25:7f:15:e1:b6:d0:37:fa:22:2a: 69:66:42:a1:39:cf:d1:a9:f1:c1:2a:3d:47:ac:6a:fb: 0c:55:ac:e0:85:9c:67:ca:42:d9:9f:c6:17:cb:c9:e1: b0:81:67:f2:b8:81:ca:70:83:ff:79:0c:f8:69:98:02: ff:47:a0:ab:72:d5:dc:1b:12:ff:70:f9:93:e5:ee:79: c3:89:62:be:f9:48:88:9c:dc:20:38:5a:34:38:0c:f9: ed:9b:59:04:5f:40:cc:38:fb:09:57:26:16:98:d8:24: 6c:17:c7:b3:eb:2e:f0:31:60:f7:45:1d:21:55:61:c9 Fingerprint (SHA-256): 14:93:8F:08:69:DB:30:29:AE:37:F8:47:67:1A:20:AB:0F:C2:B0:C0:27:8E:18:49:6C:54:A4:95:E3:1E:CD:6C Fingerprint (SHA1): F9:D6:66:F5:74:A4:F6:9E:D3:E3:5D:C1:7B:F3:75:88:4B:49:48:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3539: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145895 (0x49158067) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Thu Dec 26 15:03:52 2024 Not After : Wed Dec 26 15:03:52 2029 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:36:1d:4f:d0:30:8d:3e:ca:63:d4:9f:5c:28:aa:c6: 20:80:7b:d0:b0:29:f5:2f:75:8f:c5:81:bd:87:89:f4: 8b:5d:b1:9a:e0:20:ca:2a:30:b7:fa:14:e4:26:9f:6e: c9:03:1e:55:88:60:1b:b2:2b:c5:14:22:65:00:2a:18: 7b:f6:41:52:e2:97:15:e7:d4:2a:b5:17:52:4a:05:59: d1:e2:2e:bb:d0:12:11:5a:0c:9e:de:0d:c0:5e:d4:be: 33:9d:6a:db:12:0f:57:96:01:c5:e1:f7:0c:17:04:60: 16:4e:e6:ad:9f:b6:52:3e:e2:91:00:e7:94:1f:64:ad: bd:21:16:b1:2c:56:ee:af:2e:5d:f0:45:cb:7c:98:a5: dd:9a:eb:bb:40:cc:7d:d3:7b:3a:38:cd:47:e3:f1:75: 38:ea:ba:4b:f3:82:c0:2b:a1:ee:23:58:1a:cd:cc:28: 38:50:c5:42:4e:f5:0a:ed:93:72:6e:cf:aa:c4:0a:8a: 52:43:33:d2:98:2d:da:a6:e6:46:68:a0:e5:d5:77:39: fa:44:7d:32:05:f4:73:9a:07:25:27:c0:4f:01:82:7a: bd:ee:80:80:e7:83:8b:90:1d:69:c6:d8:1c:11:d7:f4: ef:8a:eb:0f:6f:31:74:4d:2a:2a:7b:99:b8:b8:9e:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:a4:91:c1:b9:58:a5:3c:0a:dc:16:26:99:0b:94:45: 60:dd:22:c3:9e:f8:ac:98:c0:a9:53:af:8e:90:e9:a9: a6:e9:44:08:e2:87:7c:46:24:57:3e:e3:10:72:87:25: a6:0d:1b:f2:cf:5c:e7:b3:74:a2:9a:67:e0:13:5d:ab: de:1d:66:26:7d:13:52:d3:17:5e:5f:da:4f:aa:d4:8d: 80:39:9c:32:a5:8b:7e:77:5f:12:63:22:17:34:94:d9: 47:ee:f0:0f:f6:59:3c:90:b8:41:83:4f:60:ea:2f:e6: 32:97:41:f9:c2:88:46:c5:c5:48:4e:7e:b0:ad:3e:bc: 71:4d:6a:55:fc:21:7c:b4:f9:3c:ef:9f:8b:d0:35:eb: fc:59:4c:53:20:fa:37:5b:5a:bd:cf:96:42:a2:56:0b: 34:e0:33:0c:80:b6:95:08:78:58:56:02:fb:0b:ec:f8: 10:08:3f:ea:e1:27:aa:71:ee:c8:2c:57:b8:08:09:f3: 8f:c1:d5:b9:c0:95:ea:cc:6c:bb:8e:c6:8a:7b:dd:1d: a6:3d:4a:97:7d:7d:66:0f:b9:ee:2e:41:9d:b6:ed:63: b9:63:7d:f3:8a:60:77:93:69:33:7d:c1:b9:dd:52:68: 63:38:45:95:61:6a:68:31:86:83:9e:e4:0f:40:bd:2f Fingerprint (SHA-256): A9:4F:AF:6C:84:03:DE:61:25:FA:D9:03:56:69:72:1B:EA:EE:61:1A:36:98:F7:8D:F6:61:D9:88:23:72:5B:AE Fingerprint (SHA1): 9F:69:B7:DF:1F:46:C4:73:7F:65:A0:3F:92:D7:4D:03:C4:CA:92:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #3540: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #3541: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #3542: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #3543: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145893 (0x49158065) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:03:50 2024 Not After : Wed Dec 26 15:03:50 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:d0:a2:8a:7a:a5:41:95:6c:77:82:ed:47:b8:c2:34: ca:37:63:e2:b3:e3:a2:c5:20:80:22:84:96:0d:cc:09: e7:7b:9c:11:fd:fa:46:a2:56:19:74:0d:80:a9:b1:81: c2:d7:fe:21:3a:be:89:56:93:5e:ba:41:65:71:a5:fc: 1e:4b:94:45:03:60:c9:d7:16:e2:f6:25:2f:bb:c7:3d: c8:9d:bd:22:7a:9f:d4:e2:da:a4:03:6e:0e:42:aa:57: 42:e0:78:06:95:d6:55:a1:67:43:c3:d4:3f:ff:a0:72: 99:f3:e7:5a:ec:52:52:2a:1d:25:29:25:ef:1b:d2:1e: 04:9e:a3:21:20:a8:d0:19:97:8c:46:a5:c7:a9:59:27: d2:ce:2d:e1:a1:83:dd:0a:44:aa:60:1f:de:28:0a:58: c1:3f:00:ce:d9:cb:42:4b:40:04:b0:ea:ac:31:b7:e1: 83:e1:a0:1a:fb:cf:df:b9:68:06:00:a7:35:0d:3d:23: 4f:f3:86:99:04:4d:d1:fe:07:e7:5d:bc:3e:cb:18:f3: 43:66:f1:c4:1a:02:09:09:3b:90:ee:36:f9:81:6b:17: 52:13:4a:0b:02:10:93:37:c3:6f:ff:d3:25:0e:19:63: b9:c9:79:93:69:fa:6f:46:e0:a0:9b:c8:e7:6d:76:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:89:5f:de:26:01:e9:d6:f8:fe:1a:bc:f8:3e:8f:e7: 44:b9:e8:de:40:b7:64:9f:73:f8:0e:1c:7c:64:54:f6: 61:53:0d:ca:e4:71:3c:91:27:59:14:f3:ba:8b:ee:04: 01:b7:2b:2d:5c:92:95:02:f3:6c:11:69:da:ba:0c:f5: d0:e0:5f:d1:f5:00:02:8e:28:bb:0d:2d:80:ab:35:6b: 2a:f5:2d:ce:d0:21:ef:c3:90:72:3c:d6:4c:3e:9a:55: 08:96:44:02:b6:9f:87:9e:ac:6b:fb:88:47:1b:90:aa: 2d:90:d4:6a:28:2d:59:0e:bb:f7:25:40:ec:fb:35:45: 2d:88:51:21:e2:cc:25:7f:15:e1:b6:d0:37:fa:22:2a: 69:66:42:a1:39:cf:d1:a9:f1:c1:2a:3d:47:ac:6a:fb: 0c:55:ac:e0:85:9c:67:ca:42:d9:9f:c6:17:cb:c9:e1: b0:81:67:f2:b8:81:ca:70:83:ff:79:0c:f8:69:98:02: ff:47:a0:ab:72:d5:dc:1b:12:ff:70:f9:93:e5:ee:79: c3:89:62:be:f9:48:88:9c:dc:20:38:5a:34:38:0c:f9: ed:9b:59:04:5f:40:cc:38:fb:09:57:26:16:98:d8:24: 6c:17:c7:b3:eb:2e:f0:31:60:f7:45:1d:21:55:61:c9 Fingerprint (SHA-256): 14:93:8F:08:69:DB:30:29:AE:37:F8:47:67:1A:20:AB:0F:C2:B0:C0:27:8E:18:49:6C:54:A4:95:E3:1E:CD:6C Fingerprint (SHA1): F9:D6:66:F5:74:A4:F6:9E:D3:E3:5D:C1:7B:F3:75:88:4B:49:48:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3544: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145897 (0x49158069) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 15:03:53 2024 Not After : Wed Dec 26 15:03:53 2074 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:46:e3:19:dd:e1:cd:b3:50:51:34:0d:d9:1e:93:5e: 4e:17:a2:b2:b5:b8:7d:68:7f:a1:79:37:bd:99:25:f0: ca:c6:20:b2:10:1a:9a:b8:0a:30:4e:41:a8:aa:90:f0: 6d:e1:28:09:0e:3e:7b:50:5e:d3:e0:92:b9:97:a9:89: 61:56:d4:3c:3b:0d:71:dd:e1:a8:60:8e:66:08:da:a2: f1:3c:1a:59:98:ff:ab:2c:39:b1:ca:4c:93:0b:e1:8a: ee:db:35:88:cd:25:77:c7:02:81:10:d0:2a:2f:50:93: 48:00:0f:d6:fb:71:ee:b3:a7:35:0a:62:c6:73:7a:9a: 81:37:af:f9:2c:25:02:37:48:a2:91:a0:30:b4:35:73: dc:01:d7:b9:70:f8:7e:32:c7:2f:99:d4:dc:31:b2:2a: b2:26:1a:0e:78:da:4a:73:22:40:05:6e:f0:c9:6b:ad: 50:0f:61:90:5c:bd:45:ce:a7:de:7f:ae:d0:2c:dc:af: ca:05:60:2c:ac:bf:94:04:6b:33:59:28:a7:42:1a:13: c9:95:e3:ac:6f:08:11:8b:4e:d4:0b:01:df:02:75:86: 24:99:1a:16:7f:7e:5a:a4:e4:e3:ad:ca:ff:ab:fe:83: d5:ab:33:f7:e4:5e:01:d9:ce:b7:1e:5e:ad:8b:2a:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 50:c8:51:29:19:f4:a4:49:c7:c2:07:7a:bf:1e:21:01: 91:44:b8:bd:a9:84:d0:8c:6f:a5:69:9c:31:dd:10:ac: 86:60:22:cb:5b:5a:f4:ba:21:5c:ab:0b:72:e5:48:bb: e4:db:96:7e:88:75:d6:0d:93:9c:19:69:05:f5:5b:be: 0e:44:f3:44:2b:4d:39:fa:a0:18:eb:ee:5c:32:90:fc: fb:2c:69:2d:22:bf:30:15:c0:33:a1:df:c0:d8:da:4f: 9c:72:96:d1:1b:68:74:3c:84:de:87:49:7a:5d:2e:e8: 9e:4e:cd:06:d7:18:0f:16:c4:0b:11:61:fb:31:aa:ce: f8:10:6c:f3:50:f0:6e:07:1b:30:01:15:55:f1:03:a8: b2:4e:06:3a:c8:d1:04:37:b9:5e:a8:02:29:5e:2a:45: 59:9f:a9:7a:35:77:d9:25:e8:dc:27:9e:01:ba:b4:ca: 9f:3a:25:e7:4b:ab:18:42:60:52:f4:53:6e:b6:e2:90: ae:c5:b7:54:0a:c4:50:04:5a:87:53:24:d4:59:fe:67: 47:b0:2e:bb:76:02:a2:f2:ef:1e:8d:64:68:3e:dc:0a: ca:26:53:e0:2f:ef:42:2b:dd:2b:a1:d6:5d:e2:00:81: fc:f7:9f:9e:1a:f3:62:52:cc:4d:17:dd:9f:5b:26:8f Fingerprint (SHA-256): F5:68:05:C9:87:BD:B9:F9:83:37:DA:CA:BE:78:14:9B:F8:5B:E1:A6:BF:DE:98:08:C7:FF:61:D9:DA:0A:4C:BE Fingerprint (SHA1): 67:E0:02:61:86:0B:40:E6:52:24:05:C0:BA:38:FB:84:AB:28:0A:3C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #3545: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145893 (0x49158065) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Thu Dec 26 15:03:50 2024 Not After : Wed Dec 26 15:03:50 2074 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:d0:a2:8a:7a:a5:41:95:6c:77:82:ed:47:b8:c2:34: ca:37:63:e2:b3:e3:a2:c5:20:80:22:84:96:0d:cc:09: e7:7b:9c:11:fd:fa:46:a2:56:19:74:0d:80:a9:b1:81: c2:d7:fe:21:3a:be:89:56:93:5e:ba:41:65:71:a5:fc: 1e:4b:94:45:03:60:c9:d7:16:e2:f6:25:2f:bb:c7:3d: c8:9d:bd:22:7a:9f:d4:e2:da:a4:03:6e:0e:42:aa:57: 42:e0:78:06:95:d6:55:a1:67:43:c3:d4:3f:ff:a0:72: 99:f3:e7:5a:ec:52:52:2a:1d:25:29:25:ef:1b:d2:1e: 04:9e:a3:21:20:a8:d0:19:97:8c:46:a5:c7:a9:59:27: d2:ce:2d:e1:a1:83:dd:0a:44:aa:60:1f:de:28:0a:58: c1:3f:00:ce:d9:cb:42:4b:40:04:b0:ea:ac:31:b7:e1: 83:e1:a0:1a:fb:cf:df:b9:68:06:00:a7:35:0d:3d:23: 4f:f3:86:99:04:4d:d1:fe:07:e7:5d:bc:3e:cb:18:f3: 43:66:f1:c4:1a:02:09:09:3b:90:ee:36:f9:81:6b:17: 52:13:4a:0b:02:10:93:37:c3:6f:ff:d3:25:0e:19:63: b9:c9:79:93:69:fa:6f:46:e0:a0:9b:c8:e7:6d:76:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:89:5f:de:26:01:e9:d6:f8:fe:1a:bc:f8:3e:8f:e7: 44:b9:e8:de:40:b7:64:9f:73:f8:0e:1c:7c:64:54:f6: 61:53:0d:ca:e4:71:3c:91:27:59:14:f3:ba:8b:ee:04: 01:b7:2b:2d:5c:92:95:02:f3:6c:11:69:da:ba:0c:f5: d0:e0:5f:d1:f5:00:02:8e:28:bb:0d:2d:80:ab:35:6b: 2a:f5:2d:ce:d0:21:ef:c3:90:72:3c:d6:4c:3e:9a:55: 08:96:44:02:b6:9f:87:9e:ac:6b:fb:88:47:1b:90:aa: 2d:90:d4:6a:28:2d:59:0e:bb:f7:25:40:ec:fb:35:45: 2d:88:51:21:e2:cc:25:7f:15:e1:b6:d0:37:fa:22:2a: 69:66:42:a1:39:cf:d1:a9:f1:c1:2a:3d:47:ac:6a:fb: 0c:55:ac:e0:85:9c:67:ca:42:d9:9f:c6:17:cb:c9:e1: b0:81:67:f2:b8:81:ca:70:83:ff:79:0c:f8:69:98:02: ff:47:a0:ab:72:d5:dc:1b:12:ff:70:f9:93:e5:ee:79: c3:89:62:be:f9:48:88:9c:dc:20:38:5a:34:38:0c:f9: ed:9b:59:04:5f:40:cc:38:fb:09:57:26:16:98:d8:24: 6c:17:c7:b3:eb:2e:f0:31:60:f7:45:1d:21:55:61:c9 Fingerprint (SHA-256): 14:93:8F:08:69:DB:30:29:AE:37:F8:47:67:1A:20:AB:0F:C2:B0:C0:27:8E:18:49:6C:54:A4:95:E3:1E:CD:6C Fingerprint (SHA1): F9:D6:66:F5:74:A4:F6:9E:D3:E3:5D:C1:7B:F3:75:88:4B:49:48:0A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #3546: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #3547: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #3548: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #3549: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #3550: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #3551: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1226145898 (0x4915806a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Thu Dec 26 15:03:54 2024 Not After : Wed Dec 26 15:03:54 2029 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:89:db:20:92:a0:96:8b:87:60:71:b6:39:79:6d:a9: d9:df:b5:28:0d:91:30:fb:5c:18:06:c6:6f:09:02:d4: 3c:5e:3f:ed:82:65:ad:bd:28:5f:a7:34:2d:ef:91:18: e9:e6:65:10:ae:f4:38:28:da:ab:58:31:62:bf:cd:d0: 89:f6:70:72:86:96:12:6e:c5:94:31:65:ad:f8:fe:15: d9:5e:ff:71:e7:48:d6:ae:ef:cd:32:0d:d8:0f:82:44: 4d:f2:19:6d:3c:cd:3f:39:11:56:07:30:a7:f3:04:c7: 96:95:3e:bf:09:2b:e5:b9:2f:17:dd:6c:07:11:a4:93: 42:11:81:ab:0d:b4:51:53:b3:08:cb:c7:5a:e1:87:0c: 1e:28:d5:cc:12:66:0b:c5:d1:3d:a9:14:99:13:d0:f4: 88:66:eb:eb:2c:62:8b:b9:2b:ce:27:85:f1:07:e3:52: 9b:12:7e:6c:ed:1b:19:1a:06:66:43:94:6f:be:2f:fa: b6:58:35:1a:53:60:51:1e:73:68:73:9f:f0:59:2f:7c: c4:6b:0e:60:ce:b4:1b:6f:4f:3f:36:88:7f:4f:51:9b: f6:d7:d1:7d:9a:c8:ec:56:2b:cd:68:00:86:6d:ca:6b: 05:d6:8a:36:16:52:51:bb:2b:c1:9f:5c:0e:89:4c:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:18:d4:c9:ec:ab:ec:7d:fb:4b:fd:a2:ff:52:90:b3: 56:4b:61:8b:31:c9:76:20:02:d1:56:0d:58:88:27:51: ae:79:88:4c:a0:5d:24:d3:a6:bc:5e:8a:93:41:92:69: 94:49:1b:4d:19:f1:29:43:3c:84:58:62:21:24:a7:b2: b1:bf:88:8f:1a:fe:f6:9d:04:9b:1b:50:95:86:fd:bf: a6:24:45:8f:f3:cc:b6:ed:a4:8f:63:25:2f:41:5f:4e: 7d:34:0d:8e:02:bd:f7:cf:ee:20:3d:83:a2:29:41:91: a7:dc:68:d5:96:4e:a7:4b:82:79:b4:6d:91:28:03:15: a0:ab:0d:aa:c8:3a:56:2f:d6:52:e5:71:9e:61:08:20: 17:fa:f5:de:1c:89:c4:3a:2f:d2:3f:32:99:8c:93:94: b4:2d:69:ce:c9:b1:15:d0:a0:0d:e4:f6:e6:67:24:4c: 18:0f:b8:07:97:63:30:ee:34:e8:d1:e7:60:9c:d9:09: 9d:6b:1e:d9:c1:e3:a7:dc:bc:a4:d4:37:0a:a1:57:f7: f5:6c:56:95:11:7a:da:3c:ed:e8:3d:7e:0c:77:4b:95: 2e:80:eb:6c:c0:23:07:11:fd:91:73:39:f8:d4:da:e7: b2:50:af:33:46:27:91:77:96:35:91:58:88:2f:af:63 Fingerprint (SHA-256): 80:1A:0C:09:C3:52:87:31:C2:7F:A0:97:35:F8:EF:DB:74:F0:CE:FB:06:77:A2:8F:6F:61:0E:32:06:F6:CA:0E Fingerprint (SHA1): 3E:96:86:11:95:EB:AE:67:A2:F6:0B:B7:66:E0:2B:37:F4:9D:88:87 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #3552: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #3553: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #3554: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #3555: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #3556: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #3557: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3558: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3559: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test.example,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3560: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3561: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3562: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=BOGUS NSS,L=Mountain View, ST=California,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Returned value is 0, expected result is pass chains.sh: #3563: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3564: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=bat.foo.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3565: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3566: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3567: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Thu Jun 01 20:41:35 2023 Not After : Mon Jun 01 20:41:35 2043 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:cf:39:d2:2d:41:b2:a6:20:22:4b:52:88:b4:84:6b: d5:6d:15:ee:79:d6:96:28:f9:06:5a:6c:c6:ce:fa:63: 79:97:c2:a0:28:46:ee:90:ed:64:07:e7:60:de:a1:41: ba:81:fd:74:f4:48:8d:66:85:5f:fb:05:ab:d8:5d:4f: c7:57:ee:52:56:b8:70:c1:c8:b4:cc:79:74:35:d9:03: 80:df:a9:65:6d:74:f6:d4:2f:1d:ff:c2:21:5e:39:69: 50:aa:15:19:48:f0:c8:a2:c9:6e:87:2e:83:51:53:ae: 20:33:2a:13:8b:24:61:65:2d:50:6b:52:1a:cb:72:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:24:d6:9e:b9:81:06:ab:12:56:97:94:17:bd:43:52: 78:e2:45:42:da:d8:be:17:bc:34:2d:60:c0:c7:68:bf: 66:f8:89:c7:a3:50:a3:3d:7b:f7:f9:73:a0:a4:c7:e1: 4d:8f:1c:ea:75:49:07:d5:6b:6d:59:58:58:da:8b:d2: 8d:36:32:ba:6a:aa:b2:33:71:af:c7:6d:36:1b:b7:44: 86:40:e6:66:05:7c:60:48:63:df:e2:05:2a:ad:c2:dc: 04:c9:16:37:74:ef:c2:ca:98:97:ef:67:35:b1:ca:88: 11:ae:c2:dd:34:43:96:16:81:ba:c3:36:11:0d:4a:0c Fingerprint (SHA-256): 2C:3E:FA:75:93:44:67:68:8A:66:CA:36:0A:00:FD:50:D3:A6:21:EB:8E:22:0D:D3:4A:E5:80:7D:02:90:92:BC Fingerprint (SHA1): 12:F0:98:D0:98:BC:86:B9:8F:5D:29:9F:83:DB:9B:C7:28:71:32:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=site.example,O=Foo,ST=CA,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA 2,O=Foo,ST=CA,C=US" Certificate 3 Subject: "CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,S T=California,C=US" Returned value is 0, expected result is pass chains.sh: #3568: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3569: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=NSS Intermediate CA3,O=BOGUS NSS,L=Mountain View,ST=California,C=US [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3570: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. NameConstraints.ca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3571: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8157: Certificate extension not found. Returned value is 1, expected result is fail chains.sh: #3572: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. NameConstraints.ncca [Certificate Authority]: ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3573: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View, ST=CA,C=US" Validity: Not Before: Sat Jul 01 20:41:37 2023 Not After : Fri May 01 20:41:37 2043 Subject: "CN=NSS Name Constrained Root CA,O=BOGUS NSS,L=Mountain View ,ST=CA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:20:bf:66:8a:4e:16:f7:26:f9:a7:db:60:40:63:d2: 81:6a:d0:0c:5c:9c:fe:75:4b:9c:c3:45:e5:b4:a5:74: ce:4b:37:18:67:50:94:b7:2a:aa:6f:49:4c:9d:a5:4e: 32:a4:d8:67:ee:09:44:be:ce:86:04:41:84:c9:da:a4: 97:13:d6:59:8f:af:fa:37:55:49:66:b7:a7:a0:2b:e9: a6:b1:24:4c:d6:9a:b0:7c:a0:d2:80:ab:b3:f4:d7:69: 2c:36:38:04:2e:c3:7d:d2:bf:92:fe:0b:db:e5:29:ad: e5:4f:3e:94:4b:65:c4:ca:b6:a6:8a:2d:7e:7c:ce:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Name Constraints Permitted Subtree: DNS name: ".example" Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:95:fe:1e:fd:9e:32:8c:a8:23:97:01:8b:ab:42:6f: 3c:0f:15:0a:2b:9d:05:0d:7d:f5:3f:b1:4e:72:a8:05: a6:c2:9b:94:eb:65:f6:9b:65:81:67:6a:bd:75:ff:2d: 4e:93:94:d8:58:9e:ff:17:a4:2e:31:a8:51:18:b7:73: 8e:ef:06:c1:db:45:97:25:ee:57:8e:ad:3b:f3:58:61: d8:26:b4:4b:0e:be:c7:76:e3:fa:57:a2:24:ac:9f:09: 12:76:c1:1b:b8:b9:4b:0f:9e:45:3e:fc:a2:aa:05:d2: d5:41:81:38:61:57:ce:80:53:59:5e:b9:39:7c:d3:80 Fingerprint (SHA-256): CE:07:0A:19:FD:B7:89:05:77:A7:ED:6E:6B:BC:E0:EB:A5:47:80:C6:01:51:E3:60:2B:18:AD:4E:FC:62:A1:44 Fingerprint (SHA1): 64:35:77:A4:C1:32:4C:CF:83:F9:D5:5F:B9:D2:AF:C3:3C:5F:54:EC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=Calif ornia,C=US" Certificate 2 Subject: "CN=NSS Intermediate CA6,O=OtherOrg,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3574: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #3575: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Thu Jun 01 20:41:38 2023 Not After : Mon Jun 01 20:41:38 2043 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:96:55:9d:d8:fe:df:62:60:77:64:44:bf:8a:37:b3: db:fa:a9:9d:7c:b2:af:c1:ad:a9:f4:75:65:c9:29:3e: af:42:3b:d4:0b:c9:4e:07:d0:bc:46:c7:45:64:41:b3: fd:58:7e:b6:60:95:53:ed:8b:f4:f7:23:7e:81:13:e8: c1:a1:1f:7e:52:d6:cb:2f:99:cf:3a:fe:3d:46:a0:2c: 0f:22:d5:6f:cd:33:22:1f:6a:7c:a2:34:c2:96:8b:09: 98:50:fc:7b:92:74:78:7f:6f:21:01:8e:fd:71:c4:5f: ef:3f:99:7f:48:bb:a1:49:5e:68:9b:29:d1:19:c9:f8: ac:07:95:bc:f6:b2:cb:5a:21:a1:8e:26:bf:eb:42:fb: cb:2f:29:f7:9b:e9:cd:4d:01:41:c3:54:6a:21:e5:08: 0d:4d:dd:4c:8c:fe:e4:13:c1:33:1d:61:b1:04:88:76: cc:22:fc:83:6d:35:c6:b7:4b:55:88:2f:97:10:50:e6: 12:e0:88:4b:b2:b8:91:5b:d1:a2:80:31:17:44:8c:d1: 38:43:45:2f:41:a1:2c:cb:5d:a7:bb:0f:8d:93:6f:cf: bd:00:7f:71:e3:0b:6c:43:38:b3:0c:42:62:9b:a9:57: 45:f8:3c:12:a8:2a:d7:69:c6:1e:dc:0d:13:34:b6:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:e4:2d:08:0b:9a:8c:1b:ad:10:2b:86:2c:51:19:91: 59:4b:8c:f4:e2:f7:a2:44:c6:2f:59:21:bd:c7:64:62: d3:63:1a:2b:05:9e:2c:63:82:75:a1:f4:eb:5d:78:68: 6d:8c:56:c1:7b:90:0c:1f:7d:14:00:2a:02:ee:17:d5: 9f:14:a0:03:8e:01:13:88:1a:40:1a:19:36:5e:af:73: b6:b9:ea:20:c2:e4:23:b6:16:fe:ff:42:20:e0:2a:3e: 5b:25:e1:e5:f6:5d:d3:39:7f:8f:28:af:54:a2:b8:73: 62:26:0f:06:7e:97:4f:3d:88:43:58:ed:3d:88:53:00: 49:e0:5c:e2:dd:4a:09:d4:06:df:ce:a2:6a:f0:f0:a5: 5b:2b:4c:01:cb:ee:77:a3:5c:21:d8:f6:60:f9:fc:c2: de:d4:c5:c4:d7:d4:de:96:4b:1e:16:32:36:09:93:d8: 4e:0b:68:4f:16:e8:29:f9:28:f1:86:c1:f4:9a:d7:76: 7b:99:57:cb:70:24:86:8d:b6:0d:1b:9f:db:06:bd:92: 0f:24:03:5c:c5:99:ad:45:92:43:03:34:ae:ef:7d:ad: 9a:76:bd:43:0e:d3:59:e7:2f:82:dd:7b:3b:82:ef:fa: 70:8f:58:81:70:50:50:05:85:9e:67:9a:ad:5c:18:a3 Fingerprint (SHA-256): B6:0C:83:47:70:B8:7D:55:C8:AF:37:42:57:58:E0:EF:7E:3B:E6:8F:0A:60:7A:F8:23:01:5B:CA:6E:5E:3F:D4 Fingerprint (SHA1): 6B:1D:DF:7E:51:BB:13:3E:6D:1A:F7:DE:70:C9:B0:F5:75:A4:10:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #3576: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.101/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #3577: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 114803 at Thu Dec 26 15:03:59 UTC 2024 kill -USR1 114803 httpserv: normal termination httpserv -b -p 9535 2>/dev/null; httpserv with PID 114803 killed at Thu Dec 26 15:03:59 UTC 2024 TIMESTAMP chains END: Thu Dec 26 15:03:59 UTC 2024 Running tests for ec TIMESTAMP ec BEGIN: Thu Dec 26 15:03:59 UTC 2024 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Thu Dec 26 15:03:59 UTC 2024 ecperf.sh: ecperf test =============================== Testing NIST-P256 using freebl implementation... ECDH_Derive count: 100 sec: 0.20 op/sec: 512.05 ECDSA_Sign count: 100 sec: 0.10 op/sec: 1013.66 ECDHE max rate = 381.43 ECDSA_Verify count: 100 sec: 0.24 op/sec: 410.70 ... okay. Testing NIST-P384 using freebl implementation... ECDH_Derive count: 100 sec: 0.62 op/sec: 160.25 ECDSA_Sign count: 100 sec: 0.66 op/sec: 151.93 ECDHE max rate = 78.05 ECDSA_Verify count: 100 sec: 1.25 op/sec: 80.25 ... okay. Testing NIST-P521 using freebl implementation... ECDH_Derive count: 100 sec: 1.82 op/sec: 54.81 ECDSA_Sign count: 100 sec: 1.91 op/sec: 52.42 ECDHE max rate = 26.81 ECDSA_Verify count: 100 sec: 3.63 op/sec: 27.54 ... okay. Testing Curve25519 using freebl implementation... ECDH_Derive count: 100 sec: 0.02 op/sec: 4655.06 ... okay. ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Thu Dec 26 15:04:10 UTC 2024 Running ec tests for ectest TIMESTAMP ectest BEGIN: Thu Dec 26 15:04:10 UTC 2024 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: freebl ec tests - PASSED ectest.sh: #7: pk11 ec tests - PASSED TIMESTAMP ectest END: Thu Dec 26 15:04:12 UTC 2024 TIMESTAMP ec END: Thu Dec 26 15:04:12 UTC 2024 Running tests for gtests TIMESTAMP gtests BEGIN: Thu Dec 26 15:04:12 UTC 2024 /builddir/build/BUILD/nss-3.101/nss/tests/gtests gtests: base_gtest certhigh_gtest certdb_gtest der_gtest pk11_gtest util_gtest freebl_gtest softoken_gtest sysinit_gtest smime_gtest mozpkix_gtest gtests.sh: base_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/base_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/base_gtest -n dummy -s CN=dummy -t ,, -x -m 1 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #1: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/base_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing base_gtest [==========] Running 1 test from 1 test suite. [----------] Global test environment set-up. [----------] 1 test from Utf8Test [ RUN ] Utf8Test.Utf8Length [ OK ] Utf8Test.Utf8Length (0 ms) [----------] 1 test from Utf8Test (0 ms total) [----------] Global test environment tear-down [==========] 1 test from 1 test suite ran. (0 ms total) [ PASSED ] 1 test. gtests.sh: #2: base_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/base_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #3: 'Utf8Test: Utf8Length' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: certhigh_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certhigh_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certhigh_gtest -n dummy -s CN=dummy -t ,, -x -m 2 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #4: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certhigh_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing certhigh_gtest [==========] Running 1 test from 1 test suite. [----------] Global test environment set-up. [----------] 1 test from CERT_FormatNameUnitTest [ RUN ] CERT_FormatNameUnitTest.Overflow [ OK ] CERT_FormatNameUnitTest.Overflow (0 ms) [----------] 1 test from CERT_FormatNameUnitTest (0 ms total) [----------] Global test environment tear-down [==========] 1 test from 1 test suite ran. (0 ms total) [ PASSED ] 1 test. gtests.sh: #5: certhigh_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certhigh_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #6: 'CERT_FormatNameUnitTest: Overflow' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: certdb_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certdb_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certdb_gtest -n dummy -s CN=dummy -t ,, -x -m 3 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #7: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certdb_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing certdb_gtest [==========] Running 22 tests from 5 test suites. [----------] Global test environment set-up. [----------] 2 tests from DecodeCertsTest [ RUN ] DecodeCertsTest.EmptyCertPackage [ OK ] DecodeCertsTest.EmptyCertPackage (0 ms) [ RUN ] DecodeCertsTest.EmptySignedData [ OK ] DecodeCertsTest.EmptySignedData (0 ms) [----------] 2 tests from DecodeCertsTest (0 ms total) [----------] 2 tests from CertTest [ RUN ] CertTest.GetCertDer [ OK ] CertTest.GetCertDer (0 ms) [ RUN ] CertTest.GetCertDerBad [ OK ] CertTest.GetCertDerBad (0 ms) [----------] 2 tests from CertTest (0 ms total) [----------] 2 tests from Alg1485Test [ RUN ] Alg1485Test.ShortOIDTest [ OK ] Alg1485Test.ShortOIDTest (0 ms) [ RUN ] Alg1485Test.BrokenOIDTest [ OK ] Alg1485Test.BrokenOIDTest (0 ms) [----------] 2 tests from Alg1485Test (0 ms total) [----------] 11 tests from ParseAVAStrings/Alg1485ParseTest [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/0 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/0 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/1 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/1 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/2 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/2 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/3 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/3 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/4 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/4 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/5 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/5 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/6 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/6 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/7 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/7 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/8 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/8 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/9 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/9 (0 ms) [ RUN ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/10 [ OK ] ParseAVAStrings/Alg1485ParseTest.TryParsingAVAStrings/10 (0 ms) [----------] 11 tests from ParseAVAStrings/Alg1485ParseTest (0 ms total) [----------] 5 tests from CompareAVAStrings/Alg1485CompareTest [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/0 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/0 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/1 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/1 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/2 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/2 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/3 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/3 (0 ms) [ RUN ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/4 [ OK ] CompareAVAStrings/Alg1485CompareTest.CompareAVAStrings/4 (0 ms) [----------] 5 tests from CompareAVAStrings/Alg1485CompareTest (0 ms total) [----------] Global test environment tear-down [==========] 22 tests from 5 test suites ran. (1 ms total) [ PASSED ] 22 tests. gtests.sh: #8: certdb_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/certdb_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #9: 'DecodeCertsTest: EmptyCertPackage' - PASSED gtests.sh: #10: 'DecodeCertsTest: EmptySignedData' - PASSED gtests.sh: #11: 'CertTest: GetCertDer' - PASSED gtests.sh: #12: 'CertTest: GetCertDerBad' - PASSED gtests.sh: #13: 'Alg1485Test: ShortOIDTest' - PASSED gtests.sh: #14: 'Alg1485Test: BrokenOIDTest' - PASSED gtests.sh: #15: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/0 28-byte object <20-9C 5B-56 51-00 00-00 51-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #16: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/1 28-byte object <20-9C 5B-56 52-00 00-00 52-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #17: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/2 28-byte object <20-9C 5B-56 51-00 00-00 51-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #18: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/3 28-byte object <00-A7 5B-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #19: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/4 28-byte object <B0-9E 5B-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #20: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/5 28-byte object <B8-9E 5B-56 0C-00 00-00 32-2E 35-2E 34-2E 36-3D F0-9F 98-91 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #21: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/6 28-byte object <B8-9E 5B-56 0F-00 00-00 4F-49 44-2E 6D-6F 6F-63 6F-77 3D-F0 9F-98 91-00 00-00 00-00>' - PASSED gtests.sh: #22: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/7 28-byte object <B8-9E 5B-56 07-00 00-00 33-2E 32-3D 62-61 64-00 6F-77 3D-F0 9F-98 91-00 00-00 00-00>' - PASSED gtests.sh: #23: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/8 28-byte object <B8-9E 5B-56 0B-00 00-00 32-35 36-2E 32-35 37-3D 62-61 64-00 9F-98 91-00 00-00 00-00>' - PASSED gtests.sh: #24: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/9 28-byte object <B8-9E 5B-56 05-00 00-00 59-4F 3D-4C 4F-00 00-00 62-61 64-00 9F-98 91-00 00-00 00-00>' - PASSED gtests.sh: #25: 'ParseAVAStrings/Alg1485ParseTest: TryParsingAVAStrings/10 28-byte object <40-AA 5B-56 10-00 00-00 10-00 00-00 00-00 00-00 62-61 64-00 9F-98 91-00 00-00 00-00>' - PASSED gtests.sh: #26: 'CompareAVAStrings/Alg1485CompareTest: CompareAVAStrings/0 52-byte object <50-A9 5B-56 1C-00 00-00 1C-00 00-00 41-53 74-72 69-6E 67-73 2F-31 30-00 D0-A3 5B-56 22-00 00-00 22-00 00-00 65-41 56-41 53-74 72-69 6E-67 73-00 FF-FF FF-FF>' - PASSED gtests.sh: #27: 'CompareAVAStrings/Alg1485CompareTest: CompareAVAStrings/1 52-byte object <50-A9 5B-56 22-00 00-00 22-00 00-00 41-53 74-72 69-6E 67-73 2F-31 30-00 D0-A3 5B-56 1C-00 00-00 1C-00 00-00 65-41 56-41 53-74 72-69 6E-67 73-00 01-00 00-00>' - PASSED gtests.sh: #28: 'CompareAVAStrings/Alg1485CompareTest: CompareAVAStrings/2 52-byte object <E0-96 5B-56 22-00 00-00 22-00 00-00 41-53 74-72 69-6E 67-73 2F-31 30-00 70-BC 5B-56 22-00 00-00 22-00 00-00 65-41 56-41 53-74 72-69 6E-67 73-00 00-00 00-00>' - PASSED gtests.sh: #29: 'CompareAVAStrings/Alg1485CompareTest: CompareAVAStrings/3 52-byte object <00-BF 5B-56 23-00 00-00 23-00 00-00 41-53 74-72 69-6E 67-73 2F-31 30-00 50-C2 5B-56 23-00 00-00 23-00 00-00 65-41 56-41 53-74 72-69 6E-67 73-00 FF-FF FF-FF>' - PASSED gtests.sh: #30: 'CompareAVAStrings/Alg1485CompareTest: CompareAVAStrings/4 52-byte object <80-C2 5B-56 22-00 00-00 22-00 00-00 41-53 74-72 69-6E 67-73 2F-31 30-00 00-C5 5B-56 22-00 00-00 22-00 00-00 65-41 56-41 53-74 72-69 6E-67 73-00 FF-FF FF-FF>' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: der_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/der_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/der_gtest -n dummy -s CN=dummy -t ,, -x -m 4 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #31: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/der_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing der_gtest [==========] Running 20 tests from 3 test suites. [----------] Global test environment set-up. [----------] 1 test from PK12ImportTest [ RUN ] PK12ImportTest.ImportPK12With2P7 [ OK ] PK12ImportTest.ImportPK12With2P7 (1 ms) [----------] 1 test from PK12ImportTest (1 ms total) [----------] 13 tests from DERIntegerDecodingTest [ RUN ] DERIntegerDecodingTest.DecodeLongMinus126 [ OK ] DERIntegerDecodingTest.DecodeLongMinus126 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130 [ OK ] DERIntegerDecodingTest.DecodeLong130 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong130Padded [ OK ] DERIntegerDecodingTest.DecodeLong130Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong0 [ OK ] DERIntegerDecodingTest.DecodeLong0 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLong1 [ OK ] DERIntegerDecodingTest.DecodeLong1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinus1Padded [ OK ] DERIntegerDecodingTest.DecodeLongMinus1Padded (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMax [ OK ] DERIntegerDecodingTest.DecodeLongMax (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMin [ OK ] DERIntegerDecodingTest.DecodeLongMin (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinPlus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMinMinus1 [ OK ] DERIntegerDecodingTest.DecodeLongMinMinus1 (0 ms) [ RUN ] DERIntegerDecodingTest.DecodeLongMaxPlus1 [ OK ] DERIntegerDecodingTest.DecodeLongMaxPlus1 (0 ms) [----------] 13 tests from DERIntegerDecodingTest (0 ms total) [----------] 6 tests from QuickderTestsInvalidLengths/QuickDERTest [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/0 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/0 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/1 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/1 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/2 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/2 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/3 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/3 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/4 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/4 (0 ms) [ RUN ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/5 [ OK ] QuickderTestsInvalidLengths/QuickDERTest.InvalidLengths/5 (0 ms) [----------] 6 tests from QuickderTestsInvalidLengths/QuickDERTest (0 ms total) [----------] Global test environment tear-down [==========] 20 tests from 3 test suites ran. (1 ms total) [ PASSED ] 20 tests. gtests.sh: #32: der_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/der_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #33: 'PK12ImportTest: ImportPK12With2P7' - PASSED gtests.sh: #34: 'DERIntegerDecodingTest: DecodeLongMinus126' - PASSED gtests.sh: #35: 'DERIntegerDecodingTest: DecodeLong130' - PASSED gtests.sh: #36: 'DERIntegerDecodingTest: DecodeLong130Padded' - PASSED gtests.sh: #37: 'DERIntegerDecodingTest: DecodeLong0' - PASSED gtests.sh: #38: 'DERIntegerDecodingTest: DecodeLong1' - PASSED gtests.sh: #39: 'DERIntegerDecodingTest: DecodeLongMinus1' - PASSED gtests.sh: #40: 'DERIntegerDecodingTest: DecodeLongMinus1Padded' - PASSED gtests.sh: #41: 'DERIntegerDecodingTest: DecodeLongMax' - PASSED gtests.sh: #42: 'DERIntegerDecodingTest: DecodeLongMin' - PASSED gtests.sh: #43: 'DERIntegerDecodingTest: DecodeLongMaxMinus1' - PASSED gtests.sh: #44: 'DERIntegerDecodingTest: DecodeLongMinPlus1' - PASSED gtests.sh: #45: 'DERIntegerDecodingTest: DecodeLongMinMinus1' - PASSED gtests.sh: #46: 'DERIntegerDecodingTest: DecodeLongMaxPlus1' - PASSED gtests.sh: #47: 'QuickderTestsInvalidLengths/QuickDERTest: InvalidLengths/0 16-byte object <80-8C 59-56 00-00 00-00 29-D0 5A-56 03-00 00-00>' - PASSED gtests.sh: #48: 'QuickderTestsInvalidLengths/QuickDERTest: InvalidLengths/1 16-byte object <80-8C 59-56 00-00 00-00 24-D0 5A-56 05-00 00-00>' - PASSED gtests.sh: #49: 'QuickderTestsInvalidLengths/QuickDERTest: InvalidLengths/2 16-byte object <80-8C 59-56 00-00 00-00 1C-D0 5A-56 05-00 00-00>' - PASSED gtests.sh: #50: 'QuickderTestsInvalidLengths/QuickDERTest: InvalidLengths/3 16-byte object <60-8C 59-56 00-00 00-00 19-D0 5A-56 02-00 00-00>' - PASSED gtests.sh: #51: 'QuickderTestsInvalidLengths/QuickDERTest: InvalidLengths/4 16-byte object <60-8C 59-56 00-00 00-00 16-D0 5A-56 03-00 00-00>' - PASSED gtests.sh: #52: 'QuickderTestsInvalidLengths/QuickDERTest: InvalidLengths/5 16-byte object <60-8C 59-56 00-00 00-00 04-D0 5A-56 12-00 00-00>' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: pk11_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/pk11_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/pk11_gtest -n dummy -s CN=dummy -t ,, -x -m 5 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #53: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/pk11_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing pk11_gtest [==========] Running 5976 tests from 73 test suites. [----------] Global test environment set-up. [----------] 5 tests from Pkcs11SymKeyTest [ RUN ] Pkcs11SymKeyTest.ConcatSymKeyTest [ OK ] Pkcs11SymKeyTest.ConcatSymKeyTest (0 ms) [ RUN ] Pkcs11SymKeyTest.SensitiveConcatSymKeyTest [ OK ] Pkcs11SymKeyTest.SensitiveConcatSymKeyTest (0 ms) [ RUN ] Pkcs11SymKeyTest.NotExtractableConcatSymKeyTest [ OK ] Pkcs11SymKeyTest.NotExtractableConcatSymKeyTest (0 ms) [ RUN ] Pkcs11SymKeyTest.KeySlotConcatSymKeyTest [ OK ] Pkcs11SymKeyTest.KeySlotConcatSymKeyTest (0 ms) [ RUN ] Pkcs11SymKeyTest.CrossSlotConcatSymKeyTest [ OK ] Pkcs11SymKeyTest.CrossSlotConcatSymKeyTest (0 ms) [----------] 5 tests from Pkcs11SymKeyTest (0 ms total) [----------] 4 tests from Pkcs11SeedTest [ RUN ] Pkcs11SeedTest.CBC_ValidArgs [ OK ] Pkcs11SeedTest.CBC_ValidArgs (0 ms) [ RUN ] Pkcs11SeedTest.CBC_InvalidArgs [ OK ] Pkcs11SeedTest.CBC_InvalidArgs (0 ms) [ RUN ] Pkcs11SeedTest.ECB_Singleblock [ OK ] Pkcs11SeedTest.ECB_Singleblock (0 ms) [ RUN ] Pkcs11SeedTest.ECB_Multiblock [ OK ] Pkcs11SeedTest.ECB_Multiblock (0 ms) [----------] 4 tests from Pkcs11SeedTest (0 ms total) [----------] 2 tests from Pkcs11RsaPssTest [ RUN ] Pkcs11RsaPssTest.GenerateAndSignAndVerify [ OK ] Pkcs11RsaPssTest.GenerateAndSignAndVerify (48 ms) [ RUN ] Pkcs11RsaPssTest.NoLeakWithInvalidExponent [ OK ] Pkcs11RsaPssTest.NoLeakWithInvalidExponent (0 ms) [----------] 2 tests from Pkcs11RsaPssTest (48 ms total) [----------] 7 tests from Pkcs11RsaPssTestWycheproof [ RUN ] Pkcs11RsaPssTestWycheproof.RsaPss2048Sha1 Reading tests from: rsa_pss_2048_sha1_mgf1_20_test.json Test vectors of class RsassaPssVerify are intended for checking the verification of RSASSA-PSS signatures. WeakHash: The key for this test vector uses a weak hash function. tc 1: [acceptable, WeakHash] expect success tc 2: [acceptable, WeakHash] expect success tc 3: [acceptable, WeakHash] expect success tc 4: [acceptable, WeakHash] expect success tc 5: [acceptable, WeakHash] expect success tc 6: [acceptable, WeakHash] expect success tc 7: [acceptable, WeakHash] expect success tc 8: [acceptable, WeakHash] expect success tc 9: [acceptable, WeakHash] expect success tc 10: [acceptable, WeakHash] expect success tc 11: [acceptable, WeakHash] expect success tc 12: [acceptable, WeakHash] expect success tc 13: [acceptable, WeakHash] expect success tc 14: [acceptable, WeakHash] expect success tc 15: [acceptable, WeakHash] expect success tc 16: [acceptable, WeakHash] expect success tc 17: [acceptable, WeakHash] expect success tc 18: [acceptable, WeakHash] expect success tc 19: [acceptable, WeakHash] expect success tc 20: [acceptable, WeakHash] expect success tc 21: [acceptable, WeakHash] expect success tc 22: [acceptable, WeakHash] expect success tc 23: [acceptable, WeakHash] expect success tc 24: [acceptable, WeakHash] expect success tc 25: [acceptable, WeakHash] expect success tc 26: [acceptable, WeakHash] expect success tc 27: [acceptable, WeakHash] expect success tc 28: [acceptable, WeakHash] expect success tc 29: [acceptable, WeakHash] expect success tc 30: [acceptable, WeakHash] expect success tc 31: [acceptable, WeakHash] expect success tc 32: [acceptable, WeakHash] expect success tc 33: [acceptable, WeakHash] expect success tc 34: [acceptable, WeakHash] expect success tc 35: [acceptable, WeakHash] expect success tc 36: [acceptable, WeakHash] expect success tc 37: [acceptable, WeakHash] expect success tc 38: [acceptable, WeakHash] expect success tc 39: [acceptable, WeakHash] expect success tc 40: [acceptable, WeakHash] expect success tc 41: first byte of m_hash modified [invalid, WeakHash] expect failure tc 42: first byte of m_hash modified [invalid, WeakHash] expect failure tc 43: last byte of m_hash modified [invalid, WeakHash] expect failure tc 44: last byte of m_hash modified [invalid, WeakHash] expect failure tc 45: all bits in m_hash flipped [invalid, WeakHash] expect failure tc 46: s_len changed to 0 [invalid, WeakHash] expect failure tc 47: s_len changed to 32 [invalid, WeakHash] expect failure tc 48: salt is all 0 [acceptable, WeakHash] expect success tc 49: salt is all 1 [acceptable, WeakHash] expect success tc 50: byte 0 in zero padding modified [invalid, WeakHash] expect failure tc 51: byte 7 in zero padding modified [invalid, WeakHash] expect failure tc 52: all bytes in zero padding modified [invalid, WeakHash] expect failure tc 53: first byte of hash h modified [invalid, WeakHash] expect failure tc 54: first byte of hash h modified [invalid, WeakHash] expect failure tc 55: last byte of hash h modified [invalid, WeakHash] expect failure tc 56: last byte of hash h modified [invalid, WeakHash] expect failure tc 57: all bytes of h replaced by 0 [invalid, WeakHash] expect failure tc 58: all bits of h replaced by 1s [invalid, WeakHash] expect failure tc 59: all bits in hash h flipped [invalid, WeakHash] expect failure tc 60: hash of salt missing [invalid, WeakHash] expect failure tc 61: first byte of ps modified [invalid, WeakHash] expect failure tc 62: last byte of ps modified [invalid, WeakHash] expect failure tc 63: all bytes of ps changed to 0xff [invalid, WeakHash] expect failure tc 64: all bytes of ps changed to 0x80 [invalid, WeakHash] expect failure tc 65: ps followed by 0 [invalid, WeakHash] expect failure tc 66: ps followed by 0xff [invalid, WeakHash] expect failure tc 67: shifted salt [invalid, WeakHash] expect failure tc 68: including garbage [invalid, WeakHash] expect failure tc 69: bit 7 of masked_db not cleared [invalid, WeakHash] expect failure tc 70: first byte of masked_db changed to 0 [invalid, WeakHash] expect failure tc 71: last byte in em modified [invalid, WeakHash] expect failure tc 72: last byte in em modified [invalid, WeakHash] expect failure tc 73: last byte in em modified [invalid, WeakHash] expect failure tc 74: signature is 0 [invalid, WeakHash] expect failure tc 75: signature is 1 [invalid, WeakHash] expect failure tc 76: signature is n-1 [invalid, WeakHash] expect failure tc 77: signature is n [invalid, WeakHash] expect failure tc 78: prepending 0's to signature [invalid, WeakHash] expect failure tc 79: appending 0's to signature [invalid, WeakHash] expect failure tc 80: truncated signature [invalid, WeakHash] expect failure tc 81: empty signature [invalid, WeakHash] expect failure tc 82: PKCS #1 v1.5 signature [invalid, WeakHash] expect failure Running tcid: 1 Running tcid: 2 Running tcid: 3 Running tcid: 4 Running tcid: 5 Running tcid: 6 Running tcid: 7 Running tcid: 8 Running tcid: 9 Running tcid: 10 Running tcid: 11 Running tcid: 12 Running tcid: 13 Running tcid: 14 Running tcid: 15 Running tcid: 16 Running tcid: 17 Running tcid: 18 Running tcid: 19 Running tcid: 20 Running tcid: 21 Running tcid: 22 Running tcid: 23 Running tcid: 24 Running tcid: 25 Running tcid: 26 Running tcid: 27 Running tcid: 28 Running tcid: 29 Running tcid: 30 Running tcid: 31 Running tcid: 32 Running tcid: 33 Running tcid: 34 Running tcid: 35 Running tcid: 36 Running tcid: 37 Running tcid: 38 Running tcid: 39 Running tcid: 40 Running tcid: 41 Running tcid: 42 Running tcid: 43 Running tcid: 44 Running tcid: 45 Running tcid: 46 Running tcid: 47 Running tcid: 48 Running tcid: 49 Running tcid: 50 Running tcid: 51 Running tcid: 52 Running tcid: 53 Running tcid: 54 Running tcid: 55 Running tcid: 56 Running tcid: 57 Running tcid: 58 Running tcid: 59 Running tcid: 60 Running tcid: 61 Running tcid: 62 Running tcid: 63 Running tcid: 64 Running tcid: 65 Running tcid: 66 Running tcid: 67 Running tcid: 68 Running tcid: 69 Running tcid: 70 Running tcid: 71 Running tcid: 72 Running tcid: 73 Running tcid: 74 Running tcid: 75 Running tcid: 76 Running tcid: 77 Running tcid: 78 Running tcid: 79 Running tcid: 80 Running tcid: 81 Running tcid: 82 [ OK ] Pkcs11RsaPssTestWycheproof.RsaPss2048Sha1 (32 ms) [ RUN ] Pkcs11RsaPssTestWycheproof.RsaPss2048Sha256_0 Reading tests from: rsa_pss_2048_sha256_mgf1_0_test.json Test vectors of class RsassaPssVerify are intended for checking the verification of RSASSA-PSS signatures. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: [valid] expect success tc 12: [valid] expect success tc 13: [valid] expect success tc 14: [valid] expect success tc 15: [valid] expect success tc 16: [valid] expect success tc 17: [valid] expect success tc 18: [valid] expect success tc 19: [valid] expect success tc 20: [valid] expect success tc 21: [valid] expect success tc 22: [valid] expect success tc 23: [valid] expect success tc 24: [valid] expect success tc 25: [valid] expect success tc 26: [valid] expect success tc 27: [valid] expect success tc 28: [valid] expect success tc 29: [valid] expect success tc 30: [valid] expect success tc 31: [valid] expect success tc 32: [valid] expect success tc 33: [valid] expect success tc 34: [valid] expect success tc 35: [valid] expect success tc 36: [valid] expect success tc 37: [valid] expect success tc 38: [valid] expect success tc 39: [valid] expect success tc 40: [valid] expect success tc 41: [valid] expect success tc 42: [valid] expect success tc 43: [valid] expect success tc 44: [valid] expect success tc 45: [valid] expect success tc 46: [valid] expect success tc 47: [valid] expect success tc 48: [valid] expect success tc 49: [valid] expect success tc 50: [valid] expect success tc 51: [valid] expect success tc 52: [valid] expect success tc 53: [valid] expect success tc 54: [valid] expect success tc 55: [valid] expect success tc 56: [valid] expect success tc 57: [valid] expect success tc 58: [valid] expect success tc 59: [valid] expect success tc 60: [valid] expect success tc 61: [valid] expect success tc 62: first byte of m_hash modified [invalid] expect failure tc 63: first byte of m_hash modified [invalid] expect failure tc 64: last byte of m_hash modified [invalid] expect failure tc 65: last byte of m_hash modified [invalid] expect failure tc 66: all bits in m_hash flipped [invalid] expect failure tc 67: s_len changed to 20 [invalid] expect failure tc 68: s_len changed to 32 [invalid] expect failure tc 69: byte 0 in zero padding modified [invalid] expect failure tc 70: byte 7 in zero padding modified [invalid] expect failure tc 71: all bytes in zero padding modified [invalid] expect failure tc 72: first byte of hash h modified [invalid] expect failure tc 73: first byte of hash h modified [invalid] expect failure tc 74: last byte of hash h modified [invalid] expect failure tc 75: last byte of hash h modified [invalid] expect failure tc 76: all bytes of h replaced by 0 [invalid] expect failure tc 77: all bits of h replaced by 1s [invalid] expect failure tc 78: all bits in hash h flipped [invalid] expect failure tc 79: hash of salt missing [invalid] expect failure tc 80: first byte of ps modified [invalid] expect failure tc 81: last byte of ps modified [invalid] expect failure tc 82: all bytes of ps changed to 0xff [invalid] expect failure tc 83: all bytes of ps changed to 0x80 [invalid] expect failure tc 84: ps followed by 0 [invalid] expect failure tc 85: ps followed by 0xff [invalid] expect failure tc 86: shifted salt [invalid] expect failure tc 87: including garbage [invalid] expect failure tc 88: first byte of masked_db changed to 0 [invalid] expect failure tc 89: last byte in em modified [invalid] expect failure tc 90: last byte in em modified [invalid] expect failure tc 91: last byte in em modified [invalid] expect failure tc 92: signature is 0 [invalid] expect failure tc 93: signature is 1 [invalid] expect failure tc 94: signature is n-1 [invalid] expect failure tc 95: signature is n [invalid] expect failure tc 96: prepending 0's to signature [invalid] expect failure tc 97: appending 0's to signature [invalid] expect failure tc 98: truncated signature [invalid] expect failure tc 99: empty signature [invalid] expect failure tc 100: PKCS #1 v1.5 signature [invalid] expect failure Running tcid: 1 Running tcid: 2 Running tcid: 3 Running tcid: 4 Running tcid: 5 Running tcid: 6 Running tcid: 7 Running tcid: 8 Running tcid: 9 Running tcid: 10 Running tcid: 11 Running tcid: 12 Running tcid: 13 Running tcid: 14 Running tcid: 15 Running tcid: 16 Running tcid: 17 Running tcid: 18 Running tcid: 19 Running tcid: 20 Running tcid: 21 Running tcid: 22 Running tcid: 23 Running tcid: 24 Running tcid: 25 Running tcid: 26 Running tcid: 27 Running tcid: 28 Running tcid: 29 Running tcid: 30 Running tcid: 31 Running tcid: 32 Running tcid: 33 Running tcid: 34 Running tcid: 35 Running tcid: 36 Running tcid: 37 Running tcid: 38 Running tcid: 39 Running tcid: 40 Running tcid: 41 Running tcid: 42 Running tcid: 43 Running tcid: 44 Running tcid: 45 Running tcid: 46 Running tcid: 47 Running tcid: 48 Running tcid: 49 Running tcid: 50 Running tcid: 51 Running tcid: 52 Running tcid: 53 Running tcid: 54 Running tcid: 55 Running tcid: 56 Running tcid: 57 Running tcid: 58 Running tcid: 59 Running tcid: 60 Running tcid: 61 Running tcid: 62 Running tcid: 63 Running tcid: 64 Running tcid: 65 Running tcid: 66 Running tcid: 67 Running tcid: 68 Running tcid: 69 Running tcid: 70 Running tcid: 71 Running tcid: 72 Running tcid: 73 Running tcid: 74 Running tcid: 75 Running tcid: 76 Running tcid: 77 Running tcid: 78 Running tcid: 79 Running tcid: 80 Running tcid: 81 Running tcid: 82 Running tcid: 83 Running tcid: 84 Running tcid: 85 Running tcid: 86 Running tcid: 87 Running tcid: 88 Running tcid: 89 Running tcid: 90 Running tcid: 91 Running tcid: 92 Running tcid: 93 Running tcid: 94 Running tcid: 95 Running tcid: 96 Running tcid: 97 Running tcid: 98 Running tcid: 99 Running tcid: 100 [ OK ] Pkcs11RsaPssTestWycheproof.RsaPss2048Sha256_0 (39 ms) [ RUN ] Pkcs11RsaPssTestWycheproof.RsaPss2048Sha256_32 Reading tests from: rsa_pss_2048_sha256_mgf1_32_test.json Test vectors of class RsassaPssVerify are intended for checking the verification of RSASSA-PSS signatures. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: [valid] expect success tc 12: [valid] expect success tc 13: [valid] expect success tc 14: [valid] expect success tc 15: [valid] expect success tc 16: [valid] expect success tc 17: [valid] expect success tc 18: [valid] expect success tc 19: [valid] expect success tc 20: [valid] expect success tc 21: [valid] expect success tc 22: [valid] expect success tc 23: [valid] expect success tc 24: [valid] expect success tc 25: [valid] expect success tc 26: [valid] expect success tc 27: [valid] expect success tc 28: [valid] expect success tc 29: [valid] expect success tc 30: [valid] expect success tc 31: [valid] expect success tc 32: [valid] expect success tc 33: [valid] expect success tc 34: [valid] expect success tc 35: [valid] expect success tc 36: [valid] expect success tc 37: [valid] expect success tc 38: [valid] expect success tc 39: [valid] expect success tc 40: [valid] expect success tc 41: [valid] expect success tc 42: [valid] expect success tc 43: [valid] expect success tc 44: [valid] expect success tc 45: [valid] expect success tc 46: [valid] expect success tc 47: [valid] expect success tc 48: [valid] expect success tc 49: [valid] expect success tc 50: [valid] expect success tc 51: [valid] expect success tc 52: [valid] expect success tc 53: [valid] expect success tc 54: [valid] expect success tc 55: [valid] expect success tc 56: [valid] expect success tc 57: [valid] expect success tc 58: [valid] expect success tc 59: [valid] expect success tc 60: [valid] expect success tc 61: [valid] expect success tc 62: first byte of m_hash modified [invalid] expect failure tc 63: first byte of m_hash modified [invalid] expect failure tc 64: last byte of m_hash modified [invalid] expect failure tc 65: last byte of m_hash modified [invalid] expect failure tc 66: all bits in m_hash flipped [invalid] expect failure tc 67: s_len changed to 0 [invalid] expect failure tc 68: s_len changed to 20 [invalid] expect failure tc 69: salt is all 0 [valid] expect success tc 70: salt is all 1 [valid] expect success tc 71: byte 0 in zero padding modified [invalid] expect failure tc 72: byte 7 in zero padding modified [invalid] expect failure tc 73: all bytes in zero padding modified [invalid] expect failure tc 74: first byte of hash h modified [invalid] expect failure tc 75: first byte of hash h modified [invalid] expect failure tc 76: last byte of hash h modified [invalid] expect failure tc 77: last byte of hash h modified [invalid] expect failure tc 78: all bytes of h replaced by 0 [invalid] expect failure tc 79: all bits of h replaced by 1s [invalid] expect failure tc 80: all bits in hash h flipped [invalid] expect failure tc 81: hash of salt missing [invalid] expect failure tc 82: first byte of ps modified [invalid] expect failure tc 83: last byte of ps modified [invalid] expect failure tc 84: all bytes of ps changed to 0xff [invalid] expect failure tc 85: all bytes of ps changed to 0x80 [invalid] expect failure tc 86: ps followed by 0 [invalid] expect failure tc 87: ps followed by 0xff [invalid] expect failure tc 88: shifted salt [invalid] expect failure tc 89: including garbage [invalid] expect failure tc 90: bit 7 of masked_db not cleared [invalid] expect failure tc 91: first byte of masked_db changed to 0 [invalid] expect failure tc 92: last byte in em modified [invalid] expect failure tc 93: last byte in em modified [invalid] expect failure tc 94: last byte in em modified [invalid] expect failure tc 95: signature is 0 [invalid] expect failure tc 96: signature is 1 [invalid] expect failure tc 97: signature is n-1 [invalid] expect failure tc 98: signature is n [invalid] expect failure tc 99: prepending 0's to signature [invalid] expect failure tc 100: appending 0's to signature [invalid] expect failure tc 101: truncated signature [invalid] expect failure tc 102: empty signature [invalid] expect failure tc 103: PKCS #1 v1.5 signature [invalid] expect failure Running tcid: 1 Running tcid: 2 Running tcid: 3 Running tcid: 4 Running tcid: 5 Running tcid: 6 Running tcid: 7 Running tcid: 8 Running tcid: 9 Running tcid: 10 Running tcid: 11 Running tcid: 12 Running tcid: 13 Running tcid: 14 Running tcid: 15 Running tcid: 16 Running tcid: 17 Running tcid: 18 Running tcid: 19 Running tcid: 20 Running tcid: 21 Running tcid: 22 Running tcid: 23 Running tcid: 24 Running tcid: 25 Running tcid: 26 Running tcid: 27 Running tcid: 28 Running tcid: 29 Running tcid: 30 Running tcid: 31 Running tcid: 32 Running tcid: 33 Running tcid: 34 Running tcid: 35 Running tcid: 36 Running tcid: 37 Running tcid: 38 Running tcid: 39 Running tcid: 40 Running tcid: 41 Running tcid: 42 Running tcid: 43 Running tcid: 44 Running tcid: 45 Running tcid: 46 Running tcid: 47 Running tcid: 48 Running tcid: 49 Running tcid: 50 Running tcid: 51 Running tcid: 52 Running tcid: 53 Running tcid: 54 Running tcid: 55 Running tcid: 56 Running tcid: 57 Running tcid: 58 Running tcid: 59 Running tcid: 60 Running tcid: 61 Running tcid: 62 Running tcid: 63 Running tcid: 64 Running tcid: 65 Running tcid: 66 Running tcid: 67 Running tcid: 68 Running tcid: 69 Running tcid: 70 Running tcid: 71 Running tcid: 72 Running tcid: 73 Running tcid: 74 Running tcid: 75 Running tcid: 76 Running tcid: 77 Running tcid: 78 Running tcid: 79 Running tcid: 80 Running tcid: 81 Running tcid: 82 Running tcid: 83 Running tcid: 84 Running tcid: 85 Running tcid: 86 Running tcid: 87 Running tcid: 88 Running tcid: 89 Running tcid: 90 Running tcid: 91 Running tcid: 92 Running tcid: 93 Running tcid: 94 Running tcid: 95 Running tcid: 96 Running tcid: 97 Running tcid: 98 Running tcid: 99 Running tcid: 100 Running tcid: 101 Running tcid: 102 Running tcid: 103 [ OK ] Pkcs11RsaPssTestWycheproof.RsaPss2048Sha256_32 (41 ms) [ RUN ] Pkcs11RsaPssTestWycheproof.RsaPss3072Sha256 Reading tests from: rsa_pss_3072_sha256_mgf1_32_test.json Test vectors of class RsassaPssVerify are intended for checking the verification of RSASSA-PSS signatures. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: [valid] expect success tc 12: [valid] expect success tc 13: [valid] expect success tc 14: [valid] expect success tc 15: [valid] expect success tc 16: [valid] expect success tc 17: [valid] expect success tc 18: [valid] expect success tc 19: [valid] expect success tc 20: [valid] expect success tc 21: [valid] expect success tc 22: [valid] expect success tc 23: [valid] expect success tc 24: [valid] expect success tc 25: [valid] expect success tc 26: [valid] expect success tc 27: [valid] expect success tc 28: [valid] expect success tc 29: [valid] expect success tc 30: [valid] expect success tc 31: [valid] expect success tc 32: [valid] expect success tc 33: [valid] expect success tc 34: [valid] expect success tc 35: [valid] expect success tc 36: [valid] expect success tc 37: [valid] expect success tc 38: [valid] expect success tc 39: [valid] expect success tc 40: [valid] expect success tc 41: [valid] expect success tc 42: [valid] expect success tc 43: [valid] expect success tc 44: [valid] expect success tc 45: [valid] expect success tc 46: [valid] expect success tc 47: [valid] expect success tc 48: [valid] expect success tc 49: [valid] expect success tc 50: [valid] expect success tc 51: [valid] expect success tc 52: [valid] expect success tc 53: [valid] expect success tc 54: [valid] expect success tc 55: [valid] expect success tc 56: [valid] expect success tc 57: [valid] expect success tc 58: [valid] expect success tc 59: [valid] expect success tc 60: [valid] expect success tc 61: [valid] expect success tc 62: first byte of m_hash modified [invalid] expect failure tc 63: first byte of m_hash modified [invalid] expect failure tc 64: last byte of m_hash modified [invalid] expect failure tc 65: last byte of m_hash modified [invalid] expect failure tc 66: all bits in m_hash flipped [invalid] expect failure tc 67: s_len changed to 0 [invalid] expect failure tc 68: s_len changed to 20 [invalid] expect failure tc 69: salt is all 0 [valid] expect success tc 70: salt is all 1 [valid] expect success tc 71: byte 0 in zero padding modified [invalid] expect failure tc 72: byte 7 in zero padding modified [invalid] expect failure tc 73: all bytes in zero padding modified [invalid] expect failure tc 74: first byte of hash h modified [invalid] expect failure tc 75: first byte of hash h modified [invalid] expect failure tc 76: last byte of hash h modified [invalid] expect failure tc 77: last byte of hash h modified [invalid] expect failure tc 78: all bytes of h replaced by 0 [invalid] expect failure tc 79: all bits of h replaced by 1s [invalid] expect failure tc 80: all bits in hash h flipped [invalid] expect failure tc 81: hash of salt missing [invalid] expect failure tc 82: first byte of ps modified [invalid] expect failure tc 83: last byte of ps modified [invalid] expect failure tc 84: all bytes of ps changed to 0xff [invalid] expect failure tc 85: all bytes of ps changed to 0x80 [invalid] expect failure tc 86: ps followed by 0 [invalid] expect failure tc 87: ps followed by 0xff [invalid] expect failure tc 88: shifted salt [invalid] expect failure tc 89: including garbage [invalid] expect failure tc 90: bit 7 of masked_db not cleared [invalid] expect failure tc 91: first byte of masked_db changed to 0 [invalid] expect failure tc 92: last byte in em modified [invalid] expect failure tc 93: last byte in em modified [invalid] expect failure tc 94: last byte in em modified [invalid] expect failure tc 95: signature is 0 [invalid] expect failure tc 96: signature is 1 [invalid] expect failure tc 97: signature is n-1 [invalid] expect failure tc 98: signature is n [invalid] expect failure tc 99: prepending 0's to signature [invalid] expect failure tc 100: appending 0's to signature [invalid] expect failure tc 101: truncated signature [invalid] expect failure tc 102: empty signature [invalid] expect failure tc 103: PKCS #1 v1.5 signature [invalid] expect failure Running tcid: 1 Running tcid: 2 Running tcid: 3 Running tcid: 4 Running tcid: 5 Running tcid: 6 Running tcid: 7 Running tcid: 8 Running tcid: 9 Running tcid: 10 Running tcid: 11 Running tcid: 12 Running tcid: 13 Running tcid: 14 Running tcid: 15 Running tcid: 16 Running tcid: 17 Running tcid: 18 Running tcid: 19 Running tcid: 20 Running tcid: 21 Running tcid: 22 Running tcid: 23 Running tcid: 24 Running tcid: 25 Running tcid: 26 Running tcid: 27 Running tcid: 28 Running tcid: 29 Running tcid: 30 Running tcid: 31 Running tcid: 32 Running tcid: 33 Running tcid: 34 Running tcid: 35 Running tcid: 36 Running tcid: 37 Running tcid: 38 Running tcid: 39 Running tcid: 40 Running tcid: 41 Running tcid: 42 Running tcid: 43 Running tcid: 44 Running tcid: 45 Running tcid: 46 Running tcid: 47 Running tcid: 48 Running tcid: 49 Running tcid: 50 Running tcid: 51 Running tcid: 52 Running tcid: 53 Running tcid: 54 Running tcid: 55 Running tcid: 56 Running tcid: 57 Running tcid: 58 Running tcid: 59 Running tcid: 60 Running tcid: 61 Running tcid: 62 Running tcid: 63 Running tcid: 64 Running tcid: 65 Running tcid: 66 Running tcid: 67 Running tcid: 68 Running tcid: 69 Running tcid: 70 Running tcid: 71 Running tcid: 72 Running tcid: 73 Running tcid: 74 Running tcid: 75 Running tcid: 76 Running tcid: 77 Running tcid: 78 Running tcid: 79 Running tcid: 80 Running tcid: 81 Running tcid: 82 Running tcid: 83 Running tcid: 84 Running tcid: 85 Running tcid: 86 Running tcid: 87 Running tcid: 88 Running tcid: 89 Running tcid: 90 Running tcid: 91 Running tcid: 92 Running tcid: 93 Running tcid: 94 Running tcid: 95 Running tcid: 96 Running tcid: 97 Running tcid: 98 Running tcid: 99 Running tcid: 100 Running tcid: 101 Running tcid: 102 Running tcid: 103 [ OK ] Pkcs11RsaPssTestWycheproof.RsaPss3072Sha256 (85 ms) [ RUN ] Pkcs11RsaPssTestWycheproof.RsaPss4096Sha256 Reading tests from: rsa_pss_4096_sha256_mgf1_32_test.json Test vectors of class RsassaPssVerify are intended for checking the verification of RSASSA-PSS signatures. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: [valid] expect success tc 12: [valid] expect success tc 13: [valid] expect success tc 14: [valid] expect success tc 15: [valid] expect success tc 16: [valid] expect success tc 17: [valid] expect success tc 18: [valid] expect success tc 19: [valid] expect success tc 20: [valid] expect success tc 21: [valid] expect success tc 22: [valid] expect success tc 23: [valid] expect success tc 24: [valid] expect success tc 25: [valid] expect success tc 26: [valid] expect success tc 27: [valid] expect success tc 28: [valid] expect success tc 29: [valid] expect success tc 30: [valid] expect success tc 31: [valid] expect success tc 32: [valid] expect success tc 33: [valid] expect success tc 34: [valid] expect success tc 35: [valid] expect success tc 36: [valid] expect success tc 37: [valid] expect success tc 38: [valid] expect success tc 39: [valid] expect success tc 40: [valid] expect success tc 41: [valid] expect success tc 42: [valid] expect success tc 43: [valid] expect success tc 44: [valid] expect success tc 45: [valid] expect success tc 46: [valid] expect success tc 47: [valid] expect success tc 48: [valid] expect success tc 49: [valid] expect success tc 50: [valid] expect success tc 51: [valid] expect success tc 52: [valid] expect success tc 53: [valid] expect success tc 54: [valid] expect success tc 55: [valid] expect success tc 56: [valid] expect success tc 57: [valid] expect success tc 58: [valid] expect success tc 59: [valid] expect success tc 60: [valid] expect success tc 61: [valid] expect success tc 62: first byte of m_hash modified [invalid] expect failure tc 63: first byte of m_hash modified [invalid] expect failure tc 64: last byte of m_hash modified [invalid] expect failure tc 65: last byte of m_hash modified [invalid] expect failure tc 66: all bits in m_hash flipped [invalid] expect failure tc 67: s_len changed to 0 [invalid] expect failure tc 68: s_len changed to 20 [invalid] expect failure tc 69: salt is all 0 [valid] expect success tc 70: salt is all 1 [valid] expect success tc 71: byte 0 in zero padding modified [invalid] expect failure tc 72: byte 7 in zero padding modified [invalid] expect failure tc 73: all bytes in zero padding modified [invalid] expect failure tc 74: first byte of hash h modified [invalid] expect failure tc 75: first byte of hash h modified [invalid] expect failure tc 76: last byte of hash h modified [invalid] expect failure tc 77: last byte of hash h modified [invalid] expect failure tc 78: all bytes of h replaced by 0 [invalid] expect failure tc 79: all bits of h replaced by 1s [invalid] expect failure tc 80: all bits in hash h flipped [invalid] expect failure tc 81: hash of salt missing [invalid] expect failure tc 82: first byte of ps modified [invalid] expect failure tc 83: last byte of ps modified [invalid] expect failure tc 84: all bytes of ps changed to 0xff [invalid] expect failure tc 85: all bytes of ps changed to 0x80 [invalid] expect failure tc 86: ps followed by 0 [invalid] expect failure tc 87: ps followed by 0xff [invalid] expect failure tc 88: shifted salt [invalid] expect failure tc 89: including garbage [invalid] expect failure tc 90: bit 7 of masked_db not cleared [invalid] expect failure tc 91: first byte of masked_db changed to 0 [invalid] expect failure tc 92: last byte in em modified [invalid] expect failure tc 93: last byte in em modified [invalid] expect failure tc 94: last byte in em modified [invalid] expect failure tc 95: signature is 0 [invalid] expect failure tc 96: signature is 1 [invalid] expect failure tc 97: signature is n-1 [invalid] expect failure tc 98: signature is n [invalid] expect failure tc 99: prepending 0's to signature [invalid] expect failure tc 100: appending 0's to signature [invalid] expect failure tc 101: truncated signature [invalid] expect failure tc 102: empty signature [invalid] expect failure tc 103: PKCS #1 v1.5 signature [invalid] expect failure Running tcid: 1 Running tcid: 2 Running tcid: 3 Running tcid: 4 Running tcid: 5 Running tcid: 6 Running tcid: 7 Running tcid: 8 Running tcid: 9 Running tcid: 10 Running tcid: 11 Running tcid: 12 Running tcid: 13 Running tcid: 14 Running tcid: 15 Running tcid: 16 Running tcid: 17 Running tcid: 18 Running tcid: 19 Running tcid: 20 Running tcid: 21 Running tcid: 22 Running tcid: 23 Running tcid: 24 Running tcid: 25 Running tcid: 26 Running tcid: 27 Running tcid: 28 Running tcid: 29 Running tcid: 30 Running tcid: 31 Running tcid: 32 Running tcid: 33 Running tcid: 34 Running tcid: 35 Running tcid: 36 Running tcid: 37 Running tcid: 38 Running tcid: 39 Running tcid: 40 Running tcid: 41 Running tcid: 42 Running tcid: 43 Running tcid: 44 Running tcid: 45 Running tcid: 46 Running tcid: 47 Running tcid: 48 Running tcid: 49 Running tcid: 50 Running tcid: 51 Running tcid: 52 Running tcid: 53 Running tcid: 54 Running tcid: 55 Running tcid: 56 Running tcid: 57 Running tcid: 58 Running tcid: 59 Running tcid: 60 Running tcid: 61 Running tcid: 62 Running tcid: 63 Running tcid: 64 Running tcid: 65 Running tcid: 66 Running tcid: 67 Running tcid: 68 Running tcid: 69 Running tcid: 70 Running tcid: 71 Running tcid: 72 Running tcid: 73 Running tcid: 74 Running tcid: 75 Running tcid: 76 Running tcid: 77 Running tcid: 78 Running tcid: 79 Running tcid: 80 Running tcid: 81 Running tcid: 82 Running tcid: 83 Running tcid: 84 Running tcid: 85 Running tcid: 86 Running tcid: 87 Running tcid: 88 Running tcid: 89 Running tcid: 90 Running tcid: 91 Running tcid: 92 Running tcid: 93 Running tcid: 94 Running tcid: 95 Running tcid: 96 Running tcid: 97 Running tcid: 98 Running tcid: 99 Running tcid: 100 Running tcid: 101 Running tcid: 102 Running tcid: 103 [ OK ] Pkcs11RsaPssTestWycheproof.RsaPss4096Sha256 (152 ms) [ RUN ] Pkcs11RsaPssTestWycheproof.RsaPss4096Sha512 Reading tests from: rsa_pss_4096_sha512_mgf1_32_test.json Test vectors of class RsassaPssVerify are intended for checking the verification of RSASSA-PSS signatures. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: [valid] expect success tc 12: [valid] expect success tc 13: [valid] expect success tc 14: [valid] expect success tc 15: [valid] expect success tc 16: [valid] expect success tc 17: [valid] expect success tc 18: [valid] expect success tc 19: [valid] expect success tc 20: [valid] expect success tc 21: [valid] expect success tc 22: [valid] expect success tc 23: [valid] expect success tc 24: [valid] expect success tc 25: [valid] expect success tc 26: [valid] expect success tc 27: [valid] expect success tc 28: [valid] expect success tc 29: [valid] expect success tc 30: [valid] expect success tc 31: [valid] expect success tc 32: [valid] expect success tc 33: [valid] expect success tc 34: [valid] expect success tc 35: [valid] expect success tc 36: [valid] expect success tc 37: [valid] expect success tc 38: [valid] expect success tc 39: [valid] expect success tc 40: [valid] expect success tc 41: [valid] expect success tc 42: [valid] expect success tc 43: [valid] expect success tc 44: [valid] expect success tc 45: [valid] expect success tc 46: [valid] expect success tc 47: [valid] expect success tc 48: [valid] expect success tc 49: [valid] expect success tc 50: [valid] expect success tc 51: [valid] expect success tc 52: [valid] expect success tc 53: [valid] expect success tc 54: [valid] expect success tc 55: [valid] expect success tc 56: [valid] expect success tc 57: [valid] expect success tc 58: [valid] expect success tc 59: [valid] expect success tc 60: [valid] expect success tc 61: [valid] expect success tc 62: [valid] expect success tc 63: [valid] expect success tc 64: [valid] expect success tc 65: [valid] expect success tc 66: [valid] expect success tc 67: [valid] expect success tc 68: [valid] expect success tc 69: [valid] expect success tc 70: [valid] expect success tc 71: [valid] expect success tc 72: [valid] expect success tc 73: [valid] expect success tc 74: [valid] expect success tc 75: [valid] expect success tc 76: [valid] expect success tc 77: [valid] expect success tc 78: [valid] expect success tc 79: [valid] expect success tc 80: [valid] expect success tc 81: [valid] expect success tc 82: [valid] expect success tc 83: [valid] expect success tc 84: [valid] expect success tc 85: [valid] expect success tc 86: [valid] expect success tc 87: [valid] expect success tc 88: [valid] expect success tc 89: [valid] expect success tc 90: [valid] expect success tc 91: [valid] expect success tc 92: [valid] expect success tc 93: [valid] expect success tc 94: [valid] expect success tc 95: [valid] expect success tc 96: [valid] expect success tc 97: [valid] expect success tc 98: [valid] expect success tc 99: [valid] expect success tc 100: [valid] expect success tc 101: [valid] expect success tc 102: [valid] expect success tc 103: [valid] expect success tc 104: [valid] expect success tc 105: [valid] expect success tc 106: [valid] expect success tc 107: [valid] expect success tc 108: [valid] expect success tc 109: [valid] expect success tc 110: [valid] expect success tc 111: [valid] expect success tc 112: [valid] expect success tc 113: [valid] expect success tc 114: [valid] expect success tc 115: [valid] expect success tc 116: [valid] expect success tc 117: [valid] expect success tc 118: [valid] expect success tc 119: [valid] expect success tc 120: [valid] expect success tc 121: [valid] expect success tc 122: [valid] expect success tc 123: [valid] expect success tc 124: [valid] expect success tc 125: [valid] expect success tc 126: [valid] expect success tc 127: [valid] expect success tc 128: [valid] expect success tc 129: [valid] expect success tc 130: [valid] expect success tc 131: first byte of m_hash modified [invalid] expect failure tc 132: first byte of m_hash modified [invalid] expect failure tc 133: last byte of m_hash modified [invalid] expect failure tc 134: last byte of m_hash modified [invalid] expect failure tc 135: all bits in m_hash flipped [invalid] expect failure tc 136: s_len changed to 0 [invalid] expect failure tc 137: s_len changed to 20 [invalid] expect failure tc 138: salt is all 0 [valid] expect success tc 139: salt is all 1 [valid] expect success tc 140: byte 0 in zero padding modified [invalid] expect failure tc 141: byte 7 in zero padding modified [invalid] expect failure tc 142: all bytes in zero padding modified [invalid] expect failure tc 143: first byte of hash h modified [invalid] expect failure tc 144: first byte of hash h modified [invalid] expect failure tc 145: last byte of hash h modified [invalid] expect failure tc 146: last byte of hash h modified [invalid] expect failure tc 147: all bytes of h replaced by 0 [invalid] expect failure tc 148: all bits of h replaced by 1s [invalid] expect failure tc 149: all bits in hash h flipped [invalid] expect failure tc 150: hash of salt missing [invalid] expect failure tc 151: first byte of ps modified [invalid] expect failure tc 152: last byte of ps modified [invalid] expect failure tc 153: all bytes of ps changed to 0xff [invalid] expect failure tc 154: all bytes of ps changed to 0x80 [invalid] expect failure tc 155: ps followed by 0 [invalid] expect failure tc 156: ps followed by 0xff [invalid] expect failure tc 157: shifted salt [invalid] expect failure tc 158: including garbage [invalid] expect failure tc 159: first byte of masked_db changed to 0 [invalid] expect failure tc 160: last byte in em modified [invalid] expect failure tc 161: last byte in em modified [invalid] expect failure tc 162: last byte in em modified [invalid] expect failure tc 163: signature is 0 [invalid] expect failure tc 164: signature is 1 [invalid] expect failure tc 165: signature is n-1 [invalid] expect failure tc 166: signature is n [invalid] expect failure tc 167: prepending 0's to signature [invalid] expect failure tc 168: appending 0's to signature [invalid] expect failure tc 169: truncated signature [invalid] expect failure tc 170: empty signature [invalid] expect failure tc 171: PKCS #1 v1.5 signature [invalid] expect failure Running tcid: 1 Running tcid: 2 Running tcid: 3 Running tcid: 4 Running tcid: 5 Running tcid: 6 Running tcid: 7 Running tcid: 8 Running tcid: 9 Running tcid: 10 Running tcid: 11 Running tcid: 12 Running tcid: 13 Running tcid: 14 Running tcid: 15 Running tcid: 16 Running tcid: 17 Running tcid: 18 Running tcid: 19 Running tcid: 20 Running tcid: 21 Running tcid: 22 Running tcid: 23 Running tcid: 24 Running tcid: 25 Running tcid: 26 Running tcid: 27 Running tcid: 28 Running tcid: 29 Running tcid: 30 Running tcid: 31 Running tcid: 32 Running tcid: 33 Running tcid: 34 Running tcid: 35 Running tcid: 36 Running tcid: 37 Running tcid: 38 Running tcid: 39 Running tcid: 40 Running tcid: 41 Running tcid: 42 Running tcid: 43 Running tcid: 44 Running tcid: 45 Running tcid: 46 Running tcid: 47 Running tcid: 48 Running tcid: 49 Running tcid: 50 Running tcid: 51 Running tcid: 52 Running tcid: 53 Running tcid: 54 Running tcid: 55 Running tcid: 56 Running tcid: 57 Running tcid: 58 Running tcid: 59 Running tcid: 60 Running tcid: 61 Running tcid: 62 Running tcid: 63 Running tcid: 64 Running tcid: 65 Running tcid: 66 Running tcid: 67 Running tcid: 68 Running tcid: 69 Running tcid: 70 Running tcid: 71 Running tcid: 72 Running tcid: 73 Running tcid: 74 Running tcid: 75 Running tcid: 76 Running tcid: 77 Running tcid: 78 Running tcid: 79 Running tcid: 80 Running tcid: 81 Running tcid: 82 Running tcid: 83 Running tcid: 84 Running tcid: 85 Running tcid: 86 Running tcid: 87 Running tcid: 88 Running tcid: 89 Running tcid: 90 Running tcid: 91 Running tcid: 92 Running tcid: 93 Running tcid: 94 Running tcid: 95 Running tcid: 96 Running tcid: 97 Running tcid: 98 Running tcid: 99 Running tcid: 100 Running tcid: 101 Running tcid: 102 Running tcid: 103 Running tcid: 104 Running tcid: 105 Running tcid: 106 Running tcid: 107 Running tcid: 108 Running tcid: 109 Running tcid: 110 Running tcid: 111 Running tcid: 112 Running tcid: 113 Running tcid: 114 Running tcid: 115 Running tcid: 116 Running tcid: 117 Running tcid: 118 Running tcid: 119 Running tcid: 120 Running tcid: 121 Running tcid: 122 Running tcid: 123 Running tcid: 124 Running tcid: 125 Running tcid: 126 Running tcid: 127 Running tcid: 128 Running tcid: 129 Running tcid: 130 Running tcid: 131 Running tcid: 132 Running tcid: 133 Running tcid: 134 Running tcid: 135 Running tcid: 136 Running tcid: 137 Running tcid: 138 Running tcid: 139 Running tcid: 140 Running tcid: 141 Running tcid: 142 Running tcid: 143 Running tcid: 144 Running tcid: 145 Running tcid: 146 Running tcid: 147 Running tcid: 148 Running tcid: 149 Running tcid: 150 Running tcid: 151 Running tcid: 152 Running tcid: 153 Running tcid: 154 Running tcid: 155 Running tcid: 156 Running tcid: 157 Running tcid: 158 Running tcid: 159 Running tcid: 160 Running tcid: 161 Running tcid: 162 Running tcid: 163 Running tcid: 164 Running tcid: 165 Running tcid: 166 Running tcid: 167 Running tcid: 168 Running tcid: 169 Running tcid: 170 Running tcid: 171 [ OK ] Pkcs11RsaPssTestWycheproof.RsaPss4096Sha512 (270 ms) [ RUN ] Pkcs11RsaPssTestWycheproof.RsaPssMisc Reading tests from: rsa_pss_misc_test.json Test vectors of class RsassaPssVerify are intended for checking the verification of RSASSA-PSS signatures. WeakHash: The key for this test vector uses a weak hash function. tc 1: [acceptable, WeakHash] expect success Running tcid: 1 tc 2: [acceptable, WeakHash] expect success Running tcid: 2 tc 3: [acceptable, WeakHash] expect success Running tcid: 3 tc 4: [acceptable, WeakHash] expect success Running tcid: 4 tc 5: [acceptable, WeakHash] expect success Running tcid: 5 tc 6: [acceptable, WeakHash] expect success Running tcid: 6 tc 7: [acceptable, WeakHash] expect success Running tcid: 7 tc 8: [acceptable, WeakHash] expect success Running tcid: 8 tc 9: [acceptable, WeakHash] expect success Running tcid: 9 tc 10: [acceptable, WeakHash] expect success Running tcid: 10 tc 11: [acceptable, WeakHash] expect success Running tcid: 11 tc 12: [acceptable, WeakHash] expect success Running tcid: 12 tc 13: [acceptable, WeakHash] expect success Running tcid: 13 tc 14: [acceptable, WeakHash] expect success Running tcid: 14 tc 15: [acceptable, WeakHash] expect success Running tcid: 15 tc 16: [acceptable, WeakHash] expect success Running tcid: 16 tc 17: [acceptable, WeakHash] expect success Running tcid: 17 tc 18: [acceptable, WeakHash] expect success Running tcid: 18 tc 19: [acceptable, WeakHash] expect success Running tcid: 19 tc 20: [acceptable, WeakHash] expect success Running tcid: 20 tc 21: [acceptable, WeakHash] expect success Running tcid: 21 tc 22: [acceptable, WeakHash] expect success Running tcid: 22 tc 23: [acceptable, WeakHash] expect success Running tcid: 23 tc 24: [acceptable, WeakHash] expect success Running tcid: 24 tc 25: [acceptable, WeakHash] expect success Running tcid: 25 tc 26: [acceptable, WeakHash] expect success Running tcid: 26 tc 27: [acceptable, WeakHash] expect success Running tcid: 27 tc 28: [acceptable, WeakHash] expect success Running tcid: 28 tc 29: [acceptable, WeakHash] expect success Running tcid: 29 tc 30: [acceptable, WeakHash] expect success Running tcid: 30 tc 31: [valid] expect success Running tcid: 31 tc 32: [valid] expect success Running tcid: 32 tc 33: [valid] expect success Running tcid: 33 tc 34: [valid] expect success Running tcid: 34 tc 35: [valid] expect success Running tcid: 35 tc 36: [valid] expect success Running tcid: 36 tc 37: [valid] expect success Running tcid: 37 tc 38: [valid] expect success Running tcid: 38 tc 39: [valid] expect success Running tcid: 39 tc 40: [valid] expect success Running tcid: 40 tc 41: [valid] expect success Running tcid: 41 tc 42: [valid] expect success Running tcid: 42 tc 43: [valid] expect success Running tcid: 43 tc 44: [valid] expect success Running tcid: 44 tc 45: [valid] expect success Running tcid: 45 tc 46: [valid] expect success Running tcid: 46 tc 47: [valid] expect success Running tcid: 47 tc 48: [valid] expect success Running tcid: 48 tc 49: [valid] expect success Running tcid: 49 tc 50: [valid] expect success Running tcid: 50 tc 51: [valid] expect success Running tcid: 51 tc 52: [valid] expect success Running tcid: 52 tc 53: [valid] expect success Running tcid: 53 tc 54: [valid] expect success Running tcid: 54 tc 55: [valid] expect success Running tcid: 55 tc 56: [valid] expect success Running tcid: 56 tc 57: [valid] expect success Running tcid: 57 tc 58: [valid] expect success Running tcid: 58 tc 59: [valid] expect success Running tcid: 59 tc 60: [valid] expect success Running tcid: 60 tc 61: [valid] expect success Running tcid: 61 tc 62: [valid] expect success Running tcid: 62 tc 63: [valid] expect success Running tcid: 63 tc 64: [valid] expect success Running tcid: 64 tc 65: [valid] expect success Running tcid: 65 tc 66: [valid] expect success Running tcid: 66 tc 67: [valid] expect success Running tcid: 67 tc 68: [valid] expect success Running tcid: 68 tc 69: [valid] expect success Running tcid: 69 tc 70: [valid] expect success Running tcid: 70 tc 71: [valid] expect success Running tcid: 71 tc 72: [valid] expect success Running tcid: 72 tc 73: [valid] expect success Running tcid: 73 tc 74: [valid] expect success Running tcid: 74 tc 75: [valid] expect success Running tcid: 75 tc 76: [valid] expect success Running tcid: 76 tc 77: [valid] expect success Running tcid: 77 tc 78: [valid] expect success Running tcid: 78 tc 79: [valid] expect success Running tcid: 79 tc 80: [valid] expect success Running tcid: 80 tc 81: [valid] expect success Running tcid: 81 tc 82: [valid] expect success Running tcid: 82 tc 83: [valid] expect success Running tcid: 83 tc 84: [valid] expect success Running tcid: 84 tc 85: [valid] expect success Running tcid: 85 tc 86: [valid] expect success Running tcid: 86 tc 87: [valid] expect success Running tcid: 87 tc 88: [valid] expect success Running tcid: 88 tc 89: [valid] expect success Running tcid: 89 tc 90: [valid] expect success Running tcid: 90 tc 91: [valid] expect success Running tcid: 91 tc 92: [valid] expect success Running tcid: 92 tc 93: [valid] expect success Running tcid: 93 tc 94: [valid] expect success Running tcid: 94 tc 95: [valid] expect success Running tcid: 95 tc 96: [valid] expect success Running tcid: 96 tc 97: [valid] expect success Running tcid: 97 tc 98: [valid] expect success Running tcid: 98 tc 99: [valid] expect success Running tcid: 99 tc 100: [valid] expect success Running tcid: 100 tc 101: [valid] expect success Running tcid: 101 tc 102: [valid] expect success Running tcid: 102 tc 103: [valid] expect success Running tcid: 103 tc 104: [valid] expect success Running tcid: 104 tc 105: [valid] expect success Running tcid: 105 tc 106: [valid] expect success Running tcid: 106 tc 107: [valid] expect success Running tcid: 107 tc 108: [valid] expect success Running tcid: 108 tc 109: [valid] expect success Running tcid: 109 tc 110: [valid] expect success Running tcid: 110 tc 111: [valid] expect success Running tcid: 111 tc 112: [valid] expect success Running tcid: 112 tc 113: [valid] expect success Running tcid: 113 tc 114: [valid] expect success Running tcid: 114 tc 115: [valid] expect success Running tcid: 115 tc 116: [valid] expect success Running tcid: 116 tc 117: [valid] expect success Running tcid: 117 tc 118: [valid] expect success Running tcid: 118 tc 119: [valid] expect success Running tcid: 119 tc 120: [valid] expect success Running tcid: 120 tc 121: [valid] expect success Running tcid: 121 tc 122: [valid] expect success Running tcid: 122 tc 123: [valid] expect success Running tcid: 123 tc 124: [valid] expect success Running tcid: 124 tc 125: [valid] expect success Running tcid: 125 tc 126: [valid] expect success Running tcid: 126 tc 127: [valid] expect success Running tcid: 127 tc 128: [valid] expect success Running tcid: 128 tc 129: [valid] expect success Running tcid: 129 tc 130: [valid] expect success Running tcid: 130 tc 131: [valid] expect success Running tcid: 131 tc 132: [valid] expect success Running tcid: 132 tc 133: [valid] expect success Running tcid: 133 tc 134: [valid] expect success Running tcid: 134 tc 135: [valid] expect success Running tcid: 135 tc 136: [valid] expect success Running tcid: 136 tc 137: [valid] expect success Running tcid: 137 tc 138: [valid] expect success Running tcid: 138 tc 139: [valid] expect success Running tcid: 139 tc 140: [valid] expect success Running tcid: 140 tc 141: [valid] expect success Running tcid: 141 tc 142: [valid] expect success Running tcid: 142 tc 143: [valid] expect success Running tcid: 143 tc 144: [valid] expect success Running tcid: 144 tc 145: [valid] expect success Running tcid: 145 tc 146: [valid] expect success Running tcid: 146 tc 147: [valid] expect success Running tcid: 147 tc 148: [valid] expect success Running tcid: 148 tc 149: [valid] expect success Running tcid: 149 tc 150: [valid] expect success Running tcid: 150 [ OK ] Pkcs11RsaPssTestWycheproof.RsaPssMisc (69 ms) [----------] 7 tests from Pkcs11RsaPssTestWycheproof (691 ms total) [----------] 2 tests from RsaPkcs1Test [ RUN ] RsaPkcs1Test.Pkcs1MinimumPadding [ OK ] RsaPkcs1Test.Pkcs1MinimumPadding (47 ms) [ RUN ] RsaPkcs1Test.RequireNullParameter [ OK ] RsaPkcs1Test.RequireNullParameter (0 ms) [----------] 2 tests from RsaPkcs1Test (47 ms total) [----------] 1 test from Pkcs11RsaPkcs1WycheproofTest [ RUN ] Pkcs11RsaPkcs1WycheproofTest.Pkcs11RsaPkcs1WycheproofTest Reading tests from: rsa_signature_test.json Test vectors of class RsassaPkcs1Verify are intended for checking the verification of RSA PKCS #1 v 1.5 signatures. MissingNull: Some legacy implementation of RSA PKCS#1 signatures did omit the parameter field instead of using an ASN NULL. Some libraries still accept these legacy signatures. This test vector contains such a legacy signature SmallModulus: The key for this test vector has a modulus of size < 2048. SmallPublicKey: The key for this test vector uses a small public key. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: Legacy:missing NULL [acceptable, MissingNull] expect failure tc 9: long form encoding of length of sequence [invalid] expect failure tc 10: long form encoding of length of sequence [invalid] expect failure tc 11: length of sequence contains leading 0 [invalid] expect failure tc 12: length of sequence contains leading 0 [invalid] expect failure tc 13: wrong length of sequence [invalid] expect failure tc 14: wrong length of sequence [invalid] expect failure tc 15: wrong length of sequence [invalid] expect failure tc 16: wrong length of sequence [invalid] expect failure tc 17: uint32 overflow in length of sequence [invalid] expect failure tc 18: uint32 overflow in length of sequence [invalid] expect failure tc 19: uint64 overflow in length of sequence [invalid] expect failure tc 20: uint64 overflow in length of sequence [invalid] expect failure tc 21: length of sequence = 2**31 - 1 [invalid] expect failure tc 22: length of sequence = 2**31 - 1 [invalid] expect failure tc 23: length of sequence = 2**32 - 1 [invalid] expect failure tc 24: length of sequence = 2**32 - 1 [invalid] expect failure tc 25: length of sequence = 2**40 - 1 [invalid] expect failure tc 26: length of sequence = 2**40 - 1 [invalid] expect failure tc 27: length of sequence = 2**64 - 1 [invalid] expect failure tc 28: length of sequence = 2**64 - 1 [invalid] expect failure tc 29: incorrect length of sequence [invalid] expect failure tc 30: incorrect length of sequence [invalid] expect failure tc 31: indefinite length without termination [invalid] expect failure tc 32: indefinite length without termination [invalid] expect failure tc 33: indefinite length without termination [invalid] expect failure tc 34: indefinite length without termination [invalid] expect failure tc 35: indefinite length without termination [invalid] expect failure tc 36: removing sequence [invalid] expect failure tc 37: removing sequence [invalid] expect failure tc 38: lonely sequence tag [invalid] expect failure tc 39: lonely sequence tag [invalid] expect failure tc 40: appending 0's to sequence [invalid] expect failure tc 41: appending 0's to sequence [invalid] expect failure tc 42: prepending 0's to sequence [invalid] expect failure tc 43: prepending 0's to sequence [invalid] expect failure tc 44: appending unused 0's to sequence [invalid] expect failure tc 45: appending unused 0's to sequence [invalid] expect failure tc 46: appending null value to sequence [invalid] expect failure tc 47: appending null value to sequence [invalid] expect failure tc 48: including garbage [invalid] expect failure tc 49: including garbage [invalid] expect failure tc 50: including garbage [invalid] expect failure tc 51: including garbage [invalid] expect failure tc 52: including garbage [invalid] expect failure tc 53: including garbage [invalid] expect failure tc 54: including garbage [invalid] expect failure tc 55: including garbage [invalid] expect failure tc 56: including garbage [invalid] expect failure tc 57: including garbage [invalid] expect failure tc 58: including garbage [invalid] expect failure tc 59: including garbage [invalid] expect failure tc 60: including garbage [invalid] expect failure tc 61: including garbage [invalid] expect failure tc 62: including garbage [invalid] expect failure tc 63: including undefined tags [invalid] expect failure tc 64: including undefined tags [invalid] expect failure tc 65: including undefined tags [invalid] expect failure tc 66: including undefined tags [invalid] expect failure tc 67: including undefined tags [invalid] expect failure tc 68: including undefined tags [invalid] expect failure tc 69: including undefined tags [invalid] expect failure tc 70: including undefined tags [invalid] expect failure tc 71: including undefined tags [invalid] expect failure tc 72: including undefined tags [invalid] expect failure tc 73: truncated length of sequence [invalid] expect failure tc 74: truncated length of sequence [invalid] expect failure tc 75: using composition with indefinite length [invalid] expect failure tc 76: using composition with indefinite length [invalid] expect failure tc 77: using composition with indefinite length [invalid] expect failure tc 78: using composition with indefinite length [invalid] expect failure tc 79: using composition with indefinite length [invalid] expect failure tc 80: using composition with wrong tag [invalid] expect failure tc 81: using composition with wrong tag [invalid] expect failure tc 82: using composition with wrong tag [invalid] expect failure tc 83: using composition with wrong tag [invalid] expect failure tc 84: using composition with wrong tag [invalid] expect failure tc 85: Replacing sequence with NULL [invalid] expect failure tc 86: Replacing sequence with NULL [invalid] expect failure tc 87: changing tag value of sequence [invalid] expect failure tc 88: changing tag value of sequence [invalid] expect failure tc 89: changing tag value of sequence [invalid] expect failure tc 90: changing tag value of sequence [invalid] expect failure tc 91: changing tag value of sequence [invalid] expect failure tc 92: changing tag value of sequence [invalid] expect failure tc 93: changing tag value of sequence [invalid] expect failure tc 94: changing tag value of sequence [invalid] expect failure tc 95: changing tag value of sequence [invalid] expect failure tc 96: changing tag value of sequence [invalid] expect failure tc 97: dropping value of sequence [invalid] expect failure tc 98: dropping value of sequence [invalid] expect failure tc 99: using composition for sequence [invalid] expect failure tc 100: using composition for sequence [invalid] expect failure tc 101: truncated sequence [invalid] expect failure tc 102: truncated sequence [invalid] expect failure tc 103: truncated sequence [invalid] expect failure tc 104: truncated sequence [invalid] expect failure tc 105: indefinite length [invalid] expect failure tc 106: indefinite length [invalid] expect failure tc 107: indefinite length with truncated delimiter [invalid] expect failure tc 108: indefinite length with truncated delimiter [invalid] expect failure tc 109: indefinite length with additional element [invalid] expect failure tc 110: indefinite length with additional element [invalid] expect failure tc 111: indefinite length with truncated element [invalid] expect failure tc 112: indefinite length with truncated element [invalid] expect failure tc 113: indefinite length with garbage [invalid] expect failure tc 114: indefinite length with garbage [invalid] expect failure tc 115: indefinite length with nonempty EOC [invalid] expect failure tc 116: indefinite length with nonempty EOC [invalid] expect failure tc 117: prepend empty sequence [invalid] expect failure tc 118: prepend empty sequence [invalid] expect failure tc 119: append empty sequence [invalid] expect failure tc 120: append empty sequence [invalid] expect failure tc 121: append garbage with high tag number [invalid] expect failure tc 122: append garbage with high tag number [invalid] expect failure tc 123: sequence of sequence [invalid] expect failure tc 124: sequence of sequence [invalid] expect failure tc 125: truncated sequence: removed last 1 elements [invalid] expect failure tc 126: repeating element in sequence [invalid] expect failure tc 127: long form encoding of length of oid [invalid] expect failure tc 128: length of oid contains leading 0 [invalid] expect failure tc 129: wrong length of oid [invalid] expect failure tc 130: wrong length of oid [invalid] expect failure tc 131: uint32 overflow in length of oid [invalid] expect failure tc 132: uint64 overflow in length of oid [invalid] expect failure tc 133: length of oid = 2**31 - 1 [invalid] expect failure tc 134: length of oid = 2**32 - 1 [invalid] expect failure tc 135: length of oid = 2**40 - 1 [invalid] expect failure tc 136: length of oid = 2**64 - 1 [invalid] expect failure tc 137: incorrect length of oid [invalid] expect failure tc 138: removing oid [invalid] expect failure tc 139: lonely oid tag [invalid] expect failure tc 140: appending 0's to oid [invalid] expect failure tc 141: prepending 0's to oid [invalid] expect failure tc 142: appending unused 0's to oid [invalid] expect failure tc 143: appending null value to oid [invalid] expect failure tc 144: truncated length of oid [invalid] expect failure tc 145: Replacing oid with NULL [invalid] expect failure tc 146: changing tag value of oid [invalid] expect failure tc 147: changing tag value of oid [invalid] expect failure tc 148: changing tag value of oid [invalid] expect failure tc 149: changing tag value of oid [invalid] expect failure tc 150: changing tag value of oid [invalid] expect failure tc 151: dropping value of oid [invalid] expect failure tc 152: using composition for oid [invalid] expect failure tc 153: modify first byte of oid [invalid] expect failure tc 154: modify last byte of oid [invalid] expect failure tc 155: truncated oid [invalid] expect failure tc 156: truncated oid [invalid] expect failure tc 157: wrong oid [invalid] expect failure tc 158: longer oid [invalid] expect failure tc 159: oid with modified node [invalid] expect failure tc 160: oid with modified node [invalid] expect failure tc 161: large integer in oid [invalid] expect failure tc 162: oid with invalid node [invalid] expect failure tc 163: oid with invalid node [invalid] expect failure tc 164: long form encoding of length of null [invalid] expect failure tc 165: length of null contains leading 0 [invalid] expect failure tc 166: wrong length of null [invalid] expect failure tc 167: uint32 overflow in length of null [invalid] expect failure tc 168: uint64 overflow in length of null [invalid] expect failure tc 169: length of null = 2**31 - 1 [invalid] expect failure tc 170: length of null = 2**32 - 1 [invalid] expect failure tc 171: length of null = 2**40 - 1 [invalid] expect failure tc 172: length of null = 2**64 - 1 [invalid] expect failure tc 173: incorrect length of null [invalid] expect failure tc 174: appending 0's to null [invalid] expect failure tc 175: appending null value to null [invalid] expect failure tc 176: truncated length of null [invalid] expect failure tc 177: changing tag value of null [invalid] expect failure tc 178: changing tag value of null [invalid] expect failure tc 179: changing tag value of null [invalid] expect failure tc 180: changing tag value of null [invalid] expect failure tc 181: changing tag value of null [invalid] expect failure tc 182: composed null [invalid] expect failure tc 183: incorrect null [invalid] expect failure tc 184: long form encoding of length of digest [invalid] expect failure tc 185: length of digest contains leading 0 [invalid] expect failure tc 186: wrong length of digest [invalid] expect failure tc 187: wrong length of digest [invalid] expect failure tc 188: uint32 overflow in length of digest [invalid] expect failure tc 189: uint64 overflow in length of digest [invalid] expect failure tc 190: length of digest = 2**31 - 1 [invalid] expect failure tc 191: length of digest = 2**32 - 1 [invalid] expect failure tc 192: length of digest = 2**40 - 1 [invalid] expect failure tc 193: length of digest = 2**64 - 1 [invalid] expect failure tc 194: incorrect length of digest [invalid] expect failure tc 195: lonely octet string tag [invalid] expect failure tc 196: appending 0's to digest [invalid] expect failure tc 197: prepending 0's to digest [invalid] expect failure tc 198: appending null value to digest [invalid] expect failure tc 199: truncated length of digest [invalid] expect failure tc 200: Replacing digest with NULL [invalid] expect failure tc 201: changing tag value of digest [invalid] expect failure tc 202: changing tag value of digest [invalid] expect failure tc 203: changing tag value of digest [invalid] expect failure tc 204: changing tag value of digest [invalid] expect failure tc 205: changing tag value of digest [invalid] expect failure tc 206: dropping value of digest [invalid] expect failure tc 207: using composition for digest [invalid] expect failure tc 208: modify first byte of digest [invalid] expect failure tc 209: modify last byte of digest [invalid] expect failure tc 210: truncated digest [invalid] expect failure tc 211: truncated digest [invalid] expect failure tc 212: wrong hash in padding [invalid] expect failure tc 213: wrong hash in padding [invalid] expect failure tc 214: wrong hash in padding [invalid] expect failure tc 215: wrong hash in signature [invalid] expect failure tc 216: wrong hash in signature [invalid] expect failure tc 217: wrong hash in signature [invalid] expect failure tc 218: wrong hash in signature [invalid] expect failure tc 219: message not hashed [invalid] expect failure tc 220: message not hashed [invalid] expect failure tc 221: using PKCS#1 encryption padding: 0002ff...00 [invalid] expect failure tc 222: using PKCS#1 encryption padding: 0002ff...00 [invalid] expect failure tc 223: using PKCS#1 encryption padding: 0002ff...00 [invalid] expect failure tc 224: using PKCS#1 encryption padding: 0002ff...00 [invalid] expect failure tc 225: invalid PKCS#1 signature padding: 0001ff...ee00 [invalid] expect failure tc 226: PKCS#1 padding too short: 000001ff... [invalid] expect failure tc 227: CVE-2017-11185: signature=n [invalid] expect failure tc 228: the signature is 2 bytes too long [invalid] expect failure tc 229: the signature is empty [invalid] expect failure tc 230: the signature has value 0 [invalid] expect failure tc 231: the signature has value 1 [invalid] expect failure tc 232: the signature has value 2 [invalid] expect failure tc 233: the signature has value n-1 [invalid] expect failure tc 234: the signature has value n+1 [invalid] expect failure tc 235: the signature has value -1 [invalid] expect failure tc 236: RSASSA-PSS signature [invalid] expect failure tc 237: RSASSA-PSS signature [invalid] expect failure tc 238: RSASSA-PSS signature [invalid] expect failure tc 239: [acceptable, SmallModulus] expect success tc 240: [acceptable, SmallModulus] expect success tc 241: [acceptable, SmallModulus] expect success tc 242: [acceptable, SmallModulus] expect success tc 243: [acceptable, SmallModulus] expect success tc 244: [acceptable, SmallModulus] expect success tc 245: [acceptable, SmallModulus] expect success tc 246: [acceptable, SmallModulus] expect success tc 247: [acceptable, SmallModulus] expect success tc 248: [acceptable, SmallModulus] expect success tc 249: [acceptable, SmallModulus] expect success tc 250: [acceptable, SmallModulus] expect success tc 251: [acceptable, SmallModulus] expect success tc 252: [acceptable, SmallModulus] expect success tc 253: [acceptable, SmallModulus] expect success tc 254: [acceptable, SmallModulus] expect success tc 255: [acceptable, SmallModulus] expect success tc 256: [acceptable, SmallModulus] expect success tc 257: [acceptable, SmallModulus] expect success tc 258: [acceptable, SmallModulus] expect success tc 259: [acceptable, SmallModulus] expect success tc 260: [acceptable, SmallModulus] expect success tc 261: [acceptable, SmallModulus] expect success tc 262: [acceptable, SmallModulus] expect success tc 263: [acceptable, SmallModulus] expect success tc 264: [acceptable, SmallModulus] expect success tc 265: [acceptable, SmallModulus] expect success tc 266: [acceptable, SmallModulus] expect success tc 267: [acceptable, SmallModulus] expect success tc 268: [acceptable, SmallModulus] expect success tc 269: [acceptable, SmallModulus] expect success tc 270: [acceptable, SmallModulus] expect success tc 271: [acceptable, SmallModulus] expect success tc 272: [acceptable, SmallModulus] expect success tc 273: [acceptable, SmallModulus] expect success tc 274: [acceptable, SmallModulus] expect success tc 275: [acceptable, SmallModulus] expect success tc 276: [acceptable, SmallModulus] expect success tc 277: [acceptable, SmallModulus] expect success tc 278: [acceptable, SmallModulus] expect success tc 279: [acceptable, SmallModulus] expect success tc 280: [acceptable, SmallModulus] expect success tc 281: [acceptable, SmallModulus] expect success tc 282: [acceptable, SmallModulus] expect success tc 283: [acceptable, SmallModulus] expect success tc 284: [acceptable, SmallModulus] expect success tc 285: [acceptable, SmallModulus] expect success tc 286: [acceptable, SmallModulus] expect success tc 287: [acceptable, SmallModulus] expect success tc 288: [acceptable, SmallModulus] expect success tc 289: [acceptable, SmallModulus] expect success tc 290: [acceptable, SmallModulus] expect success tc 291: [acceptable, SmallModulus] expect success tc 292: [acceptable, SmallModulus] expect success tc 293: [acceptable, SmallModulus] expect success tc 294: [acceptable, SmallModulus] expect success tc 295: [valid] expect success tc 296: [valid] expect success tc 297: [valid] expect success tc 298: [valid] expect success tc 299: [valid] expect success tc 300: [valid] expect success tc 301: [valid] expect success tc 302: [valid] expect success tc 303: [valid] expect success tc 304: [valid] expect success tc 305: [valid] expect success tc 306: [valid] expect success tc 307: [valid] expect success tc 308: [valid] expect success tc 309: [valid] expect success tc 310: [valid] expect success tc 311: [valid] expect success tc 312: [valid] expect success tc 313: [valid] expect success tc 314: [valid] expect success tc 315: [valid] expect success tc 316: [valid] expect success tc 317: [valid] expect success tc 318: [valid] expect success tc 319: [valid] expect success tc 320: [valid] expect success tc 321: [valid] expect success tc 322: [valid] expect success tc 323: [valid] expect success tc 324: [valid] expect success tc 325: [valid] expect success tc 326: [valid] expect success tc 327: [valid] expect success tc 328: [valid] expect success tc 329: [valid] expect success tc 330: [valid] expect success tc 331: [valid] expect success tc 332: [valid] expect success tc 333: [valid] expect success tc 334: [valid] expect success tc 335: [valid] expect success tc 336: [valid] expect success tc 337: [valid] expect success tc 338: [valid] expect success tc 339: [valid] expect success tc 340: [valid] expect success tc 341: [valid] expect success tc 342: [valid] expect success tc 343: [valid] expect success tc 344: [valid] expect success tc 345: [valid] expect success tc 346: [valid] expect success tc 347: [valid] expect success tc 348: [valid] expect success tc 349: [valid] expect success tc 350: [valid] expect success tc 351: [valid] expect success tc 352: [valid] expect success tc 353: [valid] expect success tc 354: [valid] expect success tc 355: [valid] expect success tc 356: [valid] expect success tc 357: [valid] expect success tc 358: [valid] expect success tc 359: [valid] expect success tc 360: [valid] expect success tc 361: [valid] expect success tc 362: [valid] expect success tc 363: [valid] expect success tc 364: [valid] expect success tc 365: [valid] expect success tc 366: [valid] expect success tc 367: [valid] expect success tc 368: [valid] expect success tc 369: [valid] expect success tc 370: [valid] expect success tc 371: [valid] expect success tc 372: short signature [acceptable, SmallModulus, SmallPublicKey] expect success tc 373: short signature [acceptable, SmallPublicKey] expect success tc 374: short signature [acceptable, SmallPublicKey] expect success tc 375: short signature [acceptable, SmallPublicKey] expect success tc 376: short signature [acceptable, SmallPublicKey] expect success tc 377: signature is close to n [acceptable, SmallPublicKey] expect success [ OK ] Pkcs11RsaPkcs1WycheproofTest.Pkcs11RsaPkcs1WycheproofTest (170 ms) [----------] 1 test from Pkcs11RsaPkcs1WycheproofTest (170 ms total) [----------] 16 tests from RsaOaepWycheproofTest [ RUN ] RsaOaepWycheproofTest.RsaOaep2048Sha1 Reading tests from: rsa_oaep_2048_sha1_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure tc 31: em represents a small integer [valid, Constructed] expect success tc 32: em has a large hamming weight [valid, Constructed] expect success tc 33: em has a large hamming weight [valid, Constructed] expect success tc 34: em has a large hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep2048Sha1 (250 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep2048Sha256MgfSha1 Reading tests from: rsa_oaep_2048_sha256_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: ciphertext is empty [invalid] expect failure tc 27: prepended bytes to ciphertext [invalid] expect failure tc 28: appended bytes to ciphertext [invalid] expect failure tc 29: truncated ciphertext [invalid] expect failure [ OK ] RsaOaepWycheproofTest.RsaOaep2048Sha256MgfSha1 (210 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep2048Sha256 Reading tests from: rsa_oaep_2048_sha256_mgf1sha256_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure tc 31: em represents a small integer [valid, Constructed] expect success tc 32: em has low hamming weight [valid, Constructed] expect success tc 33: em has low hamming weight [valid, Constructed] expect success tc 34: em has low hamming weight [valid, Constructed] expect success tc 35: em has a large hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep2048Sha256 (249 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep2048Sha384MgfSha1 Reading tests from: rsa_oaep_2048_sha384_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: ciphertext is empty [invalid] expect failure tc 27: prepended bytes to ciphertext [invalid] expect failure tc 28: appended bytes to ciphertext [invalid] expect failure tc 29: truncated ciphertext [invalid] expect failure [ OK ] RsaOaepWycheproofTest.RsaOaep2048Sha384MgfSha1 (215 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep2048Sha384 Reading tests from: rsa_oaep_2048_sha384_mgf1sha384_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: ciphertext is empty [invalid] expect failure tc 27: prepended bytes to ciphertext [invalid] expect failure tc 28: appended bytes to ciphertext [invalid] expect failure tc 29: truncated ciphertext [invalid] expect failure tc 30: em has low hamming weight [valid, Constructed] expect success tc 31: em has low hamming weight [valid, Constructed] expect success tc 32: em has a large hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep2048Sha384 (240 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep2048Sha512MgfSha1 Reading tests from: rsa_oaep_2048_sha512_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: ciphertext is empty [invalid] expect failure tc 27: prepended bytes to ciphertext [invalid] expect failure tc 28: appended bytes to ciphertext [invalid] expect failure tc 29: truncated ciphertext [invalid] expect failure [ OK ] RsaOaepWycheproofTest.RsaOaep2048Sha512MgfSha1 (217 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep2048Sha512 Reading tests from: rsa_oaep_2048_sha512_mgf1sha512_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure tc 31: em has a large hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep2048Sha512 (220 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep3072Sha256MgfSha1 Reading tests from: rsa_oaep_3072_sha256_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure [ OK ] RsaOaepWycheproofTest.RsaOaep3072Sha256MgfSha1 (604 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep3072Sha256 Reading tests from: rsa_oaep_3072_sha256_mgf1sha256_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure tc 31: em represents a small integer [valid, Constructed] expect success tc 32: em represents a small integer [valid, Constructed] expect success tc 33: em represents a small integer [valid, Constructed] expect success tc 34: em has low hamming weight [valid, Constructed] expect success tc 35: em has low hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep3072Sha256 (729 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep3072Sha512MgfSha1 Reading tests from: rsa_oaep_3072_sha512_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: ciphertext is empty [invalid] expect failure tc 27: prepended bytes to ciphertext [invalid] expect failure tc 28: appended bytes to ciphertext [invalid] expect failure tc 29: truncated ciphertext [invalid] expect failure [ OK ] RsaOaepWycheproofTest.RsaOaep3072Sha512MgfSha1 (612 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep3072Sha512 Reading tests from: rsa_oaep_3072_sha512_mgf1sha512_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: ciphertext is empty [invalid] expect failure tc 27: prepended bytes to ciphertext [invalid] expect failure tc 28: appended bytes to ciphertext [invalid] expect failure tc 29: truncated ciphertext [invalid] expect failure tc 30: em represents a small integer [valid, Constructed] expect success tc 31: em has a large hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep3072Sha512 (670 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep4096Sha256MgfSha1 Reading tests from: rsa_oaep_4096_sha256_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure [ OK ] RsaOaepWycheproofTest.RsaOaep4096Sha256MgfSha1 (1337 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep4096Sha256 Reading tests from: rsa_oaep_4096_sha256_mgf1sha256_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure tc 31: em represents a small integer [valid, Constructed] expect success tc 32: em represents a small integer [valid, Constructed] expect success tc 33: em represents a small integer [valid, Constructed] expect success tc 34: em has low hamming weight [valid, Constructed] expect success tc 35: em has a large hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep4096Sha256 (1572 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep4096Sha512MgfSha1 Reading tests from: rsa_oaep_4096_sha512_mgf1sha1_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: ciphertext is empty [invalid] expect failure tc 27: prepended bytes to ciphertext [invalid] expect failure tc 28: appended bytes to ciphertext [invalid] expect failure tc 29: truncated ciphertext [invalid] expect failure [ OK ] RsaOaepWycheproofTest.RsaOaep4096Sha512MgfSha1 (1325 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaep4096Sha512 Reading tests from: rsa_oaep_4096_sha512_mgf1sha512_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. InvalidOaepPadding: This is a test vector with an invalid OAEP padding. Implementations must ensure that different error conditions cannot be distinguished, since otherwise Manger's attack against OAEP may be possible. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: [valid] expect success tc 11: Longest valid message size [valid] expect success tc 12: first byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 13: last byte of l_hash modified [invalid, InvalidOaepPadding] expect failure tc 14: l_hash changed to all 0 [invalid, InvalidOaepPadding] expect failure tc 15: l_hash changed to all 1 [invalid, InvalidOaepPadding] expect failure tc 16: first byte of ps modified [invalid, InvalidOaepPadding] expect failure tc 17: ps terminated by 0xff [invalid, InvalidOaepPadding] expect failure tc 18: ps is all zero [invalid, InvalidOaepPadding] expect failure tc 19: ps replaced by 0xff's [invalid, InvalidOaepPadding] expect failure tc 20: seed is all 0 [valid] expect success tc 21: seed is all 1 [valid] expect success tc 22: First byte is 1 [invalid, InvalidOaepPadding] expect failure tc 23: m is 0 [invalid, InvalidOaepPadding] expect failure tc 24: m is 1 [invalid, InvalidOaepPadding] expect failure tc 25: m is n-1 [invalid, InvalidOaepPadding] expect failure tc 26: added n to c [invalid] expect failure tc 27: ciphertext is empty [invalid] expect failure tc 28: prepended bytes to ciphertext [invalid] expect failure tc 29: appended bytes to ciphertext [invalid] expect failure tc 30: truncated ciphertext [invalid] expect failure tc 31: em has low hamming weight [valid, Constructed] expect success tc 32: em has a large hamming weight [valid, Constructed] expect success tc 33: em has a large hamming weight [valid, Constructed] expect success tc 34: em has a large hamming weight [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaep4096Sha512 (1535 ms) [ RUN ] RsaOaepWycheproofTest.RsaOaepMisc Reading tests from: rsa_oaep_misc_test.json Test vectors of type RsaOeapDecrypt are intended to check the decryption of RSA encrypted ciphertexts. Constructed: The test vector (i.e. seed and label) has been constructed so that the padded plaintext em has some special properties. SmallModulus: The key for this test vector has a modulus of size < 2048. tc 1: [acceptable, SmallModulus] expect success tc 2: [acceptable, SmallModulus] expect success tc 3: [acceptable, SmallModulus] expect success tc 4: [acceptable, SmallModulus] expect success tc 5: [acceptable, SmallModulus] expect success tc 6: [acceptable, SmallModulus] expect success tc 7: [acceptable, SmallModulus] expect success tc 8: Longest valid message size [acceptable, SmallModulus] expect success tc 9: [acceptable, SmallModulus] expect success tc 10: [acceptable, SmallModulus] expect success tc 11: [acceptable, SmallModulus] expect success tc 12: [acceptable, SmallModulus] expect success tc 13: [acceptable, SmallModulus] expect success tc 14: [acceptable, SmallModulus] expect success tc 15: [acceptable, SmallModulus] expect success tc 16: Longest valid message size [acceptable, SmallModulus] expect success tc 17: [acceptable, SmallModulus] expect success tc 18: [acceptable, SmallModulus] expect success tc 19: [acceptable, SmallModulus] expect success tc 20: [acceptable, SmallModulus] expect success tc 21: [acceptable, SmallModulus] expect success tc 22: [acceptable, SmallModulus] expect success tc 23: [acceptable, SmallModulus] expect success tc 24: Longest valid message size [acceptable, SmallModulus] expect success tc 25: [acceptable, SmallModulus] expect success tc 26: [acceptable, SmallModulus] expect success tc 27: [acceptable, SmallModulus] expect success tc 28: [acceptable, SmallModulus] expect success tc 29: [acceptable, SmallModulus] expect success tc 30: [acceptable, SmallModulus] expect success tc 31: [acceptable, SmallModulus] expect success tc 32: Longest valid message size [acceptable, SmallModulus] expect success tc 33: [acceptable, SmallModulus] expect success tc 34: [acceptable, SmallModulus] expect success tc 35: [acceptable, SmallModulus] expect success tc 36: [acceptable, SmallModulus] expect success tc 37: [acceptable, SmallModulus] expect success tc 38: [acceptable, SmallModulus] expect success tc 39: [acceptable, SmallModulus] expect success tc 40: Longest valid message size [acceptable, SmallModulus] expect success tc 41: [acceptable, SmallModulus] expect success tc 42: [acceptable, SmallModulus] expect success tc 43: [acceptable, SmallModulus] expect success tc 44: [acceptable, SmallModulus] expect success tc 45: [acceptable, SmallModulus] expect success tc 46: [acceptable, SmallModulus] expect success tc 47: [acceptable, SmallModulus] expect success tc 48: Longest valid message size [acceptable, SmallModulus] expect success tc 49: [acceptable, SmallModulus] expect success tc 50: [acceptable, SmallModulus] expect success tc 51: [acceptable, SmallModulus] expect success tc 52: [acceptable, SmallModulus] expect success tc 53: [acceptable, SmallModulus] expect success tc 54: [acceptable, SmallModulus] expect success tc 55: [acceptable, SmallModulus] expect success tc 56: Longest valid message size [acceptable, SmallModulus] expect success tc 57: [acceptable, SmallModulus] expect success tc 58: [acceptable, SmallModulus] expect success tc 59: [acceptable, SmallModulus] expect success tc 60: [acceptable, SmallModulus] expect success tc 61: [acceptable, SmallModulus] expect success tc 62: [acceptable, SmallModulus] expect success tc 63: [acceptable, SmallModulus] expect success tc 64: Longest valid message size [acceptable, SmallModulus] expect success tc 65: [acceptable, SmallModulus] expect success tc 66: [acceptable, SmallModulus] expect success tc 67: [acceptable, SmallModulus] expect success tc 68: [acceptable, SmallModulus] expect success tc 69: [acceptable, SmallModulus] expect success tc 70: [acceptable, SmallModulus] expect success tc 71: [acceptable, SmallModulus] expect success tc 72: Longest valid message size [acceptable, SmallModulus] expect success tc 73: [acceptable, SmallModulus] expect success tc 74: [acceptable, SmallModulus] expect success tc 75: [acceptable, SmallModulus] expect success tc 76: [acceptable, SmallModulus] expect success tc 77: [acceptable, SmallModulus] expect success tc 78: [acceptable, SmallModulus] expect success tc 79: [acceptable, SmallModulus] expect success tc 80: Longest valid message size [acceptable, SmallModulus] expect success tc 81: [acceptable, SmallModulus] expect success tc 82: [acceptable, SmallModulus] expect success tc 83: [acceptable, SmallModulus] expect success tc 84: [acceptable, SmallModulus] expect success tc 85: [acceptable, SmallModulus] expect success tc 86: [acceptable, SmallModulus] expect success tc 87: [acceptable, SmallModulus] expect success tc 88: Longest valid message size [acceptable, SmallModulus] expect success tc 89: [acceptable, SmallModulus] expect success tc 90: [acceptable, SmallModulus] expect success tc 91: [acceptable, SmallModulus] expect success tc 92: [acceptable, SmallModulus] expect success tc 93: [acceptable, SmallModulus] expect success tc 94: [acceptable, SmallModulus] expect success tc 95: [acceptable, SmallModulus] expect success tc 96: Longest valid message size [acceptable, SmallModulus] expect success tc 97: [acceptable, SmallModulus] expect success tc 98: [acceptable, SmallModulus] expect success tc 99: [acceptable, SmallModulus] expect success tc 100: [acceptable, SmallModulus] expect success tc 101: [acceptable, SmallModulus] expect success tc 102: [acceptable, SmallModulus] expect success tc 103: [acceptable, SmallModulus] expect success tc 104: Longest valid message size [acceptable, SmallModulus] expect success tc 105: [acceptable, SmallModulus] expect success tc 106: [acceptable, SmallModulus] expect success tc 107: [acceptable, SmallModulus] expect success tc 108: [acceptable, SmallModulus] expect success tc 109: [acceptable, SmallModulus] expect success tc 110: [acceptable, SmallModulus] expect success tc 111: [acceptable, SmallModulus] expect success tc 112: Longest valid message size [acceptable, SmallModulus] expect success tc 113: [acceptable, SmallModulus] expect success tc 114: [acceptable, SmallModulus] expect success tc 115: [acceptable, SmallModulus] expect success tc 116: [acceptable, SmallModulus] expect success tc 117: [acceptable, SmallModulus] expect success tc 118: [acceptable, SmallModulus] expect success tc 119: [acceptable, SmallModulus] expect success tc 120: Longest valid message size [acceptable, SmallModulus] expect success tc 121: [acceptable, SmallModulus] expect success tc 122: [acceptable, SmallModulus] expect success tc 123: [acceptable, SmallModulus] expect success tc 124: [acceptable, SmallModulus] expect success tc 125: [acceptable, SmallModulus] expect success tc 126: [acceptable, SmallModulus] expect success tc 127: Longest valid message size [acceptable, SmallModulus] expect success tc 128: [acceptable, SmallModulus] expect success tc 129: [acceptable, SmallModulus] expect success tc 130: [acceptable, SmallModulus] expect success tc 131: [acceptable, SmallModulus] expect success tc 132: [acceptable, SmallModulus] expect success tc 133: [acceptable, SmallModulus] expect success tc 134: Longest valid message size [acceptable, SmallModulus] expect success tc 135: [acceptable, SmallModulus] expect success tc 136: [acceptable, SmallModulus] expect success tc 137: [acceptable, SmallModulus] expect success tc 138: [acceptable, SmallModulus] expect success tc 139: [acceptable, SmallModulus] expect success tc 140: [acceptable, SmallModulus] expect success tc 141: Longest valid message size [acceptable, SmallModulus] expect success tc 142: [acceptable, SmallModulus] expect success tc 143: [acceptable, SmallModulus] expect success tc 144: [acceptable, SmallModulus] expect success tc 145: [acceptable, SmallModulus] expect success tc 146: [acceptable, SmallModulus] expect success tc 147: [acceptable, SmallModulus] expect success tc 148: Longest valid message size [acceptable, SmallModulus] expect success tc 149: [acceptable, SmallModulus] expect success tc 150: [acceptable, SmallModulus] expect success tc 151: [acceptable, SmallModulus] expect success tc 152: [acceptable, SmallModulus] expect success tc 153: [acceptable, SmallModulus] expect success tc 154: [acceptable, SmallModulus] expect success tc 155: Longest valid message size [acceptable, SmallModulus] expect success tc 156: [acceptable, SmallModulus] expect success tc 157: [acceptable, SmallModulus] expect success tc 158: [acceptable, SmallModulus] expect success tc 159: [acceptable, SmallModulus] expect success tc 160: [acceptable, SmallModulus] expect success tc 161: [acceptable, SmallModulus] expect success tc 162: [acceptable, SmallModulus] expect success tc 163: Longest valid message size [acceptable, SmallModulus] expect success tc 164: [acceptable, SmallModulus] expect success tc 165: [acceptable, SmallModulus] expect success tc 166: [acceptable, SmallModulus] expect success tc 167: [acceptable, SmallModulus] expect success tc 168: [acceptable, SmallModulus] expect success tc 169: [acceptable, SmallModulus] expect success tc 170: [acceptable, SmallModulus] expect success tc 171: Longest valid message size [acceptable, SmallModulus] expect success tc 172: [acceptable, SmallModulus] expect success tc 173: [acceptable, SmallModulus] expect success tc 174: [acceptable, SmallModulus] expect success tc 175: [acceptable, SmallModulus] expect success tc 176: [acceptable, SmallModulus] expect success tc 177: [acceptable, SmallModulus] expect success tc 178: [acceptable, SmallModulus] expect success tc 179: Longest valid message size [acceptable, SmallModulus] expect success tc 180: [acceptable, SmallModulus] expect success tc 181: [acceptable, SmallModulus] expect success tc 182: [acceptable, SmallModulus] expect success tc 183: [acceptable, SmallModulus] expect success tc 184: [acceptable, SmallModulus] expect success tc 185: [acceptable, SmallModulus] expect success tc 186: [acceptable, SmallModulus] expect success tc 187: Longest valid message size [acceptable, SmallModulus] expect success tc 188: [acceptable, SmallModulus] expect success tc 189: [acceptable, SmallModulus] expect success tc 190: [acceptable, SmallModulus] expect success tc 191: [acceptable, SmallModulus] expect success tc 192: [acceptable, SmallModulus] expect success tc 193: [acceptable, SmallModulus] expect success tc 194: [acceptable, SmallModulus] expect success tc 195: Longest valid message size [acceptable, SmallModulus] expect success tc 196: [acceptable, SmallModulus] expect success tc 197: [acceptable, SmallModulus] expect success tc 198: [acceptable, SmallModulus] expect success tc 199: [acceptable, SmallModulus] expect success tc 200: [acceptable, SmallModulus] expect success tc 201: [acceptable, SmallModulus] expect success tc 202: [acceptable, SmallModulus] expect success tc 203: Longest valid message size [acceptable, SmallModulus] expect success tc 204: [acceptable, SmallModulus] expect success tc 205: [acceptable, SmallModulus] expect success tc 206: [acceptable, SmallModulus] expect success tc 207: [acceptable, SmallModulus] expect success tc 208: [acceptable, SmallModulus] expect success tc 209: [acceptable, SmallModulus] expect success tc 210: [acceptable, SmallModulus] expect success tc 211: Longest valid message size [acceptable, SmallModulus] expect success tc 212: [acceptable, SmallModulus] expect success tc 213: [acceptable, SmallModulus] expect success tc 214: [acceptable, SmallModulus] expect success tc 215: [acceptable, SmallModulus] expect success tc 216: [acceptable, SmallModulus] expect success tc 217: [acceptable, SmallModulus] expect success tc 218: [acceptable, SmallModulus] expect success tc 219: Longest valid message size [acceptable, SmallModulus] expect success tc 220: [acceptable, SmallModulus] expect success tc 221: [acceptable, SmallModulus] expect success tc 222: [acceptable, SmallModulus] expect success tc 223: [acceptable, SmallModulus] expect success tc 224: [acceptable, SmallModulus] expect success tc 225: [acceptable, SmallModulus] expect success tc 226: [acceptable, SmallModulus] expect success tc 227: Longest valid message size [acceptable, SmallModulus] expect success tc 228: [acceptable, SmallModulus] expect success tc 229: [acceptable, SmallModulus] expect success tc 230: [acceptable, SmallModulus] expect success tc 231: [acceptable, SmallModulus] expect success tc 232: [acceptable, SmallModulus] expect success tc 233: [acceptable, SmallModulus] expect success tc 234: [acceptable, SmallModulus] expect success tc 235: Longest valid message size [acceptable, SmallModulus] expect success tc 236: [acceptable, SmallModulus] expect success tc 237: [acceptable, SmallModulus] expect success tc 238: [acceptable, SmallModulus] expect success tc 239: [acceptable, SmallModulus] expect success tc 240: [acceptable, SmallModulus] expect success tc 241: [acceptable, SmallModulus] expect success tc 242: [acceptable, SmallModulus] expect success tc 243: Longest valid message size [acceptable, SmallModulus] expect success tc 244: [acceptable, SmallModulus] expect success tc 245: [acceptable, SmallModulus] expect success tc 246: [acceptable, SmallModulus] expect success tc 247: [acceptable, SmallModulus] expect success tc 248: [acceptable, SmallModulus] expect success tc 249: [acceptable, SmallModulus] expect success tc 250: [acceptable, SmallModulus] expect success tc 251: Longest valid message size [acceptable, SmallModulus] expect success tc 252: [acceptable, SmallModulus] expect success tc 253: [acceptable, SmallModulus] expect success tc 254: [acceptable, SmallModulus] expect success tc 255: [acceptable, SmallModulus] expect success tc 256: [acceptable, SmallModulus] expect success tc 257: [acceptable, SmallModulus] expect success tc 258: [acceptable, SmallModulus] expect success tc 259: Longest valid message size [acceptable, SmallModulus] expect success tc 260: [acceptable, SmallModulus] expect success tc 261: [acceptable, SmallModulus] expect success tc 262: [acceptable, SmallModulus] expect success tc 263: [acceptable, SmallModulus] expect success tc 264: [acceptable, SmallModulus] expect success tc 265: [acceptable, SmallModulus] expect success tc 266: [acceptable, SmallModulus] expect success tc 267: Longest valid message size [acceptable, SmallModulus] expect success tc 268: [acceptable, SmallModulus] expect success tc 269: [acceptable, SmallModulus] expect success tc 270: [acceptable, SmallModulus] expect success tc 271: [acceptable, SmallModulus] expect success tc 272: [acceptable, SmallModulus] expect success tc 273: [acceptable, SmallModulus] expect success tc 274: [acceptable, SmallModulus] expect success tc 275: Longest valid message size [acceptable, SmallModulus] expect success tc 276: [acceptable, SmallModulus] expect success tc 277: [acceptable, SmallModulus] expect success tc 278: [acceptable, SmallModulus] expect success tc 279: [acceptable, SmallModulus] expect success tc 280: [acceptable, SmallModulus] expect success tc 281: [acceptable, SmallModulus] expect success tc 282: [acceptable, SmallModulus] expect success tc 283: Longest valid message size [acceptable, SmallModulus] expect success tc 284: [acceptable, SmallModulus] expect success tc 285: [acceptable, SmallModulus] expect success tc 286: [acceptable, SmallModulus] expect success tc 287: [acceptable, SmallModulus] expect success tc 288: [acceptable, SmallModulus] expect success tc 289: [acceptable, SmallModulus] expect success tc 290: [acceptable, SmallModulus] expect success tc 291: Longest valid message size [acceptable, SmallModulus] expect success tc 292: [acceptable, SmallModulus] expect success tc 293: [acceptable, SmallModulus] expect success tc 294: [acceptable, SmallModulus] expect success tc 295: [acceptable, SmallModulus] expect success tc 296: [acceptable, SmallModulus] expect success tc 297: [acceptable, SmallModulus] expect success tc 298: [acceptable, SmallModulus] expect success tc 299: Longest valid message size [acceptable, SmallModulus] expect success tc 300: [acceptable, SmallModulus] expect success tc 301: [acceptable, SmallModulus] expect success tc 302: [acceptable, SmallModulus] expect success tc 303: [acceptable, SmallModulus] expect success tc 304: [acceptable, SmallModulus] expect success tc 305: [acceptable, SmallModulus] expect success tc 306: [acceptable, SmallModulus] expect success tc 307: Longest valid message size [acceptable, SmallModulus] expect success tc 308: [acceptable, SmallModulus] expect success tc 309: [acceptable, SmallModulus] expect success tc 310: [acceptable, SmallModulus] expect success tc 311: [acceptable, SmallModulus] expect success tc 312: [acceptable, SmallModulus] expect success tc 313: [acceptable, SmallModulus] expect success tc 314: [acceptable, SmallModulus] expect success tc 315: Longest valid message size [acceptable, SmallModulus] expect success tc 316: [valid] expect success tc 317: [valid] expect success tc 318: [valid] expect success tc 319: [valid] expect success tc 320: [valid] expect success tc 321: [valid] expect success tc 322: [valid] expect success tc 323: Longest valid message size [valid] expect success tc 324: [valid] expect success tc 325: [valid] expect success tc 326: [valid] expect success tc 327: [valid] expect success tc 328: [valid] expect success tc 329: [valid] expect success tc 330: [valid] expect success tc 331: Longest valid message size [valid] expect success tc 332: [valid] expect success tc 333: [valid] expect success tc 334: [valid] expect success tc 335: [valid] expect success tc 336: [valid] expect success tc 337: [valid] expect success tc 338: [valid] expect success tc 339: Longest valid message size [valid] expect success tc 340: [valid] expect success tc 341: [valid] expect success tc 342: [valid] expect success tc 343: [valid] expect success tc 344: [valid] expect success tc 345: [valid] expect success tc 346: [valid] expect success tc 347: Longest valid message size [valid] expect success tc 348: [valid] expect success tc 349: [valid] expect success tc 350: [valid] expect success tc 351: [valid] expect success tc 352: [valid] expect success tc 353: [valid] expect success tc 354: [valid] expect success tc 355: Longest valid message size [valid] expect success tc 356: [valid] expect success tc 357: [valid] expect success tc 358: [valid] expect success tc 359: [valid] expect success tc 360: [valid] expect success tc 361: [valid] expect success tc 362: [valid] expect success tc 363: Longest valid message size [valid] expect success tc 364: [valid] expect success tc 365: [valid] expect success tc 366: [valid] expect success tc 367: [valid] expect success tc 368: [valid] expect success tc 369: [valid] expect success tc 370: [valid] expect success tc 371: Longest valid message size [valid] expect success tc 372: [valid] expect success tc 373: [valid] expect success tc 374: [valid] expect success tc 375: [valid] expect success tc 376: [valid] expect success tc 377: [valid] expect success tc 378: [valid] expect success tc 379: Longest valid message size [valid] expect success tc 380: [valid] expect success tc 381: [valid] expect success tc 382: [valid] expect success tc 383: [valid] expect success tc 384: [valid] expect success tc 385: [valid] expect success tc 386: [valid] expect success tc 387: Longest valid message size [valid] expect success tc 388: [valid] expect success tc 389: [valid] expect success tc 390: [valid] expect success tc 391: [valid] expect success tc 392: [valid] expect success tc 393: [valid] expect success tc 394: [valid] expect success tc 395: Longest valid message size [valid] expect success tc 396: [valid] expect success tc 397: [valid] expect success tc 398: [valid] expect success tc 399: [valid] expect success tc 400: [valid] expect success tc 401: [valid] expect success tc 402: [valid] expect success tc 403: Longest valid message size [valid] expect success tc 404: [valid] expect success tc 405: [valid] expect success tc 406: [valid] expect success tc 407: [valid] expect success tc 408: [valid] expect success tc 409: [valid] expect success tc 410: [valid] expect success tc 411: Longest valid message size [valid] expect success tc 412: [valid] expect success tc 413: [valid] expect success tc 414: [valid] expect success tc 415: [valid] expect success tc 416: [valid] expect success tc 417: [valid] expect success tc 418: [valid] expect success tc 419: Longest valid message size [valid] expect success tc 420: [valid] expect success tc 421: [valid] expect success tc 422: [valid] expect success tc 423: [valid] expect success tc 424: [valid] expect success tc 425: [valid] expect success tc 426: [valid] expect success tc 427: Longest valid message size [valid] expect success tc 428: [valid] expect success tc 429: [valid] expect success tc 430: [valid] expect success tc 431: [valid] expect success tc 432: [valid] expect success tc 433: [valid] expect success tc 434: [valid] expect success tc 435: Longest valid message size [valid] expect success tc 436: [valid] expect success tc 437: [valid] expect success tc 438: [valid] expect success tc 439: [valid] expect success tc 440: [valid] expect success tc 441: [valid] expect success tc 442: [valid] expect success tc 443: Longest valid message size [valid] expect success tc 444: [valid] expect success tc 445: [valid] expect success tc 446: [valid] expect success tc 447: [valid] expect success tc 448: [valid] expect success tc 449: [valid] expect success tc 450: [valid] expect success tc 451: Longest valid message size [valid] expect success tc 452: [valid] expect success tc 453: [valid] expect success tc 454: [valid] expect success tc 455: [valid] expect success tc 456: [valid] expect success tc 457: [valid] expect success tc 458: [valid] expect success tc 459: Longest valid message size [valid] expect success tc 460: [valid] expect success tc 461: [valid] expect success tc 462: [valid] expect success tc 463: [valid] expect success tc 464: [valid] expect success tc 465: [valid] expect success tc 466: [valid] expect success tc 467: Longest valid message size [valid] expect success tc 468: [valid] expect success tc 469: [valid] expect success tc 470: [valid] expect success tc 471: [valid] expect success tc 472: [valid] expect success tc 473: [valid] expect success tc 474: [valid] expect success tc 475: Longest valid message size [valid] expect success tc 476: [valid] expect success tc 477: [valid] expect success tc 478: [valid] expect success tc 479: [valid] expect success tc 480: [valid] expect success tc 481: [valid] expect success tc 482: [valid] expect success tc 483: Longest valid message size [valid] expect success tc 484: [valid] expect success tc 485: [valid] expect success tc 486: [valid] expect success tc 487: [valid] expect success tc 488: [valid] expect success tc 489: [valid] expect success tc 490: [valid] expect success tc 491: Longest valid message size [valid] expect success tc 492: [valid] expect success tc 493: [valid] expect success tc 494: [valid] expect success tc 495: [valid] expect success tc 496: [valid] expect success tc 497: [valid] expect success tc 498: [valid] expect success tc 499: Longest valid message size [valid] expect success tc 500: [valid] expect success tc 501: [valid] expect success tc 502: [valid] expect success tc 503: [valid] expect success tc 504: [valid] expect success tc 505: [valid] expect success tc 506: [valid] expect success tc 507: Longest valid message size [valid] expect success tc 508: [valid] expect success tc 509: [valid] expect success tc 510: [valid] expect success tc 511: [valid] expect success tc 512: [valid] expect success tc 513: [valid] expect success tc 514: [valid] expect success tc 515: Longest valid message size [valid] expect success tc 516: [valid] expect success tc 517: [valid] expect success tc 518: [valid] expect success tc 519: [valid] expect success tc 520: [valid] expect success tc 521: [valid] expect success tc 522: [valid] expect success tc 523: Longest valid message size [valid] expect success tc 524: [valid] expect success tc 525: [valid] expect success tc 526: [valid] expect success tc 527: [valid] expect success tc 528: [valid] expect success tc 529: [valid] expect success tc 530: [valid] expect success tc 531: Longest valid message size [valid] expect success tc 532: [valid] expect success tc 533: [valid] expect success tc 534: [valid] expect success tc 535: [valid] expect success tc 536: [valid] expect success tc 537: [valid] expect success tc 538: [valid] expect success tc 539: Longest valid message size [valid] expect success tc 540: [valid] expect success tc 541: [valid] expect success tc 542: [valid] expect success tc 543: [valid] expect success tc 544: [valid] expect success tc 545: [valid] expect success tc 546: [valid] expect success tc 547: Longest valid message size [valid] expect success tc 548: [valid] expect success tc 549: [valid] expect success tc 550: [valid] expect success tc 551: [valid] expect success tc 552: [valid] expect success tc 553: [valid] expect success tc 554: [valid] expect success tc 555: Longest valid message size [valid] expect success tc 556: [valid] expect success tc 557: [valid] expect success tc 558: [valid] expect success tc 559: [valid] expect success tc 560: [valid] expect success tc 561: [valid] expect success tc 562: [valid] expect success tc 563: Longest valid message size [valid] expect success tc 564: [valid] expect success tc 565: [valid] expect success tc 566: [valid] expect success tc 567: [valid] expect success tc 568: [valid] expect success tc 569: [valid] expect success tc 570: [valid] expect success tc 571: Longest valid message size [valid] expect success tc 572: [valid] expect success tc 573: [valid] expect success tc 574: [valid] expect success tc 575: [valid] expect success tc 576: [valid] expect success tc 577: [valid] expect success tc 578: [valid] expect success tc 579: Longest valid message size [valid] expect success tc 580: [valid] expect success tc 581: [valid] expect success tc 582: [valid] expect success tc 583: [valid] expect success tc 584: [valid] expect success tc 585: [valid] expect success tc 586: [valid] expect success tc 587: Longest valid message size [valid] expect success tc 588: [valid] expect success tc 589: [valid] expect success tc 590: [valid] expect success tc 591: [valid] expect success tc 592: [valid] expect success tc 593: [valid] expect success tc 594: [valid] expect success tc 595: Longest valid message size [valid] expect success tc 596: [valid] expect success tc 597: [valid] expect success tc 598: [valid] expect success tc 599: [valid] expect success tc 600: [valid] expect success tc 601: [valid] expect success tc 602: [valid] expect success tc 603: Longest valid message size [valid] expect success tc 604: [valid] expect success tc 605: [valid] expect success tc 606: [valid] expect success tc 607: [valid] expect success tc 608: [valid] expect success tc 609: [valid] expect success tc 610: [valid] expect success tc 611: Longest valid message size [valid] expect success tc 612: [valid] expect success tc 613: [valid] expect success tc 614: [valid] expect success tc 615: [valid] expect success tc 616: [valid] expect success tc 617: [valid] expect success tc 618: [valid] expect success tc 619: Longest valid message size [valid] expect success tc 620: [valid] expect success tc 621: [valid] expect success tc 622: [valid] expect success tc 623: [valid] expect success tc 624: [valid] expect success tc 625: [valid] expect success tc 626: [valid] expect success tc 627: Longest valid message size [valid] expect success tc 628: [valid] expect success tc 629: [valid] expect success tc 630: [valid] expect success tc 631: [valid] expect success tc 632: [valid] expect success tc 633: [valid] expect success tc 634: [valid] expect success tc 635: Longest valid message size [valid] expect success tc 636: [valid] expect success tc 637: [valid] expect success tc 638: [valid] expect success tc 639: [valid] expect success tc 640: [valid] expect success tc 641: [valid] expect success tc 642: [valid] expect success tc 643: Longest valid message size [valid] expect success tc 644: [valid] expect success tc 645: [valid] expect success tc 646: [valid] expect success tc 647: [valid] expect success tc 648: [valid] expect success tc 649: [valid] expect success tc 650: [valid] expect success tc 651: Longest valid message size [valid] expect success tc 652: [valid] expect success tc 653: [valid] expect success tc 654: [valid] expect success tc 655: [valid] expect success tc 656: [valid] expect success tc 657: [valid] expect success tc 658: [valid] expect success tc 659: Longest valid message size [valid] expect success tc 660: [valid] expect success tc 661: [valid] expect success tc 662: [valid] expect success tc 663: [valid] expect success tc 664: [valid] expect success tc 665: [valid] expect success tc 666: [valid] expect success tc 667: Longest valid message size [valid] expect success tc 668: [valid] expect success tc 669: [valid] expect success tc 670: [valid] expect success tc 671: [valid] expect success tc 672: [valid] expect success tc 673: [valid] expect success tc 674: [valid] expect success tc 675: Longest valid message size [valid] expect success tc 676: [valid] expect success tc 677: [valid] expect success tc 678: [valid] expect success tc 679: [valid] expect success tc 680: [valid] expect success tc 681: [valid] expect success tc 682: [valid] expect success tc 683: Longest valid message size [valid] expect success tc 684: [valid] expect success tc 685: [valid] expect success tc 686: [valid] expect success tc 687: [valid] expect success tc 688: [valid] expect success tc 689: [valid] expect success tc 690: [valid] expect success tc 691: Longest valid message size [valid] expect success tc 692: [valid] expect success tc 693: [valid] expect success tc 694: [valid] expect success tc 695: [valid] expect success tc 696: [valid] expect success tc 697: [valid] expect success tc 698: [valid] expect success tc 699: Longest valid message size [valid] expect success tc 700: [valid] expect success tc 701: [valid] expect success tc 702: [valid] expect success tc 703: [valid] expect success tc 704: [valid] expect success tc 705: [valid] expect success tc 706: [valid] expect success tc 707: Longest valid message size [valid] expect success tc 708: [valid] expect success tc 709: [valid] expect success tc 710: [valid] expect success tc 711: [valid] expect success tc 712: [valid] expect success tc 713: [valid] expect success tc 714: [valid] expect success tc 715: Longest valid message size [valid] expect success tc 716: [valid] expect success tc 717: [valid] expect success tc 718: [valid] expect success tc 719: [valid] expect success tc 720: [valid] expect success tc 721: [valid] expect success tc 722: [valid] expect success tc 723: Longest valid message size [valid] expect success tc 724: [valid] expect success tc 725: [valid] expect success tc 726: [valid] expect success tc 727: [valid] expect success tc 728: [valid] expect success tc 729: [valid] expect success tc 730: [valid] expect success tc 731: Longest valid message size [valid] expect success tc 732: [valid] expect success tc 733: [valid] expect success tc 734: [valid] expect success tc 735: [valid] expect success tc 736: [valid] expect success tc 737: [valid] expect success tc 738: [valid] expect success tc 739: Longest valid message size [valid] expect success tc 740: [valid] expect success tc 741: [valid] expect success tc 742: [valid] expect success tc 743: [valid] expect success tc 744: [valid] expect success tc 745: [valid] expect success tc 746: [valid] expect success tc 747: Longest valid message size [valid] expect success tc 748: [valid] expect success tc 749: [valid] expect success tc 750: [valid] expect success tc 751: [valid] expect success tc 752: [valid] expect success tc 753: [valid] expect success tc 754: [valid] expect success tc 755: Longest valid message size [valid] expect success tc 756: em represents a small integer [valid, Constructed] expect success tc 757: em represents a small integer [valid, Constructed] expect success tc 758: em represents a small integer [valid, Constructed] expect success tc 759: em represents a small integer [valid, Constructed] expect success tc 760: em represents a small integer [valid, Constructed] expect success tc 761: em has a large hamming weight [valid, Constructed] expect success tc 762: em has a large hamming weight [valid, Constructed] expect success tc 763: em has a large hamming weight [valid, Constructed] expect success tc 764: em has a large hamming weight [valid, Constructed] expect success tc 765: em represents a small integer [valid, Constructed] expect success tc 766: em represents a small integer [valid, Constructed] expect success tc 767: em has low hamming weight [valid, Constructed] expect success tc 768: em has low hamming weight [valid, Constructed] expect success tc 769: em has low hamming weight [valid, Constructed] expect success tc 770: em has low hamming weight [valid, Constructed] expect success tc 771: em has low hamming weight [valid, Constructed] expect success tc 772: em represents a small integer [valid, Constructed] expect success tc 773: em represents a small integer [valid, Constructed] expect success tc 774: em represents a small integer [valid, Constructed] expect success tc 775: em represents a small integer [valid, Constructed] expect success [ OK ] RsaOaepWycheproofTest.RsaOaepMisc (12657 ms) [----------] 16 tests from RsaOaepWycheproofTest (22650 ms total) [----------] 1 test from Pkcs11RsaOaepTest [ RUN ] Pkcs11RsaOaepTest.TestOaepWrapUnwrap [ OK ] Pkcs11RsaOaepTest.TestOaepWrapUnwrap (191 ms) [----------] 1 test from Pkcs11RsaOaepTest (191 ms total) [----------] 6 tests from RsaDecryptWycheproofTest [ RUN ] RsaDecryptWycheproofTest.Rsa2048 Reading tests from: rsa_pkcs1_2048_test.json Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidPkcs1Padding: This is a test vector with an invalid PKCS #1 padding. Implementations must ensure that different error conditions cannot be distinguished, since the information about the error condition can be used for a padding oracle attack. (RFC 8017 Section 7.2.2) tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: Longest valid message size [valid] expect success tc 9: ps is all 0 [invalid, InvalidPkcs1Padding] expect failure tc 10: ps is all 1 [valid] expect success tc 11: rsa_sslv23_padding [valid] expect success tc 12: byte 0 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 13: byte 1 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 14: byte 7 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 15: ps truncated [invalid, InvalidPkcs1Padding] expect failure tc 16: ps missing [invalid, InvalidPkcs1Padding] expect failure tc 17: Block type = 0 [invalid, InvalidPkcs1Padding] expect failure tc 18: Block type = 1 [invalid, InvalidPkcs1Padding] expect failure tc 19: Block type = 0xff [invalid, InvalidPkcs1Padding] expect failure tc 20: First byte is not zero [invalid, InvalidPkcs1Padding] expect failure tc 21: First byte is not zero [invalid, InvalidPkcs1Padding] expect failure tc 22: signature padding [invalid, InvalidPkcs1Padding] expect failure tc 23: no zero after padding [invalid, InvalidPkcs1Padding] expect failure tc 24: no padding [invalid, InvalidPkcs1Padding] expect failure tc 25: m = 2 [invalid, InvalidPkcs1Padding] expect failure tc 26: m = n-2 [invalid, InvalidPkcs1Padding] expect failure tc 27: c = 0 [invalid, InvalidPkcs1Padding] expect failure tc 28: c = 1 [invalid, InvalidPkcs1Padding] expect failure tc 29: c = n-1 [invalid, InvalidPkcs1Padding] expect failure tc 30: ciphertext is empty [invalid] expect failure tc 31: prepended bytes to ciphertext [invalid] expect failure tc 32: appended bytes to ciphertext [invalid] expect failure tc 33: truncated ciphertext [invalid] expect failure Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 tc 34: edge case for ciphertext [valid] expect success Running test 34 tc 35: edge case for ciphertext [valid] expect success Running test 35 tc 36: ciphertext has low hamming weight [valid] expect success Running test 36 tc 37: ciphertext has high hamming weight [valid] expect success Running test 37 tc 38: ciphertext has high hamming weight [valid] expect success Running test 38 tc 39: ciphertext mod p,q has high hamming weight [valid] expect success Running test 39 tc 40: ciphertext mod p,q has low hamming weight [valid] expect success Running test 40 tc 41: special case ciphertext [valid] expect success Running test 41 tc 42: ciphertext is a simple fraction [valid] expect success Running test 42 tc 43: ciphertext is a simple fraction [valid] expect success Running test 43 tc 44: edge case for Montgomery reduction (32 bit) [valid] expect success Running test 44 tc 45: edge case for Montgomery reduction (32 bit) [valid] expect success Running test 45 tc 46: edge case for Montgomery reduction (64 bit) [valid] expect success Running test 46 tc 47: edge case for Montgomery reduction (64 bit) [valid] expect success Running test 47 tc 48: edge case for Montgomery reduction (1024 bit) [valid] expect success Running test 48 tc 49: edge case for Montgomery reduction (1024 bit) [valid] expect success Running test 49 tc 50: edge case for Montgomery reduction over Z/nZ (32 bit) [valid] expect success Running test 50 tc 51: edge case for Montgomery reduction over Z/nZ (32 bit) [valid] expect success Running test 51 tc 52: edge case for Montgomery reduction over Z/nZ (64 bit) [valid] expect success Running test 52 tc 53: edge case for Montgomery reduction over Z/nZ (64 bit) [valid] expect success Running test 53 tc 54: edge case for Montgomery reduction over Z/nZ (2048 bit) [valid] expect success Running test 54 tc 55: edge case for Montgomery reduction over Z/nZ (2048 bit) [valid] expect success Running test 55 tc 56: edge case for montgomery reduction with special primes [valid] expect success Running test 56 tc 57: edge case for montgomery reduction with special primes [valid] expect success Running test 57 tc 58: edge case for montgomery reduction with special primes [valid] expect success Running test 58 tc 59: edge case for montgomery reduction with special primes [valid] expect success Running test 59 tc 60: edge case for montgomery reduction with special primes [valid] expect success Running test 60 tc 61: edge case for montgomery reduction with special primes [valid] expect success Running test 61 tc 62: edge case for montgomery reduction with special primes [valid] expect success Running test 62 tc 63: edge case for montgomery reduction with special primes [valid] expect success Running test 63 tc 64: edge case for montgomery reduction with special primes [valid] expect success Running test 64 tc 65: edge case for montgomery reduction with special primes [valid] expect success Running test 65 [ OK ] RsaDecryptWycheproofTest.Rsa2048 (695 ms) [ RUN ] RsaDecryptWycheproofTest.Rsa3072 Reading tests from: rsa_pkcs1_3072_test.json Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidPkcs1Padding: This is a test vector with an invalid PKCS #1 padding. Implementations must ensure that different error conditions cannot be distinguished, since the information about the error condition can be used for a padding oracle attack. (RFC 8017 Section 7.2.2) tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: Longest valid message size [valid] expect success tc 9: ps is all 0 [invalid, InvalidPkcs1Padding] expect failure tc 10: ps is all 1 [valid] expect success tc 11: rsa_sslv23_padding [valid] expect success tc 12: byte 0 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 13: byte 1 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 14: byte 7 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 15: ps truncated [invalid, InvalidPkcs1Padding] expect failure tc 16: ps missing [invalid, InvalidPkcs1Padding] expect failure tc 17: Block type = 0 [invalid, InvalidPkcs1Padding] expect failure tc 18: Block type = 1 [invalid, InvalidPkcs1Padding] expect failure tc 19: Block type = 0xff [invalid, InvalidPkcs1Padding] expect failure tc 20: First byte is not zero [invalid, InvalidPkcs1Padding] expect failure tc 21: First byte is not zero [invalid, InvalidPkcs1Padding] expect failure tc 22: signature padding [invalid, InvalidPkcs1Padding] expect failure tc 23: no zero after padding [invalid, InvalidPkcs1Padding] expect failure tc 24: no padding [invalid, InvalidPkcs1Padding] expect failure tc 25: m = 2 [invalid, InvalidPkcs1Padding] expect failure tc 26: m = n-2 [invalid, InvalidPkcs1Padding] expect failure tc 27: c = 0 [invalid, InvalidPkcs1Padding] expect failure tc 28: c = 1 [invalid, InvalidPkcs1Padding] expect failure tc 29: c = n-1 [invalid, InvalidPkcs1Padding] expect failure tc 30: ciphertext is empty [invalid] expect failure tc 31: prepended bytes to ciphertext [invalid] expect failure tc 32: appended bytes to ciphertext [invalid] expect failure tc 33: truncated ciphertext [invalid] expect failure Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 tc 34: edge case for ciphertext [valid] expect success Running test 34 tc 35: edge case for ciphertext [valid] expect success Running test 35 tc 36: ciphertext has low hamming weight [valid] expect success Running test 36 tc 37: ciphertext has high hamming weight [valid] expect success Running test 37 tc 38: ciphertext has high hamming weight [valid] expect success Running test 38 tc 39: ciphertext mod p,q has high hamming weight [valid] expect success Running test 39 tc 40: ciphertext mod p,q has low hamming weight [valid] expect success Running test 40 tc 41: special case ciphertext [valid] expect success Running test 41 tc 42: ciphertext is a simple fraction [valid] expect success Running test 42 tc 43: ciphertext is a simple fraction [valid] expect success Running test 43 tc 44: edge case for Montgomery reduction (32 bit) [valid] expect success Running test 44 tc 45: edge case for Montgomery reduction (32 bit) [valid] expect success Running test 45 tc 46: edge case for Montgomery reduction (64 bit) [valid] expect success Running test 46 tc 47: edge case for Montgomery reduction (64 bit) [valid] expect success Running test 47 tc 48: edge case for Montgomery reduction (1536 bit) [valid] expect success Running test 48 tc 49: edge case for Montgomery reduction (1536 bit) [valid] expect success Running test 49 tc 50: edge case for Montgomery reduction over Z/nZ (32 bit) [valid] expect success Running test 50 tc 51: edge case for Montgomery reduction over Z/nZ (32 bit) [valid] expect success Running test 51 tc 52: edge case for Montgomery reduction over Z/nZ (64 bit) [valid] expect success Running test 52 tc 53: edge case for Montgomery reduction over Z/nZ (64 bit) [valid] expect success Running test 53 tc 54: edge case for Montgomery reduction over Z/nZ (3072 bit) [valid] expect success Running test 54 tc 55: edge case for Montgomery reduction over Z/nZ (3072 bit) [valid] expect success Running test 55 tc 56: edge case for montgomery reduction with special primes [invalid, InvalidPkcs1Padding] expect failure Running test 56 tc 57: edge case for montgomery reduction with special primes [valid] expect success Running test 57 tc 58: edge case for montgomery reduction with special primes [valid] expect success Running test 58 tc 59: edge case for montgomery reduction with special primes [valid] expect success Running test 59 tc 60: edge case for montgomery reduction with special primes [valid] expect success Running test 60 tc 61: edge case for montgomery reduction with special primes [valid] expect success Running test 61 tc 62: edge case for montgomery reduction with special primes [valid] expect success Running test 62 tc 63: edge case for montgomery reduction with special primes [valid] expect success Running test 63 tc 64: edge case for montgomery reduction with special primes [valid] expect success Running test 64 tc 65: edge case for montgomery reduction with special primes [valid] expect success Running test 65 [ OK ] RsaDecryptWycheproofTest.Rsa3072 (1813 ms) [ RUN ] RsaDecryptWycheproofTest.Rsa4096 Reading tests from: rsa_pkcs1_4096_test.json Test vectors of type RsaesPkcs1Decrypt are intended to check the decryption of RSA encrypted ciphertexts. InvalidPkcs1Padding: This is a test vector with an invalid PKCS #1 padding. Implementations must ensure that different error conditions cannot be distinguished, since the information about the error condition can be used for a padding oracle attack. (RFC 8017 Section 7.2.2) tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: Longest valid message size [valid] expect success tc 9: ps is all 0 [invalid, InvalidPkcs1Padding] expect failure tc 10: ps is all 1 [valid] expect success tc 11: rsa_sslv23_padding [valid] expect success tc 12: byte 0 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 13: byte 1 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 14: byte 7 of ps is 0 [invalid, InvalidPkcs1Padding] expect failure tc 15: ps truncated [invalid, InvalidPkcs1Padding] expect failure tc 16: ps missing [invalid, InvalidPkcs1Padding] expect failure tc 17: Block type = 0 [invalid, InvalidPkcs1Padding] expect failure tc 18: Block type = 1 [invalid, InvalidPkcs1Padding] expect failure tc 19: Block type = 0xff [invalid, InvalidPkcs1Padding] expect failure tc 20: First byte is not zero [invalid, InvalidPkcs1Padding] expect failure tc 21: First byte is not zero [invalid, InvalidPkcs1Padding] expect failure tc 22: signature padding [invalid, InvalidPkcs1Padding] expect failure tc 23: no zero after padding [invalid, InvalidPkcs1Padding] expect failure tc 24: no padding [invalid, InvalidPkcs1Padding] expect failure tc 25: m = 2 [invalid, InvalidPkcs1Padding] expect failure tc 26: m = n-2 [invalid, InvalidPkcs1Padding] expect failure tc 27: c = 0 [invalid, InvalidPkcs1Padding] expect failure tc 28: c = 1 [invalid, InvalidPkcs1Padding] expect failure tc 29: c = n-1 [invalid, InvalidPkcs1Padding] expect failure tc 30: ciphertext is empty [invalid] expect failure tc 31: prepended bytes to ciphertext [invalid] expect failure tc 32: appended bytes to ciphertext [invalid] expect failure tc 33: truncated ciphertext [invalid] expect failure Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 tc 34: edge case for ciphertext [valid] expect success Running test 34 tc 35: edge case for ciphertext [valid] expect success Running test 35 tc 36: ciphertext has low hamming weight [valid] expect success Running test 36 tc 37: ciphertext has high hamming weight [valid] expect success Running test 37 tc 38: ciphertext has high hamming weight [valid] expect success Running test 38 tc 39: ciphertext mod p,q has high hamming weight [valid] expect success Running test 39 tc 40: ciphertext mod p,q has low hamming weight [valid] expect success Running test 40 tc 41: special case ciphertext [valid] expect success Running test 41 tc 42: ciphertext is a simple fraction [valid] expect success Running test 42 tc 43: ciphertext is a simple fraction [valid] expect success Running test 43 tc 44: edge case for Montgomery reduction (32 bit) [valid] expect success Running test 44 tc 45: edge case for Montgomery reduction (32 bit) [valid] expect success Running test 45 tc 46: edge case for Montgomery reduction (64 bit) [valid] expect success Running test 46 tc 47: edge case for Montgomery reduction (64 bit) [valid] expect success Running test 47 tc 48: edge case for Montgomery reduction (2048 bit) [valid] expect success Running test 48 tc 49: edge case for Montgomery reduction (2048 bit) [valid] expect success Running test 49 tc 50: edge case for Montgomery reduction over Z/nZ (32 bit) [valid] expect success Running test 50 tc 51: edge case for Montgomery reduction over Z/nZ (32 bit) [valid] expect success Running test 51 tc 52: edge case for Montgomery reduction over Z/nZ (64 bit) [valid] expect success Running test 52 tc 53: edge case for Montgomery reduction over Z/nZ (64 bit) [valid] expect success Running test 53 tc 54: edge case for Montgomery reduction over Z/nZ (4096 bit) [valid] expect success Running test 54 tc 55: edge case for Montgomery reduction over Z/nZ (4096 bit) [valid] expect success Running test 55 tc 56: edge case for montgomery reduction with special primes [valid] expect success Running test 56 tc 57: edge case for montgomery reduction with special primes [invalid, InvalidPkcs1Padding] expect failure Running test 57 tc 58: edge case for montgomery reduction with special primes [valid] expect success Running test 58 tc 59: edge case for montgomery reduction with special primes [valid] expect success Running test 59 tc 60: edge case for montgomery reduction with special primes [valid] expect success Running test 60 tc 61: edge case for montgomery reduction with special primes [valid] expect success Running test 61 tc 62: edge case for montgomery reduction with special primes [valid] expect success Running test 62 tc 63: edge case for montgomery reduction with special primes [valid] expect success Running test 63 tc 64: edge case for montgomery reduction with special primes [valid] expect success Running test 64 tc 65: edge case for montgomery reduction with special primes [valid] expect success Running test 65 [ OK ] RsaDecryptWycheproofTest.Rsa4096 (3872 ms) [ RUN ] RsaDecryptWycheproofTest.Bb2048 [ OK ] RsaDecryptWycheproofTest.Bb2048 (160 ms) [ RUN ] RsaDecryptWycheproofTest.Bb2049 [ OK ] RsaDecryptWycheproofTest.Bb2049 (68 ms) [ RUN ] RsaDecryptWycheproofTest.Bb3072 [ OK ] RsaDecryptWycheproofTest.Bb3072 (357 ms) [----------] 6 tests from RsaDecryptWycheproofTest (6968 ms total) [----------] 1 test from RsaEncryptTest [ RUN ] RsaEncryptTest.MessageLengths [ OK ] RsaEncryptTest.MessageLengths (0 ms) [----------] 1 test from RsaEncryptTest (0 ms total) [----------] 5 tests from TlsPrfTest [ RUN ] TlsPrfTest.ExtendedMsParamErr [ OK ] TlsPrfTest.ExtendedMsParamErr (0 ms) [ RUN ] TlsPrfTest.ExtendedMsDhTlsPrf [ OK ] TlsPrfTest.ExtendedMsDhTlsPrf (0 ms) [ RUN ] TlsPrfTest.ExtendedMsRsaTlsPrf [ OK ] TlsPrfTest.ExtendedMsRsaTlsPrf (0 ms) [ RUN ] TlsPrfTest.ExtendedMsDhSha256 [ OK ] TlsPrfTest.ExtendedMsDhSha256 (0 ms) [ RUN ] TlsPrfTest.ExtendedMsRsaSha256 [ OK ] TlsPrfTest.ExtendedMsRsaSha256 (0 ms) [----------] 5 tests from TlsPrfTest (0 ms total) [----------] 3 tests from Pkcs11Pbkdf2Test [ RUN ] Pkcs11Pbkdf2Test.DeriveKnown1 [ OK ] Pkcs11Pbkdf2Test.DeriveKnown1 (27 ms) [ RUN ] Pkcs11Pbkdf2Test.DeriveKnown2 [ OK ] Pkcs11Pbkdf2Test.DeriveKnown2 (33 ms) [ RUN ] Pkcs11Pbkdf2Test.KeyLenSizes [ OK ] Pkcs11Pbkdf2Test.KeyLenSizes (0 ms) [----------] 3 tests from Pkcs11Pbkdf2Test (61 ms total) [----------] 1 test from Pkcs11PbeTest [ RUN ] Pkcs11PbeTest.DeriveKnown [ OK ] Pkcs11PbeTest.DeriveKnown (1 ms) [----------] 1 test from Pkcs11PbeTest (1 ms total) [----------] 5 tests from Pkcs11ModuleTest [ RUN ] Pkcs11ModuleTest.LoadUnload [ OK ] Pkcs11ModuleTest.LoadUnload (0 ms) [ RUN ] Pkcs11ModuleTest.ListSlots loaded slot: NSS User Private Key and Certificate Services loaded slot: NSS Internal Cryptographic Services loaded slot: Test PKCS11 Public Certs Slot loaded slot: Test PKCS11 Slot 二 [ OK ] Pkcs11ModuleTest.ListSlots (0 ms) [ RUN ] Pkcs11ModuleTest.PublicCertificatesToken [ OK ] Pkcs11ModuleTest.PublicCertificatesToken (0 ms) [ RUN ] Pkcs11ModuleTest.PublicCertificatesTokenLookup [ OK ] Pkcs11ModuleTest.PublicCertificatesTokenLookup (0 ms) [ RUN ] Pkcs11ModuleTest.PublicCertificatesTokenLookupNoMatch [ OK ] Pkcs11ModuleTest.PublicCertificatesTokenLookupNoMatch (0 ms) [----------] 5 tests from Pkcs11ModuleTest (3 ms total) [----------] 1 test from Pkcs11DhNullKeyTest [ RUN ] Pkcs11DhNullKeyTest.UseNullPublicValue Generate DH pair [ OK ] Pkcs11DhNullKeyTest.UseNullPublicValue (2385 ms) [----------] 1 test from Pkcs11DhNullKeyTest (2385 ms total) [----------] 1 test from Pkcs11KEMTest [ RUN ] Pkcs11KEMTest.KemConsistencyTest Generate Kyber768 pair [ OK ] Pkcs11KEMTest.KemConsistencyTest (0 ms) [----------] 1 test from Pkcs11KEMTest (0 ms total) [----------] 1 test from Pkcs11KbkdfTest [ RUN ] Pkcs11KbkdfTest.TestAdditionalKey [ OK ] Pkcs11KbkdfTest.TestAdditionalKey (0 ms) [----------] 1 test from Pkcs11KbkdfTest (0 ms total) [----------] 1 test from TestVectors [ RUN ] TestVectors.HpkeVectors HPKE vector 1 HPKE vector 2 HPKE vector 5 HPKE vector 6 HPKE vector 9 HPKE vector 10 HPKE vector 19 HPKE vector 20 HPKE vector 21 HPKE vector 24 HPKE vector 25 HPKE vector 26 [ OK ] TestVectors.HpkeVectors (100 ms) [----------] 1 test from TestVectors (100 ms total) [----------] 3 tests from ModeParameterizedTest [ RUN ] ModeParameterizedTest.BadEncapsulatedPubKey [ OK ] ModeParameterizedTest.BadEncapsulatedPubKey (0 ms) [ RUN ] ModeParameterizedTest.InvalidContextParams [ OK ] ModeParameterizedTest.InvalidContextParams (0 ms) [ RUN ] ModeParameterizedTest.InvalidReceiverKeyType [ OK ] ModeParameterizedTest.InvalidReceiverKeyType (51 ms) [----------] 3 tests from ModeParameterizedTest (52 ms total) [----------] 1 test from PK11FindCertsTestBase [ RUN ] PK11FindCertsTestBase.CertAddListWithData [ OK ] PK11FindCertsTestBase.CertAddListWithData (8 ms) [----------] 1 test from PK11FindCertsTestBase (9 ms total) [----------] 6 tests from PK11FindRawCertsBySubjectTest [ RUN ] PK11FindRawCertsBySubjectTest.TestNoCertsImportedNoCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestNoCertsImportedNoCertsFound (6 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestOneCertImportedNoCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestOneCertImportedNoCertsFound (10 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestMultipleMatchingCertsFound [ OK ] PK11FindRawCertsBySubjectTest.TestMultipleMatchingCertsFound (16 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestNoCertsOnInternalSlots [ OK ] PK11FindRawCertsBySubjectTest.TestNoCertsOnInternalSlots (9 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestFindEmptySubject [ OK ] PK11FindRawCertsBySubjectTest.TestFindEmptySubject (9 ms) [ RUN ] PK11FindRawCertsBySubjectTest.TestSearchForNullSubject [ OK ] PK11FindRawCertsBySubjectTest.TestSearchForNullSubject (9 ms) [----------] 6 tests from PK11FindRawCertsBySubjectTest (62 ms total) [----------] 4 tests from PK11GetCertsMatchingPrivateKeyTest [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsAtAll [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsAtAll (6 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestNoCertsForKey (10 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestOneCertForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestOneCertForKey (12 ms) [ RUN ] PK11GetCertsMatchingPrivateKeyTest.TestTwoCertsForKey [ OK ] PK11GetCertsMatchingPrivateKeyTest.TestTwoCertsForKey (16 ms) [----------] 4 tests from PK11GetCertsMatchingPrivateKeyTest (46 ms total) [----------] 1 test from PK11FindEncodedCertInSlotTest [ RUN ] PK11FindEncodedCertInSlotTest.TestFindEncodedCert [ OK ] PK11FindEncodedCertInSlotTest.TestFindEncodedCert (9 ms) [----------] 1 test from PK11FindEncodedCertInSlotTest (9 ms total) [----------] 2 tests from Pkcs11ExportTest [ RUN ] Pkcs11ExportTest.DeriveNonExport [ OK ] Pkcs11ExportTest.DeriveNonExport (0 ms) [ RUN ] Pkcs11ExportTest.DeriveExport [ OK ] Pkcs11ExportTest.DeriveExport (0 ms) [----------] 2 tests from Pkcs11ExportTest (0 ms total) [----------] 3 tests from Pkcs11EcdhTest [ RUN ] Pkcs11EcdhTest.P256 Reading tests from: ecdh_secp256r1_test.json Test vectors of type EcdhTest are intended for testing an ECDH implementations using X509 encoded public keys and integers for private keys. Test vectors of this format are useful for testing Java providers. AddSubChain: The private key has a special value. Implementations using addition subtraction chains for the point multiplication may get the point at infinity as an intermediate result. See CVE_2017_10176 CompressedPoint: The point in the public key is compressed. Not every library supports points in compressed format. InvalidAsn: The public key in this test uses an invalid ASN encoding. Some cases where the ASN parser is not strictly checking the ASN format are benign as long as the ECDH computation still returns the correct shared value. InvalidPublic: The public key has been modified and is invalid. An implementation should always check whether the public key is valid and on the same curve as the private key. The test vector includes the shared secret computed with the original public key if the public point is on the curve of the private key. Generating a shared secret other than the one with the original key likely indicates that the bug is exploitable. ModifiedPrime: The modulus of the public key has been modified. The public point of the public key has been chosen so that it is both a point on both the curve of the modified public key and the private key. UnnamedCurve: The public key does not use a named curve. RFC 3279 allows to encode such curves by explicitly encoding, the parameters of the curve equation, modulus, generator, order and cofactor. However, many crypto libraries only support named curves. Modifying some of the EC parameters and encoding the corresponding public key as an unnamed curve is a potential attack vector. UnusedParam: A parameter that is typically not used for ECDH has been modified. Sometimes libraries ignore small differences between public and private key. For example, a library might ignore an incorrect cofactor in the public key. We consider ignoring such changes as acceptable as long as these differences do not change the outcome of the ECDH computation, i.e. as long as the computation is done on the curve from the private key. WeakPublicKey: The vector contains a weak public key. The curve is not a named curve, the public key point has order 3 and has been chosen to be on the same curve as the private key. This test vector is used to check ECC implementations for missing steps in the verification of the public key. WrongOrder: The order of the public key has been modified. If this order is used in a cryptographic primitive instead of the correct order then private keys may leak. E.g. ECDHC in BC 1.52 suffered from this. tc 1: normal case [valid] expect success tc 2: compressed public key [acceptable, CompressedPoint] expect failure tc 3: edge case for shared secret [valid] expect success tc 4: edge case for shared secret [valid] expect success tc 5: edge case for shared secret [valid] expect success tc 6: edge case for shared secret [valid] expect success tc 7: edge case for shared secret [valid] expect success tc 8: edge case for shared secret [valid] expect success tc 9: edge case for shared secret [valid] expect success tc 10: edge case for shared secret [valid] expect success tc 11: edge case for shared secret [valid] expect success tc 12: edge case for shared secret [valid] expect success tc 13: edge case for shared secret [valid] expect success tc 14: edge case for shared secret [valid] expect success tc 15: edge case for shared secret [valid] expect success tc 16: edge case for shared secret [valid] expect success tc 17: edge case for shared secret [valid] expect success tc 18: edge case for shared secret [valid] expect success tc 19: y-coordinate of the public key is small [valid] expect success tc 20: y-coordinate of the public key is small [valid] expect success tc 21: y-coordinate of the public key is small [valid] expect success tc 22: y-coordinate of the public key is large [valid] expect success tc 23: y-coordinate of the public key is large [valid] expect success tc 24: y-coordinate of the public key is large [valid] expect success tc 25: y-coordinate of the public key has many trailing 1's [valid] expect success tc 26: y-coordinate of the public key has many trailing 1's [valid] expect success tc 27: y-coordinate of the public key has many trailing 1's [valid] expect success tc 28: y-coordinate of the public key has many trailing 0's [valid] expect success tc 29: y-coordinate of the public key has many trailing 0's [valid] expect success tc 30: y-coordinate of the public key has many trailing 0's [valid] expect success tc 31: edge cases for ephemeral key [valid] expect success tc 32: edge cases for ephemeral key [valid] expect success tc 33: edge cases for ephemeral key [valid] expect success tc 34: edge cases for ephemeral key [valid] expect success tc 35: edge cases for ephemeral key [valid] expect success tc 36: edge cases for ephemeral key [valid] expect success tc 37: edge cases for ephemeral key [valid] expect success tc 38: edge cases for ephemeral key [valid] expect success tc 39: edge cases for ephemeral key [valid] expect success tc 40: edge cases for ephemeral key [valid] expect success tc 41: edge cases for ephemeral key [valid] expect success tc 42: edge cases for ephemeral key [valid] expect success tc 43: edge cases for ephemeral key [valid] expect success tc 44: edge cases for ephemeral key [valid] expect success tc 45: edge cases for ephemeral key [valid] expect success tc 46: edge cases for ephemeral key [valid] expect success tc 47: edge cases for ephemeral key [valid] expect success tc 48: edge cases for ephemeral key [valid] expect success tc 49: edge cases for ephemeral key [valid] expect success tc 50: edge cases for ephemeral key [valid] expect success tc 51: edge cases for ephemeral key [valid] expect success tc 52: edge cases for ephemeral key [valid] expect success tc 53: edge cases for ephemeral key [valid] expect success tc 54: edge cases for ephemeral key [valid] expect success tc 55: edge cases for ephemeral key [valid] expect success tc 56: edge cases for ephemeral key [valid] expect success tc 57: edge cases for ephemeral key [valid] expect success tc 58: edge cases for ephemeral key [valid] expect success tc 59: point with coordinate x = 0 [valid] expect success tc 60: point with coordinate x = 0 [valid] expect success tc 61: point with coordinate x = 0 [valid] expect success tc 62: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 63: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 64: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 65: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 66: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 67: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 68: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 69: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 70: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 71: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 72: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 73: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 74: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 75: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 76: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 77: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 78: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 79: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 80: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 81: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 82: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 83: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 84: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 85: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 86: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 87: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 88: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 89: point with coordinate y = 1 [valid] expect success tc 90: point with coordinate y = 1 [valid] expect success tc 91: point with coordinate y = 1 [valid] expect success tc 92: point with coordinate y = 1 [valid] expect success tc 93: point with coordinate y = 1 [valid] expect success tc 94: point with coordinate y = 1 [valid] expect success tc 95: point with coordinate y = 1 [valid] expect success tc 96: point with coordinate y = 1 [valid] expect success tc 97: point with coordinate y = 1 [valid] expect success tc 98: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 99: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 100: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 101: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 102: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 103: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 104: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 105: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 106: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 107: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 108: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 109: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 110: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 111: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 112: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 113: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 114: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 115: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 116: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 117: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 118: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 119: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 120: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 121: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 122: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 123: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 124: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 125: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 126: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 127: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 128: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 129: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 130: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 131: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 132: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 133: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 134: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 135: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 136: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 137: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 138: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 139: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 140: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 141: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 142: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 143: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 144: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 145: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 146: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 147: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 148: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 149: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 150: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 151: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 152: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 153: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 154: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 155: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 156: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 157: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 158: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 159: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 160: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 161: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 162: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 163: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 164: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 165: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 166: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 167: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 168: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 169: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 170: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 171: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 172: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 173: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 174: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 175: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 176: edge case private key [valid] expect success tc 177: edge case private key [valid] expect success tc 178: edge case private key [valid] expect success tc 179: edge case private key [valid] expect success tc 180: edge case private key [valid] expect success tc 181: edge case private key [valid] expect success tc 182: edge case private key [valid] expect success tc 183: edge case private key [valid] expect success tc 184: edge case private key [valid] expect success tc 185: edge case private key [valid, AddSubChain] expect success tc 186: edge case private key [valid, AddSubChain] expect success tc 187: edge case private key [valid, AddSubChain] expect success tc 188: edge case private key [valid, AddSubChain] expect success tc 189: edge case private key [valid] expect success tc 190: edge case private key [valid, AddSubChain] expect success tc 191: CVE-2017-8932 [valid] expect success tc 192: CVE-2017-8932 [valid] expect success tc 193: point is not on curve [invalid] expect failure tc 194: point is not on curve [invalid] expect failure tc 195: point is not on curve [invalid] expect failure tc 196: point is not on curve [invalid] expect failure tc 197: point is not on curve [invalid] expect failure tc 198: point is not on curve [invalid] expect failure tc 199: point is not on curve [invalid] expect failure tc 200: point is not on curve [invalid] expect failure tc 201: point is not on curve [invalid] expect failure tc 202: point is not on curve [invalid] expect failure tc 203: point is not on curve [invalid] expect failure tc 204: point is not on curve [invalid] expect failure tc 205: point is not on curve [invalid] expect failure tc 206: point is not on curve [invalid] expect failure tc 207: point is not on curve [invalid] expect failure tc 208: point is not on curve [invalid] expect failure tc 209: [invalid] expect failure tc 210: public point not on curve [invalid, InvalidPublic] expect failure tc 211: public point = (0,0) [invalid, InvalidPublic] expect failure tc 212: order = -115792089210356248762697446949407573529996955224135760342422259061068512044369 [invalid, WrongOrder, InvalidPublic, UnnamedCurve] expect failure tc 213: order = 0 [invalid, WrongOrder, InvalidPublic, UnnamedCurve] expect failure tc 214: order = 1 [acceptable, WrongOrder, UnusedParam, UnnamedCurve] expect failure tc 215: order = 26959946660873538060741835960514744168612397095220107664918121663170 [acceptable, WrongOrder, UnusedParam, UnnamedCurve] expect failure tc 216: generator = (0,0) [acceptable, UnusedParam, UnnamedCurve] expect failure tc 217: generator not on curve [acceptable, UnusedParam, UnnamedCurve] expect failure tc 218: cofactor = -1 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 219: cofactor = 0 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 220: cofactor = 2 [acceptable, UnusedParam, UnnamedCurve] expect failure tc 221: cofactor = 115792089210356248762697446949407573529996955224135760342422259061068512044369 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 222: cofactor = None [acceptable, UnusedParam, UnnamedCurve] expect failure tc 223: modified prime [invalid, ModifiedPrime, InvalidPublic, UnnamedCurve] expect failure tc 224: using secp224r1 [invalid, InvalidPublic] expect failure tc 225: using secp256k1 [invalid, InvalidPublic] expect failure tc 226: a = 0 [acceptable, UnusedParam, UnnamedCurve] expect failure tc 227: public key of order 3 [invalid, WeakPublicKey, InvalidPublic, UnnamedCurve] expect failure tc 228: Public key uses wrong curve: secp224r1 [invalid] expect failure tc 229: Public key uses wrong curve: secp384r1 [invalid] expect failure tc 230: Public key uses wrong curve: secp521r1 [invalid] expect failure tc 231: Public key uses wrong curve: secp256k1 [invalid] expect failure tc 232: Public key uses wrong curve: secp224k1 [invalid] expect failure tc 233: Public key uses wrong curve: brainpoolP224r1 [invalid] expect failure tc 234: Public key uses wrong curve: brainpoolP256r1 [invalid] expect failure tc 235: Public key uses wrong curve: brainpoolP320r1 [invalid] expect failure tc 236: Public key uses wrong curve: brainpoolP384r1 [invalid] expect failure tc 237: Public key uses wrong curve: brainpoolP512r1 [invalid] expect failure tc 238: Public key uses wrong curve: brainpoolP224t1 [invalid] expect failure tc 239: Public key uses wrong curve: brainpoolP256t1 [invalid] expect failure tc 240: Public key uses wrong curve: brainpoolP320t1 [invalid] expect failure tc 241: Public key uses wrong curve: brainpoolP384t1 [invalid] expect failure tc 242: Public key uses wrong curve: brainpoolP512t1 [invalid] expect failure tc 243: invalid public key [invalid, CompressedPoint] expect failure tc 244: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 245: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 246: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 247: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 248: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 249: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 250: long form encoding of length of sequence [acceptable, InvalidAsn] expect failure tc 251: long form encoding of length of sequence [acceptable, InvalidAsn] expect failure tc 252: length of sequence contains leading 0 [acceptable, InvalidAsn] expect failure tc 253: length of sequence contains leading 0 [acceptable, InvalidAsn] expect failure tc 254: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 255: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 256: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 257: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 258: uint32 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 259: uint32 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 260: uint64 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 261: uint64 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 262: length of sequence = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 263: length of sequence = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 264: length of sequence = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 265: length of sequence = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 266: length of sequence = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 267: length of sequence = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 268: length of sequence = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 269: length of sequence = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 270: incorrect length of sequence [acceptable, InvalidAsn] expect failure tc 271: incorrect length of sequence [acceptable, InvalidAsn] expect failure tc 272: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 273: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 274: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 275: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 276: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 277: removing sequence [acceptable, InvalidAsn] expect failure tc 278: removing sequence [acceptable, InvalidAsn] expect failure tc 279: lonely sequence tag [acceptable, InvalidAsn] expect failure tc 280: lonely sequence tag [acceptable, InvalidAsn] expect failure tc 281: appending 0's to sequence [acceptable, InvalidAsn] expect failure tc 282: appending 0's to sequence [acceptable, InvalidAsn] expect failure tc 283: prepending 0's to sequence [acceptable, InvalidAsn] expect failure tc 284: prepending 0's to sequence [acceptable, InvalidAsn] expect failure tc 285: appending unused 0's to sequence [acceptable, InvalidAsn] expect failure tc 286: appending unused 0's to sequence [acceptable, InvalidAsn] expect failure tc 287: appending null value to sequence [acceptable, InvalidAsn] expect failure tc 288: appending null value to sequence [acceptable, InvalidAsn] expect failure tc 289: including garbage [acceptable, InvalidAsn] expect failure tc 290: including garbage [acceptable, InvalidAsn] expect failure tc 291: including garbage [acceptable, InvalidAsn] expect failure tc 292: including garbage [acceptable, InvalidAsn] expect failure tc 293: including garbage [acceptable, InvalidAsn] expect failure tc 294: including garbage [acceptable, InvalidAsn] expect failure tc 295: including garbage [acceptable, InvalidAsn] expect failure tc 296: including garbage [acceptable, InvalidAsn] expect failure tc 297: including garbage [acceptable, InvalidAsn] expect failure tc 298: including garbage [acceptable, InvalidAsn] expect failure tc 299: including garbage [acceptable, InvalidAsn] expect failure tc 300: including garbage [acceptable, InvalidAsn] expect failure tc 301: including garbage [acceptable, InvalidAsn] expect failure tc 302: including garbage [acceptable, InvalidAsn] expect failure tc 303: including garbage [acceptable, InvalidAsn] expect failure tc 304: including undefined tags [acceptable, InvalidAsn] expect failure tc 305: including undefined tags [acceptable, InvalidAsn] expect failure tc 306: including undefined tags [acceptable, InvalidAsn] expect failure tc 307: including undefined tags [acceptable, InvalidAsn] expect failure tc 308: including undefined tags [acceptable, InvalidAsn] expect failure tc 309: including undefined tags [acceptable, InvalidAsn] expect failure tc 310: including undefined tags [acceptable, InvalidAsn] expect failure tc 311: including undefined tags [acceptable, InvalidAsn] expect failure tc 312: including undefined tags [acceptable, InvalidAsn] expect failure tc 313: including undefined tags [acceptable, InvalidAsn] expect failure tc 314: truncated length of sequence [acceptable, InvalidAsn] expect failure tc 315: truncated length of sequence [acceptable, InvalidAsn] expect failure tc 316: Replacing sequence with NULL [acceptable, InvalidAsn] expect failure tc 317: Replacing sequence with NULL [acceptable, InvalidAsn] expect failure tc 318: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 319: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 320: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 321: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 322: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 323: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 324: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 325: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 326: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 327: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 328: dropping value of sequence [acceptable, InvalidAsn] expect failure tc 329: dropping value of sequence [acceptable, InvalidAsn] expect failure tc 330: truncated sequence [acceptable, InvalidAsn] expect failure tc 331: truncated sequence [acceptable, InvalidAsn] expect failure tc 332: truncated sequence [acceptable, InvalidAsn] expect failure tc 333: truncated sequence [acceptable, InvalidAsn] expect failure tc 334: indefinite length [acceptable, InvalidAsn] expect failure tc 335: indefinite length [acceptable, InvalidAsn] expect failure tc 336: indefinite length with truncated delimiter [acceptable, InvalidAsn] expect failure tc 337: indefinite length with truncated delimiter [acceptable, InvalidAsn] expect failure tc 338: indefinite length with additional element [acceptable, InvalidAsn] expect failure tc 339: indefinite length with additional element [acceptable, InvalidAsn] expect failure tc 340: indefinite length with truncated element [acceptable, InvalidAsn] expect failure tc 341: indefinite length with truncated element [acceptable, InvalidAsn] expect failure tc 342: indefinite length with garbage [acceptable, InvalidAsn] expect failure tc 343: indefinite length with garbage [acceptable, InvalidAsn] expect failure tc 344: indefinite length with nonempty EOC [acceptable, InvalidAsn] expect failure tc 345: indefinite length with nonempty EOC [acceptable, InvalidAsn] expect failure tc 346: prepend empty sequence [acceptable, InvalidAsn] expect failure tc 347: prepend empty sequence [acceptable, InvalidAsn] expect failure tc 348: append empty sequence [acceptable, InvalidAsn] expect failure tc 349: append empty sequence [acceptable, InvalidAsn] expect failure tc 350: append garbage with high tag number [acceptable, InvalidAsn] expect failure tc 351: append garbage with high tag number [acceptable, InvalidAsn] expect failure tc 352: sequence of sequence [acceptable, InvalidAsn] expect failure tc 353: sequence of sequence [acceptable, InvalidAsn] expect failure tc 354: truncated sequence: removed last 1 elements [acceptable, InvalidAsn] expect failure tc 355: truncated sequence: removed last 1 elements [acceptable, InvalidAsn] expect failure tc 356: repeating element in sequence [acceptable, InvalidAsn] expect failure tc 357: repeating element in sequence [acceptable, InvalidAsn] expect failure tc 358: long form encoding of length of oid [acceptable, InvalidAsn] expect failure tc 359: long form encoding of length of oid [acceptable, InvalidAsn] expect failure tc 360: length of oid contains leading 0 [acceptable, InvalidAsn] expect failure tc 361: length of oid contains leading 0 [acceptable, InvalidAsn] expect failure tc 362: wrong length of oid [acceptable, InvalidAsn] expect failure tc 363: wrong length of oid [acceptable, InvalidAsn] expect failure tc 364: wrong length of oid [acceptable, InvalidAsn] expect failure tc 365: wrong length of oid [acceptable, InvalidAsn] expect failure tc 366: uint32 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 367: uint32 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 368: uint64 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 369: uint64 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 370: length of oid = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 371: length of oid = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 372: length of oid = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 373: length of oid = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 374: length of oid = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 375: length of oid = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 376: length of oid = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 377: length of oid = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 378: incorrect length of oid [acceptable, InvalidAsn] expect failure tc 379: incorrect length of oid [acceptable, InvalidAsn] expect failure tc 380: removing oid [acceptable, InvalidAsn] expect failure tc 381: lonely oid tag [acceptable, InvalidAsn] expect failure tc 382: lonely oid tag [acceptable, InvalidAsn] expect failure tc 383: appending 0's to oid [acceptable, InvalidAsn] expect failure tc 384: appending 0's to oid [acceptable, InvalidAsn] expect failure tc 385: prepending 0's to oid [acceptable, InvalidAsn] expect failure tc 386: prepending 0's to oid [acceptable, InvalidAsn] expect failure tc 387: appending unused 0's to oid [acceptable, InvalidAsn] expect failure tc 388: appending null value to oid [acceptable, InvalidAsn] expect failure tc 389: appending null value to oid [acceptable, InvalidAsn] expect failure tc 390: truncated length of oid [acceptable, InvalidAsn] expect failure tc 391: truncated length of oid [acceptable, InvalidAsn] expect failure tc 392: Replacing oid with NULL [acceptable, InvalidAsn] expect failure tc 393: Replacing oid with NULL [acceptable, InvalidAsn] expect failure tc 394: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 395: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 396: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 397: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 398: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 399: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 400: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 401: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 402: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 403: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 404: dropping value of oid [acceptable, InvalidAsn] expect failure tc 405: dropping value of oid [acceptable, InvalidAsn] expect failure tc 406: modify first byte of oid [acceptable, InvalidAsn] expect failure tc 407: modify first byte of oid [acceptable, InvalidAsn] expect failure tc 408: modify last byte of oid [acceptable, InvalidAsn] expect failure tc 409: modify last byte of oid [acceptable, InvalidAsn] expect failure tc 410: truncated oid [acceptable, InvalidAsn] expect failure tc 411: truncated oid [acceptable, InvalidAsn] expect failure tc 412: truncated oid [acceptable, InvalidAsn] expect failure tc 413: truncated oid [acceptable, InvalidAsn] expect failure tc 414: wrong oid [acceptable, InvalidAsn] expect failure tc 415: wrong oid [acceptable, InvalidAsn] expect failure tc 416: wrong oid [acceptable, InvalidAsn] expect failure tc 417: wrong oid [acceptable, InvalidAsn] expect failure tc 418: longer oid [acceptable, InvalidAsn] expect failure tc 419: longer oid [acceptable, InvalidAsn] expect failure tc 420: oid with modified node [acceptable, InvalidAsn] expect failure tc 421: oid with modified node [acceptable, InvalidAsn] expect failure tc 422: oid with modified node [acceptable, InvalidAsn] expect failure tc 423: oid with modified node [acceptable, InvalidAsn] expect failure tc 424: large integer in oid [acceptable, InvalidAsn] expect failure tc 425: large integer in oid [acceptable, InvalidAsn] expect failure tc 426: oid with invalid node [acceptable, InvalidAsn] expect failure tc 427: oid with invalid node [acceptable, InvalidAsn] expect failure tc 428: oid with invalid node [acceptable, InvalidAsn] expect failure tc 429: oid with invalid node [acceptable, InvalidAsn] expect failure tc 430: long form encoding of length of bit string [acceptable, InvalidAsn] expect failure tc 431: length of bit string contains leading 0 [acceptable, InvalidAsn] expect failure tc 432: wrong length of bit string [acceptable, InvalidAsn] expect failure tc 433: wrong length of bit string [acceptable, InvalidAsn] expect failure tc 434: uint32 overflow in length of bit string [acceptable, InvalidAsn] expect failure tc 435: uint64 overflow in length of bit string [acceptable, InvalidAsn] expect failure tc 436: length of bit string = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 437: length of bit string = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 438: length of bit string = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 439: length of bit string = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 440: incorrect length of bit string [acceptable, InvalidAsn] expect failure tc 441: lonely bit string tag [acceptable, InvalidAsn] expect failure tc 442: appending 0's to bit string [acceptable, InvalidAsn] expect failure tc 443: prepending 0's to bit string [acceptable, InvalidAsn] expect failure tc 444: appending null value to bit string [acceptable, InvalidAsn] expect failure tc 445: truncated length of bit string [acceptable, InvalidAsn] expect failure tc 446: Replacing bit string with NULL [acceptable, InvalidAsn] expect failure tc 447: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 448: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 449: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 450: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 451: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 452: dropping value of bit string [acceptable, InvalidAsn] expect failure tc 453: modify first byte of bit string [acceptable, InvalidAsn] expect failure tc 454: modify last byte of bit string [acceptable, InvalidAsn] expect failure tc 455: truncated bit string [acceptable, InvalidAsn] expect failure tc 456: truncated bit string [acceptable, InvalidAsn] expect failure tc 457: declaring bits as unused in bit string [acceptable, InvalidAsn] expect failure tc 458: unused bits in bit string [acceptable, InvalidAsn] expect failure tc 459: unused bits in empty bit-string [acceptable, InvalidAsn] expect failure tc 460: 128 unused bits [acceptable, InvalidAsn] expect failure Run test 1 Run test 2 Run test 3 Run test 4 Run test 5 Run test 6 Run test 7 Run test 8 Run test 9 Run test 10 Run test 11 Run test 12 Run test 13 Run test 14 Run test 15 Run test 16 Run test 17 Run test 18 Run test 19 Run test 20 Run test 21 Run test 22 Run test 23 Run test 24 Run test 25 Run test 26 Run test 27 Run test 28 Run test 29 Run test 30 Run test 31 Run test 32 Run test 33 Run test 34 Run test 35 Run test 36 Run test 37 Run test 38 Run test 39 Run test 40 Run test 41 Run test 42 Run test 43 Run test 44 Run test 45 Run test 46 Run test 47 Run test 48 Run test 49 Run test 50 Run test 51 Run test 52 Run test 53 Run test 54 Run test 55 Run test 56 Run test 57 Run test 58 Run test 59 Run test 60 Run test 61 Run test 62 Run test 63 Run test 64 Run test 65 Run test 66 Run test 67 Run test 68 Run test 69 Run test 70 Run test 71 Run test 72 Run test 73 Run test 74 Run test 75 Run test 76 Run test 77 Run test 78 Run test 79 Run test 80 Run test 81 Run test 82 Run test 83 Run test 84 Run test 85 Run test 86 Run test 87 Run test 88 Run test 89 Run test 90 Run test 91 Run test 92 Run test 93 Run test 94 Run test 95 Run test 96 Run test 97 Run test 98 Run test 99 Run test 100 Run test 101 Run test 102 Run test 103 Run test 104 Run test 105 Run test 106 Run test 107 Run test 108 Run test 109 Run test 110 Run test 111 Run test 112 Run test 113 Run test 114 Run test 115 Run test 116 Run test 117 Run test 118 Run test 119 Run test 120 Run test 121 Run test 122 Run test 123 Run test 124 Run test 125 Run test 126 Run test 127 Run test 128 Run test 129 Run test 130 Run test 131 Run test 132 Run test 133 Run test 134 Run test 135 Run test 136 Run test 137 Run test 138 Run test 139 Run test 140 Run test 141 Run test 142 Run test 143 Run test 144 Run test 145 Run test 146 Run test 147 Run test 148 Run test 149 Run test 150 Run test 151 Run test 152 Run test 153 Run test 154 Run test 155 Run test 156 Run test 157 Run test 158 Run test 159 Run test 160 Run test 161 Run test 162 Run test 163 Run test 164 Run test 165 Run test 166 Run test 167 Run test 168 Run test 169 Run test 170 Run test 171 Run test 172 Run test 173 Run test 174 Run test 175 Run test 176 Run test 177 Run test 178 Run test 179 Run test 180 Run test 181 Run test 182 Run test 183 Run test 184 Run test 185 Run test 186 Run test 187 Run test 188 Run test 189 Run test 190 Run test 191 Run test 192 Run test 193 Run test 194 Run test 195 Run test 196 Run test 197 Run test 198 Run test 199 Run test 200 Run test 201 Run test 202 Run test 203 Run test 204 Run test 205 Run test 206 Run test 207 Run test 208 Run test 209 Run test 210 Run test 211 Run test 212 Run test 213 Run test 214 Run test 215 Run test 216 Run test 217 Run test 218 Run test 219 Run test 220 Run test 221 Run test 222 Run test 223 Run test 224 Run test 225 Run test 226 Run test 227 Run test 228 Run test 229 Run test 230 Run test 231 Run test 232 Run test 233 Run test 234 Run test 235 Run test 236 Run test 237 Run test 238 Run test 239 Run test 240 Run test 241 Run test 242 Run test 243 Run test 244 Run test 245 Run test 246 Run test 247 Run test 248 Run test 249 Run test 250 Run test 251 Run test 252 Run test 253 Run test 254 Run test 255 Run test 256 Run test 257 Run test 258 Run test 259 Run test 260 Run test 261 Run test 262 Run test 263 Run test 264 Run test 265 Run test 266 Run test 267 Run test 268 Run test 269 Run test 270 Run test 271 Run test 272 Run test 273 Run test 274 Run test 275 Run test 276 Run test 277 Run test 278 Run test 279 Run test 280 Run test 281 Run test 282 Run test 283 Run test 284 Run test 285 Run test 286 Run test 287 Run test 288 Run test 289 Run test 290 Run test 291 Run test 292 Run test 293 Run test 294 Run test 295 Run test 296 Run test 297 Run test 298 Run test 299 Run test 300 Run test 301 Run test 302 Run test 303 Run test 304 Run test 305 Run test 306 Run test 307 Run test 308 Run test 309 Run test 310 Run test 311 Run test 312 Run test 313 Run test 314 Run test 315 Run test 316 Run test 317 Run test 318 Run test 319 Run test 320 Run test 321 Run test 322 Run test 323 Run test 324 Run test 325 Run test 326 Run test 327 Run test 328 Run test 329 Run test 330 Run test 331 Run test 332 Run test 333 Run test 334 Run test 335 Run test 336 Run test 337 Run test 338 Run test 339 Run test 340 Run test 341 Run test 342 Run test 343 Run test 344 Run test 345 Run test 346 Run test 347 Run test 348 Run test 349 Run test 350 Run test 351 Run test 352 Run test 353 Run test 354 Run test 355 Run test 356 Run test 357 Run test 358 Run test 359 Run test 360 Run test 361 Run test 362 Run test 363 Run test 364 Run test 365 Run test 366 Run test 367 Run test 368 Run test 369 Run test 370 Run test 371 Run test 372 Run test 373 Run test 374 Run test 375 Run test 376 Run test 377 Run test 378 Run test 379 Run test 380 Run test 381 Run test 382 Run test 383 Run test 384 Run test 385 Run test 386 Run test 387 Run test 388 Run test 389 Run test 390 Run test 391 Run test 392 Run test 393 Run test 394 Run test 395 Run test 396 Run test 397 Run test 398 Run test 399 Run test 400 Run test 401 Run test 402 Run test 403 Run test 404 Run test 405 Run test 406 Run test 407 Run test 408 Run test 409 Run test 410 Run test 411 Run test 412 Run test 413 Run test 414 Run test 415 Run test 416 Run test 417 Run test 418 Run test 419 Run test 420 Run test 421 Run test 422 Run test 423 Run test 424 Run test 425 Run test 426 Run test 427 Run test 428 Run test 429 Run test 430 Run test 431 Run test 432 Run test 433 Run test 434 Run test 435 Run test 436 Run test 437 Run test 438 Run test 439 Run test 440 Run test 441 Run test 442 Run test 443 Run test 444 Run test 445 Run test 446 Run test 447 Run test 448 Run test 449 Run test 450 Run test 451 Run test 452 Run test 453 Run test 454 Run test 455 Run test 456 Run test 457 Run test 458 Run test 459 Run test 460 [ OK ] Pkcs11EcdhTest.P256 (417 ms) [ RUN ] Pkcs11EcdhTest.P384 Reading tests from: ecdh_secp384r1_test.json Test vectors of type EcdhTest are intended for testing an ECDH implementations using X509 encoded public keys and integers for private keys. Test vectors of this format are useful for testing Java providers. AddSubChain: The private key has a special value. Implementations using addition subtraction chains for the point multiplication may get the point at infinity as an intermediate result. See CVE_2017_10176 CompressedPoint: The point in the public key is compressed. Not every library supports points in compressed format. InvalidAsn: The public key in this test uses an invalid ASN encoding. Some cases where the ASN parser is not strictly checking the ASN format are benign as long as the ECDH computation still returns the correct shared value. InvalidPublic: The public key has been modified and is invalid. An implementation should always check whether the public key is valid and on the same curve as the private key. The test vector includes the shared secret computed with the original public key if the public point is on the curve of the private key. Generating a shared secret other than the one with the original key likely indicates that the bug is exploitable. ModifiedPrime: The modulus of the public key has been modified. The public point of the public key has been chosen so that it is both a point on both the curve of the modified public key and the private key. UnnamedCurve: The public key does not use a named curve. RFC 3279 allows to encode such curves by explicitly encoding, the parameters of the curve equation, modulus, generator, order and cofactor. However, many crypto libraries only support named curves. Modifying some of the EC parameters and encoding the corresponding public key as an unnamed curve is a potential attack vector. UnusedParam: A parameter that is typically not used for ECDH has been modified. Sometimes libraries ignore small differences between public and private key. For example, a library might ignore an incorrect cofactor in the public key. We consider ignoring such changes as acceptable as long as these differences do not change the outcome of the ECDH computation, i.e. as long as the computation is done on the curve from the private key. WeakPublicKey: The vector contains a weak public key. The curve is not a named curve, the public key point has order 3 and has been chosen to be on the same curve as the private key. This test vector is used to check ECC implementations for missing steps in the verification of the public key. WrongOrder: The order of the public key has been modified. If this order is used in a cryptographic primitive instead of the correct order then private keys may leak. E.g. ECDHC in BC 1.52 suffered from this. tc 1: normal case [valid] expect success tc 2: compressed public key [acceptable, CompressedPoint] expect failure tc 3: edge case for shared secret [valid] expect success tc 4: edge case for shared secret [valid] expect success tc 5: edge case for shared secret [valid] expect success tc 6: edge case for shared secret [valid] expect success tc 7: edge case for shared secret [valid] expect success tc 8: edge case for shared secret [valid] expect success tc 9: edge case for shared secret [valid] expect success tc 10: edge case for shared secret [valid] expect success tc 11: edge case for shared secret [valid] expect success tc 12: edge case for shared secret [valid] expect success tc 13: edge case for shared secret [valid] expect success tc 14: edge case for shared secret [valid] expect success tc 15: edge case for shared secret [valid] expect success tc 16: edge case for shared secret [valid] expect success tc 17: edge case for shared secret [valid] expect success tc 18: edge case for shared secret [valid] expect success tc 19: edge case for shared secret [valid] expect success tc 20: edge case for shared secret [valid] expect success tc 21: y-coordinate of the public key has many trailing 0's [valid] expect success tc 22: y-coordinate of the public key has many trailing 1's [valid] expect success tc 23: y-coordinate of the public key is small [valid] expect success tc 24: y-coordinate of the public key is large [valid] expect success tc 25: edge cases for ephemeral key [valid] expect success tc 26: edge cases for ephemeral key [valid] expect success tc 27: edge cases for ephemeral key [valid] expect success tc 28: edge cases for ephemeral key [valid] expect success tc 29: edge cases for ephemeral key [valid] expect success tc 30: edge cases for ephemeral key [valid] expect success tc 31: edge cases for ephemeral key [valid] expect success tc 32: edge cases for ephemeral key [valid] expect success tc 33: edge cases for ephemeral key [valid] expect success tc 34: edge cases for ephemeral key [valid] expect success tc 35: edge cases for ephemeral key [valid] expect success tc 36: edge cases for ephemeral key [valid] expect success tc 37: edge cases for ephemeral key [valid] expect success tc 38: edge cases for ephemeral key [valid] expect success tc 39: edge cases for ephemeral key [valid] expect success tc 40: edge cases for ephemeral key [valid] expect success tc 41: edge cases for ephemeral key [valid] expect success tc 42: edge cases for ephemeral key [valid] expect success tc 43: edge cases for ephemeral key [valid] expect success tc 44: edge cases for ephemeral key [valid] expect success tc 45: edge cases for ephemeral key [valid] expect success tc 46: edge cases for ephemeral key [valid] expect success tc 47: edge case for Jacobian and projective coordinates [valid] expect success tc 48: edge case for Jacobian and projective coordinates [valid] expect success tc 49: edge case for Jacobian and projective coordinates [valid] expect success tc 50: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 51: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 52: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 53: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 54: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 55: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 56: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 57: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 58: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 59: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 60: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 61: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 62: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 63: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 64: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 65: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 66: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 67: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 68: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 69: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 70: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 71: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 72: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 73: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 74: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 75: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 76: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 77: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 78: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 79: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 80: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 81: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 82: point with coordinate x = 0 [valid] expect success tc 83: point with coordinate x = 0 [valid] expect success tc 84: point with coordinate x = 0 [valid] expect success tc 85: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 86: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 87: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 88: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 89: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 90: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 91: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 92: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 93: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 94: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 95: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 96: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 97: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 98: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 99: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 100: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 101: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 102: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 103: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 104: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 105: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 106: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 107: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 108: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 109: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 110: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 111: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 112: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 113: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 114: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 115: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 116: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 117: point with coordinate y = 1 [valid] expect success tc 118: point with coordinate y = 1 [valid] expect success tc 119: point with coordinate y = 1 [valid] expect success tc 120: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 121: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 122: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 123: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 124: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 125: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 126: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 127: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 128: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 129: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 130: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 131: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 132: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 133: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 134: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 135: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 136: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 137: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 138: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 139: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 140: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 141: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 142: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 143: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 144: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 145: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 146: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 147: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 148: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 149: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 150: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 151: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 152: edge case private key [valid] expect success tc 153: edge case private key [valid] expect success tc 154: edge case private key [valid] expect success tc 155: edge case private key [valid] expect success tc 156: edge case private key [valid] expect success tc 157: edge case private key [valid] expect success tc 158: edge case private key [valid] expect success tc 159: edge case private key [valid] expect success tc 160: edge case private key [valid] expect success tc 161: edge case private key [valid, AddSubChain] expect success tc 162: edge case private key [valid, AddSubChain] expect success tc 163: edge case private key [valid] expect success tc 164: edge case private key [valid, AddSubChain] expect success tc 165: point is not on curve [invalid] expect failure tc 166: point is not on curve [invalid] expect failure tc 167: point is not on curve [invalid] expect failure tc 168: point is not on curve [invalid] expect failure tc 169: point is not on curve [invalid] expect failure tc 170: point is not on curve [invalid] expect failure tc 171: point is not on curve [invalid] expect failure tc 172: point is not on curve [invalid] expect failure tc 173: point is not on curve [invalid] expect failure tc 174: point is not on curve [invalid] expect failure tc 175: point is not on curve [invalid] expect failure tc 176: point is not on curve [invalid] expect failure tc 177: point is not on curve [invalid] expect failure tc 178: point is not on curve [invalid] expect failure tc 179: point is not on curve [invalid] expect failure tc 180: point is not on curve [invalid] expect failure tc 181: [invalid] expect failure tc 182: public point not on curve [invalid, InvalidPublic] expect failure tc 183: public point = (0,0) [invalid, InvalidPublic] expect failure tc 184: order = -39402006196394479212279040100143613805079739270465446667946905279627659399113263569398956308152294913554433653942643 [invalid, WrongOrder, InvalidPublic, UnnamedCurve] expect failure tc 185: order = 0 [invalid, WrongOrder, InvalidPublic, UnnamedCurve] expect failure tc 186: order = 1 [acceptable, WrongOrder, UnusedParam, UnnamedCurve] expect failure tc 187: order = 9173994463960286046443283581208347763186259956673124494950032159599396260248791326163093631191247821216106 [acceptable, WrongOrder, UnusedParam, UnnamedCurve] expect failure tc 188: generator = (0,0) [acceptable, UnusedParam, UnnamedCurve] expect failure tc 189: generator not on curve [acceptable, UnusedParam, UnnamedCurve] expect failure tc 190: cofactor = -1 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 191: cofactor = 0 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 192: cofactor = 2 [acceptable, UnusedParam, UnnamedCurve] expect failure tc 193: cofactor = 39402006196394479212279040100143613805079739270465446667946905279627659399113263569398956308152294913554433653942643 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 194: cofactor = None [acceptable, UnusedParam, UnnamedCurve] expect failure tc 195: modified prime [invalid, ModifiedPrime, InvalidPublic, UnnamedCurve] expect failure tc 196: using secp224r1 [invalid, InvalidPublic] expect failure tc 197: using secp256r1 [invalid, InvalidPublic] expect failure tc 198: using secp256k1 [invalid, InvalidPublic] expect failure tc 199: a = 0 [acceptable, UnusedParam, UnnamedCurve] expect failure tc 200: public key of order 3 [invalid, WeakPublicKey, InvalidPublic, UnnamedCurve] expect failure tc 201: Public key uses wrong curve: secp224r1 [invalid] expect failure tc 202: Public key uses wrong curve: secp256r1 [invalid] expect failure tc 203: Public key uses wrong curve: secp521r1 [invalid] expect failure tc 204: Public key uses wrong curve: secp256k1 [invalid] expect failure tc 205: Public key uses wrong curve: secp224k1 [invalid] expect failure tc 206: Public key uses wrong curve: brainpoolP224r1 [invalid] expect failure tc 207: Public key uses wrong curve: brainpoolP256r1 [invalid] expect failure tc 208: Public key uses wrong curve: brainpoolP320r1 [invalid] expect failure tc 209: Public key uses wrong curve: brainpoolP384r1 [invalid] expect failure tc 210: Public key uses wrong curve: brainpoolP512r1 [invalid] expect failure tc 211: Public key uses wrong curve: brainpoolP224t1 [invalid] expect failure tc 212: Public key uses wrong curve: brainpoolP256t1 [invalid] expect failure tc 213: Public key uses wrong curve: brainpoolP320t1 [invalid] expect failure tc 214: Public key uses wrong curve: brainpoolP384t1 [invalid] expect failure tc 215: Public key uses wrong curve: brainpoolP512t1 [invalid] expect failure tc 216: invalid public key [invalid, CompressedPoint] expect failure tc 217: long form encoding of length of sequence [acceptable, InvalidAsn] expect failure tc 218: long form encoding of length of sequence [acceptable, InvalidAsn] expect failure tc 219: length of sequence contains leading 0 [acceptable, InvalidAsn] expect failure tc 220: length of sequence contains leading 0 [acceptable, InvalidAsn] expect failure tc 221: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 222: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 223: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 224: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 225: uint32 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 226: uint32 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 227: uint64 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 228: uint64 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 229: length of sequence = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 230: length of sequence = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 231: length of sequence = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 232: length of sequence = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 233: length of sequence = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 234: length of sequence = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 235: length of sequence = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 236: length of sequence = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 237: incorrect length of sequence [acceptable, InvalidAsn] expect failure tc 238: incorrect length of sequence [acceptable, InvalidAsn] expect failure tc 239: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 240: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 241: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 242: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 243: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 244: removing sequence [acceptable, InvalidAsn] expect failure tc 245: removing sequence [acceptable, InvalidAsn] expect failure tc 246: lonely sequence tag [acceptable, InvalidAsn] expect failure tc 247: lonely sequence tag [acceptable, InvalidAsn] expect failure tc 248: appending 0's to sequence [acceptable, InvalidAsn] expect failure tc 249: appending 0's to sequence [acceptable, InvalidAsn] expect failure tc 250: prepending 0's to sequence [acceptable, InvalidAsn] expect failure tc 251: prepending 0's to sequence [acceptable, InvalidAsn] expect failure tc 252: appending unused 0's to sequence [acceptable, InvalidAsn] expect failure tc 253: appending unused 0's to sequence [acceptable, InvalidAsn] expect failure tc 254: appending null value to sequence [acceptable, InvalidAsn] expect failure tc 255: appending null value to sequence [acceptable, InvalidAsn] expect failure tc 256: including garbage [acceptable, InvalidAsn] expect failure tc 257: including garbage [acceptable, InvalidAsn] expect failure tc 258: including garbage [acceptable, InvalidAsn] expect failure tc 259: including garbage [acceptable, InvalidAsn] expect failure tc 260: including garbage [acceptable, InvalidAsn] expect failure tc 261: including garbage [acceptable, InvalidAsn] expect failure tc 262: including garbage [acceptable, InvalidAsn] expect failure tc 263: including garbage [acceptable, InvalidAsn] expect failure tc 264: including garbage [acceptable, InvalidAsn] expect failure tc 265: including garbage [acceptable, InvalidAsn] expect failure tc 266: including garbage [acceptable, InvalidAsn] expect failure tc 267: including garbage [acceptable, InvalidAsn] expect failure tc 268: including garbage [acceptable, InvalidAsn] expect failure tc 269: including garbage [acceptable, InvalidAsn] expect failure tc 270: including garbage [acceptable, InvalidAsn] expect failure tc 271: including undefined tags [acceptable, InvalidAsn] expect failure tc 272: including undefined tags [acceptable, InvalidAsn] expect failure tc 273: including undefined tags [acceptable, InvalidAsn] expect failure tc 274: including undefined tags [acceptable, InvalidAsn] expect failure tc 275: including undefined tags [acceptable, InvalidAsn] expect failure tc 276: including undefined tags [acceptable, InvalidAsn] expect failure tc 277: including undefined tags [acceptable, InvalidAsn] expect failure tc 278: including undefined tags [acceptable, InvalidAsn] expect failure tc 279: including undefined tags [acceptable, InvalidAsn] expect failure tc 280: including undefined tags [acceptable, InvalidAsn] expect failure tc 281: truncated length of sequence [acceptable, InvalidAsn] expect failure tc 282: truncated length of sequence [acceptable, InvalidAsn] expect failure tc 283: Replacing sequence with NULL [acceptable, InvalidAsn] expect failure tc 284: Replacing sequence with NULL [acceptable, InvalidAsn] expect failure tc 285: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 286: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 287: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 288: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 289: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 290: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 291: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 292: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 293: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 294: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 295: dropping value of sequence [acceptable, InvalidAsn] expect failure tc 296: dropping value of sequence [acceptable, InvalidAsn] expect failure tc 297: truncated sequence [acceptable, InvalidAsn] expect failure tc 298: truncated sequence [acceptable, InvalidAsn] expect failure tc 299: truncated sequence [acceptable, InvalidAsn] expect failure tc 300: truncated sequence [acceptable, InvalidAsn] expect failure tc 301: indefinite length [acceptable, InvalidAsn] expect failure tc 302: indefinite length [acceptable, InvalidAsn] expect failure tc 303: indefinite length with truncated delimiter [acceptable, InvalidAsn] expect failure tc 304: indefinite length with truncated delimiter [acceptable, InvalidAsn] expect failure tc 305: indefinite length with additional element [acceptable, InvalidAsn] expect failure tc 306: indefinite length with additional element [acceptable, InvalidAsn] expect failure tc 307: indefinite length with truncated element [acceptable, InvalidAsn] expect failure tc 308: indefinite length with truncated element [acceptable, InvalidAsn] expect failure tc 309: indefinite length with garbage [acceptable, InvalidAsn] expect failure tc 310: indefinite length with garbage [acceptable, InvalidAsn] expect failure tc 311: indefinite length with nonempty EOC [acceptable, InvalidAsn] expect failure tc 312: indefinite length with nonempty EOC [acceptable, InvalidAsn] expect failure tc 313: prepend empty sequence [acceptable, InvalidAsn] expect failure tc 314: prepend empty sequence [acceptable, InvalidAsn] expect failure tc 315: append empty sequence [acceptable, InvalidAsn] expect failure tc 316: append empty sequence [acceptable, InvalidAsn] expect failure tc 317: append garbage with high tag number [acceptable, InvalidAsn] expect failure tc 318: append garbage with high tag number [acceptable, InvalidAsn] expect failure tc 319: sequence of sequence [acceptable, InvalidAsn] expect failure tc 320: sequence of sequence [acceptable, InvalidAsn] expect failure tc 321: truncated sequence: removed last 1 elements [acceptable, InvalidAsn] expect failure tc 322: truncated sequence: removed last 1 elements [acceptable, InvalidAsn] expect failure tc 323: repeating element in sequence [acceptable, InvalidAsn] expect failure tc 324: repeating element in sequence [acceptable, InvalidAsn] expect failure tc 325: long form encoding of length of oid [acceptable, InvalidAsn] expect failure tc 326: long form encoding of length of oid [acceptable, InvalidAsn] expect failure tc 327: length of oid contains leading 0 [acceptable, InvalidAsn] expect failure tc 328: length of oid contains leading 0 [acceptable, InvalidAsn] expect failure tc 329: wrong length of oid [acceptable, InvalidAsn] expect failure tc 330: wrong length of oid [acceptable, InvalidAsn] expect failure tc 331: wrong length of oid [acceptable, InvalidAsn] expect failure tc 332: wrong length of oid [acceptable, InvalidAsn] expect failure tc 333: uint32 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 334: uint32 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 335: uint64 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 336: uint64 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 337: length of oid = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 338: length of oid = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 339: length of oid = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 340: length of oid = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 341: length of oid = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 342: length of oid = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 343: length of oid = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 344: length of oid = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 345: incorrect length of oid [acceptable, InvalidAsn] expect failure tc 346: incorrect length of oid [acceptable, InvalidAsn] expect failure tc 347: removing oid [acceptable, InvalidAsn] expect failure tc 348: lonely oid tag [acceptable, InvalidAsn] expect failure tc 349: lonely oid tag [acceptable, InvalidAsn] expect failure tc 350: appending 0's to oid [acceptable, InvalidAsn] expect failure tc 351: appending 0's to oid [acceptable, InvalidAsn] expect failure tc 352: prepending 0's to oid [acceptable, InvalidAsn] expect failure tc 353: prepending 0's to oid [acceptable, InvalidAsn] expect failure tc 354: appending unused 0's to oid [acceptable, InvalidAsn] expect failure tc 355: appending null value to oid [acceptable, InvalidAsn] expect failure tc 356: appending null value to oid [acceptable, InvalidAsn] expect failure tc 357: truncated length of oid [acceptable, InvalidAsn] expect failure tc 358: truncated length of oid [acceptable, InvalidAsn] expect failure tc 359: Replacing oid with NULL [acceptable, InvalidAsn] expect failure tc 360: Replacing oid with NULL [acceptable, InvalidAsn] expect failure tc 361: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 362: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 363: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 364: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 365: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 366: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 367: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 368: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 369: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 370: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 371: dropping value of oid [acceptable, InvalidAsn] expect failure tc 372: dropping value of oid [acceptable, InvalidAsn] expect failure tc 373: modify first byte of oid [acceptable, InvalidAsn] expect failure tc 374: modify first byte of oid [acceptable, InvalidAsn] expect failure tc 375: modify last byte of oid [acceptable, InvalidAsn] expect failure tc 376: modify last byte of oid [acceptable, InvalidAsn] expect failure tc 377: truncated oid [acceptable, InvalidAsn] expect failure tc 378: truncated oid [acceptable, InvalidAsn] expect failure tc 379: truncated oid [acceptable, InvalidAsn] expect failure tc 380: truncated oid [acceptable, InvalidAsn] expect failure tc 381: wrong oid [acceptable, InvalidAsn] expect failure tc 382: wrong oid [acceptable, InvalidAsn] expect failure tc 383: wrong oid [acceptable, InvalidAsn] expect failure tc 384: wrong oid [acceptable, InvalidAsn] expect failure tc 385: longer oid [acceptable, InvalidAsn] expect failure tc 386: longer oid [acceptable, InvalidAsn] expect failure tc 387: oid with modified node [acceptable, InvalidAsn] expect failure tc 388: oid with modified node [acceptable, InvalidAsn] expect failure tc 389: oid with modified node [acceptable, InvalidAsn] expect failure tc 390: oid with modified node [acceptable, InvalidAsn] expect failure tc 391: large integer in oid [acceptable, InvalidAsn] expect failure tc 392: large integer in oid [acceptable, InvalidAsn] expect failure tc 393: oid with invalid node [acceptable, InvalidAsn] expect failure tc 394: oid with invalid node [acceptable, InvalidAsn] expect failure tc 395: oid with invalid node [acceptable, InvalidAsn] expect failure tc 396: oid with invalid node [acceptable, InvalidAsn] expect failure tc 397: long form encoding of length of bit string [acceptable, InvalidAsn] expect failure tc 398: length of bit string contains leading 0 [acceptable, InvalidAsn] expect failure tc 399: wrong length of bit string [acceptable, InvalidAsn] expect failure tc 400: wrong length of bit string [acceptable, InvalidAsn] expect failure tc 401: uint32 overflow in length of bit string [acceptable, InvalidAsn] expect failure tc 402: uint64 overflow in length of bit string [acceptable, InvalidAsn] expect failure tc 403: length of bit string = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 404: length of bit string = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 405: length of bit string = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 406: length of bit string = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 407: incorrect length of bit string [acceptable, InvalidAsn] expect failure tc 408: lonely bit string tag [acceptable, InvalidAsn] expect failure tc 409: appending 0's to bit string [acceptable, InvalidAsn] expect failure tc 410: prepending 0's to bit string [acceptable, InvalidAsn] expect failure tc 411: appending null value to bit string [acceptable, InvalidAsn] expect failure tc 412: truncated length of bit string [acceptable, InvalidAsn] expect failure tc 413: Replacing bit string with NULL [acceptable, InvalidAsn] expect failure tc 414: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 415: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 416: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 417: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 418: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 419: dropping value of bit string [acceptable, InvalidAsn] expect failure tc 420: modify first byte of bit string [acceptable, InvalidAsn] expect failure tc 421: modify last byte of bit string [acceptable, InvalidAsn] expect failure tc 422: truncated bit string [acceptable, InvalidAsn] expect failure tc 423: truncated bit string [acceptable, InvalidAsn] expect failure tc 424: declaring bits as unused in bit string [acceptable, InvalidAsn] expect failure tc 425: unused bits in bit string [acceptable, InvalidAsn] expect failure tc 426: unused bits in empty bit-string [acceptable, InvalidAsn] expect failure tc 427: 128 unused bits [acceptable, InvalidAsn] expect failure Run test 1 Run test 2 Run test 3 Run test 4 Run test 5 Run test 6 Run test 7 Run test 8 Run test 9 Run test 10 Run test 11 Run test 12 Run test 13 Run test 14 Run test 15 Run test 16 Run test 17 Run test 18 Run test 19 Run test 20 Run test 21 Run test 22 Run test 23 Run test 24 Run test 25 Run test 26 Run test 27 Run test 28 Run test 29 Run test 30 Run test 31 Run test 32 Run test 33 Run test 34 Run test 35 Run test 36 Run test 37 Run test 38 Run test 39 Run test 40 Run test 41 Run test 42 Run test 43 Run test 44 Run test 45 Run test 46 Run test 47 Run test 48 Run test 49 Run test 50 Run test 51 Run test 52 Run test 53 Run test 54 Run test 55 Run test 56 Run test 57 Run test 58 Run test 59 Run test 60 Run test 61 Run test 62 Run test 63 Run test 64 Run test 65 Run test 66 Run test 67 Run test 68 Run test 69 Run test 70 Run test 71 Run test 72 Run test 73 Run test 74 Run test 75 Run test 76 Run test 77 Run test 78 Run test 79 Run test 80 Run test 81 Run test 82 Run test 83 Run test 84 Run test 85 Run test 86 Run test 87 Run test 88 Run test 89 Run test 90 Run test 91 Run test 92 Run test 93 Run test 94 Run test 95 Run test 96 Run test 97 Run test 98 Run test 99 Run test 100 Run test 101 Run test 102 Run test 103 Run test 104 Run test 105 Run test 106 Run test 107 Run test 108 Run test 109 Run test 110 Run test 111 Run test 112 Run test 113 Run test 114 Run test 115 Run test 116 Run test 117 Run test 118 Run test 119 Run test 120 Run test 121 Run test 122 Run test 123 Run test 124 Run test 125 Run test 126 Run test 127 Run test 128 Run test 129 Run test 130 Run test 131 Run test 132 Run test 133 Run test 134 Run test 135 Run test 136 Run test 137 Run test 138 Run test 139 Run test 140 Run test 141 Run test 142 Run test 143 Run test 144 Run test 145 Run test 146 Run test 147 Run test 148 Run test 149 Run test 150 Run test 151 Run test 152 Run test 153 Run test 154 Run test 155 Run test 156 Run test 157 Run test 158 Run test 159 Run test 160 Run test 161 Run test 162 Run test 163 Run test 164 Run test 165 Run test 166 Run test 167 Run test 168 Run test 169 Run test 170 Run test 171 Run test 172 Run test 173 Run test 174 Run test 175 Run test 176 Run test 177 Run test 178 Run test 179 Run test 180 Run test 181 Run test 182 Run test 183 Run test 184 Run test 185 Run test 186 Run test 187 Run test 188 Run test 189 Run test 190 Run test 191 Run test 192 Run test 193 Run test 194 Run test 195 Run test 196 Run test 197 Run test 198 Run test 199 Run test 200 Run test 201 Run test 202 Run test 203 Run test 204 Run test 205 Run test 206 Run test 207 Run test 208 Run test 209 Run test 210 Run test 211 Run test 212 Run test 213 Run test 214 Run test 215 Run test 216 Run test 217 Run test 218 Run test 219 Run test 220 Run test 221 Run test 222 Run test 223 Run test 224 Run test 225 Run test 226 Run test 227 Run test 228 Run test 229 Run test 230 Run test 231 Run test 232 Run test 233 Run test 234 Run test 235 Run test 236 Run test 237 Run test 238 Run test 239 Run test 240 Run test 241 Run test 242 Run test 243 Run test 244 Run test 245 Run test 246 Run test 247 Run test 248 Run test 249 Run test 250 Run test 251 Run test 252 Run test 253 Run test 254 Run test 255 Run test 256 Run test 257 Run test 258 Run test 259 Run test 260 Run test 261 Run test 262 Run test 263 Run test 264 Run test 265 Run test 266 Run test 267 Run test 268 Run test 269 Run test 270 Run test 271 Run test 272 Run test 273 Run test 274 Run test 275 Run test 276 Run test 277 Run test 278 Run test 279 Run test 280 Run test 281 Run test 282 Run test 283 Run test 284 Run test 285 Run test 286 Run test 287 Run test 288 Run test 289 Run test 290 Run test 291 Run test 292 Run test 293 Run test 294 Run test 295 Run test 296 Run test 297 Run test 298 Run test 299 Run test 300 Run test 301 Run test 302 Run test 303 Run test 304 Run test 305 Run test 306 Run test 307 Run test 308 Run test 309 Run test 310 Run test 311 Run test 312 Run test 313 Run test 314 Run test 315 Run test 316 Run test 317 Run test 318 Run test 319 Run test 320 Run test 321 Run test 322 Run test 323 Run test 324 Run test 325 Run test 326 Run test 327 Run test 328 Run test 329 Run test 330 Run test 331 Run test 332 Run test 333 Run test 334 Run test 335 Run test 336 Run test 337 Run test 338 Run test 339 Run test 340 Run test 341 Run test 342 Run test 343 Run test 344 Run test 345 Run test 346 Run test 347 Run test 348 Run test 349 Run test 350 Run test 351 Run test 352 Run test 353 Run test 354 Run test 355 Run test 356 Run test 357 Run test 358 Run test 359 Run test 360 Run test 361 Run test 362 Run test 363 Run test 364 Run test 365 Run test 366 Run test 367 Run test 368 Run test 369 Run test 370 Run test 371 Run test 372 Run test 373 Run test 374 Run test 375 Run test 376 Run test 377 Run test 378 Run test 379 Run test 380 Run test 381 Run test 382 Run test 383 Run test 384 Run test 385 Run test 386 Run test 387 Run test 388 Run test 389 Run test 390 Run test 391 Run test 392 Run test 393 Run test 394 Run test 395 Run test 396 Run test 397 Run test 398 Run test 399 Run test 400 Run test 401 Run test 402 Run test 403 Run test 404 Run test 405 Run test 406 Run test 407 Run test 408 Run test 409 Run test 410 Run test 411 Run test 412 Run test 413 Run test 414 Run test 415 Run test 416 Run test 417 Run test 418 Run test 419 Run test 420 Run test 421 Run test 422 Run test 423 Run test 424 Run test 425 Run test 426 Run test 427 [ OK ] Pkcs11EcdhTest.P384 (1148 ms) [ RUN ] Pkcs11EcdhTest.P521 Reading tests from: ecdh_secp521r1_test.json Test vectors of type EcdhTest are intended for testing an ECDH implementations using X509 encoded public keys and integers for private keys. Test vectors of this format are useful for testing Java providers. AddSubChain: The private key has a special value. Implementations using addition subtraction chains for the point multiplication may get the point at infinity as an intermediate result. See CVE_2017_10176 CVE_2017_10176: This test vector leads to an EC point multiplication where an intermediate result can be the point at infinity, if addition-subtraction chains are used to speed up the point multiplication. CompressedPoint: The point in the public key is compressed. Not every library supports points in compressed format. InvalidAsn: The public key in this test uses an invalid ASN encoding. Some cases where the ASN parser is not strictly checking the ASN format are benign as long as the ECDH computation still returns the correct shared value. InvalidPublic: The public key has been modified and is invalid. An implementation should always check whether the public key is valid and on the same curve as the private key. The test vector includes the shared secret computed with the original public key if the public point is on the curve of the private key. Generating a shared secret other than the one with the original key likely indicates that the bug is exploitable. ModifiedPrime: The modulus of the public key has been modified. The public point of the public key has been chosen so that it is both a point on both the curve of the modified public key and the private key. UnnamedCurve: The public key does not use a named curve. RFC 3279 allows to encode such curves by explicitly encoding, the parameters of the curve equation, modulus, generator, order and cofactor. However, many crypto libraries only support named curves. Modifying some of the EC parameters and encoding the corresponding public key as an unnamed curve is a potential attack vector. UnusedParam: A parameter that is typically not used for ECDH has been modified. Sometimes libraries ignore small differences between public and private key. For example, a library might ignore an incorrect cofactor in the public key. We consider ignoring such changes as acceptable as long as these differences do not change the outcome of the ECDH computation, i.e. as long as the computation is done on the curve from the private key. WeakPublicKey: The vector contains a weak public key. The curve is not a named curve, the public key point has order 3 and has been chosen to be on the same curve as the private key. This test vector is used to check ECC implementations for missing steps in the verification of the public key. WrongOrder: The order of the public key has been modified. If this order is used in a cryptographic primitive instead of the correct order then private keys may leak. E.g. ECDHC in BC 1.52 suffered from this. tc 1: normal case [valid] expect success tc 2: compressed public key [acceptable, CompressedPoint] expect failure tc 3: edge case for shared secret [valid] expect success tc 4: edge case for shared secret [valid] expect success tc 5: edge case for shared secret [valid] expect success tc 6: edge case for shared secret [valid] expect success tc 7: edge case for shared secret [valid] expect success tc 8: edge case for shared secret [valid] expect success tc 9: edge case for shared secret [valid] expect success tc 10: edge case for shared secret [valid] expect success tc 11: edge case for shared secret [valid] expect success tc 12: edge case for shared secret [valid] expect success tc 13: edge case for shared secret [valid] expect success tc 14: edge case for shared secret [valid] expect success tc 15: edge case for shared secret [valid] expect success tc 16: edge case for shared secret [valid] expect success tc 17: edge case for shared secret [valid] expect success tc 18: edge case for shared secret [valid] expect success tc 19: edge case for shared secret [valid] expect success tc 20: edge cases for ephemeral key [valid] expect success tc 21: edge cases for ephemeral key [valid] expect success tc 22: edge cases for ephemeral key [valid] expect success tc 23: edge cases for ephemeral key [valid] expect success tc 24: edge cases for ephemeral key [valid] expect success tc 25: edge cases for ephemeral key [valid] expect success tc 26: edge cases for ephemeral key [valid] expect success tc 27: edge cases for ephemeral key [valid] expect success tc 28: edge cases for ephemeral key [valid] expect success tc 29: edge cases for ephemeral key [valid] expect success tc 30: edge cases for ephemeral key [valid] expect success tc 31: edge cases for ephemeral key [valid] expect success tc 32: edge cases for ephemeral key [valid] expect success tc 33: edge cases for ephemeral key [valid] expect success tc 34: edge cases for ephemeral key [valid] expect success tc 35: edge cases for ephemeral key [valid] expect success tc 36: edge cases for ephemeral key [valid] expect success tc 37: edge case for Jacobian and projective coordinates [valid] expect success tc 38: edge case for Jacobian and projective coordinates [valid] expect success tc 39: edge case for Jacobian and projective coordinates [valid] expect success tc 40: edge case for Jacobian and projective coordinates [valid] expect success tc 41: edge case for Jacobian and projective coordinates [valid] expect success tc 42: edge case for Jacobian and projective coordinates [valid] expect success tc 43: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 44: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 45: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 46: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 47: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 48: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 49: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 50: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 51: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 52: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 53: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 54: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 55: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 56: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 57: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 58: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 59: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 60: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 61: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 62: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 63: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 64: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 65: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 66: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 67: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 68: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 69: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 70: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 71: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 72: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 73: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 74: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 75: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 76: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 77: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 78: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 79: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 80: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 81: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 82: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 83: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 84: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 85: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 86: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 87: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 88: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 89: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 90: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 91: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 92: edge case for Jacobian and projective coordinates in left to right addition chain [valid] expect success tc 93: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 94: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 95: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 96: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 97: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 98: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 99: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 100: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 101: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 102: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 103: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 104: edge case for Jacobian and projective coordinates in precomputation or right to left addition chain [valid] expect success tc 105: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 106: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 107: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 108: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 109: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 110: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 111: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 112: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 113: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 114: edge case for Jacobian and projective coordinates in right to left addition chain [valid] expect success tc 115: point with coordinate x = 0 [valid] expect success tc 116: point with coordinate x = 0 [valid] expect success tc 117: point with coordinate x = 0 [valid] expect success tc 118: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 119: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 120: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 121: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 122: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 123: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 124: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 125: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 126: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 127: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 128: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 129: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 130: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 131: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 132: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 133: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 134: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 135: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 136: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 137: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 138: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 139: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 140: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 141: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 142: point with coordinate x = 0 in left to right addition chain [valid] expect success tc 143: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 144: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 145: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 146: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 147: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 148: point with coordinate x = 0 in precomputation or right to left addition chain [valid] expect success tc 149: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 150: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 151: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 152: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 153: point with coordinate x = 0 in right to left addition chain [valid] expect success tc 154: point with coordinate y = 1 [valid] expect success tc 155: point with coordinate y = 1 [valid] expect success tc 156: point with coordinate y = 1 [valid] expect success tc 157: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 158: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 159: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 160: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 161: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 162: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 163: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 164: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 165: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 166: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 167: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 168: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 169: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 170: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 171: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 172: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 173: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 174: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 175: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 176: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 177: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 178: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 179: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 180: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 181: point with coordinate y = 1 in left to right addition chain [valid] expect success tc 182: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 183: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 184: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 185: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 186: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 187: point with coordinate y = 1 in precomputation or right to left addition chain [valid] expect success tc 188: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 189: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 190: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 191: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 192: point with coordinate y = 1 in right to left addition chain [valid] expect success tc 193: edge case private key [valid] expect success tc 194: edge case private key [valid] expect success tc 195: edge case private key [valid] expect success tc 196: edge case private key [valid] expect success tc 197: edge case private key [valid] expect success tc 198: edge case private key [valid] expect success tc 199: edge case private key [valid] expect success tc 200: edge case private key [valid] expect success tc 201: edge case private key [valid] expect success tc 202: edge case private key [valid, AddSubChain] expect success tc 203: edge case private key [valid, AddSubChain] expect success tc 204: edge case private key [valid, AddSubChain] expect success tc 205: edge case private key [valid, AddSubChain] expect success tc 206: edge case private key [valid, AddSubChain] expect success tc 207: edge case private key [valid] expect success tc 208: edge case private key [valid, AddSubChain] expect success tc 209: CVE-2017-10176: Issue with elliptic curve addition [valid, CVE_2017_10176] expect success tc 210: point is not on curve [invalid] expect failure tc 211: point is not on curve [invalid] expect failure tc 212: point is not on curve [invalid] expect failure tc 213: point is not on curve [invalid] expect failure tc 214: point is not on curve [invalid] expect failure tc 215: point is not on curve [invalid] expect failure tc 216: point is not on curve [invalid] expect failure tc 217: point is not on curve [invalid] expect failure tc 218: point is not on curve [invalid] expect failure tc 219: point is not on curve [invalid] expect failure tc 220: point is not on curve [invalid] expect failure tc 221: point is not on curve [invalid] expect failure tc 222: point is not on curve [invalid] expect failure tc 223: point is not on curve [invalid] expect failure tc 224: point is not on curve [invalid] expect failure tc 225: point is not on curve [invalid] expect failure tc 226: [invalid] expect failure tc 227: public point not on curve [invalid, InvalidPublic] expect failure tc 228: public point = (0,0) [invalid, InvalidPublic] expect failure tc 229: order = -6864797660130609714981900799081393217269435300143305409394463459185543183397655394245057746333217197532963996371363321113864768612440380340372808892707005449 [invalid, WrongOrder, InvalidPublic, UnnamedCurve] expect failure tc 230: order = 0 [invalid, WrongOrder, InvalidPublic, UnnamedCurve] expect failure tc 231: order = 1 [acceptable, WrongOrder, UnusedParam, UnnamedCurve] expect failure tc 232: order = 1598335257761788022467377781654101148543282249044465229239888363328190330275719844327554513312228302828260696579553960150541916632196023208175974174 [acceptable, WrongOrder, UnusedParam, UnnamedCurve] expect failure tc 233: generator = (0,0) [acceptable, UnusedParam, UnnamedCurve] expect failure tc 234: generator not on curve [acceptable, UnusedParam, UnnamedCurve] expect failure tc 235: cofactor = -1 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 236: cofactor = 0 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 237: cofactor = 2 [acceptable, UnusedParam, UnnamedCurve] expect failure tc 238: cofactor = 6864797660130609714981900799081393217269435300143305409394463459185543183397655394245057746333217197532963996371363321113864768612440380340372808892707005449 [invalid, InvalidPublic, UnnamedCurve] expect failure tc 239: cofactor = None [acceptable, UnusedParam, UnnamedCurve] expect failure tc 240: modified prime [invalid, ModifiedPrime, InvalidPublic, UnnamedCurve] expect failure tc 241: using secp224r1 [invalid, InvalidPublic] expect failure tc 242: using secp256r1 [invalid, InvalidPublic] expect failure tc 243: using secp256k1 [invalid, InvalidPublic] expect failure tc 244: a = 0 [acceptable, UnusedParam, UnnamedCurve] expect failure tc 245: public key of order 3 [invalid, WeakPublicKey, InvalidPublic, UnnamedCurve] expect failure tc 246: Public key uses wrong curve: secp224r1 [invalid] expect failure tc 247: Public key uses wrong curve: secp256r1 [invalid] expect failure tc 248: Public key uses wrong curve: secp384r1 [invalid] expect failure tc 249: Public key uses wrong curve: secp256k1 [invalid] expect failure tc 250: Public key uses wrong curve: secp224k1 [invalid] expect failure tc 251: Public key uses wrong curve: brainpoolP224r1 [invalid] expect failure tc 252: Public key uses wrong curve: brainpoolP256r1 [invalid] expect failure tc 253: Public key uses wrong curve: brainpoolP320r1 [invalid] expect failure tc 254: Public key uses wrong curve: brainpoolP384r1 [invalid] expect failure tc 255: Public key uses wrong curve: brainpoolP512r1 [invalid] expect failure tc 256: Public key uses wrong curve: brainpoolP224t1 [invalid] expect failure tc 257: Public key uses wrong curve: brainpoolP256t1 [invalid] expect failure tc 258: Public key uses wrong curve: brainpoolP320t1 [invalid] expect failure tc 259: Public key uses wrong curve: brainpoolP384t1 [invalid] expect failure tc 260: Public key uses wrong curve: brainpoolP512t1 [invalid] expect failure tc 261: invalid public key [invalid, CompressedPoint] expect failure tc 262: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 263: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 264: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 265: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 266: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 267: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 268: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 269: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 270: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 271: public key is a low order point on twist [invalid, CompressedPoint] expect failure tc 272: length of sequence contains leading 0 [acceptable, InvalidAsn] expect failure tc 273: length of sequence contains leading 0 [acceptable, InvalidAsn] expect failure tc 274: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 275: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 276: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 277: wrong length of sequence [acceptable, InvalidAsn] expect failure tc 278: uint32 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 279: uint32 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 280: uint64 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 281: uint64 overflow in length of sequence [acceptable, InvalidAsn] expect failure tc 282: length of sequence = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 283: length of sequence = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 284: length of sequence = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 285: length of sequence = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 286: length of sequence = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 287: length of sequence = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 288: length of sequence = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 289: length of sequence = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 290: incorrect length of sequence [acceptable, InvalidAsn] expect failure tc 291: incorrect length of sequence [acceptable, InvalidAsn] expect failure tc 292: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 293: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 294: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 295: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 296: indefinite length without termination [acceptable, InvalidAsn] expect failure tc 297: removing sequence [acceptable, InvalidAsn] expect failure tc 298: removing sequence [acceptable, InvalidAsn] expect failure tc 299: lonely sequence tag [acceptable, InvalidAsn] expect failure tc 300: lonely sequence tag [acceptable, InvalidAsn] expect failure tc 301: appending 0's to sequence [acceptable, InvalidAsn] expect failure tc 302: appending 0's to sequence [acceptable, InvalidAsn] expect failure tc 303: prepending 0's to sequence [acceptable, InvalidAsn] expect failure tc 304: prepending 0's to sequence [acceptable, InvalidAsn] expect failure tc 305: appending unused 0's to sequence [acceptable, InvalidAsn] expect failure tc 306: appending unused 0's to sequence [acceptable, InvalidAsn] expect failure tc 307: appending null value to sequence [acceptable, InvalidAsn] expect failure tc 308: appending null value to sequence [acceptable, InvalidAsn] expect failure tc 309: including garbage [acceptable, InvalidAsn] expect failure tc 310: including garbage [acceptable, InvalidAsn] expect failure tc 311: including garbage [acceptable, InvalidAsn] expect failure tc 312: including garbage [acceptable, InvalidAsn] expect failure tc 313: including garbage [acceptable, InvalidAsn] expect failure tc 314: including garbage [acceptable, InvalidAsn] expect failure tc 315: including garbage [acceptable, InvalidAsn] expect failure tc 316: including garbage [acceptable, InvalidAsn] expect failure tc 317: including garbage [acceptable, InvalidAsn] expect failure tc 318: including garbage [acceptable, InvalidAsn] expect failure tc 319: including garbage [acceptable, InvalidAsn] expect failure tc 320: including garbage [acceptable, InvalidAsn] expect failure tc 321: including garbage [acceptable, InvalidAsn] expect failure tc 322: including garbage [acceptable, InvalidAsn] expect failure tc 323: including garbage [acceptable, InvalidAsn] expect failure tc 324: including undefined tags [acceptable, InvalidAsn] expect failure tc 325: including undefined tags [acceptable, InvalidAsn] expect failure tc 326: including undefined tags [acceptable, InvalidAsn] expect failure tc 327: including undefined tags [acceptable, InvalidAsn] expect failure tc 328: including undefined tags [acceptable, InvalidAsn] expect failure tc 329: including undefined tags [acceptable, InvalidAsn] expect failure tc 330: including undefined tags [acceptable, InvalidAsn] expect failure tc 331: including undefined tags [acceptable, InvalidAsn] expect failure tc 332: including undefined tags [acceptable, InvalidAsn] expect failure tc 333: including undefined tags [acceptable, InvalidAsn] expect failure tc 334: truncated length of sequence [acceptable, InvalidAsn] expect failure tc 335: truncated length of sequence [acceptable, InvalidAsn] expect failure tc 336: Replacing sequence with NULL [acceptable, InvalidAsn] expect failure tc 337: Replacing sequence with NULL [acceptable, InvalidAsn] expect failure tc 338: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 339: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 340: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 341: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 342: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 343: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 344: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 345: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 346: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 347: changing tag value of sequence [acceptable, InvalidAsn] expect failure tc 348: dropping value of sequence [acceptable, InvalidAsn] expect failure tc 349: dropping value of sequence [acceptable, InvalidAsn] expect failure tc 350: truncated sequence [acceptable, InvalidAsn] expect failure tc 351: truncated sequence [acceptable, InvalidAsn] expect failure tc 352: truncated sequence [acceptable, InvalidAsn] expect failure tc 353: truncated sequence [acceptable, InvalidAsn] expect failure tc 354: indefinite length [acceptable, InvalidAsn] expect failure tc 355: indefinite length [acceptable, InvalidAsn] expect failure tc 356: indefinite length with truncated delimiter [acceptable, InvalidAsn] expect failure tc 357: indefinite length with truncated delimiter [acceptable, InvalidAsn] expect failure tc 358: indefinite length with additional element [acceptable, InvalidAsn] expect failure tc 359: indefinite length with additional element [acceptable, InvalidAsn] expect failure tc 360: indefinite length with truncated element [acceptable, InvalidAsn] expect failure tc 361: indefinite length with truncated element [acceptable, InvalidAsn] expect failure tc 362: indefinite length with garbage [acceptable, InvalidAsn] expect failure tc 363: indefinite length with garbage [acceptable, InvalidAsn] expect failure tc 364: indefinite length with nonempty EOC [acceptable, InvalidAsn] expect failure tc 365: indefinite length with nonempty EOC [acceptable, InvalidAsn] expect failure tc 366: prepend empty sequence [acceptable, InvalidAsn] expect failure tc 367: prepend empty sequence [acceptable, InvalidAsn] expect failure tc 368: append empty sequence [acceptable, InvalidAsn] expect failure tc 369: append empty sequence [acceptable, InvalidAsn] expect failure tc 370: append garbage with high tag number [acceptable, InvalidAsn] expect failure tc 371: append garbage with high tag number [acceptable, InvalidAsn] expect failure tc 372: sequence of sequence [acceptable, InvalidAsn] expect failure tc 373: sequence of sequence [acceptable, InvalidAsn] expect failure tc 374: truncated sequence: removed last 1 elements [acceptable, InvalidAsn] expect failure tc 375: truncated sequence: removed last 1 elements [acceptable, InvalidAsn] expect failure tc 376: repeating element in sequence [acceptable, InvalidAsn] expect failure tc 377: repeating element in sequence [acceptable, InvalidAsn] expect failure tc 378: long form encoding of length of sequence [acceptable, InvalidAsn] expect failure tc 379: long form encoding of length of oid [acceptable, InvalidAsn] expect failure tc 380: long form encoding of length of oid [acceptable, InvalidAsn] expect failure tc 381: length of oid contains leading 0 [acceptable, InvalidAsn] expect failure tc 382: length of oid contains leading 0 [acceptable, InvalidAsn] expect failure tc 383: wrong length of oid [acceptable, InvalidAsn] expect failure tc 384: wrong length of oid [acceptable, InvalidAsn] expect failure tc 385: wrong length of oid [acceptable, InvalidAsn] expect failure tc 386: wrong length of oid [acceptable, InvalidAsn] expect failure tc 387: uint32 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 388: uint32 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 389: uint64 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 390: uint64 overflow in length of oid [acceptable, InvalidAsn] expect failure tc 391: length of oid = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 392: length of oid = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 393: length of oid = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 394: length of oid = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 395: length of oid = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 396: length of oid = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 397: length of oid = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 398: length of oid = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 399: incorrect length of oid [acceptable, InvalidAsn] expect failure tc 400: incorrect length of oid [acceptable, InvalidAsn] expect failure tc 401: removing oid [acceptable, InvalidAsn] expect failure tc 402: lonely oid tag [acceptable, InvalidAsn] expect failure tc 403: lonely oid tag [acceptable, InvalidAsn] expect failure tc 404: appending 0's to oid [acceptable, InvalidAsn] expect failure tc 405: appending 0's to oid [acceptable, InvalidAsn] expect failure tc 406: prepending 0's to oid [acceptable, InvalidAsn] expect failure tc 407: prepending 0's to oid [acceptable, InvalidAsn] expect failure tc 408: appending unused 0's to oid [acceptable, InvalidAsn] expect failure tc 409: appending null value to oid [acceptable, InvalidAsn] expect failure tc 410: appending null value to oid [acceptable, InvalidAsn] expect failure tc 411: truncated length of oid [acceptable, InvalidAsn] expect failure tc 412: truncated length of oid [acceptable, InvalidAsn] expect failure tc 413: Replacing oid with NULL [acceptable, InvalidAsn] expect failure tc 414: Replacing oid with NULL [acceptable, InvalidAsn] expect failure tc 415: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 416: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 417: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 418: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 419: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 420: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 421: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 422: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 423: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 424: changing tag value of oid [acceptable, InvalidAsn] expect failure tc 425: dropping value of oid [acceptable, InvalidAsn] expect failure tc 426: dropping value of oid [acceptable, InvalidAsn] expect failure tc 427: modify first byte of oid [acceptable, InvalidAsn] expect failure tc 428: modify first byte of oid [acceptable, InvalidAsn] expect failure tc 429: modify last byte of oid [acceptable, InvalidAsn] expect failure tc 430: modify last byte of oid [acceptable, InvalidAsn] expect failure tc 431: truncated oid [acceptable, InvalidAsn] expect failure tc 432: truncated oid [acceptable, InvalidAsn] expect failure tc 433: truncated oid [acceptable, InvalidAsn] expect failure tc 434: truncated oid [acceptable, InvalidAsn] expect failure tc 435: wrong oid [acceptable, InvalidAsn] expect failure tc 436: wrong oid [acceptable, InvalidAsn] expect failure tc 437: wrong oid [acceptable, InvalidAsn] expect failure tc 438: wrong oid [acceptable, InvalidAsn] expect failure tc 439: longer oid [acceptable, InvalidAsn] expect failure tc 440: longer oid [acceptable, InvalidAsn] expect failure tc 441: oid with modified node [acceptable, InvalidAsn] expect failure tc 442: oid with modified node [acceptable, InvalidAsn] expect failure tc 443: oid with modified node [acceptable, InvalidAsn] expect failure tc 444: oid with modified node [acceptable, InvalidAsn] expect failure tc 445: large integer in oid [acceptable, InvalidAsn] expect failure tc 446: large integer in oid [acceptable, InvalidAsn] expect failure tc 447: oid with invalid node [acceptable, InvalidAsn] expect failure tc 448: oid with invalid node [acceptable, InvalidAsn] expect failure tc 449: oid with invalid node [acceptable, InvalidAsn] expect failure tc 450: oid with invalid node [acceptable, InvalidAsn] expect failure tc 451: length of bit string contains leading 0 [acceptable, InvalidAsn] expect failure tc 452: wrong length of bit string [acceptable, InvalidAsn] expect failure tc 453: wrong length of bit string [acceptable, InvalidAsn] expect failure tc 454: uint32 overflow in length of bit string [acceptable, InvalidAsn] expect failure tc 455: uint64 overflow in length of bit string [acceptable, InvalidAsn] expect failure tc 456: length of bit string = 2**31 - 1 [acceptable, InvalidAsn] expect failure tc 457: length of bit string = 2**32 - 1 [acceptable, InvalidAsn] expect failure tc 458: length of bit string = 2**40 - 1 [acceptable, InvalidAsn] expect failure tc 459: length of bit string = 2**64 - 1 [acceptable, InvalidAsn] expect failure tc 460: incorrect length of bit string [acceptable, InvalidAsn] expect failure tc 461: lonely bit string tag [acceptable, InvalidAsn] expect failure tc 462: appending 0's to bit string [acceptable, InvalidAsn] expect failure tc 463: prepending 0's to bit string [acceptable, InvalidAsn] expect failure tc 464: appending null value to bit string [acceptable, InvalidAsn] expect failure tc 465: truncated length of bit string [acceptable, InvalidAsn] expect failure tc 466: Replacing bit string with NULL [acceptable, InvalidAsn] expect failure tc 467: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 468: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 469: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 470: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 471: changing tag value of bit string [acceptable, InvalidAsn] expect failure tc 472: dropping value of bit string [acceptable, InvalidAsn] expect failure tc 473: modify first byte of bit string [acceptable, InvalidAsn] expect failure tc 474: modify last byte of bit string [acceptable, InvalidAsn] expect failure tc 475: truncated bit string [acceptable, InvalidAsn] expect failure tc 476: truncated bit string [acceptable, InvalidAsn] expect failure tc 477: declaring bits as unused in bit string [acceptable, InvalidAsn] expect failure tc 478: unused bits in bit string [acceptable, InvalidAsn] expect failure tc 479: unused bits in empty bit-string [acceptable, InvalidAsn] expect failure tc 480: 128 unused bits [acceptable, InvalidAsn] expect failure Run test 1 Run test 2 Run test 3 Run test 4 Run test 5 Run test 6 Run test 7 Run test 8 Run test 9 Run test 10 Run test 11 Run test 12 Run test 13 Run test 14 Run test 15 Run test 16 Run test 17 Run test 18 Run test 19 Run test 20 Run test 21 Run test 22 Run test 23 Run test 24 Run test 25 Run test 26 Run test 27 Run test 28 Run test 29 Run test 30 Run test 31 Run test 32 Run test 33 Run test 34 Run test 35 Run test 36 Run test 37 Run test 38 Run test 39 Run test 40 Run test 41 Run test 42 Run test 43 Run test 44 Run test 45 Run test 46 Run test 47 Run test 48 Run test 49 Run test 50 Run test 51 Run test 52 Run test 53 Run test 54 Run test 55 Run test 56 Run test 57 Run test 58 Run test 59 Run test 60 Run test 61 Run test 62 Run test 63 Run test 64 Run test 65 Run test 66 Run test 67 Run test 68 Run test 69 Run test 70 Run test 71 Run test 72 Run test 73 Run test 74 Run test 75 Run test 76 Run test 77 Run test 78 Run test 79 Run test 80 Run test 81 Run test 82 Run test 83 Run test 84 Run test 85 Run test 86 Run test 87 Run test 88 Run test 89 Run test 90 Run test 91 Run test 92 Run test 93 Run test 94 Run test 95 Run test 96 Run test 97 Run test 98 Run test 99 Run test 100 Run test 101 Run test 102 Run test 103 Run test 104 Run test 105 Run test 106 Run test 107 Run test 108 Run test 109 Run test 110 Run test 111 Run test 112 Run test 113 Run test 114 Run test 115 Run test 116 Run test 117 Run test 118 Run test 119 Run test 120 Run test 121 Run test 122 Run test 123 Run test 124 Run test 125 Run test 126 Run test 127 Run test 128 Run test 129 Run test 130 Run test 131 Run test 132 Run test 133 Run test 134 Run test 135 Run test 136 Run test 137 Run test 138 Run test 139 Run test 140 Run test 141 Run test 142 Run test 143 Run test 144 Run test 145 Run test 146 Run test 147 Run test 148 Run test 149 Run test 150 Run test 151 Run test 152 Run test 153 Run test 154 Run test 155 Run test 156 Run test 157 Run test 158 Run test 159 Run test 160 Run test 161 Run test 162 Run test 163 Run test 164 Run test 165 Run test 166 Run test 167 Run test 168 Run test 169 Run test 170 Run test 171 Run test 172 Run test 173 Run test 174 Run test 175 Run test 176 Run test 177 Run test 178 Run test 179 Run test 180 Run test 181 Run test 182 Run test 183 Run test 184 Run test 185 Run test 186 Run test 187 Run test 188 Run test 189 Run test 190 Run test 191 Run test 192 Run test 193 Run test 194 Run test 195 Run test 196 Run test 197 Run test 198 Run test 199 Run test 200 Run test 201 Run test 202 Run test 203 Run test 204 Run test 205 Run test 206 Run test 207 Run test 208 Run test 209 Run test 210 Run test 211 Run test 212 Run test 213 Run test 214 Run test 215 Run test 216 Run test 217 Run test 218 Run test 219 Run test 220 Run test 221 Run test 222 Run test 223 Run test 224 Run test 225 Run test 226 Run test 227 Run test 228 Run test 229 Run test 230 Run test 231 Run test 232 Run test 233 Run test 234 Run test 235 Run test 236 Run test 237 Run test 238 Run test 239 Run test 240 Run test 241 Run test 242 Run test 243 Run test 244 Run test 245 Run test 246 Run test 247 Run test 248 Run test 249 Run test 250 Run test 251 Run test 252 Run test 253 Run test 254 Run test 255 Run test 256 Run test 257 Run test 258 Run test 259 Run test 260 Run test 261 Run test 262 Run test 263 Run test 264 Run test 265 Run test 266 Run test 267 Run test 268 Run test 269 Run test 270 Run test 271 Run test 272 Run test 273 Run test 274 Run test 275 Run test 276 Run test 277 Run test 278 Run test 279 Run test 280 Run test 281 Run test 282 Run test 283 Run test 284 Run test 285 Run test 286 Run test 287 Run test 288 Run test 289 Run test 290 Run test 291 Run test 292 Run test 293 Run test 294 Run test 295 Run test 296 Run test 297 Run test 298 Run test 299 Run test 300 Run test 301 Run test 302 Run test 303 Run test 304 Run test 305 Run test 306 Run test 307 Run test 308 Run test 309 Run test 310 Run test 311 Run test 312 Run test 313 Run test 314 Run test 315 Run test 316 Run test 317 Run test 318 Run test 319 Run test 320 Run test 321 Run test 322 Run test 323 Run test 324 Run test 325 Run test 326 Run test 327 Run test 328 Run test 329 Run test 330 Run test 331 Run test 332 Run test 333 Run test 334 Run test 335 Run test 336 Run test 337 Run test 338 Run test 339 Run test 340 Run test 341 Run test 342 Run test 343 Run test 344 Run test 345 Run test 346 Run test 347 Run test 348 Run test 349 Run test 350 Run test 351 Run test 352 Run test 353 Run test 354 Run test 355 Run test 356 Run test 357 Run test 358 Run test 359 Run test 360 Run test 361 Run test 362 Run test 363 Run test 364 Run test 365 Run test 366 Run test 367 Run test 368 Run test 369 Run test 370 Run test 371 Run test 372 Run test 373 Run test 374 Run test 375 Run test 376 Run test 377 Run test 378 Run test 379 Run test 380 Run test 381 Run test 382 Run test 383 Run test 384 Run test 385 Run test 386 Run test 387 Run test 388 Run test 389 Run test 390 Run test 391 Run test 392 Run test 393 Run test 394 Run test 395 Run test 396 Run test 397 Run test 398 Run test 399 Run test 400 Run test 401 Run test 402 Run test 403 Run test 404 Run test 405 Run test 406 Run test 407 Run test 408 Run test 409 Run test 410 Run test 411 Run test 412 Run test 413 Run test 414 Run test 415 Run test 416 Run test 417 Run test 418 Run test 419 Run test 420 Run test 421 Run test 422 Run test 423 Run test 424 Run test 425 Run test 426 Run test 427 Run test 428 Run test 429 Run test 430 Run test 431 Run test 432 Run test 433 Run test 434 Run test 435 Run test 436 Run test 437 Run test 438 Run test 439 Run test 440 Run test 441 Run test 442 Run test 443 Run test 444 Run test 445 Run test 446 Run test 447 Run test 448 Run test 449 Run test 450 Run test 451 Run test 452 Run test 453 Run test 454 Run test 455 Run test 456 Run test 457 Run test 458 Run test 459 Run test 460 Run test 461 Run test 462 Run test 463 Run test 464 Run test 465 Run test 466 Run test 467 Run test 468 Run test 469 Run test 470 Run test 471 Run test 472 Run test 473 Run test 474 Run test 475 Run test 476 Run test 477 Run test 478 Run test 479 Run test 480 [ OK ] Pkcs11EcdhTest.P521 (4067 ms) [----------] 3 tests from Pkcs11EcdhTest (5633 ms total) [----------] 1 test from Pkcs11EddsaWycheproofTest [ RUN ] Pkcs11EddsaWycheproofTest.Ed25519 Reading tests from: eddsa_test.json Test vectors of type EddsaVerify are intended for testing the verification of Eddsa signatures. SignatureMalleability: EdDSA signatures are non-malleable, if implemented accordingly. Failing to check the range of S allows to modify signatures. See RFC 8032, Section 5.2.7 and Section 8.4. tc 1: [valid] expect success tc 2: [valid] expect success tc 3: [valid] expect success tc 4: [valid] expect success tc 5: [valid] expect success tc 6: [valid] expect success tc 7: [valid] expect success tc 8: [valid] expect success tc 9: [valid] expect success tc 10: special values for r and s [invalid] expect failure tc 11: special values for r and s [invalid] expect failure tc 12: special values for r and s [invalid] expect failure tc 13: special values for r and s [invalid] expect failure tc 14: special values for r and s [invalid] expect failure tc 15: special values for r and s [invalid] expect failure tc 16: special values for r and s [invalid] expect failure tc 17: special values for r and s [invalid] expect failure tc 18: special values for r and s [invalid] expect failure tc 19: special values for r and s [invalid] expect failure tc 20: special values for r and s [invalid] expect failure tc 21: special values for r and s [invalid] expect failure tc 22: special values for r and s [invalid] expect failure tc 23: special values for r and s [invalid] expect failure tc 24: special values for r and s [invalid] expect failure tc 25: special values for r and s [invalid] expect failure tc 26: special values for r and s [invalid] expect failure tc 27: special values for r and s [invalid] expect failure tc 28: special values for r and s [invalid] expect failure tc 29: special values for r and s [invalid] expect failure tc 30: empty signature [invalid] expect failure tc 31: s missing [invalid] expect failure tc 32: signature too short [invalid] expect failure tc 33: signature too long [invalid] expect failure tc 34: include pk in signature [invalid] expect failure tc 35: prepending 0 byte to signature [invalid] expect failure tc 36: prepending 0 byte to s [invalid] expect failure tc 37: appending 0 byte to signature [invalid] expect failure tc 38: removing 0 byte from signature [invalid] expect failure tc 39: removing 0 byte from signature [invalid] expect failure tc 40: removing leading 0 byte from signature [invalid] expect failure tc 41: dropping byte from signature [invalid] expect failure tc 42: modified bit 0 in R [invalid] expect failure tc 43: modified bit 1 in R [invalid] expect failure tc 44: modified bit 2 in R [invalid] expect failure tc 45: modified bit 7 in R [invalid] expect failure tc 46: modified bit 8 in R [invalid] expect failure tc 47: modified bit 16 in R [invalid] expect failure tc 48: modified bit 31 in R [invalid] expect failure tc 49: modified bit 32 in R [invalid] expect failure tc 50: modified bit 63 in R [invalid] expect failure tc 51: modified bit 64 in R [invalid] expect failure tc 52: modified bit 97 in R [invalid] expect failure tc 53: modified bit 127 in R [invalid] expect failure tc 54: modified bit 240 in R [invalid] expect failure tc 55: modified bit 247 in R [invalid] expect failure tc 56: modified bit 248 in R [invalid] expect failure tc 57: modified bit 253 in R [invalid] expect failure tc 58: modified bit 254 in R [invalid] expect failure tc 59: modified bit 255 in R [invalid] expect failure tc 60: R==0 [invalid] expect failure tc 61: invalid R [invalid] expect failure tc 62: all bits flipped in R [invalid] expect failure tc 63: checking malleability [invalid, SignatureMalleability] expect failure tc 64: checking malleability [invalid, SignatureMalleability] expect failure tc 65: checking malleability [invalid, SignatureMalleability] expect failure tc 66: checking malleability [invalid, SignatureMalleability] expect failure tc 67: checking malleability [invalid, SignatureMalleability] expect failure tc 68: checking malleability [invalid, SignatureMalleability] expect failure tc 69: checking malleability [invalid, SignatureMalleability] expect failure tc 70: checking malleability [invalid, SignatureMalleability] expect failure Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 Running test 34 Running test 35 Running test 36 Running test 37 Running test 38 Running test 39 Running test 40 Running test 41 Running test 42 Running test 43 Running test 44 Running test 45 Running test 46 Running test 47 Running test 48 Running test 49 Running test 50 Running test 51 Running test 52 Running test 53 Running test 54 Running test 55 Running test 56 Running test 57 Running test 58 Running test 59 Running test 60 Running test 61 Running test 62 Running test 63 Running test 64 Running test 65 Running test 66 Running test 67 Running test 68 Running test 69 Running test 70 tc 71: [valid] expect success tc 72: [valid] expect success tc 73: [valid] expect success tc 74: [valid] expect success tc 75: [valid] expect success tc 76: [valid] expect success tc 77: [valid] expect success tc 78: [valid] expect success tc 79: [valid] expect success Running test 71 Running test 72 Running test 73 Running test 74 Running test 75 Running test 76 Running test 77 Running test 78 Running test 79 tc 80: draft-josefsson-eddsa-ed25519-02: Test 1 [valid] expect success Running test 80 tc 81: draft-josefsson-eddsa-ed25519-02: Test 2 [valid] expect success Running test 81 tc 82: draft-josefsson-eddsa-ed25519-02: Test 3 [valid] expect success Running test 82 tc 83: draft-josefsson-eddsa-ed25519-02: Test 1024 [valid] expect success Running test 83 tc 84: Random test failure 1 [valid] expect success Running test 84 tc 85: Random test failure 2 [valid] expect success tc 86: Random test failure 24 [valid] expect success Running test 85 Running test 86 tc 87: Random test failure 3 [valid] expect success tc 88: Random test failure 20 [valid] expect success Running test 87 Running test 88 tc 89: Random test failure 4 [valid] expect success tc 90: Random test failure 5 [valid] expect success tc 91: Random test failure 8 [valid] expect success tc 92: Random test failure 10 [valid] expect success tc 93: Random test failure 12 [valid] expect success tc 94: Random test failure 15 [valid] expect success tc 95: Random test failure 19 [valid] expect success tc 96: Random test failure 25 [valid] expect success tc 97: Random test failure 28 [valid] expect success Running test 89 Running test 90 Running test 91 Running test 92 Running test 93 Running test 94 Running test 95 Running test 96 Running test 97 tc 98: Random test failure 6 [valid] expect success tc 99: Random test failure 21 [valid] expect success Running test 98 Running test 99 tc 100: Random test failure 7 [valid] expect success tc 101: Random test failure 9 [valid] expect success tc 102: Random test failure 11 [valid] expect success tc 103: Random test failure 14 [valid] expect success tc 104: Random test failure 18 [valid] expect success Running test 100 Running test 101 Running test 102 Running test 103 Running test 104 tc 105: Random test failure 13 [valid] expect success tc 106: Random test failure 22 [valid] expect success Running test 105 Running test 106 tc 107: Random test failure 16 [valid] expect success tc 108: Random test failure 23 [valid] expect success Running test 107 Running test 108 tc 109: Random test failure 17 [valid] expect success Running test 109 tc 110: Random test failure 26 [valid] expect success Running test 110 tc 111: Random test failure 27 [valid] expect success Running test 111 tc 112: Test case for overflow in signature generation [valid] expect success Running test 112 tc 113: Test case for overflow in signature generation [valid] expect success Running test 113 tc 114: Test case for overflow in signature generation [valid] expect success Running test 114 tc 115: Test case for overflow in signature generation [valid] expect success Running test 115 tc 116: Test case for overflow in signature generation [valid] expect success Running test 116 tc 117: regression test for arithmetic error [valid] expect success Running test 117 tc 118: regression test for arithmetic error [valid] expect success Running test 118 tc 119: regression test for arithmetic error [valid] expect success Running test 119 tc 120: regression test for arithmetic error [valid] expect success Running test 120 tc 121: regression test for arithmetic error [valid] expect success Running test 121 tc 122: regression test for arithmetic error [valid] expect success Running test 122 tc 123: regression test for arithmetic error [valid] expect success Running test 123 tc 124: regression test for arithmetic error [valid] expect success Running test 124 tc 125: regression test for arithmetic error [valid] expect success Running test 125 tc 126: regression test for arithmetic error [valid] expect success Running test 126 tc 127: regression test for arithmetic error [valid] expect success Running test 127 tc 128: regression test for arithmetic error [valid] expect success Running test 128 tc 129: regression test for arithmetic error [valid] expect success Running test 129 tc 130: regression test for arithmetic error [valid] expect success Running test 130 tc 131: regression test for arithmetic error [valid] expect success Running test 131 tc 132: regression test for arithmetic error [valid] expect success Running test 132 tc 133: regression test for arithmetic error [valid] expect success Running test 133 tc 134: regression test for arithmetic error [valid] expect success Running test 134 tc 135: regression test for arithmetic error [valid] expect success Running test 135 tc 136: regression test for arithmetic error [valid] expect success Running test 136 tc 137: regression test for arithmetic error [valid] expect success Running test 137 tc 138: regression test for arithmetic error [valid] expect success Running test 138 tc 139: regression test for arithmetic error [valid] expect success Running test 139 tc 140: regression test for arithmetic error [valid] expect success Running test 140 tc 141: regression test for arithmetic error [valid] expect success Running test 141 tc 142: regression test for arithmetic error [valid] expect success Running test 142 tc 143: regression test for arithmetic error [valid] expect success Running test 143 tc 144: regression test for arithmetic error [valid] expect success Running test 144 tc 145: regression test for arithmetic error [valid] expect success Running test 145 [ OK ] Pkcs11EddsaWycheproofTest.Ed25519 (79 ms) [----------] 1 test from Pkcs11EddsaWycheproofTest (79 ms total) [----------] 10 tests from Pkcs11EcdsaSha256Test [ RUN ] Pkcs11EcdsaSha256Test.ImportNoCurveOIDOrAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportNoCurveOIDOrAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportOnlyAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportOnlyAlgorithmParams (1 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportMatchingCurveOIDAndAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportMatchingCurveOIDAndAlgorithmParams (1 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportDissimilarCurveOIDAndAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportDissimilarCurveOIDAndAlgorithmParams (1 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportNoAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportNoAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportInvalidAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportInvalidAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportPointNotOnCurve [ OK ] Pkcs11EcdsaSha256Test.ImportPointNotOnCurve (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportNoPublicKey [ OK ] Pkcs11EcdsaSha256Test.ImportNoPublicKey (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportSpkiNoAlgorithmParams [ OK ] Pkcs11EcdsaSha256Test.ImportSpkiNoAlgorithmParams (0 ms) [ RUN ] Pkcs11EcdsaSha256Test.ImportSpkiPointNotOnCurve [ OK ] Pkcs11EcdsaSha256Test.ImportSpkiPointNotOnCurve (0 ms) [----------] 10 tests from Pkcs11EcdsaSha256Test (5 ms total) [----------] 5 tests from Pkcs11EcdsaWycheproofTest [ RUN ] Pkcs11EcdsaWycheproofTest.P256 Reading tests from: ecdsa_secp256r1_sha256_test.json Test vectors of type EcdsaVerify are meant for the verification of ASN encoded ECDSA signatures. BER: This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability. EdgeCase: Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0. MissingZero: Some implementations of ECDSA and DSA incorrectly encode r and s by not including leading zeros in the ASN encoding of integers when necessary. Hence, some implementations (e.g. jdk) allow signatures with incorrect ASN encodings assuming that the signature is otherwise valid. PointDuplication: Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission. tc 1: signature malleability [valid] expect success tc 2: Legacy:ASN encoding of s misses leading 0 [acceptable, MissingZero] expect success tc 3: valid [valid] expect success tc 4: long form encoding of length of sequence [invalid, BER] expect failure tc 5: length of sequence contains leading 0 [invalid, BER] expect failure tc 6: wrong length of sequence [invalid] expect failure tc 7: wrong length of sequence [invalid] expect failure tc 8: uint32 overflow in length of sequence [invalid] expect failure tc 9: uint64 overflow in length of sequence [invalid] expect failure tc 10: length of sequence = 2**31 - 1 [invalid] expect failure tc 11: length of sequence = 2**32 - 1 [invalid] expect failure tc 12: length of sequence = 2**40 - 1 [invalid] expect failure tc 13: length of sequence = 2**64 - 1 [invalid] expect failure tc 14: incorrect length of sequence [invalid] expect failure tc 15: indefinite length without termination [invalid] expect failure tc 16: indefinite length without termination [invalid] expect failure tc 17: indefinite length without termination [invalid] expect failure tc 18: removing sequence [invalid] expect failure tc 19: lonely sequence tag [invalid] expect failure tc 20: appending 0's to sequence [invalid] expect failure tc 21: prepending 0's to sequence [invalid] expect failure tc 22: appending unused 0's to sequence [invalid] expect failure tc 23: appending null value to sequence [invalid] expect failure tc 24: including garbage [invalid] expect failure tc 25: including garbage [invalid] expect failure tc 26: including garbage [invalid] expect failure tc 27: including garbage [invalid] expect failure tc 28: including garbage [invalid] expect failure tc 29: including garbage [invalid] expect failure tc 30: including garbage [invalid] expect failure tc 31: including garbage [invalid] expect failure tc 32: including garbage [invalid] expect failure tc 33: including undefined tags [invalid] expect failure tc 34: including undefined tags [invalid] expect failure tc 35: including undefined tags [invalid] expect failure tc 36: including undefined tags [invalid] expect failure tc 37: including undefined tags [invalid] expect failure tc 38: including undefined tags [invalid] expect failure tc 39: truncated length of sequence [invalid] expect failure tc 40: using composition with indefinite length [invalid] expect failure tc 41: using composition with indefinite length [invalid] expect failure tc 42: using composition with indefinite length [invalid] expect failure tc 43: using composition with wrong tag [invalid] expect failure tc 44: using composition with wrong tag [invalid] expect failure tc 45: using composition with wrong tag [invalid] expect failure tc 46: Replacing sequence with NULL [invalid] expect failure tc 47: changing tag value of sequence [invalid] expect failure tc 48: changing tag value of sequence [invalid] expect failure tc 49: changing tag value of sequence [invalid] expect failure tc 50: changing tag value of sequence [invalid] expect failure tc 51: changing tag value of sequence [invalid] expect failure tc 52: dropping value of sequence [invalid] expect failure tc 53: using composition for sequence [invalid] expect failure tc 54: truncated sequence [invalid] expect failure tc 55: truncated sequence [invalid] expect failure tc 56: indefinite length [invalid, BER] expect failure tc 57: indefinite length with truncated delimiter [invalid] expect failure tc 58: indefinite length with additional element [invalid] expect failure tc 59: indefinite length with truncated element [invalid] expect failure tc 60: indefinite length with garbage [invalid] expect failure tc 61: indefinite length with nonempty EOC [invalid] expect failure tc 62: prepend empty sequence [invalid] expect failure tc 63: append empty sequence [invalid] expect failure tc 64: append garbage with high tag number [invalid] expect failure tc 65: sequence of sequence [invalid] expect failure tc 66: truncated sequence: removed last 1 elements [invalid] expect failure tc 67: repeating element in sequence [invalid] expect failure tc 68: long form encoding of length of integer [invalid, BER] expect failure tc 69: long form encoding of length of integer [invalid, BER] expect failure tc 70: length of integer contains leading 0 [invalid, BER] expect failure tc 71: length of integer contains leading 0 [invalid, BER] expect failure tc 72: wrong length of integer [invalid] expect failure tc 73: wrong length of integer [invalid] expect failure tc 74: wrong length of integer [invalid] expect failure tc 75: wrong length of integer [invalid] expect failure tc 76: uint32 overflow in length of integer [invalid] expect failure tc 77: uint32 overflow in length of integer [invalid] expect failure tc 78: uint64 overflow in length of integer [invalid] expect failure tc 79: uint64 overflow in length of integer [invalid] expect failure tc 80: length of integer = 2**31 - 1 [invalid] expect failure tc 81: length of integer = 2**31 - 1 [invalid] expect failure tc 82: length of integer = 2**32 - 1 [invalid] expect failure tc 83: length of integer = 2**32 - 1 [invalid] expect failure tc 84: length of integer = 2**40 - 1 [invalid] expect failure tc 85: length of integer = 2**40 - 1 [invalid] expect failure tc 86: length of integer = 2**64 - 1 [invalid] expect failure tc 87: length of integer = 2**64 - 1 [invalid] expect failure tc 88: incorrect length of integer [invalid] expect failure tc 89: incorrect length of integer [invalid] expect failure tc 90: removing integer [invalid] expect failure tc 91: lonely integer tag [invalid] expect failure tc 92: lonely integer tag [invalid] expect failure tc 93: appending 0's to integer [invalid] expect failure tc 94: appending 0's to integer [invalid] expect failure tc 95: prepending 0's to integer [invalid, BER] expect failure tc 96: prepending 0's to integer [invalid, BER] expect failure tc 97: appending unused 0's to integer [invalid] expect failure tc 98: appending null value to integer [invalid] expect failure tc 99: appending null value to integer [invalid] expect failure tc 100: truncated length of integer [invalid] expect failure tc 101: truncated length of integer [invalid] expect failure tc 102: Replacing integer with NULL [invalid] expect failure tc 103: Replacing integer with NULL [invalid] expect failure tc 104: changing tag value of integer [invalid] expect failure tc 105: changing tag value of integer [invalid] expect failure tc 106: changing tag value of integer [invalid] expect failure tc 107: changing tag value of integer [invalid] expect failure tc 108: changing tag value of integer [invalid] expect failure tc 109: changing tag value of integer [invalid] expect failure tc 110: changing tag value of integer [invalid] expect failure tc 111: changing tag value of integer [invalid] expect failure tc 112: changing tag value of integer [invalid] expect failure tc 113: changing tag value of integer [invalid] expect failure tc 114: dropping value of integer [invalid] expect failure tc 115: dropping value of integer [invalid] expect failure tc 116: using composition for integer [invalid] expect failure tc 117: using composition for integer [invalid] expect failure tc 118: modify first byte of integer [invalid] expect failure tc 119: modify first byte of integer [invalid] expect failure tc 120: modify last byte of integer [invalid] expect failure tc 121: modify last byte of integer [invalid] expect failure tc 122: truncated integer [invalid] expect failure tc 123: truncated integer [invalid] expect failure tc 124: truncated integer [invalid] expect failure tc 125: leading ff in integer [invalid] expect failure tc 126: leading ff in integer [invalid] expect failure tc 127: replaced integer by infinity [invalid] expect failure tc 128: replaced integer by infinity [invalid] expect failure tc 129: replacing integer with zero [invalid] expect failure tc 130: replacing integer with zero [invalid] expect failure tc 131: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 132: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 133: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 134: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 135: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 136: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 137: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 138: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 139: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 140: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 141: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 142: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 143: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 144: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 145: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 146: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 147: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 148: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 149: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 150: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 151: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 152: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 153: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 154: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 155: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 156: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 157: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 158: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 159: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 160: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 161: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 162: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 163: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 164: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 165: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 166: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 167: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 168: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 169: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 170: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 171: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 172: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 173: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 174: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 175: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 176: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 177: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 178: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 179: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 180: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 181: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 182: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 183: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 184: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 185: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 186: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 187: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 188: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 189: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 190: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 191: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 192: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 193: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 194: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 195: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 196: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 197: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 198: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 199: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 200: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 201: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 202: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 203: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 204: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 205: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 206: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 207: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 208: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 209: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 210: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 211: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 212: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 213: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 214: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 215: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 216: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 217: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 218: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 219: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 220: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 221: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 222: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 223: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 224: Signature encoding contains wrong types. [invalid] expect failure tc 225: Signature encoding contains wrong types. [invalid] expect failure tc 226: Signature encoding contains wrong types. [invalid] expect failure tc 227: Signature encoding contains wrong types. [invalid] expect failure tc 228: Signature encoding contains wrong types. [invalid] expect failure tc 229: Signature encoding contains wrong types. [invalid] expect failure tc 230: Edge case for Shamir multiplication [valid] expect success tc 231: special case hash [valid] expect success tc 232: special case hash [valid] expect success tc 233: special case hash [valid] expect success tc 234: special case hash [valid] expect success tc 235: special case hash [valid] expect success tc 236: special case hash [valid] expect success tc 237: special case hash [valid] expect success tc 238: special case hash [valid] expect success tc 239: special case hash [valid] expect success tc 240: special case hash [valid] expect success tc 241: special case hash [valid] expect success tc 242: special case hash [valid] expect success tc 243: special case hash [valid] expect success tc 244: special case hash [valid] expect success tc 245: special case hash [valid] expect success tc 246: special case hash [valid] expect success tc 247: special case hash [valid] expect success tc 248: special case hash [valid] expect success tc 249: special case hash [valid] expect success tc 250: special case hash [valid] expect success tc 251: special case hash [valid] expect success tc 252: special case hash [valid] expect success tc 253: special case hash [valid] expect success tc 254: special case hash [valid] expect success tc 255: special case hash [valid] expect success tc 256: special case hash [valid] expect success tc 257: special case hash [valid] expect success tc 258: special case hash [valid] expect success tc 259: special case hash [valid] expect success tc 260: special case hash [valid] expect success tc 261: special case hash [valid] expect success tc 262: special case hash [valid] expect success tc 263: special case hash [valid] expect success tc 264: special case hash [valid] expect success tc 265: special case hash [valid] expect success tc 266: special case hash [valid] expect success tc 267: special case hash [valid] expect success tc 268: special case hash [valid] expect success tc 269: special case hash [valid] expect success tc 270: special case hash [valid] expect success tc 271: special case hash [valid] expect success tc 272: special case hash [valid] expect success tc 273: special case hash [valid] expect success tc 274: special case hash [valid] expect success tc 275: special case hash [valid] expect success tc 276: special case hash [valid] expect success tc 277: special case hash [valid] expect success tc 278: special case hash [valid] expect success tc 279: special case hash [valid] expect success tc 280: special case hash [valid] expect success tc 281: special case hash [valid] expect success tc 282: special case hash [valid] expect success tc 283: special case hash [valid] expect success tc 284: special case hash [valid] expect success Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 Running test 34 Running test 35 Running test 36 Running test 37 Running test 38 Running test 39 Running test 40 Running test 41 Running test 42 Running test 43 Running test 44 Running test 45 Running test 46 Running test 47 Running test 48 Running test 49 Running test 50 Running test 51 Running test 52 Running test 53 Running test 54 Running test 55 Running test 56 Running test 57 Running test 58 Running test 59 Running test 60 Running test 61 Running test 62 Running test 63 Running test 64 Running test 65 Running test 66 Running test 67 Running test 68 Running test 69 Running test 70 Running test 71 Running test 72 Running test 73 Running test 74 Running test 75 Running test 76 Running test 77 Running test 78 Running test 79 Running test 80 Running test 81 Running test 82 Running test 83 Running test 84 Running test 85 Running test 86 Running test 87 Running test 88 Running test 89 Running test 90 Running test 91 Running test 92 Running test 93 Running test 94 Running test 95 Running test 96 Running test 97 Running test 98 Running test 99 Running test 100 Running test 101 Running test 102 Running test 103 Running test 104 Running test 105 Running test 106 Running test 107 Running test 108 Running test 109 Running test 110 Running test 111 Running test 112 Running test 113 Running test 114 Running test 115 Running test 116 Running test 117 Running test 118 Running test 119 Running test 120 Running test 121 Running test 122 Running test 123 Running test 124 Running test 125 Running test 126 Running test 127 Running test 128 Running test 129 Running test 130 Running test 131 Running test 132 Running test 133 Running test 134 Running test 135 Running test 136 Running test 137 Running test 138 Running test 139 Running test 140 Running test 141 Running test 142 Running test 143 Running test 144 Running test 145 Running test 146 Running test 147 Running test 148 Running test 149 Running test 150 Running test 151 Running test 152 Running test 153 Running test 154 Running test 155 Running test 156 Running test 157 Running test 158 Running test 159 Running test 160 Running test 161 Running test 162 Running test 163 Running test 164 Running test 165 Running test 166 Running test 167 Running test 168 Running test 169 Running test 170 Running test 171 Running test 172 Running test 173 Running test 174 Running test 175 Running test 176 Running test 177 Running test 178 Running test 179 Running test 180 Running test 181 Running test 182 Running test 183 Running test 184 Running test 185 Running test 186 Running test 187 Running test 188 Running test 189 Running test 190 Running test 191 Running test 192 Running test 193 Running test 194 Running test 195 Running test 196 Running test 197 Running test 198 Running test 199 Running test 200 Running test 201 Running test 202 Running test 203 Running test 204 Running test 205 Running test 206 Running test 207 Running test 208 Running test 209 Running test 210 Running test 211 Running test 212 Running test 213 Running test 214 Running test 215 Running test 216 Running test 217 Running test 218 Running test 219 Running test 220 Running test 221 Running test 222 Running test 223 Running test 224 Running test 225 Running test 226 Running test 227 Running test 228 Running test 229 Running test 230 Running test 231 Running test 232 Running test 233 Running test 234 Running test 235 Running test 236 Running test 237 Running test 238 Running test 239 Running test 240 Running test 241 Running test 242 Running test 243 Running test 244 Running test 245 Running test 246 Running test 247 Running test 248 Running test 249 Running test 250 Running test 251 Running test 252 Running test 253 Running test 254 Running test 255 Running test 256 Running test 257 Running test 258 Running test 259 Running test 260 Running test 261 Running test 262 Running test 263 Running test 264 Running test 265 Running test 266 Running test 267 Running test 268 Running test 269 Running test 270 Running test 271 Running test 272 Running test 273 Running test 274 Running test 275 Running test 276 Running test 277 Running test 278 Running test 279 Running test 280 Running test 281 Running test 282 Running test 283 Running test 284 tc 285: k*G has a large x-coordinate [valid] expect success tc 286: r too large [invalid] expect failure Running test 285 Running test 286 tc 287: r,s are large [valid] expect success Running test 287 tc 288: r and s^-1 have a large Hamming weight [valid] expect success Running test 288 tc 289: r and s^-1 have a large Hamming weight [valid] expect success Running test 289 tc 290: small r and s [valid] expect success Running test 290 tc 291: small r and s [valid] expect success Running test 291 tc 292: small r and s [valid] expect success Running test 292 tc 293: small r and s [valid] expect success tc 294: r is larger than n [invalid] expect failure Running test 293 Running test 294 tc 295: s is larger than n [invalid] expect failure Running test 295 tc 296: small r and s^-1 [valid] expect success Running test 296 tc 297: smallish r and s^-1 [valid] expect success Running test 297 tc 298: 100-bit r and small s^-1 [valid] expect success Running test 298 tc 299: small r and 100 bit s^-1 [valid] expect success Running test 299 tc 300: 100-bit r and s^-1 [valid] expect success Running test 300 tc 301: r and s^-1 are close to n [valid] expect success Running test 301 tc 302: s == 1 [valid] expect success tc 303: s == 0 [invalid] expect failure Running test 302 Running test 303 tc 304: point at infinity during verify [invalid] expect failure Running test 304 tc 305: edge case for signature malleability [valid] expect success Running test 305 tc 306: edge case for signature malleability [valid] expect success Running test 306 tc 307: u1 == 1 [valid] expect success Running test 307 tc 308: u1 == n - 1 [valid] expect success Running test 308 tc 309: u2 == 1 [valid] expect success Running test 309 tc 310: u2 == n - 1 [valid] expect success Running test 310 tc 311: edge case for u1 [valid] expect success Running test 311 tc 312: edge case for u1 [valid] expect success Running test 312 tc 313: edge case for u1 [valid] expect success Running test 313 tc 314: edge case for u1 [valid] expect success Running test 314 tc 315: edge case for u1 [valid] expect success Running test 315 tc 316: edge case for u1 [valid] expect success Running test 316 tc 317: edge case for u1 [valid] expect success Running test 317 tc 318: edge case for u1 [valid] expect success Running test 318 tc 319: edge case for u1 [valid] expect success Running test 319 tc 320: edge case for u1 [valid] expect success Running test 320 tc 321: edge case for u1 [valid] expect success Running test 321 tc 322: edge case for u1 [valid] expect success Running test 322 tc 323: edge case for u1 [valid] expect success Running test 323 tc 324: edge case for u1 [valid] expect success Running test 324 tc 325: edge case for u2 [valid] expect success Running test 325 tc 326: edge case for u2 [valid] expect success Running test 326 tc 327: edge case for u2 [valid] expect success Running test 327 tc 328: edge case for u2 [valid] expect success Running test 328 tc 329: edge case for u2 [valid] expect success Running test 329 tc 330: edge case for u2 [valid] expect success Running test 330 tc 331: edge case for u2 [valid] expect success Running test 331 tc 332: edge case for u2 [valid] expect success Running test 332 tc 333: edge case for u2 [valid] expect success Running test 333 tc 334: edge case for u2 [valid] expect success Running test 334 tc 335: edge case for u2 [valid] expect success Running test 335 tc 336: edge case for u2 [valid] expect success Running test 336 tc 337: edge case for u2 [valid] expect success Running test 337 tc 338: edge case for u2 [valid] expect success Running test 338 tc 339: point duplication during verification [valid, PointDuplication] expect success Running test 339 tc 340: duplication bug [invalid, PointDuplication] expect failure Running test 340 tc 341: point with x-coordinate 0 [invalid] expect failure Running test 341 tc 342: point with x-coordinate 0 [invalid] expect failure Running test 342 tc 343: comparison with point at infinity [invalid] expect failure Running test 343 tc 344: extreme value for k and edgecase s [valid] expect success Running test 344 tc 345: extreme value for k and s^-1 [valid] expect success Running test 345 tc 346: extreme value for k and s^-1 [valid] expect success Running test 346 tc 347: extreme value for k and s^-1 [valid] expect success Running test 347 tc 348: extreme value for k and s^-1 [valid] expect success Running test 348 tc 349: extreme value for k [valid] expect success Running test 349 tc 350: extreme value for k and edgecase s [valid] expect success Running test 350 tc 351: extreme value for k and s^-1 [valid] expect success Running test 351 tc 352: extreme value for k and s^-1 [valid] expect success Running test 352 tc 353: extreme value for k and s^-1 [valid] expect success Running test 353 tc 354: extreme value for k and s^-1 [valid] expect success Running test 354 tc 355: extreme value for k [valid] expect success Running test 355 tc 356: testing point duplication [invalid] expect failure tc 357: testing point duplication [invalid] expect failure Running test 356 Running test 357 tc 358: testing point duplication [invalid] expect failure tc 359: testing point duplication [invalid] expect failure Running test 358 Running test 359 tc 360: pseudorandom signature [valid] expect success tc 361: pseudorandom signature [valid] expect success tc 362: pseudorandom signature [valid] expect success tc 363: pseudorandom signature [valid] expect success Running test 360 Running test 361 Running test 362 Running test 363 tc 364: x-coordinate of the public key has many trailing 0's [valid] expect success tc 365: x-coordinate of the public key has many trailing 0's [valid] expect success tc 366: x-coordinate of the public key has many trailing 0's [valid] expect success Running test 364 Running test 365 Running test 366 tc 367: y-coordinate of the public key has many trailing 0's [valid] expect success tc 368: y-coordinate of the public key has many trailing 0's [valid] expect success tc 369: y-coordinate of the public key has many trailing 0's [valid] expect success Running test 367 Running test 368 Running test 369 tc 370: y-coordinate of the public key has many trailing 1's [valid] expect success tc 371: y-coordinate of the public key has many trailing 1's [valid] expect success tc 372: y-coordinate of the public key has many trailing 1's [valid] expect success Running test 370 Running test 371 Running test 372 tc 373: x-coordinate of the public key has many trailing 1's [valid] expect success tc 374: x-coordinate of the public key has many trailing 1's [valid] expect success tc 375: x-coordinate of the public key has many trailing 1's [valid] expect success Running test 373 Running test 374 Running test 375 tc 376: x-coordinate of the public key is large [valid] expect success tc 377: x-coordinate of the public key is large [valid] expect success tc 378: x-coordinate of the public key is large [valid] expect success Running test 376 Running test 377 Running test 378 tc 379: x-coordinate of the public key is small [valid] expect success tc 380: x-coordinate of the public key is small [valid] expect success tc 381: x-coordinate of the public key is small [valid] expect success Running test 379 Running test 380 Running test 381 tc 382: y-coordinate of the public key is small [valid] expect success tc 383: y-coordinate of the public key is small [valid] expect success tc 384: y-coordinate of the public key is small [valid] expect success Running test 382 Running test 383 Running test 384 tc 385: y-coordinate of the public key is large [valid] expect success tc 386: y-coordinate of the public key is large [valid] expect success tc 387: y-coordinate of the public key is large [valid] expect success Running test 385 Running test 386 Running test 387 [ OK ] Pkcs11EcdsaWycheproofTest.P256 (431 ms) [ RUN ] Pkcs11EcdsaWycheproofTest.P256Sha512 Reading tests from: ecdsa_secp256r1_sha512_test.json Test vectors of type EcdsaVerify are meant for the verification of ASN encoded ECDSA signatures. BER: This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability. EdgeCase: Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0. MissingZero: Some implementations of ECDSA and DSA incorrectly encode r and s by not including leading zeros in the ASN encoding of integers when necessary. Hence, some implementations (e.g. jdk) allow signatures with incorrect ASN encodings assuming that the signature is otherwise valid. PointDuplication: Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission. tc 1: signature malleability [valid] expect success tc 2: Legacy:ASN encoding of s misses leading 0 [acceptable, MissingZero] expect success tc 3: valid [valid] expect success tc 4: long form encoding of length of sequence [invalid, BER] expect failure tc 5: length of sequence contains leading 0 [invalid, BER] expect failure tc 6: wrong length of sequence [invalid] expect failure tc 7: wrong length of sequence [invalid] expect failure tc 8: uint32 overflow in length of sequence [invalid] expect failure tc 9: uint64 overflow in length of sequence [invalid] expect failure tc 10: length of sequence = 2**31 - 1 [invalid] expect failure tc 11: length of sequence = 2**32 - 1 [invalid] expect failure tc 12: length of sequence = 2**40 - 1 [invalid] expect failure tc 13: length of sequence = 2**64 - 1 [invalid] expect failure tc 14: incorrect length of sequence [invalid] expect failure tc 15: indefinite length without termination [invalid] expect failure tc 16: indefinite length without termination [invalid] expect failure tc 17: indefinite length without termination [invalid] expect failure tc 18: removing sequence [invalid] expect failure tc 19: lonely sequence tag [invalid] expect failure tc 20: appending 0's to sequence [invalid] expect failure tc 21: prepending 0's to sequence [invalid] expect failure tc 22: appending unused 0's to sequence [invalid] expect failure tc 23: appending null value to sequence [invalid] expect failure tc 24: including garbage [invalid] expect failure tc 25: including garbage [invalid] expect failure tc 26: including garbage [invalid] expect failure tc 27: including garbage [invalid] expect failure tc 28: including garbage [invalid] expect failure tc 29: including garbage [invalid] expect failure tc 30: including garbage [invalid] expect failure tc 31: including garbage [invalid] expect failure tc 32: including garbage [invalid] expect failure tc 33: including undefined tags [invalid] expect failure tc 34: including undefined tags [invalid] expect failure tc 35: including undefined tags [invalid] expect failure tc 36: including undefined tags [invalid] expect failure tc 37: including undefined tags [invalid] expect failure tc 38: including undefined tags [invalid] expect failure tc 39: truncated length of sequence [invalid] expect failure tc 40: using composition with indefinite length [invalid] expect failure tc 41: using composition with indefinite length [invalid] expect failure tc 42: using composition with indefinite length [invalid] expect failure tc 43: using composition with wrong tag [invalid] expect failure tc 44: using composition with wrong tag [invalid] expect failure tc 45: using composition with wrong tag [invalid] expect failure tc 46: Replacing sequence with NULL [invalid] expect failure tc 47: changing tag value of sequence [invalid] expect failure tc 48: changing tag value of sequence [invalid] expect failure tc 49: changing tag value of sequence [invalid] expect failure tc 50: changing tag value of sequence [invalid] expect failure tc 51: changing tag value of sequence [invalid] expect failure tc 52: dropping value of sequence [invalid] expect failure tc 53: using composition for sequence [invalid] expect failure tc 54: truncated sequence [invalid] expect failure tc 55: truncated sequence [invalid] expect failure tc 56: indefinite length [invalid, BER] expect failure tc 57: indefinite length with truncated delimiter [invalid] expect failure tc 58: indefinite length with additional element [invalid] expect failure tc 59: indefinite length with truncated element [invalid] expect failure tc 60: indefinite length with garbage [invalid] expect failure tc 61: indefinite length with nonempty EOC [invalid] expect failure tc 62: prepend empty sequence [invalid] expect failure tc 63: append empty sequence [invalid] expect failure tc 64: append garbage with high tag number [invalid] expect failure tc 65: sequence of sequence [invalid] expect failure tc 66: truncated sequence: removed last 1 elements [invalid] expect failure tc 67: repeating element in sequence [invalid] expect failure tc 68: long form encoding of length of integer [invalid, BER] expect failure tc 69: long form encoding of length of integer [invalid, BER] expect failure tc 70: length of integer contains leading 0 [invalid, BER] expect failure tc 71: length of integer contains leading 0 [invalid, BER] expect failure tc 72: wrong length of integer [invalid] expect failure tc 73: wrong length of integer [invalid] expect failure tc 74: wrong length of integer [invalid] expect failure tc 75: wrong length of integer [invalid] expect failure tc 76: uint32 overflow in length of integer [invalid] expect failure tc 77: uint32 overflow in length of integer [invalid] expect failure tc 78: uint64 overflow in length of integer [invalid] expect failure tc 79: uint64 overflow in length of integer [invalid] expect failure tc 80: length of integer = 2**31 - 1 [invalid] expect failure tc 81: length of integer = 2**31 - 1 [invalid] expect failure tc 82: length of integer = 2**32 - 1 [invalid] expect failure tc 83: length of integer = 2**32 - 1 [invalid] expect failure tc 84: length of integer = 2**40 - 1 [invalid] expect failure tc 85: length of integer = 2**40 - 1 [invalid] expect failure tc 86: length of integer = 2**64 - 1 [invalid] expect failure tc 87: length of integer = 2**64 - 1 [invalid] expect failure tc 88: incorrect length of integer [invalid] expect failure tc 89: incorrect length of integer [invalid] expect failure tc 90: removing integer [invalid] expect failure tc 91: lonely integer tag [invalid] expect failure tc 92: lonely integer tag [invalid] expect failure tc 93: appending 0's to integer [invalid] expect failure tc 94: appending 0's to integer [invalid] expect failure tc 95: prepending 0's to integer [invalid, BER] expect failure tc 96: prepending 0's to integer [invalid, BER] expect failure tc 97: appending unused 0's to integer [invalid] expect failure tc 98: appending null value to integer [invalid] expect failure tc 99: appending null value to integer [invalid] expect failure tc 100: truncated length of integer [invalid] expect failure tc 101: truncated length of integer [invalid] expect failure tc 102: Replacing integer with NULL [invalid] expect failure tc 103: Replacing integer with NULL [invalid] expect failure tc 104: changing tag value of integer [invalid] expect failure tc 105: changing tag value of integer [invalid] expect failure tc 106: changing tag value of integer [invalid] expect failure tc 107: changing tag value of integer [invalid] expect failure tc 108: changing tag value of integer [invalid] expect failure tc 109: changing tag value of integer [invalid] expect failure tc 110: changing tag value of integer [invalid] expect failure tc 111: changing tag value of integer [invalid] expect failure tc 112: changing tag value of integer [invalid] expect failure tc 113: changing tag value of integer [invalid] expect failure tc 114: dropping value of integer [invalid] expect failure tc 115: dropping value of integer [invalid] expect failure tc 116: using composition for integer [invalid] expect failure tc 117: using composition for integer [invalid] expect failure tc 118: modify first byte of integer [invalid] expect failure tc 119: modify first byte of integer [invalid] expect failure tc 120: modify last byte of integer [invalid] expect failure tc 121: modify last byte of integer [invalid] expect failure tc 122: truncated integer [invalid] expect failure tc 123: truncated integer [invalid] expect failure tc 124: truncated integer [invalid] expect failure tc 125: leading ff in integer [invalid] expect failure tc 126: leading ff in integer [invalid] expect failure tc 127: replaced integer by infinity [invalid] expect failure tc 128: replaced integer by infinity [invalid] expect failure tc 129: replacing integer with zero [invalid] expect failure tc 130: replacing integer with zero [invalid] expect failure tc 131: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 132: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 133: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 134: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 135: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 136: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 137: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 138: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 139: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 140: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 141: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 142: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 143: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 144: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 145: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 146: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 147: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 148: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 149: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 150: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 151: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 152: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 153: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 154: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 155: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 156: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 157: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 158: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 159: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 160: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 161: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 162: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 163: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 164: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 165: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 166: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 167: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 168: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 169: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 170: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 171: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 172: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 173: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 174: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 175: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 176: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 177: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 178: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 179: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 180: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 181: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 182: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 183: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 184: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 185: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 186: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 187: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 188: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 189: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 190: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 191: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 192: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 193: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 194: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 195: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 196: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 197: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 198: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 199: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 200: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 201: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 202: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 203: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 204: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 205: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 206: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 207: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 208: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 209: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 210: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 211: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 212: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 213: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 214: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 215: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 216: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 217: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 218: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 219: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 220: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 221: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 222: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 223: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 224: Signature encoding contains wrong types. [invalid] expect failure tc 225: Signature encoding contains wrong types. [invalid] expect failure tc 226: Signature encoding contains wrong types. [invalid] expect failure tc 227: Signature encoding contains wrong types. [invalid] expect failure tc 228: Signature encoding contains wrong types. [invalid] expect failure tc 229: Signature encoding contains wrong types. [invalid] expect failure tc 230: Edge case for Shamir multiplication [valid] expect success tc 231: special case hash [valid] expect success tc 232: special case hash [valid] expect success tc 233: special case hash [valid] expect success tc 234: special case hash [valid] expect success tc 235: special case hash [valid] expect success tc 236: special case hash [valid] expect success tc 237: special case hash [valid] expect success tc 238: special case hash [valid] expect success tc 239: special case hash [valid] expect success tc 240: special case hash [valid] expect success tc 241: special case hash [valid] expect success tc 242: special case hash [valid] expect success tc 243: special case hash [valid] expect success tc 244: special case hash [valid] expect success tc 245: special case hash [valid] expect success tc 246: special case hash [valid] expect success tc 247: special case hash [valid] expect success tc 248: special case hash [valid] expect success tc 249: special case hash [valid] expect success tc 250: special case hash [valid] expect success tc 251: special case hash [valid] expect success tc 252: special case hash [valid] expect success tc 253: special case hash [valid] expect success tc 254: special case hash [valid] expect success tc 255: special case hash [valid] expect success tc 256: special case hash [valid] expect success tc 257: special case hash [valid] expect success tc 258: special case hash [valid] expect success tc 259: special case hash [valid] expect success tc 260: special case hash [valid] expect success tc 261: special case hash [valid] expect success tc 262: special case hash [valid] expect success tc 263: special case hash [valid] expect success tc 264: special case hash [valid] expect success tc 265: special case hash [valid] expect success tc 266: special case hash [valid] expect success tc 267: special case hash [valid] expect success tc 268: special case hash [valid] expect success tc 269: special case hash [valid] expect success tc 270: special case hash [valid] expect success tc 271: special case hash [valid] expect success tc 272: special case hash [valid] expect success tc 273: special case hash [valid] expect success tc 274: special case hash [valid] expect success tc 275: special case hash [valid] expect success tc 276: special case hash [valid] expect success tc 277: special case hash [valid] expect success tc 278: special case hash [valid] expect success tc 279: special case hash [valid] expect success tc 280: special case hash [valid] expect success tc 281: special case hash [valid] expect success tc 282: special case hash [valid] expect success tc 283: special case hash [valid] expect success tc 284: special case hash [valid] expect success tc 285: special case hash [valid] expect success tc 286: special case hash [valid] expect success tc 287: special case hash [valid] expect success tc 288: special case hash [valid] expect success tc 289: special case hash [valid] expect success tc 290: special case hash [valid] expect success tc 291: special case hash [valid] expect success tc 292: special case hash [valid] expect success tc 293: special case hash [valid] expect success tc 294: special case hash [valid] expect success tc 295: special case hash [valid] expect success tc 296: special case hash [valid] expect success tc 297: special case hash [valid] expect success tc 298: special case hash [valid] expect success tc 299: special case hash [valid] expect success tc 300: special case hash [valid] expect success tc 301: special case hash [valid] expect success tc 302: special case hash [valid] expect success tc 303: special case hash [valid] expect success tc 304: special case hash [valid] expect success tc 305: special case hash [valid] expect success tc 306: special case hash [valid] expect success tc 307: special case hash [valid] expect success tc 308: special case hash [valid] expect success tc 309: special case hash [valid] expect success tc 310: special case hash [valid] expect success tc 311: special case hash [valid] expect success tc 312: special case hash [valid] expect success tc 313: special case hash [valid] expect success tc 314: special case hash [valid] expect success tc 315: special case hash [valid] expect success tc 316: special case hash [valid] expect success tc 317: special case hash [valid] expect success tc 318: special case hash [valid] expect success tc 319: special case hash [valid] expect success tc 320: special case hash [valid] expect success tc 321: special case hash [valid] expect success tc 322: special case hash [valid] expect success tc 323: special case hash [valid] expect success tc 324: special case hash [valid] expect success tc 325: special case hash [valid] expect success tc 326: special case hash [valid] expect success tc 327: special case hash [valid] expect success tc 328: special case hash [valid] expect success tc 329: special case hash [valid] expect success tc 330: special case hash [valid] expect success tc 331: special case hash [valid] expect success tc 332: special case hash [valid] expect success tc 333: special case hash [valid] expect success tc 334: special case hash [valid] expect success tc 335: special case hash [valid] expect success tc 336: special case hash [valid] expect success tc 337: special case hash [valid] expect success tc 338: special case hash [valid] expect success tc 339: special case hash [valid] expect success tc 340: special case hash [valid] expect success tc 341: special case hash [valid] expect success tc 342: special case hash [valid] expect success tc 343: special case hash [valid] expect success tc 344: special case hash [valid] expect success tc 345: special case hash [valid] expect success tc 346: special case hash [valid] expect success tc 347: special case hash [valid] expect success tc 348: special case hash [valid] expect success tc 349: special case hash [valid] expect success tc 350: special case hash [valid] expect success tc 351: special case hash [valid] expect success tc 352: special case hash [valid] expect success tc 353: special case hash [valid] expect success tc 354: Signature generated without truncating the hash [invalid] expect failure Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 Running test 34 Running test 35 Running test 36 Running test 37 Running test 38 Running test 39 Running test 40 Running test 41 Running test 42 Running test 43 Running test 44 Running test 45 Running test 46 Running test 47 Running test 48 Running test 49 Running test 50 Running test 51 Running test 52 Running test 53 Running test 54 Running test 55 Running test 56 Running test 57 Running test 58 Running test 59 Running test 60 Running test 61 Running test 62 Running test 63 Running test 64 Running test 65 Running test 66 Running test 67 Running test 68 Running test 69 Running test 70 Running test 71 Running test 72 Running test 73 Running test 74 Running test 75 Running test 76 Running test 77 Running test 78 Running test 79 Running test 80 Running test 81 Running test 82 Running test 83 Running test 84 Running test 85 Running test 86 Running test 87 Running test 88 Running test 89 Running test 90 Running test 91 Running test 92 Running test 93 Running test 94 Running test 95 Running test 96 Running test 97 Running test 98 Running test 99 Running test 100 Running test 101 Running test 102 Running test 103 Running test 104 Running test 105 Running test 106 Running test 107 Running test 108 Running test 109 Running test 110 Running test 111 Running test 112 Running test 113 Running test 114 Running test 115 Running test 116 Running test 117 Running test 118 Running test 119 Running test 120 Running test 121 Running test 122 Running test 123 Running test 124 Running test 125 Running test 126 Running test 127 Running test 128 Running test 129 Running test 130 Running test 131 Running test 132 Running test 133 Running test 134 Running test 135 Running test 136 Running test 137 Running test 138 Running test 139 Running test 140 Running test 141 Running test 142 Running test 143 Running test 144 Running test 145 Running test 146 Running test 147 Running test 148 Running test 149 Running test 150 Running test 151 Running test 152 Running test 153 Running test 154 Running test 155 Running test 156 Running test 157 Running test 158 Running test 159 Running test 160 Running test 161 Running test 162 Running test 163 Running test 164 Running test 165 Running test 166 Running test 167 Running test 168 Running test 169 Running test 170 Running test 171 Running test 172 Running test 173 Running test 174 Running test 175 Running test 176 Running test 177 Running test 178 Running test 179 Running test 180 Running test 181 Running test 182 Running test 183 Running test 184 Running test 185 Running test 186 Running test 187 Running test 188 Running test 189 Running test 190 Running test 191 Running test 192 Running test 193 Running test 194 Running test 195 Running test 196 Running test 197 Running test 198 Running test 199 Running test 200 Running test 201 Running test 202 Running test 203 Running test 204 Running test 205 Running test 206 Running test 207 Running test 208 Running test 209 Running test 210 Running test 211 Running test 212 Running test 213 Running test 214 Running test 215 Running test 216 Running test 217 Running test 218 Running test 219 Running test 220 Running test 221 Running test 222 Running test 223 Running test 224 Running test 225 Running test 226 Running test 227 Running test 228 Running test 229 Running test 230 Running test 231 Running test 232 Running test 233 Running test 234 Running test 235 Running test 236 Running test 237 Running test 238 Running test 239 Running test 240 Running test 241 Running test 242 Running test 243 Running test 244 Running test 245 Running test 246 Running test 247 Running test 248 Running test 249 Running test 250 Running test 251 Running test 252 Running test 253 Running test 254 Running test 255 Running test 256 Running test 257 Running test 258 Running test 259 Running test 260 Running test 261 Running test 262 Running test 263 Running test 264 Running test 265 Running test 266 Running test 267 Running test 268 Running test 269 Running test 270 Running test 271 Running test 272 Running test 273 Running test 274 Running test 275 Running test 276 Running test 277 Running test 278 Running test 279 Running test 280 Running test 281 Running test 282 Running test 283 Running test 284 Running test 285 Running test 286 Running test 287 Running test 288 Running test 289 Running test 290 Running test 291 Running test 292 Running test 293 Running test 294 Running test 295 Running test 296 Running test 297 Running test 298 Running test 299 Running test 300 Running test 301 Running test 302 Running test 303 Running test 304 Running test 305 Running test 306 Running test 307 Running test 308 Running test 309 Running test 310 Running test 311 Running test 312 Running test 313 Running test 314 Running test 315 Running test 316 Running test 317 Running test 318 Running test 319 Running test 320 Running test 321 Running test 322 Running test 323 Running test 324 Running test 325 Running test 326 Running test 327 Running test 328 Running test 329 Running test 330 Running test 331 Running test 332 Running test 333 Running test 334 Running test 335 Running test 336 Running test 337 Running test 338 Running test 339 Running test 340 Running test 341 Running test 342 Running test 343 Running test 344 Running test 345 Running test 346 Running test 347 Running test 348 Running test 349 Running test 350 Running test 351 Running test 352 Running test 353 Running test 354 tc 355: k*G has a large x-coordinate [valid] expect success tc 356: r too large [invalid] expect failure Running test 355 Running test 356 tc 357: r,s are large [valid] expect success Running test 357 tc 358: r and s^-1 have a large Hamming weight [valid] expect success Running test 358 tc 359: r and s^-1 have a large Hamming weight [valid] expect success Running test 359 tc 360: small r and s [valid] expect success Running test 360 tc 361: small r and s [valid] expect success Running test 361 tc 362: small r and s [valid] expect success Running test 362 tc 363: small r and s [valid] expect success tc 364: r is larger than n [invalid] expect failure Running test 363 Running test 364 tc 365: s is larger than n [invalid] expect failure Running test 365 tc 366: small r and s^-1 [valid] expect success Running test 366 tc 367: smallish r and s^-1 [valid] expect success Running test 367 tc 368: 100-bit r and small s^-1 [valid] expect success Running test 368 tc 369: small r and 100 bit s^-1 [valid] expect success Running test 369 tc 370: 100-bit r and s^-1 [valid] expect success Running test 370 tc 371: r and s^-1 are close to n [valid] expect success Running test 371 tc 372: s == 1 [valid] expect success tc 373: s == 0 [invalid] expect failure Running test 372 Running test 373 tc 374: point at infinity during verify [invalid] expect failure Running test 374 tc 375: edge case for signature malleability [valid] expect success Running test 375 tc 376: edge case for signature malleability [valid] expect success Running test 376 tc 377: u1 == 1 [valid] expect success Running test 377 tc 378: u1 == n - 1 [valid] expect success Running test 378 tc 379: u2 == 1 [valid] expect success Running test 379 tc 380: u2 == n - 1 [valid] expect success Running test 380 tc 381: edge case for u1 [valid] expect success Running test 381 tc 382: edge case for u1 [valid] expect success Running test 382 tc 383: edge case for u1 [valid] expect success Running test 383 tc 384: edge case for u1 [valid] expect success Running test 384 tc 385: edge case for u1 [valid] expect success Running test 385 tc 386: edge case for u1 [valid] expect success Running test 386 tc 387: edge case for u1 [valid] expect success Running test 387 tc 388: edge case for u1 [valid] expect success Running test 388 tc 389: edge case for u1 [valid] expect success Running test 389 tc 390: edge case for u1 [valid] expect success Running test 390 tc 391: edge case for u1 [valid] expect success Running test 391 tc 392: edge case for u1 [valid] expect success Running test 392 tc 393: edge case for u1 [valid] expect success Running test 393 tc 394: edge case for u1 [valid] expect success Running test 394 tc 395: edge case for u2 [valid] expect success Running test 395 tc 396: edge case for u2 [valid] expect success Running test 396 tc 397: edge case for u2 [valid] expect success Running test 397 tc 398: edge case for u2 [valid] expect success Running test 398 tc 399: edge case for u2 [valid] expect success Running test 399 tc 400: edge case for u2 [valid] expect success Running test 400 tc 401: edge case for u2 [valid] expect success Running test 401 tc 402: edge case for u2 [valid] expect success Running test 402 tc 403: edge case for u2 [valid] expect success Running test 403 tc 404: edge case for u2 [valid] expect success Running test 404 tc 405: edge case for u2 [valid] expect success Running test 405 tc 406: edge case for u2 [valid] expect success Running test 406 tc 407: edge case for u2 [valid] expect success Running test 407 tc 408: edge case for u2 [valid] expect success Running test 408 tc 409: point duplication during verification [valid, PointDuplication] expect success Running test 409 tc 410: duplication bug [invalid, PointDuplication] expect failure Running test 410 tc 411: point with x-coordinate 0 [invalid] expect failure Running test 411 tc 412: point with x-coordinate 0 [invalid] expect failure Running test 412 tc 413: comparison with point at infinity [invalid] expect failure Running test 413 tc 414: extreme value for k and edgecase s [valid] expect success Running test 414 tc 415: extreme value for k and s^-1 [valid] expect success Running test 415 tc 416: extreme value for k and s^-1 [valid] expect success Running test 416 tc 417: extreme value for k and s^-1 [valid] expect success Running test 417 tc 418: extreme value for k and s^-1 [valid] expect success Running test 418 tc 419: extreme value for k [valid] expect success Running test 419 tc 420: extreme value for k and edgecase s [valid] expect success Running test 420 tc 421: extreme value for k and s^-1 [valid] expect success Running test 421 tc 422: extreme value for k and s^-1 [valid] expect success Running test 422 tc 423: extreme value for k and s^-1 [valid] expect success Running test 423 tc 424: extreme value for k and s^-1 [valid] expect success Running test 424 tc 425: extreme value for k [valid] expect success Running test 425 tc 426: testing point duplication [invalid] expect failure tc 427: testing point duplication [invalid] expect failure Running test 426 Running test 427 tc 428: testing point duplication [invalid] expect failure tc 429: testing point duplication [invalid] expect failure Running test 428 Running test 429 tc 430: pseudorandom signature [valid] expect success tc 431: pseudorandom signature [valid] expect success tc 432: pseudorandom signature [valid] expect success tc 433: pseudorandom signature [valid] expect success Running test 430 Running test 431 Running test 432 Running test 433 tc 434: x-coordinate of the public key has many trailing 0's [valid] expect success tc 435: x-coordinate of the public key has many trailing 0's [valid] expect success tc 436: x-coordinate of the public key has many trailing 0's [valid] expect success Running test 434 Running test 435 Running test 436 tc 437: y-coordinate of the public key has many trailing 0's [valid] expect success tc 438: y-coordinate of the public key has many trailing 0's [valid] expect success tc 439: y-coordinate of the public key has many trailing 0's [valid] expect success Running test 437 Running test 438 Running test 439 tc 440: y-coordinate of the public key has many trailing 1's [valid] expect success tc 441: y-coordinate of the public key has many trailing 1's [valid] expect success tc 442: y-coordinate of the public key has many trailing 1's [valid] expect success Running test 440 Running test 441 Running test 442 tc 443: x-coordinate of the public key has many trailing 1's [valid] expect success tc 444: x-coordinate of the public key has many trailing 1's [valid] expect success tc 445: x-coordinate of the public key has many trailing 1's [valid] expect success Running test 443 Running test 444 Running test 445 tc 446: x-coordinate of the public key is large [valid] expect success tc 447: x-coordinate of the public key is large [valid] expect success tc 448: x-coordinate of the public key is large [valid] expect success Running test 446 Running test 447 Running test 448 tc 449: x-coordinate of the public key is small [valid] expect success tc 450: x-coordinate of the public key is small [valid] expect success tc 451: x-coordinate of the public key is small [valid] expect success Running test 449 Running test 450 Running test 451 tc 452: y-coordinate of the public key is small [valid] expect success tc 453: y-coordinate of the public key is small [valid] expect success tc 454: y-coordinate of the public key is small [valid] expect success Running test 452 Running test 453 Running test 454 tc 455: y-coordinate of the public key is large [valid] expect success tc 456: y-coordinate of the public key is large [valid] expect success tc 457: y-coordinate of the public key is large [valid] expect success Running test 455 Running test 456 Running test 457 [ OK ] Pkcs11EcdsaWycheproofTest.P256Sha512 (625 ms) [ RUN ] Pkcs11EcdsaWycheproofTest.P384 Reading tests from: ecdsa_secp384r1_sha384_test.json Test vectors of type EcdsaVerify are meant for the verification of ASN encoded ECDSA signatures. BER: This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability. EdgeCase: Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0. MissingZero: Some implementations of ECDSA and DSA incorrectly encode r and s by not including leading zeros in the ASN encoding of integers when necessary. Hence, some implementations (e.g. jdk) allow signatures with incorrect ASN encodings assuming that the signature is otherwise valid. PointDuplication: Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission. tc 1: signature malleability [valid] expect success tc 2: Legacy:ASN encoding of s misses leading 0 [acceptable, MissingZero] expect success tc 3: valid [valid] expect success tc 4: long form encoding of length of sequence [invalid, BER] expect failure tc 5: length of sequence contains leading 0 [invalid, BER] expect failure tc 6: wrong length of sequence [invalid] expect failure tc 7: wrong length of sequence [invalid] expect failure tc 8: uint32 overflow in length of sequence [invalid] expect failure tc 9: uint64 overflow in length of sequence [invalid] expect failure tc 10: length of sequence = 2**31 - 1 [invalid] expect failure tc 11: length of sequence = 2**32 - 1 [invalid] expect failure tc 12: length of sequence = 2**40 - 1 [invalid] expect failure tc 13: length of sequence = 2**64 - 1 [invalid] expect failure tc 14: incorrect length of sequence [invalid] expect failure tc 15: indefinite length without termination [invalid] expect failure tc 16: indefinite length without termination [invalid] expect failure tc 17: indefinite length without termination [invalid] expect failure tc 18: removing sequence [invalid] expect failure tc 19: lonely sequence tag [invalid] expect failure tc 20: appending 0's to sequence [invalid] expect failure tc 21: prepending 0's to sequence [invalid] expect failure tc 22: appending unused 0's to sequence [invalid] expect failure tc 23: appending null value to sequence [invalid] expect failure tc 24: including garbage [invalid] expect failure tc 25: including garbage [invalid] expect failure tc 26: including garbage [invalid] expect failure tc 27: including garbage [invalid] expect failure tc 28: including garbage [invalid] expect failure tc 29: including garbage [invalid] expect failure tc 30: including garbage [invalid] expect failure tc 31: including garbage [invalid] expect failure tc 32: including garbage [invalid] expect failure tc 33: including undefined tags [invalid] expect failure tc 34: including undefined tags [invalid] expect failure tc 35: including undefined tags [invalid] expect failure tc 36: including undefined tags [invalid] expect failure tc 37: including undefined tags [invalid] expect failure tc 38: including undefined tags [invalid] expect failure tc 39: truncated length of sequence [invalid] expect failure tc 40: using composition with indefinite length [invalid] expect failure tc 41: using composition with indefinite length [invalid] expect failure tc 42: using composition with indefinite length [invalid] expect failure tc 43: using composition with wrong tag [invalid] expect failure tc 44: using composition with wrong tag [invalid] expect failure tc 45: using composition with wrong tag [invalid] expect failure tc 46: Replacing sequence with NULL [invalid] expect failure tc 47: changing tag value of sequence [invalid] expect failure tc 48: changing tag value of sequence [invalid] expect failure tc 49: changing tag value of sequence [invalid] expect failure tc 50: changing tag value of sequence [invalid] expect failure tc 51: changing tag value of sequence [invalid] expect failure tc 52: dropping value of sequence [invalid] expect failure tc 53: using composition for sequence [invalid] expect failure tc 54: truncated sequence [invalid] expect failure tc 55: truncated sequence [invalid] expect failure tc 56: indefinite length [invalid, BER] expect failure tc 57: indefinite length with truncated delimiter [invalid] expect failure tc 58: indefinite length with additional element [invalid] expect failure tc 59: indefinite length with truncated element [invalid] expect failure tc 60: indefinite length with garbage [invalid] expect failure tc 61: indefinite length with nonempty EOC [invalid] expect failure tc 62: prepend empty sequence [invalid] expect failure tc 63: append empty sequence [invalid] expect failure tc 64: append garbage with high tag number [invalid] expect failure tc 65: sequence of sequence [invalid] expect failure tc 66: truncated sequence: removed last 1 elements [invalid] expect failure tc 67: repeating element in sequence [invalid] expect failure tc 68: long form encoding of length of integer [invalid, BER] expect failure tc 69: long form encoding of length of integer [invalid, BER] expect failure tc 70: length of integer contains leading 0 [invalid, BER] expect failure tc 71: length of integer contains leading 0 [invalid, BER] expect failure tc 72: wrong length of integer [invalid] expect failure tc 73: wrong length of integer [invalid] expect failure tc 74: wrong length of integer [invalid] expect failure tc 75: wrong length of integer [invalid] expect failure tc 76: uint32 overflow in length of integer [invalid] expect failure tc 77: uint32 overflow in length of integer [invalid] expect failure tc 78: uint64 overflow in length of integer [invalid] expect failure tc 79: uint64 overflow in length of integer [invalid] expect failure tc 80: length of integer = 2**31 - 1 [invalid] expect failure tc 81: length of integer = 2**31 - 1 [invalid] expect failure tc 82: length of integer = 2**32 - 1 [invalid] expect failure tc 83: length of integer = 2**32 - 1 [invalid] expect failure tc 84: length of integer = 2**40 - 1 [invalid] expect failure tc 85: length of integer = 2**40 - 1 [invalid] expect failure tc 86: length of integer = 2**64 - 1 [invalid] expect failure tc 87: length of integer = 2**64 - 1 [invalid] expect failure tc 88: incorrect length of integer [invalid] expect failure tc 89: incorrect length of integer [invalid] expect failure tc 90: removing integer [invalid] expect failure tc 91: lonely integer tag [invalid] expect failure tc 92: lonely integer tag [invalid] expect failure tc 93: appending 0's to integer [invalid] expect failure tc 94: appending 0's to integer [invalid] expect failure tc 95: prepending 0's to integer [invalid, BER] expect failure tc 96: prepending 0's to integer [invalid, BER] expect failure tc 97: appending unused 0's to integer [invalid] expect failure tc 98: appending null value to integer [invalid] expect failure tc 99: appending null value to integer [invalid] expect failure tc 100: truncated length of integer [invalid] expect failure tc 101: truncated length of integer [invalid] expect failure tc 102: Replacing integer with NULL [invalid] expect failure tc 103: Replacing integer with NULL [invalid] expect failure tc 104: changing tag value of integer [invalid] expect failure tc 105: changing tag value of integer [invalid] expect failure tc 106: changing tag value of integer [invalid] expect failure tc 107: changing tag value of integer [invalid] expect failure tc 108: changing tag value of integer [invalid] expect failure tc 109: changing tag value of integer [invalid] expect failure tc 110: changing tag value of integer [invalid] expect failure tc 111: changing tag value of integer [invalid] expect failure tc 112: changing tag value of integer [invalid] expect failure tc 113: changing tag value of integer [invalid] expect failure tc 114: dropping value of integer [invalid] expect failure tc 115: dropping value of integer [invalid] expect failure tc 116: using composition for integer [invalid] expect failure tc 117: using composition for integer [invalid] expect failure tc 118: modify first byte of integer [invalid] expect failure tc 119: modify first byte of integer [invalid] expect failure tc 120: modify last byte of integer [invalid] expect failure tc 121: modify last byte of integer [invalid] expect failure tc 122: truncated integer [invalid] expect failure tc 123: truncated integer [invalid] expect failure tc 124: truncated integer [invalid] expect failure tc 125: leading ff in integer [invalid] expect failure tc 126: leading ff in integer [invalid] expect failure tc 127: replaced integer by infinity [invalid] expect failure tc 128: replaced integer by infinity [invalid] expect failure tc 129: replacing integer with zero [invalid] expect failure tc 130: replacing integer with zero [invalid] expect failure tc 131: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 132: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 133: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 134: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 135: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 136: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 137: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 138: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 139: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 140: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 141: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 142: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 143: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 144: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 145: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 146: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 147: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 148: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 149: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 150: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 151: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 152: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 153: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 154: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 155: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 156: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 157: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 158: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 159: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 160: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 161: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 162: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 163: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 164: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 165: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 166: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 167: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 168: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 169: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 170: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 171: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 172: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 173: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 174: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 175: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 176: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 177: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 178: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 179: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 180: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 181: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 182: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 183: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 184: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 185: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 186: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 187: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 188: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 189: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 190: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 191: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 192: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 193: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 194: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 195: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 196: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 197: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 198: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 199: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 200: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 201: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 202: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 203: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 204: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 205: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 206: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 207: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 208: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 209: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 210: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 211: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 212: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 213: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 214: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 215: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 216: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 217: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 218: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 219: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 220: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 221: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 222: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 223: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 224: Signature encoding contains wrong types. [invalid] expect failure tc 225: Signature encoding contains wrong types. [invalid] expect failure tc 226: Signature encoding contains wrong types. [invalid] expect failure tc 227: Signature encoding contains wrong types. [invalid] expect failure tc 228: Signature encoding contains wrong types. [invalid] expect failure tc 229: Signature encoding contains wrong types. [invalid] expect failure tc 230: Edge case for Shamir multiplication [valid] expect success tc 231: special case hash [valid] expect success tc 232: special case hash [valid] expect success tc 233: special case hash [valid] expect success tc 234: special case hash [valid] expect success tc 235: special case hash [valid] expect success tc 236: special case hash [valid] expect success tc 237: special case hash [valid] expect success tc 238: special case hash [valid] expect success tc 239: special case hash [valid] expect success tc 240: special case hash [valid] expect success tc 241: special case hash [valid] expect success tc 242: special case hash [valid] expect success tc 243: special case hash [valid] expect success tc 244: special case hash [valid] expect success tc 245: special case hash [valid] expect success tc 246: special case hash [valid] expect success tc 247: special case hash [valid] expect success tc 248: special case hash [valid] expect success tc 249: special case hash [valid] expect success tc 250: special case hash [valid] expect success tc 251: special case hash [valid] expect success tc 252: special case hash [valid] expect success tc 253: special case hash [valid] expect success tc 254: special case hash [valid] expect success tc 255: special case hash [valid] expect success tc 256: special case hash [valid] expect success tc 257: special case hash [valid] expect success tc 258: special case hash [valid] expect success tc 259: special case hash [valid] expect success tc 260: special case hash [valid] expect success tc 261: special case hash [valid] expect success tc 262: special case hash [valid] expect success tc 263: special case hash [valid] expect success tc 264: special case hash [valid] expect success tc 265: special case hash [valid] expect success tc 266: special case hash [valid] expect success tc 267: special case hash [valid] expect success tc 268: special case hash [valid] expect success tc 269: special case hash [valid] expect success tc 270: special case hash [valid] expect success tc 271: special case hash [valid] expect success tc 272: special case hash [valid] expect success tc 273: special case hash [valid] expect success tc 274: special case hash [valid] expect success tc 275: special case hash [valid] expect success tc 276: special case hash [valid] expect success tc 277: special case hash [valid] expect success tc 278: special case hash [valid] expect success tc 279: special case hash [valid] expect success tc 280: special case hash [valid] expect success tc 281: special case hash [valid] expect success tc 282: special case hash [valid] expect success tc 283: special case hash [valid] expect success tc 284: special case hash [valid] expect success tc 285: special case hash [valid] expect success tc 286: special case hash [valid] expect success tc 287: special case hash [valid] expect success tc 288: special case hash [valid] expect success tc 289: special case hash [valid] expect success tc 290: special case hash [valid] expect success tc 291: special case hash [valid] expect success tc 292: special case hash [valid] expect success tc 293: special case hash [valid] expect success tc 294: special case hash [valid] expect success tc 295: special case hash [valid] expect success tc 296: special case hash [valid] expect success tc 297: special case hash [valid] expect success tc 298: special case hash [valid] expect success tc 299: special case hash [valid] expect success tc 300: special case hash [valid] expect success tc 301: special case hash [valid] expect success tc 302: special case hash [valid] expect success tc 303: special case hash [valid] expect success tc 304: special case hash [valid] expect success tc 305: special case hash [valid] expect success tc 306: special case hash [valid] expect success tc 307: special case hash [valid] expect success tc 308: special case hash [valid] expect success tc 309: special case hash [valid] expect success tc 310: special case hash [valid] expect success tc 311: special case hash [valid] expect success tc 312: special case hash [valid] expect success tc 313: special case hash [valid] expect success tc 314: special case hash [valid] expect success tc 315: special case hash [valid] expect success tc 316: special case hash [valid] expect success Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 Running test 34 Running test 35 Running test 36 Running test 37 Running test 38 Running test 39 Running test 40 Running test 41 Running test 42 Running test 43 Running test 44 Running test 45 Running test 46 Running test 47 Running test 48 Running test 49 Running test 50 Running test 51 Running test 52 Running test 53 Running test 54 Running test 55 Running test 56 Running test 57 Running test 58 Running test 59 Running test 60 Running test 61 Running test 62 Running test 63 Running test 64 Running test 65 Running test 66 Running test 67 Running test 68 Running test 69 Running test 70 Running test 71 Running test 72 Running test 73 Running test 74 Running test 75 Running test 76 Running test 77 Running test 78 Running test 79 Running test 80 Running test 81 Running test 82 Running test 83 Running test 84 Running test 85 Running test 86 Running test 87 Running test 88 Running test 89 Running test 90 Running test 91 Running test 92 Running test 93 Running test 94 Running test 95 Running test 96 Running test 97 Running test 98 Running test 99 Running test 100 Running test 101 Running test 102 Running test 103 Running test 104 Running test 105 Running test 106 Running test 107 Running test 108 Running test 109 Running test 110 Running test 111 Running test 112 Running test 113 Running test 114 Running test 115 Running test 116 Running test 117 Running test 118 Running test 119 Running test 120 Running test 121 Running test 122 Running test 123 Running test 124 Running test 125 Running test 126 Running test 127 Running test 128 Running test 129 Running test 130 Running test 131 Running test 132 Running test 133 Running test 134 Running test 135 Running test 136 Running test 137 Running test 138 Running test 139 Running test 140 Running test 141 Running test 142 Running test 143 Running test 144 Running test 145 Running test 146 Running test 147 Running test 148 Running test 149 Running test 150 Running test 151 Running test 152 Running test 153 Running test 154 Running test 155 Running test 156 Running test 157 Running test 158 Running test 159 Running test 160 Running test 161 Running test 162 Running test 163 Running test 164 Running test 165 Running test 166 Running test 167 Running test 168 Running test 169 Running test 170 Running test 171 Running test 172 Running test 173 Running test 174 Running test 175 Running test 176 Running test 177 Running test 178 Running test 179 Running test 180 Running test 181 Running test 182 Running test 183 Running test 184 Running test 185 Running test 186 Running test 187 Running test 188 Running test 189 Running test 190 Running test 191 Running test 192 Running test 193 Running test 194 Running test 195 Running test 196 Running test 197 Running test 198 Running test 199 Running test 200 Running test 201 Running test 202 Running test 203 Running test 204 Running test 205 Running test 206 Running test 207 Running test 208 Running test 209 Running test 210 Running test 211 Running test 212 Running test 213 Running test 214 Running test 215 Running test 216 Running test 217 Running test 218 Running test 219 Running test 220 Running test 221 Running test 222 Running test 223 Running test 224 Running test 225 Running test 226 Running test 227 Running test 228 Running test 229 Running test 230 Running test 231 Running test 232 Running test 233 Running test 234 Running test 235 Running test 236 Running test 237 Running test 238 Running test 239 Running test 240 Running test 241 Running test 242 Running test 243 Running test 244 Running test 245 Running test 246 Running test 247 Running test 248 Running test 249 Running test 250 Running test 251 Running test 252 Running test 253 Running test 254 Running test 255 Running test 256 Running test 257 Running test 258 Running test 259 Running test 260 Running test 261 Running test 262 Running test 263 Running test 264 Running test 265 Running test 266 Running test 267 Running test 268 Running test 269 Running test 270 Running test 271 Running test 272 Running test 273 Running test 274 Running test 275 Running test 276 Running test 277 Running test 278 Running test 279 Running test 280 Running test 281 Running test 282 Running test 283 Running test 284 Running test 285 Running test 286 Running test 287 Running test 288 Running test 289 Running test 290 Running test 291 Running test 292 Running test 293 Running test 294 Running test 295 Running test 296 Running test 297 Running test 298 Running test 299 Running test 300 Running test 301 Running test 302 Running test 303 Running test 304 Running test 305 Running test 306 Running test 307 Running test 308 Running test 309 Running test 310 Running test 311 Running test 312 Running test 313 Running test 314 Running test 315 Running test 316 tc 317: k*G has a large x-coordinate [valid] expect success tc 318: r too large [invalid] expect failure Running test 317 Running test 318 tc 319: r,s are large [valid] expect success Running test 319 tc 320: r and s^-1 have a large Hamming weight [valid] expect success Running test 320 tc 321: r and s^-1 have a large Hamming weight [valid] expect success Running test 321 tc 322: small r and s [valid] expect success Running test 322 tc 323: small r and s [valid] expect success Running test 323 tc 324: small r and s [valid] expect success tc 325: r is larger than n [invalid] expect failure Running test 324 Running test 325 tc 326: s is larger than n [invalid] expect failure Running test 326 tc 327: small r and s^-1 [valid] expect success Running test 327 tc 328: smallish r and s^-1 [valid] expect success Running test 328 tc 329: 100-bit r and small s^-1 [valid] expect success Running test 329 tc 330: small r and 100 bit s^-1 [valid] expect success Running test 330 tc 331: 100-bit r and s^-1 [valid] expect success Running test 331 tc 332: r and s^-1 are close to n [valid] expect success Running test 332 tc 333: s == 1 [valid] expect success tc 334: s == 0 [invalid] expect failure Running test 333 Running test 334 tc 335: point at infinity during verify [invalid] expect failure Running test 335 tc 336: edge case for signature malleability [valid] expect success Running test 336 tc 337: edge case for signature malleability [valid] expect success Running test 337 tc 338: u1 == 1 [valid] expect success Running test 338 tc 339: u1 == n - 1 [valid] expect success Running test 339 tc 340: u2 == 1 [valid] expect success Running test 340 tc 341: u2 == n - 1 [valid] expect success Running test 341 tc 342: edge case for u1 [valid] expect success Running test 342 tc 343: edge case for u1 [valid] expect success Running test 343 tc 344: edge case for u1 [valid] expect success Running test 344 tc 345: edge case for u1 [valid] expect success Running test 345 tc 346: edge case for u1 [valid] expect success Running test 346 tc 347: edge case for u1 [valid] expect success Running test 347 tc 348: edge case for u1 [valid] expect success Running test 348 tc 349: edge case for u1 [valid] expect success Running test 349 tc 350: edge case for u1 [valid] expect success Running test 350 tc 351: edge case for u1 [valid] expect success Running test 351 tc 352: edge case for u1 [valid] expect success Running test 352 tc 353: edge case for u1 [valid] expect success Running test 353 tc 354: edge case for u2 [valid] expect success Running test 354 tc 355: edge case for u2 [valid] expect success Running test 355 tc 356: edge case for u2 [valid] expect success Running test 356 tc 357: edge case for u2 [valid] expect success Running test 357 tc 358: edge case for u2 [valid] expect success Running test 358 tc 359: edge case for u2 [valid] expect success Running test 359 tc 360: edge case for u2 [valid] expect success Running test 360 tc 361: edge case for u2 [valid] expect success Running test 361 tc 362: edge case for u2 [valid] expect success Running test 362 tc 363: edge case for u2 [valid] expect success Running test 363 tc 364: edge case for u2 [valid] expect success Running test 364 tc 365: edge case for u2 [valid] expect success Running test 365 tc 366: point duplication during verification [valid, PointDuplication] expect success Running test 366 tc 367: duplication bug [invalid, PointDuplication] expect failure Running test 367 tc 368: point with x-coordinate 0 [invalid] expect failure Running test 368 tc 369: point with x-coordinate 0 [invalid] expect failure Running test 369 tc 370: comparison with point at infinity [invalid] expect failure Running test 370 tc 371: extreme value for k and edgecase s [valid] expect success Running test 371 tc 372: extreme value for k and s^-1 [valid] expect success Running test 372 tc 373: extreme value for k and s^-1 [valid] expect success Running test 373 tc 374: extreme value for k and s^-1 [valid] expect success Running test 374 tc 375: extreme value for k and s^-1 [valid] expect success Running test 375 tc 376: extreme value for k [valid] expect success Running test 376 tc 377: extreme value for k and edgecase s [valid] expect success Running test 377 tc 378: extreme value for k and s^-1 [valid] expect success Running test 378 tc 379: extreme value for k and s^-1 [valid] expect success Running test 379 tc 380: extreme value for k and s^-1 [valid] expect success Running test 380 tc 381: extreme value for k and s^-1 [valid] expect success Running test 381 tc 382: extreme value for k [valid] expect success Running test 382 tc 383: testing point duplication [invalid] expect failure tc 384: testing point duplication [invalid] expect failure Running test 383 Running test 384 tc 385: testing point duplication [invalid] expect failure tc 386: testing point duplication [invalid] expect failure Running test 385 Running test 386 tc 387: pseudorandom signature [valid] expect success tc 388: pseudorandom signature [valid] expect success tc 389: pseudorandom signature [valid] expect success tc 390: pseudorandom signature [valid] expect success Running test 387 Running test 388 Running test 389 Running test 390 tc 391: x-coordinate of the public key is large [valid] expect success tc 392: x-coordinate of the public key is large [valid] expect success tc 393: x-coordinate of the public key is large [valid] expect success Running test 391 Running test 392 Running test 393 tc 394: y-coordinate of the public key has many trailing 0's [valid] expect success tc 395: y-coordinate of the public key has many trailing 0's [valid] expect success tc 396: y-coordinate of the public key has many trailing 0's [valid] expect success Running test 394 Running test 395 Running test 396 tc 397: x-coordinate of the public key has many trailing 0's [valid] expect success tc 398: x-coordinate of the public key has many trailing 0's [valid] expect success tc 399: x-coordinate of the public key has many trailing 0's [valid] expect success Running test 397 Running test 398 Running test 399 tc 400: x-coordinate of the public key is small [valid] expect success tc 401: x-coordinate of the public key is small [valid] expect success tc 402: x-coordinate of the public key is small [valid] expect success Running test 400 Running test 401 Running test 402 tc 403: y-coordinate of the public key is small [valid] expect success tc 404: y-coordinate of the public key is small [valid] expect success tc 405: y-coordinate of the public key is small [valid] expect success Running test 403 Running test 404 Running test 405 tc 406: y-coordinate of the public key is large [valid] expect success tc 407: y-coordinate of the public key is large [valid] expect success tc 408: y-coordinate of the public key is large [valid] expect success Running test 406 Running test 407 Running test 408 [ OK ] Pkcs11EcdsaWycheproofTest.P384 (2439 ms) [ RUN ] Pkcs11EcdsaWycheproofTest.P384Sha512 Reading tests from: ecdsa_secp384r1_sha512_test.json Test vectors of type EcdsaVerify are meant for the verification of ASN encoded ECDSA signatures. BER: This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability. EdgeCase: Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0. MissingZero: Some implementations of ECDSA and DSA incorrectly encode r and s by not including leading zeros in the ASN encoding of integers when necessary. Hence, some implementations (e.g. jdk) allow signatures with incorrect ASN encodings assuming that the signature is otherwise valid. PointDuplication: Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission. tc 1: signature malleability [valid] expect success tc 2: Legacy:ASN encoding of r misses leading 0 [acceptable, MissingZero] expect success tc 3: Legacy:ASN encoding of s misses leading 0 [acceptable, MissingZero] expect success tc 4: valid [valid] expect success tc 5: long form encoding of length of sequence [invalid, BER] expect failure tc 6: length of sequence contains leading 0 [invalid, BER] expect failure tc 7: wrong length of sequence [invalid] expect failure tc 8: wrong length of sequence [invalid] expect failure tc 9: uint32 overflow in length of sequence [invalid] expect failure tc 10: uint64 overflow in length of sequence [invalid] expect failure tc 11: length of sequence = 2**31 - 1 [invalid] expect failure tc 12: length of sequence = 2**32 - 1 [invalid] expect failure tc 13: length of sequence = 2**40 - 1 [invalid] expect failure tc 14: length of sequence = 2**64 - 1 [invalid] expect failure tc 15: incorrect length of sequence [invalid] expect failure tc 16: indefinite length without termination [invalid] expect failure tc 17: indefinite length without termination [invalid] expect failure tc 18: indefinite length without termination [invalid] expect failure tc 19: removing sequence [invalid] expect failure tc 20: lonely sequence tag [invalid] expect failure tc 21: appending 0's to sequence [invalid] expect failure tc 22: prepending 0's to sequence [invalid] expect failure tc 23: appending unused 0's to sequence [invalid] expect failure tc 24: appending null value to sequence [invalid] expect failure tc 25: including garbage [invalid] expect failure tc 26: including garbage [invalid] expect failure tc 27: including garbage [invalid] expect failure tc 28: including garbage [invalid] expect failure tc 29: including garbage [invalid] expect failure tc 30: including garbage [invalid] expect failure tc 31: including garbage [invalid] expect failure tc 32: including garbage [invalid] expect failure tc 33: including garbage [invalid] expect failure tc 34: including undefined tags [invalid] expect failure tc 35: including undefined tags [invalid] expect failure tc 36: including undefined tags [invalid] expect failure tc 37: including undefined tags [invalid] expect failure tc 38: including undefined tags [invalid] expect failure tc 39: including undefined tags [invalid] expect failure tc 40: truncated length of sequence [invalid] expect failure tc 41: using composition with indefinite length [invalid] expect failure tc 42: using composition with indefinite length [invalid] expect failure tc 43: using composition with indefinite length [invalid] expect failure tc 44: using composition with wrong tag [invalid] expect failure tc 45: using composition with wrong tag [invalid] expect failure tc 46: using composition with wrong tag [invalid] expect failure tc 47: Replacing sequence with NULL [invalid] expect failure tc 48: changing tag value of sequence [invalid] expect failure tc 49: changing tag value of sequence [invalid] expect failure tc 50: changing tag value of sequence [invalid] expect failure tc 51: changing tag value of sequence [invalid] expect failure tc 52: changing tag value of sequence [invalid] expect failure tc 53: dropping value of sequence [invalid] expect failure tc 54: using composition for sequence [invalid] expect failure tc 55: truncated sequence [invalid] expect failure tc 56: truncated sequence [invalid] expect failure tc 57: indefinite length [invalid, BER] expect failure tc 58: indefinite length with truncated delimiter [invalid] expect failure tc 59: indefinite length with additional element [invalid] expect failure tc 60: indefinite length with truncated element [invalid] expect failure tc 61: indefinite length with garbage [invalid] expect failure tc 62: indefinite length with nonempty EOC [invalid] expect failure tc 63: prepend empty sequence [invalid] expect failure tc 64: append empty sequence [invalid] expect failure tc 65: append garbage with high tag number [invalid] expect failure tc 66: sequence of sequence [invalid] expect failure tc 67: truncated sequence: removed last 1 elements [invalid] expect failure tc 68: repeating element in sequence [invalid] expect failure tc 69: long form encoding of length of integer [invalid, BER] expect failure tc 70: long form encoding of length of integer [invalid, BER] expect failure tc 71: length of integer contains leading 0 [invalid, BER] expect failure tc 72: length of integer contains leading 0 [invalid, BER] expect failure tc 73: wrong length of integer [invalid] expect failure tc 74: wrong length of integer [invalid] expect failure tc 75: wrong length of integer [invalid] expect failure tc 76: wrong length of integer [invalid] expect failure tc 77: uint32 overflow in length of integer [invalid] expect failure tc 78: uint32 overflow in length of integer [invalid] expect failure tc 79: uint64 overflow in length of integer [invalid] expect failure tc 80: uint64 overflow in length of integer [invalid] expect failure tc 81: length of integer = 2**31 - 1 [invalid] expect failure tc 82: length of integer = 2**31 - 1 [invalid] expect failure tc 83: length of integer = 2**32 - 1 [invalid] expect failure tc 84: length of integer = 2**32 - 1 [invalid] expect failure tc 85: length of integer = 2**40 - 1 [invalid] expect failure tc 86: length of integer = 2**40 - 1 [invalid] expect failure tc 87: length of integer = 2**64 - 1 [invalid] expect failure tc 88: length of integer = 2**64 - 1 [invalid] expect failure tc 89: incorrect length of integer [invalid] expect failure tc 90: incorrect length of integer [invalid] expect failure tc 91: removing integer [invalid] expect failure tc 92: lonely integer tag [invalid] expect failure tc 93: lonely integer tag [invalid] expect failure tc 94: appending 0's to integer [invalid] expect failure tc 95: appending 0's to integer [invalid] expect failure tc 96: prepending 0's to integer [invalid, BER] expect failure tc 97: prepending 0's to integer [invalid, BER] expect failure tc 98: appending unused 0's to integer [invalid] expect failure tc 99: appending null value to integer [invalid] expect failure tc 100: appending null value to integer [invalid] expect failure tc 101: truncated length of integer [invalid] expect failure tc 102: truncated length of integer [invalid] expect failure tc 103: Replacing integer with NULL [invalid] expect failure tc 104: Replacing integer with NULL [invalid] expect failure tc 105: changing tag value of integer [invalid] expect failure tc 106: changing tag value of integer [invalid] expect failure tc 107: changing tag value of integer [invalid] expect failure tc 108: changing tag value of integer [invalid] expect failure tc 109: changing tag value of integer [invalid] expect failure tc 110: changing tag value of integer [invalid] expect failure tc 111: changing tag value of integer [invalid] expect failure tc 112: changing tag value of integer [invalid] expect failure tc 113: changing tag value of integer [invalid] expect failure tc 114: changing tag value of integer [invalid] expect failure tc 115: dropping value of integer [invalid] expect failure tc 116: dropping value of integer [invalid] expect failure tc 117: using composition for integer [invalid] expect failure tc 118: using composition for integer [invalid] expect failure tc 119: modify first byte of integer [invalid] expect failure tc 120: modify first byte of integer [invalid] expect failure tc 121: modify last byte of integer [invalid] expect failure tc 122: modify last byte of integer [invalid] expect failure tc 123: truncated integer [invalid] expect failure tc 124: truncated integer [invalid] expect failure tc 125: leading ff in integer [invalid] expect failure tc 126: leading ff in integer [invalid] expect failure tc 127: replaced integer by infinity [invalid] expect failure tc 128: replaced integer by infinity [invalid] expect failure tc 129: replacing integer with zero [invalid] expect failure tc 130: replacing integer with zero [invalid] expect failure tc 131: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 132: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 133: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 134: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 135: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 136: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 137: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 138: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 139: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 140: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 141: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 142: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 143: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 144: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 145: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 146: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 147: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 148: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 149: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 150: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 151: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 152: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 153: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 154: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 155: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 156: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 157: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 158: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 159: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 160: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 161: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 162: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 163: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 164: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 165: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 166: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 167: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 168: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 169: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 170: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 171: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 172: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 173: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 174: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 175: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 176: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 177: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 178: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 179: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 180: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 181: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 182: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 183: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 184: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 185: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 186: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 187: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 188: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 189: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 190: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 191: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 192: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 193: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 194: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 195: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 196: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 197: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 198: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 199: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 200: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 201: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 202: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 203: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 204: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 205: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 206: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 207: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 208: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 209: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 210: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 211: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 212: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 213: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 214: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 215: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 216: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 217: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 218: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 219: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 220: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 221: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 222: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 223: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 224: Signature encoding contains wrong types. [invalid] expect failure tc 225: Signature encoding contains wrong types. [invalid] expect failure tc 226: Signature encoding contains wrong types. [invalid] expect failure tc 227: Signature encoding contains wrong types. [invalid] expect failure tc 228: Signature encoding contains wrong types. [invalid] expect failure tc 229: Signature encoding contains wrong types. [invalid] expect failure tc 230: Edge case for Shamir multiplication [valid] expect success tc 231: special case hash [valid] expect success tc 232: special case hash [valid] expect success tc 233: special case hash [valid] expect success tc 234: special case hash [valid] expect success tc 235: special case hash [valid] expect success tc 236: special case hash [valid] expect success tc 237: special case hash [valid] expect success tc 238: special case hash [valid] expect success tc 239: special case hash [valid] expect success tc 240: special case hash [valid] expect success tc 241: special case hash [valid] expect success tc 242: special case hash [valid] expect success tc 243: special case hash [valid] expect success tc 244: special case hash [valid] expect success tc 245: special case hash [valid] expect success tc 246: special case hash [valid] expect success tc 247: special case hash [valid] expect success tc 248: special case hash [valid] expect success tc 249: special case hash [valid] expect success tc 250: special case hash [valid] expect success tc 251: special case hash [valid] expect success tc 252: special case hash [valid] expect success tc 253: special case hash [valid] expect success tc 254: special case hash [valid] expect success tc 255: special case hash [valid] expect success tc 256: special case hash [valid] expect success tc 257: special case hash [valid] expect success tc 258: special case hash [valid] expect success tc 259: special case hash [valid] expect success tc 260: special case hash [valid] expect success tc 261: special case hash [valid] expect success tc 262: special case hash [valid] expect success tc 263: special case hash [valid] expect success tc 264: special case hash [valid] expect success tc 265: special case hash [valid] expect success tc 266: special case hash [valid] expect success tc 267: special case hash [valid] expect success tc 268: special case hash [valid] expect success tc 269: special case hash [valid] expect success tc 270: special case hash [valid] expect success tc 271: special case hash [valid] expect success tc 272: special case hash [valid] expect success tc 273: special case hash [valid] expect success tc 274: special case hash [valid] expect success tc 275: special case hash [valid] expect success tc 276: special case hash [valid] expect success tc 277: special case hash [valid] expect success tc 278: special case hash [valid] expect success tc 279: special case hash [valid] expect success tc 280: special case hash [valid] expect success tc 281: special case hash [valid] expect success tc 282: special case hash [valid] expect success tc 283: special case hash [valid] expect success tc 284: special case hash [valid] expect success tc 285: special case hash [valid] expect success tc 286: special case hash [valid] expect success tc 287: special case hash [valid] expect success tc 288: special case hash [valid] expect success tc 289: special case hash [valid] expect success tc 290: special case hash [valid] expect success tc 291: special case hash [valid] expect success tc 292: special case hash [valid] expect success tc 293: special case hash [valid] expect success tc 294: special case hash [valid] expect success tc 295: special case hash [valid] expect success tc 296: special case hash [valid] expect success tc 297: special case hash [valid] expect success tc 298: special case hash [valid] expect success tc 299: special case hash [valid] expect success tc 300: special case hash [valid] expect success tc 301: special case hash [valid] expect success tc 302: special case hash [valid] expect success tc 303: special case hash [valid] expect success tc 304: special case hash [valid] expect success tc 305: special case hash [valid] expect success tc 306: special case hash [valid] expect success tc 307: special case hash [valid] expect success tc 308: special case hash [valid] expect success tc 309: special case hash [valid] expect success tc 310: special case hash [valid] expect success tc 311: special case hash [valid] expect success tc 312: special case hash [valid] expect success tc 313: special case hash [valid] expect success tc 314: special case hash [valid] expect success tc 315: special case hash [valid] expect success tc 316: special case hash [valid] expect success tc 317: special case hash [valid] expect success tc 318: special case hash [valid] expect success tc 319: special case hash [valid] expect success tc 320: special case hash [valid] expect success tc 321: special case hash [valid] expect success tc 322: special case hash [valid] expect success tc 323: special case hash [valid] expect success tc 324: special case hash [valid] expect success tc 325: special case hash [valid] expect success tc 326: special case hash [valid] expect success tc 327: special case hash [valid] expect success tc 328: special case hash [valid] expect success tc 329: special case hash [valid] expect success tc 330: special case hash [valid] expect success tc 331: special case hash [valid] expect success tc 332: special case hash [valid] expect success tc 333: special case hash [valid] expect success tc 334: special case hash [valid] expect success tc 335: special case hash [valid] expect success tc 336: special case hash [valid] expect success tc 337: special case hash [valid] expect success tc 338: special case hash [valid] expect success tc 339: special case hash [valid] expect success tc 340: special case hash [valid] expect success tc 341: special case hash [valid] expect success tc 342: special case hash [valid] expect success tc 343: special case hash [valid] expect success tc 344: special case hash [valid] expect success tc 345: special case hash [valid] expect success tc 346: special case hash [valid] expect success tc 347: special case hash [valid] expect success tc 348: special case hash [valid] expect success tc 349: special case hash [valid] expect success tc 350: special case hash [valid] expect success tc 351: special case hash [valid] expect success tc 352: special case hash [valid] expect success tc 353: special case hash [valid] expect success tc 354: Signature generated without truncating the hash [invalid] expect failure Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 Running test 34 Running test 35 Running test 36 Running test 37 Running test 38 Running test 39 Running test 40 Running test 41 Running test 42 Running test 43 Running test 44 Running test 45 Running test 46 Running test 47 Running test 48 Running test 49 Running test 50 Running test 51 Running test 52 Running test 53 Running test 54 Running test 55 Running test 56 Running test 57 Running test 58 Running test 59 Running test 60 Running test 61 Running test 62 Running test 63 Running test 64 Running test 65 Running test 66 Running test 67 Running test 68 Running test 69 Running test 70 Running test 71 Running test 72 Running test 73 Running test 74 Running test 75 Running test 76 Running test 77 Running test 78 Running test 79 Running test 80 Running test 81 Running test 82 Running test 83 Running test 84 Running test 85 Running test 86 Running test 87 Running test 88 Running test 89 Running test 90 Running test 91 Running test 92 Running test 93 Running test 94 Running test 95 Running test 96 Running test 97 Running test 98 Running test 99 Running test 100 Running test 101 Running test 102 Running test 103 Running test 104 Running test 105 Running test 106 Running test 107 Running test 108 Running test 109 Running test 110 Running test 111 Running test 112 Running test 113 Running test 114 Running test 115 Running test 116 Running test 117 Running test 118 Running test 119 Running test 120 Running test 121 Running test 122 Running test 123 Running test 124 Running test 125 Running test 126 Running test 127 Running test 128 Running test 129 Running test 130 Running test 131 Running test 132 Running test 133 Running test 134 Running test 135 Running test 136 Running test 137 Running test 138 Running test 139 Running test 140 Running test 141 Running test 142 Running test 143 Running test 144 Running test 145 Running test 146 Running test 147 Running test 148 Running test 149 Running test 150 Running test 151 Running test 152 Running test 153 Running test 154 Running test 155 Running test 156 Running test 157 Running test 158 Running test 159 Running test 160 Running test 161 Running test 162 Running test 163 Running test 164 Running test 165 Running test 166 Running test 167 Running test 168 Running test 169 Running test 170 Running test 171 Running test 172 Running test 173 Running test 174 Running test 175 Running test 176 Running test 177 Running test 178 Running test 179 Running test 180 Running test 181 Running test 182 Running test 183 Running test 184 Running test 185 Running test 186 Running test 187 Running test 188 Running test 189 Running test 190 Running test 191 Running test 192 Running test 193 Running test 194 Running test 195 Running test 196 Running test 197 Running test 198 Running test 199 Running test 200 Running test 201 Running test 202 Running test 203 Running test 204 Running test 205 Running test 206 Running test 207 Running test 208 Running test 209 Running test 210 Running test 211 Running test 212 Running test 213 Running test 214 Running test 215 Running test 216 Running test 217 Running test 218 Running test 219 Running test 220 Running test 221 Running test 222 Running test 223 Running test 224 Running test 225 Running test 226 Running test 227 Running test 228 Running test 229 Running test 230 Running test 231 Running test 232 Running test 233 Running test 234 Running test 235 Running test 236 Running test 237 Running test 238 Running test 239 Running test 240 Running test 241 Running test 242 Running test 243 Running test 244 Running test 245 Running test 246 Running test 247 Running test 248 Running test 249 Running test 250 Running test 251 Running test 252 Running test 253 Running test 254 Running test 255 Running test 256 Running test 257 Running test 258 Running test 259 Running test 260 Running test 261 Running test 262 Running test 263 Running test 264 Running test 265 Running test 266 Running test 267 Running test 268 Running test 269 Running test 270 Running test 271 Running test 272 Running test 273 Running test 274 Running test 275 Running test 276 Running test 277 Running test 278 Running test 279 Running test 280 Running test 281 Running test 282 Running test 283 Running test 284 Running test 285 Running test 286 Running test 287 Running test 288 Running test 289 Running test 290 Running test 291 Running test 292 Running test 293 Running test 294 Running test 295 Running test 296 Running test 297 Running test 298 Running test 299 Running test 300 Running test 301 Running test 302 Running test 303 Running test 304 Running test 305 Running test 306 Running test 307 Running test 308 Running test 309 Running test 310 Running test 311 Running test 312 Running test 313 Running test 314 Running test 315 Running test 316 Running test 317 Running test 318 Running test 319 Running test 320 Running test 321 Running test 322 Running test 323 Running test 324 Running test 325 Running test 326 Running test 327 Running test 328 Running test 329 Running test 330 Running test 331 Running test 332 Running test 333 Running test 334 Running test 335 Running test 336 Running test 337 Running test 338 Running test 339 Running test 340 Running test 341 Running test 342 Running test 343 Running test 344 Running test 345 Running test 346 Running test 347 Running test 348 Running test 349 Running test 350 Running test 351 Running test 352 Running test 353 Running test 354 tc 355: k*G has a large x-coordinate [valid] expect success tc 356: r too large [invalid] expect failure Running test 355 Running test 356 tc 357: r,s are large [valid] expect success Running test 357 tc 358: r and s^-1 have a large Hamming weight [valid] expect success Running test 358 tc 359: r and s^-1 have a large Hamming weight [valid] expect success Running test 359 tc 360: small r and s [valid] expect success Running test 360 tc 361: small r and s [valid] expect success Running test 361 tc 362: small r and s [valid] expect success tc 363: r is larger than n [invalid] expect failure Running test 362 Running test 363 tc 364: s is larger than n [invalid] expect failure Running test 364 tc 365: small r and s^-1 [valid] expect success Running test 365 tc 366: smallish r and s^-1 [valid] expect success Running test 366 tc 367: 100-bit r and small s^-1 [valid] expect success Running test 367 tc 368: small r and 100 bit s^-1 [valid] expect success Running test 368 tc 369: 100-bit r and s^-1 [valid] expect success Running test 369 tc 370: r and s^-1 are close to n [valid] expect success Running test 370 tc 371: s == 1 [valid] expect success tc 372: s == 0 [invalid] expect failure Running test 371 Running test 372 tc 373: point at infinity during verify [invalid] expect failure Running test 373 tc 374: edge case for signature malleability [valid] expect success Running test 374 tc 375: edge case for signature malleability [valid] expect success Running test 375 tc 376: u1 == 1 [valid] expect success Running test 376 tc 377: u1 == n - 1 [valid] expect success Running test 377 tc 378: u2 == 1 [valid] expect success Running test 378 tc 379: u2 == n - 1 [valid] expect success Running test 379 tc 380: edge case for u1 [valid] expect success Running test 380 tc 381: edge case for u1 [valid] expect success Running test 381 tc 382: edge case for u1 [valid] expect success Running test 382 tc 383: edge case for u1 [valid] expect success Running test 383 tc 384: edge case for u1 [valid] expect success Running test 384 tc 385: edge case for u1 [valid] expect success Running test 385 tc 386: edge case for u1 [valid] expect success Running test 386 tc 387: edge case for u1 [valid] expect success Running test 387 tc 388: edge case for u1 [valid] expect success Running test 388 tc 389: edge case for u1 [valid] expect success Running test 389 tc 390: edge case for u1 [valid] expect success Running test 390 tc 391: edge case for u1 [valid] expect success Running test 391 tc 392: edge case for u2 [valid] expect success Running test 392 tc 393: edge case for u2 [valid] expect success Running test 393 tc 394: edge case for u2 [valid] expect success Running test 394 tc 395: edge case for u2 [valid] expect success Running test 395 tc 396: edge case for u2 [valid] expect success Running test 396 tc 397: edge case for u2 [valid] expect success Running test 397 tc 398: edge case for u2 [valid] expect success Running test 398 tc 399: edge case for u2 [valid] expect success Running test 399 tc 400: edge case for u2 [valid] expect success Running test 400 tc 401: edge case for u2 [valid] expect success Running test 401 tc 402: edge case for u2 [valid] expect success Running test 402 tc 403: edge case for u2 [valid] expect success Running test 403 tc 404: point duplication during verification [valid, PointDuplication] expect success Running test 404 tc 405: duplication bug [invalid, PointDuplication] expect failure Running test 405 tc 406: point with x-coordinate 0 [invalid] expect failure Running test 406 tc 407: point with x-coordinate 0 [invalid] expect failure Running test 407 tc 408: comparison with point at infinity [invalid] expect failure Running test 408 tc 409: extreme value for k and edgecase s [valid] expect success Running test 409 tc 410: extreme value for k and s^-1 [valid] expect success Running test 410 tc 411: extreme value for k and s^-1 [valid] expect success Running test 411 tc 412: extreme value for k and s^-1 [valid] expect success Running test 412 tc 413: extreme value for k and s^-1 [valid] expect success Running test 413 tc 414: extreme value for k [valid] expect success Running test 414 tc 415: extreme value for k and edgecase s [valid] expect success Running test 415 tc 416: extreme value for k and s^-1 [valid] expect success Running test 416 tc 417: extreme value for k and s^-1 [valid] expect success Running test 417 tc 418: extreme value for k and s^-1 [valid] expect success Running test 418 tc 419: extreme value for k and s^-1 [valid] expect success Running test 419 tc 420: extreme value for k [valid] expect success Running test 420 tc 421: testing point duplication [invalid] expect failure tc 422: testing point duplication [invalid] expect failure Running test 421 Running test 422 tc 423: testing point duplication [invalid] expect failure tc 424: testing point duplication [invalid] expect failure Running test 423 Running test 424 tc 425: pseudorandom signature [valid] expect success tc 426: pseudorandom signature [valid] expect success tc 427: pseudorandom signature [valid] expect success tc 428: pseudorandom signature [valid] expect success Running test 425 Running test 426 Running test 427 Running test 428 tc 429: x-coordinate of the public key is large [valid] expect success tc 430: x-coordinate of the public key is large [valid] expect success tc 431: x-coordinate of the public key is large [valid] expect success Running test 429 Running test 430 Running test 431 tc 432: y-coordinate of the public key has many trailing 0's [valid] expect success tc 433: y-coordinate of the public key has many trailing 0's [valid] expect success tc 434: y-coordinate of the public key has many trailing 0's [valid] expect success Running test 432 Running test 433 Running test 434 tc 435: x-coordinate of the public key has many trailing 0's [valid] expect success tc 436: x-coordinate of the public key has many trailing 0's [valid] expect success tc 437: x-coordinate of the public key has many trailing 0's [valid] expect success Running test 435 Running test 436 Running test 437 tc 438: x-coordinate of the public key is small [valid] expect success tc 439: x-coordinate of the public key is small [valid] expect success tc 440: x-coordinate of the public key is small [valid] expect success Running test 438 Running test 439 Running test 440 tc 441: y-coordinate of the public key is small [valid] expect success tc 442: y-coordinate of the public key is small [valid] expect success tc 443: y-coordinate of the public key is small [valid] expect success Running test 441 Running test 442 Running test 443 tc 444: y-coordinate of the public key is large [valid] expect success tc 445: y-coordinate of the public key is large [valid] expect success tc 446: y-coordinate of the public key is large [valid] expect success Running test 444 Running test 445 Running test 446 [ OK ] Pkcs11EcdsaWycheproofTest.P384Sha512 (2892 ms) [ RUN ] Pkcs11EcdsaWycheproofTest.P521 Reading tests from: ecdsa_secp521r1_sha512_test.json Test vectors of type EcdsaVerify are meant for the verification of ASN encoded ECDSA signatures. BER: This is a signature with correct values for (r, s) but using some alternative BER encoding instead of DER encoding. Implementations should not accept such signatures to limit signature malleability. EdgeCase: Edge case values such as r=1 and s=0 can lead to forgeries if the ECDSA implementation does not check boundaries and computes s^(-1)==0. PointDuplication: Some implementations of ECDSA do not handle duplication and points at infinity correctly. This is a test vector that has been specially crafted to check for such an omission. tc 1: signature malleability [valid] expect success tc 2: valid [valid] expect success tc 3: length of sequence contains leading 0 [invalid, BER] expect failure tc 4: wrong length of sequence [invalid] expect failure tc 5: wrong length of sequence [invalid] expect failure tc 6: uint32 overflow in length of sequence [invalid] expect failure tc 7: uint64 overflow in length of sequence [invalid] expect failure tc 8: length of sequence = 2**31 - 1 [invalid] expect failure tc 9: length of sequence = 2**32 - 1 [invalid] expect failure tc 10: length of sequence = 2**40 - 1 [invalid] expect failure tc 11: length of sequence = 2**64 - 1 [invalid] expect failure tc 12: incorrect length of sequence [invalid] expect failure tc 13: indefinite length without termination [invalid] expect failure tc 14: indefinite length without termination [invalid] expect failure tc 15: indefinite length without termination [invalid] expect failure tc 16: removing sequence [invalid] expect failure tc 17: lonely sequence tag [invalid] expect failure tc 18: appending 0's to sequence [invalid] expect failure tc 19: prepending 0's to sequence [invalid] expect failure tc 20: appending unused 0's to sequence [invalid] expect failure tc 21: appending null value to sequence [invalid] expect failure tc 22: including garbage [invalid] expect failure tc 23: including garbage [invalid] expect failure tc 24: including garbage [invalid] expect failure tc 25: including garbage [invalid] expect failure tc 26: including garbage [invalid] expect failure tc 27: including garbage [invalid] expect failure tc 28: including garbage [invalid] expect failure tc 29: including garbage [invalid] expect failure tc 30: including garbage [invalid] expect failure tc 31: including undefined tags [invalid] expect failure tc 32: including undefined tags [invalid] expect failure tc 33: including undefined tags [invalid] expect failure tc 34: including undefined tags [invalid] expect failure tc 35: including undefined tags [invalid] expect failure tc 36: including undefined tags [invalid] expect failure tc 37: truncated length of sequence [invalid] expect failure tc 38: using composition with indefinite length [invalid] expect failure tc 39: using composition with indefinite length [invalid] expect failure tc 40: using composition with indefinite length [invalid] expect failure tc 41: using composition with wrong tag [invalid] expect failure tc 42: using composition with wrong tag [invalid] expect failure tc 43: using composition with wrong tag [invalid] expect failure tc 44: Replacing sequence with NULL [invalid] expect failure tc 45: changing tag value of sequence [invalid] expect failure tc 46: changing tag value of sequence [invalid] expect failure tc 47: changing tag value of sequence [invalid] expect failure tc 48: changing tag value of sequence [invalid] expect failure tc 49: changing tag value of sequence [invalid] expect failure tc 50: dropping value of sequence [invalid] expect failure tc 51: using composition for sequence [invalid] expect failure tc 52: truncated sequence [invalid] expect failure tc 53: truncated sequence [invalid] expect failure tc 54: indefinite length [invalid, BER] expect failure tc 55: indefinite length with truncated delimiter [invalid] expect failure tc 56: indefinite length with additional element [invalid] expect failure tc 57: indefinite length with truncated element [invalid] expect failure tc 58: indefinite length with garbage [invalid] expect failure tc 59: indefinite length with nonempty EOC [invalid] expect failure tc 60: prepend empty sequence [invalid] expect failure tc 61: append empty sequence [invalid] expect failure tc 62: append garbage with high tag number [invalid] expect failure tc 63: sequence of sequence [invalid] expect failure tc 64: truncated sequence: removed last 1 elements [invalid] expect failure tc 65: repeating element in sequence [invalid] expect failure tc 66: long form encoding of length of integer [invalid, BER] expect failure tc 67: long form encoding of length of integer [invalid, BER] expect failure tc 68: length of integer contains leading 0 [invalid, BER] expect failure tc 69: length of integer contains leading 0 [invalid, BER] expect failure tc 70: wrong length of integer [invalid] expect failure tc 71: wrong length of integer [invalid] expect failure tc 72: wrong length of integer [invalid] expect failure tc 73: wrong length of integer [invalid] expect failure tc 74: uint32 overflow in length of integer [invalid] expect failure tc 75: uint32 overflow in length of integer [invalid] expect failure tc 76: uint64 overflow in length of integer [invalid] expect failure tc 77: uint64 overflow in length of integer [invalid] expect failure tc 78: length of integer = 2**31 - 1 [invalid] expect failure tc 79: length of integer = 2**31 - 1 [invalid] expect failure tc 80: length of integer = 2**32 - 1 [invalid] expect failure tc 81: length of integer = 2**32 - 1 [invalid] expect failure tc 82: length of integer = 2**40 - 1 [invalid] expect failure tc 83: length of integer = 2**40 - 1 [invalid] expect failure tc 84: length of integer = 2**64 - 1 [invalid] expect failure tc 85: length of integer = 2**64 - 1 [invalid] expect failure tc 86: incorrect length of integer [invalid] expect failure tc 87: incorrect length of integer [invalid] expect failure tc 88: removing integer [invalid] expect failure tc 89: lonely integer tag [invalid] expect failure tc 90: lonely integer tag [invalid] expect failure tc 91: appending 0's to integer [invalid] expect failure tc 92: appending 0's to integer [invalid] expect failure tc 93: prepending 0's to integer [invalid, BER] expect failure tc 94: prepending 0's to integer [invalid, BER] expect failure tc 95: appending unused 0's to integer [invalid] expect failure tc 96: appending null value to integer [invalid] expect failure tc 97: appending null value to integer [invalid] expect failure tc 98: truncated length of integer [invalid] expect failure tc 99: truncated length of integer [invalid] expect failure tc 100: Replacing integer with NULL [invalid] expect failure tc 101: Replacing integer with NULL [invalid] expect failure tc 102: changing tag value of integer [invalid] expect failure tc 103: changing tag value of integer [invalid] expect failure tc 104: changing tag value of integer [invalid] expect failure tc 105: changing tag value of integer [invalid] expect failure tc 106: changing tag value of integer [invalid] expect failure tc 107: changing tag value of integer [invalid] expect failure tc 108: changing tag value of integer [invalid] expect failure tc 109: changing tag value of integer [invalid] expect failure tc 110: changing tag value of integer [invalid] expect failure tc 111: changing tag value of integer [invalid] expect failure tc 112: dropping value of integer [invalid] expect failure tc 113: dropping value of integer [invalid] expect failure tc 114: using composition for integer [invalid] expect failure tc 115: using composition for integer [invalid] expect failure tc 116: modify first byte of integer [invalid] expect failure tc 117: modify first byte of integer [invalid] expect failure tc 118: modify last byte of integer [invalid] expect failure tc 119: modify last byte of integer [invalid] expect failure tc 120: truncated integer [invalid] expect failure tc 121: truncated integer [invalid] expect failure tc 122: truncated integer [invalid] expect failure tc 123: truncated integer [invalid] expect failure tc 124: leading ff in integer [invalid] expect failure tc 125: leading ff in integer [invalid] expect failure tc 126: replaced integer by infinity [invalid] expect failure tc 127: replaced integer by infinity [invalid] expect failure tc 128: replacing integer with zero [invalid] expect failure tc 129: replacing integer with zero [invalid] expect failure tc 130: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 131: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 132: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 133: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 134: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 135: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 136: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 137: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 138: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 139: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 140: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 141: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 142: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 143: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 144: Modified r or s, e.g. by adding or subtracting the order of the group [invalid] expect failure tc 145: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 146: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 147: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 148: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 149: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 150: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 151: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 152: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 153: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 154: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 155: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 156: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 157: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 158: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 159: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 160: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 161: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 162: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 163: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 164: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 165: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 166: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 167: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 168: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 169: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 170: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 171: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 172: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 173: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 174: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 175: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 176: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 177: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 178: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 179: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 180: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 181: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 182: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 183: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 184: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 185: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 186: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 187: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 188: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 189: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 190: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 191: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 192: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 193: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 194: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 195: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 196: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 197: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 198: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 199: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 200: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 201: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 202: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 203: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 204: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 205: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 206: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 207: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 208: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 209: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 210: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 211: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 212: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 213: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 214: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 215: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 216: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 217: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 218: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 219: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 220: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 221: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 222: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 223: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 224: Signature with special case values for r and s [invalid, EdgeCase] expect failure tc 225: Signature encoding contains wrong types. [invalid] expect failure tc 226: Signature encoding contains wrong types. [invalid] expect failure tc 227: Signature encoding contains wrong types. [invalid] expect failure tc 228: Signature encoding contains wrong types. [invalid] expect failure tc 229: Signature encoding contains wrong types. [invalid] expect failure tc 230: Signature encoding contains wrong types. [invalid] expect failure tc 231: Edge case for Shamir multiplication [valid] expect success tc 232: special case hash [valid] expect success tc 233: special case hash [valid] expect success tc 234: special case hash [valid] expect success tc 235: special case hash [valid] expect success tc 236: special case hash [valid] expect success tc 237: special case hash [valid] expect success tc 238: special case hash [valid] expect success tc 239: special case hash [valid] expect success tc 240: special case hash [valid] expect success tc 241: special case hash [valid] expect success tc 242: special case hash [valid] expect success tc 243: special case hash [valid] expect success tc 244: special case hash [valid] expect success tc 245: special case hash [valid] expect success tc 246: special case hash [valid] expect success tc 247: special case hash [valid] expect success tc 248: special case hash [valid] expect success tc 249: special case hash [valid] expect success tc 250: special case hash [valid] expect success tc 251: special case hash [valid] expect success tc 252: special case hash [valid] expect success tc 253: special case hash [valid] expect success tc 254: special case hash [valid] expect success tc 255: special case hash [valid] expect success tc 256: special case hash [valid] expect success tc 257: special case hash [valid] expect success tc 258: special case hash [valid] expect success tc 259: special case hash [valid] expect success tc 260: special case hash [valid] expect success tc 261: special case hash [valid] expect success tc 262: special case hash [valid] expect success tc 263: special case hash [valid] expect success tc 264: special case hash [valid] expect success tc 265: special case hash [valid] expect success tc 266: special case hash [valid] expect success tc 267: special case hash [valid] expect success tc 268: special case hash [valid] expect success tc 269: special case hash [valid] expect success tc 270: special case hash [valid] expect success tc 271: special case hash [valid] expect success tc 272: special case hash [valid] expect success tc 273: special case hash [valid] expect success tc 274: special case hash [valid] expect success tc 275: special case hash [valid] expect success tc 276: special case hash [valid] expect success tc 277: special case hash [valid] expect success tc 278: special case hash [valid] expect success tc 279: special case hash [valid] expect success tc 280: special case hash [valid] expect success tc 281: special case hash [valid] expect success tc 282: special case hash [valid] expect success tc 283: special case hash [valid] expect success tc 284: special case hash [valid] expect success tc 285: special case hash [valid] expect success tc 286: special case hash [valid] expect success tc 287: special case hash [valid] expect success tc 288: special case hash [valid] expect success tc 289: special case hash [valid] expect success tc 290: special case hash [valid] expect success tc 291: special case hash [valid] expect success tc 292: special case hash [valid] expect success tc 293: special case hash [valid] expect success tc 294: special case hash [valid] expect success tc 295: special case hash [valid] expect success tc 296: special case hash [valid] expect success tc 297: special case hash [valid] expect success tc 298: special case hash [valid] expect success tc 299: special case hash [valid] expect success tc 300: special case hash [valid] expect success tc 301: special case hash [valid] expect success tc 302: special case hash [valid] expect success tc 303: special case hash [valid] expect success tc 304: special case hash [valid] expect success tc 305: special case hash [valid] expect success tc 306: special case hash [valid] expect success tc 307: special case hash [valid] expect success tc 308: special case hash [valid] expect success tc 309: special case hash [valid] expect success tc 310: special case hash [valid] expect success tc 311: special case hash [valid] expect success tc 312: special case hash [valid] expect success tc 313: special case hash [valid] expect success tc 314: special case hash [valid] expect success tc 315: special case hash [valid] expect success tc 316: special case hash [valid] expect success tc 317: special case hash [valid] expect success tc 318: special case hash [valid] expect success tc 319: special case hash [valid] expect success tc 320: special case hash [valid] expect success tc 321: special case hash [valid] expect success tc 322: special case hash [valid] expect success tc 323: special case hash [valid] expect success tc 324: special case hash [valid] expect success tc 325: special case hash [valid] expect success tc 326: special case hash [valid] expect success tc 327: special case hash [valid] expect success tc 328: special case hash [valid] expect success tc 329: special case hash [valid] expect success tc 330: special case hash [valid] expect success tc 331: special case hash [valid] expect success tc 332: special case hash [valid] expect success tc 333: special case hash [valid] expect success tc 334: special case hash [valid] expect success tc 335: special case hash [valid] expect success tc 336: special case hash [valid] expect success tc 337: special case hash [valid] expect success tc 338: special case hash [valid] expect success tc 339: special case hash [valid] expect success tc 340: special case hash [valid] expect success tc 341: special case hash [valid] expect success tc 342: special case hash [valid] expect success tc 343: special case hash [valid] expect success tc 344: special case hash [valid] expect success tc 345: special case hash [valid] expect success tc 346: special case hash [valid] expect success tc 347: special case hash [valid] expect success tc 348: special case hash [valid] expect success tc 349: special case hash [valid] expect success tc 350: special case hash [valid] expect success tc 351: special case hash [valid] expect success tc 352: special case hash [valid] expect success tc 353: special case hash [valid] expect success tc 354: special case hash [valid] expect success Running test 1 Running test 2 Running test 3 Running test 4 Running test 5 Running test 6 Running test 7 Running test 8 Running test 9 Running test 10 Running test 11 Running test 12 Running test 13 Running test 14 Running test 15 Running test 16 Running test 17 Running test 18 Running test 19 Running test 20 Running test 21 Running test 22 Running test 23 Running test 24 Running test 25 Running test 26 Running test 27 Running test 28 Running test 29 Running test 30 Running test 31 Running test 32 Running test 33 Running test 34 Running test 35 Running test 36 Running test 37 Running test 38 Running test 39 Running test 40 Running test 41 Running test 42 Running test 43 Running test 44 Running test 45 Running test 46 Running test 47 Running test 48 Running test 49 Running test 50 Running test 51 Running test 52 Running test 53 Running test 54 Running test 55 Running test 56 Running test 57 Running test 58 Running test 59 Running test 60 Running test 61 Running test 62 Running test 63 Running test 64 Running test 65 Running test 66 Running test 67 Running test 68 Running test 69 Running test 70 Running test 71 Running test 72 Running test 73 Running test 74 Running test 75 Running test 76 Running test 77 Running test 78 Running test 79 Running test 80 Running test 81 Running test 82 Running test 83 Running test 84 Running test 85 Running test 86 Running test 87 Running test 88 Running test 89 Running test 90 Running test 91 Running test 92 Running test 93 Running test 94 Running test 95 Running test 96 Running test 97 Running test 98 Running test 99 Running test 100 Running test 101 Running test 102 Running test 103 Running test 104 Running test 105 Running test 106 Running test 107 Running test 108 Running test 109 Running test 110 Running test 111 Running test 112 Running test 113 Running test 114 Running test 115 Running test 116 Running test 117 Running test 118 Running test 119 Running test 120 Running test 121 Running test 122 Running test 123 Running test 124 Running test 125 Running test 126 Running test 127 Running test 128 Running test 129 Running test 130 Running test 131 Running test 132 Running test 133 Running test 134 Running test 135 Running test 136 Running test 137 Running test 138 Running test 139 Running test 140 Running test 141 Running test 142 Running test 143 Running test 144 Running test 145 Running test 146 Running test 147 Running test 148 Running test 149 Running test 150 Running test 151 Running test 152 Running test 153 Running test 154 Running test 155 Running test 156 Running test 157 Running test 158 Running test 159 Running test 160 Running test 161 Running test 162 Running test 163 Running test 164 Running test 165 Running test 166 Running test 167 Running test 168 Running test 169 Running test 170 Running test 171 Running test 172 Running test 173 Running test 174 Running test 175 Running test 176 Running test 177 Running test 178 Running test 179 Running test 180 Running test 181 Running test 182 Running test 183 Running test 184 Running test 185 Running test 186 Running test 187 Running test 188 Running test 189 Running test 190 Running test 191 Running test 192 Running test 193 Running test 194 Running test 195 Running test 196 Running test 197 Running test 198 Running test 199 Running test 200 Running test 201 Running test 202 Running test 203 Running test 204 Running test 205 Running test 206 Running test 207 Running test 208 Running test 209 Running test 210 Running test 211 Running test 212 Running test 213 Running test 214 Running test 215 Running test 216 Running test 217 Running test 218 Running test 219 Running test 220 Running test 221 Running test 222 Running test 223 Running test 224 Running test 225 Running test 226 Running test 227 Running test 228 Running test 229 Running test 230 Running test 231 Running test 232 Running test 233 Running test 234 Running test 235 Running test 236 Running test 237 Running test 238 Running test 239 Running test 240 Running test 241 Running test 242 Running test 243 Running test 244 Running test 245 Running test 246 Running test 247 Running test 248 Running test 249 Running test 250 Running test 251 Running test 252 Running test 253 Running test 254 Running test 255 Running test 256 Running test 257 Running test 258 Running test 259 Running test 260 Running test 261 Running test 262 Running test 263 Running test 264 Running test 265 Running test 266 Running test 267 Running test 268 Running test 269 Running test 270 Running test 271 Running test 272 Running test 273 Running test 274 Running test 275 Running test 276 Running test 277 Running test 278 Running test 279 Running test 280 Running test 281 Running test 282 Running test 283 Running test 284 Running test 285 Running test 286 Running test 287 Running test 288 Running test 289 Running test 290 Running test 291 Running test 292 Running test 293 Running test 294 Running test 295 Running test 296 Running test 297 Running test 298 Running test 299 Running test 300 Running test 301 Running test 302 Running test 303 Running test 304 Running test 305 Running test 306 Running test 307 Running test 308 Running test 309 Running test 310 Running test 311 Running test 312 Running test 313 Running test 314 Running test 315 Running test 316 Running test 317 Running test 318 Running test 319 Running test 320 Running test 321 Running test 322 Running test 323 Running test 324 Running test 325 Running test 326 Running test 327 Running test 328 Running test 329 Running test 330 Running test 331 Running test 332 Running test 333 Running test 334 Running test 335 Running test 336 Running test 337 Running test 338 Running test 339 Running test 340 Running test 341 Running test 342 Running test 343 Running test 344 Running test 345 Running test 346 Running test 347 Running test 348 Running test 349 Running test 350 Running test 351 Running test 352 Running test 353 Running test 354 tc 355: k*G has a large x-coordinate [valid] expect success tc 356: r too large [invalid] expect failure Running test 355 Running test 356 tc 357: r,s are large [valid] expect success Running test 357 tc 358: r and s^-1 have a large Hamming weight [valid] expect success Running test 358 tc 359: r and s^-1 have a large Hamming weight [valid] expect success Running test 359 tc 360: small r and s [valid] expect success Running test 360 tc 361: small r and s [valid] expect success Running test 361 tc 362: small r and s [valid] expect success tc 363: r is larger than n [invalid] expect failure Running test 362 Running test 363 tc 364: s is larger than n [invalid] expect failure Running test 364 tc 365: small r and s^-1 [valid] expect success Running test 365 tc 366: smallish r and s^-1 [valid] expect success Running test 366 tc 367: 100-bit r and small s^-1 [valid] expect success Running test 367 tc 368: small r and 100 bit s^-1 [valid] expect success Running test 368 tc 369: 100-bit r and s^-1 [valid] expect success Running test 369 tc 370: r and s^-1 are close to n [valid] expect success Running test 370 tc 371: s == 1 [valid] expect success tc 372: s == 0 [invalid] expect failure Running test 371 Running test 372 tc 373: point at infinity during verify [invalid] expect failure Running test 373 tc 374: edge case for signature malleability [valid] expect success Running test 374 tc 375: edge case for signature malleability [valid] expect success Running test 375 tc 376: u1 == 1 [valid] expect success Running test 376 tc 377: u1 == n - 1 [valid] expect success Running test 377 tc 378: u2 == 1 [valid] expect success Running test 378 tc 379: u2 == n - 1 [valid] expect success Running test 379 tc 380: edge case for u1 [valid] expect success Running test 380 tc 381: edge case for u1 [valid] expect success Running test 381 tc 382: edge case for u1 [valid] expect success Running test 382 tc 383: edge case for u1 [valid] expect success Running test 383 tc 384: edge case for u1 [valid] expect success Running test 384 tc 385: edge case for u1 [valid] expect success Running test 385 tc 386: edge case for u1 [valid] expect success Running test 386 tc 387: edge case for u1 [valid] expect success Running test 387 tc 388: edge case for u1 [valid] expect success Running test 388 tc 389: edge case for u1 [valid] expect success Running test 389 tc 390: edge case for u1 [valid] expect success Running test 390 tc 391: edge case for u1 [valid] expect success Running test 391 tc 392: edge case for u1 [valid] expect success Running test 392 tc 393: edge case for u1 [valid] expect success Running test 393 tc 394: edge case for u2 [valid] expect success Running test 394 tc 395: edge case for u2 [valid] expect success Running test 395 tc 396: edge case for u2 [valid] expect success Running test 396 tc 397: edge case for u2 [valid] expect success Running test 397 tc 398: edge case for u2 [valid] expect success Running test 398 tc 399: edge case for u2 [valid] expect success Running test 399 tc 400: edge case for u2 [valid] expect success Running test 400 tc 401: edge case for u2 [valid] expect success Running test 401 tc 402: edge case for u2 [valid] expect success Running test 402 tc 403: edge case for u2 [valid] expect success Running test 403 tc 404: edge case for u2 [valid] expect success Running test 404 tc 405: edge case for u2 [valid] expect success Running test 405 tc 406: edge case for u2 [valid] expect success Running test 406 tc 407: edge case for u2 [valid] expect success Running test 407 tc 408: point duplication during verification [valid, PointDuplication] expect success Running test 408 tc 409: duplication bug [invalid, PointDuplication] expect failure Running test 409 tc 410: point with x-coordinate 0 [invalid] expect failure Running test 410 tc 411: point with x-coordinate 0 [invalid] expect failure Running test 411 tc 412: comparison with point at infinity [invalid] expect failure Running test 412 tc 413: extreme value for k and edgecase s [valid] expect success Running test 413 tc 414: extreme value for k and s^-1 [valid] expect success Running test 414 tc 415: extreme value for k and s^-1 [valid] expect success Running test 415 tc 416: extreme value for k and s^-1 [valid] expect success Running test 416 tc 417: extreme value for k and s^-1 [valid] expect success Running test 417 tc 418: extreme value for k [valid] expect success Running test 418 tc 419: extreme value for k and edgecase s [valid] expect success Running test 419 tc 420: extreme value for k and s^-1 [valid] expect success Running test 420 tc 421: extreme value for k and s^-1 [valid] expect success Running test 421 tc 422: extreme value for k and s^-1 [valid] expect success Running test 422 tc 423: extreme value for k and s^-1 [valid] expect success Running test 423 tc 424: extreme value for k [valid] expect success Running test 424 tc 425: testing point duplication [invalid] expect failure tc 426: testing point duplication [invalid] expect failure Running test 425 Running test 426 tc 427: testing point duplication [invalid] expect failure tc 428: testing point duplication [invalid] expect failure Running test 427 Running test 428 tc 429: pseudorandom signature [valid] expect success tc 430: pseudorandom signature [valid] expect success tc 431: pseudorandom signature [valid] expect success tc 432: pseudorandom signature [valid] expect success Running test 429 Running test 430 Running test 431 Running test 432 tc 433: y-coordinate of the public key is small [valid] expect success tc 434: y-coordinate of the public key is small [valid] expect success tc 435: y-coordinate of the public key is small [valid] expect success Running test 433 Running test 434 Running test 435 tc 436: y-coordinate of the public key is large [valid] expect success tc 437: y-coordinate of the public key is large [valid] expect success tc 438: y-coordinate of the public key is large [valid] expect success Running test 436 Running test 437 Running test 438 tc 439: x-coordinate of the public key is small [valid] expect success tc 440: x-coordinate of the public key is small [valid] expect success tc 441: x-coordinate of the public key is small [valid] expect success Running test 439 Running test 440 Running test 441 tc 442: x-coordinate of the public key is large [valid] expect success tc 443: x-coordinate of the public key is large [valid] expect success tc 444: x-coordinate of the public key is large [valid] expect success Running test 442 Running test 443 Running test 444 tc 445: y-coordinate of the public key has many trailing 1's [valid] expect success tc 446: y-coordinate of the public key has many trailing 1's [valid] expect success tc 447: y-coordinate of the public key has many trailing 1's [valid] expect success Running test 445 Running test 446 Running test 447 [ OK ] Pkcs11EcdsaWycheproofTest.P521 (8485 ms) [----------] 5 tests from Pkcs11EcdsaWycheproofTest (14875 ms total) [----------] 4 tests from Pkcs11DesTest [ RUN ] Pkcs11DesTest.ZeroLengthIV [ OK ] Pkcs11DesTest.ZeroLengthIV (0 ms) [ RUN ] Pkcs11DesTest.IVTooShort [ OK ] Pkcs11DesTest.IVTooShort (0 ms) [ RUN ] Pkcs11DesTest.WrongLengthIV [ OK ] Pkcs11DesTest.WrongLengthIV (0 ms) [ RUN ] Pkcs11DesTest.AllGood [ OK ] Pkcs11DesTest.AllGood (0 ms) [----------] 4 tests from Pkcs11DesTest (0 ms total) [----------] 4 tests from DERPrivateKeyImportTest [ RUN ] DERPrivateKeyImportTest.ImportPrivateRSAKey [ OK ] DERPrivateKeyImportTest.ImportPrivateRSAKey (7 ms) [ RUN ] DERPrivateKeyImportTest.ImportEcdsaKey [ OK ] DERPrivateKeyImportTest.ImportEcdsaKey (12 ms) [ RUN ] DERPrivateKeyImportTest.ImportInvalidPrivateKey [ OK ] DERPrivateKeyImportTest.ImportInvalidPrivateKey (0 ms) [ RUN ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey [ OK ] DERPrivateKeyImportTest.ImportZeroLengthPrivateKey (0 ms) [----------] 4 tests from DERPrivateKeyImportTest (19 ms total) [----------] 1 test from Pkcs11Curve25519Wycheproof [ RUN ] Pkcs11Curve25519Wycheproof.Run Reading tests from: x25519_test.json Test vectors of type XdhComp are intended for tests that verify the computation of and Xdh key exchange. LowOrderPublic: The curves and its twists contain some points of low order. This test vector contains a public key with such a point. While many libraries reject such public keys, doing so is not a strict requirement according to RFC 7748. NonCanonicalPublic: The public key is in non-canonical form. RFC 7749, section 5 defines the value that this public key represents. Section 7 of the same RFC recommends accepting such keys. If a non-canonical key is accepted then it must follow the RFC. SmallPublicKey: The public key is insecure and does not belong to a valid private key. Some libraries reject such keys. Twist: Public keys are either points on a given curve or points on its twist. The functions X25519 and X448 are defined for points on a twist with the goal that the output of computations do not leak private keys. Implementations may accept or reject points on a twist. If a point multiplication is performed then it is important that the result is correct, since otherwise attacks with invalid keys are possible. ZeroSharedSecret: Some libraries include a check that the shared secret is not all-zero. This check is described in Section 6.1 of RFC 7748. tc 1: normal case [valid] expect success tc 2: public key on twist [acceptable, Twist] expect success tc 3: public key on twist [acceptable, Twist] expect success tc 4: public key on twist [acceptable, Twist] expect success tc 5: public key on twist [acceptable, Twist] expect success tc 6: public key on twist [acceptable, Twist] expect success tc 7: public key on twist [acceptable, Twist] expect success tc 8: public key on twist [acceptable, Twist] expect success tc 9: public key on twist [acceptable, Twist] expect success tc 10: public key on twist [acceptable, Twist] expect success tc 11: public key on twist [acceptable, Twist] expect success tc 12: public key on twist [acceptable, Twist] expect success tc 13: public key on twist [acceptable, Twist] expect success tc 14: public key on twist [acceptable, Twist] expect success tc 15: public key on twist [acceptable, Twist] expect success tc 16: public key on twist [acceptable, Twist] expect success tc 17: public key on twist [acceptable, Twist] expect success tc 18: public key on twist [acceptable, Twist] expect success tc 19: public key on twist [acceptable, Twist] expect success tc 20: public key on twist [acceptable, Twist] expect success tc 21: public key on twist [acceptable, Twist] expect success tc 22: public key on twist [acceptable, Twist] expect success tc 23: public key on twist [acceptable, Twist] expect success tc 24: public key on twist [acceptable, Twist] expect success tc 25: public key on twist [acceptable, Twist] expect success tc 26: public key on twist [acceptable, Twist] expect success tc 27: public key on twist [acceptable, Twist] expect success tc 28: public key on twist [acceptable, Twist] expect success tc 29: public key on twist [acceptable, Twist] expect success tc 30: public key on twist [acceptable, Twist] expect success tc 31: public key on twist [acceptable, Twist] expect success tc 32: public key = 0 [acceptable, SmallPublicKey, LowOrderPublic, ZeroSharedSecret] expect failure tc 33: public key = 1 [acceptable, SmallPublicKey, LowOrderPublic, ZeroSharedSecret] expect failure tc 34: edge case public key [valid] expect success tc 35: edge case public key [valid] expect success tc 36: edge case public key [valid] expect success tc 37: edge case public key [valid] expect success tc 38: edge case public key [valid] expect success tc 39: edge case public key [valid] expect success tc 40: edge case public key [valid] expect success tc 41: edge case public key [valid] expect success tc 42: edge case public key [valid] expect success tc 43: edge case public key [valid] expect success tc 44: edge case public key [valid] expect success tc 45: edge case public key [valid] expect success tc 46: edge case public key [valid] expect success tc 47: edge case public key [valid] expect success tc 48: edge case public key [valid] expect success tc 49: edge case public key [valid] expect success tc 50: edge case public key [valid] expect success tc 51: edge case public key [valid] expect success tc 52: edge case public key [valid] expect success tc 53: edge case public key [valid] expect success tc 54: edge case public key [valid] expect success tc 55: edge case public key [valid] expect success tc 56: edge case public key [valid] expect success tc 57: edge case public key [valid] expect success tc 58: edge case public key [valid] expect success tc 59: edge case public key [valid] expect success tc 60: edge case public key [valid] expect success tc 61: edge case public key [valid] expect success tc 62: edge case public key [valid] expect success tc 63: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 64: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 65: public key with low order [acceptable, LowOrderPublic, Twist, ZeroSharedSecret] expect failure tc 66: public key with low order [acceptable, LowOrderPublic, NonCanonicalPublic, Twist, ZeroSharedSecret] expect failure tc 67: public key with low order [acceptable, LowOrderPublic, NonCanonicalPublic, Twist, ZeroSharedSecret] expect failure tc 68: public key with low order [acceptable, LowOrderPublic, NonCanonicalPublic, ZeroSharedSecret] expect failure tc 69: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 70: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 71: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 72: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 73: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 74: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 75: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 76: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 77: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 78: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 79: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 80: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 81: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 82: public key with low order [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 83: public key = 57896044618658097711785492504343953926634992332820282019728792003956564819949 [acceptable, SmallPublicKey, LowOrderPublic, ZeroSharedSecret] expect failure tc 84: public key = 57896044618658097711785492504343953926634992332820282019728792003956564819950 [acceptable, SmallPublicKey, LowOrderPublic, NonCanonicalPublic, ZeroSharedSecret] expect failure tc 85: non-canonical public key [acceptable, NonCanonicalPublic, Twist] expect success tc 86: non-canonical public key [acceptable, NonCanonicalPublic, Twist] expect success tc 87: non-canonical public key [acceptable, NonCanonicalPublic] expect success tc 88: non-canonical public key [acceptable, NonCanonicalPublic] expect success tc 89: non-canonical public key [acceptable, NonCanonicalPublic, Twist] expect success tc 90: non-canonical public key [acceptable, NonCanonicalPublic, Twist] expect success tc 91: non-canonical public key [acceptable, NonCanonicalPublic] expect success tc 92: non-canonical public key [acceptable, NonCanonicalPublic] expect failure tc 93: non-canonical public key [acceptable, NonCanonicalPublic] expect failure tc 94: non-canonical public key [acceptable, NonCanonicalPublic, Twist] expect success tc 95: non-canonical public key [acceptable, NonCanonicalPublic] expect success tc 96: non-canonical public key [acceptable, NonCanonicalPublic] expect success tc 97: non-canonical public key [acceptable, NonCanonicalPublic] expect success tc 98: public key = 57896044618658097711785492504343953926634992332820282019728792003956564819968 [acceptable, SmallPublicKey, LowOrderPublic, NonCanonicalPublic, ZeroSharedSecret] expect failure tc 99: public key = 57896044618658097711785492504343953926634992332820282019728792003956564819969 [acceptable, SmallPublicKey, LowOrderPublic, NonCanonicalPublic, Twist, ZeroSharedSecret] expect failure tc 100: RFC 7748 [valid] expect success tc 101: RFC 7748 [valid] expect success tc 102: RFC 8037, Section A.6 [valid] expect success tc 103: edge case for shared secret [acceptable, Twist] expect success tc 104: edge case for shared secret [valid] expect success tc 105: edge case for shared secret [valid] expect success tc 106: edge case for shared secret [acceptable, Twist] expect success tc 107: edge case for shared secret [valid] expect success tc 108: edge case for shared secret [acceptable, Twist] expect success tc 109: edge case for shared secret [valid] expect success tc 110: edge case for shared secret [valid] expect success tc 111: edge case for shared secret [acceptable, Twist] expect success tc 112: edge case for shared secret [acceptable, Twist] expect success tc 113: edge case for shared secret [valid] expect success tc 114: edge case for shared secret [acceptable, Twist] expect success tc 115: edge case for shared secret [acceptable, Twist] expect success tc 116: edge case for shared secret [acceptable, Twist] expect success tc 117: special case public key [acceptable, SmallPublicKey, LowOrderPublic, ZeroSharedSecret] expect failure tc 118: special case public key [acceptable, SmallPublicKey, LowOrderPublic, ZeroSharedSecret] expect failure tc 119: special case public key [acceptable, Twist] expect success tc 120: special case public key [valid] expect success tc 121: special case public key [acceptable, Twist] expect success tc 122: special case public key [valid] expect success tc 123: special case public key [valid] expect success tc 124: special case public key [acceptable, Twist] expect success tc 125: special case public key [valid] expect success tc 126: special case public key [acceptable, Twist] expect success tc 127: special case public key [acceptable, Twist] expect success tc 128: special case public key [valid] expect success tc 129: special case public key [acceptable, Twist] expect success tc 130: special case public key [acceptable, Twist] expect success tc 131: special case public key [valid] expect success tc 132: special case public key [valid] expect success tc 133: special case public key [acceptable, Twist] expect success tc 134: special case public key [valid] expect success tc 135: special case public key [valid] expect success tc 136: special case public key [acceptable, Twist] expect success tc 137: special case public key [valid] expect success tc 138: special case public key [valid] expect success tc 139: special case public key [acceptable, Twist] expect success tc 140: special case public key [acceptable, Twist] expect success tc 141: special case public key [valid] expect success tc 142: special case public key [valid] expect success tc 143: special case public key [valid] expect success tc 144: special case public key [valid] expect success tc 145: special case public key [valid] expect success tc 146: special case public key [valid] expect success tc 147: special case public key [acceptable, Twist] expect success tc 148: special case public key [acceptable, Twist] expect success tc 149: special case public key [valid] expect success tc 150: special case public key [valid] expect success tc 151: special case public key [valid] expect success tc 152: special case public key [valid] expect success tc 153: special case public key [valid] expect success tc 154: special case public key [acceptable, LowOrderPublic, Twist, ZeroSharedSecret] expect failure tc 155: special case for E in multiplication by 2 [acceptable, Twist] expect success tc 156: special case for E in multiplication by 2 [valid] expect success tc 157: special case for E in multiplication by 2 [valid] expect success tc 158: special case for E in multiplication by 2 [valid] expect success tc 159: special case for E in multiplication by 2 [acceptable, Twist] expect success tc 160: special case for E in multiplication by 2 [acceptable, Twist] expect success tc 161: special case for E in multiplication by 2 [valid] expect success tc 162: special case for E in multiplication by 2 [acceptable, Twist] expect success tc 163: special case for E in multiplication by 2 [valid] expect success tc 164: special case for E in multiplication by 2 [valid] expect success tc 165: D = 0 in multiplication by 2 [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 166: D = 0 in multiplication by 2 [acceptable, LowOrderPublic, ZeroSharedSecret] expect failure tc 167: special case for DA - CB in multiplication by 2 [acceptable, Twist] expect success tc 168: special case for DA - CB in multiplication by 2 [valid] expect success tc 169: special case for DA - CB in multiplication by 2 [acceptable, Twist] expect success tc 170: special case for DA - CB in multiplication by 2 [valid] expect success tc 171: special case for DA in multiplication by 2 [valid] expect success tc 172: special case for DA in multiplication by 2 [valid] expect success tc 173: special case for DA in multiplication by 2 [valid] expect success tc 174: special case for DA in multiplication by 2 [valid] expect success tc 175: special case for x_2 in multiplication by 2 [valid] expect success tc 176: special case for x_2 in multiplication by 2 [acceptable, Twist] expect success tc 177: special case for x_2 in multiplication by 2 [valid] expect success tc 178: special case for x_2 in multiplication by 2 [valid] expect success tc 179: special case for x_2 in multiplication by 2 [valid] expect success tc 180: special case for x_2 in multiplication by 2 [valid] expect success tc 181: special case for AA in multiplication by 2 [acceptable, Twist] expect success tc 182: special case for AA in multiplication by 2 [acceptable, Twist] expect success tc 183: special case for AA in multiplication by 2 [acceptable, Twist] expect success tc 184: special case for AA in multiplication by 2 [valid] expect success tc 185: special case for BB in multiplication by 2 [valid] expect success tc 186: special case for BB in multiplication by 2 [acceptable, Twist] expect success tc 187: special case for BB in multiplication by 2 [valid] expect success tc 188: special case for BB in multiplication by 2 [valid] expect success tc 189: special case for D in multiplication by 2 [valid] expect success tc 190: special case for D in multiplication by 2 [valid] expect success tc 191: special case for D in multiplication by 2 [valid] expect success tc 192: special case for D in multiplication by 2 [acceptable, Twist] expect success tc 193: special case for D in multiplication by 2 [acceptable, Twist] expect success tc 194: special case for D in multiplication by 2 [valid] expect success tc 195: special case for DA + CB in multiplication by 2 [valid] expect success tc 196: special case for DA + CB in multiplication by 2 [acceptable, Twist] expect success tc 197: special case for DA + CB in multiplication by 2 [acceptable, Twist] expect success tc 198: special case for DA + CB in multiplication by 2 [acceptable, Twist] expect success tc 199: special case for DA + CB in multiplication by 2 [acceptable, Twist] expect success tc 200: special case for DA + CB in multiplication by 2 [acceptable, Twist] expect success tc 201: special case for DA + CB in multiplication by 2 [acceptable, Twist] expect success tc 202: special case for z_2 in multiplication by 2 [valid] expect success tc 203: special case for z_2 in multiplication by 2 [valid] expect success tc 204: special case for z_2 in multiplication by 2 [valid] expect success tc 205: special case for z_2 in multiplication by 2 [acceptable, Twist] expect success tc 206: special case for z_2 in multiplication by 2 [acceptable, Twist] expect success tc 207: special case for z_2 in multiplication by 2 [acceptable, Twist] expect success tc 208: special case for z_2 in multiplication by 2 [valid] expect success tc 209: special case for z_2 in multiplication by 2 [valid] expect success tc 210: special case for A in multiplication by 2 [acceptable, Twist] expect success tc 211: special case for A in multiplication by 2 [acceptable, Twist] expect success tc 212: special case for A in multiplication by 2 [valid] expect success tc 213: special case for A in multiplication by 2 [valid] expect success tc 214: special case for A in multiplication by 2 [valid] expect success tc 215: special case for A in multiplication by 2 [acceptable, Twist] expect success tc 216: special case for B in multiplication by 2 [acceptable, Twist] expect success tc 217: special case for B in multiplication by 2 [acceptable, Twist] expect success tc 218: special case for B in multiplication by 2 [valid] expect success tc 219: special case for B in multiplication by 2 [valid] expect success tc 220: special case for B in multiplication by 2 [valid] expect success tc 221: special case for B in multiplication by 2 [acceptable, Twist] expect success tc 222: special case for C in multiplication by 2 [acceptable, Twist] expect success tc 223: special case for C in multiplication by 2 [valid] expect success tc 224: special case for C in multiplication by 2 [valid] expect success tc 225: special case for C in multiplication by 2 [valid] expect success tc 226: special case for CB in multiplication by 2 [acceptable, Twist] expect success tc 227: special case for CB in multiplication by 2 [valid] expect success tc 228: special case for CB in multiplication by 2 [valid] expect success tc 229: special case for x_2 in multiplication by 3 [acceptable, Twist] expect success tc 230: special case for x_2 in multiplication by 3 [valid] expect success tc 231: special case for x_2 in multiplication by 3 [acceptable, Twist] expect success tc 232: special case for x_2 in multiplication by 3 [acceptable, Twist] expect success tc 233: special case for x_2 in multiplication by 3 [acceptable, Twist] expect success tc 234: special case for x_2 in multiplication by 3 [acceptable, Twist] expect success tc 235: special case for z_2 in multiplication by 3 [valid] expect success tc 236: special case for z_2 in multiplication by 3 [valid] expect success tc 237: special case for z_2 in multiplication by 3 [acceptable, Twist] expect success tc 238: special case for DA - CB in multiplication by 3 [valid] expect success tc 239: special case for DA - CB in multiplication by 3 [acceptable, Twist] expect success tc 240: special case for BB in multiplication by 3 [acceptable, Twist] expect success tc 241: special case for BB in multiplication by 3 [valid] expect success tc 242: special case for BB in multiplication by 3 [acceptable, Twist] expect success tc 243: special case for BB in multiplication by 3 [acceptable, Twist] expect success tc 244: special case for E in multiplication by 3 [valid] expect success tc 245: special case for E in multiplication by 3 [valid] expect success tc 246: special case for E in multiplication by 3 [valid] expect success tc 247: special case for E in multiplication by 3 [acceptable, Twist] expect success tc 248: special case for E in multiplication by 3 [valid] expect success tc 249: special case for E in multiplication by 3 [valid] expect success tc 250: special case for E in multiplication by 3 [valid] expect success tc 251: special case for AA in multiplication by 3 [acceptable, Twist] expect success tc 252: special case for AA in multiplication by 3 [valid] expect success tc 253: special case for AA in multiplication by 3 [acceptable, Twist] expect success tc 254: special case for AA in multiplication by 3 [valid] expect success tc 255: special case for AA in multiplication by 3 [valid] expect success tc 256: special case for AA in multiplication by 3 [acceptable, Twist] expect success tc 257: special case for AA in multiplication by 3 [acceptable, Twist] expect success tc 258: special case for AA in multiplication by 3 [valid] expect success tc 259: special case for D in multiplication by 4 [acceptable, Twist] expect success tc 260: special case for D in multiplication by 4 [acceptable, Twist] expect success tc 261: special case for D in multiplication by 4 [acceptable, Twist] expect success tc 262: special case for D in multiplication by 4 [acceptable, Twist] expect success tc 263: special case for D in multiplication by 4 [acceptable, Twist] expect success tc 264: special case for D in multiplication by 4 [valid] expect success tc 265: special case for D in multiplication by 4 [acceptable, Twist] expect success tc 266: special case for D in multiplication by 4 [acceptable, Twist] expect success tc 267: special case for E in multiplication by 4 [valid] expect success tc 268: special case for E in multiplication by 4 [valid] expect success tc 269: special case for E in multiplication by 4 [valid] expect success tc 270: special case for E in multiplication by 4 [valid] expect success tc 271: special case for B in multiplication by 4 [acceptable, Twist] expect success tc 272: special case for B in multiplication by 4 [acceptable, Twist] expect success tc 273: special case for B in multiplication by 4 [valid] expect success tc 274: special case for B in multiplication by 4 [acceptable, Twist] expect success tc 275: special case for B in multiplication by 4 [valid] expect success tc 276: special case for B in multiplication by 4 [acceptable, Twist] expect success tc 277: special case for B in multiplication by 4 [valid] expect success tc 278: special case for B in multiplication by 4 [valid] expect success tc 279: special case for BB in multiplication by 4 [acceptable, Twist] expect success tc 280: special case for BB in multiplication by 4 [valid] expect success tc 281: special case for BB in multiplication by 4 [acceptable, Twist] expect success tc 282: special case for BB in multiplication by 4 [valid] expect success tc 283: special case for BB in multiplication by 4 [acceptable, Twist] expect success tc 284: special case for x_2 in multiplication by 4 [acceptable, Twist] expect success tc 285: special case for x_2 in multiplication by 4 [valid] expect success tc 286: special case for x_2 in multiplication by 4 [acceptable, Twist] expect success tc 287: special case for x_2 in multiplication by 4 [acceptable, Twist] expect success tc 288: special case for x_2 in multiplication by 4 [acceptable, Twist] expect success tc 289: special case for x_2 in multiplication by 4 [valid] expect success tc 290: special case for x_2 in multiplication by 4 [acceptable, Twist] expect success tc 291: special case for x_2 in multiplication by 4 [acceptable, Twist] expect success tc 292: special case for x_2 in multiplication by 4 [valid] expect success tc 293: special case for x_2 in multiplication by 4 [acceptable, Twist] expect success tc 294: special case for DA + CB in multiplication by 4 [valid] expect success tc 295: special case for DA + CB in multiplication by 4 [valid] expect success tc 296: special case for DA + CB in multiplication by 4 [acceptable, Twist] expect success tc 297: special case for A in multiplication by 4 [valid] expect success tc 298: special case for A in multiplication by 4 [acceptable, Twist] expect success tc 299: special case for A in multiplication by 4 [valid] expect success tc 300: special case for A in multiplication by 4 [acceptable, Twist] expect success tc 301: special case for DA - CB in multiplication by 4 [valid] expect success tc 302: special case for DA - CB in multiplication by 4 [acceptable, Twist] expect success tc 303: special case for DA - CB in multiplication by 4 [valid] expect success tc 304: special case for DA - CB in multiplication by 4 [valid] expect success tc 305: special case for DA - CB in multiplication by 4 [valid] expect success tc 306: special case for C in multiplication by 4 [acceptable, Twist] expect success tc 307: special case for C in multiplication by 4 [acceptable, Twist] expect success tc 308: special case for C in multiplication by 4 [valid] expect success tc 309: special case for C in multiplication by 4 [valid] expect success tc 310: special case for z_2 in multiplication by 4 [valid] expect success tc 311: special case for z_2 in multiplication by 4 [valid] expect success tc 312: special case for z_2 in multiplication by 4 [valid] expect success tc 313: special case for CB in multiplication by 4 [acceptable, Twist] expect success tc 314: special case for CB in multiplication by 4 [acceptable, Twist] expect success tc 315: special case for CB in multiplication by 4 [acceptable, Twist] expect success tc 316: special case for CB in multiplication by 4 [valid] expect success tc 317: special case for AA in multiplication by 4 [valid] expect success tc 318: special case for AA in multiplication by 4 [acceptable, Twist] expect success tc 319: special case for AA in multiplication by 4 [valid] expect success tc 320: special case for AA in multiplication by 4 [acceptable, Twist] expect success tc 321: special case for AA in multiplication by 4 [valid] expect success tc 322: special case for AA in multiplication by 4 [valid] expect success tc 323: special case for AA in multiplication by 4 [acceptable, Twist] expect success tc 324: special case for DA in multiplication by 4 [valid] expect success tc 325: special case for z_2 in multiplication by 5 [valid] expect success tc 326: special case for z_2 in multiplication by 5 [acceptable, Twist] expect success tc 327: special case for z_2 in multiplication by 5 [acceptable, Twist] expect success tc 328: special case for z_2 in multiplication by 5 [acceptable, Twist] expect success tc 329: special case for z_2 in multiplication by 5 [acceptable, Twist] expect success tc 330: special case for z_2 in multiplication by 5 [valid] expect success tc 331: special case for E in multiplication by 5 [valid] expect success tc 332: special case for E in multiplication by 5 [valid] expect success tc 333: special case for E in multiplication by 5 [acceptable, Twist] expect success tc 334: special case for E in multiplication by 5 [valid] expect success tc 335: special case for E in multiplication by 5 [acceptable, Twist] expect success tc 336: special case for AA in multiplication by 5 [valid] expect success tc 337: special case for AA in multiplication by 5 [valid] expect success tc 338: special case for AA in multiplication by 5 [acceptable, Twist] expect success tc 339: special case for AA in multiplication by 5 [valid] expect success tc 340: special case for DA - CB in multiplication by 5 [valid] expect success tc 341: special case for DA - CB in multiplication by 5 [valid] expect success tc 342: special case for DA - CB in multiplication by 5 [valid] expect success tc 343: special case for BB in multiplication by 5 [valid] expect success tc 344: special case for BB in multiplication by 5 [acceptable, Twist] expect success tc 345: special case for BB in multiplication by 5 [valid] expect success tc 346: special case for x_2 in multiplication by 5 [acceptable, Twist] expect success tc 347: special case for x_2 in multiplication by 5 [valid] expect success tc 348: special case for x_2 in multiplication by 5 [valid] expect success tc 349: special case for C in multiplication by 6 [valid] expect success tc 350: special case for C in multiplication by 6 [acceptable, Twist] expect success tc 351: special case for C in multiplication by 6 [valid] expect success tc 352: special case for C in multiplication by 6 [valid] expect success tc 353: special case for C in multiplication by 6 [valid] expect success tc 354: special case for CB in multiplication by 6 [valid] expect success tc 355: special case for CB in multiplication by 6 [valid] expect success tc 356: special case for CB in multiplication by 6 [acceptable, Twist] expect success tc 357: special case for CB in multiplication by 6 [acceptable, Twist] expect success tc 358: special case for CB in multiplication by 6 [valid] expect success tc 359: special case for CB in multiplication by 6 [valid] expect success tc 360: special case for CB in multiplication by 6 [valid] expect success tc 361: special case for CB in multiplication by 6 [valid] expect success tc 362: special case for x_2 in multiplication by 6 [acceptable, Twist] expect success tc 363: special case for x_2 in multiplication by 6 [valid] expect success tc 364: special case for x_2 in multiplication by 6 [acceptable, Twist] expect success tc 365: special case for x_2 in multiplication by 6 [acceptable, Twist] expect success tc 366: special case for x_2 in multiplication by 6 [acceptable, Twist] expect success tc 367: special case for x_2 in multiplication by 6 [valid] expect success tc 368: special case for x_2 in multiplication by 6 [valid] expect success tc 369: special case for DA - CB in multiplication by 6 [valid] expect success tc 370: special case for DA - CB in multiplication by 6 [acceptable, Twist] expect success tc 371: special case for DA - CB in multiplication by 6 [valid] expect success tc 372: special case for DA - CB in multiplication by 6 [valid] expect success tc 373: special case for DA - CB in multiplication by 6 [acceptable, Twist] expect success tc 374: special case for DA + CB in multiplication by 6 [valid] expect success tc 375: special case for DA + CB in multiplication by 6 [acceptable, Twist] expect success tc 376: special case for DA + CB in multiplication by 6 [valid] expect success tc 377: special case for DA + CB in multiplication by 6 [valid] expect success tc 378: special case for DA + CB in multiplication by 6 [valid] expect success tc 379: special case for DA + CB in multiplication by 6 [valid] expect success tc 380: special case for DA + CB in multiplication by 6 [acceptable, Twist] expect success tc 381: special case for z_2 in multiplication by 6 [acceptable, Twist] expect success tc 382: special case for z_2 in multiplication by 6 [acceptable, Twist] expect success tc 383: special case for z_2 in multiplication by 6 [valid] expect success tc 384: special case for z_2 in multiplication by 6 [valid] expect success tc 385: special case for D in multiplication by 6 [valid] expect success tc 386: special case for D in multiplication by 6 [valid] expect success tc 387: special case for D in multiplication by 6 [acceptable, Twist] expect success tc 388: special case for D in multiplication by 6 [acceptable, Twist] expect success tc 389: special case for DA in multiplication by 6 [valid] expect success tc 390: special case for DA in multiplication by 6 [acceptable, Twist] expect success tc 391: special case for DA in multiplication by 6 [valid] expect success tc 392: special case for DA in multiplication by 6 [acceptable, Twist] expect success tc 393: special case for z_2 in multiplication by 7 [valid] expect success tc 394: special case for z_2 in multiplication by 7 [acceptable, Twist] expect success tc 395: special case for z_2 in multiplication by 7 [acceptable, Twist] expect success tc 396: special case for z_2 in multiplication by 7 [acceptable, Twist] expect success tc 397: special case for z_2 in multiplication by 7 [valid] expect success tc 398: special case for BB in multiplication by 7 [valid] expect success tc 399: special case for BB in multiplication by 7 [valid] expect success tc 400: special case for BB in multiplication by 7 [valid] expect success tc 401: special case for E in multiplication by 7 [acceptable, Twist] expect success tc 402: special case for E in multiplication by 7 [valid] expect success tc 403: special case for E in multiplication by 7 [valid] expect success tc 404: special case for E in multiplication by 7 [valid] expect success tc 405: special case for AA in multiplication by 7 [acceptable, Twist] expect success tc 406: special case for AA in multiplication by 7 [acceptable, Twist] expect success tc 407: special case for AA in multiplication by 7 [valid] expect success tc 408: special case for AA in multiplication by 7 [valid] expect success tc 409: special case for AA in multiplication by 7 [valid] expect success tc 410: special case for AA in multiplication by 7 [valid] expect success tc 411: special case for AA in multiplication by 7 [valid] expect success tc 412: special case for x_2 in multiplication by 7 [acceptable, Twist] expect success tc 413: special case for x_2 in multiplication by 7 [valid] expect success tc 414: special case for x_2 in multiplication by 7 [valid] expect success tc 415: special case for x_2 in multiplication by 7 [acceptable, Twist] expect success tc 416: special case for x_2 in multiplication by 7 [acceptable, Twist] expect success tc 417: special case for x_2 in multiplication by 7 [valid] expect success tc 418: special case for x_2 in multiplication by 7 [acceptable, Twist] expect success tc 419: special case for x_2 in multiplication by 7 [acceptable, Twist] expect success tc 420: special case for x_2 in multiplication by 7 [acceptable, Twist] expect success tc 421: special case for DA - CB in multiplication by 7 [acceptable, Twist] expect success tc 422: special case for DA - CB in multiplication by 7 [valid] expect success tc 423: special case for DA - CB in multiplication by 7 [valid] expect success tc 424: special case for DA - CB in multiplication by 7 [valid] expect success tc 425: special case for D in multiplication by 8 [acceptable, Twist] expect success tc 426: special case for D in multiplication by 8 [valid] expect success tc 427: special case for D in multiplication by 8 [acceptable, Twist] expect success tc 428: special case for DA + CB in multiplication by 8 [valid] expect success tc 429: special case for DA + CB in multiplication by 8 [valid] expect success tc 430: special case for DA + CB in multiplication by 8 [acceptable, Twist] expect success tc 431: special case for DA + CB in multiplication by 8 [acceptable, Twist] expect success tc 432: special case for DA + CB in multiplication by 8 [acceptable, Twist] expect success tc 433: special case for DA + CB in multiplication by 8 [valid] expect success tc 434: special case for DA + CB in multiplication by 8 [valid] expect success tc 435: special case for DA + CB in multiplication by 8 [acceptable, Twist] expect success tc 436: special case for AA in multiplication by 8 [valid] expect success tc 437: special case for AA in multiplication by 8 [valid] expect success tc 438: special case for AA in multiplication by 8 [acceptable, Twist] expect success tc 439: special case for z_2 in multiplication by 8 [valid] expect success tc 440: special case for z_2 in multiplication by 8 [valid] expect success tc 441: special case for z_2 in multiplication by 8 [valid] expect success tc 442: special case for B in multiplication by 8 [valid] expect success tc 443: special case for B in multiplication by 8 [acceptable, Twist] expect success tc 444: special case for B in multiplication by 8 [valid] expect success tc 445: special case for C in multiplication by 8 [acceptable, Twist] expect success tc 446: special case for C in multiplication by 8 [acceptable, Twist] expect success tc 447: special case for C in multiplication by 8 [acceptable, Twist] expect success tc 448: special case for C in multiplication by 8 [acceptable, Twist] expect success tc 449: special case for x_2 in multiplication by 8 [valid] expect success tc 450: special case for x_2 in multiplication by 8 [acceptable, Twist] expect success tc 451: special case for x_2 in multiplication by 8 [acceptable, Twist] expect success tc 452: special case for x_2 in multiplication by 8 [acceptable, Twist] expect success tc 453: special case for x_2 in multiplication by 8 [valid] expect success tc 454: special case for x_2 in multiplication by 8 [valid] expect success tc 455: special case for x_2 in multiplication by 8 [valid] expect success tc 456: special case for x_2 in multiplication by 8 [valid] expect success tc 457: special case for x_2 in multiplication by 8 [acceptable, Twist] expect success tc 458: special case for x_2 in multiplication by 8 [acceptable, Twist] expect success tc 459: special case for x_2 in multiplication by 8 [valid] expect success tc 460: special case for x_2 in multiplication by 8 [valid] expect success tc 461: special case for x_2 in multiplication by 8 [acceptable, Twist] expect success tc 462: special case for x_2 in multiplication by 8 [acceptable, Twist] expect success tc 463: special case for E in multiplication by 8 [acceptable, Twist] expect success tc 464: special case for E in multiplication by 8 [acceptable, Twist] expect success tc 465: special case for E in multiplication by 8 [valid] expect success tc 466: special case for E in multiplication by 8 [acceptable, Twist] expect success tc 467: special case for E in multiplication by 8 [valid] expect success tc 468: special case for E in multiplication by 8 [valid] expect success tc 469: special case for E in multiplication by 8 [acceptable, Twist] expect success tc 470: special case for E in multiplication by 8 [valid] expect success tc 471: special case for E in multiplication by 8 [valid] expect success tc 472: special case for DA - CB in multiplication by 8 [acceptable, Twist] expect success tc 473: special case for DA - CB in multiplication by 8 [acceptable, Twist] expect success tc 474: special case for DA - CB in multiplication by 8 [valid] expect success tc 475: special case for DA - CB in multiplication by 8 [valid] expect success tc 476: special case for DA - CB in multiplication by 8 [valid] expect success tc 477: special case for CB in multiplication by 8 [acceptable, Twist] expect success tc 478: special case for CB in multiplication by 8 [acceptable, Twist] expect success tc 479: special case for BB in multiplication by 8 [valid] expect success tc 480: special case for BB in multiplication by 8 [valid] expect success tc 481: special case for BB in multiplication by 8 [acceptable, Twist] expect success tc 482: special case for BB in multiplication by 8 [acceptable, Twist] expect success tc 483: special case for A in multiplication by 8 [valid] expect success tc 484: special case for A in multiplication by 8 [acceptable, Twist] expect success tc 485: special case for DA in multiplication by 8 [acceptable, Twist] expect success tc 486: special case for DA in multiplication by 8 [valid] expect success tc 487: special case for AA in multiplication by 9 [valid] expect success tc 488: special case for AA in multiplication by 9 [acceptable, Twist] expect success tc 489: special case for AA in multiplication by 9 [acceptable, Twist] expect success tc 490: special case for AA in multiplication by 9 [valid] expect success tc 491: special case for AA in multiplication by 9 [valid] expect success tc 492: special case for AA in multiplication by 9 [acceptable, Twist] expect success tc 493: special case for AA in multiplication by 9 [valid] expect success tc 494: special case for DA - CB in multiplication by 9 [acceptable, Twist] expect success tc 495: special case for z_2 in multiplication by 9 [valid] expect success tc 496: special case for z_2 in multiplication by 9 [valid] expect success tc 497: special case for z_2 in multiplication by 9 [valid] expect success tc 498: special case for z_2 in multiplication by 9 [acceptable, Twist] expect success tc 499: special case for z_2 in multiplication by 9 [valid] expect success tc 500: special case for z_2 in multiplication by 9 [valid] expect success tc 501: special case for E in multiplication by 9 [acceptable, Twist] expect success tc 502: special case for E in multiplication by 9 [valid] expect success tc 503: special case for E in multiplication by 9 [acceptable, Twist] expect success tc 504: special case for x_2 in multiplication by 9 [valid] expect success tc 505: special case for x_2 in multiplication by 9 [acceptable, Twist] expect success tc 506: special case for x_2 in multiplication by 9 [acceptable, Twist] expect success tc 507: special case for BB in multiplication by 9 [valid] expect success tc 508: special case for BB in multiplication by 9 [valid] expect success tc 509: special case for BB in multiplication by 9 [valid] expect success tc 510: special case for BB in multiplication by 9 [valid] expect success tc 511: private key == -1 (mod order) [valid] expect success tc 512: private key == 1 (mod order) on twist [acceptable, Twist] expect success tc 513: special case private key [valid] expect success tc 514: special case private key [valid] expect success tc 515: special case private key [valid] expect success tc 516: special case private key [valid] expect success tc 517: special case private key [valid] expect success tc 518: special case private key [valid] expect success Running test: 1 Running test: 2 Running test: 3 Running test: 4 Running test: 5 Running test: 6 Running test: 7 Running test: 8 Running test: 9 Running test: 10 Running test: 11 Running test: 12 Running test: 13 Running test: 14 Running test: 15 Running test: 16 Running test: 17 Running test: 18 Running test: 19 Running test: 20 Running test: 21 Running test: 22 Running test: 23 Running test: 24 Running test: 25 Running test: 26 Running test: 27 Running test: 28 Running test: 29 Running test: 30 Running test: 31 Running test: 32 Running test: 33 Running test: 34 Running test: 35 Running test: 36 Running test: 37 Running test: 38 Running test: 39 Running test: 40 Running test: 41 Running test: 42 Running test: 43 Running test: 44 Running test: 45 Running test: 46 Running test: 47 Running test: 48 Running test: 49 Running test: 50 Running test: 51 Running test: 52 Running test: 53 Running test: 54 Running test: 55 Running test: 56 Running test: 57 Running test: 58 Running test: 59 Running test: 60 Running test: 61 Running test: 62 Running test: 63 Running test: 64 Running test: 65 Running test: 66 Running test: 67 Running test: 68 Running test: 69 Running test: 70 Running test: 71 Running test: 72 Running test: 73 Running test: 74 Running test: 75 Running test: 76 Running test: 77 Running test: 78 Running test: 79 Running test: 80 Running test: 81 Running test: 82 Running test: 83 Running test: 84 Running test: 85 Running test: 86 Running test: 87 Running test: 88 Running test: 89 Running test: 90 Running test: 91 Running test: 92 Running test: 93 Running test: 94 Running test: 95 Running test: 96 Running test: 97 Running test: 98 Running test: 99 Running test: 100 Running test: 101 Running test: 102 Running test: 103 Running test: 104 Running test: 105 Running test: 106 Running test: 107 Running test: 108 Running test: 109 Running test: 110 Running test: 111 Running test: 112 Running test: 113 Running test: 114 Running test: 115 Running test: 116 Running test: 117 Running test: 118 Running test: 119 Running test: 120 Running test: 121 Running test: 122 Running test: 123 Running test: 124 Running test: 125 Running test: 126 Running test: 127 Running test: 128 Running test: 129 Running test: 130 Running test: 131 Running test: 132 Running test: 133 Running test: 134 Running test: 135 Running test: 136 Running test: 137 Running test: 138 Running test: 139 Running test: 140 Running test: 141 Running test: 142 Running test: 143 Running test: 144 Running test: 145 Running test: 146 Running test: 147 Running test: 148 Running test: 149 Running test: 150 Running test: 151 Running test: 152 Running test: 153 Running test: 154 Running test: 155 Running test: 156 Running test: 157 Running test: 158 Running test: 159 Running test: 160 Running test: 161 Running test: 162 Running test: 163 Running test: 164 Running test: 165 Running test: 166 Running test: 167 Running test: 168 Running test: 169 Running test: 170 Running test: 171 Running test: 172 Running test: 173 Running test: 174 Running test: 175 Running test: 176 Running test: 177 Running test: 178 Running test: 179 Running test: 180 Running test: 181 Running test: 182 Running test: 183 Running test: 184 Running test: 185 Running test: 186 Running test: 187 Running test: 188 Running test: 189 Running test: 190 Running test: 191 Running test: 192 Running test: 193 Running test: 194 Running test: 195 Running test: 196 Running test: 197 Running test: 198 Running test: 199 Running test: 200 Running test: 201 Running test: 202 Running test: 203 Running test: 204 Running test: 205 Running test: 206 Running test: 207 Running test: 208 Running test: 209 Running test: 210 Running test: 211 Running test: 212 Running test: 213 Running test: 214 Running test: 215 Running test: 216 Running test: 217 Running test: 218 Running test: 219 Running test: 220 Running test: 221 Running test: 222 Running test: 223 Running test: 224 Running test: 225 Running test: 226 Running test: 227 Running test: 228 Running test: 229 Running test: 230 Running test: 231 Running test: 232 Running test: 233 Running test: 234 Running test: 235 Running test: 236 Running test: 237 Running test: 238 Running test: 239 Running test: 240 Running test: 241 Running test: 242 Running test: 243 Running test: 244 Running test: 245 Running test: 246 Running test: 247 Running test: 248 Running test: 249 Running test: 250 Running test: 251 Running test: 252 Running test: 253 Running test: 254 Running test: 255 Running test: 256 Running test: 257 Running test: 258 Running test: 259 Running test: 260 Running test: 261 Running test: 262 Running test: 263 Running test: 264 Running test: 265 Running test: 266 Running test: 267 Running test: 268 Running test: 269 Running test: 270 Running test: 271 Running test: 272 Running test: 273 Running test: 274 Running test: 275 Running test: 276 Running test: 277 Running test: 278 Running test: 279 Running test: 280 Running test: 281 Running test: 282 Running test: 283 Running test: 284 Running test: 285 Running test: 286 Running test: 287 Running test: 288 Running test: 289 Running test: 290 Running test: 291 Running test: 292 Running test: 293 Running test: 294 Running test: 295 Running test: 296 Running test: 297 Running test: 298 Running test: 299 Running test: 300 Running test: 301 Running test: 302 Running test: 303 Running test: 304 Running test: 305 Running test: 306 Running test: 307 Running test: 308 Running test: 309 Running test: 310 Running test: 311 Running test: 312 Running test: 313 Running test: 314 Running test: 315 Running test: 316 Running test: 317 Running test: 318 Running test: 319 Running test: 320 Running test: 321 Running test: 322 Running test: 323 Running test: 324 Running test: 325 Running test: 326 Running test: 327 Running test: 328 Running test: 329 Running test: 330 Running test: 331 Running test: 332 Running test: 333 Running test: 334 Running test: 335 Running test: 336 Running test: 337 Running test: 338 Running test: 339 Running test: 340 Running test: 341 Running test: 342 Running test: 343 Running test: 344 Running test: 345 Running test: 346 Running test: 347 Running test: 348 Running test: 349 Running test: 350 Running test: 351 Running test: 352 Running test: 353 Running test: 354 Running test: 355 Running test: 356 Running test: 357 Running test: 358 Running test: 359 Running test: 360 Running test: 361 Running test: 362 Running test: 363 Running test: 364 Running test: 365 Running test: 366 Running test: 367 Running test: 368 Running test: 369 Running test: 370 Running test: 371 Running test: 372 Running test: 373 Running test: 374 Running test: 375 Running test: 376 Running test: 377 Running test: 378 Running test: 379 Running test: 380 Running test: 381 Running test: 382 Running test: 383 Running test: 384 Running test: 385 Running test: 386 Running test: 387 Running test: 388 Running test: 389 Running test: 390 Running test: 391 Running test: 392 Running test: 393 Running test: 394 Running test: 395 Running test: 396 Running test: 397 Running test: 398 Running test: 399 Running test: 400 Running test: 401 Running test: 402 Running test: 403 Running test: 404 Running test: 405 Running test: 406 Running test: 407 Running test: 408 Running test: 409 Running test: 410 Running test: 411 Running test: 412 Running test: 413 Running test: 414 Running test: 415 Running test: 416 Running test: 417 Running test: 418 Running test: 419 Running test: 420 Running test: 421 Running test: 422 Running test: 423 Running test: 424 Running test: 425 Running test: 426 Running test: 427 Running test: 428 Running test: 429 Running test: 430 Running test: 431 Running test: 432 Running test: 433 Running test: 434 Running test: 435 Running test: 436 Running test: 437 Running test: 438 Running test: 439 Running test: 440 Running test: 441 Running test: 442 Running test: 443 Running test: 444 Running test: 445 Running test: 446 Running test: 447 Running test: 448 Running test: 449 Running test: 450 Running test: 451 Running test: 452 Running test: 453 Running test: 454 Running test: 455 Running test: 456 Running test: 457 Running test: 458 Running test: 459 Running test: 460 Running test: 461 Running test: 462 Running test: 463 Running test: 464 Running test: 465 Running test: 466 Running test: 467 Running test: 468 Running test: 469 Running test: 470 Running test: 471 Running test: 472 Running test: 473 Running test: 474 Running test: 475 Running test: 476 Running test: 477 Running test: 478 Running test: 479 Running test: 480 Running test: 481 Running test: 482 Running test: 483 Running test: 484 Running test: 485 Running test: 486 Running test: 487 Running test: 488 Running test: 489 Running test: 490 Running test: 491 Running test: 492 Running test: 493 Running test: 494 Running test: 495 Running test: 496 Running test: 497 Running test: 498 Running test: 499 Running test: 500 Running test: 501 Running test: 502 Running test: 503 Running test: 504 Running test: 505 Running test: 506 Running test: 507 Running test: 508 Running test: 509 Running test: 510 Running test: 511 Running test: 512 Running test: 513 Running test: 514 Running test: 515 Running test: 516 Running test: 517 Running test: 518 [ OK ] Pkcs11Curve25519Wycheproof.Run (3488 ms) [----------] 1 test from Pkcs11Curve25519Wycheproof (3488 ms total) [----------] 9 tests from Pkcs11ChaCha20Poly1305Test [ RUN ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt [ OK ] Pkcs11ChaCha20Poly1305Test.GenerateEncryptDecrypt (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.Xor [ OK ] Pkcs11ChaCha20Poly1305Test.Xor (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.XorLegacy [ OK ] Pkcs11ChaCha20Poly1305Test.XorLegacy (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.GenerateXor [ OK ] Pkcs11ChaCha20Poly1305Test.GenerateXor (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.GenerateXorLegacy [ OK ] Pkcs11ChaCha20Poly1305Test.GenerateXorLegacy (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.XorInvalidParams [ OK ] Pkcs11ChaCha20Poly1305Test.XorInvalidParams (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.XorLegacyInvalidParams [ OK ] Pkcs11ChaCha20Poly1305Test.XorLegacyInvalidParams (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.ChaCha201305MessageInterfaceBasic [ OK ] Pkcs11ChaCha20Poly1305Test.ChaCha201305MessageInterfaceBasic (0 ms) [ RUN ] Pkcs11ChaCha20Poly1305Test.ChaCha20Poly1305MessageInterfaceSeparateTags [ OK ] Pkcs11ChaCha20Poly1305Test.ChaCha20Poly1305MessageInterfaceSeparateTags (0 ms) [----------] 9 tests from Pkcs11ChaCha20Poly1305Test (0 ms total) [----------] 1 test from Pkcs11CbcPadTest [ RUN ] Pkcs11CbcPadTest.FailEncryptShortParam [ OK ] Pkcs11CbcPadTest.FailEncryptShortParam (0 ms) [----------] 1 test from Pkcs11CbcPadTest (0 ms total) [----------] 10 tests from Pkcs11AESKeyWrapPadTest [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapECKey [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapECKey (5 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRsaKey [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRsaKey (66 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_EvenBlock [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_EvenBlock (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock1 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock1 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock2 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_OddBlock2 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_PaddingTooLong [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_PaddingTooLong (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_NoPadding [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_NoPadding (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding1 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding1 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding2 [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_BadPadding2 (0 ms) [ RUN ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_ShortValidPadding [ OK ] Pkcs11AESKeyWrapPadTest.WrapUnwrapRandom_ShortValidPadding (0 ms) [----------] 10 tests from Pkcs11AESKeyWrapPadTest (72 ms total) [----------] 1 test from Pkcs11AESKeyWrapKwpTest [ RUN ] Pkcs11AESKeyWrapKwpTest.TestVectors [ OK ] Pkcs11AESKeyWrapKwpTest.TestVectors (36 ms) [----------] 1 test from Pkcs11AESKeyWrapKwpTest (36 ms total) [----------] 11 tests from Pkcs11AesGcmTest [ RUN ] Pkcs11AesGcmTest.ZeroLengthIV [ OK ] Pkcs11AesGcmTest.ZeroLengthIV (0 ms) [ RUN ] Pkcs11AesGcmTest.AllZeroIV [ OK ] Pkcs11AesGcmTest.AllZeroIV (0 ms) [ RUN ] Pkcs11AesGcmTest.TwelveByteZeroIV [ OK ] Pkcs11AesGcmTest.TwelveByteZeroIV (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceBasic [ OK ] Pkcs11AesGcmTest.MessageInterfaceBasic (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceSeparateTags [ OK ] Pkcs11AesGcmTest.MessageInterfaceSeparateTags (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceIVMask [ OK ] Pkcs11AesGcmTest.MessageInterfaceIVMask (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceXorCounter [ OK ] Pkcs11AesGcmTest.MessageInterfaceXorCounter (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceCounterOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceCounterOverflow (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceXorCounterOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceXorCounterOverflow (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceRandomIV [ OK ] Pkcs11AesGcmTest.MessageInterfaceRandomIV (0 ms) [ RUN ] Pkcs11AesGcmTest.MessageInterfaceRandomOverflow [ OK ] Pkcs11AesGcmTest.MessageInterfaceRandomOverflow (0 ms) [----------] 11 tests from Pkcs11AesGcmTest (1 ms total) [----------] 20 tests from RsaPssSignVerify/Pkcs11RsaPssVectorTest [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/0 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/0 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/1 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/1 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/2 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/2 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/3 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/3 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/4 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/4 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/5 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/5 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/6 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/6 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/7 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/7 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/8 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/8 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/9 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.Verify/9 (0 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/0 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/0 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/1 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/1 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/2 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/2 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/3 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/3 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/4 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/4 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/5 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/5 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/6 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/6 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/7 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/7 (5 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/8 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/8 (12 ms) [ RUN ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/9 [ OK ] RsaPssSignVerify/Pkcs11RsaPssVectorTest.SignAndVerify/9 (22 ms) [----------] 20 tests from RsaPssSignVerify/Pkcs11RsaPssVectorTest (78 ms total) [----------] 4 tests from Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/0 Generate EC pair on 208 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/0 (4 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/1 Generate EC pair on 220 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/1 (31 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/2 Generate EC pair on 221 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/2 (89 ms) [ RUN ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/3 Generate EC pair on 355 [ OK ] Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest.UseNullPublicValue/3 (0 ms) [----------] 4 tests from Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest (126 ms total) [----------] 3 tests from Pk11KeyImportTest/Pk11KeyImportTest [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/0 Generate RSA pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/0 (64 ms) [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/1 Generate DSA pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/1 (808 ms) [ RUN ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/2 Generate DH pair [ OK ] Pk11KeyImportTest/Pk11KeyImportTest.GenerateExportImport/2 (561 ms) [----------] 3 tests from Pk11KeyImportTest/Pk11KeyImportTest (1435 ms total) [----------] 4 tests from Pk11KeyImportTestEC/Pk11KeyImportTestEC [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/0 Generate EC pair on 208 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/0 (11 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/1 Generate EC pair on 220 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/1 (36 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/2 Generate EC pair on 221 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/2 (98 ms) [ RUN ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/3 Generate EC pair on 355 [ OK ] Pk11KeyImportTestEC/Pk11KeyImportTestEC.GenerateExportImport/3 (6 ms) [----------] 4 tests from Pk11KeyImportTestEC/Pk11KeyImportTestEC (152 ms total) [----------] 16 tests from IkeSha1/Pkcs11IkeTest [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha1/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha1/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeSha256/Pkcs11IkeTest [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha256/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha256/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeSha384/Pkcs11IkeTest [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha384/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha384/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeSha512/Pkcs11IkeTest [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeSha512/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeSha512/Pkcs11IkeTest (0 ms total) [----------] 16 tests from IkeAESXCBC/Pkcs11IkeTest [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/0 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/0 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/1 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/1 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/2 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/2 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/3 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/3 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/4 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/4 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/5 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/5 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/6 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/6 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/7 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/7 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/8 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/8 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/9 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/9 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/10 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/10 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/11 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/11 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/12 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/12 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/13 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/13 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/14 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/14 (0 ms) [ RUN ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/15 [ OK ] IkeAESXCBC/Pkcs11IkeTest.IkeproofVectors/15 (0 ms) [----------] 16 tests from IkeAESXCBC/Pkcs11IkeTest (0 ms total) [----------] 72 tests from Pk11Hpke/ModeParameterizedTest [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportEncrypt/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportExport/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextExportImportWithWrap/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ExportSenderContext/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/0 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/1 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/2 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/3 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/4 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/5 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/6 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/7 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/8 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/9 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/10 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/11 [ OK ] Pk11Hpke/ModeParameterizedTest.ContextUnwrapBadKey/11 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/0 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/0 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/1 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/1 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/2 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/2 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/3 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/3 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/4 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/4 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/5 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/5 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/6 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/6 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/7 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/7 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/8 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/8 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/9 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/9 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/10 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/10 (1 ms) [ RUN ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/11 [ OK ] Pk11Hpke/ModeParameterizedTest.EphemeralKeys/11 (1 ms) [----------] 72 tests from Pk11Hpke/ModeParameterizedTest (113 ms total) [----------] 174 tests from HmacSha256/Pkcs11HmacTest [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha256/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha256/Pkcs11HmacTest (3 ms total) [----------] 174 tests from HmacSha384/Pkcs11HmacTest [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha384/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha384/Pkcs11HmacTest (5 ms total) [----------] 174 tests from HmacSha512/Pkcs11HmacTest [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha512/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha512/Pkcs11HmacTest (5 ms total) [----------] 172 tests from HmacSha3224/Pkcs11HmacTest [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha3224/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [----------] 172 tests from HmacSha3224/Pkcs11HmacTest (5 ms total) [----------] 174 tests from HmacSha3256/Pkcs11HmacTest [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha3256/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha3256/Pkcs11HmacTest (6 ms total) [----------] 174 tests from HmacSha3384/Pkcs11HmacTest [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha3384/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha3384/Pkcs11HmacTest (6 ms total) [----------] 174 tests from HmacSha3512/Pkcs11HmacTest [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/0 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/0 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/1 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/1 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/2 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/2 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/3 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/3 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/4 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/4 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/5 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/5 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/6 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/6 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/7 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/7 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/8 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/8 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/9 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/9 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/10 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/10 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/11 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/11 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/12 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/12 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/13 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/13 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/14 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/14 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/15 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/15 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/16 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/16 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/17 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/17 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/18 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/18 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/19 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/19 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/20 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/20 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/21 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/21 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/22 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/22 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/23 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/23 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/24 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/24 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/25 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/25 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/26 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/26 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/27 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/27 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/28 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/28 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/29 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/29 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/30 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/30 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/31 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/31 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/32 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/32 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/33 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/33 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/34 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/34 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/35 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/35 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/36 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/36 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/37 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/37 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/38 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/38 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/39 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/39 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/40 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/40 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/41 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/41 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/42 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/42 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/43 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/43 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/44 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/44 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/45 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/45 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/46 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/46 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/47 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/47 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/48 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/48 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/49 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/49 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/50 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/50 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/51 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/51 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/52 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/52 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/53 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/53 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/54 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/54 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/55 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/55 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/56 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/56 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/57 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/57 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/58 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/58 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/59 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/59 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/60 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/60 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/61 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/61 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/62 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/62 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/63 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/63 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/64 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/64 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/65 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/65 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/66 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/66 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/67 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/67 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/68 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/68 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/69 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/69 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/70 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/70 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/71 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/71 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/72 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/72 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/73 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/73 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/74 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/74 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/75 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/75 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/76 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/76 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/77 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/77 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/78 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/78 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/79 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/79 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/80 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/80 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/81 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/81 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/82 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/82 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/83 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/83 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/84 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/84 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/85 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/85 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/86 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/86 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/87 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/87 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/88 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/88 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/89 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/89 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/90 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/90 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/91 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/91 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/92 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/92 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/93 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/93 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/94 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/94 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/95 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/95 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/96 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/96 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/97 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/97 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/98 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/98 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/99 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/99 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/100 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/100 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/101 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/101 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/102 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/102 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/103 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/103 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/104 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/104 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/105 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/105 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/106 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/106 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/107 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/107 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/108 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/108 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/109 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/109 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/110 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/110 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/111 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/111 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/112 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/112 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/113 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/113 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/114 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/114 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/115 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/115 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/116 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/116 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/117 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/117 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/118 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/118 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/119 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/119 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/120 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/120 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/121 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/121 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/122 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/122 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/123 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/123 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/124 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/124 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/125 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/125 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/126 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/126 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/127 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/127 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/128 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/128 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/129 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/129 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/130 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/130 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/131 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/131 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/132 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/132 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/133 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/133 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/134 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/134 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/135 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/135 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/136 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/136 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/137 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/137 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/138 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/138 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/139 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/139 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/140 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/140 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/141 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/141 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/142 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/142 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/143 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/143 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/144 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/144 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/145 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/145 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/146 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/146 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/147 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/147 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/148 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/148 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/149 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/149 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/150 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/150 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/151 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/151 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/152 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/152 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/153 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/153 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/154 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/154 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/155 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/155 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/156 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/156 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/157 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/157 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/158 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/158 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/159 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/159 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/160 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/160 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/161 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/161 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/162 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/162 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/163 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/163 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/164 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/164 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/165 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/165 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/166 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/166 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/167 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/167 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/168 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/168 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/169 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/169 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/170 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/170 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/171 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/171 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/172 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/172 (0 ms) [ RUN ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/173 [ OK ] HmacSha3512/Pkcs11HmacTest.WycheproofVectors/173 (0 ms) [----------] 174 tests from HmacSha3512/Pkcs11HmacTest (6 ms total) [----------] 636 tests from HkdfSha1/Pkcs11HkdfTest [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/120 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/121 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/123 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/124 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/125 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/318 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/319 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/320 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/321 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/322 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/323 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/516 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/517 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/518 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/519 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/520 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/521 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/612 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/612 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/613 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/613 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/614 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/614 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/615 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/615 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/616 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/616 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/617 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/617 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/618 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/618 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/619 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/619 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/620 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/620 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/621 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/621 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/622 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/622 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/623 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/623 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/624 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/624 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/625 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/625 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/626 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/626 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/627 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/627 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/628 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/628 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/629 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/629 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/630 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/630 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/631 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/631 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/632 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/632 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/633 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/633 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/634 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/634 (0 ms) [ RUN ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/635 [ OK ] HkdfSha1/Pkcs11HkdfTest.WycheproofVectors/635 (0 ms) [----------] 636 tests from HkdfSha1/Pkcs11HkdfTest (29 ms total) [----------] 630 tests from HkdfSha256/Pkcs11HkdfTest [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/120 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/121 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/122 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/123 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/124 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/125 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/318 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/319 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/320 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/321 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/322 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/323 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/516 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/517 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/518 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/519 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/520 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/521 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/612 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/612 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/613 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/613 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/614 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/614 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/615 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/615 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/616 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/616 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/617 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/617 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/618 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/618 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/619 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/619 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/620 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/620 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/621 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/621 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/622 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/622 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/623 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/623 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/624 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/624 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/625 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/625 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/626 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/626 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/627 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/627 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/628 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/628 (0 ms) [ RUN ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/629 [ OK ] HkdfSha256/Pkcs11HkdfTest.WycheproofVectors/629 (0 ms) [----------] 630 tests from HkdfSha256/Pkcs11HkdfTest (29 ms total) [----------] 612 tests from HkdfSha384/Pkcs11HkdfTest [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/120 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/121 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/122 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/123 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/124 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/125 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/318 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/319 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/320 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/321 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/322 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/323 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/516 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/517 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/518 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/519 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/520 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/521 (2 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha384/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [----------] 612 tests from HkdfSha384/Pkcs11HkdfTest (68 ms total) [----------] 612 tests from HkdfSha512/Pkcs11HkdfTest [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/0 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/0 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/1 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/1 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/2 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/2 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/3 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/3 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/4 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/4 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/5 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/5 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/6 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/6 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/7 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/7 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/8 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/8 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/9 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/9 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/10 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/10 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/11 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/11 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/12 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/12 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/13 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/13 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/14 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/14 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/15 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/15 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/16 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/16 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/17 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/17 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/18 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/18 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/19 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/19 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/20 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/20 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/21 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/21 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/22 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/22 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/23 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/23 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/24 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/24 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/25 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/25 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/26 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/26 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/27 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/27 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/28 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/28 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/29 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/29 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/30 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/30 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/31 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/31 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/32 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/32 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/33 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/33 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/34 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/34 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/35 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/35 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/36 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/36 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/37 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/37 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/38 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/38 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/39 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/39 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/40 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/40 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/41 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/41 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/42 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/42 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/43 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/43 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/44 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/44 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/45 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/45 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/46 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/46 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/47 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/47 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/48 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/48 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/49 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/49 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/50 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/50 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/51 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/51 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/52 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/52 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/53 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/53 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/54 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/54 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/55 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/55 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/56 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/56 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/57 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/57 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/58 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/58 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/59 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/59 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/60 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/60 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/61 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/61 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/62 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/62 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/63 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/63 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/64 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/64 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/65 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/65 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/66 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/66 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/67 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/67 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/68 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/68 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/69 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/69 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/70 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/70 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/71 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/71 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/72 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/72 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/73 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/73 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/74 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/74 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/75 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/75 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/76 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/76 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/77 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/77 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/78 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/78 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/79 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/79 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/80 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/80 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/81 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/81 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/82 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/82 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/83 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/83 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/84 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/84 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/85 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/85 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/86 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/86 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/87 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/87 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/88 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/88 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/89 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/89 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/90 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/90 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/91 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/91 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/92 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/92 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/93 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/93 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/94 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/94 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/95 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/95 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/96 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/96 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/97 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/97 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/98 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/98 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/99 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/99 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/100 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/100 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/101 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/101 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/102 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/102 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/103 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/103 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/104 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/104 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/105 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/105 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/106 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/106 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/107 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/107 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/108 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/108 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/109 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/109 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/110 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/110 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/111 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/111 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/112 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/112 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/113 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/113 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/114 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/114 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/115 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/115 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/116 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/116 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/117 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/117 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/118 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/118 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/119 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/119 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/120 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/120 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/121 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/121 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/122 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/122 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/123 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/123 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/124 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/124 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/125 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/125 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/126 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/126 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/127 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/127 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/128 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/128 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/129 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/129 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/130 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/130 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/131 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/131 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/132 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/132 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/133 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/133 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/134 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/134 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/135 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/135 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/136 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/136 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/137 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/137 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/138 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/138 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/139 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/139 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/140 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/140 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/141 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/141 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/142 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/142 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/143 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/143 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/144 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/144 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/145 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/145 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/146 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/146 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/147 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/147 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/148 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/148 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/149 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/149 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/150 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/150 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/151 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/151 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/152 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/152 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/153 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/153 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/154 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/154 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/155 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/155 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/156 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/156 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/157 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/157 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/158 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/158 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/159 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/159 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/160 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/160 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/161 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/161 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/162 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/162 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/163 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/163 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/164 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/164 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/165 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/165 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/166 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/166 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/167 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/167 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/168 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/168 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/169 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/169 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/170 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/170 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/171 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/171 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/172 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/172 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/173 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/173 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/174 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/174 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/175 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/175 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/176 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/176 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/177 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/177 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/178 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/178 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/179 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/179 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/180 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/180 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/181 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/181 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/182 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/182 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/183 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/183 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/184 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/184 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/185 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/185 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/186 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/186 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/187 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/187 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/188 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/188 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/189 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/189 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/190 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/190 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/191 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/191 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/192 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/192 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/193 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/193 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/194 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/194 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/195 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/195 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/196 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/196 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/197 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/197 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/198 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/198 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/199 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/199 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/200 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/200 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/201 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/201 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/202 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/202 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/203 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/203 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/204 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/204 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/205 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/205 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/206 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/206 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/207 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/207 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/208 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/208 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/209 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/209 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/210 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/210 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/211 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/211 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/212 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/212 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/213 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/213 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/214 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/214 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/215 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/215 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/216 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/216 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/217 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/217 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/218 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/218 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/219 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/219 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/220 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/220 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/221 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/221 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/222 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/222 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/223 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/223 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/224 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/224 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/225 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/225 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/226 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/226 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/227 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/227 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/228 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/228 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/229 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/229 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/230 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/230 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/231 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/231 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/232 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/232 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/233 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/233 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/234 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/234 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/235 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/235 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/236 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/236 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/237 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/237 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/238 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/238 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/239 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/239 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/240 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/240 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/241 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/241 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/242 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/242 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/243 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/243 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/244 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/244 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/245 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/245 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/246 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/246 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/247 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/247 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/248 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/248 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/249 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/249 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/250 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/250 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/251 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/251 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/252 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/252 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/253 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/253 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/254 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/254 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/255 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/255 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/256 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/256 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/257 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/257 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/258 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/258 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/259 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/259 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/260 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/260 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/261 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/261 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/262 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/262 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/263 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/263 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/264 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/264 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/265 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/265 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/266 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/266 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/267 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/267 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/268 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/268 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/269 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/269 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/270 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/270 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/271 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/271 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/272 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/272 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/273 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/273 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/274 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/274 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/275 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/275 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/276 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/276 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/277 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/277 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/278 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/278 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/279 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/279 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/280 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/280 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/281 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/281 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/282 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/282 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/283 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/283 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/284 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/284 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/285 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/285 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/286 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/286 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/287 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/287 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/288 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/288 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/289 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/289 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/290 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/290 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/291 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/291 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/292 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/292 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/293 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/293 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/294 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/294 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/295 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/295 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/296 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/296 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/297 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/297 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/298 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/298 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/299 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/299 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/300 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/300 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/301 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/301 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/302 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/302 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/303 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/303 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/304 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/304 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/305 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/305 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/306 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/306 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/307 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/307 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/308 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/308 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/309 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/309 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/310 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/310 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/311 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/311 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/312 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/312 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/313 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/313 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/314 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/314 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/315 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/315 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/316 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/316 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/317 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/317 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/318 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/318 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/319 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/319 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/320 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/320 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/321 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/321 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/322 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/322 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/323 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/323 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/324 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/324 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/325 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/325 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/326 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/326 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/327 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/327 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/328 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/328 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/329 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/329 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/330 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/330 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/331 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/331 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/332 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/332 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/333 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/333 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/334 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/334 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/335 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/335 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/336 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/336 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/337 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/337 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/338 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/338 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/339 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/339 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/340 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/340 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/341 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/341 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/342 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/342 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/343 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/343 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/344 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/344 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/345 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/345 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/346 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/346 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/347 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/347 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/348 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/348 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/349 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/349 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/350 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/350 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/351 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/351 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/352 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/352 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/353 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/353 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/354 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/354 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/355 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/355 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/356 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/356 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/357 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/357 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/358 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/358 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/359 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/359 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/360 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/360 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/361 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/361 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/362 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/362 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/363 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/363 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/364 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/364 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/365 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/365 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/366 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/366 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/367 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/367 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/368 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/368 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/369 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/369 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/370 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/370 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/371 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/371 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/372 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/372 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/373 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/373 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/374 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/374 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/375 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/375 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/376 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/376 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/377 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/377 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/378 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/378 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/379 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/379 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/380 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/380 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/381 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/381 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/382 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/382 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/383 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/383 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/384 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/384 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/385 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/385 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/386 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/386 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/387 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/387 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/388 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/388 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/389 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/389 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/390 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/390 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/391 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/391 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/392 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/392 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/393 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/393 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/394 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/394 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/395 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/395 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/396 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/396 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/397 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/397 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/398 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/398 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/399 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/399 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/400 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/400 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/401 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/401 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/402 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/402 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/403 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/403 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/404 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/404 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/405 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/405 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/406 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/406 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/407 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/407 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/408 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/408 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/409 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/409 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/410 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/410 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/411 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/411 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/412 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/412 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/413 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/413 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/414 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/414 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/415 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/415 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/416 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/416 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/417 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/417 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/418 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/418 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/419 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/419 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/420 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/420 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/421 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/421 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/422 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/422 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/423 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/423 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/424 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/424 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/425 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/425 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/426 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/426 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/427 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/427 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/428 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/428 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/429 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/429 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/430 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/430 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/431 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/431 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/432 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/432 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/433 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/433 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/434 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/434 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/435 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/435 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/436 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/436 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/437 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/437 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/438 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/438 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/439 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/439 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/440 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/440 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/441 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/441 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/442 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/442 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/443 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/443 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/444 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/444 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/445 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/445 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/446 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/446 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/447 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/447 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/448 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/448 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/449 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/449 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/450 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/450 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/451 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/451 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/452 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/452 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/453 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/453 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/454 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/454 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/455 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/455 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/456 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/456 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/457 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/457 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/458 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/458 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/459 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/459 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/460 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/460 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/461 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/461 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/462 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/462 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/463 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/463 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/464 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/464 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/465 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/465 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/466 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/466 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/467 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/467 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/468 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/468 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/469 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/469 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/470 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/470 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/471 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/471 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/472 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/472 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/473 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/473 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/474 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/474 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/475 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/475 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/476 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/476 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/477 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/477 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/478 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/478 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/479 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/479 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/480 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/480 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/481 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/481 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/482 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/482 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/483 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/483 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/484 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/484 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/485 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/485 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/486 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/486 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/487 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/487 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/488 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/488 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/489 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/489 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/490 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/490 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/491 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/491 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/492 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/492 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/493 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/493 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/494 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/494 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/495 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/495 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/496 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/496 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/497 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/497 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/498 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/498 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/499 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/499 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/500 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/500 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/501 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/501 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/502 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/502 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/503 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/503 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/504 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/504 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/505 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/505 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/506 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/506 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/507 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/507 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/508 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/508 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/509 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/509 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/510 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/510 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/511 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/511 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/512 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/512 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/513 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/513 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/514 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/514 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/515 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/515 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/516 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/516 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/517 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/517 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/518 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/518 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/519 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/519 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/520 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/520 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/521 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/521 (2 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/522 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/522 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/523 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/523 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/524 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/524 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/525 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/525 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/526 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/526 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/527 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/527 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/528 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/528 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/529 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/529 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/530 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/530 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/531 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/531 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/532 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/532 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/533 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/533 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/534 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/534 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/535 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/535 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/536 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/536 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/537 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/537 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/538 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/538 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/539 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/539 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/540 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/540 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/541 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/541 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/542 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/542 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/543 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/543 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/544 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/544 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/545 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/545 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/546 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/546 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/547 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/547 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/548 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/548 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/549 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/549 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/550 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/550 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/551 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/551 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/552 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/552 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/553 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/553 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/554 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/554 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/555 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/555 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/556 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/556 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/557 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/557 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/558 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/558 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/559 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/559 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/560 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/560 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/561 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/561 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/562 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/562 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/563 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/563 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/564 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/564 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/565 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/565 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/566 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/566 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/567 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/567 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/568 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/568 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/569 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/569 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/570 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/570 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/571 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/571 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/572 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/572 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/573 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/573 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/574 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/574 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/575 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/575 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/576 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/576 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/577 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/577 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/578 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/578 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/579 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/579 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/580 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/580 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/581 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/581 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/582 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/582 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/583 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/583 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/584 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/584 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/585 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/585 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/586 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/586 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/587 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/587 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/588 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/588 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/589 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/589 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/590 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/590 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/591 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/591 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/592 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/592 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/593 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/593 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/594 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/594 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/595 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/595 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/596 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/596 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/597 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/597 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/598 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/598 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/599 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/599 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/600 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/600 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/601 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/601 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/602 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/602 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/603 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/603 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/604 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/604 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/605 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/605 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/606 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/606 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/607 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/607 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/608 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/608 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/609 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/609 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/610 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/610 (0 ms) [ RUN ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/611 [ OK ] HkdfSha512/Pkcs11HkdfTest.WycheproofVectors/611 (0 ms) [----------] 612 tests from HkdfSha512/Pkcs11HkdfTest (74 ms total) [----------] 9 tests from EncryptDeriveTests/EncryptDeriveTest [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/0 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/0 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/1 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/1 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/2 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/2 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/3 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/3 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/4 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/4 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/5 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/5 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/6 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/6 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/7 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/7 (0 ms) [ RUN ] EncryptDeriveTests/EncryptDeriveTest.Test/8 [ OK ] EncryptDeriveTests/EncryptDeriveTest.Test/8 (0 ms) [----------] 9 tests from EncryptDeriveTests/EncryptDeriveTest (0 ms total) [----------] 2 tests from Encrypt3DeriveTests/EncryptDerive3Test [ RUN ] Encrypt3DeriveTests/EncryptDerive3Test.Test/0 [ OK ] Encrypt3DeriveTests/EncryptDerive3Test.Test/0 (0 ms) [ RUN ] Encrypt3DeriveTests/EncryptDerive3Test.Test/1 [ OK ] Encrypt3DeriveTests/EncryptDerive3Test.Test/1 (0 ms) [----------] 2 tests from Encrypt3DeriveTests/EncryptDerive3Test (0 ms total) [----------] 12 tests from EddsaSignVerify/Pkcs11EddsaTest [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.SignAndVerify/0 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.SignAndVerify/0 (1 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.SignAndVerify/1 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.SignAndVerify/1 (1 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.SignAndVerify/2 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.SignAndVerify/2 (1 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportExport/0 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportExport/0 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportExport/1 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportExport/1 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportExport/2 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportExport/2 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportConvertToPublic/0 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportConvertToPublic/0 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportConvertToPublic/1 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportConvertToPublic/1 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportConvertToPublic/2 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportConvertToPublic/2 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportPublicCreateSubjectPKInfo/0 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportPublicCreateSubjectPKInfo/0 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportPublicCreateSubjectPKInfo/1 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportPublicCreateSubjectPKInfo/1 (0 ms) [ RUN ] EddsaSignVerify/Pkcs11EddsaTest.ImportPublicCreateSubjectPKInfo/2 [ OK ] EddsaSignVerify/Pkcs11EddsaTest.ImportPublicCreateSubjectPKInfo/2 (0 ms) [----------] 12 tests from EddsaSignVerify/Pkcs11EddsaTest (6 ms total) [----------] 3 tests from EddsaRound/Pkcs11EddsaRoundtripTest [ RUN ] EddsaRound/Pkcs11EddsaRoundtripTest.GenerateExportImportSignVerify/0 Generate ED pair on 0 [ OK ] EddsaRound/Pkcs11EddsaRoundtripTest.GenerateExportImportSignVerify/0 (2 ms) [ RUN ] EddsaRound/Pkcs11EddsaRoundtripTest.GenerateExportImportSignVerify/1 Generate ED pair on 0 [ OK ] EddsaRound/Pkcs11EddsaRoundtripTest.GenerateExportImportSignVerify/1 (2 ms) [ RUN ] EddsaRound/Pkcs11EddsaRoundtripTest.GenerateExportImportSignVerify/2 Generate ED pair on 0 [ OK ] EddsaRound/Pkcs11EddsaRoundtripTest.GenerateExportImportSignVerify/2 (2 ms) [----------] 3 tests from EddsaRound/Pkcs11EddsaRoundtripTest (8 ms total) [----------] 27 tests from EcdsaSignVerify/Pkcs11EcdsaTest [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/0 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/0 (5 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/1 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/1 (5 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/2 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/2 (5 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/3 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/3 (26 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/4 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/4 (24 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/5 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/5 (24 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/6 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/6 (70 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/7 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/7 (69 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/8 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.Verify/8 (69 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/0 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/0 (11 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/1 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/1 (10 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/2 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/2 (10 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/3 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/3 (60 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/4 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/4 (60 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/5 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/5 (62 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/6 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/6 (178 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/7 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/7 (172 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/8 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.SignAndVerify/8 (172 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/0 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/0 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/1 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/1 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/2 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/2 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/3 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/3 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/4 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/4 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/5 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/5 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/6 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/6 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/7 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/7 (0 ms) [ RUN ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/8 [ OK ] EcdsaSignVerify/Pkcs11EcdsaTest.ImportExport/8 (0 ms) [----------] 27 tests from EcdsaSignVerify/Pkcs11EcdsaTest (1040 ms total) [----------] 4 tests from Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest [ RUN ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/0 Generate EC pair on 208 [ OK ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/0 (12 ms) [ RUN ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/1 Generate EC pair on 220 [ OK ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/1 (69 ms) [ RUN ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/2 Generate EC pair on 221 [ OK ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/2 (198 ms) [ RUN ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/3 Generate EC pair on 355 [ OK ] Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest.GenerateExportImportSignVerify/3 (0 ms) [----------] 4 tests from Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest (280 ms total) [----------] 6 tests from EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest [ RUN ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/0 [ OK ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/0 (5 ms) [ RUN ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/1 [ OK ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/1 (4 ms) [ RUN ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/2 [ OK ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/2 (24 ms) [ RUN ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/3 [ OK ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/3 (23 ms) [ RUN ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/4 [ OK ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/4 (70 ms) [ RUN ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/5 [ OK ] EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest.Verify/5 (72 ms) [----------] 6 tests from EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest (200 ms total) [----------] 906 tests from DsaTest/Pkcs11DsaTest [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/0 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/0 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/1 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/1 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/2 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/2 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/3 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/3 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/4 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/4 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/5 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/5 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/6 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/6 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/7 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/7 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/8 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/8 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/9 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/9 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/10 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/10 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/11 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/11 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/12 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/12 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/13 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/13 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/14 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/14 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/15 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/15 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/16 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/16 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/17 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/17 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/18 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/18 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/19 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/19 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/20 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/20 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/21 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/21 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/22 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/22 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/23 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/23 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/24 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/24 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/25 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/25 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/26 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/26 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/27 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/27 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/28 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/28 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/29 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/29 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/30 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/30 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/31 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/31 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/32 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/32 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/33 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/33 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/34 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/34 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/35 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/35 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/36 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/36 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/37 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/37 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/38 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/38 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/39 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/39 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/40 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/40 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/41 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/41 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/42 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/42 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/43 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/43 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/44 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/44 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/45 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/45 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/46 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/46 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/47 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/47 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/48 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/48 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/49 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/49 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/50 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/50 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/51 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/51 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/52 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/52 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/53 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/53 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/54 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/54 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/55 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/55 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/56 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/56 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/57 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/57 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/58 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/58 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/59 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/59 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/60 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/60 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/61 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/61 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/62 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/62 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/63 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/63 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/64 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/64 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/65 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/65 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/66 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/66 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/67 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/67 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/68 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/68 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/69 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/69 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/70 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/70 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/71 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/71 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/72 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/72 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/73 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/73 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/74 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/74 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/75 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/75 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/76 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/76 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/77 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/77 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/78 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/78 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/79 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/79 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/80 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/80 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/81 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/81 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/82 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/82 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/83 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/83 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/84 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/84 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/85 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/85 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/86 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/86 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/87 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/87 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/88 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/88 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/89 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/89 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/90 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/90 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/91 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/91 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/92 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/92 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/93 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/93 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/94 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/94 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/95 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/95 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/96 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/96 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/97 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/97 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/98 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/98 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/99 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/99 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/100 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/100 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/101 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/101 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/102 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/102 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/103 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/103 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/104 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/104 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/105 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/105 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/106 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/106 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/107 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/107 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/108 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/108 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/109 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/109 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/110 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/110 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/111 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/111 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/112 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/112 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/113 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/113 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/114 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/114 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/115 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/115 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/116 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/116 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/117 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/117 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/118 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/118 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/119 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/119 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/120 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/120 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/121 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/121 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/122 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/122 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/123 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/123 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/124 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/124 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/125 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/125 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/126 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/126 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/127 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/127 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/128 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/128 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/129 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/129 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/130 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/130 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/131 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/131 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/132 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/132 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/133 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/133 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/134 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/134 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/135 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/135 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/136 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/136 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/137 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/137 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/138 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/138 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/139 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/139 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/140 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/140 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/141 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/141 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/142 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/142 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/143 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/143 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/144 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/144 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/145 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/145 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/146 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/146 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/147 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/147 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/148 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/148 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/149 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/149 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/150 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/150 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/151 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/151 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/152 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/152 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/153 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/153 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/154 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/154 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/155 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/155 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/156 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/156 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/157 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/157 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/158 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/158 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/159 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/159 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/160 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/160 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/161 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/161 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/162 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/162 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/163 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/163 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/164 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/164 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/165 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/165 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/166 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/166 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/167 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/167 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/168 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/168 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/169 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/169 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/170 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/170 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/171 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/171 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/172 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/172 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/173 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/173 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/174 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/174 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/175 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/175 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/176 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/176 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/177 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/177 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/178 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/178 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/179 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/179 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/180 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/180 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/181 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/181 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/182 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/182 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/183 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/183 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/184 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/184 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/185 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/185 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/186 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/186 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/187 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/187 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/188 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/188 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/189 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/189 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/190 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/190 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/191 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/191 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/192 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/192 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/193 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/193 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/194 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/194 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/195 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/195 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/196 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/196 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/197 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/197 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/198 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/198 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/199 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/199 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/200 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/200 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/201 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/201 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/202 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/202 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/203 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/203 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/204 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/204 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/205 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/205 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/206 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/206 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/207 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/207 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/208 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/208 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/209 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/209 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/210 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/210 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/211 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/211 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/212 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/212 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/213 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/213 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/214 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/214 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/215 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/215 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/216 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/216 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/217 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/217 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/218 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/218 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/219 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/219 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/220 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/220 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/221 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/221 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/222 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/222 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/223 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/223 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/224 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/224 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/225 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/225 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/226 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/226 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/227 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/227 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/228 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/228 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/229 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/229 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/230 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/230 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/231 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/231 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/232 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/232 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/233 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/233 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/234 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/234 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/235 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/235 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/236 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/236 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/237 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/237 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/238 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/238 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/239 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/239 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/240 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/240 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/241 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/241 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/242 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/242 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/243 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/243 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/244 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/244 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/245 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/245 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/246 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/246 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/247 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/247 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/248 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/248 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/249 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/249 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/250 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/250 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/251 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/251 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/252 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/252 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/253 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/253 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/254 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/254 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/255 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/255 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/256 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/256 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/257 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/257 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/258 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/258 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/259 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/259 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/260 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/260 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/261 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/261 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/262 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/262 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/263 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/263 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/264 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/264 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/265 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/265 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/266 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/266 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/267 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/267 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/268 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/268 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/269 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/269 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/270 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/270 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/271 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/271 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/272 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/272 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/273 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/273 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/274 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/274 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/275 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/275 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/276 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/276 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/277 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/277 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/278 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/278 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/279 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/279 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/280 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/280 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/281 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/281 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/282 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/282 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/283 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/283 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/284 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/284 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/285 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/285 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/286 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/286 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/287 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/287 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/288 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/288 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/289 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/289 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/290 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/290 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/291 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/291 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/292 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/292 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/293 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/293 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/294 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/294 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/295 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/295 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/296 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/296 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/297 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/297 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/298 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/298 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/299 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/299 (1 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/300 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/300 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/301 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/301 (2 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/302 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/302 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/303 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/303 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/304 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/304 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/305 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/305 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/306 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/306 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/307 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/307 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/308 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/308 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/309 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/309 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/310 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/310 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/311 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/311 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/312 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/312 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/313 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/313 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/314 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/314 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/315 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/315 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/316 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/316 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/317 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/317 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/318 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/318 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/319 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/319 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/320 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/320 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/321 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/321 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/322 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/322 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/323 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/323 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/324 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/324 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/325 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/325 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/326 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/326 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/327 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/327 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/328 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/328 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/329 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/329 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/330 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/330 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/331 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/331 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/332 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/332 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/333 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/333 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/334 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/334 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/335 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/335 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/336 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/336 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/337 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/337 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/338 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/338 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/339 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/339 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/340 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/340 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/341 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/341 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/342 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/342 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/343 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/343 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/344 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/344 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/345 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/345 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/346 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/346 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/347 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/347 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/348 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/348 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/349 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/349 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/350 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/350 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/351 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/351 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/352 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/352 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/353 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/353 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/354 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/354 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/355 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/355 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/356 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/356 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/357 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/357 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/358 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/358 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/359 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/359 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/360 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/360 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/361 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/361 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/362 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/362 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/363 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/363 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/364 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/364 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/365 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/365 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/366 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/366 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/367 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/367 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/368 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/368 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/369 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/369 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/370 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/370 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/371 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/371 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/372 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/372 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/373 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/373 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/374 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/374 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/375 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/375 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/376 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/376 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/377 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/377 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/378 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/378 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/379 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/379 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/380 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/380 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/381 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/381 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/382 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/382 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/383 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/383 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/384 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/384 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/385 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/385 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/386 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/386 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/387 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/387 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/388 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/388 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/389 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/389 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/390 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/390 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/391 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/391 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/392 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/392 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/393 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/393 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/394 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/394 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/395 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/395 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/396 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/396 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/397 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/397 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/398 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/398 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/399 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/399 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/400 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/400 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/401 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/401 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/402 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/402 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/403 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/403 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/404 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/404 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/405 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/405 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/406 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/406 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/407 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/407 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/408 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/408 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/409 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/409 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/410 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/410 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/411 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/411 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/412 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/412 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/413 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/413 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/414 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/414 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/415 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/415 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/416 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/416 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/417 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/417 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/418 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/418 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/419 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/419 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/420 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/420 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/421 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/421 (10 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/422 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/422 (10 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/423 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/423 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/424 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/424 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/425 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/425 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/426 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/426 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/427 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/427 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/428 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/428 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/429 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/429 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/430 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/430 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/431 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/431 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/432 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/432 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/433 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/433 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/434 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/434 (12 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/435 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/435 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/436 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/436 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/437 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/437 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/438 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/438 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/439 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/439 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/440 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/440 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/441 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/441 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/442 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/442 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/443 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/443 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/444 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/444 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/445 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/445 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/446 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/446 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/447 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/447 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/448 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/448 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/449 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/449 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/450 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/450 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/451 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/451 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/452 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/452 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/453 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/453 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/454 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/454 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/455 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/455 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/456 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/456 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/457 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/457 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/458 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/458 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/459 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/459 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/460 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/460 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/461 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/461 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/462 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/462 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/463 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/463 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/464 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/464 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/465 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/465 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/466 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/466 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/467 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/467 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/468 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/468 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/469 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/469 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/470 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/470 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/471 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/471 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/472 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/472 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/473 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/473 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/474 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/474 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/475 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/475 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/476 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/476 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/477 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/477 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/478 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/478 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/479 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/479 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/480 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/480 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/481 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/481 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/482 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/482 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/483 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/483 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/484 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/484 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/485 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/485 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/486 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/486 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/487 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/487 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/488 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/488 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/489 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/489 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/490 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/490 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/491 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/491 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/492 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/492 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/493 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/493 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/494 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/494 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/495 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/495 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/496 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/496 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/497 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/497 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/498 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/498 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/499 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/499 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/500 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/500 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/501 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/501 (12 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/502 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/502 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/503 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/503 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/504 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/504 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/505 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/505 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/506 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/506 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/507 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/507 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/508 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/508 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/509 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/509 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/510 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/510 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/511 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/511 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/512 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/512 (12 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/513 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/513 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/514 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/514 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/515 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/515 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/516 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/516 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/517 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/517 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/518 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/518 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/519 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/519 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/520 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/520 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/521 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/521 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/522 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/522 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/523 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/523 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/524 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/524 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/525 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/525 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/526 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/526 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/527 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/527 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/528 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/528 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/529 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/529 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/530 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/530 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/531 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/531 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/532 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/532 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/533 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/533 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/534 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/534 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/535 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/535 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/536 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/536 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/537 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/537 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/538 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/538 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/539 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/539 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/540 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/540 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/541 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/541 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/542 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/542 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/543 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/543 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/544 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/544 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/545 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/545 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/546 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/546 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/547 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/547 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/548 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/548 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/549 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/549 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/550 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/550 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/551 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/551 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/552 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/552 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/553 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/553 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/554 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/554 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/555 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/555 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/556 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/556 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/557 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/557 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/558 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/558 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/559 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/559 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/560 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/560 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/561 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/561 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/562 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/562 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/563 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/563 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/564 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/564 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/565 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/565 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/566 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/566 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/567 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/567 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/568 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/568 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/569 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/569 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/570 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/570 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/571 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/571 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/572 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/572 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/573 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/573 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/574 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/574 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/575 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/575 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/576 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/576 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/577 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/577 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/578 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/578 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/579 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/579 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/580 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/580 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/581 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/581 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/582 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/582 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/583 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/583 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/584 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/584 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/585 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/585 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/586 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/586 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/587 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/587 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/588 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/588 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/589 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/589 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/590 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/590 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/591 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/591 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/592 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/592 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/593 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/593 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/594 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/594 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/595 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/595 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/596 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/596 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/597 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/597 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/598 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/598 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/599 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/599 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/600 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/600 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/601 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/601 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/602 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/602 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/603 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/603 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/604 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/604 (12 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/605 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/605 (12 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/606 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/606 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/607 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/607 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/608 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/608 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/609 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/609 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/610 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/610 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/611 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/611 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/612 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/612 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/613 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/613 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/614 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/614 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/615 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/615 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/616 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/616 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/617 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/617 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/618 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/618 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/619 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/619 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/620 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/620 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/621 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/621 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/622 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/622 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/623 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/623 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/624 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/624 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/625 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/625 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/626 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/626 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/627 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/627 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/628 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/628 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/629 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/629 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/630 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/630 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/631 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/631 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/632 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/632 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/633 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/633 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/634 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/634 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/635 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/635 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/636 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/636 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/637 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/637 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/638 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/638 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/639 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/639 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/640 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/640 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/641 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/641 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/642 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/642 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/643 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/643 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/644 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/644 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/645 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/645 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/646 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/646 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/647 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/647 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/648 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/648 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/649 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/649 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/650 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/650 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/651 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/651 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/652 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/652 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/653 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/653 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/654 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/654 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/655 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/655 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/656 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/656 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/657 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/657 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/658 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/658 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/659 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/659 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/660 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/660 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/661 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/661 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/662 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/662 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/663 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/663 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/664 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/664 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/665 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/665 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/666 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/666 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/667 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/667 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/668 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/668 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/669 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/669 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/670 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/670 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/671 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/671 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/672 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/672 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/673 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/673 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/674 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/674 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/675 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/675 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/676 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/676 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/677 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/677 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/678 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/678 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/679 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/679 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/680 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/680 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/681 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/681 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/682 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/682 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/683 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/683 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/684 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/684 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/685 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/685 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/686 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/686 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/687 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/687 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/688 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/688 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/689 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/689 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/690 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/690 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/691 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/691 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/692 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/692 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/693 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/693 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/694 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/694 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/695 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/695 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/696 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/696 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/697 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/697 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/698 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/698 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/699 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/699 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/700 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/700 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/701 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/701 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/702 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/702 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/703 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/703 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/704 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/704 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/705 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/705 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/706 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/706 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/707 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/707 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/708 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/708 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/709 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/709 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/710 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/710 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/711 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/711 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/712 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/712 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/713 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/713 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/714 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/714 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/715 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/715 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/716 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/716 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/717 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/717 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/718 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/718 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/719 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/719 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/720 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/720 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/721 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/721 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/722 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/722 (10 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/723 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/723 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/724 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/724 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/725 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/725 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/726 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/726 (10 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/727 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/727 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/728 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/728 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/729 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/729 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/730 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/730 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/731 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/731 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/732 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/732 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/733 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/733 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/734 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/734 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/735 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/735 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/736 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/736 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/737 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/737 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/738 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/738 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/739 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/739 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/740 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/740 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/741 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/741 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/742 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/742 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/743 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/743 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/744 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/744 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/745 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/745 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/746 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/746 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/747 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/747 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/748 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/748 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/749 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/749 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/750 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/750 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/751 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/751 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/752 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/752 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/753 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/753 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/754 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/754 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/755 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/755 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/756 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/756 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/757 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/757 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/758 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/758 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/759 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/759 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/760 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/760 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/761 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/761 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/762 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/762 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/763 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/763 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/764 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/764 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/765 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/765 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/766 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/766 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/767 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/767 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/768 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/768 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/769 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/769 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/770 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/770 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/771 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/771 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/772 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/772 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/773 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/773 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/774 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/774 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/775 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/775 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/776 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/776 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/777 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/777 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/778 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/778 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/779 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/779 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/780 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/780 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/781 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/781 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/782 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/782 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/783 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/783 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/784 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/784 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/785 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/785 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/786 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/786 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/787 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/787 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/788 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/788 (10 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/789 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/789 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/790 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/790 (6 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/791 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/791 (10 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/792 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/792 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/793 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/793 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/794 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/794 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/795 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/795 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/796 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/796 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/797 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/797 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/798 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/798 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/799 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/799 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/800 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/800 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/801 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/801 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/802 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/802 (12 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/803 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/803 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/804 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/804 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/805 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/805 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/806 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/806 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/807 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/807 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/808 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/808 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/809 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/809 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/810 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/810 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/811 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/811 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/812 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/812 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/813 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/813 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/814 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/814 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/815 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/815 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/816 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/816 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/817 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/817 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/818 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/818 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/819 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/819 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/820 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/820 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/821 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/821 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/822 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/822 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/823 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/823 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/824 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/824 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/825 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/825 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/826 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/826 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/827 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/827 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/828 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/828 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/829 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/829 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/830 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/830 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/831 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/831 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/832 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/832 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/833 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/833 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/834 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/834 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/835 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/835 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/836 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/836 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/837 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/837 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/838 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/838 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/839 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/839 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/840 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/840 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/841 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/841 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/842 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/842 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/843 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/843 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/844 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/844 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/845 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/845 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/846 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/846 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/847 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/847 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/848 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/848 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/849 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/849 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/850 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/850 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/851 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/851 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/852 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/852 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/853 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/853 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/854 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/854 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/855 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/855 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/856 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/856 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/857 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/857 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/858 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/858 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/859 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/859 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/860 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/860 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/861 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/861 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/862 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/862 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/863 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/863 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/864 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/864 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/865 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/865 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/866 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/866 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/867 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/867 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/868 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/868 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/869 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/869 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/870 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/870 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/871 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/871 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/872 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/872 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/873 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/873 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/874 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/874 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/875 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/875 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/876 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/876 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/877 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/877 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/878 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/878 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/879 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/879 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/880 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/880 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/881 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/881 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/882 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/882 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/883 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/883 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/884 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/884 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/885 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/885 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/886 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/886 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/887 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/887 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/888 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/888 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/889 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/889 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/890 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/890 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/891 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/891 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/892 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/892 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/893 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/893 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/894 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/894 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/895 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/895 (0 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/896 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/896 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/897 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/897 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/898 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/898 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/899 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/899 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/900 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/900 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/901 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/901 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/902 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/902 (11 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/903 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/903 (5 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/904 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/904 (10 ms) [ RUN ] DsaTest/Pkcs11DsaTest.WycheproofVectors/905 [ OK ] DsaTest/Pkcs11DsaTest.WycheproofVectors/905 (10 ms) [----------] 906 tests from DsaTest/Pkcs11DsaTest (1097 ms total) [----------] 3 tests from NSSTestVector/Pkcs11Curve25519ParamTest [ RUN ] NSSTestVector/Pkcs11Curve25519ParamTest.TestVectors/0 Running test: 0 [ OK ] NSSTestVector/Pkcs11Curve25519ParamTest.TestVectors/0 (9 ms) [ RUN ] NSSTestVector/Pkcs11Curve25519ParamTest.TestVectors/1 Running test: 1 [ OK ] NSSTestVector/Pkcs11Curve25519ParamTest.TestVectors/1 (0 ms) [ RUN ] NSSTestVector/Pkcs11Curve25519ParamTest.TestVectors/2 Running test: 2 [ OK ] NSSTestVector/Pkcs11Curve25519ParamTest.TestVectors/2 (0 ms) [----------] 3 tests from NSSTestVector/Pkcs11Curve25519ParamTest (9 ms total) [----------] 2 tests from NSSTestVector/Pkcs11ChaCha20Poly1305Test [ RUN ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 [ OK ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 (0 ms) [ RUN ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 [ OK ] NSSTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 (0 ms) [----------] 2 tests from NSSTestVector/Pkcs11ChaCha20Poly1305Test (0 ms total) [----------] 300 tests from WycheproofTestVector/Pkcs11ChaCha20Poly1305Test [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/183 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/202 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/211 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/217 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/240 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/255 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/256 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/256 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/257 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/257 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/258 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/258 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/259 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/259 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/260 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/260 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/261 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/261 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/262 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/262 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/263 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/263 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/264 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/264 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/265 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/265 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/266 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/266 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/267 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/267 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/268 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/268 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/269 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/269 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/270 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/270 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/271 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/271 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/272 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/272 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/273 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/273 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/274 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/274 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/275 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/275 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/276 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/276 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/277 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/277 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/278 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/278 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/279 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/279 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/280 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/280 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/281 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/281 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/282 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/282 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/283 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/283 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/284 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/284 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/285 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/285 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/286 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/286 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/287 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/287 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/288 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/288 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/289 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/289 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/290 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/290 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/291 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/291 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/292 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/292 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/293 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/293 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/294 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/294 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/295 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/295 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/296 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/296 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/297 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/297 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/298 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/298 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/299 [ OK ] WycheproofTestVector/Pkcs11ChaCha20Poly1305Test.TestVectors/299 (0 ms) [----------] 300 tests from WycheproofTestVector/Pkcs11ChaCha20Poly1305Test (7 ms total) [----------] 52 tests from EncryptDecrypt/Pkcs11CbcPadTest [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecrypt/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextEncryptDecryptTwoParts/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailDecryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.FailEncryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptSimple/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.ContextFailDecryptInvalidBlockSize/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_PaddingTooLong/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding1/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortPadding2/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ZeroLengthPadding/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_OverflowPadding/3 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/0 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/0 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/1 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/1 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/2 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/2 (0 ms) [ RUN ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/3 [ OK ] EncryptDecrypt/Pkcs11CbcPadTest.EncryptDecrypt_ShortValidPadding/3 (0 ms) [----------] 52 tests from EncryptDecrypt/Pkcs11CbcPadTest (0 ms total) [----------] 183 tests from WycheproofTestVector/Pkcs11AesCbcWycheproofTest [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesCbcWycheproofTest.TestVectors/182 (0 ms) [----------] 183 tests from WycheproofTestVector/Pkcs11AesCbcWycheproofTest (3 ms total) [----------] 163 tests from Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/0 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/0 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/1 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/1 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/2 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/2 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/3 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/3 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/4 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/4 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/5 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/5 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/6 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/6 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/7 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/7 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/8 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/8 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/9 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/9 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/10 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/10 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/11 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/11 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/12 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/12 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/13 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/13 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/14 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/14 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/15 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/15 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/16 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/16 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/17 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/17 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/18 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/18 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/19 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/19 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/20 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/20 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/21 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/21 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/22 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/22 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/23 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/23 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/24 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/24 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/25 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/25 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/26 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/26 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/27 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/27 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/28 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/28 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/29 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/29 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/30 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/30 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/31 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/31 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/32 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/32 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/33 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/33 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/34 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/34 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/35 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/35 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/36 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/36 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/37 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/37 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/38 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/38 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/39 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/39 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/40 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/40 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/41 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/41 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/42 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/42 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/43 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/43 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/44 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/44 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/45 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/45 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/46 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/46 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/47 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/47 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/48 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/48 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/49 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/49 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/50 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/50 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/51 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/51 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/52 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/52 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/53 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/53 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/54 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/54 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/55 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/55 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/56 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/56 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/57 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/57 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/58 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/58 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/59 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/59 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/60 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/60 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/61 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/61 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/62 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/62 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/63 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/63 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/64 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/64 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/65 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/65 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/66 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/66 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/67 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/67 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/68 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/68 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/69 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/69 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/70 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/70 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/71 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/71 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/72 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/72 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/73 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/73 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/74 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/74 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/75 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/75 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/76 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/76 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/77 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/77 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/78 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/78 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/79 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/79 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/80 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/80 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/81 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/81 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/82 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/82 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/83 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/83 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/84 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/84 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/85 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/85 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/86 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/86 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/87 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/87 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/88 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/88 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/89 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/89 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/90 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/90 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/91 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/91 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/92 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/92 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/93 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/93 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/94 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/94 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/95 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/95 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/96 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/96 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/97 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/97 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/98 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/98 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/99 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/99 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/100 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/100 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/101 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/101 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/102 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/102 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/103 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/103 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/104 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/104 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/105 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/105 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/106 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/106 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/107 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/107 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/108 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/108 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/109 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/109 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/110 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/110 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/111 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/111 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/112 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/112 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/113 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/113 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/114 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/114 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/115 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/115 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/116 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/116 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/117 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/117 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/118 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/118 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/119 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/119 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/120 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/120 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/121 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/121 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/122 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/122 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/123 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/123 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/124 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/124 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/125 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/125 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/126 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/126 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/127 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/127 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/128 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/128 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/129 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/129 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/130 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/130 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/131 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/131 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/132 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/132 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/133 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/133 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/134 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/134 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/135 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/135 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/136 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/136 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/137 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/137 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/138 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/138 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/139 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/139 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/140 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/140 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/141 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/141 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/142 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/142 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/143 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/143 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/144 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/144 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/145 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/145 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/146 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/146 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/147 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/147 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/148 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/148 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/149 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/149 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/150 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/150 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/151 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/151 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/152 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/152 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/153 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/153 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/154 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/154 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/155 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/155 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/156 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/156 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/157 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/157 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/158 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/158 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/159 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/159 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/160 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/160 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/161 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/161 (0 ms) [ RUN ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/162 [ OK ] Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest.TestVectors/162 (0 ms) [----------] 163 tests from Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest (2 ms total) [----------] 19 tests from NISTTestVector/Pkcs11AesGcmTest [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/0 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/0 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/1 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/1 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/2 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/2 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/3 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/3 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/4 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/4 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/5 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/5 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/6 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/6 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/7 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/7 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/8 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/8 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/9 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/9 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/10 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/10 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/11 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/11 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/12 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/12 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/13 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/13 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/14 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/14 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/15 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/15 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/16 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/16 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/17 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/17 (0 ms) [ RUN ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/18 [ OK ] NISTTestVector/Pkcs11AesGcmTest.TestVectors/18 (0 ms) [----------] 19 tests from NISTTestVector/Pkcs11AesGcmTest (0 ms total) [----------] 256 tests from WycheproofTestVector/Pkcs11AesGcmTest [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/0 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/0 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/1 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/1 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/2 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/2 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/3 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/3 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/4 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/4 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/5 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/5 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/6 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/6 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/7 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/7 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/8 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/8 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/9 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/9 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/10 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/10 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/11 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/11 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/12 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/12 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/13 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/13 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/14 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/14 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/15 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/15 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/16 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/16 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/17 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/17 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/18 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/18 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/19 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/19 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/20 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/20 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/21 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/21 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/22 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/22 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/23 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/23 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/24 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/24 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/25 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/25 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/26 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/26 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/27 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/27 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/28 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/28 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/29 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/29 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/30 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/30 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/31 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/31 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/32 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/32 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/33 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/33 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/34 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/34 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/35 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/35 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/36 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/36 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/37 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/37 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/38 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/38 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/39 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/39 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/40 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/40 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/41 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/41 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/42 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/42 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/43 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/43 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/44 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/44 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/45 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/45 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/46 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/46 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/47 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/47 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/48 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/48 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/49 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/49 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/50 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/50 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/51 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/51 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/52 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/52 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/53 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/53 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/54 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/54 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/55 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/55 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/56 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/56 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/57 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/57 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/58 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/58 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/59 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/59 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/60 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/60 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/61 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/61 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/62 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/62 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/63 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/63 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/64 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/64 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/65 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/65 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/66 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/66 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/67 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/67 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/68 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/68 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/69 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/69 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/70 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/70 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/71 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/71 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/72 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/72 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/73 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/73 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/74 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/74 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/75 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/75 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/76 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/76 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/77 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/77 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/78 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/78 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/79 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/79 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/80 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/80 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/81 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/81 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/82 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/82 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/83 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/83 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/84 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/84 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/85 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/85 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/86 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/86 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/87 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/87 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/88 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/88 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/89 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/89 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/90 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/90 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/91 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/91 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/92 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/92 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/93 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/93 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/94 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/94 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/95 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/95 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/96 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/96 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/97 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/97 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/98 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/98 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/99 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/99 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/100 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/100 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/101 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/101 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/102 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/102 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/103 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/103 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/104 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/104 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/105 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/105 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/106 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/106 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/107 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/107 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/108 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/108 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/109 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/109 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/110 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/110 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/111 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/111 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/112 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/112 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/113 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/113 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/114 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/114 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/115 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/115 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/116 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/116 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/117 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/117 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/118 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/118 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/119 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/119 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/120 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/120 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/121 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/121 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/122 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/122 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/123 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/123 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/124 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/124 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/125 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/125 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/126 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/126 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/127 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/127 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/128 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/128 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/129 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/129 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/130 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/130 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/131 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/131 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/132 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/132 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/133 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/133 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/134 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/134 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/135 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/135 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/136 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/136 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/137 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/137 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/138 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/138 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/139 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/139 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/140 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/140 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/141 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/141 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/142 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/142 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/143 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/143 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/144 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/144 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/145 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/145 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/146 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/146 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/147 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/147 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/148 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/148 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/149 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/149 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/150 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/150 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/151 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/151 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/152 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/152 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/153 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/153 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/154 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/154 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/155 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/155 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/156 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/156 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/157 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/157 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/158 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/158 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/159 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/159 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/160 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/160 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/161 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/161 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/162 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/162 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/163 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/163 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/164 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/164 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/165 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/165 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/166 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/166 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/167 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/167 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/168 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/168 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/169 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/169 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/170 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/170 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/171 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/171 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/172 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/172 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/173 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/173 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/174 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/174 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/175 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/175 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/176 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/176 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/177 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/177 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/178 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/178 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/179 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/179 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/180 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/180 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/181 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/181 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/182 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/182 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/183 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/183 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/184 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/184 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/185 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/185 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/186 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/186 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/187 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/187 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/188 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/188 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/189 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/189 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/190 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/190 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/191 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/191 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/192 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/192 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/193 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/193 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/194 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/194 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/195 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/195 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/196 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/196 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/197 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/197 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/198 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/198 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/199 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/199 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/200 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/200 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/201 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/201 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/202 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/202 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/203 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/203 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/204 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/204 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/205 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/205 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/206 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/206 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/207 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/207 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/208 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/208 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/209 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/209 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/210 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/210 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/211 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/211 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/212 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/212 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/213 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/213 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/214 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/214 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/215 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/215 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/216 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/216 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/217 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/217 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/218 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/218 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/219 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/219 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/220 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/220 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/221 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/221 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/222 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/222 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/223 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/223 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/224 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/224 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/225 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/225 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/226 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/226 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/227 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/227 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/228 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/228 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/229 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/229 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/230 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/230 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/231 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/231 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/232 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/232 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/233 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/233 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/234 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/234 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/235 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/235 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/236 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/236 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/237 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/237 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/238 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/238 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/239 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/239 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/240 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/240 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/241 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/241 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/242 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/242 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/243 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/243 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/244 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/244 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/245 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/245 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/246 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/246 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/247 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/247 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/248 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/248 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/249 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/249 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/250 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/250 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/251 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/251 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/252 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/252 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/253 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/253 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/254 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/254 (0 ms) [ RUN ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/255 [ OK ] WycheproofTestVector/Pkcs11AesGcmTest.TestVectors/255 (0 ms) [----------] 256 tests from WycheproofTestVector/Pkcs11AesGcmTest (6 ms total) [----------] Global test environment tear-down [==========] 5976 tests from 73 test suites ran. (62533 ms total) [ PASSED ] 5976 tests. gtests.sh: #54: pk11_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/pk11_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #55: 'Pkcs11SymKeyTest: ConcatSymKeyTest' - PASSED gtests.sh: #56: 'Pkcs11SymKeyTest: SensitiveConcatSymKeyTest' - PASSED gtests.sh: #57: 'Pkcs11SymKeyTest: NotExtractableConcatSymKeyTest' - PASSED gtests.sh: #58: 'Pkcs11SymKeyTest: KeySlotConcatSymKeyTest' - PASSED gtests.sh: #59: 'Pkcs11SymKeyTest: CrossSlotConcatSymKeyTest' - PASSED gtests.sh: #60: 'Pkcs11SeedTest: CBC_ValidArgs' - PASSED gtests.sh: #61: 'Pkcs11SeedTest: CBC_InvalidArgs' - PASSED gtests.sh: #62: 'Pkcs11SeedTest: ECB_Singleblock' - PASSED gtests.sh: #63: 'Pkcs11SeedTest: ECB_Multiblock' - PASSED gtests.sh: #64: 'Pkcs11RsaPssTest: GenerateAndSignAndVerify' - PASSED gtests.sh: #65: 'Pkcs11RsaPssTest: NoLeakWithInvalidExponent' - PASSED gtests.sh: #66: 'Pkcs11RsaPssTestWycheproof: RsaPss2048Sha1' - PASSED gtests.sh: #67: 'Pkcs11RsaPssTestWycheproof: RsaPss2048Sha256_0' - PASSED gtests.sh: #68: 'Pkcs11RsaPssTestWycheproof: RsaPss2048Sha256_32' - PASSED gtests.sh: #69: 'Pkcs11RsaPssTestWycheproof: RsaPss3072Sha256' - PASSED gtests.sh: #70: 'Pkcs11RsaPssTestWycheproof: RsaPss4096Sha256' - PASSED gtests.sh: #71: 'Pkcs11RsaPssTestWycheproof: RsaPss4096Sha512' - PASSED gtests.sh: #72: 'Pkcs11RsaPssTestWycheproof: RsaPssMisc' - PASSED gtests.sh: #73: 'RsaPkcs1Test: Pkcs1MinimumPadding' - PASSED gtests.sh: #74: 'RsaPkcs1Test: RequireNullParameter' - PASSED gtests.sh: #75: 'Pkcs11RsaPkcs1WycheproofTest: Pkcs11RsaPkcs1WycheproofTest' - PASSED gtests.sh: #76: 'RsaOaepWycheproofTest: RsaOaep2048Sha1' - PASSED gtests.sh: #77: 'RsaOaepWycheproofTest: RsaOaep2048Sha256MgfSha1' - PASSED gtests.sh: #78: 'RsaOaepWycheproofTest: RsaOaep2048Sha256' - PASSED gtests.sh: #79: 'RsaOaepWycheproofTest: RsaOaep2048Sha384MgfSha1' - PASSED gtests.sh: #80: 'RsaOaepWycheproofTest: RsaOaep2048Sha384' - PASSED gtests.sh: #81: 'RsaOaepWycheproofTest: RsaOaep2048Sha512MgfSha1' - PASSED gtests.sh: #82: 'RsaOaepWycheproofTest: RsaOaep2048Sha512' - PASSED gtests.sh: #83: 'RsaOaepWycheproofTest: RsaOaep3072Sha256MgfSha1' - PASSED gtests.sh: #84: 'RsaOaepWycheproofTest: RsaOaep3072Sha256' - PASSED gtests.sh: #85: 'RsaOaepWycheproofTest: RsaOaep3072Sha512MgfSha1' - PASSED gtests.sh: #86: 'RsaOaepWycheproofTest: RsaOaep3072Sha512' - PASSED gtests.sh: #87: 'RsaOaepWycheproofTest: RsaOaep4096Sha256MgfSha1' - PASSED gtests.sh: #88: 'RsaOaepWycheproofTest: RsaOaep4096Sha256' - PASSED gtests.sh: #89: 'RsaOaepWycheproofTest: RsaOaep4096Sha512MgfSha1' - PASSED gtests.sh: #90: 'RsaOaepWycheproofTest: RsaOaep4096Sha512' - PASSED gtests.sh: #91: 'RsaOaepWycheproofTest: RsaOaepMisc' - PASSED gtests.sh: #92: 'Pkcs11RsaOaepTest: TestOaepWrapUnwrap' - PASSED gtests.sh: #93: 'RsaDecryptWycheproofTest: Rsa2048' - PASSED gtests.sh: #94: 'RsaDecryptWycheproofTest: Rsa3072' - PASSED gtests.sh: #95: 'RsaDecryptWycheproofTest: Rsa4096' - PASSED gtests.sh: #96: 'RsaDecryptWycheproofTest: Bb2048' - PASSED gtests.sh: #97: 'RsaDecryptWycheproofTest: Bb2049' - PASSED gtests.sh: #98: 'RsaDecryptWycheproofTest: Bb3072' - PASSED gtests.sh: #99: 'RsaEncryptTest: MessageLengths' - PASSED gtests.sh: #100: 'TlsPrfTest: ExtendedMsParamErr' - PASSED gtests.sh: #101: 'TlsPrfTest: ExtendedMsDhTlsPrf' - PASSED gtests.sh: #102: 'TlsPrfTest: ExtendedMsRsaTlsPrf' - PASSED gtests.sh: #103: 'TlsPrfTest: ExtendedMsDhSha256' - PASSED gtests.sh: #104: 'TlsPrfTest: ExtendedMsRsaSha256' - PASSED gtests.sh: #105: 'Pkcs11Pbkdf2Test: DeriveKnown1' - PASSED gtests.sh: #106: 'Pkcs11Pbkdf2Test: DeriveKnown2' - PASSED gtests.sh: #107: 'Pkcs11Pbkdf2Test: KeyLenSizes' - PASSED gtests.sh: #108: 'Pkcs11PbeTest: DeriveKnown' - PASSED gtests.sh: #109: 'Pkcs11ModuleTest: LoadUnload' - PASSED gtests.sh: #110: 'Pkcs11ModuleTest: ListSlots' - PASSED gtests.sh: #111: 'Pkcs11ModuleTest: PublicCertificatesToken' - PASSED gtests.sh: #112: 'Pkcs11ModuleTest: PublicCertificatesTokenLookup' - PASSED gtests.sh: #113: 'Pkcs11ModuleTest: PublicCertificatesTokenLookupNoMatch' - PASSED gtests.sh: #114: 'Pkcs11DhNullKeyTest: UseNullPublicValue' - PASSED gtests.sh: #115: 'Pkcs11KEMTest: KemConsistencyTest' - PASSED gtests.sh: #116: 'Pkcs11KbkdfTest: TestAdditionalKey' - PASSED gtests.sh: #117: 'TestVectors: HpkeVectors' - PASSED gtests.sh: #118: 'ModeParameterizedTest: BadEncapsulatedPubKey' - PASSED gtests.sh: #119: 'ModeParameterizedTest: InvalidContextParams' - PASSED gtests.sh: #120: 'ModeParameterizedTest: InvalidReceiverKeyType' - PASSED gtests.sh: #121: 'PK11FindCertsTestBase: CertAddListWithData' - PASSED gtests.sh: #122: 'PK11FindRawCertsBySubjectTest: TestNoCertsImportedNoCertsFound' - PASSED gtests.sh: #123: 'PK11FindRawCertsBySubjectTest: TestOneCertImportedNoCertsFound' - PASSED gtests.sh: #124: 'PK11FindRawCertsBySubjectTest: TestMultipleMatchingCertsFound' - PASSED gtests.sh: #125: 'PK11FindRawCertsBySubjectTest: TestNoCertsOnInternalSlots' - PASSED gtests.sh: #126: 'PK11FindRawCertsBySubjectTest: TestFindEmptySubject' - PASSED gtests.sh: #127: 'PK11FindRawCertsBySubjectTest: TestSearchForNullSubject' - PASSED gtests.sh: #128: 'PK11GetCertsMatchingPrivateKeyTest: TestNoCertsAtAll' - PASSED gtests.sh: #129: 'PK11GetCertsMatchingPrivateKeyTest: TestNoCertsForKey' - PASSED gtests.sh: #130: 'PK11GetCertsMatchingPrivateKeyTest: TestOneCertForKey' - PASSED gtests.sh: #131: 'PK11GetCertsMatchingPrivateKeyTest: TestTwoCertsForKey' - PASSED gtests.sh: #132: 'PK11FindEncodedCertInSlotTest: TestFindEncodedCert' - PASSED gtests.sh: #133: 'Pkcs11ExportTest: DeriveNonExport' - PASSED gtests.sh: #134: 'Pkcs11ExportTest: DeriveExport' - PASSED gtests.sh: #135: 'Pkcs11EcdhTest: P256' - PASSED gtests.sh: #136: 'Pkcs11EcdhTest: P384' - PASSED gtests.sh: #137: 'Pkcs11EcdhTest: P521' - PASSED gtests.sh: #138: 'Pkcs11EddsaWycheproofTest: Ed25519' - PASSED gtests.sh: #139: 'Pkcs11EcdsaSha256Test: ImportNoCurveOIDOrAlgorithmParams' - PASSED gtests.sh: #140: 'Pkcs11EcdsaSha256Test: ImportOnlyAlgorithmParams' - PASSED gtests.sh: #141: 'Pkcs11EcdsaSha256Test: ImportMatchingCurveOIDAndAlgorithmParams' - PASSED gtests.sh: #142: 'Pkcs11EcdsaSha256Test: ImportDissimilarCurveOIDAndAlgorithmParams' - PASSED gtests.sh: #143: 'Pkcs11EcdsaSha256Test: ImportNoAlgorithmParams' - PASSED gtests.sh: #144: 'Pkcs11EcdsaSha256Test: ImportInvalidAlgorithmParams' - PASSED gtests.sh: #145: 'Pkcs11EcdsaSha256Test: ImportPointNotOnCurve' - PASSED gtests.sh: #146: 'Pkcs11EcdsaSha256Test: ImportNoPublicKey' - PASSED gtests.sh: #147: 'Pkcs11EcdsaSha256Test: ImportSpkiNoAlgorithmParams' - PASSED gtests.sh: #148: 'Pkcs11EcdsaSha256Test: ImportSpkiPointNotOnCurve' - PASSED gtests.sh: #149: 'Pkcs11EcdsaWycheproofTest: P256' - PASSED gtests.sh: #150: 'Pkcs11EcdsaWycheproofTest: P256Sha512' - PASSED gtests.sh: #151: 'Pkcs11EcdsaWycheproofTest: P384' - PASSED gtests.sh: #152: 'Pkcs11EcdsaWycheproofTest: P384Sha512' - PASSED gtests.sh: #153: 'Pkcs11EcdsaWycheproofTest: P521' - PASSED gtests.sh: #154: 'Pkcs11DesTest: ZeroLengthIV' - PASSED gtests.sh: #155: 'Pkcs11DesTest: IVTooShort' - PASSED gtests.sh: #156: 'Pkcs11DesTest: WrongLengthIV' - PASSED gtests.sh: #157: 'Pkcs11DesTest: AllGood' - PASSED gtests.sh: #158: 'DERPrivateKeyImportTest: ImportPrivateRSAKey' - PASSED gtests.sh: #159: 'DERPrivateKeyImportTest: ImportEcdsaKey' - PASSED gtests.sh: #160: 'DERPrivateKeyImportTest: ImportInvalidPrivateKey' - PASSED gtests.sh: #161: 'DERPrivateKeyImportTest: ImportZeroLengthPrivateKey' - PASSED gtests.sh: #162: 'Pkcs11Curve25519Wycheproof: Run' - PASSED gtests.sh: #163: 'Pkcs11ChaCha20Poly1305Test: GenerateEncryptDecrypt' - PASSED gtests.sh: #164: 'Pkcs11ChaCha20Poly1305Test: Xor' - PASSED gtests.sh: #165: 'Pkcs11ChaCha20Poly1305Test: XorLegacy' - PASSED gtests.sh: #166: 'Pkcs11ChaCha20Poly1305Test: GenerateXor' - PASSED gtests.sh: #167: 'Pkcs11ChaCha20Poly1305Test: GenerateXorLegacy' - PASSED gtests.sh: #168: 'Pkcs11ChaCha20Poly1305Test: XorInvalidParams' - PASSED gtests.sh: #169: 'Pkcs11ChaCha20Poly1305Test: XorLegacyInvalidParams' - PASSED gtests.sh: #170: 'Pkcs11ChaCha20Poly1305Test: ChaCha201305MessageInterfaceBasic' - PASSED gtests.sh: #171: 'Pkcs11ChaCha20Poly1305Test: ChaCha20Poly1305MessageInterfaceSeparateTags' - PASSED gtests.sh: #172: 'Pkcs11CbcPadTest: FailEncryptShortParam' - PASSED gtests.sh: #173: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapECKey' - PASSED gtests.sh: #174: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRsaKey' - PASSED gtests.sh: #175: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_EvenBlock' - PASSED gtests.sh: #176: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_OddBlock1' - PASSED gtests.sh: #177: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_OddBlock2' - PASSED gtests.sh: #178: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_PaddingTooLong' - PASSED gtests.sh: #179: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_NoPadding' - PASSED gtests.sh: #180: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_BadPadding1' - PASSED gtests.sh: #181: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_BadPadding2' - PASSED gtests.sh: #182: 'Pkcs11AESKeyWrapPadTest: WrapUnwrapRandom_ShortValidPadding' - PASSED gtests.sh: #183: 'Pkcs11AESKeyWrapKwpTest: TestVectors' - PASSED gtests.sh: #184: 'Pkcs11AesGcmTest: ZeroLengthIV' - PASSED gtests.sh: #185: 'Pkcs11AesGcmTest: AllZeroIV' - PASSED gtests.sh: #186: 'Pkcs11AesGcmTest: TwelveByteZeroIV' - PASSED gtests.sh: #187: 'Pkcs11AesGcmTest: MessageInterfaceBasic' - PASSED gtests.sh: #188: 'Pkcs11AesGcmTest: MessageInterfaceSeparateTags' - PASSED gtests.sh: #189: 'Pkcs11AesGcmTest: MessageInterfaceIVMask' - PASSED gtests.sh: #190: 'Pkcs11AesGcmTest: MessageInterfaceXorCounter' - PASSED gtests.sh: #191: 'Pkcs11AesGcmTest: MessageInterfaceCounterOverflow' - PASSED gtests.sh: #192: 'Pkcs11AesGcmTest: MessageInterfaceXorCounterOverflow' - PASSED gtests.sh: #193: 'Pkcs11AesGcmTest: MessageInterfaceRandomIV' - PASSED gtests.sh: #194: 'Pkcs11AesGcmTest: MessageInterfaceRandomOverflow' - PASSED gtests.sh: #195: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/0 32-byte object <00-93 AF-56 76-02 00-00 80-95 AF-56 A2-00 00-00 30-96 AF-56 D9-00 00-00 10-97 AF-56 80-00 00-00>' - PASSED gtests.sh: #196: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/1 32-byte object <00-93 AF-56 79-02 00-00 80-95 AF-56 A2-00 00-00 F0-A8 AF-56 3D-00 00-00 10-97 AF-56 81-00 00-00>' - PASSED gtests.sh: #197: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/2 32-byte object <00-93 AF-56 7A-02 00-00 80-95 AF-56 A2-00 00-00 C0-A7 AF-56 1E-00 00-00 10-97 AF-56 81-00 00-00>' - PASSED gtests.sh: #198: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/3 32-byte object <00-93 AF-56 7C-02 00-00 80-95 AF-56 A2-00 00-00 D0-A8 AF-56 08-00 00-00 10-97 AF-56 81-00 00-00>' - PASSED gtests.sh: #199: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/4 32-byte object <00-93 AF-56 7C-02 00-00 80-95 AF-56 A2-00 00-00 30-BC AF-56 9A-00 00-00 10-97 AF-56 81-00 00-00>' - PASSED gtests.sh: #200: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/5 32-byte object <70-C4 AF-56 7D-02 00-00 80-95 AF-56 A2-00 00-00 E0-A5 AF-56 6D-00 00-00 10-97 AF-56 81-00 00-00>' - PASSED gtests.sh: #201: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/6 32-byte object <00-93 AF-56 7B-02 00-00 80-95 AF-56 A2-00 00-00 90-D3 AF-56 FF-00 00-00 10-97 AF-56 81-00 00-00>' - PASSED gtests.sh: #202: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/7 32-byte object <00-93 AF-56 7C-02 00-00 80-95 AF-56 A2-00 00-00 20-9A AF-56 AC-00 00-00 10-97 AF-56 81-00 00-00>' - PASSED gtests.sh: #203: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/8 32-byte object <10-E5 AF-56 96-03 00-00 B0-E8 AF-56 E2-00 00-00 20-92 AF-56 D3-00 00-00 A0-E9 AF-56 C0-00 00-00>' - PASSED gtests.sh: #204: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: Verify/9 32-byte object <C0-FC AF-56 BD-04 00-00 90-01 B0-56 25-01 00-00 E0-C3 AF-56 1D-00 00-00 90-D3 AF-56 00-01 00-00>' - PASSED gtests.sh: #205: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/0 32-byte object <70-74 AF-56 76-02 00-00 F0-76 AF-56 A2-00 00-00 30-96 AF-56 D9-00 00-00 A0-77 AF-56 80-00 00-00>' - PASSED gtests.sh: #206: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/1 32-byte object <70-74 AF-56 79-02 00-00 F0-76 AF-56 A2-00 00-00 40-AA AF-56 3D-00 00-00 A0-77 AF-56 81-00 00-00>' - PASSED gtests.sh: #207: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/2 32-byte object <70-74 AF-56 7A-02 00-00 F0-76 AF-56 A2-00 00-00 F0-A7 AF-56 1E-00 00-00 A0-77 AF-56 81-00 00-00>' - PASSED gtests.sh: #208: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/3 32-byte object <70-74 AF-56 7C-02 00-00 F0-76 AF-56 A2-00 00-00 D0-A8 AF-56 08-00 00-00 A0-77 AF-56 81-00 00-00>' - PASSED gtests.sh: #209: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/4 32-byte object <70-74 AF-56 7C-02 00-00 F0-76 AF-56 A2-00 00-00 30-BC AF-56 9A-00 00-00 A0-77 AF-56 81-00 00-00>' - PASSED gtests.sh: #210: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/5 32-byte object <70-C4 AF-56 7D-02 00-00 F0-76 AF-56 A2-00 00-00 E0-A5 AF-56 6D-00 00-00 A0-77 AF-56 81-00 00-00>' - PASSED gtests.sh: #211: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/6 32-byte object <70-74 AF-56 7B-02 00-00 F0-76 AF-56 A2-00 00-00 90-D3 AF-56 FF-00 00-00 A0-77 AF-56 81-00 00-00>' - PASSED gtests.sh: #212: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/7 32-byte object <70-74 AF-56 7C-02 00-00 F0-76 AF-56 A2-00 00-00 40-7D AF-56 AC-00 00-00 A0-77 AF-56 81-00 00-00>' - PASSED gtests.sh: #213: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/8 32-byte object <10-E5 AF-56 96-03 00-00 B0-E8 AF-56 E2-00 00-00 20-92 AF-56 D3-00 00-00 A0-E9 AF-56 C0-00 00-00>' - PASSED gtests.sh: #214: 'RsaPssSignVerify/Pkcs11RsaPssVectorTest: SignAndVerify/9 32-byte object <D0-43 B0-56 BD-04 00-00 90-01 B0-56 25-01 00-00 B0-3B B0-56 1D-00 00-00 90-D3 AF-56 00-01 00-00>' - PASSED gtests.sh: #215: 'Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest: UseNullPublicValue/0 208' - PASSED gtests.sh: #216: 'Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest: UseNullPublicValue/1 220' - PASSED gtests.sh: #217: 'Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest: UseNullPublicValue/2 221' - PASSED gtests.sh: #218: 'Pkcs11EcdhNullKeyTest/Pkcs11EcdhNullKeyTest: UseNullPublicValue/3 355' - PASSED gtests.sh: #219: 'Pk11KeyImportTest/Pk11KeyImportTest: GenerateExportImport/0 0' - PASSED gtests.sh: #220: 'Pk11KeyImportTest/Pk11KeyImportTest: GenerateExportImport/1 16' - PASSED gtests.sh: #221: 'Pk11KeyImportTest/Pk11KeyImportTest: GenerateExportImport/2 32' - PASSED gtests.sh: #222: 'Pk11KeyImportTestEC/Pk11KeyImportTestEC: GenerateExportImport/0 208' - PASSED gtests.sh: #223: 'Pk11KeyImportTestEC/Pk11KeyImportTestEC: GenerateExportImport/1 220' - PASSED gtests.sh: #224: 'Pk11KeyImportTestEC/Pk11KeyImportTestEC: GenerateExportImport/2 221' - PASSED gtests.sh: #225: 'Pk11KeyImportTestEC/Pk11KeyImportTestEC: GenerateExportImport/3 355' - PASSED gtests.sh: #226: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/0 (188-byte object <01-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 59-32 18-7C B6-96 D7-D9 A3-2C 0C-38 F8-89 AF-56 00-00 00-00 00-EB 24-0A F3-3F 79-D1 3D-FB F0-95 BF-59 9E-0D 10-8A AF-56 00-00 00-00 ... 1D-E6 1C-60 80-8E AF-56 10-00 00-00 10-00 00-00 4D-88 F6-11 21-F2 4B-BD 9F-E9 1B-59 70-8A AF-56 00-00 00-00 00-40 3A-DD F4-EB DE-A8 49-34 A9-CD AF-8E 1A-9E 00-00 00-00 00-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #227: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/1 (188-byte object <02-00 00-00 03-00 00-00 50-49 B0-56 28-00 00-00 28-00 00-00 59-32 18-7C B6-96 D7-D9 A3-2C 0C-38 10-44 B0-56 40-00 00-00 40-00 00-00 F3-3F 79-D1 3D-FB F0-95 BF-59 9E-0D 50-EF AF-56 00-00 00-00 ... 1D-E6 1C-60 D0-43 B0-56 10-00 00-00 10-00 00-00 4D-88 F6-11 21-F2 4B-BD 9F-E9 1B-59 B0-EF AF-56 00-00 00-00 00-40 3A-DD F4-EB DE-A8 49-34 A9-CD AF-8E 1A-9E 00-00 00-00 00-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #228: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/2 (188-byte object <03-00 00-00 03-00 00-00 80-65 B0-56 28-00 00-00 28-00 00-00 59-32 18-7C B6-96 D7-D9 A3-2C 0C-38 E0-8D AF-56 40-00 00-00 40-00 00-00 F3-3F 79-D1 3D-FB F0-95 BF-59 9E-0D E0-65 B0-56 28-00 00-00 ... 1D-E6 1C-60 A0-8D AF-56 10-00 00-00 10-00 00-00 4D-88 F6-11 21-F2 4B-BD 9F-E9 1B-59 10-F5 AF-56 00-00 00-00 00-40 3A-DD F4-EB DE-A8 49-34 A9-CD AF-8E 1A-9E 01-00 00-00 00-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #229: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/3 (188-byte object <04-00 00-00 03-00 00-00 40-6A B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-44 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-6A B0-56 28-00 00-00 ... 00-00 00-00 E0-66 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-6F B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #230: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/4 (188-byte object <05-00 00-00 01-00 00-00 60-74 B0-56 02-00 00-00 63-30 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-74 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-74 B0-56 00-00 00-00 ... 00-00 00-00 D0-6F B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-74 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #231: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/5 (188-byte object <06-00 00-00 00-00 00-00 20-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 68-78 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-78 B0-56 00-00 00-00 ... 00-00 00-00 10-8F AF-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-78 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #232: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/6 (188-byte object <07-00 00-00 02-00 00-00 E0-44 B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-7C B0-56 00-00 00-00 ... 00-00 00-00 D0-6F B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-7C B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #233: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/7 (188-byte object <08-00 00-00 06-00 00-00 60-44 B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 98-81 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-81 B0-56 00-00 00-00 ... 00-00 00-00 F8-81 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #234: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/8 (188-byte object <09-00 00-00 06-00 00-00 F0-6F B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A8-88 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-88 B0-56 00-00 00-00 ... 00-00 00-00 08-89 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 28-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #235: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/9 (188-byte object <0A-00 00-00 06-00 00-00 10-8B B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 68-8E B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8E B0-56 00-00 00-00 ... 00-00 00-00 C8-8E B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #236: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/10 (188-byte object <0B-00 00-00 04-00 00-00 60-7D B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-93 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-93 B0-56 00-00 00-00 ... 00-00 00-00 D8-93 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-93 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #237: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/11 (188-byte object <0C-00 00-00 04-00 00-00 70-8D AF-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 38-98 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-98 B0-56 00-00 00-00 ... 00-00 00-00 98-98 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-98 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 28-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #238: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/12 (188-byte object <0D-00 00-00 04-00 00-00 50-99 B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-9C B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-9C B0-56 00-00 00-00 ... 00-00 00-00 D8-9C B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-9C B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #239: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/13 (188-byte object <0E-00 00-00 05-00 00-00 50-8F B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 48-A1 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-A1 B0-56 00-00 00-00 ... 00-00 00-00 A8-A1 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-A1 B0-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #240: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/14 (188-byte object <0F-00 00-00 05-00 00-00 B0-65 B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 08-A6 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B0-56 00-00 00-00 ... 00-00 00-00 68-A6 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A6 B0-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 28-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #241: 'IkeSha1/Pkcs11IkeTest: IkeproofVectors/15 (188-byte object <10-00 00-00 05-00 00-00 20-A7 B0-56 28-00 00-00 28-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 48-AA B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-AA B0-56 00-00 00-00 ... 00-00 00-00 A8-AA B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-AA B0-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 545)' - PASSED gtests.sh: #242: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/0 (188-byte object <01-00 00-00 00-00 00-00 60-B4 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 48-AA B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-AA B0-56 00-00 00-00 ... 00-00 00-00 10-B7 B0-56 00-02 00-00 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-AA B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #243: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/1 (188-byte object <02-00 00-00 03-00 00-00 70-B9 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-BF B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-CD B0-56 00-00 00-00 ... 00-00 00-00 D0-65 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-CE B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #244: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/2 (188-byte object <03-00 00-00 03-00 00-00 F0-B5 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-B6 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-B6 B0-56 40-00 00-00 ... 00-00 00-00 80-B5 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-D0 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #245: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/3 (188-byte object <04-00 00-00 03-00 00-00 30-D1 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-D1 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-D1 B0-56 40-00 00-00 ... 00-00 00-00 F0-B7 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-D7 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #246: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/4 (188-byte object <05-00 00-00 01-00 00-00 20-DC B0-56 02-00 00-00 61-30 00-00 00-00 00-00 00-00 00-00 00-00 00-00 38-DC B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-DC B0-56 00-00 00-00 ... 00-00 00-00 60-B4 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-DC B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #247: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/5 (188-byte object <06-00 00-00 00-00 00-00 A0-B5 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B8-DE B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-DE B0-56 00-00 00-00 ... 00-00 00-00 60-7D B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DF B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #248: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/6 (188-byte object <07-00 00-00 02-00 00-00 20-B9 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-B9 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-E2 B0-56 00-00 00-00 ... 00-00 00-00 60-B4 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-E3 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #249: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/7 (188-byte object <08-00 00-00 06-00 00-00 80-B4 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 18-E9 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-E9 B0-56 00-00 00-00 ... 00-00 00-00 78-E9 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-E3 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #250: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/8 (188-byte object <09-00 00-00 06-00 00-00 70-B9 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 58-ED B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-ED B0-56 00-00 00-00 ... 00-00 00-00 B8-ED B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-E3 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #251: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/9 (188-byte object <0A-00 00-00 06-00 00-00 20-B9 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B8-F2 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-F2 B0-56 00-00 00-00 ... 00-00 00-00 18-F3 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-B4 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #252: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/10 (188-byte object <0B-00 00-00 04-00 00-00 A0-B5 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F8-F6 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F7 B0-56 00-00 00-00 ... 00-00 00-00 58-F7 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F7 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #253: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/11 (188-byte object <0C-00 00-00 04-00 00-00 80-B4 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B8-FB B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-FB B0-56 00-00 00-00 ... 00-00 00-00 18-FC B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-FC B0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #254: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/12 (188-byte object <0D-00 00-00 04-00 00-00 20-B9 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 58-00 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-00 B1-56 00-00 00-00 ... 00-00 00-00 B8-00 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-00 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #255: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/13 (188-byte object <0E-00 00-00 05-00 00-00 80-B4 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C8-04 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-04 B1-56 00-00 00-00 ... 00-00 00-00 28-05 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-05 B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #256: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/14 (188-byte object <0F-00 00-00 05-00 00-00 50-D7 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 88-09 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-09 B1-56 00-00 00-00 ... 00-00 00-00 E8-09 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0A B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #257: 'IkeSha256/Pkcs11IkeTest: IkeproofVectors/15 (188-byte object <10-00 00-00 05-00 00-00 20-B9 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-0E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-0E B1-56 00-00 00-00 ... 00-00 00-00 D8-0E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0E B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #258: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/0 (188-byte object <01-00 00-00 00-00 00-00 40-AA AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-0E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-0E B1-56 00-00 00-00 ... 00-00 00-00 70-F3 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #259: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/1 (188-byte object <02-00 00-00 03-00 00-00 20-14 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-19 B1-56 00-00 00-00 ... 00-00 00-00 D0-D1 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-19 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #260: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/2 (188-byte object <03-00 00-00 03-00 00-00 20-1A B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-AA AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-1A B1-56 60-00 00-00 ... 00-00 00-00 90-AB B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-1F B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #261: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/3 (188-byte object <04-00 00-00 03-00 00-00 80-1F B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-1F B1-56 60-00 00-00 ... 00-00 00-00 70-8F B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-26 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #262: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/4 (188-byte object <05-00 00-00 01-00 00-00 70-2B B1-56 02-00 00-00 39-65 00-00 00-00 00-00 00-00 00-00 00-00 00-00 88-2B B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-2B B1-56 00-00 00-00 ... 00-00 00-00 B0-13 B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-2C B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #263: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/5 (188-byte object <06-00 00-00 00-00 00-00 D0-0C B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B8-2E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E B1-56 00-00 00-00 ... 00-00 00-00 F0-6F B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-2F B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #264: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/6 (188-byte object <07-00 00-00 02-00 00-00 60-20 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-AA AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-33 B1-56 00-00 00-00 ... 00-00 00-00 B0-13 B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-33 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #265: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/7 (188-byte object <08-00 00-00 06-00 00-00 20-1A B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B8-38 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-38 B1-56 00-00 00-00 ... 00-00 00-00 18-39 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-0C B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #266: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/8 (188-byte object <09-00 00-00 06-00 00-00 D0-20 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-3D B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-3D B1-56 00-00 00-00 ... 00-00 00-00 D8-3D B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-AA AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #267: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/9 (188-byte object <0A-00 00-00 06-00 00-00 60-20 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 08-43 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-43 B1-56 00-00 00-00 ... 00-00 00-00 68-43 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-0C B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #268: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/10 (188-byte object <0B-00 00-00 04-00 00-00 D0-20 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E8-47 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-48 B1-56 00-00 00-00 ... 00-00 00-00 48-48 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-48 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #269: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/11 (188-byte object <0C-00 00-00 04-00 00-00 D0-12 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A8-4C B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-4C B1-56 00-00 00-00 ... 00-00 00-00 08-4D B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-4D B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #270: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/12 (188-byte object <0D-00 00-00 04-00 00-00 60-20 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 18-52 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-52 B1-56 00-00 00-00 ... 00-00 00-00 78-52 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-52 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #271: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/13 (188-byte object <0E-00 00-00 05-00 00-00 D0-12 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 88-56 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-56 B1-56 00-00 00-00 ... 00-00 00-00 E8-56 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-57 B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #272: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/14 (188-byte object <0F-00 00-00 05-00 00-00 90-33 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 48-5B B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-5B B1-56 00-00 00-00 ... 00-00 00-00 A8-5B B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-5B B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #273: 'IkeSha384/Pkcs11IkeTest: IkeproofVectors/15 (188-byte object <10-00 00-00 05-00 00-00 60-20 B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B8-60 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-60 B1-56 00-00 00-00 ... 00-00 00-00 18-61 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-61 B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #274: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/0 (188-byte object <01-00 00-00 00-00 00-00 D0-91 AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B8-60 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-60 B1-56 00-00 00-00 ... 00-00 00-00 D0-F3 B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-61 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #275: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/1 (188-byte object <02-00 00-00 03-00 00-00 50-67 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FC B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-6C B1-56 00-00 00-00 ... 00-00 00-00 B0-3F B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-6D B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #276: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/2 (188-byte object <03-00 00-00 03-00 00-00 B0-6D B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-91 AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-6E B1-56 80-00 00-00 ... 00-00 00-00 C0-9D B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-73 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #277: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/3 (188-byte object <04-00 00-00 03-00 00-00 B0-73 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FC B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-74 B1-56 80-00 00-00 ... 00-00 00-00 20-AB B0-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-7B B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #278: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/4 (188-byte object <05-00 00-00 01-00 00-00 D0-80 B1-56 02-00 00-00 34-63 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E8-80 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-81 B1-56 00-00 00-00 ... 00-00 00-00 C0-66 B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-81 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #279: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/5 (188-byte object <06-00 00-00 00-00 00-00 80-65 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 18-84 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-84 B1-56 00-00 00-00 ... 00-00 00-00 A0-1F B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-84 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #280: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/6 (188-byte object <07-00 00-00 02-00 00-00 D0-74 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-91 AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-88 B1-56 00-00 00-00 ... 00-00 00-00 C0-66 B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-88 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #281: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/7 (188-byte object <08-00 00-00 06-00 00-00 B0-6D B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 18-8E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-8E B1-56 00-00 00-00 ... 00-00 00-00 78-8E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-65 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #282: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/8 (188-byte object <09-00 00-00 06-00 00-00 60-75 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D8-92 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-92 B1-56 00-00 00-00 ... 00-00 00-00 38-93 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-91 AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #283: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/9 (188-byte object <0A-00 00-00 06-00 00-00 D0-74 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C8-98 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-98 B1-56 00-00 00-00 ... 00-00 00-00 28-99 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-65 B0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #284: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/10 (188-byte object <0B-00 00-00 04-00 00-00 60-75 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A8-9D B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-9D B1-56 00-00 00-00 ... 00-00 00-00 08-9E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-9E B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #285: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/11 (188-byte object <0C-00 00-00 04-00 00-00 A0-65 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 68-A2 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A2 B1-56 00-00 00-00 ... 00-00 00-00 C8-A2 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-A2 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #286: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/12 (188-byte object <0D-00 00-00 04-00 00-00 D0-74 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 58-A8 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-A8 B1-56 00-00 00-00 ... 00-00 00-00 B8-A8 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-A8 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #287: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/13 (188-byte object <0E-00 00-00 05-00 00-00 A0-65 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C8-AC B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-AC B1-56 00-00 00-00 ... 00-00 00-00 28-AD B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-AD B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #288: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/14 (188-byte object <0F-00 00-00 05-00 00-00 90-88 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 88-B1 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B1 B1-56 00-00 00-00 ... 00-00 00-00 E8-B1 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-B2 B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #289: 'IkeSha512/Pkcs11IkeTest: IkeproofVectors/15 (188-byte object <10-00 00-00 05-00 00-00 D0-74 B1-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-B7 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-B7 B1-56 00-00 00-00 ... 00-00 00-00 D8-B7 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-B7 B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #290: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/0 (188-byte object <01-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 78-B7 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-B7 B1-56 00-00 00-00 ... 00-00 00-00 10-70 AF-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-B7 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #291: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/1 (188-byte object <02-00 00-00 03-00 00-00 70-36 B0-56 20-00 00-00 20-00 00-00 34-64 63-30 38-37 65-38 36-36 61-61 F0-7D AF-56 40-00 00-00 40-00 00-00 62-38 65-37 38-65 37-39 62-39 39-33 70-4F B0-56 00-00 00-00 ... 91-00 00-00 90-6C AF-56 10-00 00-00 10-00 00-00 61-62 63-38 39-38 61-34 35-33 62-30 D0-4F B0-56 00-00 00-00 00-35 32-37 35-66 31-35 30-65 31-65 35-37 31-62 00-35 36-30 00-00 00-00 01-65 65-36>, 4236)' - PASSED gtests.sh: #292: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/2 (188-byte object <03-00 00-00 03-00 00-00 F0-4F B0-56 20-00 00-00 20-00 00-00 37-65 31-35 35-34 39-66 30-39 61-38 E0-8D AF-56 40-00 00-00 40-00 00-00 33-64 66-38 00-39 66-65 37-61 31-61 F0-8B AF-56 20-00 00-00 ... 31-35 38-39 90-68 AF-56 10-00 00-00 10-00 00-00 37-36 62-37 34-35 64-33 34-61 34-38 F0-99 AF-56 00-00 00-00 00-61 39-33 63-31 37-36 66-38 63-64 30-30 61-37 01-64 35-37 00-00 00-00 01-66 66-65>, 4236)' - PASSED gtests.sh: #293: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/3 (188-byte object <04-00 00-00 03-00 00-00 00-BC B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-7D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-BC B1-56 20-00 00-00 ... 00-00 00-00 10-5B AF-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-C1 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #294: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/4 (188-byte object <05-00 00-00 01-00 00-00 20-C6 B1-56 02-00 00-00 63-30 00-00 00-00 00-00 00-00 00-00 00-00 00-00 38-C6 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-C6 B1-56 00-00 00-00 ... 00-00 00-00 90-C1 B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-C6 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #295: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/5 (188-byte object <06-00 00-00 00-00 00-00 40-AA AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 28-CA B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-CA B1-56 00-00 00-00 ... 00-00 00-00 50-6C AF-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-CA B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #296: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/6 (188-byte object <07-00 00-00 02-00 00-00 F0-77 AF-56 21-00 00-00 21-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-CE B1-56 00-00 00-00 ... 00-00 00-00 90-C1 B1-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-CE B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #297: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/7 (188-byte object <08-00 00-00 06-00 00-00 40-7E AF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 58-D3 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-D3 B1-56 00-00 00-00 ... 00-00 00-00 B8-D3 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-AA AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #298: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/8 (188-byte object <09-00 00-00 06-00 00-00 20-CF B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E8-D7 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-D8 B1-56 00-00 00-00 ... 00-00 00-00 48-D8 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-8D AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #299: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/9 (188-byte object <0A-00 00-00 06-00 00-00 80-D8 B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E8-DC B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-DD B1-56 00-00 00-00 ... 00-00 00-00 48-DD B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-AA AF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #300: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/10 (188-byte object <0B-00 00-00 04-00 00-00 F0-CE B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 68-E1 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-E1 B1-56 00-00 00-00 ... 00-00 00-00 C8-E1 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-E1 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #301: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/11 (188-byte object <0C-00 00-00 04-00 00-00 B0-D8 B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 28-E6 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-E6 B1-56 00-00 00-00 ... 00-00 00-00 88-E6 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-E6 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #302: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/12 (188-byte object <0D-00 00-00 04-00 00-00 C0-8B AF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C8-EA B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-EA B1-56 00-00 00-00 ... 00-00 00-00 28-EB B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-EB B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #303: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/13 (188-byte object <0E-00 00-00 05-00 00-00 E0-D8 B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 08-EF B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-EF B1-56 00-00 00-00 ... 00-00 00-00 68-EF B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-EF B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 84-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #304: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/14 (188-byte object <0C-00 00-00 05-00 00-00 80-EB B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C8-F3 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F3 B1-56 00-00 00-00 ... 00-00 00-00 28-F4 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-F4 B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #305: 'IkeAESXCBC/Pkcs11IkeTest: IkeproofVectors/15 (188-byte object <10-00 00-00 05-00 00-00 10-E7 B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 68-F8 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F8 B1-56 00-00 00-00 ... 00-00 00-00 C8-F8 B1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F8 B1-56 01-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0F-00 00-00 01-00 00-00>, 4236)' - PASSED gtests.sh: #306: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/0 (0, 32, 1, 1)' - PASSED gtests.sh: #307: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/1 (0, 32, 1, 3)' - PASSED gtests.sh: #308: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/2 (0, 32, 2, 1)' - PASSED gtests.sh: #309: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/3 (0, 32, 2, 3)' - PASSED gtests.sh: #310: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/4 (0, 32, 3, 1)' - PASSED gtests.sh: #311: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/5 (0, 32, 3, 3)' - PASSED gtests.sh: #312: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/6 (1, 32, 1, 1)' - PASSED gtests.sh: #313: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/7 (1, 32, 1, 3)' - PASSED gtests.sh: #314: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/8 (1, 32, 2, 1)' - PASSED gtests.sh: #315: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/9 (1, 32, 2, 3)' - PASSED gtests.sh: #316: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/10 (1, 32, 3, 1)' - PASSED gtests.sh: #317: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportEncrypt/11 (1, 32, 3, 3)' - PASSED gtests.sh: #318: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/0 (0, 32, 1, 1)' - PASSED gtests.sh: #319: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/1 (0, 32, 1, 3)' - PASSED gtests.sh: #320: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/2 (0, 32, 2, 1)' - PASSED gtests.sh: #321: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/3 (0, 32, 2, 3)' - PASSED gtests.sh: #322: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/4 (0, 32, 3, 1)' - PASSED gtests.sh: #323: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/5 (0, 32, 3, 3)' - PASSED gtests.sh: #324: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/6 (1, 32, 1, 1)' - PASSED gtests.sh: #325: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/7 (1, 32, 1, 3)' - PASSED gtests.sh: #326: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/8 (1, 32, 2, 1)' - PASSED gtests.sh: #327: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/9 (1, 32, 2, 3)' - PASSED gtests.sh: #328: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/10 (1, 32, 3, 1)' - PASSED gtests.sh: #329: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportExport/11 (1, 32, 3, 3)' - PASSED gtests.sh: #330: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/0 (0, 32, 1, 1)' - PASSED gtests.sh: #331: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/1 (0, 32, 1, 3)' - PASSED gtests.sh: #332: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/2 (0, 32, 2, 1)' - PASSED gtests.sh: #333: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/3 (0, 32, 2, 3)' - PASSED gtests.sh: #334: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/4 (0, 32, 3, 1)' - PASSED gtests.sh: #335: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/5 (0, 32, 3, 3)' - PASSED gtests.sh: #336: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/6 (1, 32, 1, 1)' - PASSED gtests.sh: #337: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/7 (1, 32, 1, 3)' - PASSED gtests.sh: #338: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/8 (1, 32, 2, 1)' - PASSED gtests.sh: #339: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/9 (1, 32, 2, 3)' - PASSED gtests.sh: #340: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/10 (1, 32, 3, 1)' - PASSED gtests.sh: #341: 'Pk11Hpke/ModeParameterizedTest: ContextExportImportWithWrap/11 (1, 32, 3, 3)' - PASSED gtests.sh: #342: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/0 (0, 32, 1, 1)' - PASSED gtests.sh: #343: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/1 (0, 32, 1, 3)' - PASSED gtests.sh: #344: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/2 (0, 32, 2, 1)' - PASSED gtests.sh: #345: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/3 (0, 32, 2, 3)' - PASSED gtests.sh: #346: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/4 (0, 32, 3, 1)' - PASSED gtests.sh: #347: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/5 (0, 32, 3, 3)' - PASSED gtests.sh: #348: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/6 (1, 32, 1, 1)' - PASSED gtests.sh: #349: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/7 (1, 32, 1, 3)' - PASSED gtests.sh: #350: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/8 (1, 32, 2, 1)' - PASSED gtests.sh: #351: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/9 (1, 32, 2, 3)' - PASSED gtests.sh: #352: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/10 (1, 32, 3, 1)' - PASSED gtests.sh: #353: 'Pk11Hpke/ModeParameterizedTest: ExportSenderContext/11 (1, 32, 3, 3)' - PASSED gtests.sh: #354: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/0 (0, 32, 1, 1)' - PASSED gtests.sh: #355: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/1 (0, 32, 1, 3)' - PASSED gtests.sh: #356: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/2 (0, 32, 2, 1)' - PASSED gtests.sh: #357: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/3 (0, 32, 2, 3)' - PASSED gtests.sh: #358: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/4 (0, 32, 3, 1)' - PASSED gtests.sh: #359: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/5 (0, 32, 3, 3)' - PASSED gtests.sh: #360: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/6 (1, 32, 1, 1)' - PASSED gtests.sh: #361: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/7 (1, 32, 1, 3)' - PASSED gtests.sh: #362: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/8 (1, 32, 2, 1)' - PASSED gtests.sh: #363: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/9 (1, 32, 2, 3)' - PASSED gtests.sh: #364: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/10 (1, 32, 3, 1)' - PASSED gtests.sh: #365: 'Pk11Hpke/ModeParameterizedTest: ContextUnwrapBadKey/11 (1, 32, 3, 3)' - PASSED gtests.sh: #366: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/0 (0, 32, 1, 1)' - PASSED gtests.sh: #367: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/1 (0, 32, 1, 3)' - PASSED gtests.sh: #368: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/2 (0, 32, 2, 1)' - PASSED gtests.sh: #369: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/3 (0, 32, 2, 3)' - PASSED gtests.sh: #370: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/4 (0, 32, 3, 1)' - PASSED gtests.sh: #371: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/5 (0, 32, 3, 3)' - PASSED gtests.sh: #372: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/6 (1, 32, 1, 1)' - PASSED gtests.sh: #373: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/7 (1, 32, 1, 3)' - PASSED gtests.sh: #374: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/8 (1, 32, 2, 1)' - PASSED gtests.sh: #375: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/9 (1, 32, 2, 3)' - PASSED gtests.sh: #376: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/10 (1, 32, 3, 1)' - PASSED gtests.sh: #377: 'Pk11Hpke/ModeParameterizedTest: EphemeralKeys/11 (1, 32, 3, 3)' - PASSED gtests.sh: #378: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/0 (104-byte object <01-00 00-00 FC-60 AF-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 EF-60 20-0A B3-56 40-00 00-00 40-00 00-00 B5-97 BA-D3 C4-E7 13-B0 EF-30 64-4E 2C-61 AF-56 00-00 00-00 00-FB 25-51 58-C7 4F-C8 01-E6 E9-19 E5-81 B4-6F 70-0A B3-56 40-00 00-00 40-00 00-00 18-F9 1D-7C 8C-74 2E-78 6D-6C 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #379: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/1 (104-byte object <02-00 00-00 8C-12 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-12 B3-56 02-00 00-00 37-37 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #380: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/2 (104-byte object <03-00 00-00 8C-16 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-16 B3-56 04-00 00-00 61-35 39-62 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #381: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/3 (104-byte object <04-00 00-00 6C-1A B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-1A B3-56 06-00 00-00 63-37 62-38 62-32 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #382: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/4 (104-byte object <05-00 00-00 8C-1E B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-1E B3-56 08-00 00-00 63-63 30-32 31-64 36-35 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #383: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/5 (104-byte object <06-00 00-00 9C-22 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-22 B3-56 0A-00 00-00 61-34 61-36 65-66 36-65 62-64 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #384: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/6 (104-byte object <07-00 00-00 6C-26 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-26 B3-56 0C-00 00-00 36-36 37-65 30-31 35-64 66-37 66-63 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #385: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/7 (104-byte object <08-00 00-00 4C-2A B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-2A B3-56 0E-00 00-00 34-31 36-33 61-39 66-37 37-65 34-31 66-35 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #386: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/8 (104-byte object <09-00 00-00 2C-2E B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-26 B3-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #387: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/9 (104-byte object <0A-00 00-00 8C-32 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-26 B3-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #388: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/10 (104-byte object <0B-00 00-00 FC-36 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-2D B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #389: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/11 (104-byte object <0C-00 00-00 CC-3A B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E B3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #390: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/12 (104-byte object <0D-00 00-00 CC-3E B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-32 B3-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #391: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/13 (104-byte object <0E-00 00-00 CC-42 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-36 B3-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #392: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/14 (104-byte object <0F-00 00-00 CC-46 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-22 B3-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #393: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/15 (104-byte object <10-00 00-00 0C-4B B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-0B B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-47 B3-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #394: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/16 (104-byte object <11-00 00-00 1C-4F B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-48 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #395: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/17 (104-byte object <12-00 00-00 BC-53 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-4C B3-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #396: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/18 (104-byte object <13-00 00-00 6C-57 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-57 B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #397: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/19 (104-byte object <14-00 00-00 1C-5C B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-32 B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #398: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/20 (104-byte object <15-00 00-00 CC-61 B3-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-62 B3-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #399: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/21 (104-byte object <16-00 00-00 1C-66 B3-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-62 B3-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #400: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/22 (104-byte object <17-00 00-00 6C-6A B3-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-62 B3-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #401: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/23 (104-byte object <18-00 00-00 BC-6E B3-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F3 AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #402: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/24 (104-byte object <19-00 00-00 6C-75 B3-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-82 B0-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #403: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/25 (104-byte object <1A-00 00-00 6C-7B B3-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-83 B0-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #404: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/26 (104-byte object <1B-00 00-00 5C-80 B3-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C0 B0-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #405: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/27 (104-byte object <1C-00 00-00 D0-7B B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-8A B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #406: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/28 (104-byte object <1D-00 00-00 30-7B B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-43 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #407: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/29 (104-byte object <1E-00 00-00 30-8A B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-93 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #408: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/30 (104-byte object <1F-00 00-00 10-8B B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-8B B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #409: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/31 (104-byte object <20-00 00-00 90-8E B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-9B B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #410: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/32 (104-byte object <21-00 00-00 50-93 B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-8F B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #411: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/33 (104-byte object <22-00 00-00 20-97 B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-A4 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #412: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/34 (104-byte object <23-00 00-00 80-9B B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-8F B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #413: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/35 (104-byte object <24-00 00-00 50-9F B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-AC B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #414: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/36 (104-byte object <25-00 00-00 B0-A3 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-97 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #415: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/37 (104-byte object <26-00 00-00 80-A7 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-B4 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #416: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/38 (104-byte object <27-00 00-00 E0-AB B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-9F B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #417: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/39 (104-byte object <28-00 00-00 B0-AF B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-BC B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #418: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/40 (104-byte object <29-00 00-00 10-B4 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A8 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #419: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/41 (104-byte object <2A-00 00-00 E0-B7 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-C4 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #420: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/42 (104-byte object <2B-00 00-00 40-BC B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-B0 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #421: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/43 (104-byte object <2C-00 00-00 10-C0 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-CD B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #422: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/44 (104-byte object <2D-00 00-00 70-C4 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-B8 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #423: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/45 (104-byte object <2E-00 00-00 40-C8 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-D5 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #424: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/46 (104-byte object <2F-00 00-00 A0-CC B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-C0 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #425: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/47 (104-byte object <30-00 00-00 70-D0 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-DD B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #426: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/48 (104-byte object <31-00 00-00 D0-D4 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-C8 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #427: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/49 (104-byte object <32-00 00-00 A0-D8 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-E5 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #428: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/50 (104-byte object <33-00 00-00 00-DD B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-D1 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #429: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/51 (104-byte object <34-00 00-00 D0-E0 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-ED B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #430: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/52 (104-byte object <35-00 00-00 30-E5 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-D9 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #431: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/53 (104-byte object <36-00 00-00 00-E9 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-F5 B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #432: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/54 (104-byte object <37-00 00-00 60-ED B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-E1 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #433: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/55 (104-byte object <38-00 00-00 30-F1 B3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-FE B3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #434: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/56 (104-byte object <39-00 00-00 90-F5 B3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-E9 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #435: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/57 (104-byte object <3A-00 00-00 60-F9 B3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-06 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #436: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/58 (104-byte object <3B-00 00-00 C0-FD B3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-F1 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #437: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/59 (104-byte object <3C-00 00-00 90-01 B4-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-0E B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #438: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/60 (104-byte object <3D-00 00-00 F0-05 B4-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FA B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #439: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/61 (104-byte object <3E-00 00-00 C0-09 B4-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-16 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #440: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/62 (104-byte object <3F-00 00-00 20-0E B4-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-02 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #441: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/63 (104-byte object <40-00 00-00 F0-11 B4-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-1E B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #442: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/64 (104-byte object <41-00 00-00 50-16 B4-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-0A B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #443: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/65 (104-byte object <42-00 00-00 C0-1A B4-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-27 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #444: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/66 (104-byte object <43-00 00-00 20-28 B4-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-22 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #445: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/67 (104-byte object <44-00 00-00 F0-23 B4-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-2F B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #446: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/68 (104-byte object <45-00 00-00 B0-2B B4-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-2B B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #447: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/69 (104-byte object <46-00 00-00 F0-22 B4-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-37 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #448: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/70 (104-byte object <47-00 00-00 00-34 B4-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-2B B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #449: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/71 (104-byte object <48-00 00-00 20-38 B4-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-40 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #450: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/72 (104-byte object <49-00 00-00 80-37 B4-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-12 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #451: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/73 (104-byte object <4A-00 00-00 D0-3F B4-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-48 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #452: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/74 (104-byte object <4B-00 00-00 B0-40 B4-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-2B B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #453: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/75 (104-byte object <4C-00 00-00 00-44 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-50 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #454: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/76 (104-byte object <4D-00 00-00 D0-47 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-3B B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #455: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/77 (104-byte object <4E-00 00-00 A0-4B B4-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-58 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #456: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/78 (104-byte object <4F-00 00-00 00-50 B4-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-3C B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #457: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/79 (104-byte object <50-00 00-00 D0-53 B4-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-60 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #458: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/80 (104-byte object <51-00 00-00 30-58 B4-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-4C B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #459: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/81 (104-byte object <52-00 00-00 CC-68 B4-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-68 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #460: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/82 (104-byte object <53-00 00-00 DC-6B B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-6C B4-56 02-00 00-00 34-30 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-65 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #461: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/83 (104-byte object <54-00 00-00 4C-6F B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-6F B4-56 04-00 00-00 36-36 30-31 00-00 00-00 00-00 00-00 00-00 00-00 60-69 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #462: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/84 (104-byte object <55-00 00-00 BC-72 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-72 B4-56 06-00 00-00 66-31 64-33 30-30 00-00 00-00 00-00 00-00 00-00 90-6C B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #463: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/85 (104-byte object <56-00 00-00 2C-76 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-76 B4-56 08-00 00-00 32-61 65-36 33-63 62-66 00-00 00-00 00-00 00-00 00-70 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #464: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/86 (104-byte object <57-00 00-00 EC-79 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-7A B4-56 0A-00 00-00 61-66 33-61 30-31 35-65 61-31 00-00 00-00 00-00 70-73 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #465: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/87 (104-byte object <58-00 00-00 AC-7D B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-7D B4-56 0C-00 00-00 33-66 35-36 39-33 35-64 65-66 33-66 00-00 00-00 30-77 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #466: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/88 (104-byte object <59-00 00-00 6C-81 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-81 B4-56 0E-00 00-00 35-37 62-62 38-36 62-65 65-64 31-35 36-66 00-00 F0-7A B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #467: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/89 (104-byte object <5A-00 00-00 2C-85 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7E B4-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-7E B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #468: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/90 (104-byte object <5B-00 00-00 6C-89 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-7D B4-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-82 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #469: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/91 (104-byte object <5C-00 00-00 4C-8D B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-84 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-86 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #470: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/92 (104-byte object <5D-00 00-00 2C-91 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-85 B4-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-8A B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #471: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/93 (104-byte object <5E-00 00-00 0C-95 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-89 B4-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-8E B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #472: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/94 (104-byte object <5F-00 00-00 EC-98 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-8D B4-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-92 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #473: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/95 (104-byte object <60-00 00-00 CC-9C B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-99 B4-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-64 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #474: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/96 (104-byte object <61-00 00-00 EC-A0 B4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-9D B4-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-9D B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #475: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/97 (104-byte object <62-00 00-00 DC-A4 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-64 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-9D B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #476: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/98 (104-byte object <63-00 00-00 CC-A8 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-9D B4-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-A1 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #477: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/99 (104-byte object <64-00 00-00 BC-AC B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-57 B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-95 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #478: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/100 (104-byte object <65-00 00-00 5C-B0 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-B0 B4-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-A1 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #479: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/101 (104-byte object <66-00 00-00 7C-B5 B4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-61 B3-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A9 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #480: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/102 (104-byte object <67-00 00-00 5C-B9 B4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-62 B3-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-B2 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #481: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/103 (104-byte object <68-00 00-00 3C-BD B4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-61 B3-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B6 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #482: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/104 (104-byte object <69-00 00-00 1C-C1 B4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-EE AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-BA B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #483: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/105 (104-byte object <6A-00 00-00 7C-C5 B4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-83 B0-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-BE B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #484: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/106 (104-byte object <6B-00 00-00 4C-CA B4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-82 B0-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-C2 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #485: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/107 (104-byte object <6C-00 00-00 1C-CF B4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-80 B3-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C7 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #486: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/108 (104-byte object <6D-00 00-00 B0-CA B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-D9 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-CC B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #487: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/109 (104-byte object <6E-00 00-00 10-CA B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-DA B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-9D B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #488: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/110 (104-byte object <6F-00 00-00 D0-D8 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-E2 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-D6 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #489: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/111 (104-byte object <70-00 00-00 B0-D9 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-DE B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-DD B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #490: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/112 (104-byte object <71-00 00-00 10-DD B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-EA B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-9D B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #491: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/113 (104-byte object <72-00 00-00 B0-E1 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-E6 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-DE B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #492: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/114 (104-byte object <73-00 00-00 30-E5 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-F1 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-DD B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #493: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/115 (104-byte object <74-00 00-00 A0-E9 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-EE B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-E6 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #494: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/116 (104-byte object <75-00 00-00 20-ED B4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-F9 B4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-DE B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #495: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/117 (104-byte object <76-00 00-00 90-F1 B4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F6 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-ED B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #496: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/118 (104-byte object <77-00 00-00 10-F5 B4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-01 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-E6 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #497: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/119 (104-byte object <78-00 00-00 80-F9 B4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FE B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F5 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #498: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/120 (104-byte object <79-00 00-00 00-FD B4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-09 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-ED B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #499: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/121 (104-byte object <7A-00 00-00 70-01 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-05 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-FD B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #500: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/122 (104-byte object <7B-00 00-00 F0-04 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-11 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F5 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #501: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/123 (104-byte object <7C-00 00-00 60-09 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-0D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-05 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #502: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/124 (104-byte object <7D-00 00-00 E0-0C B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-19 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-FD B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #503: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/125 (104-byte object <7E-00 00-00 50-11 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-15 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-0D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #504: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/126 (104-byte object <7F-00 00-00 D0-14 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-21 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-05 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #505: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/127 (104-byte object <80-00 00-00 40-19 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-1D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-15 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #506: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/128 (104-byte object <81-00 00-00 C0-1C B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-29 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-0D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #507: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/129 (104-byte object <82-00 00-00 30-21 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-25 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-1D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #508: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/130 (104-byte object <83-00 00-00 B0-24 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-39 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-15 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #509: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/131 (104-byte object <84-00 00-00 20-29 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-35 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-25 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #510: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/132 (104-byte object <85-00 00-00 A0-2C B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-41 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-1D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #511: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/133 (104-byte object <86-00 00-00 30-39 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-3D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-35 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #512: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/134 (104-byte object <87-00 00-00 B0-3C B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-49 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-25 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #513: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/135 (104-byte object <88-00 00-00 20-41 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-45 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-3D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #514: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/136 (104-byte object <89-00 00-00 A0-44 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-51 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-35 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #515: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/137 (104-byte object <8A-00 00-00 10-49 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-4D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-45 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #516: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/138 (104-byte object <8B-00 00-00 90-4C B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-59 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-3D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #517: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/139 (104-byte object <8C-00 00-00 00-51 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-55 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-4D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #518: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/140 (104-byte object <8D-00 00-00 80-54 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-61 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-45 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #519: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/141 (104-byte object <8E-00 00-00 F0-58 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-5D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-55 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #520: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/142 (104-byte object <8F-00 00-00 70-5C B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-69 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-4D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #521: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/143 (104-byte object <90-00 00-00 E0-60 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-65 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-5D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #522: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/144 (104-byte object <91-00 00-00 60-64 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-71 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-55 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #523: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/145 (104-byte object <92-00 00-00 D0-68 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-6D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-65 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #524: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/146 (104-byte object <93-00 00-00 20-6D B5-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-79 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-74 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #525: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/147 (104-byte object <94-00 00-00 40-75 B5-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-79 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-75 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #526: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/148 (104-byte object <95-00 00-00 00-7D B5-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-81 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-7D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #527: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/149 (104-byte object <96-00 00-00 10-75 B5-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-7D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-7D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #528: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/150 (104-byte object <97-00 00-00 40-5D B5-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-89 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-85 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #529: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/151 (104-byte object <98-00 00-00 90-7D B5-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-85 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-85 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #530: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/152 (104-byte object <99-00 00-00 D0-89 B5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-91 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-85 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #531: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/153 (104-byte object <9A-00 00-00 30-89 B5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-8D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-74 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #532: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/154 (104-byte object <9B-00 00-00 40-91 B5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-99 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-85 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #533: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/155 (104-byte object <9C-00 00-00 20-92 B5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-7D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #534: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/156 (104-byte object <9D-00 00-00 20-95 B5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-A1 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-74 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #535: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/157 (104-byte object <9E-00 00-00 D0-98 B5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-9D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-7D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #536: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/158 (104-byte object <9F-00 00-00 50-9C B5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-A9 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #537: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/159 (104-byte object <A0-00 00-00 C0-A0 B5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-A5 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-9D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #538: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/160 (104-byte object <A1-00 00-00 40-A4 B5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-B1 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-7D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #539: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/161 (104-byte object <A2-00 00-00 B0-A8 B5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-AD B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-A5 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 593)' - PASSED gtests.sh: #540: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/162 (104-byte object <A3-00 00-00 CC-B8 B5-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 20-9D B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-B8 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #541: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/163 (104-byte object <A4-00 00-00 CC-BB B5-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 20-B5 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-AD B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #542: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/164 (104-byte object <A5-00 00-00 1C-C0 B5-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 10-A5 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-B0 B4-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-C0 B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #543: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/165 (104-byte object <A6-00 00-00 0C-C5 B5-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 B0-BC B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-C5 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-B4 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #544: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/166 (104-byte object <A7-00 00-00 BC-C8 B5-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 E0-B0 B4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-C5 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-C5 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #545: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/167 (104-byte object <A8-00 00-00 4C-CD B5-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 40-C9 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-C9 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #546: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/168 (104-byte object <A9-00 00-00 5C-D0 B5-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 D0-B2 B1-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-D0 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #547: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/169 (104-byte object <AA-00 00-00 1C-D5 B5-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 E0-D0 B5-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-B4 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-0C B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #548: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/170 (104-byte object <AB-00 00-00 BC-D8 B5-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 D0-B2 B1-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-0A B3-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-D9 B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #549: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/171 (104-byte object <AC-00 00-00 3C-DE B5-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 E0-D0 B5-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-DE B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-C5 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #550: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/172 (104-byte object <AD-00 00-00 EC-E1 B5-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 D0-B2 B1-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DF B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-C9 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #551: 'HmacSha256/Pkcs11HmacTest: WycheproofVectors/173 (104-byte object <AE-00 00-00 AC-E6 B5-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 E0-D0 B5-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-C0 B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-C9 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 593)' - PASSED gtests.sh: #552: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/0 (104-byte object <01-00 00-00 AC-E6 B5-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-E6 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #553: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/1 (104-byte object <02-00 00-00 9C-F8 B5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-F8 B5-56 02-00 00-00 32-62 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #554: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/2 (104-byte object <03-00 00-00 0C-FC B5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-FC B5-56 04-00 00-00 35-61 62-64 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #555: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/3 (104-byte object <04-00 00-00 7C-FF B5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-FF B5-56 06-00 00-00 63-34 30-35 61-65 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #556: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/4 (104-byte object <05-00 00-00 EC-02 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-03 B6-56 08-00 00-00 36-36 30-31 63-36 38-33 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #557: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/5 (104-byte object <06-00 00-00 5C-06 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-06 B6-56 0A-00 00-00 31-35 62-32 39-33 37-37 65-30 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #558: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/6 (104-byte object <07-00 00-00 CC-09 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-09 B6-56 0C-00 00-00 35-61 33-34 31-35 35-62 31-31 31-35 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #559: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/7 (104-byte object <08-00 00-00 3C-0D B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-0D B6-56 0E-00 00-00 38-61 31-34 30-64 37-38 31-65 37-31 39-31 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #560: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/8 (104-byte object <09-00 00-00 AC-10 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-D5 B2-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #561: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/9 (104-byte object <0A-00 00-00 1C-14 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-08 B3-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #562: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/10 (104-byte object <0B-00 00-00 8C-17 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-4D B5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #563: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/11 (104-byte object <0C-00 00-00 FC-1A B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-55 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #564: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/12 (104-byte object <0D-00 00-00 6C-1E B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-6D B5-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #565: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/13 (104-byte object <0E-00 00-00 DC-21 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-8D B5-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #566: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/14 (104-byte object <0F-00 00-00 4C-25 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-82 B4-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #567: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/15 (104-byte object <10-00 00-00 0C-29 B6-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-34 B4-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #568: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/16 (104-byte object <11-00 00-00 5C-2D B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-26 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #569: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/17 (104-byte object <12-00 00-00 3C-32 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-2A B6-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #570: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/18 (104-byte object <13-00 00-00 CC-36 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #571: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/19 (104-byte object <14-00 00-00 BC-3B B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DA B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #572: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/20 (104-byte object <15-00 00-00 9C-40 B6-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 30-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F3 B5-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-F3 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #573: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/21 (104-byte object <16-00 00-00 8C-F0 B5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 90-41 B6-56 60-00 00-00 60-00 00-00 5E-00 00-00 5E-00 00-00 30-64 37-38 00-42 B6-56 60-00 00-00 60-00 00-00 60-00 00-00 60-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 E1-00 00-00 D8-37 BC-F7 00-37 BC-F7>, 609)' - PASSED gtests.sh: #574: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/22 (104-byte object <17-00 00-00 CC-F1 B5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-32 34-38 10-F1 B5-56 60-00 00-00 60-00 00-00 36-63 39-30 30-61 62-35 32-65 35-31 A0-46 B6-56 62-00 00-00 62-00 00-00 62-36 33-34 61-34 32-65 35-66 63-37 10-47 B6-56 60-00 00-00 60-00 00-00 38-33 35-39 37-65 65-32 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #575: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/23 (104-byte object <18-00 00-00 DC-4F B6-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F3 AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #576: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/24 (104-byte object <19-00 00-00 9C-53 B6-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-83 B0-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #577: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/25 (104-byte object <1A-00 00-00 6C-59 B6-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-75 B3-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #578: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/26 (104-byte object <1B-00 00-00 9C-5E B6-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C0 B0-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #579: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/27 (104-byte object <1C-00 00-00 D0-59 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-64 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #580: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/28 (104-byte object <1D-00 00-00 30-59 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-23 B3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #581: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/29 (104-byte object <1E-00 00-00 90-64 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-6E B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #582: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/30 (104-byte object <1F-00 00-00 70-65 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-66 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #583: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/31 (104-byte object <20-00 00-00 30-69 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-77 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #584: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/32 (104-byte object <21-00 00-00 30-6E B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-6A B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #585: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/33 (104-byte object <22-00 00-00 40-72 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-7F B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #586: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/34 (104-byte object <23-00 00-00 E0-76 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-6A B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #587: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/35 (104-byte object <24-00 00-00 F0-7A B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-88 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #588: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/36 (104-byte object <25-00 00-00 90-7F B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-72 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #589: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/37 (104-byte object <26-00 00-00 A0-83 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-91 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #590: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/38 (104-byte object <27-00 00-00 40-88 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-7B B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #591: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/39 (104-byte object <28-00 00-00 50-8C B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-9A B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #592: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/40 (104-byte object <29-00 00-00 F0-90 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-84 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #593: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/41 (104-byte object <2A-00 00-00 00-95 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-A2 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #594: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/42 (104-byte object <2B-00 00-00 A0-99 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-8C B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #595: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/43 (104-byte object <2C-00 00-00 B0-9D B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-AB B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #596: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/44 (104-byte object <2D-00 00-00 50-A2 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-95 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #597: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/45 (104-byte object <2E-00 00-00 60-A6 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-B4 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #598: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/46 (104-byte object <2F-00 00-00 00-AB B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-9E B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #599: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/47 (104-byte object <30-00 00-00 10-AF B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-BC B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #600: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/48 (104-byte object <31-00 00-00 B0-B3 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-A7 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #601: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/49 (104-byte object <32-00 00-00 C0-B7 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-C5 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #602: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/50 (104-byte object <33-00 00-00 60-BC B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-AF B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #603: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/51 (104-byte object <34-00 00-00 70-C0 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-CE B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #604: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/52 (104-byte object <35-00 00-00 10-C5 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-B8 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #605: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/53 (104-byte object <36-00 00-00 20-C9 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-D6 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #606: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/54 (104-byte object <37-00 00-00 C0-CD B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-C1 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #607: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/55 (104-byte object <38-00 00-00 D0-D1 B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-DF B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #608: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/56 (104-byte object <39-00 00-00 70-D6 B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-C9 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #609: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/57 (104-byte object <3A-00 00-00 80-DA B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-E8 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #610: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/58 (104-byte object <3B-00 00-00 20-DF B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-D2 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #611: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/59 (104-byte object <3C-00 00-00 30-E3 B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-F0 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #612: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/60 (104-byte object <3D-00 00-00 D0-E7 B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-DB B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #613: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/61 (104-byte object <3E-00 00-00 E0-EB B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-F9 B6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #614: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/62 (104-byte object <3F-00 00-00 80-F0 B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-E3 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #615: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/63 (104-byte object <40-00 00-00 90-F4 B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-02 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #616: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/64 (104-byte object <41-00 00-00 30-F9 B6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-EC B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #617: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/65 (104-byte object <42-00 00-00 E0-FD B6-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-0A B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #618: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/66 (104-byte object <43-00 00-00 40-0C B7-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-06 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #619: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/67 (104-byte object <44-00 00-00 D0-07 B7-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-13 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #620: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/68 (104-byte object <45-00 00-00 D0-0F B7-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-0F B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #621: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/69 (104-byte object <46-00 00-00 90-06 B7-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-1C B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #622: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/70 (104-byte object <47-00 00-00 A0-18 B7-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0F B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #623: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/71 (104-byte object <48-00 00-00 00-1D B7-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-25 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #624: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/72 (104-byte object <49-00 00-00 60-1C B7-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F5 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #625: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/73 (104-byte object <4A-00 00-00 30-25 B7-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-2E B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #626: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/74 (104-byte object <4B-00 00-00 10-26 B7-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-0F B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #627: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/75 (104-byte object <4C-00 00-00 A0-29 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-36 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #628: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/76 (104-byte object <4D-00 00-00 B0-2D B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-21 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #629: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/77 (104-byte object <4E-00 00-00 C0-31 B7-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-3F B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #630: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/78 (104-byte object <4F-00 00-00 60-36 B7-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-21 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #631: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/79 (104-byte object <50-00 00-00 70-3A B7-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-48 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F2 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #632: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/80 (104-byte object <51-00 00-00 10-3F B7-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-32 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #633: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/81 (104-byte object <52-00 00-00 AC-50 B7-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-50 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #634: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/82 (104-byte object <53-00 00-00 9C-53 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-53 B7-56 02-00 00-00 39-66 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #635: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/83 (104-byte object <54-00 00-00 EC-56 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-57 B7-56 04-00 00-00 34-30 34-37 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #636: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/84 (104-byte object <55-00 00-00 3C-5A B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-5A B7-56 06-00 00-00 38-38 63-66 61-62 00-00 00-00 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #637: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/85 (104-byte object <56-00 00-00 BC-5D B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-5D B7-56 08-00 00-00 64-39 33-39 37-37 35-33 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #638: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/86 (104-byte object <57-00 00-00 AC-61 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-61 B7-56 0A-00 00-00 39-62 36-63 63-37 63-61 61-34 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #639: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/87 (104-byte object <58-00 00-00 9C-65 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-65 B7-56 0C-00 00-00 63-38 35-61 64-37 38-37 32-62 37-36 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #640: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/88 (104-byte object <59-00 00-00 8C-69 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-69 B7-56 0E-00 00-00 38-30 62-61 32-35 66-31 63-32 37-36 35-30 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #641: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/89 (104-byte object <5A-00 00-00 7C-6D B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-66 B7-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #642: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/90 (104-byte object <5B-00 00-00 EC-71 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-65 B7-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #643: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/91 (104-byte object <5C-00 00-00 FC-75 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-6D B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #644: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/92 (104-byte object <5D-00 00-00 0C-7A B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-6E B7-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #645: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/93 (104-byte object <5E-00 00-00 1C-7E B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-71 B7-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #646: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/94 (104-byte object <5F-00 00-00 2C-82 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-75 B7-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #647: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/95 (104-byte object <60-00 00-00 3C-86 B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-3B B7-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #648: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/96 (104-byte object <61-00 00-00 8C-8A B7-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-86 B7-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #649: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/97 (104-byte object <62-00 00-00 AC-8E B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-88 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #650: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/98 (104-byte object <63-00 00-00 CC-92 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-8B B7-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #651: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/99 (104-byte object <64-00 00-00 EC-96 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-97 B7-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #652: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/100 (104-byte object <65-00 00-00 EC-9B B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-5D B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #653: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/101 (104-byte object <66-00 00-00 BC-9F B7-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A0 B7-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #654: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/102 (104-byte object <67-00 00-00 6C-A5 B7-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-46 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-A0 B7-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #655: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/103 (104-byte object <68-00 00-00 8C-A9 B7-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A0 B7-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #656: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/104 (104-byte object <69-00 00-00 AC-AD B7-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-EE AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #657: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/105 (104-byte object <6A-00 00-00 1C-B2 B7-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-75 B3-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #658: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/106 (104-byte object <6B-00 00-00 AC-B6 B7-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-83 B0-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #659: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/107 (104-byte object <6C-00 00-00 3C-BB B7-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-CF B4-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #660: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/108 (104-byte object <6D-00 00-00 10-B7 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-C5 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #661: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/109 (104-byte object <6E-00 00-00 70-B6 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-83 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #662: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/110 (104-byte object <6F-00 00-00 B0-C4 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-CE B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #663: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/111 (104-byte object <70-00 00-00 90-C5 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-C6 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #664: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/112 (104-byte object <71-00 00-00 20-C9 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-D6 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #665: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/113 (104-byte object <72-00 00-00 F0-CD B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-C9 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #666: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/114 (104-byte object <73-00 00-00 D0-D1 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-DE B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #667: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/115 (104-byte object <74-00 00-00 40-D6 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-CA B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #668: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/116 (104-byte object <75-00 00-00 20-DA B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-E7 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #669: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/117 (104-byte object <76-00 00-00 90-DE B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-D2 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #670: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/118 (104-byte object <77-00 00-00 70-E2 B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-EF B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #671: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/119 (104-byte object <78-00 00-00 E0-E6 B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-DA B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #672: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/120 (104-byte object <79-00 00-00 C0-EA B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-F7 B7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #673: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/121 (104-byte object <7A-00 00-00 30-EF B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-E3 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #674: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/122 (104-byte object <7B-00 00-00 10-F3 B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-00 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #675: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/123 (104-byte object <7C-00 00-00 80-F7 B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-EB B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #676: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/124 (104-byte object <7D-00 00-00 60-FB B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-08 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #677: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/125 (104-byte object <7E-00 00-00 D0-FF B7-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-F3 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #678: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/126 (104-byte object <7F-00 00-00 B0-03 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-10 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #679: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/127 (104-byte object <80-00 00-00 20-08 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FC B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #680: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/128 (104-byte object <81-00 00-00 00-0C B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-19 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #681: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/129 (104-byte object <82-00 00-00 70-10 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-04 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #682: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/130 (104-byte object <83-00 00-00 50-14 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-29 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #683: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/131 (104-byte object <84-00 00-00 C0-18 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0C B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #684: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/132 (104-byte object <85-00 00-00 A0-1C B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-31 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #685: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/133 (104-byte object <86-00 00-00 30-29 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-14 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #686: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/134 (104-byte object <87-00 00-00 10-2D B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-3A B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #687: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/135 (104-byte object <88-00 00-00 80-31 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-25 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #688: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/136 (104-byte object <89-00 00-00 60-35 B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-42 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #689: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/137 (104-byte object <8A-00 00-00 D0-39 B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #690: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/138 (104-byte object <8B-00 00-00 B0-3D B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-4A B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #691: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/139 (104-byte object <8C-00 00-00 20-42 B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-36 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #692: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/140 (104-byte object <8D-00 00-00 00-46 B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-53 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #693: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/141 (104-byte object <8E-00 00-00 70-4A B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-3E B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #694: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/142 (104-byte object <8F-00 00-00 50-4E B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-5B B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #695: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/143 (104-byte object <90-00 00-00 C0-52 B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-46 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #696: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/144 (104-byte object <91-00 00-00 A0-56 B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-63 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #697: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/145 (104-byte object <92-00 00-00 10-5B B8-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-4E B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #698: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/146 (104-byte object <93-00 00-00 90-5F B8-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-6C B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #699: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/147 (104-byte object <94-00 00-00 30-6D B8-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-67 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #700: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/148 (104-byte object <95-00 00-00 F0-68 B8-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-74 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #701: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/149 (104-byte object <96-00 00-00 C0-70 B8-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-70 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #702: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/150 (104-byte object <97-00 00-00 E0-67 B8-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-7D B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #703: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/151 (104-byte object <98-00 00-00 30-79 B8-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #704: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/152 (104-byte object <99-00 00-00 60-7D B8-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-85 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #705: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/153 (104-byte object <9A-00 00-00 C0-7C B8-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-57 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #706: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/154 (104-byte object <9B-00 00-00 30-85 B8-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-8D B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #707: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/155 (104-byte object <9C-00 00-00 10-86 B8-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-70 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #708: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/156 (104-byte object <9D-00 00-00 70-89 B8-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-96 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #709: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/157 (104-byte object <9E-00 00-00 50-8D B8-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-81 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #710: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/158 (104-byte object <9F-00 00-00 30-91 B8-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-9E B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #711: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/159 (104-byte object <A0-00 00-00 A0-95 B8-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-81 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #712: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/160 (104-byte object <A1-00 00-00 80-99 B8-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-A6 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #713: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/161 (104-byte object <A2-00 00-00 F0-9D B8-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-91 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 609)' - PASSED gtests.sh: #714: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/162 (104-byte object <A3-00 00-00 CC-AE B8-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-AE B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #715: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/163 (104-byte object <A4-00 00-00 2C-B2 B8-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-9A B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #716: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/164 (104-byte object <A5-00 00-00 7C-B6 B8-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DA B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F1 B5-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #717: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/165 (104-byte object <A6-00 00-00 8C-BA B8-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 50-97 B7-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-BA B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-BA B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #718: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/166 (104-byte object <A7-00 00-00 1C-BF B8-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 70-36 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-A2 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-BB B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #719: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/167 (104-byte object <A8-00 00-00 6C-C3 B8-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 50-97 B7-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-5D B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-BA B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #720: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/168 (104-byte object <A9-00 00-00 4C-C7 B8-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 70-D1 B5-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-C7 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #721: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/169 (104-byte object <AA-00 00-00 7C-CC B8-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 D0-C7 B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-B3 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #722: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/170 (104-byte object <AB-00 00-00 4C-D1 B8-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 70-D1 B5-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DA B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-42 B6-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #723: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/171 (104-byte object <AC-00 00-00 AC-D5 B8-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 D0-C7 B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-D5 B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #724: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/172 (104-byte object <AD-00 00-00 4C-D9 B8-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 70-D1 B5-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-C0 B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #725: 'HmacSha384/Pkcs11HmacTest: WycheproofVectors/173 (104-byte object <AE-00 00-00 AC-DD B8-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 D0-C7 B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-5D B5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 609)' - PASSED gtests.sh: #726: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/0 (104-byte object <01-00 00-00 AC-DD B8-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-DD B8-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #727: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/1 (104-byte object <02-00 00-00 2C-01 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-01 B9-56 02-00 00-00 30-31 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #728: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/2 (104-byte object <03-00 00-00 DC-04 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-05 B9-56 04-00 00-00 61-37 38-66 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #729: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/3 (104-byte object <04-00 00-00 8C-08 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-08 B9-56 06-00 00-00 65-39 35-36 63-31 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #730: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/4 (104-byte object <05-00 00-00 3C-0C B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-0C B9-56 08-00 00-00 62-32 61-61 34-38 62-33 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #731: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/5 (104-byte object <06-00 00-00 EC-0F B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-10 B9-56 0A-00 00-00 62-63 39-39 33-62 31-64 62-30 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #732: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/6 (104-byte object <07-00 00-00 9C-13 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-13 B9-56 0C-00 00-00 66-30 33-36 31-64 35-38 32-39 31-65 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #733: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/7 (104-byte object <08-00 00-00 4C-17 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-17 B9-56 0E-00 00-00 65-31 38-64 61-33 65-62 66-30 66-66 61-34 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #734: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/8 (104-byte object <09-00 00-00 FC-1A B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-B2 B8-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #735: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/9 (104-byte object <0A-00 00-00 4C-1F B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-AA B8-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #736: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/10 (104-byte object <0B-00 00-00 FC-22 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-0B B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #737: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/11 (104-byte object <0C-00 00-00 AC-26 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F1 B5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #738: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/12 (104-byte object <0D-00 00-00 5C-2A B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-62 B6-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #739: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/13 (104-byte object <0E-00 00-00 0C-2E B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-74 B6-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #740: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/14 (104-byte object <0F-00 00-00 BC-31 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-C1 B6-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #741: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/15 (104-byte object <10-00 00-00 6C-35 B9-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-B8 B6-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #742: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/16 (104-byte object <11-00 00-00 1C-39 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-C2 B6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #743: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/17 (104-byte object <12-00 00-00 CC-3C B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-21 B7-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #744: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/18 (104-byte object <13-00 00-00 9C-41 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-37 B6-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #745: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/19 (104-byte object <14-00 00-00 4C-45 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #746: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/20 (104-byte object <15-00 00-00 5C-4A B9-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-4A B9-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #747: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/21 (104-byte object <16-00 00-00 CC-4F B9-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-4B B9-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #748: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/22 (104-byte object <17-00 00-00 EC-53 B9-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-4A B9-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #749: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/23 (104-byte object <18-00 00-00 0C-58 B9-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F3 AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #750: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/24 (104-byte object <19-00 00-00 AC-5C B9-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-75 B3-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #751: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/25 (104-byte object <1A-00 00-00 7C-62 B9-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-54 B6-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #752: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/26 (104-byte object <1B-00 00-00 3C-67 B9-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C0 B0-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #753: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/27 (104-byte object <1C-00 00-00 20-E6 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-6D B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #754: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/28 (104-byte object <1D-00 00-00 00-E6 B4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-33 B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #755: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/29 (104-byte object <1E-00 00-00 D0-57 B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-76 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #756: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/30 (104-byte object <1F-00 00-00 70-97 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-6E B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #757: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/31 (104-byte object <20-00 00-00 40-71 B9-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-80 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #758: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/32 (104-byte object <21-00 00-00 80-76 B9-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-72 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #759: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/33 (104-byte object <22-00 00-00 D0-7A B9-56 14-00 00-00 14-00 00-00 31-30 31-31 31-32 31-33 31-34 31-35 00-FB B8-56 80-00 00-00 80-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 7C-F8 B8-56 00-00 00-00 00-36 32-37 32-38 32-39 32-61 32-62 32-63 32-64 20-FC B8-56 80-00 00-00 80-00 00-00 33-34 33-35 33-36 33-37 33-38 33-39 01-61 33-62>, 625)' - PASSED gtests.sh: #760: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/34 (104-byte object <23-00 00-00 B0-7F B9-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-72 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #761: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/35 (104-byte object <24-00 00-00 00-84 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-91 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #762: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/36 (104-byte object <25-00 00-00 E0-88 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-7B B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #763: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/37 (104-byte object <26-00 00-00 20-8C B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-9A B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #764: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/38 (104-byte object <27-00 00-00 00-91 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-84 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #765: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/39 (104-byte object <28-00 00-00 50-95 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-A3 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #766: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/40 (104-byte object <29-00 00-00 30-9A B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-8C B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #767: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/41 (104-byte object <2A-00 00-00 80-9E B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-AC B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #768: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/42 (104-byte object <2B-00 00-00 60-A3 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-95 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #769: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/43 (104-byte object <2C-00 00-00 B0-A7 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-B6 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #770: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/44 (104-byte object <2D-00 00-00 90-AC B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-9F B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #771: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/45 (104-byte object <2E-00 00-00 E0-B0 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-BF B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #772: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/46 (104-byte object <2F-00 00-00 C0-B5 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A8 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #773: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/47 (104-byte object <30-00 00-00 10-BA B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-C8 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #774: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/48 (104-byte object <31-00 00-00 F0-BE B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-B1 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #775: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/49 (104-byte object <32-00 00-00 40-C3 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-D1 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #776: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/50 (104-byte object <33-00 00-00 20-C8 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-BA B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #777: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/51 (104-byte object <34-00 00-00 70-CC B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-DA B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #778: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/52 (104-byte object <35-00 00-00 50-D1 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-C3 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #779: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/53 (104-byte object <36-00 00-00 A0-D5 B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-E4 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #780: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/54 (104-byte object <37-00 00-00 80-DA B9-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-CD B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #781: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/55 (104-byte object <38-00 00-00 D0-DE B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-ED B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #782: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/56 (104-byte object <39-00 00-00 B0-E3 B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-D6 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #783: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/57 (104-byte object <3A-00 00-00 00-E8 B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-F6 B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #784: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/58 (104-byte object <3B-00 00-00 E0-EC B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-DF B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #785: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/59 (104-byte object <3C-00 00-00 30-F1 B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-FF B9-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #786: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/60 (104-byte object <3D-00 00-00 10-F6 B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-E8 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #787: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/61 (104-byte object <3E-00 00-00 60-FA B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-08 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #788: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/62 (104-byte object <3F-00 00-00 40-FF B9-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-F1 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #789: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/63 (104-byte object <40-00 00-00 90-03 BA-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-12 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #790: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/64 (104-byte object <41-00 00-00 70-08 BA-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #791: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/65 (104-byte object <42-00 00-00 60-0D BA-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-1B BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #792: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/66 (104-byte object <43-00 00-00 C0-1C BA-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-16 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #793: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/67 (104-byte object <44-00 00-00 10-18 BA-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-24 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #794: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/68 (104-byte object <45-00 00-00 50-20 BA-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-1F BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #795: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/69 (104-byte object <46-00 00-00 90-16 BA-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-2E BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #796: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/70 (104-byte object <47-00 00-00 A0-29 BA-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-20 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #797: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/71 (104-byte object <48-00 00-00 40-2E BA-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-37 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #798: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/72 (104-byte object <49-00 00-00 A0-2D BA-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-04 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #799: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/73 (104-byte object <4A-00 00-00 F0-36 BA-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-40 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #800: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/74 (104-byte object <4B-00 00-00 D0-37 BA-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-1F BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #801: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/75 (104-byte object <4C-00 00-00 A0-3B BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-49 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #802: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/76 (104-byte object <4D-00 00-00 F0-3F BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-32 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #803: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/77 (104-byte object <4E-00 00-00 40-44 BA-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-52 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #804: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/78 (104-byte object <4F-00 00-00 20-49 BA-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-32 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #805: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/79 (104-byte object <50-00 00-00 70-4D BA-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-FB B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-5B BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-FC B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #806: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/80 (104-byte object <51-00 00-00 50-52 BA-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-44 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #807: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/81 (104-byte object <52-00 00-00 EC-64 BA-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-65 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #808: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/82 (104-byte object <53-00 00-00 EC-67 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-68 BA-56 02-00 00-00 64-38 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #809: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/83 (104-byte object <54-00 00-00 4C-6B BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-6B BA-56 04-00 00-00 63-61 64-32 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #810: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/84 (104-byte object <55-00 00-00 AC-6E BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-6E BA-56 06-00 00-00 64-33 33-39 33-63 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #811: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/85 (104-byte object <56-00 00-00 3C-72 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-72 BA-56 08-00 00-00 62-65 62-62 30-33 39-32 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #812: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/86 (104-byte object <57-00 00-00 5C-76 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-76 BA-56 0A-00 00-00 34-30 61-33 33-33 66-34 63-66 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #813: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/87 (104-byte object <58-00 00-00 7C-7A BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-7A BA-56 0C-00 00-00 34-63 66-39 32-36 61-66 34-37 35-61 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #814: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/88 (104-byte object <59-00 00-00 9C-7E BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-7E BA-56 0E-00 00-00 32-62 61-33 62-63 33-63 64-36 34-62 63-36 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #815: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/89 (104-byte object <5A-00 00-00 BC-82 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-7A BA-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #816: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/90 (104-byte object <5B-00 00-00 5C-87 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-7A BA-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #817: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/91 (104-byte object <5C-00 00-00 9C-8B BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-82 BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #818: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/92 (104-byte object <5D-00 00-00 DC-8F BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-83 BA-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #819: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/93 (104-byte object <5E-00 00-00 1C-94 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-87 BA-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #820: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/94 (104-byte object <5F-00 00-00 5C-98 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-8B BA-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #821: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/95 (104-byte object <60-00 00-00 9C-9C BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-4E BA-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #822: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/96 (104-byte object <61-00 00-00 1C-A1 BA-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-9D BA-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #823: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/97 (104-byte object <62-00 00-00 6C-A5 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-9E BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #824: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/98 (104-byte object <63-00 00-00 BC-A9 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-A2 BA-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #825: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/99 (104-byte object <64-00 00-00 0C-AE BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-D5 B2-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-1E B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #826: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/100 (104-byte object <65-00 00-00 3C-B2 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B2 BA-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #827: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/101 (104-byte object <66-00 00-00 BC-B7 BA-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-49 B9-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #828: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/102 (104-byte object <67-00 00-00 CC-BB BA-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-4B B9-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #829: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/103 (104-byte object <68-00 00-00 0C-C0 BA-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-49 B9-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #830: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/104 (104-byte object <69-00 00-00 4C-C4 BA-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-EE AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #831: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/105 (104-byte object <6A-00 00-00 0C-C9 BA-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-54 B6-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #832: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/106 (104-byte object <6B-00 00-00 3C-CE BA-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-75 B3-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #833: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/107 (104-byte object <6C-00 00-00 6C-D3 BA-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-BB B7-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #834: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/108 (104-byte object <6D-00 00-00 A0-CE BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-DD BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #835: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/109 (104-byte object <6E-00 00-00 00-CE BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-99 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #836: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/110 (104-byte object <6F-00 00-00 80-DD BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-E7 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #837: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/111 (104-byte object <70-00 00-00 60-DE BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-DF BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #838: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/112 (104-byte object <71-00 00-00 20-E2 BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-F0 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #839: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/113 (104-byte object <72-00 00-00 20-E7 BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-E2 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #840: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/114 (104-byte object <73-00 00-00 30-EB BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-F8 BA-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #841: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/115 (104-byte object <74-00 00-00 D0-EF BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-E3 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #842: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/116 (104-byte object <75-00 00-00 E0-F3 BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-01 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #843: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/117 (104-byte object <76-00 00-00 80-F8 BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-EB BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #844: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/118 (104-byte object <77-00 00-00 90-FC BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-0A BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #845: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/119 (104-byte object <78-00 00-00 30-01 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #846: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/120 (104-byte object <79-00 00-00 40-05 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-12 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #847: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/121 (104-byte object <7A-00 00-00 E0-09 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-FD BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #848: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/122 (104-byte object <7B-00 00-00 F0-0D BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-1B BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #849: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/123 (104-byte object <7C-00 00-00 90-12 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-05 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #850: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/124 (104-byte object <7D-00 00-00 A0-16 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-24 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #851: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/125 (104-byte object <7E-00 00-00 40-1B BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-0E BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #852: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/126 (104-byte object <7F-00 00-00 50-1F BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-2D BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #853: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/127 (104-byte object <80-00 00-00 F0-23 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-17 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #854: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/128 (104-byte object <81-00 00-00 00-28 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-35 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #855: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/129 (104-byte object <82-00 00-00 A0-2C BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-1F BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #856: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/130 (104-byte object <83-00 00-00 B0-30 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-46 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #857: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/131 (104-byte object <84-00 00-00 50-35 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-28 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #858: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/132 (104-byte object <85-00 00-00 60-39 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-4F BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #859: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/133 (104-byte object <86-00 00-00 20-46 BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-31 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #860: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/134 (104-byte object <87-00 00-00 30-4A BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-57 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #861: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/135 (104-byte object <88-00 00-00 D0-4E BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-42 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #862: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/136 (104-byte object <89-00 00-00 E0-52 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-60 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #863: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/137 (104-byte object <8A-00 00-00 80-57 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-4A BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #864: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/138 (104-byte object <8B-00 00-00 90-5B BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-69 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #865: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/139 (104-byte object <8C-00 00-00 30-60 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-53 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #866: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/140 (104-byte object <8D-00 00-00 40-64 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-71 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #867: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/141 (104-byte object <8E-00 00-00 E0-68 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-5C BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #868: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/142 (104-byte object <8F-00 00-00 F0-6C BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-7A BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #869: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/143 (104-byte object <90-00 00-00 90-71 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-64 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #870: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/144 (104-byte object <91-00 00-00 A0-75 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-83 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #871: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/145 (104-byte object <92-00 00-00 40-7A BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-6D BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #872: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/146 (104-byte object <93-00 00-00 F0-7E BB-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-8C BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #873: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/147 (104-byte object <94-00 00-00 50-8D BB-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-87 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #874: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/148 (104-byte object <95-00 00-00 E0-88 BB-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-95 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #875: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/149 (104-byte object <96-00 00-00 E0-90 BB-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-90 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #876: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/150 (104-byte object <97-00 00-00 A0-87 BB-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-9D BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #877: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/151 (104-byte object <98-00 00-00 B0-99 BB-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-90 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #878: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/152 (104-byte object <99-00 00-00 10-9E BB-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-A6 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #879: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/153 (104-byte object <9A-00 00-00 70-9D BB-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-76 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #880: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/154 (104-byte object <9B-00 00-00 40-A6 BB-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-AF BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #881: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/155 (104-byte object <9C-00 00-00 20-A7 BB-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-90 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #882: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/156 (104-byte object <9D-00 00-00 B0-AA BB-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-B7 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #883: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/157 (104-byte object <9E-00 00-00 C0-AE BB-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A2 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #884: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/158 (104-byte object <9F-00 00-00 D0-B2 BB-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-C0 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #885: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/159 (104-byte object <A0-00 00-00 70-B7 BB-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A2 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #886: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/160 (104-byte object <A1-00 00-00 80-BB BB-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-C9 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #887: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/161 (104-byte object <A2-00 00-00 20-C0 BB-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-B3 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 625)' - PASSED gtests.sh: #888: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/162 (104-byte object <A3-00 00-00 BC-D1 BB-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 00-46 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-D1 BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #889: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/163 (104-byte object <A4-00 00-00 4C-D5 BB-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-BC BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FA B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #890: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/164 (104-byte object <A5-00 00-00 CC-D9 BB-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 A0-B2 BA-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DA BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #891: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/165 (104-byte object <A6-00 00-00 4C-DF BB-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 B0-45 B9-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-DF BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-DA BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #892: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/166 (104-byte object <A7-00 00-00 FC-E2 BB-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 A0-B2 BA-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-C4 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DA BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #893: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/167 (104-byte object <A8-00 00-00 6C-E7 BB-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 A0-DA BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-DA BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-DB BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #894: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/168 (104-byte object <A9-00 00-00 AC-EC BB-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 70-FA B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-EC BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #895: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/169 (104-byte object <AA-00 00-00 0C-F2 BB-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 A0-DA BB-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-D7 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-ED BB-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #896: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/170 (104-byte object <AB-00 00-00 AC-F6 BB-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 70-FA B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B2 BA-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-F9 B8-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #897: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/171 (104-byte object <AC-00 00-00 DC-FA BB-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 C0-F8 B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-FB BB-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DA BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #898: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/172 (104-byte object <AD-00 00-00 EC-FD BB-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 70-FA B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-E4 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B2 BA-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #899: 'HmacSha512/Pkcs11HmacTest: WycheproofVectors/173 (104-byte object <AE-00 00-00 BC-01 BC-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 C0-F8 B8-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-E7 BB-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-02 BC-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 625)' - PASSED gtests.sh: #900: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/0 (104-byte object <01-00 00-00 BC-01 BC-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 40-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-01 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #901: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/1 (104-byte object <02-00 00-00 5C-D8 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 35-63 80-F5 B8-56 38-00 00-00 38-00 00-00 62-30 31-31 62-66 34-63 65-63 34-63 8C-D8 B2-56 02-00 00-00 32-65 00-31 30-63 33-62 65-33 36-65 38-33 32-30 C0-F5 B8-56 38-00 00-00 38-00 00-00 34-61 63-38 63-61 35-32 00-33 61-37 00-65 33-61>, 694)' - PASSED gtests.sh: #902: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/2 (104-byte object <03-00 00-00 0C-DC B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-F4 B8-56 38-00 00-00 38-00 00-00 30-34 30-35 30-36 30-37 30-38 30-39 3C-DC B2-56 04-00 00-00 33-32 39-66 00-30 31-31 31-32 31-33 31-34 31-35 80-F4 B8-56 38-00 00-00 38-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 00-32 32-33>, 694)' - PASSED gtests.sh: #903: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/3 (104-byte object <04-00 00-00 9C-DF B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 31-35 80-F5 B8-56 38-00 00-00 38-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 CC-DF B2-56 06-00 00-00 65-36 65-37 36-35 00-39 32-61 32-62 32-63 32-64 C0-F5 B8-56 38-00 00-00 38-00 00-00 33-34 33-35 33-36 33-37 33-38 33-39 00-61 33-62>, 694)' - PASSED gtests.sh: #904: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/4 (104-byte object <05-00 00-00 6C-E3 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 36-36 40-F4 B8-56 38-00 00-00 38-00 00-00 34-38 36-35 63-33 39-36 66-32 31-36 9C-E3 B2-56 08-00 00-00 32-35 38-33 38-65 35-30 00-62 63-63 38-63 35-63 80-F4 B8-56 38-00 00-00 38-00 00-00 62-30 31-31 62-66 34-63 65-63 34-63 00-65 37-64>, 694)' - PASSED gtests.sh: #905: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/5 (104-byte object <06-00 00-00 FC-E6 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 31-37 80-F5 B8-56 38-00 00-00 38-00 00-00 32-61 33-31 36-37 39-37 32-30 62-32 2C-E7 B2-56 0A-00 00-00 62-65 38-31 36-30 32-64 61-37 00-38 33-66 39-63 C0-F5 B8-56 38-00 00-00 38-00 00-00 33-62 62-30 33-38 38-63 00-31 63-34 00-34 39-62>, 694)' - PASSED gtests.sh: #906: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/6 (104-byte object <07-00 00-00 4C-EA B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 35-30 40-F4 B8-56 38-00 00-00 38-00 00-00 38-63 35-63 35-62 61-33 65-37 65-32 7C-EA B2-56 0C-00 00-00 36-39 63-37 36-63 38-39 33-37 61-30 00-63 63-34 80-F4 B8-56 38-00 00-00 38-00 00-00 38-33 32-30 63-35 30-61 61-66 36-63 00-35 66-30>, 694)' - PASSED gtests.sh: #907: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/7 (104-byte object <08-00 00-00 DC-ED B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 33-61 80-F5 B8-56 38-00 00-00 38-00 00-00 33-66 39-63 36-38 39-37 65-37 64-37 0C-EE B2-56 0E-00 00-00 61-61 66-34 63-39 31-34 36-64 62-39 34-38 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 62-69 74-20 37-37 20-69 6E-20 74-61 00-00 33-36>, 694)' - PASSED gtests.sh: #908: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/8 (104-byte object <09-00 00-00 6C-F1 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 35-30 40-F4 B8-56 38-00 00-00 38-00 00-00 38-63 35-63 35-62 61-33 65-37 65-32 B0-EA B2-56 10-00 00-00 10-00 00-00 65-63 34-63 37-65 37-64 36-63 63-34 80-F4 B8-56 38-00 00-00 38-00 00-00 38-33 32-30 63-35 30-61 61-66 36-63 00-35 66-30>, 694)' - PASSED gtests.sh: #909: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/9 (104-byte object <0A-00 00-00 CC-F5 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 30-64 80-F5 B8-56 38-00 00-00 38-00 00-00 31-34 31-35 31-36 31-37 31-38 31-39 10-EA B2-56 12-00 00-00 12-00 00-00 32-30 32-31 32-32 32-33 32-34 32-35 C0-F5 B8-56 38-00 00-00 38-00 00-00 32-63 32-64 32-65 32-66 33-30 33-31 00-32 33-33>, 694)' - PASSED gtests.sh: #910: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/10 (104-byte object <0B-00 00-00 7C-F9 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-F4 B8-56 38-00 00-00 38-00 00-00 30-63 30-64 30-65 30-66 31-30 31-31 30-F1 B2-56 14-00 00-00 14-00 00-00 31-38 31-39 31-61 31-62 31-63 31-64 80-F4 B8-56 38-00 00-00 38-00 00-00 32-34 32-35 32-36 32-37 32-38 32-39 00-61 32-62>, 694)' - PASSED gtests.sh: #911: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/11 (104-byte object <0C-00 00-00 2C-FD B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 39-38 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 30-38 30-39 10-F2 B2-56 16-00 00-00 16-00 00-00 31-30 31-31 31-32 31-33 31-34 31-35 C0-F5 B8-56 38-00 00-00 38-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 00-32 32-33>, 694)' - PASSED gtests.sh: #912: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/12 (104-byte object <0D-00 00-00 DC-00 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 74-20 40-F4 B8-56 38-00 00-00 38-00 00-00 30-34 30-35 31-07 00-00 48-4C B2-56 40-F5 B2-56 18-00 00-00 18-00 00-00 30-38 30-39 30-61 30-62 30-63 30-64 80-F4 B8-56 38-00 00-00 38-00 00-00 31-34 31-35 31-36 31-37 31-38 31-39 00-61 31-62>, 694)' - PASSED gtests.sh: #913: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/13 (104-byte object <0E-00 00-00 8C-04 B3-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 30-64 80-F5 B8-56 38-00 00-00 38-00 00-00 31-34 31-35 31-36 31-37 31-38 31-39 40-F9 B2-56 1A-00 00-00 1A-00 00-00 32-30 32-31 32-32 32-33 32-34 32-35 C0-F5 B8-56 38-00 00-00 38-00 00-00 32-63 32-64 32-65 32-66 33-30 33-31 00-32 33-33>, 694)' - PASSED gtests.sh: #914: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/14 (104-byte object <0F-00 00-00 5C-92 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-F4 B8-56 38-00 00-00 38-00 00-00 40-00 00-00 B0-F6 B8-56 40-00 00-00 C0-73 B9-56 1C-00 00-00 1C-00 00-00 40-00 00-00 00-00 00-00 AE-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 20-6B 65-79 00-92 B2-56 08-00 00-00 00-F7 B8-56>, 694)' - PASSED gtests.sh: #915: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/15 (104-byte object <10-00 00-00 8C-95 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 31-35 80-F5 B8-56 38-00 00-00 38-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 A0-33 B7-56 1E-00 00-00 1E-00 00-00 32-38 32-39 32-61 32-62 32-63 32-64 C0-F5 B8-56 38-00 00-00 38-00 00-00 33-34 33-35 33-36 33-37 33-38 33-39 00-61 33-62>, 694)' - PASSED gtests.sh: #916: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/16 (104-byte object <11-00 00-00 1C-99 B2-56 00-00 00-00 00-6F 20-61 6C-6C 20-7A 65-72 6F-00 66-66 66-66 40-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 30-38 30-39 60-DC B6-56 20-00 00-00 20-00 00-00 31-30 31-31 31-32 31-33 31-34 31-35 80-F4 B8-56 38-00 00-00 38-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 00-32 32-33>, 694)' - PASSED gtests.sh: #917: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/17 (104-byte object <12-00 00-00 3C-9D B2-56 00-00 00-00 00-36 32-37 32-38 32-39 32-61 32-62 32-63 32-64 80-F5 B8-56 38-00 00-00 38-00 00-00 33-34 33-35 33-36 33-37 33-38 33-39 C0-8C B9-56 22-00 00-00 22-00 00-00 00-61 67-00 32-36 63-38 65-36 63-65 C0-F5 B8-56 38-00 00-00 38-00 00-00 30-37 30-30 31-36 30-36 37-33 63-31 00-39 37-62>, 694)' - PASSED gtests.sh: #918: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/18 (104-byte object <13-00 00-00 CC-A0 B2-56 00-00 00-00 00-65 30-66 31-30 31-31 31-32 31-33 31-34 31-35 80-F4 B8-56 38-00 00-00 38-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 00-F6 B8-56 30-00 00-00 30-00 00-00 32-38 32-39 32-61 32-62 32-63 32-64 40-F6 B8-56 38-00 00-00 38-00 00-00 33-34 33-35 33-36 33-37 33-38 33-39 00-61 33-62>, 694)' - PASSED gtests.sh: #919: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/19 (104-byte object <14-00 00-00 9C-A5 B2-56 00-00 00-00 00-30 63-35 62-33 63-34 65-66 62-64 35-62 36-37 C0-F5 B8-56 38-00 00-00 38-00 00-00 10-05 00-00 90-00 00-00 30-64 33-33 30-03 BC-56 40-00 00-00 40-00 00-00 33-63 39-32 38-64 61-63 37-39 31-33 50-A1 B2-56 38-00 00-00 38-00 00-00 33-63 38-65 65-33 34-36 62-61 37-63 00-65 64-39>, 694)' - PASSED gtests.sh: #920: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/20 (104-byte object <15-00 00-00 0C-AA B2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-31 31-37 80-F4 B8-56 38-00 00-00 38-00 00-00 63-61 39-32 32-64 32-36 66-39 62-37 70-AA B2-56 5E-00 00-00 5E-00 00-00 00-38 36-65 36-32 39-35 90-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 33-65 35-36 39-31 38-32 37-62 65-33 00-65 34-39>, 694)' - PASSED gtests.sh: #921: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/21 (104-byte object <16-00 00-00 DC-AE B2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-30 64-62 C0-F5 B8-56 38-00 00-00 38-00 00-00 32-65 64-61 64-63 32-62 00-65 62-34 00-AB B2-56 60-00 00-00 60-00 00-00 66-66 39-37 62-37 37-30 32-30 38-36 50-A1 B2-56 38-00 00-00 38-00 00-00 65-39 65-37 30-31 61-65 61-38 63-36 00-65 30-66>, 694)' - PASSED gtests.sh: #922: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/22 (104-byte object <17-00 00-00 DC-B2 B2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-61 62-39 80-F4 B8-56 38-00 00-00 38-00 00-00 62-32 63-36 38-65 63-64 66-33 63-30 70-AA B2-56 62-00 00-00 62-00 00-00 00-62 39-37 64-61 36-30 36-62 64-35 00-F6 B8-56 38-00 00-00 38-00 00-00 66-35 30-32 65-36 35-38 36-36 63-66 00-30 37-37>, 694)' - PASSED gtests.sh: #923: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/23 (104-byte object <18-00 00-00 DC-B6 B2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-35 36-36 C0-F5 B8-56 38-00 00-00 38-00 00-00 34-38 36-35 63-33 39-36 66-32 31-36 70-F3 AF-56 E0-00 00-00 E0-00 00-00 36-65 38-65 62-62 63-63 38-63 35-63 50-A1 B2-56 38-00 00-00 38-00 00-00 E0-00 00-00 20-00 00-00 03-DD B7-56 00-65 64-20>, 694)' - PASSED gtests.sh: #924: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/24 (104-byte object <19-00 00-00 5C-BB B2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-63 30-64 80-F4 B8-56 38-00 00-00 38-00 00-00 31-34 31-35 31-36 31-37 31-38 31-39 00-54 B6-56 FE-00 00-00 FE-00 00-00 32-30 32-31 32-32 32-33 32-34 32-35 00-F6 B8-56 38-00 00-00 38-00 00-00 32-63 32-64 32-65 32-66 33-30 33-31 00-32 33-33>, 694)' - PASSED gtests.sh: #925: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/25 (104-byte object <1A-00 00-00 0C-C1 B2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-63 35-63 C0-F5 B8-56 38-00 00-00 38-00 00-00 E0-00 00-00 20-00 00-00 04-AB B7-56 10-5D B9-56 00-01 00-00 00-01 00-00 6E-20 74-61 67-00 31-33 31-34 31-35 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 30-38 30-39 00-61 30-62>, 694)' - PASSED gtests.sh: #926: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/26 (104-byte object <1B-00 00-00 AC-C5 B2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-34 33-35 80-F4 B8-56 38-00 00-00 38-00 00-00 33-63 33-64 33-65 33-66 00-AF B7-56 90-C0 B0-56 FE-01 00-00 FE-01 00-00 48-C4 B2-56 D8-37 BC-F7 38-37 38-30 00-F6 B8-56 38-00 00-00 38-00 00-00 63-37 31-38 64-36 61-62 62-62 30-39 00-32 37-38>, 694)' - PASSED gtests.sh: #927: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/27 (104-byte object <1C-00 00-00 70-C1 B2-56 14-00 00-00 14-00 00-00 78-BA B4-56 D8-37 BC-F7 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 30-63 30-64 30-65 30-66 31-30 31-31 7C-CB B2-56 00-00 00-00 00-36 31-37 31-38 31-39 31-61 31-62 31-63 31-64 50-A1 B2-56 38-00 00-00 38-00 00-00 32-34 32-35 32-36 32-37 32-38 32-39 01-61 32-62>, 694)' - PASSED gtests.sh: #928: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/28 (104-byte object <1D-00 00-00 D0-C0 B2-56 14-00 00-00 14-00 00-00 30-38 30-39 30-61 30-62 30-63 30-64 80-F4 B8-56 38-00 00-00 38-00 00-00 31-34 31-35 31-36 31-37 31-38 31-39 60-C5 B9-56 20-00 00-00 20-00 00-00 32-30 32-31 32-32 32-33 32-34 32-35 00-F6 B8-56 38-00 00-00 38-00 00-00 32-63 32-64 32-65 32-66 33-30 33-31 01-32 33-33>, 694)' - PASSED gtests.sh: #929: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/29 (104-byte object <1E-00 00-00 10-CB B2-56 14-00 00-00 14-00 00-00 36-65 38-65 62-62 63-63 38-63 35-63 C0-F5 B8-56 38-00 00-00 38-00 00-00 E0-00 00-00 20-00 00-00 05-B9 B7-56 3C-D3 B2-56 00-00 00-00 00-34 38-20 69-6E 20-74 61-67 00-62 31-63 31-64 50-A1 B2-56 38-00 00-00 38-00 00-00 30-34 30-35 30-36 30-37 30-38 30-39 01-61 30-62>, 694)' - PASSED gtests.sh: #930: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/30 (104-byte object <1F-00 00-00 F0-CB B2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-BC B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #931: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/31 (104-byte object <20-00 00-00 20-CF B2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-0B BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #932: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/32 (104-byte object <21-00 00-00 D0-D2 B2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-BA B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #933: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/33 (104-byte object <22-00 00-00 90-CE B9-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-11 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #934: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/34 (104-byte object <23-00 00-00 B0-05 BA-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-EA B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #935: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/35 (104-byte object <24-00 00-00 C0-1C BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-17 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #936: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/36 (104-byte object <25-00 00-00 C0-1F BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-73 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #937: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/37 (104-byte object <26-00 00-00 30-9B B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-1D BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #938: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/38 (104-byte object <27-00 00-00 A0-88 BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-EA B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #939: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/39 (104-byte object <28-00 00-00 50-F1 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-24 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #940: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/40 (104-byte object <29-00 00-00 10-F0 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-57 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #941: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/41 (104-byte object <2A-00 00-00 B0-20 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-2C BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #942: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/42 (104-byte object <2B-00 00-00 60-24 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-58 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #943: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/43 (104-byte object <2C-00 00-00 10-28 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-34 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #944: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/44 (104-byte object <2D-00 00-00 20-2C BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-C3 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #945: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/45 (104-byte object <2E-00 00-00 D0-2F BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-3C BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #946: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/46 (104-byte object <2F-00 00-00 10-34 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-6F BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #947: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/47 (104-byte object <30-00 00-00 C0-37 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-44 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #948: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/48 (104-byte object <31-00 00-00 00-3C BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-30 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #949: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/49 (104-byte object <32-00 00-00 B0-3F BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-4C BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #950: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/50 (104-byte object <33-00 00-00 F0-43 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-38 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #951: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/51 (104-byte object <34-00 00-00 A0-47 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-54 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #952: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/52 (104-byte object <35-00 00-00 E0-4B BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-40 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #953: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/53 (104-byte object <36-00 00-00 90-4F BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-5C BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #954: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/54 (104-byte object <37-00 00-00 D0-53 BC-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-48 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #955: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/55 (104-byte object <38-00 00-00 80-57 BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-64 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #956: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/56 (104-byte object <39-00 00-00 C0-5B BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-50 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #957: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/57 (104-byte object <3A-00 00-00 70-5F BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-6C BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #958: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/58 (104-byte object <3B-00 00-00 B0-63 BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-58 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #959: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/59 (104-byte object <3C-00 00-00 60-67 BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-73 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #960: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/60 (104-byte object <3D-00 00-00 A0-6B BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-60 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #961: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/61 (104-byte object <3E-00 00-00 50-6F BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-7B BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #962: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/62 (104-byte object <3F-00 00-00 90-73 BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-68 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #963: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/63 (104-byte object <40-00 00-00 40-77 BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-83 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #964: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/64 (104-byte object <41-00 00-00 80-7B BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-6F BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #965: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/65 (104-byte object <42-00 00-00 D0-7F BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-8B BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #966: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/66 (104-byte object <43-00 00-00 B0-8C BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-87 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #967: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/67 (104-byte object <44-00 00-00 A0-88 BC-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-94 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #968: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/68 (104-byte object <45-00 00-00 40-90 BC-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-8F BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #969: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/69 (104-byte object <46-00 00-00 C0-87 BC-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-9C BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #970: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/70 (104-byte object <47-00 00-00 50-98 BC-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-90 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #971: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/71 (104-byte object <48-00 00-00 50-9C BC-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-A4 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #972: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/72 (104-byte object <49-00 00-00 B0-9B BC-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-77 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #973: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/73 (104-byte object <4A-00 00-00 C0-A3 BC-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-AB BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #974: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/74 (104-byte object <4B-00 00-00 A0-A4 BC-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-8F BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #975: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/75 (104-byte object <4C-00 00-00 D0-A7 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-B3 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #976: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/76 (104-byte object <4D-00 00-00 80-AB BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-A0 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #977: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/77 (104-byte object <4E-00 00-00 30-AF BC-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-BB BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #978: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/78 (104-byte object <4F-00 00-00 70-B3 BC-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-A0 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #979: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/79 (104-byte object <50-00 00-00 20-B7 BC-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-C3 BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A1 B2-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #980: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/80 (104-byte object <51-00 00-00 60-BB BC-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-AF BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #981: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/81 (104-byte object <52-00 00-00 7C-CB BC-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-CB BC-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-BF BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #982: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/82 (104-byte object <53-00 00-00 8C-CE BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-CE BC-56 02-00 00-00 64-61 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-C8 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #983: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/83 (104-byte object <54-00 00-00 FC-D1 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-D2 BC-56 04-00 00-00 30-33 61-38 00-00 00-00 00-00 00-00 00-00 00-00 10-CC BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #984: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/84 (104-byte object <55-00 00-00 6C-D5 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-D5 BC-56 06-00 00-00 61-30 66-62 37-33 00-00 00-00 00-00 00-00 00-00 40-CF BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #985: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/85 (104-byte object <56-00 00-00 DC-D8 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-D9 BC-56 08-00 00-00 63-38 62-32 66-35 35-37 00-00 00-00 00-00 00-00 B0-D2 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #986: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/86 (104-byte object <57-00 00-00 8C-DC BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-DC BC-56 0A-00 00-00 63-38 64-39 66-35 62-33 37-33 00-00 00-00 00-00 20-D6 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #987: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/87 (104-byte object <58-00 00-00 3C-E0 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-E0 BC-56 0C-00 00-00 31-38 35-65 34-63 61-64 61-34 66-34 00-00 00-00 D0-D9 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #988: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/88 (104-byte object <59-00 00-00 EC-E3 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-E4 BC-56 0E-00 00-00 39-63 30-66 33-34 61-35 36-35 34-32 37-39 00-00 80-DD BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #989: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/89 (104-byte object <5A-00 00-00 9C-E7 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-E0 BC-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-E1 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #990: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/90 (104-byte object <5B-00 00-00 CC-EB BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-E0 BC-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-E4 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #991: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/91 (104-byte object <5C-00 00-00 9C-EF BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-E7 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-E8 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #992: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/92 (104-byte object <5D-00 00-00 6C-F3 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-E8 BC-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-EC BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #993: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/93 (104-byte object <5E-00 00-00 3C-F7 BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-EB BC-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F0 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #994: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/94 (104-byte object <5F-00 00-00 0C-FB BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-EF BC-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-F4 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #995: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/95 (104-byte object <60-00 00-00 DC-FE BC-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-FB BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-C7 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #996: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/96 (104-byte object <61-00 00-00 EC-02 BD-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-FF BC-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FF BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #997: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/97 (104-byte object <62-00 00-00 CC-06 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-C7 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-FF BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #998: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/98 (104-byte object <63-00 00-00 AC-0A BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-FF BC-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-03 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #999: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/99 (104-byte object <64-00 00-00 8C-0E BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0E BD-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-F8 BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1000: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/100 (104-byte object <65-00 00-00 1C-13 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-F5 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-03 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1001: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/101 (104-byte object <66-00 00-00 AC-16 BD-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-0B BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1002: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/102 (104-byte object <67-00 00-00 8C-1A BD-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-AB B2-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-13 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1003: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/103 (104-byte object <68-00 00-00 6C-1E BD-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-17 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1004: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/104 (104-byte object <69-00 00-00 4C-22 BD-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-EE AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-1B BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1005: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/105 (104-byte object <6A-00 00-00 EC-26 BD-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-5D B9-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-1F BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1006: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/106 (104-byte object <6B-00 00-00 AC-2B BD-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-54 B6-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-24 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1007: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/107 (104-byte object <6C-00 00-00 6C-30 BD-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-D3 BA-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-28 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1008: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/108 (104-byte object <6D-00 00-00 10-2C BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-3A BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1009: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/109 (104-byte object <6E-00 00-00 70-2B BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-3B BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-FF BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1010: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/110 (104-byte object <6F-00 00-00 10-3A BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-43 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-37 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1011: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/111 (104-byte object <70-00 00-00 F0-3A BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-3F BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-3E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1012: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/112 (104-byte object <71-00 00-00 40-3E BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-4B BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-FF BC-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1013: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/113 (104-byte object <72-00 00-00 D0-42 BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-47 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-3F BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1014: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/114 (104-byte object <73-00 00-00 40-46 BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-52 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-3E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1015: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/115 (104-byte object <74-00 00-00 A0-4A BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-4F BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1016: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/116 (104-byte object <75-00 00-00 10-4E BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-5A BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-3F BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1017: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/117 (104-byte object <76-00 00-00 70-52 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-56 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-4E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1018: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/118 (104-byte object <77-00 00-00 E0-55 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-62 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-47 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1019: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/119 (104-byte object <78-00 00-00 40-5A BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-5E BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-56 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1020: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/120 (104-byte object <79-00 00-00 B0-5D BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-6A BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-4E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1021: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/121 (104-byte object <7A-00 00-00 10-62 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-66 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-5E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1022: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/122 (104-byte object <7B-00 00-00 80-65 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-72 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-56 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1023: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/123 (104-byte object <7C-00 00-00 E0-69 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-6E BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-66 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1024: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/124 (104-byte object <7D-00 00-00 50-6D BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-79 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-5E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1025: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/125 (104-byte object <7E-00 00-00 B0-71 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-76 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-6E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1026: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/126 (104-byte object <7F-00 00-00 20-75 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-81 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-66 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1027: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/127 (104-byte object <80-00 00-00 80-79 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-7D BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-75 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1028: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/128 (104-byte object <81-00 00-00 F0-7C BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-89 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-6E BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1029: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/129 (104-byte object <82-00 00-00 50-81 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-85 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-7D BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1030: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/130 (104-byte object <83-00 00-00 C0-84 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-99 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-75 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1031: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/131 (104-byte object <84-00 00-00 20-89 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-95 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-85 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1032: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/132 (104-byte object <85-00 00-00 90-8C BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-A1 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-7D BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1033: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/133 (104-byte object <86-00 00-00 10-99 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-9D BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-95 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1034: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/134 (104-byte object <87-00 00-00 80-9C BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-A9 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-85 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1035: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/135 (104-byte object <88-00 00-00 E0-A0 BD-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A5 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-9D BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1036: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/136 (104-byte object <89-00 00-00 50-A4 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-B0 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-95 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1037: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/137 (104-byte object <8A-00 00-00 B0-A8 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-AD BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A5 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1038: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/138 (104-byte object <8B-00 00-00 20-AC BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-B8 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-9D BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1039: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/139 (104-byte object <8C-00 00-00 80-B0 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-B4 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-AC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1040: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/140 (104-byte object <8D-00 00-00 F0-B3 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-C0 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A5 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1041: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/141 (104-byte object <8E-00 00-00 50-B8 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-BC BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-B4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1042: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/142 (104-byte object <8F-00 00-00 C0-BB BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-C8 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-AC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1043: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/143 (104-byte object <90-00 00-00 20-C0 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C4 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-BC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1044: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/144 (104-byte object <91-00 00-00 90-C3 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-D0 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-B4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1045: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/145 (104-byte object <92-00 00-00 F0-C7 BD-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-CC BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-C4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1046: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/146 (104-byte object <93-00 00-00 30-CC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-D7 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-D3 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1047: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/147 (104-byte object <94-00 00-00 30-D4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-D8 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-D4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1048: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/148 (104-byte object <95-00 00-00 D0-DB BD-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-E0 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-DC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1049: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/149 (104-byte object <96-00 00-00 00-D4 BD-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-DC BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-DC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1050: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/150 (104-byte object <97-00 00-00 80-E0 BD-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-E8 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-DC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1051: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/151 (104-byte object <98-00 00-00 E0-DF BD-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-E4 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-BC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1052: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/152 (104-byte object <99-00 00-00 D0-E7 BD-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-EF BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-DC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1053: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/153 (104-byte object <9A-00 00-00 B0-E8 BD-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-D3 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-E4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1054: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/154 (104-byte object <9B-00 00-00 A0-EB BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-F7 BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-BC BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1055: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/155 (104-byte object <9C-00 00-00 40-EF BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-F3 BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-D4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1056: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/156 (104-byte object <9D-00 00-00 B0-F2 BD-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-FF BD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-E4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1057: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/157 (104-byte object <9E-00 00-00 10-F7 BD-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-FB BD-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F3 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1058: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/158 (104-byte object <9F-00 00-00 80-FA BD-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-07 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-D4 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1059: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/159 (104-byte object <A0-00 00-00 E0-FE BD-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-03 BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-FB BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 694)' - PASSED gtests.sh: #1060: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/160 (104-byte object <A1-00 00-00 BC-0E BE-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 80-F3 BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-0E BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1061: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/161 (104-byte object <A2-00 00-00 AC-11 BE-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 20-0B BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-03 BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1062: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/162 (104-byte object <A3-00 00-00 EC-15 BE-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 50-FB BD-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-03 BC-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-F5 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1063: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/163 (104-byte object <A4-00 00-00 8C-19 BE-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 90-12 BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-19 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0A BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1064: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/164 (104-byte object <A5-00 00-00 8C-1D BE-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 10-1A BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-1A BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-1A BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1065: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/165 (104-byte object <A6-00 00-00 1C-22 BE-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 10-1E BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-F5 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-1E BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1066: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/166 (104-byte object <A7-00 00-00 7C-25 BE-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 30-EE BB-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-25 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1067: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/167 (104-byte object <A8-00 00-00 7C-2A BE-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 00-26 BE-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0A BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F6 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1068: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/168 (104-byte object <A9-00 00-00 5C-2E BE-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 30-EE BB-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-03 BC-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-F4 B8-56 38-00 00-00 38-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1069: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/169 (104-byte object <AA-00 00-00 8C-32 BE-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 00-26 BE-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-32 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-1A BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1070: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/170 (104-byte object <AB-00 00-00 8C-36 BE-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 30-EE BB-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-33 BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-1E BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1071: 'HmacSha3224/Pkcs11HmacTest: WycheproofVectors/171 (104-byte object <AC-00 00-00 4C-3B BE-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 00-26 BE-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-F5 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-1E BE-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 694)' - PASSED gtests.sh: #1072: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/0 (104-byte object <01-00 00-00 4C-3B BE-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-3B BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1073: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/1 (104-byte object <02-00 00-00 BC-58 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 40-A3 B2-56 40-00 00-00 EC-58 B2-56 02-00 00-00 37-37 00-56 14-00 00-00 14-00 00-00 1E-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 38-00 00-00 38-00 00-00 00-00 00-00 00-A3 B2-56>, 689)' - PASSED gtests.sh: #1074: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/2 (104-byte object <03-00 00-00 8C-5C B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 15-00 00-00 00-9D BA-56 38-00 00-00 BC-5C B2-56 04-00 00-00 61-35 39-62 00-00 00-00 60-AF B7-56 20-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 20-00 00-00 40-9D BA-56 38-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1075: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/3 (104-byte object <04-00 00-00 3C-60 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 38-00 00-00 38-00 00-00 00-00 00-00 6C-60 B2-56 06-00 00-00 63-37 62-38 62-32 00-00 00-00 00-00 00-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 38-00 00-00 38-00 00-00 00-00 00-00 00-AF B2-56>, 689)' - PASSED gtests.sh: #1076: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/4 (104-byte object <05-00 00-00 2C-64 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 3C-00 00-00 40-CD B8-56 16-00 00-00 5C-64 B2-56 08-00 00-00 63-63 30-32 31-64 36-35 00-A3 B1-56 38-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 40-00 00-00 84-64 B2-56 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1077: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/5 (104-byte object <06-00 00-00 DC-67 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 1D-00 00-00 1D-00 00-00 43-00 00-00 0C-68 B2-56 0A-00 00-00 61-34 61-36 65-66 36-65 62-64 00-00 00-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 20-00 00-00 20-00 00-00 00-00 00-00 00-BE B2-56>, 689)' - PASSED gtests.sh: #1078: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/6 (104-byte object <07-00 00-00 4C-6B B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 20-00 00-00 20-00 00-00 00-00 00-00 7C-6B B2-56 0C-00 00-00 36-36 37-65 30-31 35-64 66-37 66-63 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 4E-00 00-00 C0-B6 B0-56 13-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1079: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/7 (104-byte object <08-00 00-00 FC-6E B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 66-35 35-37 00-6F B2-56 04-00 00-00 2C-6F B2-56 0E-00 00-00 34-31 36-33 61-39 66-37 37-65 34-31 66-35 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 0D-00 00-00 73-68 6F-72 74-20 6D-65 00-73 61-67>, 689)' - PASSED gtests.sh: #1080: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/8 (104-byte object <09-00 00-00 AC-72 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 16-00 00-00 90-48 B3-56 1C-00 00-00 B0-6B B2-56 10-00 00-00 10-00 00-00 20-00 00-00 00-00 00-00 60-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 74-20 6D-65 73-73 61-67 65-00 00-00 00-EA B5-56>, 689)' - PASSED gtests.sh: #1081: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/9 (104-byte object <0A-00 00-00 DC-76 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 6A-00 00-00 04-77 B2-56 0C-00 00-00 10-6B B2-56 12-00 00-00 12-00 00-00 00-00 00-00 50-ED B5-56 38-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 40-00 00-00 90-90 AF-56 FE-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1082: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/10 (104-byte object <0B-00 00-00 4C-7B B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 20-00 00-00 01-00 00-00 75-00 00-00 70-72 B2-56 14-00 00-00 14-00 00-00 73-00 00-00 C0-DE B2-56 14-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 E0-DE B2-56 40-00 00-00 00-7B B2-56>, 689)' - PASSED gtests.sh: #1083: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/11 (104-byte object <0C-00 00-00 1C-7F B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 38-00 00-00 38-00 00-00 00-00 00-00 50-73 B2-56 16-00 00-00 16-00 00-00 20-00 00-00 20-00 00-00 00-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 1C-00 00-00 1C-00 00-00 00-00 00-00 00-E5 B2-56>, 689)' - PASSED gtests.sh: #1084: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/12 (104-byte object <0D-00 00-00 EC-82 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 70-D2 B7-56 1C-00 00-00 A0-76 B2-56 18-00 00-00 18-00 00-00 20-00 00-00 01-00 00-00 88-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 86-00 00-00 50-EC B2-56 15-00 00-00 00-E8 B8-56>, 689)' - PASSED gtests.sh: #1085: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/13 (104-byte object <0E-00 00-00 BC-86 B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 16-00 00-00 16-00 00-00 8F-00 00-00 10-7B B2-56 1A-00 00-00 1A-00 00-00 38-00 00-00 38-00 00-00 00-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-87 B2-56>, 689)' - PASSED gtests.sh: #1086: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/14 (104-byte object <0F-00 00-00 8C-8A B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 40-00 00-00 60-43 BB-56 20-00 00-00 D0-17 BD-56 1C-00 00-00 1C-00 00-00 20-00 00-00 F0-1F BB-56 1C-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 20-00 00-00 01-00 00-00 9B-00 00-00 00-EE B8-56>, 689)' - PASSED gtests.sh: #1087: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/15 (104-byte object <10-00 00-00 DC-8D B2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 20-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 D0-FF B2-56 20-00 00-00 C0-73 B9-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 B3-56 20-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 09-00 00-00 73-68 6F-72 74-20 6B-65 00-00 B3-56>, 689)' - PASSED gtests.sh: #1088: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/16 (104-byte object <11-00 00-00 8C-91 B2-56 00-00 00-00 00-6D B1-56 82-00 00-00 B0-B4 BB-56 20-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 50-90 BB-56 1C-00 00-00 D0-33 BE-56 20-00 00-00 20-00 00-00 40-00 00-00 00-00 00-00 AC-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 20-6B 65-79 00-91 B2-56 08-00 00-00 00-F9 B8-56>, 689)' - PASSED gtests.sh: #1089: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/17 (104-byte object <12-00 00-00 5C-89 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-03 BE-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1090: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/18 (104-byte object <13-00 00-00 EC-8B BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-F4 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1091: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/19 (104-byte object <14-00 00-00 1C-8F BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-77 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1092: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/20 (104-byte object <15-00 00-00 4C-94 BE-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-94 BE-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1093: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/21 (104-byte object <16-00 00-00 9C-98 BE-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-95 BE-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1094: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/22 (104-byte object <17-00 00-00 9C-9B BE-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-94 BE-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1095: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/23 (104-byte object <18-00 00-00 3C-9F BE-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F3 AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1096: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/24 (104-byte object <19-00 00-00 5C-A3 BE-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-5D B9-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1097: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/25 (104-byte object <1A-00 00-00 AC-A8 BE-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-BB B2-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1098: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/26 (104-byte object <1B-00 00-00 EC-AC BE-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C0 B0-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1099: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/27 (104-byte object <1C-00 00-00 20-58 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-B2 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1100: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/28 (104-byte object <1D-00 00-00 E0-68 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-C5 B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1101: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/29 (104-byte object <1E-00 00-00 F0-6F BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-B8 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1102: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/30 (104-byte object <1F-00 00-00 A0-88 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-8C B9-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1103: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/31 (104-byte object <20-00 00-00 B0-B0 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-BF BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1104: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/32 (104-byte object <21-00 00-00 D0-D9 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-BF BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1105: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/33 (104-byte object <22-00 00-00 D0-E8 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-C5 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1106: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/34 (104-byte object <23-00 00-00 A0-C7 BC-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-AF BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1107: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/35 (104-byte object <24-00 00-00 C0-C8 B8-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-CB BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1108: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/36 (104-byte object <25-00 00-00 10-F1 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-A0 BC-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1109: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/37 (104-byte object <26-00 00-00 70-DB BB-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-D2 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1110: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/38 (104-byte object <27-00 00-00 50-9D BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-D1 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1111: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/39 (104-byte object <28-00 00-00 30-E3 BA-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-D8 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1112: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/40 (104-byte object <29-00 00-00 40-7E AF-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-4B B2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1113: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/41 (104-byte object <2A-00 00-00 50-75 B5-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-DF BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1114: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/42 (104-byte object <2B-00 00-00 D0-82 B0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C9 B5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1115: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/43 (104-byte object <2C-00 00-00 50-42 B6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-E7 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1116: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/44 (104-byte object <2D-00 00-00 F0-DE BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-CA B7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1117: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/45 (104-byte object <2E-00 00-00 C0-E2 BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-EF BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1118: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/46 (104-byte object <2F-00 00-00 20-E7 BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C B1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1119: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/47 (104-byte object <30-00 00-00 F0-EA BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-F7 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1120: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/48 (104-byte object <31-00 00-00 50-EF BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-E3 BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1121: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/49 (104-byte object <32-00 00-00 20-F3 BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-00 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1122: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/50 (104-byte object <33-00 00-00 80-F7 BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-EB BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1123: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/51 (104-byte object <34-00 00-00 50-FB BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-08 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1124: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/52 (104-byte object <35-00 00-00 B0-FF BE-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F3 BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1125: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/53 (104-byte object <36-00 00-00 80-03 BF-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-10 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1126: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/54 (104-byte object <37-00 00-00 E0-07 BF-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-FB BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1127: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/55 (104-byte object <38-00 00-00 B0-0B BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-18 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1128: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/56 (104-byte object <39-00 00-00 10-10 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-04 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1129: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/57 (104-byte object <3A-00 00-00 E0-13 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-20 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1130: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/58 (104-byte object <3B-00 00-00 40-18 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0C BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1131: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/59 (104-byte object <3C-00 00-00 10-1C BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-29 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1132: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/60 (104-byte object <3D-00 00-00 70-20 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-14 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1133: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/61 (104-byte object <3E-00 00-00 40-24 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-31 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1134: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/62 (104-byte object <3F-00 00-00 A0-28 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-1C BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1135: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/63 (104-byte object <40-00 00-00 70-2C BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-39 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1136: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/64 (104-byte object <41-00 00-00 D0-30 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-24 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1137: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/65 (104-byte object <42-00 00-00 40-35 BF-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-41 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1138: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/66 (104-byte object <43-00 00-00 A0-42 BF-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-3D BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1139: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/67 (104-byte object <44-00 00-00 70-3E BF-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-4A BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1140: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/68 (104-byte object <45-00 00-00 30-46 BF-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-45 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1141: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/69 (104-byte object <46-00 00-00 70-3D BF-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-52 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1142: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/70 (104-byte object <47-00 00-00 80-4E BF-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-46 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1143: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/71 (104-byte object <48-00 00-00 A0-52 BF-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-5A BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1144: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/72 (104-byte object <49-00 00-00 00-52 BF-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-2D BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1145: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/73 (104-byte object <4A-00 00-00 50-5A BF-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-62 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1146: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/74 (104-byte object <4B-00 00-00 30-5B BF-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-45 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1147: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/75 (104-byte object <4C-00 00-00 80-5E BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-6A BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1148: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/76 (104-byte object <4D-00 00-00 50-62 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-56 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1149: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/77 (104-byte object <4E-00 00-00 20-66 BF-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-73 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1150: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/78 (104-byte object <4F-00 00-00 80-6A BF-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-56 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1151: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/79 (104-byte object <50-00 00-00 50-6E BF-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-54 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-7B BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1152: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/80 (104-byte object <51-00 00-00 B0-72 BF-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-66 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1153: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/81 (104-byte object <52-00 00-00 4C-83 BF-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-83 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-77 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1154: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/82 (104-byte object <53-00 00-00 5C-86 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-86 BF-56 02-00 00-00 34-30 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-80 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1155: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/83 (104-byte object <54-00 00-00 CC-89 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-89 BF-56 04-00 00-00 36-36 30-31 00-00 00-00 00-00 00-00 00-00 00-00 E0-83 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1156: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/84 (104-byte object <55-00 00-00 3C-8D BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-8D BF-56 06-00 00-00 66-31 64-33 30-30 00-00 00-00 00-00 00-00 00-00 10-87 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1157: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/85 (104-byte object <56-00 00-00 AC-90 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-90 BF-56 08-00 00-00 32-61 65-36 33-63 62-66 00-00 00-00 00-00 00-00 80-8A BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1158: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/86 (104-byte object <57-00 00-00 6C-94 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-94 BF-56 0A-00 00-00 61-66 33-61 30-31 35-65 61-31 00-00 00-00 00-00 F0-8D BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1159: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/87 (104-byte object <58-00 00-00 2C-98 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-98 BF-56 0C-00 00-00 33-66 35-36 39-33 35-64 65-66 33-66 00-00 00-00 B0-91 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1160: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/88 (104-byte object <59-00 00-00 EC-9B BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-9C BF-56 0E-00 00-00 35-37 62-62 38-36 62-65 65-64 31-35 36-66 00-00 70-95 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1161: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/89 (104-byte object <5A-00 00-00 AC-9F BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-98 BF-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-99 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1162: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/90 (104-byte object <5B-00 00-00 EC-A3 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-97 BF-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-9C BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1163: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/91 (104-byte object <5C-00 00-00 CC-A7 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-9F BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-A0 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1164: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/92 (104-byte object <5D-00 00-00 AC-AB BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-A0 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-A4 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1165: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/93 (104-byte object <5E-00 00-00 8C-AF BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-A3 BF-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-A8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1166: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/94 (104-byte object <5F-00 00-00 6C-B3 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-A7 BF-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-AC BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1167: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/95 (104-byte object <60-00 00-00 4C-B7 BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-B4 BF-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-7F BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1168: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/96 (104-byte object <61-00 00-00 6C-BB BF-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-B7 BF-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-B7 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1169: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/97 (104-byte object <62-00 00-00 5C-BF BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-7F BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-B8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1170: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/98 (104-byte object <63-00 00-00 4C-C3 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-B7 BF-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-BB BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1171: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/99 (104-byte object <64-00 00-00 3C-C7 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-51 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-57 B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-B0 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1172: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/100 (104-byte object <65-00 00-00 DC-CA BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-CB BF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-BB BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1173: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/101 (104-byte object <66-00 00-00 FC-CF BF-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-93 BE-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-C3 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1174: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/102 (104-byte object <67-00 00-00 DC-D3 BF-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-95 BE-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-CD BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1175: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/103 (104-byte object <68-00 00-00 BC-D7 BF-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-93 BE-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-D1 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1176: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/104 (104-byte object <69-00 00-00 9C-DB BF-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-EE AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-D5 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1177: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/105 (104-byte object <6A-00 00-00 FC-DF BF-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-BB B2-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-D8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1178: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/106 (104-byte object <6B-00 00-00 CC-E4 BF-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-5D B9-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-DD BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1179: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/107 (104-byte object <6C-00 00-00 9C-E9 BF-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-30 BD-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-E2 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1180: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/108 (104-byte object <6D-00 00-00 30-E5 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-F3 BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-E6 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1181: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/109 (104-byte object <6E-00 00-00 90-E4 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-F4 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-B8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1182: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/110 (104-byte object <6F-00 00-00 50-F3 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-FC BF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-F0 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1183: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/111 (104-byte object <70-00 00-00 30-F4 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-F8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1184: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/112 (104-byte object <71-00 00-00 90-F7 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-04 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-B8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1185: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/113 (104-byte object <72-00 00-00 30-FC BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-00 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-F8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1186: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/114 (104-byte object <73-00 00-00 B0-FF BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-0C C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-F8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1187: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/115 (104-byte object <74-00 00-00 20-04 C0-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-08 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-00 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1188: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/116 (104-byte object <75-00 00-00 A0-07 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-14 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-F8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1189: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/117 (104-byte object <76-00 00-00 10-0C C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-10 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-08 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1190: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/118 (104-byte object <77-00 00-00 90-0F C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-1C C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-00 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1191: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/119 (104-byte object <78-00 00-00 00-14 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-18 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-10 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1192: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/120 (104-byte object <79-00 00-00 80-17 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-24 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-08 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1193: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/121 (104-byte object <7A-00 00-00 F0-1B C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-20 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-18 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1194: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/122 (104-byte object <7B-00 00-00 70-1F C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-2C C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-10 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1195: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/123 (104-byte object <7C-00 00-00 E0-23 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-28 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-20 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1196: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/124 (104-byte object <7D-00 00-00 60-27 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-34 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-18 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1197: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/125 (104-byte object <7E-00 00-00 D0-2B C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-30 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-28 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1198: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/126 (104-byte object <7F-00 00-00 50-2F C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-3C C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-20 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1199: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/127 (104-byte object <80-00 00-00 C0-33 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-38 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-30 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1200: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/128 (104-byte object <81-00 00-00 40-37 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-44 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-28 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1201: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/129 (104-byte object <82-00 00-00 B0-3B C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-40 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-38 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1202: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/130 (104-byte object <83-00 00-00 30-3F C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-54 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-30 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1203: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/131 (104-byte object <84-00 00-00 A0-43 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-50 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-40 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1204: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/132 (104-byte object <85-00 00-00 20-47 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-5C C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-38 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1205: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/133 (104-byte object <86-00 00-00 B0-53 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-58 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-50 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1206: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/134 (104-byte object <87-00 00-00 30-57 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-63 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-40 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1207: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/135 (104-byte object <88-00 00-00 A0-5B C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-60 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-58 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1208: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/136 (104-byte object <89-00 00-00 20-5F C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-6B C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-50 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1209: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/137 (104-byte object <8A-00 00-00 90-63 C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-68 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-5F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1210: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/138 (104-byte object <8B-00 00-00 10-67 C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-73 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-58 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1211: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/139 (104-byte object <8C-00 00-00 80-6B C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-70 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-67 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1212: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/140 (104-byte object <8D-00 00-00 00-6F C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-7B C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-5F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1213: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/141 (104-byte object <8E-00 00-00 70-73 C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-77 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-6F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1214: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/142 (104-byte object <8F-00 00-00 F0-76 C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-83 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-67 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1215: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/143 (104-byte object <90-00 00-00 60-7B C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-7F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-77 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1216: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/144 (104-byte object <91-00 00-00 E0-7E C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-8B C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-6F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1217: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/145 (104-byte object <92-00 00-00 50-83 C0-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-87 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-7F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1218: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/146 (104-byte object <93-00 00-00 A0-87 C0-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-93 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-8F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1219: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/147 (104-byte object <94-00 00-00 C0-8F C0-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-93 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-8F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1220: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/148 (104-byte object <95-00 00-00 80-97 C0-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-9C C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-97 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1221: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/149 (104-byte object <96-00 00-00 90-8F C0-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-97 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-98 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1222: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/150 (104-byte object <97-00 00-00 C0-77 C0-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-A4 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-9F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1223: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/151 (104-byte object <98-00 00-00 10-98 C0-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-9F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A0 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1224: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/152 (104-byte object <99-00 00-00 50-A4 C0-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-AC C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-9F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1225: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/153 (104-byte object <9A-00 00-00 B0-A3 C0-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-A8 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-8F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1226: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/154 (104-byte object <9B-00 00-00 C0-AB C0-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-B3 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A0 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1227: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/155 (104-byte object <9C-00 00-00 A0-AC C0-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-97 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-A8 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1228: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/156 (104-byte object <9D-00 00-00 A0-AF C0-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-BB C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-8F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1229: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/157 (104-byte object <9E-00 00-00 50-B3 C0-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-B7 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-98 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1230: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/158 (104-byte object <9F-00 00-00 D0-B6 C0-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-C3 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-A8 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1231: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/159 (104-byte object <A0-00 00-00 40-BB C0-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-BF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B7 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1232: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/160 (104-byte object <A1-00 00-00 C0-BE C0-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-CB C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-98 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1233: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/161 (104-byte object <A2-00 00-00 30-C3 C0-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-C7 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-BF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 689)' - PASSED gtests.sh: #1234: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/162 (104-byte object <A3-00 00-00 4C-D3 C0-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 A0-B7 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-D3 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1235: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/163 (104-byte object <A4-00 00-00 4C-D6 C0-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 A0-CF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-C7 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1236: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/164 (104-byte object <A5-00 00-00 9C-DA C0-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 90-BF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-CB BF-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-DB C0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1237: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/165 (104-byte object <A6-00 00-00 8C-DF C0-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 30-D7 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-DF C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-CF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1238: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/166 (104-byte object <A7-00 00-00 3C-E3 C0-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 60-CB BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-E0 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-DF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1239: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/167 (104-byte object <A8-00 00-00 CC-E7 C0-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 C0-E3 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-E3 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1240: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/168 (104-byte object <A9-00 00-00 DC-EA C0-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 90-26 BE-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-EB C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-8F BE-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1241: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/169 (104-byte object <AA-00 00-00 9C-EF C0-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-EB C0-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-CF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-53 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1242: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/170 (104-byte object <AB-00 00-00 3C-F3 C0-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 90-26 BE-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-52 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-F3 C0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1243: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/171 (104-byte object <AC-00 00-00 BC-F8 C0-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-EB C0-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-F8 C0-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-E0 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1244: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/172 (104-byte object <AD-00 00-00 6C-FC C0-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 90-26 BE-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-F9 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-E3 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1245: 'HmacSha3256/Pkcs11HmacTest: WycheproofVectors/173 (104-byte object <AE-00 00-00 2C-01 C1-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-EB C0-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-DB C0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-E4 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 689)' - PASSED gtests.sh: #1246: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/0 (104-byte object <01-00 00-00 2C-01 C1-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-01 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1247: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/1 (104-byte object <02-00 00-00 3C-35 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-35 C1-56 02-00 00-00 32-62 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1248: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/2 (104-byte object <03-00 00-00 AC-38 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-38 C1-56 04-00 00-00 35-61 62-64 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1249: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/3 (104-byte object <04-00 00-00 1C-3C C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-3C C1-56 06-00 00-00 63-34 30-35 61-65 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1250: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/4 (104-byte object <05-00 00-00 8C-3F C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-3F C1-56 08-00 00-00 36-36 30-31 63-36 38-33 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1251: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/5 (104-byte object <06-00 00-00 FC-42 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-43 C1-56 0A-00 00-00 31-35 62-32 39-33 37-37 65-30 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1252: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/6 (104-byte object <07-00 00-00 6C-46 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-46 C1-56 0C-00 00-00 35-61 33-34 31-35 35-62 31-31 31-35 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1253: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/7 (104-byte object <08-00 00-00 DC-49 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-4A C1-56 0E-00 00-00 38-61 31-34 30-64 37-38 31-65 37-31 39-31 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1254: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/8 (104-byte object <09-00 00-00 4C-4D C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-17 BB-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1255: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/9 (104-byte object <0A-00 00-00 BC-50 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-4C BB-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1256: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/10 (104-byte object <0B-00 00-00 2C-54 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-D3 B6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1257: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/11 (104-byte object <0C-00 00-00 9C-57 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-54 BB-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1258: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/12 (104-byte object <0D-00 00-00 0C-5B C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-6D BB-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1259: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/13 (104-byte object <0E-00 00-00 7C-5E C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-76 BB-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1260: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/14 (104-byte object <0F-00 00-00 EC-61 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-E6 BF-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1261: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/15 (104-byte object <10-00 00-00 5C-65 C1-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-DD BF-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1262: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/16 (104-byte object <11-00 00-00 CC-68 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-D1 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1263: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/17 (104-byte object <12-00 00-00 CC-6C C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-28 BD-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1264: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/18 (104-byte object <13-00 00-00 3C-70 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-BF B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1265: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/19 (104-byte object <14-00 00-00 AC-73 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-F4 C0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1266: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/20 (104-byte object <15-00 00-00 1C-77 C1-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 D0-2E C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-30 C1-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-30 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1267: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/21 (104-byte object <16-00 00-00 2C-2D C1-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 F0-77 C1-56 60-00 00-00 60-00 00-00 5E-00 00-00 5E-00 00-00 30-64 37-38 60-78 C1-56 60-00 00-00 60-00 00-00 60-00 00-00 60-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 E1-00 00-00 18-A0 BC-56 00-37 BC-F7>, 705)' - PASSED gtests.sh: #1268: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/22 (104-byte object <17-00 00-00 3C-2E C1-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-34 32-37 B0-2D C1-56 60-00 00-00 60-00 00-00 40-00 00-00 70-00 00-00 16-00 00-00 A0-7C C1-56 62-00 00-00 62-00 00-00 20-6D 65-73 73-61 67-65 00-64 66-34 10-7D C1-56 60-00 00-00 60-00 00-00 66-37 36-31 66-64 66-32 37-38 34-30 00-2F C1-56>, 705)' - PASSED gtests.sh: #1269: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/23 (104-byte object <18-00 00-00 BC-2E C1-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 39-31 33-64 39-66 65-35 39-65 32-30 70-F3 AF-56 E0-00 00-00 E0-00 00-00 35-33 34-64 32-35 36-31 31-65 33-36 40-2F C1-56 60-00 00-00 60-00 00-00 65-31 35-33 66-33 38-65 62-30 65-61 00-64 39-39>, 705)' - PASSED gtests.sh: #1270: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/24 (104-byte object <19-00 00-00 CC-87 C1-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-BB B2-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1271: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/25 (104-byte object <1A-00 00-00 EC-8C C1-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-A3 BE-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1272: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/26 (104-byte object <1B-00 00-00 6C-91 C1-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C0 B0-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1273: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/27 (104-byte object <1C-00 00-00 F0-FB BE-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-97 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1274: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/28 (104-byte object <1D-00 00-00 50-0D BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-14 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1275: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/29 (104-byte object <1E-00 00-00 90-C4 BD-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-9D C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1276: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/30 (104-byte object <1F-00 00-00 A0-45 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-87 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1277: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/31 (104-byte object <20-00 00-00 10-C6 BB-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-A4 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1278: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/32 (104-byte object <21-00 00-00 E0-83 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F2 BB-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1279: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/33 (104-byte object <22-00 00-00 70-95 BF-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-AB C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1280: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/34 (104-byte object <23-00 00-00 50-09 B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-A8 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1281: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/35 (104-byte object <24-00 00-00 D0-4D B1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-B2 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1282: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/36 (104-byte object <25-00 00-00 D0-84 B3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-A0 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1283: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/37 (104-byte object <26-00 00-00 90-08 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-B9 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1284: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/38 (104-byte object <27-00 00-00 90-18 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-9C BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1285: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/39 (104-byte object <28-00 00-00 50-28 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-C0 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1286: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/40 (104-byte object <29-00 00-00 40-40 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-04 BF-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1287: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/41 (104-byte object <2A-00 00-00 20-58 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-C7 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1288: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/42 (104-byte object <2B-00 00-00 10-70 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-30 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1289: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/43 (104-byte object <2C-00 00-00 E0-77 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-CE C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1290: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/44 (104-byte object <2D-00 00-00 E0-B7 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-5F C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1291: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/45 (104-byte object <2E-00 00-00 20-D7 C0-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-D5 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1292: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/46 (104-byte object <2F-00 00-00 40-46 BF-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-97 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1293: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/47 (104-byte object <30-00 00-00 D0-B7 BF-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-DE C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1294: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/48 (104-byte object <31-00 00-00 40-D5 C1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-CF C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1295: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/49 (104-byte object <32-00 00-00 50-D9 C1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-E7 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1296: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/50 (104-byte object <33-00 00-00 F0-DD C1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-FA B8-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1297: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/51 (104-byte object <34-00 00-00 00-E2 C1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-EF C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1298: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/52 (104-byte object <35-00 00-00 A0-E6 C1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-D9 C1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1299: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/53 (104-byte object <36-00 00-00 B0-EA C1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-F8 C1-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1300: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/54 (104-byte object <37-00 00-00 50-EF C1-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-E2 C1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1301: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/55 (104-byte object <38-00 00-00 60-F3 C1-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-01 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1302: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/56 (104-byte object <39-00 00-00 00-F8 C1-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-EB C1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1303: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/57 (104-byte object <3A-00 00-00 10-FC C1-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-09 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1304: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/58 (104-byte object <3B-00 00-00 B0-00 C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F4 C1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1305: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/59 (104-byte object <3C-00 00-00 C0-04 C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-12 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1306: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/60 (104-byte object <3D-00 00-00 60-09 C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-FC C1-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1307: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/61 (104-byte object <3E-00 00-00 70-0D C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-1B C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1308: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/62 (104-byte object <3F-00 00-00 10-12 C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-05 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1309: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/63 (104-byte object <40-00 00-00 20-16 C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-23 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1310: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/64 (104-byte object <41-00 00-00 C0-1A C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-0E C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1311: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/65 (104-byte object <42-00 00-00 70-1F C2-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-2C C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1312: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/66 (104-byte object <43-00 00-00 D0-2D C2-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-28 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1313: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/67 (104-byte object <44-00 00-00 60-29 C2-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-35 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1314: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/68 (104-byte object <45-00 00-00 60-31 C2-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-30 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1315: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/69 (104-byte object <46-00 00-00 20-28 C2-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-3E C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1316: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/70 (104-byte object <47-00 00-00 30-3A C2-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-31 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1317: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/71 (104-byte object <48-00 00-00 90-3E C2-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-47 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1318: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/72 (104-byte object <49-00 00-00 F0-3D C2-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-16 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1319: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/73 (104-byte object <4A-00 00-00 C0-46 C2-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-4F C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1320: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/74 (104-byte object <4B-00 00-00 A0-47 C2-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-30 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1321: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/75 (104-byte object <4C-00 00-00 30-4B C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-58 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1322: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/76 (104-byte object <4D-00 00-00 40-4F C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-42 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1323: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/77 (104-byte object <4E-00 00-00 50-53 C2-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-61 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1324: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/78 (104-byte object <4F-00 00-00 F0-57 C2-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-43 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1325: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/79 (104-byte object <50-00 00-00 00-5C C2-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-69 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-2F C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1326: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/80 (104-byte object <51-00 00-00 A0-60 C2-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-53 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1327: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/81 (104-byte object <52-00 00-00 3C-72 C2-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-72 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1328: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/82 (104-byte object <53-00 00-00 2C-75 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-75 C2-56 02-00 00-00 39-66 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1329: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/83 (104-byte object <54-00 00-00 7C-78 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-78 C2-56 04-00 00-00 34-30 34-37 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1330: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/84 (104-byte object <55-00 00-00 CC-7B C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-7B C2-56 06-00 00-00 38-38 63-66 61-62 00-00 00-00 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1331: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/85 (104-byte object <56-00 00-00 4C-7F C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-7F C2-56 08-00 00-00 64-39 33-39 37-37 35-33 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1332: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/86 (104-byte object <57-00 00-00 3C-83 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-83 C2-56 0A-00 00-00 39-62 36-63 63-37 63-61 61-34 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1333: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/87 (104-byte object <58-00 00-00 2C-87 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-87 C2-56 0C-00 00-00 63-38 35-61 64-37 38-37 32-62 37-36 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1334: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/88 (104-byte object <59-00 00-00 1C-8B C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-8B C2-56 0E-00 00-00 38-30 62-61 32-35 66-31 63-32 37-36 35-30 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1335: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/89 (104-byte object <5A-00 00-00 0C-8F C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-87 C2-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1336: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/90 (104-byte object <5B-00 00-00 7C-93 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-86 C2-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1337: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/91 (104-byte object <5C-00 00-00 8C-97 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-8E C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1338: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/92 (104-byte object <5D-00 00-00 9C-9B C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-8F C2-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1339: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/93 (104-byte object <5E-00 00-00 AC-9F C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-93 C2-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1340: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/94 (104-byte object <5F-00 00-00 BC-A3 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-97 C2-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1341: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/95 (104-byte object <60-00 00-00 CC-A7 C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-5C C2-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1342: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/96 (104-byte object <61-00 00-00 1C-AC C2-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-A8 C2-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1343: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/97 (104-byte object <62-00 00-00 3C-B0 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-A9 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1344: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/98 (104-byte object <63-00 00-00 5C-B4 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-AD C2-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0B B3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1345: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/99 (104-byte object <64-00 00-00 7C-B8 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-B8 C2-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1346: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/100 (104-byte object <65-00 00-00 7C-BD C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0F B7-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1347: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/101 (104-byte object <66-00 00-00 4C-C1 C2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-C1 C2-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1348: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/102 (104-byte object <67-00 00-00 FC-C6 C2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 A0-7C C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-C2 C2-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1349: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/103 (104-byte object <68-00 00-00 1C-CB C2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-C1 C2-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1350: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/104 (104-byte object <69-00 00-00 3C-CF C2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-EE AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1351: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/105 (104-byte object <6A-00 00-00 AC-D3 C2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-A3 BE-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1352: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/106 (104-byte object <6B-00 00-00 3C-D8 C2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-BB B2-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1353: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/107 (104-byte object <6C-00 00-00 CC-DC C2-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-EA BF-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1354: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/108 (104-byte object <6D-00 00-00 A0-D8 C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-E6 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1355: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/109 (104-byte object <6E-00 00-00 00-D8 C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-A4 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1356: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/110 (104-byte object <6F-00 00-00 40-E6 C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-EF C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1357: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/111 (104-byte object <70-00 00-00 20-E7 C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-E7 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1358: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/112 (104-byte object <71-00 00-00 B0-EA C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-F8 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1359: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/113 (104-byte object <72-00 00-00 80-EF C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-EB C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1360: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/114 (104-byte object <73-00 00-00 60-F3 C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-00 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1361: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/115 (104-byte object <74-00 00-00 D0-F7 C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-EB C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1362: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/116 (104-byte object <75-00 00-00 B0-FB C2-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-08 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1363: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/117 (104-byte object <76-00 00-00 20-00 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-F4 C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1364: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/118 (104-byte object <77-00 00-00 00-04 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-11 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1365: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/119 (104-byte object <78-00 00-00 70-08 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-FC C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1366: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/120 (104-byte object <79-00 00-00 50-0C C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-19 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1367: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/121 (104-byte object <7A-00 00-00 C0-10 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-04 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1368: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/122 (104-byte object <7B-00 00-00 A0-14 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-21 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1369: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/123 (104-byte object <7C-00 00-00 10-19 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-0C C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1370: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/124 (104-byte object <7D-00 00-00 F0-1C C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-2A C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1371: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/125 (104-byte object <7E-00 00-00 60-21 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-15 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1372: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/126 (104-byte object <7F-00 00-00 40-25 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-32 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1373: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/127 (104-byte object <80-00 00-00 B0-29 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-1D C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1374: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/128 (104-byte object <81-00 00-00 90-2D C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-3A C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1375: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/129 (104-byte object <82-00 00-00 00-32 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-25 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1376: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/130 (104-byte object <83-00 00-00 E0-35 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-4B C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1377: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/131 (104-byte object <84-00 00-00 50-3A C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-2E C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1378: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/132 (104-byte object <85-00 00-00 30-3E C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-53 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1379: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/133 (104-byte object <86-00 00-00 C0-4A C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-36 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1380: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/134 (104-byte object <87-00 00-00 A0-4E C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-5B C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1381: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/135 (104-byte object <88-00 00-00 10-53 C3-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-46 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1382: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/136 (104-byte object <89-00 00-00 F0-56 C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-64 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1383: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/137 (104-byte object <8A-00 00-00 60-5B C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-4F C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1384: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/138 (104-byte object <8B-00 00-00 40-5F C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-6C C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1385: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/139 (104-byte object <8C-00 00-00 B0-63 C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-57 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1386: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/140 (104-byte object <8D-00 00-00 90-67 C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-74 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1387: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/141 (104-byte object <8E-00 00-00 00-6C C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-5F C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1388: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/142 (104-byte object <8F-00 00-00 E0-6F C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-7D C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1389: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/143 (104-byte object <90-00 00-00 50-74 C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-68 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1390: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/144 (104-byte object <91-00 00-00 30-78 C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-85 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1391: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/145 (104-byte object <92-00 00-00 A0-7C C3-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-70 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1392: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/146 (104-byte object <93-00 00-00 20-81 C3-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-8D C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1393: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/147 (104-byte object <94-00 00-00 C0-8E C3-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-89 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1394: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/148 (104-byte object <95-00 00-00 80-8A C3-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-96 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1395: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/149 (104-byte object <96-00 00-00 50-92 C3-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-91 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1396: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/150 (104-byte object <97-00 00-00 70-89 C3-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-9E C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1397: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/151 (104-byte object <98-00 00-00 C0-9A C3-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-92 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1398: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/152 (104-byte object <99-00 00-00 F0-9E C3-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-A7 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1399: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/153 (104-byte object <9A-00 00-00 50-9E C3-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-78 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1400: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/154 (104-byte object <9B-00 00-00 C0-A6 C3-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-AF C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1401: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/155 (104-byte object <9C-00 00-00 A0-A7 C3-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-91 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1402: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/156 (104-byte object <9D-00 00-00 00-AB C3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-B7 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1403: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/157 (104-byte object <9E-00 00-00 E0-AE C3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-A2 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1404: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/158 (104-byte object <9F-00 00-00 C0-B2 C3-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-BF C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1405: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/159 (104-byte object <A0-00 00-00 30-B7 C3-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-A3 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1406: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/160 (104-byte object <A1-00 00-00 10-BB C3-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-C8 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1407: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/161 (104-byte object <A2-00 00-00 80-BF C3-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-B3 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 705)' - PASSED gtests.sh: #1408: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/162 (104-byte object <A3-00 00-00 5C-D0 C3-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-D0 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1409: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/163 (104-byte object <A4-00 00-00 BC-D3 C3-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-BB C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1410: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/164 (104-byte object <A5-00 00-00 0C-D8 C3-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-F4 C0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-2D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1411: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/165 (104-byte object <A6-00 00-00 1C-DC C3-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 E0-B8 C2-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-DC C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-DC C3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1412: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/166 (104-byte object <A7-00 00-00 AC-E0 C3-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 90-70 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-C4 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-DC C3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1413: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/167 (104-byte object <A8-00 00-00 FC-E4 C3-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 E0-B8 C2-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0F B7-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-DC C3-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1414: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/168 (104-byte object <A9-00 00-00 DC-E8 C3-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 F0-EB C0-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-E9 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1415: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/169 (104-byte object <AA-00 00-00 0C-EE C3-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-E9 C3-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-D5 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-7D C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1416: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/170 (104-byte object <AB-00 00-00 DC-F2 C3-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 F0-EB C0-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-F4 C0-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-78 C1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1417: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/171 (104-byte object <AC-00 00-00 3C-F7 C3-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-E9 C3-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-F7 C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-BF B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1418: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/172 (104-byte object <AD-00 00-00 DC-FA C3-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 F0-EB C0-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-E2 C3-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-79 B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1419: 'HmacSha3384/Pkcs11HmacTest: WycheproofVectors/173 (104-byte object <AE-00 00-00 3C-FF C3-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-E9 C3-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-0F B7-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-BF B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 705)' - PASSED gtests.sh: #1420: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/0 (104-byte object <01-00 00-00 3C-FF C3-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-FF C3-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1421: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/1 (104-byte object <02-00 00-00 9C-2A C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-2A C4-56 02-00 00-00 30-31 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1422: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/2 (104-byte object <03-00 00-00 4C-2E C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-2E C4-56 04-00 00-00 61-37 38-66 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1423: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/3 (104-byte object <04-00 00-00 FC-31 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-32 C4-56 06-00 00-00 65-39 35-36 63-31 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1424: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/4 (104-byte object <05-00 00-00 AC-35 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-35 C4-56 08-00 00-00 62-32 61-61 34-38 62-33 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1425: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/5 (104-byte object <06-00 00-00 5C-39 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-39 C4-56 0A-00 00-00 62-63 39-39 33-62 31-64 62-30 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1426: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/6 (104-byte object <07-00 00-00 0C-3D C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-3D C4-56 0C-00 00-00 66-30 33-36 31-64 35-38 32-39 31-65 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1427: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/7 (104-byte object <08-00 00-00 BC-40 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-40 C4-56 0E-00 00-00 65-31 38-64 61-33 65-62 66-30 66-66 61-34 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1428: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/8 (104-byte object <09-00 00-00 6C-44 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-BC C3-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1429: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/9 (104-byte object <0A-00 00-00 1C-48 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-A2 C3-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1430: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/10 (104-byte object <0B-00 00-00 CC-4B C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-CC C3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1431: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/11 (104-byte object <0C-00 00-00 7C-4F C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-D1 BF-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1432: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/12 (104-byte object <0D-00 00-00 2C-53 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-AB BA-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1433: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/13 (104-byte object <0E-00 00-00 DC-56 C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-CB BF-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1434: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/14 (104-byte object <0F-00 00-00 8C-5A C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-A8 C0-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1435: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/15 (104-byte object <10-00 00-00 3C-5E C4-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-67 C0-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1436: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/16 (104-byte object <11-00 00-00 EC-61 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-38 C0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1437: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/17 (104-byte object <12-00 00-00 9C-65 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-FC C1-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1438: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/18 (104-byte object <13-00 00-00 6C-6A C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-BF B8-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1439: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/19 (104-byte object <14-00 00-00 1C-6E C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-F3 B8-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1440: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/20 (104-byte object <15-00 00-00 CC-71 C4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-41 B6-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1441: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/21 (104-byte object <16-00 00-00 7C-75 C4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-4D B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1442: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/22 (104-byte object <17-00 00-00 2C-79 C4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-41 B6-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1443: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/23 (104-byte object <18-00 00-00 DC-7C C4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-F3 AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1444: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/24 (104-byte object <19-00 00-00 7C-81 C4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-A3 BE-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1445: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/25 (104-byte object <1A-00 00-00 4C-87 C4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-88 C1-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1446: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/26 (104-byte object <1B-00 00-00 0C-8C C4-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-C0 B0-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1447: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/27 (104-byte object <1C-00 00-00 A0-5C C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-91 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1448: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/28 (104-byte object <1D-00 00-00 C0-A0 C2-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-0F C2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1449: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/29 (104-byte object <1E-00 00-00 70-18 B7-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-99 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1450: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/30 (104-byte object <1F-00 00-00 D0-0D B5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-D7 BA-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1451: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/31 (104-byte object <20-00 00-00 F0-0E B3-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-A1 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1452: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/32 (104-byte object <21-00 00-00 20-F6 B8-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-3D B2-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1453: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/33 (104-byte object <22-00 00-00 E0-B8 C2-56 14-00 00-00 14-00 00-00 31-30 31-31 31-32 31-33 31-34 31-35 F0-24 C4-56 80-00 00-00 80-00 00-00 31-63 31-64 31-65 31-66 32-30 32-31 6C-22 C4-56 00-00 00-00 00-36 32-37 32-38 32-39 32-61 32-62 32-63 32-64 10-26 C4-56 80-00 00-00 80-00 00-00 33-34 33-35 33-36 33-37 33-38 33-39 01-61 33-62>, 721)' - PASSED gtests.sh: #1454: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/34 (104-byte object <23-00 00-00 00-A1 C4-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-B6 B0-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1455: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/35 (104-byte object <24-00 00-00 50-A5 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-B2 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1456: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/36 (104-byte object <25-00 00-00 30-AA C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-85 BE-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1457: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/37 (104-byte object <26-00 00-00 70-AD C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-BB C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1458: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/38 (104-byte object <27-00 00-00 50-B2 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-A5 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1459: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/39 (104-byte object <28-00 00-00 A0-B6 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-C5 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1460: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/40 (104-byte object <29-00 00-00 80-BB C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-AE C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1461: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/41 (104-byte object <2A-00 00-00 D0-BF C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-CE C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1462: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/42 (104-byte object <2B-00 00-00 B0-C4 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-B7 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1463: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/43 (104-byte object <2C-00 00-00 00-C9 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-D7 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1464: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/44 (104-byte object <2D-00 00-00 E0-CD C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-C0 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1465: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/45 (104-byte object <2E-00 00-00 30-D2 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-E0 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1466: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/46 (104-byte object <2F-00 00-00 10-D7 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-C9 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1467: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/47 (104-byte object <30-00 00-00 60-DB C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-E9 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1468: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/48 (104-byte object <31-00 00-00 40-E0 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-D2 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1469: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/49 (104-byte object <32-00 00-00 90-E4 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-F3 C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1470: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/50 (104-byte object <33-00 00-00 70-E9 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-DC C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1471: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/51 (104-byte object <34-00 00-00 C0-ED C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-FC C4-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1472: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/52 (104-byte object <35-00 00-00 A0-F2 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-E5 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1473: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/53 (104-byte object <36-00 00-00 F0-F6 C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-05 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1474: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/54 (104-byte object <37-00 00-00 D0-FB C4-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-EE C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1475: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/55 (104-byte object <38-00 00-00 20-00 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-0E C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1476: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/56 (104-byte object <39-00 00-00 00-05 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-F7 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1477: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/57 (104-byte object <3A-00 00-00 50-09 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-17 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1478: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/58 (104-byte object <3B-00 00-00 30-0E C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-00 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1479: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/59 (104-byte object <3C-00 00-00 80-12 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-20 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1480: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/60 (104-byte object <3D-00 00-00 60-17 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-09 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1481: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/61 (104-byte object <3E-00 00-00 B0-1B C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-2A C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1482: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/62 (104-byte object <3F-00 00-00 90-20 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-13 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1483: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/63 (104-byte object <40-00 00-00 E0-24 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-33 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1484: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/64 (104-byte object <41-00 00-00 C0-29 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-1C C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1485: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/65 (104-byte object <42-00 00-00 B0-2E C5-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-3C C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1486: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/66 (104-byte object <43-00 00-00 10-3E C5-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-37 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1487: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/67 (104-byte object <44-00 00-00 60-39 C5-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-46 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1488: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/68 (104-byte object <45-00 00-00 A0-41 C5-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-41 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1489: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/69 (104-byte object <46-00 00-00 E0-37 C5-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-4F C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1490: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/70 (104-byte object <47-00 00-00 F0-4A C5-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-41 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1491: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/71 (104-byte object <48-00 00-00 90-4F C5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-58 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1492: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/72 (104-byte object <49-00 00-00 F0-4E C5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-25 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1493: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/73 (104-byte object <4A-00 00-00 40-58 C5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-61 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1494: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/74 (104-byte object <4B-00 00-00 20-59 C5-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-41 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1495: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/75 (104-byte object <4C-00 00-00 F0-5C C5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-6A C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1496: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/76 (104-byte object <4D-00 00-00 40-61 C5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-53 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1497: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/77 (104-byte object <4E-00 00-00 90-65 C5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-74 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1498: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/78 (104-byte object <4F-00 00-00 70-6A C5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-54 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1499: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/79 (104-byte object <50-00 00-00 C0-6E C5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-7D C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-26 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1500: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/80 (104-byte object <51-00 00-00 A0-73 C5-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-66 C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1501: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/81 (104-byte object <52-00 00-00 3C-86 C5-56 0D-00 00-00 65-6D 70-74 79-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-86 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1502: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/82 (104-byte object <53-00 00-00 3C-89 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 6C-89 C5-56 02-00 00-00 64-38 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1503: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/83 (104-byte object <54-00 00-00 9C-8C C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-8C C5-56 04-00 00-00 63-61 64-32 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1504: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/84 (104-byte object <55-00 00-00 FC-8F C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-90 C5-56 06-00 00-00 64-33 33-39 33-63 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1505: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/85 (104-byte object <56-00 00-00 8C-93 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 BC-93 C5-56 08-00 00-00 62-65 62-62 30-33 39-32 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1506: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/86 (104-byte object <57-00 00-00 AC-97 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-97 C5-56 0A-00 00-00 34-30 61-33 33-33 66-34 63-66 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1507: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/87 (104-byte object <58-00 00-00 CC-9B C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-9B C5-56 0C-00 00-00 34-63 66-39 32-36 61-66 34-37 35-61 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1508: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/88 (104-byte object <59-00 00-00 EC-9F C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 1C-A0 C5-56 0E-00 00-00 32-62 61-33 62-63 33-63 64-36 34-62 63-36 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1509: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/89 (104-byte object <5A-00 00-00 0C-A4 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-9C C5-56 10-00 00-00 10-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1510: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/90 (104-byte object <5B-00 00-00 AC-A8 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-9B C5-56 12-00 00-00 12-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1511: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/91 (104-byte object <5C-00 00-00 EC-AC C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-A3 C5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1512: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/92 (104-byte object <5D-00 00-00 2C-B1 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-A4 C5-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1513: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/93 (104-byte object <5E-00 00-00 6C-B5 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-A8 C5-56 18-00 00-00 18-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1514: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/94 (104-byte object <5F-00 00-00 AC-B9 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-AC C5-56 1A-00 00-00 1A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1515: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/95 (104-byte object <60-00 00-00 EC-BD C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-6F C5-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1516: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/96 (104-byte object <61-00 00-00 6C-C2 C5-56 0D-00 00-00 73-68 6F-72 74-20 6D-65 73-73 61-67 65-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-BE C5-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1517: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/97 (104-byte object <62-00 00-00 BC-C6 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-BF C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1518: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/98 (104-byte object <63-00 00-00 0C-CB C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-C4 C5-56 22-00 00-00 22-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1519: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/99 (104-byte object <64-00 00-00 5C-CF C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-5D AF-56 30-00 00-00 30-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-A9 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1520: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/100 (104-byte object <65-00 00-00 8C-D3 C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-D3 C5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1521: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/101 (104-byte object <66-00 00-00 0C-D9 C5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-D9 B5-56 5E-00 00-00 5E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1522: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/102 (104-byte object <67-00 00-00 1C-DD C5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-4D B1-56 60-00 00-00 60-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1523: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/103 (104-byte object <68-00 00-00 5C-E1 C5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-D9 B5-56 62-00 00-00 62-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1524: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/104 (104-byte object <69-00 00-00 9C-E5 C5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-EE AF-56 E0-00 00-00 E0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1525: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/105 (104-byte object <6A-00 00-00 5C-EA C5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-88 C1-56 FE-00 00-00 FE-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1526: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/106 (104-byte object <6B-00 00-00 8C-EF C5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-A3 BE-56 00-01 00-00 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1527: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/107 (104-byte object <6C-00 00-00 BC-F4 C5-56 0C-00 00-00 6C-6F 6E-67 20-6D 65-73 73-61 67-65 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-DD C2-56 FE-01 00-00 FE-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1528: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/108 (104-byte object <6D-00 00-00 F0-EF C5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-FF C5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1529: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/109 (104-byte object <6E-00 00-00 50-EF C5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-BA C5-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1530: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/110 (104-byte object <6F-00 00-00 D0-FE C5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-08 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1531: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/111 (104-byte object <70-00 00-00 B0-FF C5-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-00 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1532: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/112 (104-byte object <71-00 00-00 70-03 C6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-11 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1533: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/113 (104-byte object <72-00 00-00 70-08 C6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-04 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1534: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/114 (104-byte object <73-00 00-00 80-0C C6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-1A C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1535: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/115 (104-byte object <74-00 00-00 20-11 C6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-04 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1536: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/116 (104-byte object <75-00 00-00 30-15 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-22 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1537: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/117 (104-byte object <76-00 00-00 D0-19 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-0D C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1538: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/118 (104-byte object <77-00 00-00 E0-1D C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-2B C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1539: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/119 (104-byte object <78-00 00-00 80-22 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-15 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1540: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/120 (104-byte object <79-00 00-00 90-26 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-34 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1541: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/121 (104-byte object <7A-00 00-00 30-2B C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-1E C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1542: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/122 (104-byte object <7B-00 00-00 40-2F C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-3C C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1543: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/123 (104-byte object <7C-00 00-00 E0-33 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-27 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1544: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/124 (104-byte object <7D-00 00-00 F0-37 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-45 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1545: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/125 (104-byte object <7E-00 00-00 90-3C C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-2F C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1546: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/126 (104-byte object <7F-00 00-00 A0-40 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-4E C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1547: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/127 (104-byte object <80-00 00-00 40-45 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-38 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1548: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/128 (104-byte object <81-00 00-00 50-49 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 0C-57 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1549: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/129 (104-byte object <82-00 00-00 F0-4D C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-41 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1550: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/130 (104-byte object <83-00 00-00 00-52 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-67 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1551: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/131 (104-byte object <84-00 00-00 A0-56 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-49 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1552: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/132 (104-byte object <85-00 00-00 B0-5A C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-70 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1553: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/133 (104-byte object <86-00 00-00 70-67 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-52 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1554: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/134 (104-byte object <87-00 00-00 80-6B C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-79 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1555: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/135 (104-byte object <88-00 00-00 20-70 C6-56 15-00 00-00 15-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-63 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1556: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/136 (104-byte object <89-00 00-00 30-74 C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 EC-81 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1557: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/137 (104-byte object <8A-00 00-00 D0-78 C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-6C C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1558: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/138 (104-byte object <8B-00 00-00 E0-7C C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 9C-8A C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1559: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/139 (104-byte object <8C-00 00-00 80-81 C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-74 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1560: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/140 (104-byte object <8D-00 00-00 90-85 C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 4C-93 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1561: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/141 (104-byte object <8E-00 00-00 30-8A C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-7D C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1562: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/142 (104-byte object <8F-00 00-00 40-8E C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-9B C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1563: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/143 (104-byte object <90-00 00-00 E0-92 C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 30-86 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1564: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/144 (104-byte object <91-00 00-00 F0-96 C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 AC-A4 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1565: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/145 (104-byte object <92-00 00-00 90-9B C6-56 16-00 00-00 16-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-8E C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1566: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/146 (104-byte object <93-00 00-00 40-A0 C6-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-AD C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1567: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/147 (104-byte object <94-00 00-00 A0-AE C6-56 1C-00 00-00 1C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-A8 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1568: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/148 (104-byte object <95-00 00-00 30-AA C6-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-B6 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1569: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/149 (104-byte object <96-00 00-00 30-B2 C6-56 1D-00 00-00 1D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B1 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1570: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/150 (104-byte object <97-00 00-00 F0-A8 C6-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-BF C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1571: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/151 (104-byte object <98-00 00-00 00-BB C6-56 1E-00 00-00 1E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-B2 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1572: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/152 (104-byte object <99-00 00-00 60-BF C6-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 FC-C7 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1573: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/153 (104-byte object <9A-00 00-00 C0-BE C6-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-97 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1574: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/154 (104-byte object <9B-00 00-00 90-C7 C6-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 7C-D0 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1575: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/155 (104-byte object <9C-00 00-00 70-C8 C6-56 17-00 00-00 17-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B1 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1576: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/156 (104-byte object <9D-00 00-00 00-CC C6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-D9 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1577: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/157 (104-byte object <9E-00 00-00 10-D0 C6-56 14-00 00-00 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-C3 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1578: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/158 (104-byte object <9F-00 00-00 20-D4 C6-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 DC-E1 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1579: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/159 (104-byte object <A0-00 00-00 C0-D8 C6-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-C3 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1580: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/160 (104-byte object <A1-00 00-00 D0-DC C6-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 8C-EA C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1581: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/161 (104-byte object <A2-00 00-00 70-E1 C6-56 13-00 00-00 13-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-D4 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>, 721)' - PASSED gtests.sh: #1582: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/162 (104-byte object <A3-00 00-00 0C-F3 C6-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 20-A6 B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 3C-F3 C6-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1583: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/163 (104-byte object <A4-00 00-00 9C-F6 C6-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-DD C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-24 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1584: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/164 (104-byte object <A5-00 00-00 1C-FB C6-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 F0-D3 C5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-FB C6-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1585: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/165 (104-byte object <A6-00 00-00 9C-00 C7-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 70-AA B2-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 CC-00 C7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-FB C6-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1586: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/166 (104-byte object <A7-00 00-00 4C-04 C7-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 F0-D3 C5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-E6 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-FB C6-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1587: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/167 (104-byte object <A8-00 00-00 BC-08 C7-56 09-00 00-00 73-68 6F-72 74-20 6B-65 79-00 00-00 00-00 00-00 F0-FB C6-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-FC C6-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 90-FC C6-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1588: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/168 (104-byte object <A9-00 00-00 FC-0D C7-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-24 C4-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 2C-0E C7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1589: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/169 (104-byte object <AA-00 00-00 5C-13 C7-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 F0-FB C6-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-F8 C6-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-0E C7-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1590: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/170 (104-byte object <AB-00 00-00 FC-17 C7-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-24 C4-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-D3 C5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-23 C4-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1591: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/171 (104-byte object <AC-00 00-00 2C-1C C7-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 B0-22 C4-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 5C-1C C7-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-FB C6-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1592: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/172 (104-byte object <AD-00 00-00 3C-1F C7-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 60-24 C4-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-06 C7-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-D3 C5-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1593: 'HmacSha3512/Pkcs11HmacTest: WycheproofVectors/173 (104-byte object <AE-00 00-00 0C-23 C7-56 08-00 00-00 6C-6F 6E-67 20-6B 65-79 00-00 00-00 00-00 00-00 B0-22 C4-56 82-00 00-00 82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-09 C7-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-23 C7-56 40-00 00-00 40-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00>, 721)' - PASSED gtests.sh: #1594: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/0 (108-byte object <01-00 00-00 90-30 B2-56 16-00 00-00 16-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 F0-05 B2-56 1A-00 00-00 1A-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 30-56 B1-56 14-00 00-00 14-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 60-EB C0-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1595: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/1 (108-byte object <01-00 00-00 90-64 B0-56 16-00 00-00 16-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 10-94 BE-56 1A-00 00-00 1A-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 70-A0 B7-56 14-00 00-00 14-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 C0-EB C0-56 54-00 00-00 54-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 2A-00 00-00 01-64 38-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1596: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/2 (108-byte object <01-00 00-00 A0-FF C3-56 16-00 00-00 16-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 C0-62 B3-56 1A-00 00-00 1A-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 E0-62 B3-56 14-00 00-00 14-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 60-EB C0-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1597: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/3 (108-byte object <01-00 00-00 20-4A B9-56 16-00 00-00 16-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 C0-EB BF-56 1A-00 00-00 1A-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 10-3B BE-56 14-00 00-00 14-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 C0-EB C0-56 54-00 00-00 54-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 2A-00 00-00 01-64 38-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1598: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/4 (108-byte object <01-00 00-00 10-84 B0-56 16-00 00-00 16-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 B0-FC C1-56 1A-00 00-00 1A-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 D0-0F BB-56 14-00 00-00 14-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 60-EB C0-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1599: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/5 (108-byte object <01-00 00-00 60-C4 B0-56 16-00 00-00 16-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 10-94 BE-56 1A-00 00-00 1A-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 90-64 B0-56 14-00 00-00 14-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 C0-EB C0-56 54-00 00-00 54-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 2A-00 00-00 01-64 38-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1600: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/6 (108-byte object <02-00 00-00 80-BE B7-56 A0-00 00-00 A0-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 50-4C B2-56 A0-00 00-00 A0-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 00-4D B2-56 A0-00 00-00 A0-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 B0-4D B2-56 A4-00 00-00 A4-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 52-00 00-00 01-32 36-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1601: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/7 (108-byte object <02-00 00-00 60-4E B2-56 A0-00 00-00 A0-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 10-4F B2-56 A0-00 00-00 A0-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 F0-D3 BA-56 A0-00 00-00 A0-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 A0-D4 BA-56 A4-00 00-00 A4-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 52-00 00-00 01-64 38-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1602: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/8 (108-byte object <02-00 00-00 80-BE B7-56 A0-00 00-00 A0-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 50-4C B2-56 A0-00 00-00 A0-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 00-4D B2-56 A0-00 00-00 A0-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 B0-4D B2-56 A4-00 00-00 A4-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 52-00 00-00 01-32 36-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1603: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/9 (108-byte object <02-00 00-00 60-4E B2-56 A0-00 00-00 A0-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 10-4F B2-56 A0-00 00-00 A0-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 F0-D3 BA-56 A0-00 00-00 A0-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 A0-D4 BA-56 A4-00 00-00 A4-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 52-00 00-00 01-64 38-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1604: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/10 (108-byte object <02-00 00-00 80-BE B7-56 A0-00 00-00 A0-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 50-4C B2-56 A0-00 00-00 A0-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 00-4D B2-56 A0-00 00-00 A0-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 B0-4D B2-56 A4-00 00-00 A4-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 52-00 00-00 01-32 36-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1605: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/11 (108-byte object <02-00 00-00 60-4E B2-56 A0-00 00-00 A0-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 10-4F B2-56 A0-00 00-00 A0-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 F0-D3 BA-56 A0-00 00-00 A0-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 A0-D4 BA-56 A4-00 00-00 A4-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 52-00 00-00 01-64 38-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1606: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/12 (108-byte object <03-00 00-00 90-76 B3-56 2C-00 00-00 2C-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1607: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/13 (108-byte object <03-00 00-00 80-B6 B0-56 2C-00 00-00 2C-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 68-62 B3-56 00-00 00-00 00-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 80-62 B3-56 00-00 00-00 00-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 60-EB C0-56 54-00 00-00 54-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 2A-00 00-00 01-64 38-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1608: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/14 (108-byte object <03-00 00-00 90-76 B3-56 2C-00 00-00 2C-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1609: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/15 (108-byte object <03-00 00-00 80-B6 B0-56 2C-00 00-00 2C-00 00-00 61-65 35-30 30-30 32-64 30-32 36-66 68-62 B3-56 00-00 00-00 00-00 00-00 65-39 39-39 38-64 64-30 32-33 32-31 80-62 B3-56 00-00 00-00 00-00 00-00 32-65 38-32 34-62 33-37 65-39 66-35 60-EB C0-56 54-00 00-00 54-00 00-00 30-62 65-64 64-35 35-32 64-31 30-35 2A-00 00-00 01-64 38-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1610: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/16 (108-byte object <03-00 00-00 90-76 B3-56 2C-00 00-00 2C-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1611: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/17 (108-byte object <03-00 00-00 80-B6 B0-56 2C-00 00-00 2C-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 60-EB C0-56 54-00 00-00 54-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 2A-00 00-00 01-00 00-00>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1612: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/18 (108-byte object <04-00 00-00 90-76 B3-56 2C-00 00-00 2C-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1613: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/19 (108-byte object <04-00 00-00 80-B6 B0-56 2C-00 00-00 2C-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 60-EB C0-56 54-00 00-00 54-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 2A-00 00-00 01-00 00-00>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1614: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/20 (108-byte object <04-00 00-00 90-76 B3-56 2C-00 00-00 2C-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1615: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/21 (108-byte object <04-00 00-00 80-B6 B0-56 2C-00 00-00 2C-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 60-EB C0-56 54-00 00-00 54-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 2A-00 00-00 01-00 00-00>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1616: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/22 (108-byte object <04-00 00-00 90-76 B3-56 2C-00 00-00 2C-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1617: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/23 (108-byte object <04-00 00-00 80-B6 B0-56 2C-00 00-00 2C-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 60-EB C0-56 54-00 00-00 54-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 2A-00 00-00 01-00 00-00>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1618: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/24 (108-byte object <05-00 00-00 C0-13 C7-56 20-00 00-00 20-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 A0-C9 C4-56 28-00 00-00 28-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 14-00 00-00 01-32 36-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1619: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/25 (108-byte object <05-00 00-00 10-F9 C4-56 20-00 00-00 20-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 00-DC C4-56 28-00 00-00 28-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 14-00 00-00 01-00 00-00>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1620: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/26 (108-byte object <05-00 00-00 40-02 C5-56 20-00 00-00 20-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 E0-EF C4-56 28-00 00-00 28-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 14-00 00-00 01-32 36-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1621: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/27 (108-byte object <05-00 00-00 00-DC C4-56 20-00 00-00 20-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 C0-00 C5-56 28-00 00-00 28-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 14-00 00-00 01-00 00-00>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1622: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/28 (108-byte object <05-00 00-00 10-3E C5-56 20-00 00-00 20-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 60-39 C5-56 28-00 00-00 28-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 14-00 00-00 01-32 36-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1623: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/29 (108-byte object <05-00 00-00 C0-00 C5-56 20-00 00-00 20-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 B0-2E C5-56 28-00 00-00 28-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 14-00 00-00 01-00 00-00>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1624: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/30 (108-byte object <06-00 00-00 70-C0 C4-56 20-00 00-00 20-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 C0-EB C0-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1625: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/31 (108-byte object <06-00 00-00 B0-2E C5-56 20-00 00-00 20-00 00-00 F0-12 C4-56 80-00 00-00 80-00 00-00 E8-7A BE-56 00-00 00-00 00-00 00-00 10-FD B7-56 20-00 00-00 20-00 00-00 00-7B BE-56 00-00 00-00 00-00 00-00 50-FB BD-56 40-00 00-00 40-00 00-00 20-20 BA-56 54-00 00-00 54-00 00-00 01-00 00-00 95-00 00-00 F0-B3 B7-56 2A-00 00-00 01-00 00-00>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1626: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/32 (108-byte object <06-00 00-00 E0-EF C4-56 20-00 00-00 20-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 C0-EB C0-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1627: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/33 (108-byte object <06-00 00-00 50-A1 C5-56 20-00 00-00 20-00 00-00 09-00 00-00 0A-00 00-00 0B-00 00-00 58-7A BE-56 00-00 00-00 00-00 00-00 0F-00 00-00 10-00 00-00 11-00 00-00 70-7A BE-56 00-00 00-00 00-00 00-00 15-00 00-00 16-00 00-00 17-00 00-00 20-20 BA-56 54-00 00-00 54-00 00-00 1B-00 00-00 1C-00 00-00 1D-00 00-00 2A-00 00-00 01-00 00-00>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1628: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/34 (108-byte object <06-00 00-00 C0-8E C3-56 20-00 00-00 20-00 00-00 64-38 62-37 36-36 33-30 36-35 30-63 98-BC B2-56 00-00 00-00 00-00 00-00 65-63 39-31 38-39 39-31 35-35 36-30 B0-BC B2-56 00-00 00-00 00-00 00-00 38-35 39-35 37-64 38-37 36-32 39-31 C0-EB C0-56 54-00 00-00 54-00 00-00 36-66 34-33 38-64 30-36 36-32 32-37 2A-00 00-00 01-32 36-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1629: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/35 (108-byte object <06-00 00-00 F0-94 C5-56 20-00 00-00 20-00 00-00 09-00 00-00 0A-00 00-00 0B-00 00-00 58-7A BE-56 00-00 00-00 00-00 00-00 0F-00 00-00 10-00 00-00 11-00 00-00 70-7A BE-56 00-00 00-00 00-00 00-00 15-00 00-00 16-00 00-00 17-00 00-00 20-20 BA-56 54-00 00-00 54-00 00-00 1B-00 00-00 1C-00 00-00 1D-00 00-00 2A-00 00-00 01-00 00-00>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1630: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/36 (108-byte object <07-00 00-00 C0-81 C5-56 20-00 00-00 20-00 00-00 60-D7 BA-56 90-EB B5-56 40-E3 B8-56 68-62 B3-56 00-00 00-00 00-4D B2-56 B0-4D B2-56 80-E9 B8-56 70-EF B8-56 80-62 B3-56 00-00 00-00 00-04 C4-56 E0-07 C4-56 B0-0B C4-56 80-0F C4-56 B0-7A BE-56 80-00 00-00 80-00 00-00 40-1C C4-56 70-1F C4-56 40-78 C7-56 40-00 00-00 01-7D C7-56>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1631: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/37 (108-byte object <07-00 00-00 60-39 C5-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 70-7A BE-56 00-00 00-00 00-31 61-36 61-30 34-39 37-36 31-64 66-63 32-38 10-8C C7-56 80-00 00-00 80-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 40-00 00-00 01-36 65-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1632: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/38 (108-byte object <07-00 00-00 B0-8D C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 68-62 B3-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 80-62 B3-56 00-00 00-00 00-31 61-36 61-30 34-39 37-36 31-64 66-63 32-38 B0-7A BE-56 80-00 00-00 80-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 40-00 00-00 01-36 65-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1633: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/39 (108-byte object <07-00 00-00 D0-91 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 70-7A BE-56 00-00 00-00 00-31 61-36 61-30 34-39 37-36 31-64 66-63 32-38 10-8C C7-56 80-00 00-00 80-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 40-00 00-00 01-36 65-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1634: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/40 (108-byte object <07-00 00-00 F0-95 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 68-62 B3-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 80-62 B3-56 00-00 00-00 00-31 61-36 61-30 34-39 37-36 31-64 66-63 32-38 B0-7A BE-56 80-00 00-00 80-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 40-00 00-00 01-36 65-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1635: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/41 (108-byte object <07-00 00-00 10-9A C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 70-7A BE-56 00-00 00-00 00-31 61-36 61-30 34-39 37-36 31-64 66-63 32-38 10-8C C7-56 80-00 00-00 80-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 40-00 00-00 01-36 65-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1636: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/42 (108-byte object <08-00 00-00 30-9D C5-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 98-BC B2-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 B0-A4 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 E0-A4 C7-56 28-00 00-00 28-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 14-00 00-00 01-36 65-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1637: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/43 (108-byte object <08-00 00-00 90-A5 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 C0-A5 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 F0-A5 C7-56 28-00 00-00 28-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 14-00 00-00 01-36 65-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1638: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/44 (108-byte object <08-00 00-00 B0-A4 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 98-BC B2-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 E0-A4 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 50-A6 C7-56 28-00 00-00 28-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 14-00 00-00 01-36 65-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1639: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/45 (108-byte object <08-00 00-00 C0-A5 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 F0-A5 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 80-A6 C7-56 28-00 00-00 28-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 14-00 00-00 01-36 65-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1640: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/46 (108-byte object <08-00 00-00 E0-A4 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 98-BC B2-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 50-A6 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 70-AA C7-56 28-00 00-00 28-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 14-00 00-00 01-36 65-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1641: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/47 (108-byte object <08-00 00-00 F0-A5 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 80-A6 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 60-AE C7-56 28-00 00-00 28-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 14-00 00-00 01-36 65-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1642: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/48 (108-byte object <09-00 00-00 70-AA C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 98-BC B2-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 50-B2 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 60-EB C0-56 54-00 00-00 54-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 2A-00 00-00 01-36 65-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1643: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/49 (108-byte object <09-00 00-00 80-A6 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 60-AE C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 C0-EB C0-56 54-00 00-00 54-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 2A-00 00-00 01-36 65-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1644: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/50 (108-byte object <09-00 00-00 50-B2 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 98-BC B2-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 20-A6 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 60-EB C0-56 54-00 00-00 54-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 2A-00 00-00 01-36 65-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1645: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/51 (108-byte object <09-00 00-00 60-AE C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 30-9E C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 C0-EB C0-56 54-00 00-00 54-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 2A-00 00-00 01-36 65-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1646: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/52 (108-byte object <09-00 00-00 20-A6 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 98-BC B2-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 A0-C5 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 60-EB C0-56 54-00 00-00 54-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 2A-00 00-00 01-36 65-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1647: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/53 (108-byte object <09-00 00-00 30-9E C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 58-7A BE-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 C0-C9 C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 C0-EB C0-56 54-00 00-00 54-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 2A-00 00-00 01-36 65-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1648: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/54 (108-byte object <0A-00 00-00 A0-C5 C7-56 20-00 00-00 20-00 00-00 31-63 64-30 38-35 66-64 39-35 31-64 48-8C C7-56 00-00 00-00 00-64 65-64 30-38 32-65 38-34 37-38 63-39 66-38 E0-CD C7-56 28-00 00-00 28-00 00-00 61-30 34-39 37-36 31-64 66-63 32-38 30-62 B3-56 80-00 00-00 80-00 00-00 32-36 38-33 33-63 36-35 35-39 34-38 40-00 00-00 01-36 65-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1649: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/55 (108-byte object <0A-00 00-00 C0-C9 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 58-7A BE-56 00-00 00-00 00-37 64-33 34-38 65-65 37-64 35-30 61-34 62-64 00-D2 C7-56 28-00 00-00 28-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 B0-7A BE-56 80-00 00-00 80-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 40-00 00-00 01-66 33-64>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1650: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/56 (108-byte object <0A-00 00-00 E0-CD C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 48-8C C7-56 00-00 00-00 00-37 64-33 34-38 65-65 37-64 35-30 61-34 62-64 20-D6 C7-56 28-00 00-00 28-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 30-62 B3-56 80-00 00-00 80-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 40-00 00-00 01-66 33-64>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1651: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/57 (108-byte object <0A-00 00-00 00-D2 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 58-7A BE-56 00-00 00-00 00-37 64-33 34-38 65-65 37-64 35-30 61-34 62-64 70-DA C7-56 28-00 00-00 28-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 B0-7A BE-56 80-00 00-00 80-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 40-00 00-00 01-66 33-64>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1652: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/58 (108-byte object <0A-00 00-00 20-D6 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 48-8C C7-56 00-00 00-00 00-37 64-33 34-38 65-65 37-64 35-30 61-34 62-64 C0-DE C7-56 28-00 00-00 28-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 30-62 B3-56 80-00 00-00 80-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 40-00 00-00 01-66 33-64>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1653: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/59 (108-byte object <0A-00 00-00 70-DA C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 58-7A BE-56 00-00 00-00 00-37 64-33 34-38 65-65 37-64 35-30 61-34 62-64 10-E3 C7-56 28-00 00-00 28-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 B0-7A BE-56 80-00 00-00 80-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 40-00 00-00 01-66 33-64>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1654: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/60 (108-byte object <0B-00 00-00 60-E7 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 B0-EB C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 B0-BC B2-56 00-00 00-00 00-36 65-65 66-66 38-33 61-62 61-39 65-38 62-38 40-B6 C7-56 28-00 00-00 28-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 14-00 00-00 01-66 33-64>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1655: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/61 (108-byte object <0B-00 00-00 10-E3 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 00-F0 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 70-7A BE-56 00-00 00-00 00-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 30-F0 C7-56 28-00 00-00 28-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 14-00 00-00 01-66 33-64>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1656: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/62 (108-byte object <0B-00 00-00 B0-EB C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 40-B6 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 B0-BC B2-56 00-00 00-00 00-36 65-65 66-66 38-33 61-62 61-39 65-38 62-38 90-F0 C7-56 28-00 00-00 28-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 14-00 00-00 01-66 33-64>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1657: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/63 (108-byte object <0B-00 00-00 00-F0 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 30-F0 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 70-7A BE-56 00-00 00-00 00-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 C0-F0 C7-56 28-00 00-00 28-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 14-00 00-00 01-66 33-64>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1658: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/64 (108-byte object <0B-00 00-00 40-B6 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 90-F0 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 B0-BC B2-56 00-00 00-00 00-36 65-65 66-66 38-33 61-62 61-39 65-38 62-38 B0-F4 C7-56 28-00 00-00 28-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 14-00 00-00 01-66 33-64>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1659: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/65 (108-byte object <0B-00 00-00 30-F0 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 C0-F0 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 70-7A BE-56 00-00 00-00 00-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 A0-F8 C7-56 28-00 00-00 28-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 14-00 00-00 01-66 33-64>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1660: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/66 (108-byte object <0C-00 00-00 B0-F4 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 90-FC C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 B0-BC B2-56 00-00 00-00 00-36 65-65 66-66 38-33 61-62 61-39 65-38 62-38 20-20 BA-56 54-00 00-00 54-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 2A-00 00-00 01-66 33-64>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1661: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/67 (108-byte object <0C-00 00-00 C0-F0 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 A0-F8 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 70-7A BE-56 00-00 00-00 00-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 60-EB C0-56 54-00 00-00 54-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 2A-00 00-00 01-66 33-64>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1662: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/68 (108-byte object <0C-00 00-00 90-FC C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 60-F0 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 B0-BC B2-56 00-00 00-00 00-36 65-65 66-66 38-33 61-62 61-39 65-38 62-38 20-20 BA-56 54-00 00-00 54-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 2A-00 00-00 01-66 33-64>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1663: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/69 (108-byte object <0C-00 00-00 A0-F8 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 50-A6 C7-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 70-7A BE-56 00-00 00-00 00-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 60-EB C0-56 54-00 00-00 54-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 2A-00 00-00 01-66 33-64>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1664: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/70 (108-byte object <0C-00 00-00 60-F0 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 E0-0F C8-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 B0-BC B2-56 00-00 00-00 00-36 65-65 66-66 38-33 61-62 61-39 65-38 62-38 20-20 BA-56 54-00 00-00 54-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 2A-00 00-00 01-66 33-64>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1665: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/71 (108-byte object <0C-00 00-00 50-A6 C7-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 00-14 C8-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 70-7A BE-56 00-00 00-00 00-00 00-00 66-66 38-33 61-62 61-39 65-38 62-38 60-EB C0-56 54-00 00-00 54-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 2A-00 00-00 01-66 33-64>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1666: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/72 (108-byte object <0D-00 00-00 E0-0F C8-56 20-00 00-00 20-00 00-00 30-62 61-30 35-62 39-32 65-37 61-62 20-18 C8-56 20-00 00-00 20-00 00-00 34-38 65-65 37-64 35-30 61-34 62-64 00-7B BE-56 00-00 00-00 00-36 65-65 66-66 38-33 61-62 61-39 65-38 62-38 10-8C C7-56 80-00 00-00 80-00 00-00 38-31 31-64 36-32 37-37 31-33 33-36 40-00 00-00 01-66 33-64>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1667: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/73 (108-byte object <0D-00 00-00 00-14 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 40-1C C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 70-7A BE-56 00-00 00-00 00-36 30-38 39-33 32-34 31-37 36-35 62-31 39-35 30-62 B3-56 80-00 00-00 80-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 40-00 00-00 01-35 35-65>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1668: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/74 (108-byte object <0D-00 00-00 20-18 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 60-20 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 00-7B BE-56 00-00 00-00 00-36 30-38 39-33 32-34 31-37 36-35 62-31 39-35 10-8C C7-56 80-00 00-00 80-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 40-00 00-00 01-35 35-65>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1669: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/75 (108-byte object <0D-00 00-00 40-1C C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 B0-24 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 70-7A BE-56 00-00 00-00 00-36 30-38 39-33 32-34 31-37 36-35 62-31 39-35 30-62 B3-56 80-00 00-00 80-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 40-00 00-00 01-35 35-65>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1670: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/76 (108-byte object <0D-00 00-00 60-20 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 00-29 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 00-7B BE-56 00-00 00-00 00-36 30-38 39-33 32-34 31-37 36-35 62-31 39-35 10-8C C7-56 80-00 00-00 80-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 40-00 00-00 01-35 35-65>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1671: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/77 (108-byte object <0D-00 00-00 B0-24 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 50-2D C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 70-7A BE-56 00-00 00-00 00-36 30-38 39-33 32-34 31-37 36-35 62-31 39-35 30-62 B3-56 80-00 00-00 80-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 40-00 00-00 01-35 35-65>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1672: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/78 (108-byte object <0E-00 00-00 F0-35 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 80-00 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 C0-39 C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 F0-39 C8-56 28-00 00-00 28-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 14-00 00-00 01-35 35-65>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1673: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/79 (108-byte object <0E-00 00-00 A0-3A C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 D0-3A C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 00-3B C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 60-3B C8-56 28-00 00-00 28-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 14-00 00-00 01-35 35-65>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1674: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/80 (108-byte object <0E-00 00-00 C0-39 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 F0-39 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 30-3B C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 C0-3B C8-56 28-00 00-00 28-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 14-00 00-00 01-35 35-65>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1675: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/81 (108-byte object <0E-00 00-00 00-3B C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 60-3B C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 90-3B C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 E0-3F C8-56 28-00 00-00 28-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 14-00 00-00 01-35 35-65>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1676: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/82 (108-byte object <0E-00 00-00 30-3B C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 C0-3B C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 50-2D C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 00-44 C8-56 28-00 00-00 28-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 14-00 00-00 01-35 35-65>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1677: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/83 (108-byte object <0E-00 00-00 90-3B C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 E0-3F C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 80-00 C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 20-48 C8-56 28-00 00-00 28-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 14-00 00-00 01-35 35-65>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1678: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/84 (108-byte object <0F-00 00-00 40-4C C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 F0-39 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 60-3B C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 C0-EB C0-56 54-00 00-00 54-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 2A-00 00-00 01-35 35-65>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1679: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/85 (108-byte object <0F-00 00-00 E0-3F C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 80-00 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 20-48 C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 20-20 BA-56 54-00 00-00 54-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 2A-00 00-00 01-35 35-65>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1680: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/86 (108-byte object <0F-00 00-00 F0-39 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 60-3B C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 C0-DE C7-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 C0-EB C0-56 54-00 00-00 54-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 2A-00 00-00 01-35 35-65>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1681: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/87 (108-byte object <0F-00 00-00 80-00 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 20-48 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 C0-3B C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 20-20 BA-56 54-00 00-00 54-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 2A-00 00-00 01-35 35-65>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1682: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/88 (108-byte object <0F-00 00-00 60-3B C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 C0-DE C7-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 10-58 C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 C0-EB C0-56 54-00 00-00 54-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 2A-00 00-00 01-35 35-65>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1683: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/89 (108-byte object <0F-00 00-00 20-48 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 C0-3B C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 60-5C C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 20-20 BA-56 54-00 00-00 54-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 2A-00 00-00 01-35 35-65>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1684: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/90 (108-byte object <10-00 00-00 B0-60 C8-56 20-00 00-00 20-00 00-00 63-66 36-61 62-34 35-64 34-38 30-35 00-65 C8-56 20-00 00-00 20-00 00-00 37-33 65-66 65-64 34-62 34-32 31-66 60-50 C8-56 28-00 00-00 28-00 00-00 39-33 32-34 31-37 36-35 62-31 39-35 B0-7A BE-56 80-00 00-00 80-00 00-00 30-64 37-64 39-34 61-30 35-33 61-39 40-00 00-00 01-35 35-65>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1685: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/91 (108-byte object <10-00 00-00 C0-3B C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 60-5C C8-56 20-00 00-00 20-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 50-69 C8-56 28-00 00-00 28-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 10-8C C7-56 80-00 00-00 80-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 40-00 00-00 01-33 64-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1686: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/92 (108-byte object <10-00 00-00 00-65 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 60-50 C8-56 20-00 00-00 20-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 00-44 C8-56 28-00 00-00 28-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 B0-7A BE-56 80-00 00-00 80-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 40-00 00-00 01-33 64-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1687: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/93 (108-byte object <10-00 00-00 60-5C C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 50-69 C8-56 20-00 00-00 20-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 A0-6D C8-56 28-00 00-00 28-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 10-8C C7-56 80-00 00-00 80-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 40-00 00-00 01-33 64-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1688: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/94 (108-byte object <10-00 00-00 60-50 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-44 C8-56 20-00 00-00 20-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 20-72 C8-56 28-00 00-00 28-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 B0-7A BE-56 80-00 00-00 80-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 40-00 00-00 01-33 64-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1689: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/95 (108-byte object <10-00 00-00 50-69 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 A0-6D C8-56 20-00 00-00 20-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 A0-76 C8-56 28-00 00-00 28-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 10-8C C7-56 80-00 00-00 80-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 40-00 00-00 01-33 64-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1690: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/96 (108-byte object <11-00 00-00 20-72 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-63 B3-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 B0-BC B2-56 00-00 00-00 00-38 61-65 30-61 61-32 31-30 32-63 33-63 37-61 20-7B C8-56 28-00 00-00 28-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 14-00 00-00 01-33 64-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1691: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/97 (108-byte object <11-00 00-00 A0-6D C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 A0-88 C8-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 70-7A BE-56 00-00 00-00 00-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 A0-76 C8-56 28-00 00-00 28-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 14-00 00-00 01-33 64-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1692: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/98 (108-byte object <11-00 00-00 20-7B C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-63 B3-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 B0-BC B2-56 00-00 00-00 00-38 61-65 30-61 61-32 31-30 32-63 33-63 37-61 50-2D C8-56 28-00 00-00 28-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 14-00 00-00 01-33 64-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1693: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/99 (108-byte object <11-00 00-00 A0-76 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 A0-88 C8-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 70-7A BE-56 00-00 00-00 00-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 C0-DE C7-56 28-00 00-00 28-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 14-00 00-00 01-33 64-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1694: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/100 (108-byte object <11-00 00-00 50-2D C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-63 B3-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 B0-BC B2-56 00-00 00-00 00-38 61-65 30-61 61-32 31-30 32-63 33-63 37-61 A0-90 C8-56 28-00 00-00 28-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 14-00 00-00 01-33 64-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1695: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/101 (108-byte object <11-00 00-00 C0-DE C7-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 A0-88 C8-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 70-7A BE-56 00-00 00-00 00-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 B0-94 C8-56 28-00 00-00 28-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 14-00 00-00 01-33 64-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1696: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/102 (108-byte object <12-00 00-00 00-44 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-63 B3-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 B0-BC B2-56 00-00 00-00 00-38 61-65 30-61 61-32 31-30 32-63 33-63 37-61 60-EB C0-56 54-00 00-00 54-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 2A-00 00-00 01-33 64-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1697: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/103 (108-byte object <12-00 00-00 B0-94 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 A0-88 C8-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 70-7A BE-56 00-00 00-00 00-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 C0-EB C0-56 54-00 00-00 54-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 2A-00 00-00 01-33 64-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1698: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/104 (108-byte object <12-00 00-00 D0-9C C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-63 B3-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 B0-BC B2-56 00-00 00-00 00-38 61-65 30-61 61-32 31-30 32-63 33-63 37-61 60-EB C0-56 54-00 00-00 54-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 2A-00 00-00 01-33 64-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1699: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/105 (108-byte object <12-00 00-00 F0-A5 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 A0-88 C8-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 70-7A BE-56 00-00 00-00 00-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 C0-EB C0-56 54-00 00-00 54-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 2A-00 00-00 01-33 64-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1700: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/106 (108-byte object <12-00 00-00 30-AA C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-63 B3-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 B0-BC B2-56 00-00 00-00 00-38 61-65 30-61 61-32 31-30 32-63 33-63 37-61 60-EB C0-56 54-00 00-00 54-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 2A-00 00-00 01-33 64-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1701: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/107 (108-byte object <12-00 00-00 70-AE C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 A0-88 C8-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 70-7A BE-56 00-00 00-00 00-00 00-00 30-61 61-32 31-30 32-63 33-63 37-61 C0-EB C0-56 54-00 00-00 54-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 2A-00 00-00 01-33 64-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1702: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/108 (108-byte object <13-00 00-00 B0-B2 C8-56 20-00 00-00 20-00 00-00 66-39 30-31 61-64 33-33 66-36 31-34 00-63 B3-56 3C-00 00-00 3C-00 00-00 34-65 30-30 39-30 36-61 61-31 34-62 60-8C C7-56 00-00 00-00 00-38 61-65 30-61 61-32 31-30 32-63 33-63 37-61 30-62 B3-56 80-00 00-00 80-00 00-00 38-39 31-39 32-61 36-32 63-61 30-63 40-00 00-00 01-33 64-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1703: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/109 (108-byte object <13-00 00-00 F0-B6 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 70-7A BE-56 00-00 00-00 00-61 34-64 63-62 64-39 66-61 63-34 64-33 61-35 B0-7A BE-56 80-00 00-00 80-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 40-00 00-00 01-65 65-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1704: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/110 (108-byte object <13-00 00-00 60-BB C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 60-8C C7-56 00-00 00-00 00-61 34-64 63-62 64-39 66-61 63-34 64-33 61-35 30-62 B3-56 80-00 00-00 80-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 40-00 00-00 01-65 65-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1705: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/111 (108-byte object <13-00 00-00 D0-BF C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 70-7A BE-56 00-00 00-00 00-61 34-64 63-62 64-39 66-61 63-34 64-33 61-35 B0-7A BE-56 80-00 00-00 80-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 40-00 00-00 01-65 65-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1706: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/112 (108-byte object <13-00 00-00 40-C4 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 60-8C C7-56 00-00 00-00 00-61 34-64 63-62 64-39 66-61 63-34 64-33 61-35 30-62 B3-56 80-00 00-00 80-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 40-00 00-00 01-65 65-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1707: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/113 (108-byte object <13-00 00-00 B0-C8 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 70-7A BE-56 00-00 00-00 00-61 34-64 63-62 64-39 66-61 63-34 64-33 61-35 B0-7A BE-56 80-00 00-00 80-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 40-00 00-00 01-65 65-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1708: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/114 (108-byte object <14-00 00-00 A0-90 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 F0-D3 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 20-D4 C8-56 28-00 00-00 28-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 14-00 00-00 01-65 65-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1709: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/115 (108-byte object <14-00 00-00 D0-D4 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 00-D5 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 30-D5 C8-56 28-00 00-00 28-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 14-00 00-00 01-65 65-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1710: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/116 (108-byte object <14-00 00-00 F0-D3 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 20-D4 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 90-D5 C8-56 28-00 00-00 28-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 14-00 00-00 01-65 65-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1711: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/117 (108-byte object <14-00 00-00 00-D5 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 30-D5 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 C0-D5 C8-56 28-00 00-00 28-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 14-00 00-00 01-65 65-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1712: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/118 (108-byte object <14-00 00-00 20-D4 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 90-D5 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 00-DA C8-56 28-00 00-00 28-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 14-00 00-00 01-65 65-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1713: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/119 (108-byte object <14-00 00-00 30-D5 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 C0-D5 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 40-DE C8-56 28-00 00-00 28-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 14-00 00-00 01-65 65-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1714: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/120 (108-byte object <15-00 00-00 00-DA C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 80-E2 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 20-20 BA-56 54-00 00-00 54-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 2A-00 00-00 01-65 65-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1715: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/121 (108-byte object <15-00 00-00 C0-D5 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 40-DE C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 60-EB C0-56 54-00 00-00 54-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 2A-00 00-00 01-65 65-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1716: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/122 (108-byte object <15-00 00-00 80-E2 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 60-D5 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 20-20 BA-56 54-00 00-00 54-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 2A-00 00-00 01-65 65-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1717: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/123 (108-byte object <15-00 00-00 40-DE C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 20-CD C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 60-EB C0-56 54-00 00-00 54-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 2A-00 00-00 01-65 65-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1718: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/124 (108-byte object <15-00 00-00 60-D5 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 60-F7 C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 20-20 BA-56 54-00 00-00 54-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 2A-00 00-00 01-65 65-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1719: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/125 (108-byte object <15-00 00-00 20-CD C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 A0-88 C8-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 D0-FB C8-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 60-EB C0-56 54-00 00-00 54-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 2A-00 00-00 01-65 65-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1720: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/126 (108-byte object <16-00 00-00 60-F7 C8-56 20-00 00-00 20-00 00-00 65-39 66-35 65-36 61-61 61-64 35-66 00-63 B3-56 3C-00 00-00 3C-00 00-00 36-66 38-61 36-37 37-30 30-39 37-64 40-00 C9-56 28-00 00-00 28-00 00-00 63-62 64-39 66-61 63-34 64-33 61-35 10-8C C7-56 80-00 00-00 80-00 00-00 66-37 30-65 39-65 38-32 63-61 30-33 40-00 00-00 01-65 65-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1721: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/127 (108-byte object <16-00 00-00 D0-FB C8-56 20-00 00-00 20-00 00-00 65-39 62-32 64-32 61-35 63-31 63-65 A0-88 C8-56 3C-00 00-00 3C-00 00-00 37-34 30-33 61-36 37-33 32-36 63-64 B0-04 C9-56 28-00 00-00 28-00 00-00 38-62 37-33 34-39 30-33 64-31 30-62 30-62 B3-56 80-00 00-00 80-00 00-00 32-66 63-37 30-65 64-33 38-33 61-36 40-00 00-00 01-62 34-38>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1722: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/128 (108-byte object <16-00 00-00 40-00 C9-56 20-00 00-00 20-00 00-00 65-39 62-32 64-32 61-35 63-31 63-65 00-63 B3-56 3C-00 00-00 3C-00 00-00 37-34 30-33 61-36 37-33 32-36 63-64 20-09 C9-56 28-00 00-00 28-00 00-00 38-62 37-33 34-39 30-33 64-31 30-62 10-8C C7-56 80-00 00-00 80-00 00-00 32-66 63-37 30-65 64-33 38-33 61-36 40-00 00-00 01-62 34-38>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1723: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/129 (108-byte object <16-00 00-00 B0-04 C9-56 20-00 00-00 20-00 00-00 65-39 62-32 64-32 61-35 63-31 63-65 A0-88 C8-56 3C-00 00-00 3C-00 00-00 37-34 30-33 61-36 37-33 32-36 63-64 C0-0D C9-56 28-00 00-00 28-00 00-00 38-62 37-33 34-39 30-33 64-31 30-62 30-62 B3-56 80-00 00-00 80-00 00-00 32-66 63-37 30-65 64-33 38-33 61-36 40-00 00-00 01-62 34-38>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1724: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/130 (108-byte object <16-00 00-00 20-09 C9-56 20-00 00-00 20-00 00-00 65-39 62-32 64-32 61-35 63-31 63-65 00-63 B3-56 3C-00 00-00 3C-00 00-00 37-34 30-33 61-36 37-33 32-36 63-64 60-12 C9-56 28-00 00-00 28-00 00-00 38-62 37-33 34-39 30-33 64-31 30-62 10-8C C7-56 80-00 00-00 80-00 00-00 32-66 63-37 30-65 64-33 38-33 61-36 40-00 00-00 01-62 34-38>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1725: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/131 (108-byte object <16-00 00-00 C0-0D C9-56 20-00 00-00 20-00 00-00 65-39 62-32 64-32 61-35 63-31 63-65 A0-88 C8-56 3C-00 00-00 3C-00 00-00 37-34 30-33 61-36 37-33 32-36 63-64 20-1F C9-56 28-00 00-00 28-00 00-00 38-62 37-33 34-39 30-33 64-31 30-62 30-62 B3-56 80-00 00-00 80-00 00-00 32-66 63-37 30-65 64-33 38-33 61-36 40-00 00-00 01-62 34-38>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1726: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/132 (108-byte object <17-00 00-00 90-D5 C8-56 20-00 00-00 20-00 00-00 65-39 62-32 64-32 61-35 63-31 63-65 10-8C C7-56 80-00 00-00 80-00 00-00 37-34 30-33 61-36 37-33 32-36 63-64 00-7B BE-56 00-00 00-00 00-32 65-62 38-62 37-33 34-39 30-33 64-31 30-62 C0-EB C0-56 54-00 00-00 54-00 00-00 32-66 63-37 30-65 64-33 38-33 61-36 2A-00 00-00 01-62 34-38>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1727: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/133 (108-byte object <17-00 00-00 20-1F C9-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 30-62 B3-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 70-7A BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 20-20 BA-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1728: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/134 (108-byte object <17-00 00-00 60-28 C9-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 10-8C C7-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-7B BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 C0-EB C0-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1729: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/135 (108-byte object <17-00 00-00 90-32 C9-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 30-62 B3-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 70-7A BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 20-20 BA-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1730: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/136 (108-byte object <17-00 00-00 10-37 C9-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 10-8C C7-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-7B BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 C0-EB C0-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1731: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/137 (108-byte object <17-00 00-00 90-3B C9-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 30-62 B3-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 70-7A BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 20-20 BA-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1732: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/138 (108-byte object <18-00 00-00 90-44 C9-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 10-8C C7-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 60-12 C9-56 28-00 00-00 28-00 00-00 64-61 38-66 61-38 65-64 37-61 38-32 C0-EB C0-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1733: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/139 (108-byte object <18-00 00-00 70-47 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 30-62 B3-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 A0-47 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 20-20 BA-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1734: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/140 (108-byte object <18-00 00-00 60-12 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 10-8C C7-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 00-48 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C0-EB C0-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1735: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/141 (108-byte object <18-00 00-00 A0-47 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 30-62 B3-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 B0-4C C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 20-20 BA-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1736: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/142 (108-byte object <18-00 00-00 00-48 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 10-8C C7-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 60-51 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C0-EB C0-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1737: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/143 (108-byte object <18-00 00-00 B0-4C C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 30-62 B3-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 10-56 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 20-20 BA-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1738: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/144 (108-byte object <19-00 00-00 60-51 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 C0-5A C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 10-5F C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-8B C9-56 D8-27 00-00 D8-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 EC-13 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1739: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/145 (108-byte object <19-00 00-00 10-56 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 70-5F C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 F0-5E C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 20-B4 C9-56 D8-27 00-00 D8-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 EC-13 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1740: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/146 (108-byte object <19-00 00-00 C0-5A C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 60-B3 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 A0-B3 C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-8B C9-56 D8-27 00-00 D8-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 EC-13 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1741: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/147 (108-byte object <19-00 00-00 70-5F C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 30-5F C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-DE C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 20-B4 C9-56 D8-27 00-00 D8-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 EC-13 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1742: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/148 (108-byte object <19-00 00-00 60-B3 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-E3 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 80-E2 C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-8B C9-56 D8-27 00-00 D8-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 EC-13 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1743: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/149 (108-byte object <19-00 00-00 30-5F C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 E0-E6 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 60-E6 C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 20-B4 C9-56 D8-27 00-00 D8-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 EC-13 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1744: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/150 (108-byte object <1A-00 00-00 00-E3 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 90-B3 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 40-5A C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C8-BC B2-56 00-00 00-00 00-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 ED-13 00-00 00-66 30-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1745: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/151 (108-byte object <1A-00 00-00 E0-E6 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 90-EE C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 10-EE C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 88-7A BE-56 00-00 00-00 00-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 ED-13 00-00 00-66 30-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1746: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/152 (108-byte object <1A-00 00-00 90-B3 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 70-F2 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 F0-F1 C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C8-BC B2-56 00-00 00-00 00-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 ED-13 00-00 00-66 30-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1747: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/153 (108-byte object <1A-00 00-00 90-EE C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-F6 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 D0-F5 C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 88-7A BE-56 00-00 00-00 00-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 ED-13 00-00 00-66 30-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1748: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/154 (108-byte object <1A-00 00-00 70-F2 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 30-FA C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 B0-F9 C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C8-BC B2-56 00-00 00-00 00-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 ED-13 00-00 00-66 30-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1749: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/155 (108-byte object <1A-00 00-00 50-F6 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 10-FE C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-FD C9-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 88-7A BE-56 00-00 00-00 00-27 00-00 33-66 65-38 34-61 31-61 36-36 32-31 ED-13 00-00 00-66 30-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1750: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/156 (108-byte object <1B-00 00-00 30-FA C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 98-BC B2-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 F0-01 CA-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1751: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/157 (108-byte object <1B-00 00-00 10-FE C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 58-7A BE-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 B0-03 CA-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-63 B3-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1752: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/158 (108-byte object <1B-00 00-00 F0-01 CA-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 98-BC B2-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 B0-B9 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1753: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/159 (108-byte object <1B-00 00-00 B0-03 CA-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 58-7A BE-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 C0-BD C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-63 B3-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1754: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/160 (108-byte object <1B-00 00-00 B0-B9 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 98-BC B2-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 D0-C1 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1755: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/161 (108-byte object <1B-00 00-00 C0-BD C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 58-7A BE-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-C5 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-63 B3-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1756: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/162 (108-byte object <1C-00 00-00 F0-C9 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-CE C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 D0-47 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1757: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/163 (108-byte object <1C-00 00-00 E0-C5 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 10-D2 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 40-D2 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-63 B3-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1758: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/164 (108-byte object <1C-00 00-00 00-CE C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 D0-47 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 A0-D2 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1759: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/165 (108-byte object <1C-00 00-00 10-D2 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-D2 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 D0-D2 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-63 B3-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1760: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/166 (108-byte object <1C-00 00-00 D0-47 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 A0-D2 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 10-D7 C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1761: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/167 (108-byte object <1C-00 00-00 40-D2 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 D0-D2 C9-56 28-00 00-00 28-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 50-DB C9-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-63 B3-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1762: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/168 (108-byte object <1D-00 00-00 10-D7 C9-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 B0-7A BE-56 82-00 00-00 82-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 30-30 CA-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1763: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/169 (108-byte object <1D-00 00-00 D0-D2 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-8C C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-DB C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1764: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/170 (108-byte object <1D-00 00-00 30-30 CA-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-7A BE-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-D2 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1765: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/171 (108-byte object <1D-00 00-00 50-DB C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-8C C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-40 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1766: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/172 (108-byte object <1D-00 00-00 70-D2 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-7A BE-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-45 CA-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1767: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/173 (108-byte object <1D-00 00-00 10-40 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-8C C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-4A CA-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1768: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/174 (108-byte object <1E-00 00-00 B0-4E CA-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-53 CA-56 28-00 00-00 28-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-34 CA-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1769: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/175 (108-byte object <1E-00 00-00 10-4A CA-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-67 C9-56 28-00 00-00 28-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-67 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1770: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/176 (108-byte object <1E-00 00-00 50-53 CA-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-34 CA-56 28-00 00-00 28-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-67 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1771: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/177 (108-byte object <1E-00 00-00 10-67 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-67 C9-56 28-00 00-00 28-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 D0-67 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1772: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/178 (108-byte object <1E-00 00-00 70-34 CA-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-67 C9-56 28-00 00-00 28-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-6C C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1773: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/179 (108-byte object <1E-00 00-00 40-67 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 D0-67 C9-56 28-00 00-00 28-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-70 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1774: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/180 (108-byte object <1F-00 00-00 10-6C C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-7C C9-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 90-74 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1775: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/181 (108-byte object <1F-00 00-00 D0-67 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 90-7C C9-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-70 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1776: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/182 (108-byte object <1F-00 00-00 90-74 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-81 C9-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-67 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1777: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/183 (108-byte object <1F-00 00-00 50-70 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-84 C9-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-D2 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1778: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/184 (108-byte object <1F-00 00-00 70-67 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-88 C9-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-89 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1779: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/185 (108-byte object <1F-00 00-00 A0-D2 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E0-8C C9-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-8D C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1780: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/186 (108-byte object <20-00 00-00 90-91 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 C0-95 C9-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 D0-78 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1781: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/187 (108-byte object <20-00 00-00 60-8D C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-99 C9-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 E0-99 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1782: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/188 (108-byte object <20-00 00-00 C0-95 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 D0-78 C9-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-9A C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1783: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/189 (108-byte object <20-00 00-00 B0-99 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E0-99 C9-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-9A C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1784: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/190 (108-byte object <20-00 00-00 D0-78 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-9A C9-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-9E C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1785: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/191 (108-byte object <20-00 00-00 E0-99 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-9A C9-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-A2 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1786: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/192 (108-byte object <21-00 00-00 B0-9E C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-FC C6-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-A7 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1787: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/193 (108-byte object <21-00 00-00 70-9A C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 90-76 B3-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-A2 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1788: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/194 (108-byte object <21-00 00-00 30-A7 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-FC C6-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-9A C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1789: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/195 (108-byte object <21-00 00-00 F0-A2 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 90-76 B3-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-67 C9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1790: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/196 (108-byte object <21-00 00-00 10-9A C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-FC C6-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-24 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1791: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/197 (108-byte object <21-00 00-00 A0-67 C9-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 90-76 B3-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-28 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1792: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/198 (108-byte object <22-00 00-00 60-24 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-88 C8-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-2D CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 20-35 CB-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1793: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/199 (108-byte object <22-00 00-00 B0-28 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-63 B3-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-31 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 F0-35 CB-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1794: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/200 (108-byte object <22-00 00-00 00-2D CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-88 C8-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 90-36 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 20-35 CB-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1795: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/201 (108-byte object <22-00 00-00 50-31 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-63 B3-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-3B CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 F0-35 CB-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1796: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/202 (108-byte object <22-00 00-00 90-36 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-88 C8-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-3F CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 20-35 CB-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1797: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/203 (108-byte object <22-00 00-00 40-3B CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-63 B3-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-44 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 F0-35 CB-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1798: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/204 (108-byte object <23-00 00-00 A0-3F CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-EB C0-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-48 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1799: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/205 (108-byte object <23-00 00-00 00-44 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 C0-EB C0-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-4C CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1800: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/206 (108-byte object <23-00 00-00 60-48 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-EB C0-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 20-51 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1801: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/207 (108-byte object <23-00 00-00 C0-4C CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 C0-EB C0-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-55 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1802: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/208 (108-byte object <23-00 00-00 20-51 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-EB C0-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-59 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1803: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/209 (108-byte object <23-00 00-00 40-55 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 C0-EB C0-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 80-5D CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1804: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/210 (108-byte object <24-00 00-00 60-59 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-4D B1-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-61 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1805: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/211 (108-byte object <24-00 00-00 80-5D CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-82 B0-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-66 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1806: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/212 (108-byte object <24-00 00-00 A0-61 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-4D B1-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-6A CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1807: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/213 (108-byte object <24-00 00-00 10-66 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-82 B0-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-6F CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1808: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/214 (108-byte object <24-00 00-00 F0-6A CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-4D B1-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-73 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1809: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/215 (108-byte object <24-00 00-00 70-6F CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-82 B0-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-78 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1810: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/216 (108-byte object <25-00 00-00 F0-73 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-85 CB-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-7C CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1811: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/217 (108-byte object <25-00 00-00 70-78 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-86 CB-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-81 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1812: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/218 (108-byte object <25-00 00-00 F0-7C CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-85 CB-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-87 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1813: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/219 (108-byte object <25-00 00-00 70-81 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-86 CB-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 80-8C CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1814: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/220 (108-byte object <25-00 00-00 F0-87 CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-85 CB-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-91 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-E8 B8-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1815: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/221 (108-byte object <25-00 00-00 80-8C CB-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-86 CB-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-95 CB-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-63 B3-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1816: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/222 (108-byte object <26-00 00-00 10-91 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 98-BC B2-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-BC B2-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 30-9A CB-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1817: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/223 (108-byte object <26-00 00-00 A0-95 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 58-7A BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-7A BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 C0-9E CB-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1818: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/224 (108-byte object <26-00 00-00 30-9A CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 98-BC B2-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-BC B2-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-A3 CB-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1819: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/225 (108-byte object <26-00 00-00 C0-9E CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 58-7A BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-7A BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 90-A6 CB-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1820: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/226 (108-byte object <26-00 00-00 50-A3 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 98-BC B2-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-BC B2-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 D0-A9 CB-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1821: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/227 (108-byte object <26-00 00-00 90-A6 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 58-7A BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-7A BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 10-AD CB-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1822: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/228 (108-byte object <27-00 00-00 40-9A C9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 98-BC B2-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-BC B2-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 20-20 BA-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1823: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/229 (108-byte object <27-00 00-00 10-AD CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 58-7A BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-7A BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 60-EB C0-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1824: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/230 (108-byte object <27-00 00-00 10-B4 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 98-BC B2-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-BC B2-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 20-20 BA-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1825: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/231 (108-byte object <27-00 00-00 40-BC CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 58-7A BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-7A BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 60-EB C0-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1826: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/232 (108-byte object <27-00 00-00 30-C0 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 98-BC B2-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-BC B2-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 20-20 BA-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1827: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/233 (108-byte object <27-00 00-00 20-C4 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 58-7A BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-7A BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 60-EB C0-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1828: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/234 (108-byte object <28-00 00-00 10-C8 CB-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 48-8C C7-56 00-00 00-00 00-33 32-31 33-38 61-31 62-64 34-33 36-61 37-62 60-8C C7-56 00-00 00-00 00-34 63-37 65-64 30-61 30-30 62-30 64-33 34-65 30-62 B3-56 80-00 00-00 80-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 40-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1829: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/235 (108-byte object <28-00 00-00 00-CC CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 70-7A BE-56 00-00 00-00 00-30 62-39 66-37 32-36 30-36 62-62 39-38 30-63 B0-7A BE-56 80-00 00-00 80-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 40-00 00-00 01-66 65-30>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1830: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/236 (108-byte object <28-00 00-00 20-D0 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 48-8C C7-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 60-8C C7-56 00-00 00-00 00-30 62-39 66-37 32-36 30-36 62-62 39-38 30-63 30-62 B3-56 80-00 00-00 80-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 40-00 00-00 01-66 65-30>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1831: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/237 (108-byte object <28-00 00-00 40-D4 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 70-7A BE-56 00-00 00-00 00-30 62-39 66-37 32-36 30-36 62-62 39-38 30-63 B0-7A BE-56 80-00 00-00 80-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 40-00 00-00 01-66 65-30>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1832: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/238 (108-byte object <28-00 00-00 60-D8 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 48-8C C7-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 60-8C C7-56 00-00 00-00 00-30 62-39 66-37 32-36 30-36 62-62 39-38 30-63 30-62 B3-56 80-00 00-00 80-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 40-00 00-00 01-66 65-30>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1833: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/239 (108-byte object <28-00 00-00 80-DC CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 70-7A BE-56 00-00 00-00 00-30 62-39 66-37 32-36 30-36 62-62 39-38 30-63 B0-7A BE-56 80-00 00-00 80-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 40-00 00-00 01-66 65-30>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1834: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/240 (108-byte object <29-00 00-00 D0-A9 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 98-BC B2-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 20-E7 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 50-E7 CB-56 28-00 00-00 28-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 14-00 00-00 01-66 65-30>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1835: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/241 (108-byte object <29-00 00-00 00-E8 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 30-E8 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 60-E8 CB-56 28-00 00-00 28-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 14-00 00-00 01-66 65-30>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1836: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/242 (108-byte object <29-00 00-00 20-E7 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 98-BC B2-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 50-E7 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 C0-E8 CB-56 28-00 00-00 28-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 14-00 00-00 01-66 65-30>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1837: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/243 (108-byte object <29-00 00-00 30-E8 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 60-E8 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 F0-E8 CB-56 28-00 00-00 28-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 14-00 00-00 01-66 65-30>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1838: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/244 (108-byte object <29-00 00-00 50-E7 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 98-BC B2-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 C0-E8 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 E0-EC CB-56 28-00 00-00 28-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 14-00 00-00 01-66 65-30>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1839: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/245 (108-byte object <29-00 00-00 60-E8 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 F0-E8 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 D0-F0 CB-56 28-00 00-00 28-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 14-00 00-00 01-66 65-30>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1840: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/246 (108-byte object <2A-00 00-00 E0-EC CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 98-BC B2-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 C0-F4 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 C0-EB C0-56 54-00 00-00 54-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 2A-00 00-00 01-66 65-30>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1841: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/247 (108-byte object <2A-00 00-00 F0-E8 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 D0-F0 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 20-20 BA-56 54-00 00-00 54-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 2A-00 00-00 01-66 65-30>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1842: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/248 (108-byte object <2A-00 00-00 C0-F4 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 98-BC B2-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 90-E8 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 C0-EB C0-56 54-00 00-00 54-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 2A-00 00-00 01-66 65-30>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1843: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/249 (108-byte object <2A-00 00-00 D0-F0 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 A0-E0 CB-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 20-20 BA-56 54-00 00-00 54-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 2A-00 00-00 01-66 65-30>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1844: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/250 (108-byte object <2A-00 00-00 90-E8 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 98-BC B2-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 10-08 CC-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 C0-EB C0-56 54-00 00-00 54-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 2A-00 00-00 01-66 65-30>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1845: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/251 (108-byte object <2A-00 00-00 A0-E0 CB-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 58-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 30-0C CC-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 20-20 BA-56 54-00 00-00 54-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 2A-00 00-00 01-66 65-30>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1846: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/252 (108-byte object <2B-00 00-00 10-08 CC-56 28-00 00-00 28-00 00-00 39-32 35-39 66-31 30-35 66-32 62-31 E8-7A BE-56 00-00 00-00 00-35 34-62 61-32 35-39 30-32 30-61 35-32 38-39 50-10 CC-56 28-00 00-00 28-00 00-00 66-37 32-36 30-36 62-62 39-38 30-63 10-8C C7-56 80-00 00-00 80-00 00-00 64-33 63-65 63-34 35-33 62-64 66-62 40-00 00-00 01-66 65-30>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1847: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/253 (108-byte object <2B-00 00-00 30-0C CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 58-7A BE-56 00-00 00-00 00-62 38-31 62-30 66-35 33-62 31-63 39-38 63-65 70-14 CC-56 28-00 00-00 28-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 30-62 B3-56 80-00 00-00 80-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 40-00 00-00 01-32 62-35>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1848: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/254 (108-byte object <2B-00 00-00 50-10 CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 E8-7A BE-56 00-00 00-00 00-62 38-31 62-30 66-35 33-62 31-63 39-38 63-65 90-18 CC-56 28-00 00-00 28-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 10-8C C7-56 80-00 00-00 80-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 40-00 00-00 01-32 62-35>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1849: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/255 (108-byte object <2B-00 00-00 70-14 CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 58-7A BE-56 00-00 00-00 00-62 38-31 62-30 66-35 33-62 31-63 39-38 63-65 E0-1C CC-56 28-00 00-00 28-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 30-62 B3-56 80-00 00-00 80-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 40-00 00-00 01-32 62-35>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1850: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/256 (108-byte object <2B-00 00-00 90-18 CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 E8-7A BE-56 00-00 00-00 00-62 38-31 62-30 66-35 33-62 31-63 39-38 63-65 30-21 CC-56 28-00 00-00 28-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 10-8C C7-56 80-00 00-00 80-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 40-00 00-00 01-32 62-35>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1851: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/257 (108-byte object <2B-00 00-00 E0-1C CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 58-7A BE-56 00-00 00-00 00-62 38-31 62-30 66-35 33-62 31-63 39-38 63-65 80-25 CC-56 28-00 00-00 28-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 30-62 B3-56 80-00 00-00 80-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 40-00 00-00 01-32 62-35>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1852: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/258 (108-byte object <2C-00 00-00 D0-29 CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 00-17 C9-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 B0-BC B2-56 00-00 00-00 00-36 34-66 38-62 31-30 36-33 31-32 66-34 32-39 B0-F8 CB-56 28-00 00-00 28-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 14-00 00-00 01-32 62-35>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1853: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/259 (108-byte object <2C-00 00-00 80-25 CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 50-1B C9-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 70-7A BE-56 00-00 00-00 00-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 80-1B C9-56 28-00 00-00 28-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 14-00 00-00 01-32 62-35>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1854: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/260 (108-byte object <2C-00 00-00 00-17 C9-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 B0-F8 CB-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 B0-BC B2-56 00-00 00-00 00-36 34-66 38-62 31-30 36-33 31-32 66-34 32-39 E0-1B C9-56 28-00 00-00 28-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 14-00 00-00 01-32 62-35>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1855: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/261 (108-byte object <2C-00 00-00 50-1B C9-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 80-1B C9-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 70-7A BE-56 00-00 00-00 00-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 10-1C C9-56 28-00 00-00 28-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 14-00 00-00 01-32 62-35>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1856: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/262 (108-byte object <2C-00 00-00 B0-F8 CB-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 E0-1B C9-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 B0-BC B2-56 00-00 00-00 00-36 34-66 38-62 31-30 36-33 31-32 66-34 32-39 40-3F CC-56 28-00 00-00 28-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 14-00 00-00 01-32 62-35>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1857: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/263 (108-byte object <2C-00 00-00 80-1B C9-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 10-1C C9-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 70-7A BE-56 00-00 00-00 00-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 10-43 CC-56 28-00 00-00 28-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 14-00 00-00 01-32 62-35>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1858: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/264 (108-byte object <2D-00 00-00 40-3F CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 00-47 CC-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 B0-BC B2-56 00-00 00-00 00-36 34-66 38-62 31-30 36-33 31-32 66-34 32-39 60-EB C0-56 54-00 00-00 54-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 2A-00 00-00 01-32 62-35>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1859: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/265 (108-byte object <2D-00 00-00 10-1C C9-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 10-43 CC-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 70-7A BE-56 00-00 00-00 00-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 C0-EB C0-56 54-00 00-00 54-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 2A-00 00-00 01-32 62-35>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1860: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/266 (108-byte object <2D-00 00-00 00-47 CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 B0-1B C9-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 B0-BC B2-56 00-00 00-00 00-36 34-66 38-62 31-30 36-33 31-32 66-34 32-39 60-EB C0-56 54-00 00-00 54-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 2A-00 00-00 01-32 62-35>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1861: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/267 (108-byte object <2D-00 00-00 10-43 CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 C0-E8 CB-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 70-7A BE-56 00-00 00-00 00-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 C0-EB C0-56 54-00 00-00 54-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 2A-00 00-00 01-32 62-35>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1862: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/268 (108-byte object <2D-00 00-00 B0-1B C9-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 50-5A CC-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 B0-BC B2-56 00-00 00-00 00-36 34-66 38-62 31-30 36-33 31-32 66-34 32-39 60-EB C0-56 54-00 00-00 54-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 2A-00 00-00 01-32 62-35>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1863: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/269 (108-byte object <2D-00 00-00 C0-E8 CB-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 70-5E CC-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 70-7A BE-56 00-00 00-00 00-00 00-00 38-62 31-30 36-33 31-32 66-34 32-39 C0-EB C0-56 54-00 00-00 54-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 2A-00 00-00 01-32 62-35>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1864: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/270 (108-byte object <2E-00 00-00 50-5A CC-56 28-00 00-00 28-00 00-00 33-31 61-63 61-66 36-31 65-63 65-66 90-62 CC-56 20-00 00-00 20-00 00-00 62-30 66-35 33-62 31-63 39-38 63-65 80-62 B3-56 00-00 00-00 00-36 34-66 38-62 31-30 36-33 31-32 66-34 32-39 B0-7A BE-56 80-00 00-00 80-00 00-00 62-62 36-37 62-63 62-66 39-36 61-63 40-00 00-00 01-32 62-35>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1865: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/271 (108-byte object <2E-00 00-00 70-5E CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 B0-66 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 70-7A BE-56 00-00 00-00 00-63 37-34 61-33 36-63 31-36 39-33 64-39 36-34 10-8C C7-56 80-00 00-00 80-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 40-00 00-00 01-34 64-32>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1866: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/272 (108-byte object <2E-00 00-00 90-62 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 D0-6A CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 80-62 B3-56 00-00 00-00 00-63 37-34 61-33 36-63 31-36 39-33 64-39 36-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 40-00 00-00 01-34 64-32>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1867: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/273 (108-byte object <2E-00 00-00 B0-66 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 20-6F CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 70-7A BE-56 00-00 00-00 00-63 37-34 61-33 36-63 31-36 39-33 64-39 36-34 10-8C C7-56 80-00 00-00 80-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 40-00 00-00 01-34 64-32>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1868: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/274 (108-byte object <2E-00 00-00 D0-6A CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 70-73 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 80-62 B3-56 00-00 00-00 00-63 37-34 61-33 36-63 31-36 39-33 64-39 36-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 40-00 00-00 01-34 64-32>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1869: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/275 (108-byte object <2E-00 00-00 20-6F CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 C0-77 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 70-7A BE-56 00-00 00-00 00-63 37-34 61-33 36-63 31-36 39-33 64-39 36-34 10-8C C7-56 80-00 00-00 80-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 40-00 00-00 01-34 64-32>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1870: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/276 (108-byte object <2F-00 00-00 60-80 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 F0-4A CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 30-84 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 60-84 CC-56 28-00 00-00 28-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 14-00 00-00 01-34 64-32>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1871: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/277 (108-byte object <2F-00 00-00 10-85 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 40-85 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 70-85 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 D0-85 CC-56 28-00 00-00 28-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 14-00 00-00 01-34 64-32>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1872: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/278 (108-byte object <2F-00 00-00 30-84 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 60-84 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 A0-85 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 30-86 CC-56 28-00 00-00 28-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 14-00 00-00 01-34 64-32>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1873: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/279 (108-byte object <2F-00 00-00 70-85 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 D0-85 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 00-86 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 50-8A CC-56 28-00 00-00 28-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 14-00 00-00 01-34 64-32>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1874: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/280 (108-byte object <2F-00 00-00 A0-85 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 30-86 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 C0-77 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 70-8E CC-56 28-00 00-00 28-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 14-00 00-00 01-34 64-32>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1875: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/281 (108-byte object <2F-00 00-00 00-86 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 50-8A CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 F0-4A CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 90-92 CC-56 28-00 00-00 28-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 14-00 00-00 01-34 64-32>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1876: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/282 (108-byte object <30-00 00-00 B0-96 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 60-84 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 D0-85 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 20-20 BA-56 54-00 00-00 54-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 2A-00 00-00 01-34 64-32>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1877: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/283 (108-byte object <30-00 00-00 50-8A CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 F0-4A CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 90-92 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 60-EB C0-56 54-00 00-00 54-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 2A-00 00-00 01-34 64-32>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1878: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/284 (108-byte object <30-00 00-00 60-84 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 D0-85 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 30-21 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 20-20 BA-56 54-00 00-00 54-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 2A-00 00-00 01-34 64-32>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1879: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/285 (108-byte object <30-00 00-00 F0-4A CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 90-92 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 30-86 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 60-EB C0-56 54-00 00-00 54-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 2A-00 00-00 01-34 64-32>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1880: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/286 (108-byte object <30-00 00-00 D0-85 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 30-21 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 80-A2 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 20-20 BA-56 54-00 00-00 54-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 2A-00 00-00 01-34 64-32>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1881: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/287 (108-byte object <30-00 00-00 90-92 CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 30-86 CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 D0-A6 CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 60-EB C0-56 54-00 00-00 54-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 2A-00 00-00 01-34 64-32>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1882: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/288 (108-byte object <31-00 00-00 20-AB CC-56 28-00 00-00 28-00 00-00 30-32 64-63 34-38 39-63 32-30 38-32 70-AF CC-56 20-00 00-00 20-00 00-00 63-62 39-62 30-38 30-39 64-37 36-64 D0-9A CC-56 28-00 00-00 28-00 00-00 61-33 36-63 31-36 39-33 64-39 36-34 30-62 B3-56 80-00 00-00 80-00 00-00 66-65 39-30 30-33 35-30 33-31 39-37 40-00 00-00 01-34 64-32>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1883: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/289 (108-byte object <31-00 00-00 30-86 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 D0-A6 CC-56 20-00 00-00 20-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 C0-B3 CC-56 28-00 00-00 28-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 40-00 00-00 01-37 33-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1884: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/290 (108-byte object <31-00 00-00 70-AF CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 D0-9A CC-56 20-00 00-00 20-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 70-8E CC-56 28-00 00-00 28-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 30-62 B3-56 80-00 00-00 80-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 40-00 00-00 01-37 33-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1885: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/291 (108-byte object <31-00 00-00 D0-A6 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 C0-B3 CC-56 20-00 00-00 20-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 10-B8 CC-56 28-00 00-00 28-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 40-00 00-00 01-37 33-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1886: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/292 (108-byte object <31-00 00-00 D0-9A CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 70-8E CC-56 20-00 00-00 20-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 90-BC CC-56 28-00 00-00 28-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 30-62 B3-56 80-00 00-00 80-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 40-00 00-00 01-37 33-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1887: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/293 (108-byte object <31-00 00-00 C0-B3 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 10-B8 CC-56 20-00 00-00 20-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 10-C1 CC-56 28-00 00-00 28-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 40-00 00-00 01-37 33-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1888: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/294 (108-byte object <32-00 00-00 90-BC CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 A0-88 C8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 B0-BC B2-56 00-00 00-00 00-39 30-66 35-66 64-31 36-38 63-64 30-63 36-34 90-C5 CC-56 28-00 00-00 28-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 14-00 00-00 01-37 33-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1889: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/295 (108-byte object <32-00 00-00 10-B8 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 70-7A BE-56 00-00 00-00 00-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 10-C1 CC-56 28-00 00-00 28-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 14-00 00-00 01-37 33-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1890: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/296 (108-byte object <32-00 00-00 90-C5 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 A0-88 C8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 B0-BC B2-56 00-00 00-00 00-39 30-66 35-66 64-31 36-38 63-64 30-63 36-34 C0-77 CC-56 28-00 00-00 28-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 14-00 00-00 01-37 33-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1891: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/297 (108-byte object <32-00 00-00 10-C1 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 70-7A BE-56 00-00 00-00 00-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 30-21 CC-56 28-00 00-00 28-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 14-00 00-00 01-37 33-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1892: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/298 (108-byte object <32-00 00-00 C0-77 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 A0-88 C8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 B0-BC B2-56 00-00 00-00 00-39 30-66 35-66 64-31 36-38 63-64 30-63 36-34 70-DA CC-56 28-00 00-00 28-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 14-00 00-00 01-37 33-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1893: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/299 (108-byte object <32-00 00-00 30-21 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 70-7A BE-56 00-00 00-00 00-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 80-DE CC-56 28-00 00-00 28-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 14-00 00-00 01-37 33-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1894: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/300 (108-byte object <33-00 00-00 70-8E CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 A0-88 C8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 B0-BC B2-56 00-00 00-00 00-39 30-66 35-66 64-31 36-38 63-64 30-63 36-34 C0-EB C0-56 54-00 00-00 54-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 2A-00 00-00 01-37 33-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1895: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/301 (108-byte object <33-00 00-00 80-DE CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 70-7A BE-56 00-00 00-00 00-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 20-20 BA-56 54-00 00-00 54-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 2A-00 00-00 01-37 33-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1896: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/302 (108-byte object <33-00 00-00 A0-E6 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 A0-88 C8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 B0-BC B2-56 00-00 00-00 00-39 30-66 35-66 64-31 36-38 63-64 30-63 36-34 C0-EB C0-56 54-00 00-00 54-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 2A-00 00-00 01-37 33-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1897: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/303 (108-byte object <33-00 00-00 C0-EF CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 70-7A BE-56 00-00 00-00 00-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 20-20 BA-56 54-00 00-00 54-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 2A-00 00-00 01-37 33-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1898: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/304 (108-byte object <33-00 00-00 00-F4 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 A0-88 C8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 B0-BC B2-56 00-00 00-00 00-39 30-66 35-66 64-31 36-38 63-64 30-63 36-34 C0-EB C0-56 54-00 00-00 54-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 2A-00 00-00 01-37 33-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1899: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/305 (108-byte object <33-00 00-00 40-F8 CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 70-7A BE-56 00-00 00-00 00-00 00-00 35-66 64-31 36-38 63-64 30-63 36-34 20-20 BA-56 54-00 00-00 54-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 2A-00 00-00 01-37 33-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1900: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/306 (108-byte object <34-00 00-00 80-FC CC-56 28-00 00-00 28-00 00-00 31-34 33-61 39-33 62-64 31-62 36-38 A0-88 C8-56 3C-00 00-00 3C-00 00-00 30-36 66-35 38-35 64-38 36-37 30-31 00-7B BE-56 00-00 00-00 00-39 30-66 35-66 64-31 36-38 63-64 30-63 36-34 10-8C C7-56 80-00 00-00 80-00 00-00 66-64 61-39 65-62 33-34 35-61 66-39 40-00 00-00 01-37 33-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1901: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/307 (108-byte object <34-00 00-00 C0-00 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 70-7A BE-56 00-00 00-00 00-36 32-31 39-35 33-33 38-37 36-64 31-36 32-37 30-62 B3-56 80-00 00-00 80-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 40-00 00-00 01-64 62-61>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1902: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/308 (108-byte object <34-00 00-00 30-05 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 00-7B BE-56 00-00 00-00 00-36 32-31 39-35 33-33 38-37 36-64 31-36 32-37 10-8C C7-56 80-00 00-00 80-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 40-00 00-00 01-64 62-61>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1903: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/309 (108-byte object <34-00 00-00 A0-09 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 70-7A BE-56 00-00 00-00 00-36 32-31 39-35 33-33 38-37 36-64 31-36 32-37 30-62 B3-56 80-00 00-00 80-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 40-00 00-00 01-64 62-61>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1904: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/310 (108-byte object <34-00 00-00 10-0E CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 00-7B BE-56 00-00 00-00 00-36 32-31 39-35 33-33 38-37 36-64 31-36 32-37 10-8C C7-56 80-00 00-00 80-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 40-00 00-00 01-64 62-61>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1905: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/311 (108-byte object <34-00 00-00 80-12 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 70-7A BE-56 00-00 00-00 00-36 32-31 39-35 33-33 38-37 36-64 31-36 32-37 30-62 B3-56 80-00 00-00 80-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 40-00 00-00 01-64 62-61>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1906: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/312 (108-byte object <35-00 00-00 70-DA CC-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 C0-1D CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 F0-1D CD-56 28-00 00-00 28-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 14-00 00-00 01-64 62-61>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1907: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/313 (108-byte object <35-00 00-00 A0-1E CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 D0-1E CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 00-1F CD-56 28-00 00-00 28-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 14-00 00-00 01-64 62-61>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1908: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/314 (108-byte object <35-00 00-00 C0-1D CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 F0-1D CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 60-1F CD-56 28-00 00-00 28-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 14-00 00-00 01-64 62-61>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1909: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/315 (108-byte object <35-00 00-00 D0-1E CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 00-1F CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 90-1F CD-56 28-00 00-00 28-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 14-00 00-00 01-64 62-61>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1910: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/316 (108-byte object <35-00 00-00 F0-1D CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 60-1F CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 D0-23 CD-56 28-00 00-00 28-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 14-00 00-00 01-64 62-61>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1911: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/317 (108-byte object <35-00 00-00 00-1F CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 90-1F CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 10-28 CD-56 28-00 00-00 28-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 14-00 00-00 01-64 62-61>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1912: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/318 (108-byte object <36-00 00-00 D0-23 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 50-2C CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 60-EB C0-56 54-00 00-00 54-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 2A-00 00-00 01-64 62-61>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1913: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/319 (108-byte object <36-00 00-00 90-1F CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 10-28 CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 C0-EB C0-56 54-00 00-00 54-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 2A-00 00-00 01-64 62-61>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1914: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/320 (108-byte object <36-00 00-00 50-2C CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 30-1F CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 60-EB C0-56 54-00 00-00 54-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 2A-00 00-00 01-64 62-61>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1915: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/321 (108-byte object <36-00 00-00 10-28 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 F0-16 CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 C0-EB C0-56 54-00 00-00 54-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 2A-00 00-00 01-64 62-61>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1916: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/322 (108-byte object <36-00 00-00 30-1F CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 30-41 CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 60-EB C0-56 54-00 00-00 54-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 2A-00 00-00 01-64 62-61>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1917: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/323 (108-byte object <36-00 00-00 F0-16 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 A0-45 CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 C0-EB C0-56 54-00 00-00 54-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 2A-00 00-00 01-64 62-61>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1918: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/324 (108-byte object <37-00 00-00 30-41 CD-56 28-00 00-00 28-00 00-00 39-61 31-39 65-33 32-36 36-36 35-30 A0-88 C8-56 3C-00 00-00 3C-00 00-00 63-33 38-63 31-36 37-30 33-63 37-39 10-4A CD-56 28-00 00-00 28-00 00-00 39-35 33-33 38-37 36-64 31-36 32-37 B0-7A BE-56 80-00 00-00 80-00 00-00 37-34 62-38 64-30 34-61 38-38 30-64 40-00 00-00 01-64 62-61>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1919: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/325 (108-byte object <37-00 00-00 A0-45 CD-56 28-00 00-00 28-00 00-00 61-31 30-33 32-30 31-39 38-38 30-39 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 33-37 36-32 39-37 34-31 31-37 63-32 80-4E CD-56 28-00 00-00 28-00 00-00 34-66 35-64 37-31 66-30 37-31 35-31 10-8C C7-56 80-00 00-00 80-00 00-00 31-35 39-36 35-33 63-37 34-35 39-31 40-00 00-00 01-61 32-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1920: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/326 (108-byte object <37-00 00-00 10-4A CD-56 28-00 00-00 28-00 00-00 61-31 30-33 32-30 31-39 38-38 30-39 A0-88 C8-56 3C-00 00-00 3C-00 00-00 33-37 36-32 39-37 34-31 31-37 63-32 F0-52 CD-56 28-00 00-00 28-00 00-00 34-66 35-64 37-31 66-30 37-31 35-31 B0-7A BE-56 80-00 00-00 80-00 00-00 31-35 39-36 35-33 63-37 34-35 39-31 40-00 00-00 01-61 32-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1921: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/327 (108-byte object <37-00 00-00 80-4E CD-56 28-00 00-00 28-00 00-00 61-31 30-33 32-30 31-39 38-38 30-39 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 33-37 36-32 39-37 34-31 31-37 63-32 90-57 CD-56 28-00 00-00 28-00 00-00 34-66 35-64 37-31 66-30 37-31 35-31 10-8C C7-56 80-00 00-00 80-00 00-00 31-35 39-36 35-33 63-37 34-35 39-31 40-00 00-00 01-61 32-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1922: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/328 (108-byte object <37-00 00-00 F0-52 CD-56 28-00 00-00 28-00 00-00 61-31 30-33 32-30 31-39 38-38 30-39 A0-88 C8-56 3C-00 00-00 3C-00 00-00 33-37 36-32 39-37 34-31 31-37 63-32 30-5C CD-56 28-00 00-00 28-00 00-00 34-66 35-64 37-31 66-30 37-31 35-31 B0-7A BE-56 80-00 00-00 80-00 00-00 31-35 39-36 35-33 63-37 34-35 39-31 40-00 00-00 01-61 32-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1923: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/329 (108-byte object <37-00 00-00 90-57 CD-56 28-00 00-00 28-00 00-00 61-31 30-33 32-30 31-39 38-38 30-39 B0-E8 B8-56 3C-00 00-00 3C-00 00-00 33-37 36-32 39-37 34-31 31-37 63-32 D0-60 CD-56 28-00 00-00 28-00 00-00 34-66 35-64 37-31 66-30 37-31 35-31 10-8C C7-56 80-00 00-00 80-00 00-00 31-35 39-36 35-33 63-37 34-35 39-31 40-00 00-00 01-61 32-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1924: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/330 (108-byte object <38-00 00-00 60-1F CD-56 28-00 00-00 28-00 00-00 61-31 30-33 32-30 31-39 38-38 30-39 B0-7A BE-56 80-00 00-00 80-00 00-00 33-37 36-32 39-37 34-31 31-37 63-32 80-62 B3-56 00-00 00-00 00-35 37-65 34-66 35-64 37-31 66-30 37-31 35-31 20-20 BA-56 54-00 00-00 54-00 00-00 31-35 39-36 35-33 63-37 34-35 39-31 2A-00 00-00 01-61 32-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1925: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/331 (108-byte object <38-00 00-00 D0-60 CD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 10-8C C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 70-7A BE-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 60-EB C0-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1926: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/332 (108-byte object <38-00 00-00 10-6A CD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 80-62 B3-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 20-20 BA-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1927: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/333 (108-byte object <38-00 00-00 40-74 CD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 10-8C C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 70-7A BE-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 60-EB C0-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1928: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/334 (108-byte object <38-00 00-00 C0-78 CD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 80-62 B3-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 20-20 BA-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1929: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/335 (108-byte object <38-00 00-00 40-7D CD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 10-8C C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 70-7A BE-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 60-EB C0-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1930: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/336 (108-byte object <39-00 00-00 40-86 CD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 B0-7A BE-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 30-5C CD-56 28-00 00-00 28-00 00-00 38-39 65-62 61-64 34-66 61-36 33-34 20-20 BA-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1931: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/337 (108-byte object <39-00 00-00 20-89 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 10-8C C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-89 CD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-EB C0-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1932: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/338 (108-byte object <39-00 00-00 30-5C CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 B0-7A BE-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-89 CD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 20-20 BA-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1933: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/339 (108-byte object <39-00 00-00 50-89 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 10-8C C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-8E CD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-EB C0-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1934: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/340 (108-byte object <39-00 00-00 B0-89 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 B0-7A BE-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 10-93 CD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 20-20 BA-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1935: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/341 (108-byte object <39-00 00-00 60-8E CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 10-8C C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 C0-97 CD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-EB C0-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1936: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/342 (108-byte object <3A-00 00-00 70-9C CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-A1 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 C0-A0 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 80-89 CD-56 28-00 00-00 28-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 14-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1937: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/343 (108-byte object <3A-00 00-00 C0-97 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 10-A6 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 A0-A0 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-A6 CD-56 28-00 00-00 28-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 14-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1938: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/344 (108-byte object <3A-00 00-00 20-A1 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 80-89 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 90-A5 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-A6 CD-56 28-00 00-00 28-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 14-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1939: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/345 (108-byte object <3A-00 00-00 10-A6 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-A6 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-AA CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 D0-A6 CD-56 28-00 00-00 28-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 14-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1940: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/346 (108-byte object <3A-00 00-00 80-89 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 A0-A6 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-AE CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-AA CD-56 28-00 00-00 28-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 14-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1941: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/347 (108-byte object <3A-00 00-00 40-A6 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-A6 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 80-B2 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 F0-AE CD-56 28-00 00-00 28-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 14-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1942: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/348 (108-byte object <3B-00 00-00 E0-AA CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-B3 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-9B CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1943: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/349 (108-byte object <3B-00 00-00 D0-A6 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 F0-AE CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 A0-BA CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-88 C8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1944: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/350 (108-byte object <3B-00 00-00 00-B3 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 70-A6 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-BE CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1945: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/351 (108-byte object <3B-00 00-00 F0-AE CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 C0-81 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-C2 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-88 C8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1946: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/352 (108-byte object <3B-00 00-00 70-A6 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-C6 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-C6 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1947: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/353 (108-byte object <3B-00 00-00 C0-81 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-CB CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 80-CA CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-88 C8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1948: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/354 (108-byte object <3C-00 00-00 D0-C6 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 30-CF CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 90-B6 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-D7 CD-56 A0-00 00-00 A0-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 50-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1949: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/355 (108-byte object <3C-00 00-00 00-CB CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 60-D3 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 E0-D2 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 F0-D8 CD-56 A0-00 00-00 A0-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 50-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1950: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/356 (108-byte object <3C-00 00-00 30-CF CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 A0-D9 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 10-D7 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-D7 CD-56 A0-00 00-00 A0-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 50-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1951: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/357 (108-byte object <3C-00 00-00 60-D3 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 30-DE CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-DD CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 F0-D8 CD-56 A0-00 00-00 A0-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 50-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1952: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/358 (108-byte object <3C-00 00-00 A0-D9 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 C0-E2 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 40-E2 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-D7 CD-56 A0-00 00-00 A0-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 50-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1953: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/359 (108-byte object <3C-00 00-00 30-DE CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 50-E7 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-E6 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 F0-D8 CD-56 A0-00 00-00 A0-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 50-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1954: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/360 (108-byte object <3D-00 00-00 C0-E2 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 E0-EB CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-CE CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 80-1C CE-56 D8-27 00-00 D8-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 EC-13 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1955: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/361 (108-byte object <3D-00 00-00 50-E7 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 70-F0 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-EF CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C0-44 CE-56 D8-27 00-00 D8-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 EC-13 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1956: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/362 (108-byte object <3D-00 00-00 E0-EB CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 A0-6C CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 80-F4 CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 80-1C CE-56 D8-27 00-00 D8-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 EC-13 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1957: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/363 (108-byte object <3D-00 00-00 70-F0 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 F0-6E CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-6E CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C0-44 CE-56 D8-27 00-00 D8-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 EC-13 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1958: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/364 (108-byte object <3D-00 00-00 A0-6C CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-72 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 A0-71 CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 80-1C CE-56 D8-27 00-00 D8-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 EC-13 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1959: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/365 (108-byte object <3D-00 00-00 F0-6E CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 50-75 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-74 CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C0-44 CE-56 D8-27 00-00 D8-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 EC-13 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1960: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/366 (108-byte object <3E-00 00-00 20-72 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 30-79 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-EB CD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C8-BC B2-56 00-00 00-00 00-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 ED-13 00-00 00-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1961: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/367 (108-byte object <3E-00 00-00 50-75 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 10-7D CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 90-7C CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 88-7A BE-56 00-00 00-00 00-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 ED-13 00-00 00-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1962: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/368 (108-byte object <3E-00 00-00 30-79 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 F0-80 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-80 CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C8-BC B2-56 00-00 00-00 00-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 ED-13 00-00 00-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1963: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/369 (108-byte object <3E-00 00-00 10-7D CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-84 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-84 CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 88-7A BE-56 00-00 00-00 00-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 ED-13 00-00 00-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1964: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/370 (108-byte object <3E-00 00-00 F0-80 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 B0-88 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 30-88 CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C8-BC B2-56 00-00 00-00 00-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 ED-13 00-00 00-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1965: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/371 (108-byte object <3E-00 00-00 D0-84 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 90-8C CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 10-8C CE-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 88-7A BE-56 00-00 00-00 00-27 00-00 64-36 62-31 34-39 37-61 65-66 38-32 ED-13 00-00 00-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1966: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/372 (108-byte object <3F-00 00-00 B0-88 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 98-BC B2-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-90 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1967: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/373 (108-byte object <3F-00 00-00 90-8C CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 58-7A BE-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-94 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1968: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/374 (108-byte object <3F-00 00-00 70-90 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 98-BC B2-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 00-48 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1969: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/375 (108-byte object <3F-00 00-00 50-94 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 58-7A BE-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 10-4C CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1970: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/376 (108-byte object <3F-00 00-00 00-48 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 98-BC B2-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 20-50 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1971: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/377 (108-byte object <3F-00 00-00 10-4C CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 58-7A BE-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 30-54 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1972: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/378 (108-byte object <40-00 00-00 40-58 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 50-5C CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 10-B7 CD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1973: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/379 (108-byte object <40-00 00-00 30-54 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 60-60 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 90-60 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1974: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/380 (108-byte object <40-00 00-00 50-5C CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 10-B7 CD-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-60 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1975: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/381 (108-byte object <40-00 00-00 60-60 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 90-60 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 20-61 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1976: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/382 (108-byte object <40-00 00-00 10-B7 CD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 F0-60 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-65 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1977: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/383 (108-byte object <40-00 00-00 90-60 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-61 CE-56 28-00 00-00 28-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 A0-69 CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-63 B3-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1978: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/384 (108-byte object <41-00 00-00 60-65 CE-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 30-62 B3-56 82-00 00-00 82-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-BF CE-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1979: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/385 (108-byte object <41-00 00-00 20-61 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-7A BE-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-69 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1980: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/386 (108-byte object <41-00 00-00 70-BF CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-62 B3-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-60 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1981: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/387 (108-byte object <41-00 00-00 A0-69 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-7A BE-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-A6 CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1982: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/388 (108-byte object <41-00 00-00 C0-60 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-62 B3-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-D4 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1983: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/389 (108-byte object <41-00 00-00 A0-A6 CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-7A BE-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-D9 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1984: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/390 (108-byte object <42-00 00-00 F0-DD CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 90-E2 CE-56 28-00 00-00 28-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-C3 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1985: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/391 (108-byte object <42-00 00-00 50-D9 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 80-F6 CD-56 28-00 00-00 28-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-F6 CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1986: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/392 (108-byte object <42-00 00-00 90-E2 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-C3 CE-56 28-00 00-00 28-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-F7 CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1987: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/393 (108-byte object <42-00 00-00 80-F6 CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-F6 CD-56 28-00 00-00 28-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-F7 CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1988: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/394 (108-byte object <42-00 00-00 B0-C3 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 10-F7 CD-56 28-00 00-00 28-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-FB CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1989: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/395 (108-byte object <42-00 00-00 B0-F6 CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-F7 CD-56 28-00 00-00 28-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-FF CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1990: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/396 (108-byte object <43-00 00-00 80-FB CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-0C CE-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-04 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1991: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/397 (108-byte object <43-00 00-00 40-F7 CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-0C CE-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-FF CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1992: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/398 (108-byte object <43-00 00-00 00-04 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 80-10 CE-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-F6 CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1993: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/399 (108-byte object <43-00 00-00 C0-FF CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-14 CE-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-60 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #1994: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/400 (108-byte object <43-00 00-00 E0-F6 CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-18 CE-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-18 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #1995: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/401 (108-byte object <43-00 00-00 F0-60 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-1C CE-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-1C CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #1996: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/402 (108-byte object <44-00 00-00 00-21 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-25 CE-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-08 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #1997: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/403 (108-byte object <44-00 00-00 D0-1C CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-29 CE-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-29 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #1998: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/404 (108-byte object <44-00 00-00 30-25 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-08 CE-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-29 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #1999: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/405 (108-byte object <44-00 00-00 20-29 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-29 CE-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-29 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2000: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/406 (108-byte object <44-00 00-00 40-08 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-29 CE-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-2E CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2001: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/407 (108-byte object <44-00 00-00 50-29 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E0-29 CE-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-32 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2002: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/408 (108-byte object <45-00 00-00 20-2E CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 80-B6 B0-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-36 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2003: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/409 (108-byte object <45-00 00-00 E0-29 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-FC C6-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-32 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2004: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/410 (108-byte object <45-00 00-00 A0-36 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 80-B6 B0-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-29 CE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2005: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/411 (108-byte object <45-00 00-00 60-32 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-FC C6-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-F7 CD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2006: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/412 (108-byte object <45-00 00-00 80-29 CE-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 80-B6 B0-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-B2 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2007: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/413 (108-byte object <45-00 00-00 10-F7 CD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-FC C6-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-B7 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2008: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/414 (108-byte object <46-00 00-00 D0-B2 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-35 CB-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-BB CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 90-C3 CF-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2009: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/415 (108-byte object <46-00 00-00 20-B7 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-63 B3-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-BF CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-C4 CF-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2010: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/416 (108-byte object <46-00 00-00 70-BB CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-35 CB-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-C5 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 90-C3 CF-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2011: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/417 (108-byte object <46-00 00-00 C0-BF CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-63 B3-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-C9 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-C4 CF-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2012: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/418 (108-byte object <46-00 00-00 00-C5 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-35 CB-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-CE CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 90-C3 CF-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2013: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/419 (108-byte object <46-00 00-00 B0-C9 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-63 B3-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-D2 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-C4 CF-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2014: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/420 (108-byte object <47-00 00-00 10-CE CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 C0-EB C0-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-D6 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2015: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/421 (108-byte object <47-00 00-00 70-D2 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-20 BA-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-DB CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2016: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/422 (108-byte object <47-00 00-00 D0-D6 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 C0-EB C0-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-DF CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2017: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/423 (108-byte object <47-00 00-00 30-DB CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-20 BA-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-E3 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2018: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/424 (108-byte object <47-00 00-00 90-DF CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 C0-EB C0-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-E7 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2019: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/425 (108-byte object <47-00 00-00 B0-E3 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-20 BA-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-EB CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2020: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/426 (108-byte object <48-00 00-00 D0-E7 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 90-41 B6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-F0 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2021: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/427 (108-byte object <48-00 00-00 F0-EB CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-4D B1-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-F4 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2022: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/428 (108-byte object <48-00 00-00 10-F0 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 90-41 B6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-F8 CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2023: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/429 (108-byte object <48-00 00-00 80-F4 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-4D B1-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-FD CF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2024: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/430 (108-byte object <48-00 00-00 F0-F8 CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 90-41 B6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-01 D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2025: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/431 (108-byte object <48-00 00-00 70-FD CF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-4D B1-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-06 D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2026: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/432 (108-byte object <49-00 00-00 F0-01 D0-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-13 D0-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-0A D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2027: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/433 (108-byte object <49-00 00-00 70-06 D0-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-14 D0-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-0F D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2028: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/434 (108-byte object <49-00 00-00 F0-0A D0-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-13 D0-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-15 D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2029: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/435 (108-byte object <49-00 00-00 70-0F D0-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-14 D0-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-1A D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2030: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/436 (108-byte object <49-00 00-00 F0-15 D0-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-13 D0-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-1F D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-E8 B8-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2031: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/437 (108-byte object <49-00 00-00 80-1A D0-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 F0-14 D0-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-23 D0-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-63 B3-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2032: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/438 (108-byte object <4A-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 98-BC B2-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-BC B2-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-29 CE-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2033: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/439 (108-byte object <4A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 58-7A BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-7A BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-23 D0-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2034: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/440 (108-byte object <4A-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 98-BC B2-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-BC B2-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 C0-2C D0-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2035: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/441 (108-byte object <4A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 58-7A BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-7A BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-34 D0-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2036: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/442 (108-byte object <4A-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 98-BC B2-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-BC B2-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-38 D0-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2037: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/443 (108-byte object <4A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 58-7A BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-7A BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-3B D0-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2038: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/444 (108-byte object <4B-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 98-BC B2-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-BC B2-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-EB C0-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2039: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/445 (108-byte object <4B-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 58-7A BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-7A BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 C0-EB C0-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2040: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/446 (108-byte object <4B-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 98-BC B2-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-BC B2-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-EB C0-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2041: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/447 (108-byte object <4B-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 58-7A BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-7A BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 C0-EB C0-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2042: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/448 (108-byte object <4B-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 98-BC B2-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-BC B2-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-EB C0-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2043: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/449 (108-byte object <4B-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 58-7A BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-7A BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 C0-EB C0-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2044: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/450 (108-byte object <4C-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-7A BE-56 00-00 00-00 00-62 39-35 38-34 38-30 36-61 65-65 65-64 61-38 00-7B BE-56 00-00 00-00 00-64 37-39 65-37 63-31 32-32 31-31 62-38 65-33 10-8C C7-56 80-00 00-00 80-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 40-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2045: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/451 (108-byte object <4C-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 70-7A BE-56 00-00 00-00 00-65 62-33 63-33 65-39 39-37 35-38 32-31 63-66 30-62 B3-56 80-00 00-00 80-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 40-00 00-00 01-31 31-36>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2046: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/452 (108-byte object <4C-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 E8-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 00-7B BE-56 00-00 00-00 00-65 62-33 63-33 65-39 39-37 35-38 32-31 63-66 10-8C C7-56 80-00 00-00 80-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 40-00 00-00 01-31 31-36>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2047: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/453 (108-byte object <4C-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 70-7A BE-56 00-00 00-00 00-65 62-33 63-33 65-39 39-37 35-38 32-31 63-66 30-62 B3-56 80-00 00-00 80-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 40-00 00-00 01-31 31-36>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2048: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/454 (108-byte object <4C-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 E8-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 00-7B BE-56 00-00 00-00 00-65 62-33 63-33 65-39 39-37 35-38 32-31 63-66 10-8C C7-56 80-00 00-00 80-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 40-00 00-00 01-31 31-36>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2049: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/455 (108-byte object <4C-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 70-7A BE-56 00-00 00-00 00-65 62-33 63-33 65-39 39-37 35-38 32-31 63-66 30-62 B3-56 80-00 00-00 80-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 40-00 00-00 01-31 31-36>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2050: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/456 (108-byte object <4D-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 98-BC B2-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 D0-76 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 00-77 D0-56 28-00 00-00 28-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 14-00 00-00 01-31 31-36>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2051: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/457 (108-byte object <4D-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 E0-77 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 10-78 D0-56 28-00 00-00 28-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 14-00 00-00 01-31 31-36>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2052: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/458 (108-byte object <4D-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 98-BC B2-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 00-77 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 70-78 D0-56 28-00 00-00 28-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 14-00 00-00 01-31 31-36>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2053: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/459 (108-byte object <4D-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 10-78 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 80-7C D0-56 28-00 00-00 28-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 14-00 00-00 01-31 31-36>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2054: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/460 (108-byte object <4D-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 98-BC B2-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 70-78 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 90-80 D0-56 28-00 00-00 28-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 14-00 00-00 01-31 31-36>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2055: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/461 (108-byte object <4D-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 80-7C D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 A0-84 D0-56 28-00 00-00 28-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 14-00 00-00 01-31 31-36>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2056: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/462 (108-byte object <4E-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 98-BC B2-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 A0-18 CE-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 20-20 BA-56 54-00 00-00 54-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 2A-00 00-00 01-31 31-36>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2057: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/463 (108-byte object <4E-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 A0-84 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 60-EB C0-56 54-00 00-00 54-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 2A-00 00-00 01-31 31-36>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2058: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/464 (108-byte object <4E-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 98-BC B2-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 C0-8C D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 20-20 BA-56 54-00 00-00 54-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 2A-00 00-00 01-31 31-36>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2059: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/465 (108-byte object <4E-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 E0-95 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 60-EB C0-56 54-00 00-00 54-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 2A-00 00-00 01-31 31-36>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2060: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/466 (108-byte object <4E-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 98-BC B2-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 20-9A D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 20-20 BA-56 54-00 00-00 54-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 2A-00 00-00 01-31 31-36>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2061: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/467 (108-byte object <4E-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 58-7A BE-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 60-9E D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 60-EB C0-56 54-00 00-00 54-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 2A-00 00-00 01-31 31-36>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2062: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/468 (108-byte object <4F-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 33-35 38-39 64-34 30-62 33-36 38-34 68-62 B3-56 00-00 00-00 00-64 35-35 62-34 33-33 64-33 35-64 62-66 35-62 A0-A2 D0-56 28-00 00-00 28-00 00-00 63-33 65-39 39-37 35-38 32-31 63-66 B0-7A BE-56 80-00 00-00 80-00 00-00 61-35 33-62 34-35 37-35 34-38 39-64 40-00 00-00 01-31 31-36>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2063: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/469 (108-byte object <4F-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 58-7A BE-56 00-00 00-00 00-32 64-63 32-65 39-34 38-63 38-30 31-64 35-63 E0-A6 D0-56 28-00 00-00 28-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 10-8C C7-56 80-00 00-00 80-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 40-00 00-00 01-37 31-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2064: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/470 (108-byte object <4F-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 68-62 B3-56 00-00 00-00 00-32 64-63 32-65 39-34 38-63 38-30 31-64 35-63 50-AB D0-56 28-00 00-00 28-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 B0-7A BE-56 80-00 00-00 80-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 40-00 00-00 01-37 31-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2065: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/471 (108-byte object <4F-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 58-7A BE-56 00-00 00-00 00-32 64-63 32-65 39-34 38-63 38-30 31-64 35-63 C0-AF D0-56 28-00 00-00 28-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 10-8C C7-56 80-00 00-00 80-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 40-00 00-00 01-37 31-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2066: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/472 (108-byte object <4F-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 68-62 B3-56 00-00 00-00 00-32 64-63 32-65 39-34 38-63 38-30 31-64 35-63 30-B4 D0-56 28-00 00-00 28-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 B0-7A BE-56 80-00 00-00 80-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 40-00 00-00 01-37 31-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2067: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/473 (108-byte object <4F-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 58-7A BE-56 00-00 00-00 00-32 64-63 32-65 39-34 38-63 38-30 31-64 35-63 A0-B8 D0-56 28-00 00-00 28-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 10-8C C7-56 80-00 00-00 80-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 40-00 00-00 01-37 31-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2068: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/474 (108-byte object <50-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 80-C1 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 B0-BC B2-56 00-00 00-00 00-33 34-32 63-30 33-34 62-35 33-63 34-39 39-64 90-80 D0-56 28-00 00-00 28-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 14-00 00-00 01-37 31-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2069: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/475 (108-byte object <50-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 60-C4 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 70-7A BE-56 00-00 00-00 00-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 90-C4 D0-56 28-00 00-00 28-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 14-00 00-00 01-37 31-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2070: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/476 (108-byte object <50-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 90-80 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 B0-BC B2-56 00-00 00-00 00-33 34-32 63-30 33-34 62-35 33-63 34-39 39-64 F0-C4 D0-56 28-00 00-00 28-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 14-00 00-00 01-37 31-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2071: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/477 (108-byte object <50-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 90-C4 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 70-7A BE-56 00-00 00-00 00-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 00-C9 D0-56 28-00 00-00 28-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 14-00 00-00 01-37 31-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2072: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/478 (108-byte object <50-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 F0-C4 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 B0-BC B2-56 00-00 00-00 00-33 34-32 63-30 33-34 62-35 33-63 34-39 39-64 10-CD D0-56 28-00 00-00 28-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 14-00 00-00 01-37 31-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2073: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/479 (108-byte object <50-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 00-C9 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 70-7A BE-56 00-00 00-00 00-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 20-D1 D0-56 28-00 00-00 28-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 14-00 00-00 01-37 31-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2074: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/480 (108-byte object <51-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 10-BD D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 B0-BC B2-56 00-00 00-00 00-33 34-32 63-30 33-34 62-35 33-63 34-39 39-64 C0-EB C0-56 54-00 00-00 54-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 2A-00 00-00 01-37 31-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2075: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/481 (108-byte object <51-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 20-D1 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 70-7A BE-56 00-00 00-00 00-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 20-20 BA-56 54-00 00-00 54-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 2A-00 00-00 01-37 31-63>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2076: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/482 (108-byte object <51-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 40-D9 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 B0-BC B2-56 00-00 00-00 00-33 34-32 63-30 33-34 62-35 33-63 34-39 39-64 C0-EB C0-56 54-00 00-00 54-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 2A-00 00-00 01-37 31-63>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2077: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/483 (108-byte object <51-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 60-E2 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 70-7A BE-56 00-00 00-00 00-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 20-20 BA-56 54-00 00-00 54-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 2A-00 00-00 01-37 31-63>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2078: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/484 (108-byte object <51-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 A0-E6 D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 B0-BC B2-56 00-00 00-00 00-33 34-32 63-30 33-34 62-35 33-63 34-39 39-64 C0-EB C0-56 54-00 00-00 54-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 2A-00 00-00 01-37 31-63>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2079: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/485 (108-byte object <51-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 E0-EA D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 70-7A BE-56 00-00 00-00 00-00 00-00 63-30 33-34 62-35 33-63 34-39 39-64 20-20 BA-56 54-00 00-00 54-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 2A-00 00-00 01-37 31-63>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2080: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/486 (108-byte object <52-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 66-38 33-34 64-34 34-61 61-31 30-63 20-EF D0-56 20-00 00-00 20-00 00-00 32-65 39-34 38-63 38-30 31-64 35-63 60-8C C7-56 00-00 00-00 00-33 34-32 63-30 33-34 62-35 33-63 34-39 39-64 30-62 B3-56 80-00 00-00 80-00 00-00 31-39 34-32 65-63 65-65 37-34 31-31 40-00 00-00 01-37 31-63>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2081: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/487 (108-byte object <52-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 60-F3 D0-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 70-7A BE-56 00-00 00-00 00-39 36-30 63-30 30-33 32-65 34-37 30-63 66-38 B0-7A BE-56 80-00 00-00 80-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 40-00 00-00 01-66 66-36>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2082: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/488 (108-byte object <52-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 D0-F7 D0-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 60-8C C7-56 00-00 00-00 00-39 36-30 63-30 30-33 32-65 34-37 30-63 66-38 30-62 B3-56 80-00 00-00 80-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 40-00 00-00 01-66 66-36>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2083: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/489 (108-byte object <52-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 40-FC D0-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 70-7A BE-56 00-00 00-00 00-39 36-30 63-30 30-33 32-65 34-37 30-63 66-38 B0-7A BE-56 80-00 00-00 80-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 40-00 00-00 01-66 66-36>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2084: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/490 (108-byte object <52-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 B0-00 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 60-8C C7-56 00-00 00-00 00-39 36-30 63-30 30-33 32-65 34-37 30-63 66-38 30-62 B3-56 80-00 00-00 80-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 40-00 00-00 01-66 66-36>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2085: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/491 (108-byte object <52-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 20-05 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 70-7A BE-56 00-00 00-00 00-39 36-30 63-30 30-33 32-65 34-37 30-63 66-38 B0-7A BE-56 80-00 00-00 80-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 40-00 00-00 01-66 66-36>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2086: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/492 (108-byte object <53-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 10-CD D0-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 60-10 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 90-10 D1-56 28-00 00-00 28-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 14-00 00-00 01-66 66-36>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2087: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/493 (108-byte object <53-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 40-11 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 70-11 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 A0-11 D1-56 28-00 00-00 28-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 14-00 00-00 01-66 66-36>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2088: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/494 (108-byte object <53-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 60-10 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 90-10 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 00-12 D1-56 28-00 00-00 28-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 14-00 00-00 01-66 66-36>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2089: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/495 (108-byte object <53-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 70-11 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 A0-11 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 30-12 D1-56 28-00 00-00 28-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 14-00 00-00 01-66 66-36>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2090: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/496 (108-byte object <53-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 90-10 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 00-12 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 70-16 D1-56 28-00 00-00 28-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 14-00 00-00 01-66 66-36>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2091: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/497 (108-byte object <53-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 A0-11 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 30-12 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 B0-1A D1-56 28-00 00-00 28-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 14-00 00-00 01-66 66-36>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2092: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/498 (108-byte object <54-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 70-16 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 F0-1E D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 60-EB C0-56 54-00 00-00 54-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 2A-00 00-00 01-66 66-36>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2093: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/499 (108-byte object <54-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 30-12 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 B0-1A D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 C0-EB C0-56 54-00 00-00 54-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 2A-00 00-00 01-66 66-36>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2094: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/500 (108-byte object <54-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 F0-1E D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 D0-11 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 60-EB C0-56 54-00 00-00 54-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 2A-00 00-00 01-66 66-36>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2095: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/501 (108-byte object <54-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 B0-1A D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 90-09 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 C0-EB C0-56 54-00 00-00 54-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 2A-00 00-00 01-66 66-36>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2096: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/502 (108-byte object <54-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 D0-11 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 D0-33 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 60-EB C0-56 54-00 00-00 54-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 2A-00 00-00 01-66 66-36>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2097: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/503 (108-byte object <54-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 90-09 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 40-38 D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 C0-EB C0-56 54-00 00-00 54-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 2A-00 00-00 01-66 66-36>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2098: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/504 (108-byte object <55-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 31-33 30-30 35-37 37-62 63-38 34-66 D0-33 D1-56 20-00 00-00 20-00 00-00 32-61 36-30 62-39 38-63 66-62 35-64 B0-3C D1-56 28-00 00-00 28-00 00-00 63-30 30-33 32-65 34-37 30-63 66-38 10-8C C7-56 80-00 00-00 80-00 00-00 30-38 37-31 33-33 34-66 32-34 38-65 40-00 00-00 01-66 66-36>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2099: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/505 (108-byte object <55-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 40-38 D1-56 20-00 00-00 20-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 20-41 D1-56 28-00 00-00 28-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 30-62 B3-56 80-00 00-00 80-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 40-00 00-00 01-35 62-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2100: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/506 (108-byte object <55-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 B0-3C D1-56 20-00 00-00 20-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 90-45 D1-56 28-00 00-00 28-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 10-8C C7-56 80-00 00-00 80-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 40-00 00-00 01-35 62-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2101: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/507 (108-byte object <55-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 20-41 D1-56 20-00 00-00 20-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 30-4A D1-56 28-00 00-00 28-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 30-62 B3-56 80-00 00-00 80-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 40-00 00-00 01-35 62-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2102: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/508 (108-byte object <55-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 90-45 D1-56 20-00 00-00 20-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 D0-4E D1-56 28-00 00-00 28-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 10-8C C7-56 80-00 00-00 80-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 40-00 00-00 01-35 62-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2103: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/509 (108-byte object <55-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 30-4A D1-56 20-00 00-00 20-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 70-53 D1-56 28-00 00-00 28-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 30-62 B3-56 80-00 00-00 80-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 40-00 00-00 01-35 62-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2104: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/510 (108-byte object <56-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 D0-60 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 B0-BC B2-56 00-00 00-00 00-37 66-36 37-62 63-37 62-66 65-35 63-61 38-31 00-12 D1-56 28-00 00-00 28-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 14-00 00-00 01-35 62-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2105: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/511 (108-byte object <56-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 A0-61 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 70-7A BE-56 00-00 00-00 00-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 70-53 D1-56 28-00 00-00 28-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 14-00 00-00 01-35 62-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2106: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/512 (108-byte object <56-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 D0-60 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 B0-BC B2-56 00-00 00-00 00-37 66-36 37-62 63-37 62-66 65-35 63-61 38-31 B0-5C D1-56 28-00 00-00 28-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 14-00 00-00 01-35 62-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2107: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/513 (108-byte object <56-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 A0-61 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 70-7A BE-56 00-00 00-00 00-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 80-67 D1-56 28-00 00-00 28-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 14-00 00-00 01-35 62-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2108: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/514 (108-byte object <56-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 D0-60 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 B0-BC B2-56 00-00 00-00 00-37 66-36 37-62 63-37 62-66 65-35 63-61 38-31 B0-6B D1-56 28-00 00-00 28-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 14-00 00-00 01-35 62-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2109: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/515 (108-byte object <56-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 A0-61 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 70-7A BE-56 00-00 00-00 00-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 70-2F CC-56 28-00 00-00 28-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 14-00 00-00 01-35 62-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2110: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/516 (108-byte object <57-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 D0-60 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 B0-BC B2-56 00-00 00-00 00-37 66-36 37-62 63-37 62-66 65-35 63-61 38-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 2A-00 00-00 01-35 62-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2111: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/517 (108-byte object <57-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 A0-61 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 70-7A BE-56 00-00 00-00 00-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 60-EB C0-56 54-00 00-00 54-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 2A-00 00-00 01-35 62-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2112: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/518 (108-byte object <57-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 D0-60 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 B0-BC B2-56 00-00 00-00 00-37 66-36 37-62 63-37 62-66 65-35 63-61 38-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 2A-00 00-00 01-35 62-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2113: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/519 (108-byte object <57-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 A0-61 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 70-7A BE-56 00-00 00-00 00-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 60-EB C0-56 54-00 00-00 54-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 2A-00 00-00 01-35 62-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2114: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/520 (108-byte object <57-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 D0-60 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 B0-BC B2-56 00-00 00-00 00-37 66-36 37-62 63-37 62-66 65-35 63-61 38-31 20-20 BA-56 54-00 00-00 54-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 2A-00 00-00 01-35 62-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2115: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/521 (108-byte object <57-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 A0-61 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 70-7A BE-56 00-00 00-00 00-00 00-00 37-62 63-37 62-66 65-35 63-61 38-31 60-EB C0-56 54-00 00-00 54-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 2A-00 00-00 01-35 62-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2116: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/522 (108-byte object <58-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 63-62 35-34 39-63 30-66 64-35 64-30 D0-60 D1-56 3C-00 00-00 3C-00 00-00 64-63 37-35 31-38 63-61 61-66 65-31 80-62 B3-56 00-00 00-00 00-37 66-36 37-62 63-37 62-66 65-35 63-61 38-31 B0-7A BE-56 80-00 00-00 80-00 00-00 36-38 37-61 31-33 62-36 32-31 36-31 40-00 00-00 01-35 62-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2117: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/523 (108-byte object <58-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 70-7A BE-56 00-00 00-00 00-37 61-61 38-34 33-34 32-65 32-36 66-38 30-32 10-8C C7-56 80-00 00-00 80-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 40-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2118: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/524 (108-byte object <58-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 80-62 B3-56 00-00 00-00 00-37 61-61 38-34 33-34 32-65 32-36 66-38 30-32 B0-7A BE-56 80-00 00-00 80-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 40-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2119: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/525 (108-byte object <58-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 70-7A BE-56 00-00 00-00 00-37 61-61 38-34 33-34 32-65 32-36 66-38 30-32 10-8C C7-56 80-00 00-00 80-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 40-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2120: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/526 (108-byte object <58-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 80-62 B3-56 00-00 00-00 00-37 61-61 38-34 33-34 32-65 32-36 66-38 30-32 B0-7A BE-56 80-00 00-00 80-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 40-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2121: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/527 (108-byte object <58-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 70-7A BE-56 00-00 00-00 00-37 61-61 38-34 33-34 32-65 32-36 66-38 30-32 10-8C C7-56 80-00 00-00 80-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 40-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2122: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/528 (108-byte object <59-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 C0-BF D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 F0-BF D1-56 28-00 00-00 28-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 14-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2123: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/529 (108-byte object <59-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 D0-C0 D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 00-C1 D1-56 28-00 00-00 28-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 14-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2124: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/530 (108-byte object <59-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 F0-BF D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 60-C1 D1-56 28-00 00-00 28-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 14-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2125: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/531 (108-byte object <59-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 00-C1 D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 C0-C5 D1-56 28-00 00-00 28-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 14-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2126: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/532 (108-byte object <59-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 60-C1 D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 20-CA D1-56 28-00 00-00 28-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 14-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2127: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/533 (108-byte object <59-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 C0-C5 D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 80-CE D1-56 28-00 00-00 28-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 14-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2128: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/534 (108-byte object <5A-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 00-0E D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 C0-EB C0-56 54-00 00-00 54-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 2A-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2129: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/535 (108-byte object <5A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 80-CE D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 20-20 BA-56 54-00 00-00 54-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 2A-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2130: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/536 (108-byte object <5A-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 40-D7 D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 C0-EB C0-56 54-00 00-00 54-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 2A-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2131: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/537 (108-byte object <5A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 50-E1 D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 20-20 BA-56 54-00 00-00 54-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 2A-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2132: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/538 (108-byte object <5A-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 E0-E5 D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 C0-EB C0-56 54-00 00-00 54-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 2A-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2133: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/539 (108-byte object <5A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 A0-61 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 70-EA D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 20-20 BA-56 54-00 00-00 54-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 2A-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2134: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/540 (108-byte object <5B-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 34-63 64-39 63-37 35-38 30-34 32-65 D0-60 D1-56 3C-00 00-00 3C-00 00-00 31-36 39-34 63-30 33-36 61-35 39-37 00-EF D1-56 28-00 00-00 28-00 00-00 38-34 33-34 32-65 32-36 66-38 30-32 30-62 B3-56 80-00 00-00 80-00 00-00 38-39 65-64 37-66 33-32 35-32 61-66 40-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2135: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/541 (108-byte object <5B-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 A0-61 D1-56 3C-00 00-00 3C-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 90-F3 D1-56 28-00 00-00 28-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 B0-7A BE-56 80-00 00-00 80-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 40-00 00-00 01-33 66-30>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2136: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/542 (108-byte object <5B-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 D0-60 D1-56 3C-00 00-00 3C-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 50-F8 D1-56 28-00 00-00 28-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 30-62 B3-56 80-00 00-00 80-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 40-00 00-00 01-33 66-30>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2137: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/543 (108-byte object <5B-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 A0-61 D1-56 3C-00 00-00 3C-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 10-FD D1-56 28-00 00-00 28-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 B0-7A BE-56 80-00 00-00 80-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 40-00 00-00 01-33 66-30>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2138: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/544 (108-byte object <5B-00 00-00 60-C4 CF-56 40-00 00-00 40-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 D0-60 D1-56 3C-00 00-00 3C-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 D0-01 D2-56 28-00 00-00 28-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 30-62 B3-56 80-00 00-00 80-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 40-00 00-00 01-33 66-30>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2139: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/545 (108-byte object <5B-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 A0-61 D1-56 3C-00 00-00 3C-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 90-06 D2-56 28-00 00-00 28-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 B0-7A BE-56 80-00 00-00 80-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 40-00 00-00 01-33 66-30>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2140: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/546 (108-byte object <5C-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 30-62 B3-56 80-00 00-00 80-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 60-8C C7-56 00-00 00-00 00-64 38-30 39-65 31-65 63-33 64-34 66-65 38-33 60-EB C0-56 54-00 00-00 54-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 2A-00 00-00 01-33 66-30>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2141: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/547 (108-byte object <5C-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 B0-7A BE-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 70-7A BE-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 C0-EB C0-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2142: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/548 (108-byte object <5C-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 30-62 B3-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 60-8C C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 60-EB C0-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2143: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/549 (108-byte object <5C-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 B0-7A BE-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 70-7A BE-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 C0-EB C0-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2144: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/550 (108-byte object <5C-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 30-62 B3-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 60-8C C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 60-EB C0-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2145: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/551 (108-byte object <5C-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 B0-7A BE-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 70-7A BE-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 C0-EB C0-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2146: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/552 (108-byte object <5D-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 30-62 B3-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 60-BD D1-56 28-00 00-00 28-00 00-00 66-37 65-39 30-32 35-65 34-33 34-62 60-EB C0-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2147: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/553 (108-byte object <5D-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 B0-7A BE-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 10-2D D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-EB C0-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2148: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/554 (108-byte object <5D-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 30-62 B3-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-2F D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 60-EB C0-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2149: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/555 (108-byte object <5D-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 B0-7A BE-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-34 D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-EB C0-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2150: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/556 (108-byte object <5D-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 30-62 B3-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-39 D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 60-EB C0-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2151: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/557 (108-byte object <5D-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 B0-7A BE-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-3D D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-EB C0-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2152: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/558 (108-byte object <5E-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 A0-42 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-45 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 B0-71 D2-56 D8-27 00-00 D8-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 EC-13 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2153: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/559 (108-byte object <5E-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-47 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-45 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-9A D2-56 D8-27 00-00 D8-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 EC-13 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2154: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/560 (108-byte object <5E-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 30-C2 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-99 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 B0-71 D2-56 D8-27 00-00 D8-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 EC-13 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2155: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/561 (108-byte object <5E-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-45 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-C4 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-9A D2-56 D8-27 00-00 D8-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 EC-13 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2156: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/562 (108-byte object <5E-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 80-CA D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-C9 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 B0-71 D2-56 D8-27 00-00 D8-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 EC-13 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2157: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/563 (108-byte object <5E-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 80-CE D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-CD D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-9A D2-56 D8-27 00-00 D8-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 EC-13 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2158: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/564 (108-byte object <5F-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 50-D2 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-40 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C8-BC B2-56 00-00 00-00 00-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 ED-13 00-00 00-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2159: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/565 (108-byte object <5F-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-D6 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-D4 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 88-7A BE-56 00-00 00-00 00-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 ED-13 00-00 00-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2160: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/566 (108-byte object <5F-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-DA D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-D8 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C8-BC B2-56 00-00 00-00 00-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 ED-13 00-00 00-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2161: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/567 (108-byte object <5F-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-DE D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-DC D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 88-7A BE-56 00-00 00-00 00-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 ED-13 00-00 00-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2162: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/568 (108-byte object <5F-00 00-00 B0-E8 B8-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-E2 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-E0 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C8-BC B2-56 00-00 00-00 00-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 ED-13 00-00 00-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2163: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/569 (108-byte object <5F-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-E6 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-E4 D2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 88-7A BE-56 00-00 00-00 00-27 00-00 33-62 66-38 39-31 31-39 35-38 35-38 ED-13 00-00 00-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2164: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/570 (108-byte object <60-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 98-BC B2-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-9A D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2165: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/571 (108-byte object <60-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 58-7A BE-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-9E D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2166: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/572 (108-byte object <60-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 98-BC B2-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-A4 D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2167: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/573 (108-byte object <60-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 58-7A BE-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-A8 D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2168: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/574 (108-byte object <60-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 98-BC B2-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-AC D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2169: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/575 (108-byte object <60-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 58-7A BE-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 90-B0 D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2170: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/576 (108-byte object <61-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 F0-B8 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 40-2D D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2171: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/577 (108-byte object <61-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 D0-BB D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-BC D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2172: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/578 (108-byte object <61-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-2D D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-BC D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2173: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/579 (108-byte object <61-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 00-BC D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 C0-C0 D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2174: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/580 (108-byte object <61-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 60-BC D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 C0-15 D3-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2175: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/581 (108-byte object <61-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 C0-C0 D2-56 28-00 00-00 28-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-1A D3-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2176: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/582 (108-byte object <62-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-8C C7-56 82-00 00-00 82-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 C0-B4 D2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-A1 D2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2177: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/583 (108-byte object <62-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-62 B3-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 20-1A D3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2178: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/584 (108-byte object <62-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-8C C7-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-22 D3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2179: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/585 (108-byte object <62-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-62 B3-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-2D D3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2180: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/586 (108-byte object <62-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-8C C7-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-32 D3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2181: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/587 (108-byte object <62-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-62 B3-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-36 D3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2182: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/588 (108-byte object <63-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-4F D2-56 28-00 00-00 28-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-15 D3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2183: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/589 (108-byte object <63-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-52 D2-56 28-00 00-00 28-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-52 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2184: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/590 (108-byte object <63-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-15 D3-56 28-00 00-00 28-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-52 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2185: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/591 (108-byte object <63-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-52 D2-56 28-00 00-00 28-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-57 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2186: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/592 (108-byte object <63-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 F0-52 D2-56 28-00 00-00 28-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-5B D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2187: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/593 (108-byte object <63-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-57 D2-56 28-00 00-00 28-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-60 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2188: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/594 (108-byte object <64-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-68 D2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-4A D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2189: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/595 (108-byte object <64-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-68 D2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-60 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2190: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/596 (108-byte object <64-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 F0-6C D2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-68 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2191: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/597 (108-byte object <64-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 E0-70 D2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-72 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2192: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/598 (108-byte object <64-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 00-75 D2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-76 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2193: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/599 (108-byte object <64-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-79 D2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 20-7B D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2194: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/600 (108-byte object <65-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-83 D2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-5B D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2195: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/601 (108-byte object <65-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-86 D2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-86 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2196: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/602 (108-byte object <65-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-5B D2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-87 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2197: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/603 (108-byte object <65-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-86 D2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-8B D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2198: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/604 (108-byte object <65-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-87 D2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-8F D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2199: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/605 (108-byte object <65-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-8B D2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-94 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2200: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/606 (108-byte object <66-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-76 B3-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-7F D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2201: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/607 (108-byte object <66-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-B6 B0-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-94 D2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2202: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/608 (108-byte object <66-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-76 B3-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-05 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2203: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/609 (108-byte object <66-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-B6 B0-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-0F D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2204: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/610 (108-byte object <66-00 00-00 A0-61 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-76 B3-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-13 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 50-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2205: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/611 (108-byte object <66-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-B6 B0-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-18 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2206: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/612 (108-byte object <67-00 00-00 50-A1 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-A2 D2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-1C D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2207: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/613 (108-byte object <67-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-20 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 D0-23 D4-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2208: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/614 (108-byte object <67-00 00-00 50-A1 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-A2 D2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-26 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2209: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/615 (108-byte object <67-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-2B D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 D0-23 D4-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2210: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/616 (108-byte object <67-00 00-00 50-A1 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-A2 D2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-2F D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2211: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/617 (108-byte object <67-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-A1 D2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-34 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 D0-23 D4-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2212: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/618 (108-byte object <68-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-20 BA-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-38 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2213: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/619 (108-byte object <68-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-EB C0-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-3D D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2214: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/620 (108-byte object <68-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-20 BA-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-40 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2215: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/621 (108-byte object <68-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-EB C0-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-45 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2216: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/622 (108-byte object <68-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-20 BA-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-49 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2217: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/623 (108-byte object <68-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-EB C0-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-4E D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2218: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/624 (108-byte object <69-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-82 B0-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-52 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2219: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/625 (108-byte object <69-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-41 B6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-57 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2220: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/626 (108-byte object <69-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-82 B0-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-5C D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2221: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/627 (108-byte object <69-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-41 B6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-60 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2222: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/628 (108-byte object <69-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-82 B0-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-65 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2223: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/629 (108-byte object <69-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-41 B6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-69 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2224: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/630 (108-byte object <6A-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-76 D4-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-6E D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 544)' - PASSED gtests.sh: #2225: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/631 (108-byte object <6A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-77 D4-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-73 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 544)' - PASSED gtests.sh: #2226: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/632 (108-byte object <6A-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-76 D4-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-79 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 544)' - PASSED gtests.sh: #2227: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/633 (108-byte object <6A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-77 D4-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-7E D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 544)' - PASSED gtests.sh: #2228: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/634 (108-byte object <6A-00 00-00 10-A2 D2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-76 D4-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-83 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-A2 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 544)' - PASSED gtests.sh: #2229: 'HkdfSha1/Pkcs11HkdfTest: WycheproofVectors/635 (108-byte object <6A-00 00-00 00-63 B3-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-77 D4-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-87 D4-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-A1 D2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 544)' - PASSED gtests.sh: #2230: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/0 (108-byte object <01-00 00-00 20-C2 D2-56 2C-00 00-00 2C-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 50-8A D4-56 1A-00 00-00 1A-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-8F D4-56 14-00 00-00 14-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 10-DE B4-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2231: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/1 (108-byte object <01-00 00-00 C0-5D AF-56 2C-00 00-00 2C-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 80-5F C9-56 1A-00 00-00 1A-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 B0-A2 BA-56 14-00 00-00 14-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 70-47 C9-56 54-00 00-00 54-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 2A-00 00-00 01-65 34-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2232: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/2 (108-byte object <01-00 00-00 20-C2 D2-56 2C-00 00-00 2C-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 00-FA B3-56 1A-00 00-00 1A-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 60-C8 C2-56 14-00 00-00 14-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 10-DE B4-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2233: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/3 (108-byte object <01-00 00-00 C0-5D AF-56 2C-00 00-00 2C-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 20-24 C4-56 1A-00 00-00 1A-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 30-69 C7-56 14-00 00-00 14-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 70-47 C9-56 54-00 00-00 54-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 2A-00 00-00 01-65 34-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2234: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/4 (108-byte object <01-00 00-00 20-C2 D2-56 2C-00 00-00 2C-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 80-45 B2-56 1A-00 00-00 1A-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-6D C7-56 14-00 00-00 14-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 10-DE B4-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2235: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/5 (108-byte object <01-00 00-00 C0-5D AF-56 2C-00 00-00 2C-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 E0-6C C7-56 1A-00 00-00 1A-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 80-CB BA-56 14-00 00-00 14-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 70-47 C9-56 54-00 00-00 54-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 2A-00 00-00 01-65 34-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2236: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/6 (108-byte object <02-00 00-00 20-C2 D2-56 2C-00 00-00 2C-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 10-DE B4-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2237: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/7 (108-byte object <02-00 00-00 C0-5D AF-56 2C-00 00-00 2C-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 88-1B C9-56 00-00 00-00 00-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 A0-1B C9-56 00-00 00-00 00-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 70-47 C9-56 54-00 00-00 54-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 2A-00 00-00 01-65 34-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2238: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/8 (108-byte object <02-00 00-00 20-C2 D2-56 2C-00 00-00 2C-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 10-DE B4-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2239: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/9 (108-byte object <02-00 00-00 C0-5D AF-56 2C-00 00-00 2C-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 88-1B C9-56 00-00 00-00 00-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 A0-1B C9-56 00-00 00-00 00-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 70-47 C9-56 54-00 00-00 54-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 2A-00 00-00 01-65 34-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2240: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/10 (108-byte object <02-00 00-00 20-C2 D2-56 2C-00 00-00 2C-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 10-DE B4-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2241: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/11 (108-byte object <02-00 00-00 C0-5D AF-56 2C-00 00-00 2C-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 88-1B C9-56 00-00 00-00 00-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 A0-1B C9-56 00-00 00-00 00-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 70-47 C9-56 54-00 00-00 54-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 2A-00 00-00 01-65 34-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2242: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/12 (108-byte object <03-00 00-00 D0-1F C1-56 A0-00 00-00 A0-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 80-20 C1-56 A0-00 00-00 A0-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 30-21 C1-56 A0-00 00-00 A0-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 E0-21 C1-56 A4-00 00-00 A4-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 52-00 00-00 01-30 36-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2243: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/13 (108-byte object <03-00 00-00 10-23 C1-56 A0-00 00-00 A0-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 C0-23 C1-56 A0-00 00-00 A0-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 70-24 C1-56 A0-00 00-00 A0-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 20-25 C1-56 A4-00 00-00 A4-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 52-00 00-00 01-65 34-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2244: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/14 (108-byte object <03-00 00-00 D0-1F C1-56 A0-00 00-00 A0-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 80-20 C1-56 A0-00 00-00 A0-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 30-21 C1-56 A0-00 00-00 A0-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 E0-21 C1-56 A4-00 00-00 A4-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 52-00 00-00 01-30 36-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2245: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/15 (108-byte object <03-00 00-00 10-23 C1-56 A0-00 00-00 A0-00 00-00 35-38 66-30 30-00 00-00 30-00 00-00 C0-23 C1-56 A0-00 00-00 A0-00 00-00 00-00 00-00 98-1B C9-56 03-00 00-00 70-24 C1-56 A0-00 00-00 A0-00 00-00 62-66 37-30 60-00 00-00 30-00 00-00 20-25 C1-56 A4-00 00-00 A4-00 00-00 40-02 C5-56 C8-1B C9-56 03-00 00-00 52-00 00-00 01-65 34-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2246: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/16 (108-byte object <03-00 00-00 D0-1F C1-56 A0-00 00-00 A0-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 80-20 C1-56 A0-00 00-00 A0-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 30-21 C1-56 A0-00 00-00 A0-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 E0-21 C1-56 A4-00 00-00 A4-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 52-00 00-00 01-30 36-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2247: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/17 (108-byte object <03-00 00-00 10-23 C1-56 A0-00 00-00 A0-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 C0-23 C1-56 A0-00 00-00 A0-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 70-24 C1-56 A0-00 00-00 A0-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 20-25 C1-56 A4-00 00-00 A4-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 52-00 00-00 01-33 66-30>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2248: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/18 (108-byte object <04-00 00-00 F0-D0 C2-56 20-00 00-00 20-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 40-15 C7-56 28-00 00-00 28-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 14-00 00-00 01-30 36-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2249: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/19 (108-byte object <04-00 00-00 60-28 C9-56 20-00 00-00 20-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 48-04 C6-56 00-00 00-00 00-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 60-04 C6-56 00-00 00-00 00-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 20-1F C9-56 28-00 00-00 28-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 14-00 00-00 01-33 66-30>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2250: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/20 (108-byte object <04-00 00-00 60-51 C9-56 20-00 00-00 20-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 40-00 C9-56 28-00 00-00 28-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 14-00 00-00 01-30 36-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2251: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/21 (108-byte object <04-00 00-00 20-1F C9-56 20-00 00-00 20-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 48-04 C6-56 00-00 00-00 00-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 60-04 C6-56 00-00 00-00 00-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 B0-4C C9-56 28-00 00-00 28-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 14-00 00-00 01-33 66-30>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2252: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/22 (108-byte object <04-00 00-00 40-00 C9-56 20-00 00-00 20-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 F0-FD C1-56 28-00 00-00 28-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 14-00 00-00 01-30 36-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2253: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/23 (108-byte object <04-00 00-00 10-FE C9-56 20-00 00-00 20-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 48-04 C6-56 00-00 00-00 00-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 60-04 C6-56 00-00 00-00 00-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 60-12 C9-56 28-00 00-00 28-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 14-00 00-00 01-33 66-30>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2254: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/24 (108-byte object <05-00 00-00 C0-E3 C2-56 20-00 00-00 20-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 50-FB BD-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2255: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/25 (108-byte object <05-00 00-00 60-12 C9-56 20-00 00-00 20-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 48-04 C6-56 00-00 00-00 00-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 60-04 C6-56 00-00 00-00 00-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 10-DE B4-56 54-00 00-00 54-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 2A-00 00-00 01-33 66-30>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2256: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/26 (108-byte object <05-00 00-00 B0-03 CA-56 20-00 00-00 20-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 50-FB BD-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2257: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/27 (108-byte object <05-00 00-00 00-06 C7-56 20-00 00-00 20-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 48-04 C6-56 00-00 00-00 00-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 60-04 C6-56 00-00 00-00 00-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 10-DE B4-56 54-00 00-00 54-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 2A-00 00-00 01-33 66-30>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2258: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/28 (108-byte object <05-00 00-00 60-24 CB-56 20-00 00-00 20-00 00-00 38-37 32-31 30-00 00-00 30-00 00-00 E8-77 D0-56 00-00 00-00 00-00 00-00 00-77 D0-56 F8-77 D0-56 03-00 00-00 00-78 D0-56 00-00 00-00 00-00 00-00 38-37 32-31 60-00 00-00 30-00 00-00 50-FB BD-56 54-00 00-00 54-00 00-00 00-00 00-00 28-78 D0-56 03-00 00-00 2A-00 00-00 01-30 36-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2259: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/29 (108-byte object <05-00 00-00 B0-9E C9-56 20-00 00-00 20-00 00-00 64-63 37-38 34-33 32-39 33-36 37-61 48-04 C6-56 00-00 00-00 00-00 00-00 35-61 38-38 32-33 35-61 35-32 37-38 60-04 C6-56 00-00 00-00 00-00 00-00 39-65 31-65 63-33 64-34 66-65 38-33 10-DE B4-56 54-00 00-00 54-00 00-00 65-63 32-39 34-31 38-64 61-32 65-32 2A-00 00-00 01-33 66-30>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2260: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/30 (108-byte object <06-00 00-00 50-D4 C4-56 20-00 00-00 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A8-3A D5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-3A D5-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-3B D5-56 80-00 00-00 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-00 00-00 01-00 00-00>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2261: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/31 (108-byte object <06-00 00-00 70-81 CB-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 60-04 C6-56 00-00 00-00 00-32 30-31 32-39 31-37 63-32 30-65 30-39 35-33 90-3B D5-56 80-00 00-00 80-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 40-00 00-00 01-62 31-35>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2262: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/32 (108-byte object <06-00 00-00 10-AE C4-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 A8-3A D5-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 C0-3A D5-56 00-00 00-00 00-32 30-31 32-39 31-37 63-32 30-65 30-39 35-33 00-3B D5-56 80-00 00-00 80-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 40-00 00-00 01-62 31-35>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2263: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/33 (108-byte object <06-00 00-00 F0-73 CB-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 60-04 C6-56 00-00 00-00 00-32 30-31 32-39 31-37 63-32 30-65 30-39 35-33 50-BE C5-56 80-00 00-00 80-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 40-00 00-00 01-62 31-35>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2264: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/34 (108-byte object <06-00 00-00 F0-6A CB-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 A8-3A D5-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 C0-3A D5-56 00-00 00-00 00-32 30-31 32-39 31-37 63-32 30-65 30-39 35-33 00-3B D5-56 80-00 00-00 80-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 40-00 00-00 01-62 31-35>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2265: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/35 (108-byte object <06-00 00-00 C0-F4 CB-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 60-04 C6-56 00-00 00-00 00-32 30-31 32-39 31-37 63-32 30-65 30-39 35-33 50-BE C5-56 80-00 00-00 80-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 40-00 00-00 01-62 31-35>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2266: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/36 (108-byte object <07-00 00-00 D0-A9 CB-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 E8-77 D0-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 60-D8 CB-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 40-D4 CB-56 28-00 00-00 28-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 14-00 00-00 01-62 31-35>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2267: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/37 (108-byte object <07-00 00-00 F0-7C CB-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 20-D0 CB-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 10-1C C9-56 28-00 00-00 28-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 14-00 00-00 01-62 31-35>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2268: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/38 (108-byte object <07-00 00-00 10-85 CC-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 E8-77 D0-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 D0-29 CC-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 60-80 CC-56 28-00 00-00 28-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 14-00 00-00 01-62 31-35>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2269: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/39 (108-byte object <07-00 00-00 10-1C C9-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 20-6F CC-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 B0-66 CC-56 28-00 00-00 28-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 14-00 00-00 01-62 31-35>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2270: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/40 (108-byte object <07-00 00-00 C0-77 CC-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 E8-77 D0-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 40-D4 CB-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 10-C1 CC-56 28-00 00-00 28-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 14-00 00-00 01-62 31-35>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2271: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/41 (108-byte object <07-00 00-00 B0-66 CC-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 90-C5 CC-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 90-BC CC-56 28-00 00-00 28-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 14-00 00-00 01-62 31-35>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2272: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/42 (108-byte object <08-00 00-00 10-0E CD-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 E8-77 D0-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 A0-09 CD-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 70-47 C9-56 54-00 00-00 54-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 2A-00 00-00 01-62 31-35>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2273: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/43 (108-byte object <08-00 00-00 C0-B3 CC-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 D0-6A CC-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 50-FB BD-56 54-00 00-00 54-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 2A-00 00-00 01-62 31-35>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2274: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/44 (108-byte object <08-00 00-00 A0-09 CD-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 E8-77 D0-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 10-B8 CC-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 70-47 C9-56 54-00 00-00 54-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 2A-00 00-00 01-62 31-35>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2275: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/45 (108-byte object <08-00 00-00 D0-6A CC-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 40-D4 CB-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 50-FB BD-56 54-00 00-00 54-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 2A-00 00-00 01-62 31-35>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2276: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/46 (108-byte object <08-00 00-00 C0-97 CD-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 E8-77 D0-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 90-BC CC-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 70-47 C9-56 54-00 00-00 54-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 2A-00 00-00 01-62 31-35>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2277: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/47 (108-byte object <08-00 00-00 40-D4 CB-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 48-04 C6-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 70-9C CD-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 50-FB BD-56 54-00 00-00 54-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 2A-00 00-00 01-62 31-35>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2278: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/48 (108-byte object <09-00 00-00 90-BC CC-56 20-00 00-00 20-00 00-00 35-31 61-39 32-36 38-34 39-32 31-30 88-BE C5-56 00-00 00-00 00-34 31-30 39-66 32-31 38-35 39-36 65-32 37-62 50-A1 C5-56 28-00 00-00 28-00 00-00 32-39 31-37 63-32 30-65 30-39 35-33 70-3A D5-56 80-00 00-00 80-00 00-00 61-63 30-62 35-33 61-35 31-64 39-63 40-00 00-00 01-62 31-35>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2279: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/49 (108-byte object <09-00 00-00 C0-E2 CD-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 48-04 C6-56 00-00 00-00 00-38 39-33 35-66 34-61 32-62 65-30 31-63 35-30 60-8E CD-56 28-00 00-00 28-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 00-3B D5-56 80-00 00-00 80-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 40-00 00-00 01-61 39-38>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2280: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/50 (108-byte object <09-00 00-00 50-A1 C5-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 88-BE C5-56 00-00 00-00 00-38 39-33 35-66 34-61 32-62 65-30 31-63 35-30 F0-6E CE-56 28-00 00-00 28-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 70-3A D5-56 80-00 00-00 80-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 40-00 00-00 01-61 39-38>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2281: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/51 (108-byte object <09-00 00-00 50-5C CE-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 48-04 C6-56 00-00 00-00 00-38 39-33 35-66 34-61 32-62 65-30 31-63 35-30 10-B7 CD-56 28-00 00-00 28-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 00-3B D5-56 80-00 00-00 80-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 40-00 00-00 01-61 39-38>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2282: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/52 (108-byte object <09-00 00-00 F0-6E CE-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 88-BE C5-56 00-00 00-00 00-38 39-33 35-66 34-61 32-62 65-30 31-63 35-30 30-54 CE-56 28-00 00-00 28-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 70-3A D5-56 80-00 00-00 80-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 40-00 00-00 01-61 39-38>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2283: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/53 (108-byte object <09-00 00-00 10-B7 CD-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 48-04 C6-56 00-00 00-00 00-38 39-33 35-66 34-61 32-62 65-30 31-63 35-30 40-58 CE-56 28-00 00-00 28-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 00-3B D5-56 80-00 00-00 80-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 40-00 00-00 01-61 39-38>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2284: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/54 (108-byte object <0A-00 00-00 40-08 CE-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 30-25 CE-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 00-78 D0-56 00-00 00-00 00-62 62-37 35-37 62-65 63-30 61-35 32-37 32-35 D0-1C CE-56 28-00 00-00 28-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 14-00 00-00 01-61 39-38>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2285: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/55 (108-byte object <0A-00 00-00 D0-D6 CF-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 30-54 CE-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 60-04 C6-56 00-00 00-00 00-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 70-D2 CF-56 28-00 00-00 28-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 14-00 00-00 01-61 39-38>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2286: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/56 (108-byte object <0A-00 00-00 D0-1C CE-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 10-CE CF-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 00-78 D0-56 00-00 00-00 00-62 62-37 35-37 62-65 63-30 61-35 32-37 32-35 10-9A C7-56 28-00 00-00 28-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 14-00 00-00 01-61 39-38>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2287: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/57 (108-byte object <0A-00 00-00 80-1A D0-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 00-21 CE-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 60-04 C6-56 00-00 00-00 00-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 F0-15 D0-56 28-00 00-00 28-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 14-00 00-00 01-61 39-38>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2288: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/58 (108-byte object <0A-00 00-00 10-9A C7-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 70-0F D0-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 00-78 D0-56 00-00 00-00 00-62 62-37 35-37 62-65 63-30 61-35 32-37 32-35 70-06 D0-56 28-00 00-00 28-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 14-00 00-00 01-61 39-38>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2289: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/59 (108-byte object <0A-00 00-00 30-70 D0-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 70-D2 CF-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 60-04 C6-56 00-00 00-00 00-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 F0-6B D0-56 28-00 00-00 28-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 14-00 00-00 01-61 39-38>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2290: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/60 (108-byte object <0B-00 00-00 30-5F D0-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 70-63 D0-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 00-78 D0-56 00-00 00-00 00-62 62-37 35-37 62-65 63-30 61-35 32-37 32-35 10-DE B4-56 54-00 00-00 54-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 2A-00 00-00 01-61 39-38>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2291: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/61 (108-byte object <0B-00 00-00 70-D2 CF-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 F0-6B D0-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 60-04 C6-56 00-00 00-00 00-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 70-47 C9-56 54-00 00-00 54-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 2A-00 00-00 01-61 39-38>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2292: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/62 (108-byte object <0B-00 00-00 70-63 D0-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 F0-0A D0-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 00-78 D0-56 00-00 00-00 00-62 62-37 35-37 62-65 63-30 61-35 32-37 32-35 10-DE B4-56 54-00 00-00 54-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 2A-00 00-00 01-61 39-38>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2293: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/63 (108-byte object <0B-00 00-00 00-C9 D0-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 F0-5A D0-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 60-04 C6-56 00-00 00-00 00-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 70-47 C9-56 54-00 00-00 54-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 2A-00 00-00 01-61 39-38>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2294: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/64 (108-byte object <0B-00 00-00 F0-0A D0-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 A0-E6 D0-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 00-78 D0-56 00-00 00-00 00-62 62-37 35-37 62-65 63-30 61-35 32-37 32-35 10-DE B4-56 54-00 00-00 54-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 2A-00 00-00 01-61 39-38>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2295: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/65 (108-byte object <0B-00 00-00 B0-3C D1-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 20-41 D1-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 60-04 C6-56 00-00 00-00 00-00 00-00 35-37 62-65 63-30 61-35 32-37 32-35 70-47 C9-56 54-00 00-00 54-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 2A-00 00-00 01-61 39-38>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2296: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/66 (108-byte object <0C-00 00-00 A0-E6 D0-56 20-00 00-00 20-00 00-00 65-33 66-33 38-64 61-31 32-33 38-38 40-38 D1-56 20-00 00-00 20-00 00-00 35-66 34-61 32-62 65-30 31-63 35-30 50-3B D5-56 00-00 00-00 00-62 62-37 35-37 62-65 63-30 61-35 32-37 32-35 50-BE C5-56 80-00 00-00 80-00 00-00 64-32 31-32 32-34 65-31 63-64 61-61 40-00 00-00 01-61 39-38>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2297: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/67 (108-byte object <0C-00 00-00 20-41 D1-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 90-09 D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 60-04 C6-56 00-00 00-00 00-64 38-32 64-37 65-34 36-65 62-66 39-61 63-63 70-3A D5-56 80-00 00-00 80-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 40-00 00-00 01-65 38-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2298: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/68 (108-byte object <0C-00 00-00 40-B4 D1-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 40-D9 D0-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 50-3B D5-56 00-00 00-00 00-64 38-32 64-37 65-34 36-65 62-66 39-61 63-63 50-BE C5-56 80-00 00-00 80-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 40-00 00-00 01-65 38-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2299: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/69 (108-byte object <0C-00 00-00 90-09 D1-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 B0-AF D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 60-04 C6-56 00-00 00-00 00-64 38-32 64-37 65-34 36-65 62-66 39-61 63-63 70-3A D5-56 80-00 00-00 80-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 40-00 00-00 01-65 38-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2300: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/70 (108-byte object <0C-00 00-00 40-D9 D0-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 90-A6 D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 50-3B D5-56 00-00 00-00 00-64 38-32 64-37 65-34 36-65 62-66 39-61 63-63 50-BE C5-56 80-00 00-00 80-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 40-00 00-00 01-65 38-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2301: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/71 (108-byte object <0C-00 00-00 10-FD D1-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 20-AB D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 60-04 C6-56 00-00 00-00 00-64 38-32 64-37 65-34 36-65 62-66 39-61 63-63 70-3A D5-56 80-00 00-00 80-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 40-00 00-00 01-65 38-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2302: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/72 (108-byte object <0D-00 00-00 50-0B D2-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 10-10 D2-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 B0-AF D1-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 40-38 D1-56 28-00 00-00 28-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 14-00 00-00 01-65 38-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2303: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/73 (108-byte object <0D-00 00-00 70-47 D2-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 10-FD D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 30-A8 D2-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 00-A4 D2-56 28-00 00-00 28-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 14-00 00-00 01-65 38-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2304: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/74 (108-byte object <0D-00 00-00 B0-AF D1-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 40-38 D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 B0-9E D2-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 70-E6 D2-56 28-00 00-00 28-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 14-00 00-00 01-65 38-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2305: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/75 (108-byte object <0D-00 00-00 80-CA D2-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 70-DE D2-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 10-10 D2-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 10-32 D3-56 28-00 00-00 28-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 14-00 00-00 01-65 38-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2306: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/76 (108-byte object <0D-00 00-00 70-8B D2-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 D0-9A D2-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 10-87 D2-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 B0-5B D2-56 28-00 00-00 28-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 14-00 00-00 01-65 38-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2307: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/77 (108-byte object <0D-00 00-00 10-32 D3-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 C0-83 D2-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 70-DA C7-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 20-7B D2-56 28-00 00-00 28-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 14-00 00-00 01-65 38-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2308: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/78 (108-byte object <0E-00 00-00 B0-38 D4-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 30-34 D4-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 B0-2F D4-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 50-FB BD-56 54-00 00-00 54-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 2A-00 00-00 01-65 38-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2309: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/79 (108-byte object <0E-00 00-00 20-7B D2-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 70-06 D0-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 30-2B D4-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 10-DE B4-56 54-00 00-00 54-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 2A-00 00-00 01-65 38-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2310: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/80 (108-byte object <0E-00 00-00 30-34 D4-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 B0-2F D4-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 40-38 D1-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 50-FB BD-56 54-00 00-00 54-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 2A-00 00-00 01-65 38-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2311: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/81 (108-byte object <0E-00 00-00 B0-67 D0-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 20-CA D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 E0-79 D4-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 10-DE B4-56 54-00 00-00 54-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 2A-00 00-00 01-65 38-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2312: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/82 (108-byte object <0E-00 00-00 B0-2F D4-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 40-38 D1-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 B0-F4 C7-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 50-FB BD-56 54-00 00-00 54-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 2A-00 00-00 01-65 38-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2313: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/83 (108-byte object <0E-00 00-00 90-7E D4-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 40-B6 C7-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 60-9E C4-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 10-DE B4-56 54-00 00-00 54-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 2A-00 00-00 01-65 38-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2314: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/84 (108-byte object <0F-00 00-00 80-00 C8-56 20-00 00-00 20-00 00-00 32-63 38-66 33-66 32-39 31-30 34-32 40-4C C8-56 20-00 00-00 20-00 00-00 65-65 64-37 65-30 64-66 35-32 35-31 E0-3F C8-56 28-00 00-00 28-00 00-00 64-37 65-34 36-65 62-66 39-61 63-63 00-3B D5-56 80-00 00-00 80-00 00-00 35-62 36-35 62-39 32-66 36-39 32-39 40-00 00-00 01-65 38-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2315: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/85 (108-byte object <0F-00 00-00 40-B6 C7-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 60-9E C4-56 20-00 00-00 20-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 A0-3A C8-56 28-00 00-00 28-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 50-BE C5-56 80-00 00-00 80-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 40-00 00-00 01-66 31-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2316: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/86 (108-byte object <0F-00 00-00 40-4C C8-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 E0-3F C8-56 20-00 00-00 20-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 B0-9E D2-56 28-00 00-00 28-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 00-3B D5-56 80-00 00-00 80-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 40-00 00-00 01-66 31-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2317: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/87 (108-byte object <0F-00 00-00 60-9E C4-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 A0-3A C8-56 20-00 00-00 20-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 C0-67 C9-56 28-00 00-00 28-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 50-BE C5-56 80-00 00-00 80-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 40-00 00-00 01-66 31-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2318: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/88 (108-byte object <0F-00 00-00 E0-3F C8-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 B0-9E D2-56 20-00 00-00 20-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 B0-3B C8-56 28-00 00-00 28-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 00-3B D5-56 80-00 00-00 80-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 40-00 00-00 01-66 31-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2319: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/89 (108-byte object <0F-00 00-00 A0-3A C8-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 C0-67 C9-56 20-00 00-00 20-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 D0-E3 D5-56 28-00 00-00 28-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 50-BE C5-56 80-00 00-00 80-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 40-00 00-00 01-66 31-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2320: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/90 (108-byte object <10-00 00-00 B0-3B C8-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 00-11 C1-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 00-78 D0-56 00-00 00-00 00-63 31-62 37-30 30-32 31-35 61-34 35-30 66-39 50-E8 D5-56 28-00 00-00 28-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 14-00 00-00 01-66 31-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2321: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/91 (108-byte object <10-00 00-00 C0-67 C9-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 60-04 C6-56 00-00 00-00 00-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 D0-E3 D5-56 28-00 00-00 28-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 14-00 00-00 01-66 31-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2322: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/92 (108-byte object <10-00 00-00 50-E8 D5-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 00-11 C1-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 00-78 D0-56 00-00 00-00 00-63 31-62 37-30 30-32 31-35 61-34 35-30 66-39 70-DE D2-56 28-00 00-00 28-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 14-00 00-00 01-66 31-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2323: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/93 (108-byte object <10-00 00-00 D0-E3 D5-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 60-04 C6-56 00-00 00-00 00-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 40-38 D1-56 28-00 00-00 28-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 14-00 00-00 01-66 31-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2324: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/94 (108-byte object <10-00 00-00 70-DE D2-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 00-11 C1-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 00-78 D0-56 00-00 00-00 00-63 31-62 37-30 30-32 31-35 61-34 35-30 66-39 D0-FD D5-56 28-00 00-00 28-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 14-00 00-00 01-66 31-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2325: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/95 (108-byte object <10-00 00-00 40-38 D1-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 60-04 C6-56 00-00 00-00 00-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 E0-01 D6-56 28-00 00-00 28-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 14-00 00-00 01-66 31-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2326: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/96 (108-byte object <11-00 00-00 B0-9E D2-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 00-11 C1-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 00-78 D0-56 00-00 00-00 00-63 31-62 37-30 30-32 31-35 61-34 35-30 66-39 70-47 C9-56 54-00 00-00 54-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 2A-00 00-00 01-66 31-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2327: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/97 (108-byte object <11-00 00-00 E0-01 D6-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 60-04 C6-56 00-00 00-00 00-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 50-FB BD-56 54-00 00-00 54-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 2A-00 00-00 01-66 31-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2328: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/98 (108-byte object <11-00 00-00 00-0A D6-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 00-11 C1-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 00-78 D0-56 00-00 00-00 00-63 31-62 37-30 30-32 31-35 61-34 35-30 66-39 70-47 C9-56 54-00 00-00 54-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 2A-00 00-00 01-66 31-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2329: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/99 (108-byte object <11-00 00-00 20-13 D6-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 60-04 C6-56 00-00 00-00 00-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 50-FB BD-56 54-00 00-00 54-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 2A-00 00-00 01-66 31-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2330: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/100 (108-byte object <11-00 00-00 60-17 D6-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 00-11 C1-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 00-78 D0-56 00-00 00-00 00-63 31-62 37-30 30-32 31-35 61-34 35-30 66-39 70-47 C9-56 54-00 00-00 54-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 2A-00 00-00 01-66 31-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2331: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/101 (108-byte object <11-00 00-00 A0-1B D6-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 60-04 C6-56 00-00 00-00 00-00 00-00 37-30 30-32 31-35 61-34 35-30 66-39 50-FB BD-56 54-00 00-00 54-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 2A-00 00-00 01-66 31-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2332: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/102 (108-byte object <12-00 00-00 E0-1F D6-56 20-00 00-00 20-00 00-00 38-32 63-64 34-62 66-35 36-39 66-37 00-11 C1-56 3C-00 00-00 3C-00 00-00 33-65 31-66 65-30 36-31 35-36 36-33 A0-BE C5-56 00-00 00-00 00-63 31-62 37-30 30-32 31-35 61-34 35-30 66-39 70-3A D5-56 80-00 00-00 80-00 00-00 63-34 37-30 37-64 35-34 34-38 38-31 40-00 00-00 01-66 31-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2333: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/103 (108-byte object <12-00 00-00 20-24 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 60-04 C6-56 00-00 00-00 00-61 32-30 31-32 32-65 65-33 33-62 39-31 63-37 00-3B D5-56 80-00 00-00 80-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 40-00 00-00 01-32 30-38>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2334: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/104 (108-byte object <12-00 00-00 90-28 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 A0-BE C5-56 00-00 00-00 00-61 32-30 31-32 32-65 65-33 33-62 39-31 63-37 70-3A D5-56 80-00 00-00 80-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 40-00 00-00 01-32 30-38>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2335: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/105 (108-byte object <12-00 00-00 00-2D D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 60-04 C6-56 00-00 00-00 00-61 32-30 31-32 32-65 65-33 33-62 39-31 63-37 00-3B D5-56 80-00 00-00 80-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 40-00 00-00 01-32 30-38>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2336: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/106 (108-byte object <12-00 00-00 70-31 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 A0-BE C5-56 00-00 00-00 00-61 32-30 31-32 32-65 65-33 33-62 39-31 63-37 70-3A D5-56 80-00 00-00 80-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 40-00 00-00 01-32 30-38>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2337: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/107 (108-byte object <12-00 00-00 E0-35 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 60-04 C6-56 00-00 00-00 00-61 32-30 31-32 32-65 65-33 33-62 39-31 63-37 00-3B D5-56 80-00 00-00 80-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 40-00 00-00 01-32 30-38>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2338: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/108 (108-byte object <13-00 00-00 D0-FD D5-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 20-41 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 50-41 D6-56 28-00 00-00 28-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 14-00 00-00 01-32 30-38>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2339: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/109 (108-byte object <13-00 00-00 00-42 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 30-42 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 60-42 D6-56 28-00 00-00 28-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 14-00 00-00 01-32 30-38>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2340: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/110 (108-byte object <13-00 00-00 20-41 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 50-41 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 C0-42 D6-56 28-00 00-00 28-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 14-00 00-00 01-32 30-38>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2341: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/111 (108-byte object <13-00 00-00 30-42 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 60-42 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 F0-42 D6-56 28-00 00-00 28-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 14-00 00-00 01-32 30-38>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2342: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/112 (108-byte object <13-00 00-00 50-41 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 C0-42 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 30-47 D6-56 28-00 00-00 28-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 14-00 00-00 01-32 30-38>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2343: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/113 (108-byte object <13-00 00-00 60-42 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 F0-42 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 70-4B D6-56 28-00 00-00 28-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 14-00 00-00 01-32 30-38>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2344: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/114 (108-byte object <14-00 00-00 30-47 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 B0-4F D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 10-DE B4-56 54-00 00-00 54-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 2A-00 00-00 01-32 30-38>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2345: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/115 (108-byte object <14-00 00-00 F0-42 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 70-4B D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 70-47 C9-56 54-00 00-00 54-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 2A-00 00-00 01-32 30-38>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2346: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/116 (108-byte object <14-00 00-00 B0-4F D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 90-42 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 10-DE B4-56 54-00 00-00 54-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 2A-00 00-00 01-32 30-38>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2347: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/117 (108-byte object <14-00 00-00 70-4B D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 50-3A D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 70-47 C9-56 54-00 00-00 54-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 2A-00 00-00 01-32 30-38>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2348: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/118 (108-byte object <14-00 00-00 90-42 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 90-64 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 10-DE B4-56 54-00 00-00 54-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 2A-00 00-00 01-32 30-38>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2349: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/119 (108-byte object <14-00 00-00 50-3A D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 00-69 D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 70-47 C9-56 54-00 00-00 54-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 2A-00 00-00 01-32 30-38>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2350: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/120 (108-byte object <15-00 00-00 90-64 D6-56 20-00 00-00 20-00 00-00 31-66 33-30 36-62 64-62 38-62 63-39 00-11 C1-56 3C-00 00-00 3C-00 00-00 30-63 64-65 66-31 63-66 62-35 36-65 70-6D D6-56 28-00 00-00 28-00 00-00 31-32 32-65 65-33 33-62 39-31 63-37 50-BE C5-56 80-00 00-00 80-00 00-00 38-37 64-62 65-64 33-61 34-34 36-63 40-00 00-00 01-32 30-38>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2351: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/121 (108-byte object <15-00 00-00 00-69 D6-56 20-00 00-00 20-00 00-00 34-39 61-36 66-62 65-35 38-33 36-30 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 32-65 61-63 37-38 30-36 66-61 34-30 E0-71 D6-56 28-00 00-00 28-00 00-00 34-33 31-32 39-66 39-37 63-61 34-34 70-3A D5-56 80-00 00-00 80-00 00-00 64-31 62-31 38-35 38-61 66-38 33-64 40-00 00-00 01-31 66-66>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2352: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/122 (108-byte object <15-00 00-00 70-6D D6-56 20-00 00-00 20-00 00-00 34-39 61-36 66-62 65-35 38-33 36-30 00-11 C1-56 3C-00 00-00 3C-00 00-00 32-65 61-63 37-38 30-36 66-61 34-30 50-76 D6-56 28-00 00-00 28-00 00-00 34-33 31-32 39-66 39-37 63-61 34-34 50-BE C5-56 80-00 00-00 80-00 00-00 64-31 62-31 38-35 38-61 66-38 33-64 40-00 00-00 01-31 66-66>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2353: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/123 (108-byte object <15-00 00-00 E0-71 D6-56 20-00 00-00 20-00 00-00 34-39 61-36 66-62 65-35 38-33 36-30 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 32-65 61-63 37-38 30-36 66-61 34-30 F0-7A D6-56 28-00 00-00 28-00 00-00 34-33 31-32 39-66 39-37 63-61 34-34 70-3A D5-56 80-00 00-00 80-00 00-00 64-31 62-31 38-35 38-61 66-38 33-64 40-00 00-00 01-31 66-66>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2354: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/124 (108-byte object <15-00 00-00 50-76 D6-56 20-00 00-00 20-00 00-00 34-39 61-36 66-62 65-35 38-33 36-30 00-11 C1-56 3C-00 00-00 3C-00 00-00 32-65 61-63 37-38 30-36 66-61 34-30 90-7F D6-56 28-00 00-00 28-00 00-00 34-33 31-32 39-66 39-37 63-61 34-34 50-BE C5-56 80-00 00-00 80-00 00-00 64-31 62-31 38-35 38-61 66-38 33-64 40-00 00-00 01-31 66-66>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2355: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/125 (108-byte object <15-00 00-00 F0-7A D6-56 20-00 00-00 20-00 00-00 34-39 61-36 66-62 65-35 38-33 36-30 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 32-65 61-63 37-38 30-36 66-61 34-30 30-84 D6-56 28-00 00-00 28-00 00-00 34-33 31-32 39-66 39-37 63-61 34-34 70-3A D5-56 80-00 00-00 80-00 00-00 64-31 62-31 38-35 38-61 66-38 33-64 40-00 00-00 01-31 66-66>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2356: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/126 (108-byte object <16-00 00-00 C0-42 D6-56 20-00 00-00 20-00 00-00 34-39 61-36 66-62 65-35 38-33 36-30 50-BE C5-56 80-00 00-00 80-00 00-00 32-65 61-63 37-38 30-36 66-61 34-30 50-3B D5-56 00-00 00-00 00-32 61-37 34-33 31-32 39-66 39-37 63-61 34-34 50-FB BD-56 54-00 00-00 54-00 00-00 64-31 62-31 38-35 38-61 66-38 33-64 2A-00 00-00 01-31 66-66>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2357: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/127 (108-byte object <16-00 00-00 30-84 D6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 70-3A D5-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 60-04 C6-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 10-DE B4-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2358: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/128 (108-byte object <16-00 00-00 70-8D D6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 50-BE C5-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 50-3B D5-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 50-FB BD-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2359: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/129 (108-byte object <16-00 00-00 A0-97 D6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 70-3A D5-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 60-04 C6-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 10-DE B4-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2360: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/130 (108-byte object <16-00 00-00 20-9C D6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 50-BE C5-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 50-3B D5-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 50-FB BD-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2361: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/131 (108-byte object <16-00 00-00 C0-A8 D6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 70-3A D5-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 60-04 C6-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 10-DE B4-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2362: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/132 (108-byte object <17-00 00-00 C0-B1 D6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 50-BE C5-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 90-7F D6-56 28-00 00-00 28-00 00-00 64-61 38-66 61-38 65-64 37-61 38-32 50-FB BD-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2363: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/133 (108-byte object <17-00 00-00 A0-B4 D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 70-3A D5-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 D0-B4 D6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 10-DE B4-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2364: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/134 (108-byte object <17-00 00-00 90-7F D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-BE C5-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 30-B5 D6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 50-FB BD-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2365: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/135 (108-byte object <17-00 00-00 D0-B4 D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 70-3A D5-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-B9 D6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 10-DE B4-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2366: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/136 (108-byte object <17-00 00-00 30-B5 D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-BE C5-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-BE D6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 50-FB BD-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2367: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/137 (108-byte object <17-00 00-00 E0-B9 D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 70-3A D5-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 40-C3 D6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 10-DE B4-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2368: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/138 (108-byte object <18-00 00-00 40-AD D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 40-CC D6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 A0-10 D7-56 C0-3F 00-00 C0-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E0-1F 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2369: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/139 (108-byte object <18-00 00-00 40-C3 D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 20-CC D6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 30-51 D7-56 C0-3F 00-00 C0-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E0-1F 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2370: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/140 (108-byte object <18-00 00-00 A0-CC D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 B0-50 D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 70-11 D8-56 C0-3F 00-00 C0-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E0-1F 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2371: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/141 (108-byte object <18-00 00-00 60-CC D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-93 D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 30-51 D7-56 C0-3F 00-00 C0-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E0-1F 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2372: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/142 (108-byte object <18-00 00-00 F0-98 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 70-97 D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 70-11 D8-56 C0-3F 00-00 C0-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E0-1F 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2373: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/143 (108-byte object <18-00 00-00 F0-9C D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 70-9B D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 30-51 D7-56 C0-3F 00-00 C0-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E0-1F 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2374: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/144 (108-byte object <19-00 00-00 F0-A0 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 70-C7 D6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 18-78 D0-56 00-00 00-00 00-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E1-1F 00-00 00-66 30-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2375: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/145 (108-byte object <19-00 00-00 10-A5 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-A3 D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 78-04 C6-56 00-00 00-00 00-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E1-1F 00-00 00-66 30-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2376: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/146 (108-byte object <19-00 00-00 10-A9 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-A7 D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 18-78 D0-56 00-00 00-00 00-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E1-1F 00-00 00-66 30-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2377: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/147 (108-byte object <19-00 00-00 10-AD D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-AB D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 78-04 C6-56 00-00 00-00 00-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E1-1F 00-00 00-66 30-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2378: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/148 (108-byte object <19-00 00-00 10-B1 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 50-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-AF D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 18-78 D0-56 00-00 00-00 00-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E1-1F 00-00 00-66 30-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2379: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/149 (108-byte object <19-00 00-00 10-B5 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-B3 D7-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 78-04 C6-56 00-00 00-00 00-3F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 E1-1F 00-00 00-66 30-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2380: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/150 (108-byte object <1A-00 00-00 10-BD D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 E8-77 D0-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-BE D6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 50-11 C1-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2381: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/151 (108-byte object <1A-00 00-00 D0-BF D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 48-04 C6-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 00-C0 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-11 C1-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2382: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/152 (108-byte object <1A-00 00-00 90-BE D6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 E8-77 D0-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 60-C0 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 50-11 C1-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2383: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/153 (108-byte object <1A-00 00-00 00-C0 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 48-04 C6-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 70-C4 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-11 C1-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2384: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/154 (108-byte object <1A-00 00-00 60-C0 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 E8-77 D0-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 80-C8 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 50-11 C1-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2385: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/155 (108-byte object <1A-00 00-00 70-C4 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 48-04 C6-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-CC D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-11 C1-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2386: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/156 (108-byte object <1B-00 00-00 80-C8 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-F6 D5-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 A0-D0 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 A0-58 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2387: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/157 (108-byte object <1B-00 00-00 90-CC D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 10-55 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 70-59 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2388: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/158 (108-byte object <1B-00 00-00 A0-D0 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-F6 D5-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 10-5A D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 A0-58 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2389: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/159 (108-byte object <1B-00 00-00 10-55 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 C0-5E D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 70-59 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2390: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/160 (108-byte object <1B-00 00-00 10-5A D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-F6 D5-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 20-63 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 A0-58 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2391: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/161 (108-byte object <1B-00 00-00 C0-5E D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-11 C1-56 40-00 00-00 40-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 80-67 D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 70-59 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2392: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/162 (108-byte object <1C-00 00-00 20-63 D7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 00-3B D5-56 82-00 00-00 82-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-6B D7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 50-11 C1-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2393: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/163 (108-byte object <1C-00 00-00 80-67 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-BE C5-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-70 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2394: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/164 (108-byte object <1C-00 00-00 E0-6B D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-3B D5-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-74 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2395: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/165 (108-byte object <1C-00 00-00 40-70 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-BE C5-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-78 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2396: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/166 (108-byte object <1C-00 00-00 A0-74 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-3B D5-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-7D D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2397: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/167 (108-byte object <1C-00 00-00 F0-78 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-BE C5-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 90-81 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2398: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/168 (108-byte object <1D-00 00-00 40-7D D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-59 D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 E0-85 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-8E D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2399: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/169 (108-byte object <1D-00 00-00 90-81 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-11 C1-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 80-8A D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 70-8F D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2400: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/170 (108-byte object <1D-00 00-00 E0-85 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-59 D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-90 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-8E D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2401: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/171 (108-byte object <1D-00 00-00 80-8A D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-11 C1-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-15 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 70-8F D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2402: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/172 (108-byte object <1D-00 00-00 10-90 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-59 D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-1A D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-8E D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2403: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/173 (108-byte object <1D-00 00-00 A0-15 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-11 C1-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-1E D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 70-8F D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2404: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/174 (108-byte object <1E-00 00-00 00-1A D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 C0-26 D8-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-22 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2405: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/175 (108-byte object <1E-00 00-00 60-1E D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-26 D8-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 20-27 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2406: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/176 (108-byte object <1E-00 00-00 C0-22 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-2B D8-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-2B D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2407: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/177 (108-byte object <1E-00 00-00 20-27 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-2F D8-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-2F D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2408: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/178 (108-byte object <1E-00 00-00 C0-2B D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-33 D8-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 80-33 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2409: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/179 (108-byte object <1E-00 00-00 A0-2F D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E0-36 D8-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-37 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2410: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/180 (108-byte object <1F-00 00-00 40-3B D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-3F D8-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-C0 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2411: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/181 (108-byte object <1F-00 00-00 60-37 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-43 D8-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 90-43 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2412: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/182 (108-byte object <1F-00 00-00 70-3F D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-C0 D7-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-43 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2413: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/183 (108-byte object <1F-00 00-00 60-43 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 90-43 D8-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 20-44 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2414: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/184 (108-byte object <1F-00 00-00 30-C0 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-43 D8-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-48 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2415: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/185 (108-byte object <1F-00 00-00 90-43 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-44 D8-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-4C D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2416: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/186 (108-byte object <20-00 00-00 60-48 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-3D B2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 E0-50 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2417: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/187 (108-byte object <20-00 00-00 20-44 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-C2 D2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-4C D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2418: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/188 (108-byte object <20-00 00-00 E0-50 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-3D B2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-43 D8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2419: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/189 (108-byte object <20-00 00-00 A0-4C D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-C2 D2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-B9 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2420: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/190 (108-byte object <20-00 00-00 C0-43 D8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-3D B2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-E5 D6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2421: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/191 (108-byte object <20-00 00-00 10-B9 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-C2 D2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-E9 D6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2422: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/192 (108-byte object <21-00 00-00 10-E5 D6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-8F D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-ED D6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 D0-F5 D6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2423: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/193 (108-byte object <21-00 00-00 60-E9 D6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-11 C1-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-F2 D6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-F6 D6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2424: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/194 (108-byte object <21-00 00-00 B0-ED D6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-8F D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-F7 D6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 D0-F5 D6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2425: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/195 (108-byte object <21-00 00-00 00-F2 D6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-11 C1-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-FB D6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-F6 D6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2426: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/196 (108-byte object <21-00 00-00 40-F7 D6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-8F D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-00 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 D0-F5 D6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2427: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/197 (108-byte object <21-00 00-00 F0-FB D6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 00-11 C1-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-04 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-F6 D6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2428: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/198 (108-byte object <22-00 00-00 50-00 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-47 C9-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-09 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2429: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/199 (108-byte object <22-00 00-00 B0-04 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-FB BD-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-0D D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2430: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/200 (108-byte object <22-00 00-00 10-09 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-47 C9-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 D0-11 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2431: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/201 (108-byte object <22-00 00-00 70-0D D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-FB BD-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-15 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2432: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/202 (108-byte object <22-00 00-00 D0-11 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-47 C9-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-1A D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2433: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/203 (108-byte object <22-00 00-00 F0-15 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-FB BD-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-1E D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2434: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/204 (108-byte object <23-00 00-00 10-1A D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-82 B0-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-22 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2435: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/205 (108-byte object <23-00 00-00 30-1E D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 80-6A CB-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-26 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2436: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/206 (108-byte object <23-00 00-00 50-22 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-82 B0-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-2B D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2437: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/207 (108-byte object <23-00 00-00 C0-26 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 80-6A CB-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-2F D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2438: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/208 (108-byte object <23-00 00-00 30-2B D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-82 B0-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-34 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2439: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/209 (108-byte object <23-00 00-00 B0-2F D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 80-6A CB-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-38 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2440: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/210 (108-byte object <24-00 00-00 30-34 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-46 D7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-3D D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2441: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/211 (108-byte object <24-00 00-00 B0-38 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-47 D7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-41 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2442: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/212 (108-byte object <24-00 00-00 30-3D D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-46 D7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-48 D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2443: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/213 (108-byte object <24-00 00-00 B0-41 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-47 D7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-4C D7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2444: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/214 (108-byte object <24-00 00-00 30-48 D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-46 D7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 D0-90 D9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2445: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/215 (108-byte object <24-00 00-00 C0-4C D7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 30-47 D7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-95 D9-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-11 C1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2446: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/216 (108-byte object <25-00 00-00 D0-90 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-77 D0-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-78 D0-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 F0-99 D9-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2447: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/217 (108-byte object <25-00 00-00 60-95 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 48-04 C6-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-04 C6-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-9E D9-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2448: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/218 (108-byte object <25-00 00-00 F0-99 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-77 D0-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-78 D0-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 10-A3 D9-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2449: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/219 (108-byte object <25-00 00-00 80-9E D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 48-04 C6-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-04 C6-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-A6 D9-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2450: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/220 (108-byte object <25-00 00-00 10-A3 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-77 D0-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-78 D0-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 90-A9 D9-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2451: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/221 (108-byte object <25-00 00-00 50-A6 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 48-04 C6-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-04 C6-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 D0-AC D9-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2452: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/222 (108-byte object <26-00 00-00 F0-43 D8-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-77 D0-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-78 D0-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 10-DE B4-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2453: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/223 (108-byte object <26-00 00-00 D0-AC D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 48-04 C6-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-04 C6-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 70-47 C9-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2454: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/224 (108-byte object <26-00 00-00 D0-B3 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-77 D0-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-78 D0-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 10-DE B4-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2455: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/225 (108-byte object <26-00 00-00 00-BC D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 48-04 C6-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-04 C6-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 70-47 C9-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2456: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/226 (108-byte object <26-00 00-00 F0-BF D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-77 D0-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-78 D0-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 10-DE B4-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2457: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/227 (108-byte object <26-00 00-00 E0-C3 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 48-04 C6-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-04 C6-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 70-47 C9-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2458: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/228 (108-byte object <27-00 00-00 D0-C7 D9-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 88-BE C5-56 00-00 00-00 00-33 32-31 33-38 61-31 62-64 34-33 36-61 37-62 A0-BE C5-56 00-00 00-00 00-34 63-37 65-64 30-61 30-30 62-30 64-33 34-65 70-3A D5-56 80-00 00-00 80-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 40-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2459: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/229 (108-byte object <27-00 00-00 C0-CB D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 60-04 C6-56 00-00 00-00 00-64 65-31 35-33 64-32 32-33 33-34 31-33 33-66 00-3B D5-56 80-00 00-00 80-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 40-00 00-00 01-66 31-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2460: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/230 (108-byte object <27-00 00-00 E0-CF D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 88-BE C5-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 A0-BE C5-56 00-00 00-00 00-64 65-31 35-33 64-32 32-33 33-34 31-33 33-66 70-3A D5-56 80-00 00-00 80-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 40-00 00-00 01-66 31-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2461: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/231 (108-byte object <27-00 00-00 00-D4 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 60-04 C6-56 00-00 00-00 00-64 65-31 35-33 64-32 32-33 33-34 31-33 33-66 00-3B D5-56 80-00 00-00 80-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 40-00 00-00 01-66 31-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2462: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/232 (108-byte object <27-00 00-00 20-D8 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 88-BE C5-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 A0-BE C5-56 00-00 00-00 00-64 65-31 35-33 64-32 32-33 33-34 31-33 33-66 70-3A D5-56 80-00 00-00 80-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 40-00 00-00 01-66 31-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2463: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/233 (108-byte object <27-00 00-00 40-DC D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 60-04 C6-56 00-00 00-00 00-64 65-31 35-33 64-32 32-33 33-34 31-33 33-66 00-3B D5-56 80-00 00-00 80-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 40-00 00-00 01-66 31-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2464: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/234 (108-byte object <28-00 00-00 90-A9 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 E8-77 D0-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 E0-E6 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 10-E7 D9-56 28-00 00-00 28-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 14-00 00-00 01-66 31-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2465: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/235 (108-byte object <28-00 00-00 C0-E7 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 F0-E7 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 20-E8 D9-56 28-00 00-00 28-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 14-00 00-00 01-66 31-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2466: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/236 (108-byte object <28-00 00-00 E0-E6 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 E8-77 D0-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 10-E7 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 80-E8 D9-56 28-00 00-00 28-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 14-00 00-00 01-66 31-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2467: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/237 (108-byte object <28-00 00-00 F0-E7 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 20-E8 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 B0-E8 D9-56 28-00 00-00 28-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 14-00 00-00 01-66 31-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2468: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/238 (108-byte object <28-00 00-00 10-E7 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 E8-77 D0-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 80-E8 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 A0-EC D9-56 28-00 00-00 28-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 14-00 00-00 01-66 31-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2469: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/239 (108-byte object <28-00 00-00 20-E8 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 B0-E8 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 90-F0 D9-56 28-00 00-00 28-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 14-00 00-00 01-66 31-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2470: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/240 (108-byte object <29-00 00-00 A0-EC D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 E8-77 D0-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 80-F4 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 50-FB BD-56 54-00 00-00 54-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 2A-00 00-00 01-66 31-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2471: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/241 (108-byte object <29-00 00-00 B0-E8 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 90-F0 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 10-DE B4-56 54-00 00-00 54-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 2A-00 00-00 01-66 31-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2472: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/242 (108-byte object <29-00 00-00 80-F4 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 E8-77 D0-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 50-E8 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 50-FB BD-56 54-00 00-00 54-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 2A-00 00-00 01-66 31-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2473: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/243 (108-byte object <29-00 00-00 90-F0 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 60-E0 D9-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 10-DE B4-56 54-00 00-00 54-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 2A-00 00-00 01-66 31-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2474: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/244 (108-byte object <29-00 00-00 50-E8 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 E8-77 D0-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 D0-07 DA-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 50-FB BD-56 54-00 00-00 54-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 2A-00 00-00 01-66 31-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2475: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/245 (108-byte object <29-00 00-00 60-E0 D9-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 48-04 C6-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 F0-0B DA-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 10-DE B4-56 54-00 00-00 54-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 2A-00 00-00 01-66 31-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2476: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/246 (108-byte object <2A-00 00-00 D0-07 DA-56 28-00 00-00 28-00 00-00 31-61 63-38 32-32 34-38 64-62 66-37 38-3B D5-56 00-00 00-00 00-33 62-66 32-39 35-35 35-38 64-39 34-35 35-30 10-10 DA-56 28-00 00-00 28-00 00-00 35-33 64-32 32-33 33-34 31-33 33-66 50-BE C5-56 80-00 00-00 80-00 00-00 30-64 61-35 32-31 36-39 62-37 64-34 40-00 00-00 01-66 31-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2477: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/247 (108-byte object <2A-00 00-00 F0-0B DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 48-04 C6-56 00-00 00-00 00-63 35-36 64-33 37-61 37-63 35-39 62-33 39-64 30-14 DA-56 28-00 00-00 28-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 70-3A D5-56 80-00 00-00 80-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 40-00 00-00 01-66 30-35>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2478: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/248 (108-byte object <2A-00 00-00 10-10 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 38-3B D5-56 00-00 00-00 00-63 35-36 64-33 37-61 37-63 35-39 62-33 39-64 50-18 DA-56 28-00 00-00 28-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 50-BE C5-56 80-00 00-00 80-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 40-00 00-00 01-66 30-35>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2479: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/249 (108-byte object <2A-00 00-00 30-14 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 48-04 C6-56 00-00 00-00 00-63 35-36 64-33 37-61 37-63 35-39 62-33 39-64 A0-1C DA-56 28-00 00-00 28-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 70-3A D5-56 80-00 00-00 80-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 40-00 00-00 01-66 30-35>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2480: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/250 (108-byte object <2A-00 00-00 50-18 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 38-3B D5-56 00-00 00-00 00-63 35-36 64-33 37-61 37-63 35-39 62-33 39-64 F0-20 DA-56 28-00 00-00 28-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 50-BE C5-56 80-00 00-00 80-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 40-00 00-00 01-66 30-35>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2481: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/251 (108-byte object <2A-00 00-00 A0-1C DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 48-04 C6-56 00-00 00-00 00-63 35-36 64-33 37-61 37-63 35-39 62-33 39-64 40-25 DA-56 28-00 00-00 28-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 70-3A D5-56 80-00 00-00 80-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 40-00 00-00 01-66 30-35>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2482: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/252 (108-byte object <2B-00 00-00 90-29 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 E0-2D DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 00-78 D0-56 00-00 00-00 00-37 62-32 39-36 61-36 35-37 64-30 39-36 32-35 70-F8 D9-56 28-00 00-00 28-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 14-00 00-00 01-66 30-35>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2483: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/253 (108-byte object <2B-00 00-00 40-25 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 30-32 DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 60-04 C6-56 00-00 00-00 00-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 60-32 DA-56 28-00 00-00 28-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 14-00 00-00 01-66 30-35>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2484: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/254 (108-byte object <2B-00 00-00 E0-2D DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 70-F8 D9-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 00-78 D0-56 00-00 00-00 00-37 62-32 39-36 61-36 35-37 64-30 39-36 32-35 C0-32 DA-56 28-00 00-00 28-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 14-00 00-00 01-66 30-35>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2485: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/255 (108-byte object <2B-00 00-00 30-32 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 60-32 DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 60-04 C6-56 00-00 00-00 00-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 F0-32 DA-56 28-00 00-00 28-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 14-00 00-00 01-66 30-35>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2486: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/256 (108-byte object <2B-00 00-00 70-F8 D9-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 C0-32 DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 00-78 D0-56 00-00 00-00 00-37 62-32 39-36 61-36 35-37 64-30 39-36 32-35 E0-36 DA-56 28-00 00-00 28-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 14-00 00-00 01-66 30-35>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2487: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/257 (108-byte object <2B-00 00-00 60-32 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 F0-32 DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 60-04 C6-56 00-00 00-00 00-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 D0-3A DA-56 28-00 00-00 28-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 14-00 00-00 01-66 30-35>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2488: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/258 (108-byte object <2C-00 00-00 E0-36 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 C0-3E DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 00-78 D0-56 00-00 00-00 00-37 62-32 39-36 61-36 35-37 64-30 39-36 32-35 70-47 C9-56 54-00 00-00 54-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 2A-00 00-00 01-66 30-35>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2489: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/259 (108-byte object <2C-00 00-00 F0-32 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 D0-3A DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 60-04 C6-56 00-00 00-00 00-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 50-FB BD-56 54-00 00-00 54-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 2A-00 00-00 01-66 30-35>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2490: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/260 (108-byte object <2C-00 00-00 C0-3E DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 90-32 DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 00-78 D0-56 00-00 00-00 00-37 62-32 39-36 61-36 35-37 64-30 39-36 32-35 70-47 C9-56 54-00 00-00 54-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 2A-00 00-00 01-66 30-35>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2491: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/261 (108-byte object <2C-00 00-00 D0-3A DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 80-E8 D9-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 60-04 C6-56 00-00 00-00 00-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 50-FB BD-56 54-00 00-00 54-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 2A-00 00-00 01-66 30-35>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2492: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/262 (108-byte object <2C-00 00-00 90-32 DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 10-5A DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 00-78 D0-56 00-00 00-00 00-37 62-32 39-36 61-36 35-37 64-30 39-36 32-35 70-47 C9-56 54-00 00-00 54-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 2A-00 00-00 01-66 30-35>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2493: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/263 (108-byte object <2C-00 00-00 80-E8 D9-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 30-5E DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 60-04 C6-56 00-00 00-00 00-00 00-00 39-36 61-36 35-37 64-30 39-36 32-35 50-FB BD-56 54-00 00-00 54-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 2A-00 00-00 01-66 30-35>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2494: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/264 (108-byte object <2D-00 00-00 10-5A DA-56 28-00 00-00 28-00 00-00 63-36 36-31 38-30 33-30 62-30 63-34 50-62 DA-56 20-00 00-00 20-00 00-00 64-33 37-61 37-63 35-39 62-33 39-64 C0-3A D5-56 00-00 00-00 00-37 62-32 39-36 61-36 35-37 64-30 39-36 32-35 00-3B D5-56 80-00 00-00 80-00 00-00 32-65 36-62 37-37 34-64 61-30 35-63 40-00 00-00 01-66 30-35>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2495: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/265 (108-byte object <2D-00 00-00 30-5E DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 70-66 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 60-04 C6-56 00-00 00-00 00-32 36-35 64-32 31-65 66-62 35-38 37-32 31-33 50-BE C5-56 80-00 00-00 80-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 40-00 00-00 01-66 39-63>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2496: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/266 (108-byte object <2D-00 00-00 50-62 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 90-6A DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 C0-3A D5-56 00-00 00-00 00-32 36-35 64-32 31-65 66-62 35-38 37-32 31-33 00-3B D5-56 80-00 00-00 80-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 40-00 00-00 01-66 39-63>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2497: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/267 (108-byte object <2D-00 00-00 70-66 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 E0-6E DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 60-04 C6-56 00-00 00-00 00-32 36-35 64-32 31-65 66-62 35-38 37-32 31-33 50-BE C5-56 80-00 00-00 80-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 40-00 00-00 01-66 39-63>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2498: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/268 (108-byte object <2D-00 00-00 90-6A DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 30-73 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 C0-3A D5-56 00-00 00-00 00-32 36-35 64-32 31-65 66-62 35-38 37-32 31-33 00-3B D5-56 80-00 00-00 80-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 40-00 00-00 01-66 39-63>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2499: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/269 (108-byte object <2D-00 00-00 E0-6E DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 80-77 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 60-04 C6-56 00-00 00-00 00-32 36-35 64-32 31-65 66-62 35-38 37-32 31-33 50-BE C5-56 80-00 00-00 80-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 40-00 00-00 01-66 39-63>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2500: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/270 (108-byte object <2E-00 00-00 20-80 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 B0-42 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 F0-83 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 20-84 DA-56 28-00 00-00 28-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 14-00 00-00 01-66 39-63>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2501: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/271 (108-byte object <2E-00 00-00 D0-84 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 00-85 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 30-85 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 90-85 DA-56 28-00 00-00 28-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 14-00 00-00 01-66 39-63>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2502: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/272 (108-byte object <2E-00 00-00 F0-83 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 20-84 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 60-85 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 F0-85 DA-56 28-00 00-00 28-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 14-00 00-00 01-66 39-63>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2503: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/273 (108-byte object <2E-00 00-00 30-85 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 90-85 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 C0-85 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 10-8A DA-56 28-00 00-00 28-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 14-00 00-00 01-66 39-63>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2504: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/274 (108-byte object <2E-00 00-00 60-85 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 F0-85 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 80-77 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 30-8E DA-56 28-00 00-00 28-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 14-00 00-00 01-66 39-63>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2505: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/275 (108-byte object <2E-00 00-00 C0-85 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 10-8A DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 B0-42 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 50-92 DA-56 28-00 00-00 28-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 14-00 00-00 01-66 39-63>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2506: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/276 (108-byte object <2F-00 00-00 70-96 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 20-84 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 90-85 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 10-DE B4-56 54-00 00-00 54-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 2A-00 00-00 01-66 39-63>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2507: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/277 (108-byte object <2F-00 00-00 10-8A DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 B0-42 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 50-92 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 70-47 C9-56 54-00 00-00 54-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 2A-00 00-00 01-66 39-63>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2508: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/278 (108-byte object <2F-00 00-00 20-84 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 90-85 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 F0-20 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 10-DE B4-56 54-00 00-00 54-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 2A-00 00-00 01-66 39-63>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2509: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/279 (108-byte object <2F-00 00-00 B0-42 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 50-92 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 F0-85 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 70-47 C9-56 54-00 00-00 54-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 2A-00 00-00 01-66 39-63>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2510: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/280 (108-byte object <2F-00 00-00 90-85 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 F0-20 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 40-A2 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 10-DE B4-56 54-00 00-00 54-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 2A-00 00-00 01-66 39-63>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2511: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/281 (108-byte object <2F-00 00-00 50-92 DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 F0-85 DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 90-A6 DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 70-47 C9-56 54-00 00-00 54-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 2A-00 00-00 01-66 39-63>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2512: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/282 (108-byte object <30-00 00-00 E0-AA DA-56 28-00 00-00 28-00 00-00 35-62 35-33 62-35 62-65 35-35 61-63 30-AF DA-56 20-00 00-00 20-00 00-00 38-32 63-35 64-36 39-32 66-30 63-66 90-9A DA-56 28-00 00-00 28-00 00-00 64-32 31-65 66-62 35-38 37-32 31-33 70-3A D5-56 80-00 00-00 80-00 00-00 36-31 62-64 30-66 31-36 37-66 39-30 40-00 00-00 01-66 39-63>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2513: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/283 (108-byte object <30-00 00-00 F0-85 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 90-A6 DA-56 20-00 00-00 20-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 80-B3 DA-56 28-00 00-00 28-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 00-3B D5-56 80-00 00-00 80-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 40-00 00-00 01-64 39-30>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2514: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/284 (108-byte object <30-00 00-00 30-AF DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 90-9A DA-56 20-00 00-00 20-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 30-8E DA-56 28-00 00-00 28-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 70-3A D5-56 80-00 00-00 80-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 40-00 00-00 01-64 39-30>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2515: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/285 (108-byte object <30-00 00-00 90-A6 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 80-B3 DA-56 20-00 00-00 20-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 D0-B7 DA-56 28-00 00-00 28-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 00-3B D5-56 80-00 00-00 80-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 40-00 00-00 01-64 39-30>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2516: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/286 (108-byte object <30-00 00-00 90-9A DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 30-8E DA-56 20-00 00-00 20-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 50-BC DA-56 28-00 00-00 28-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 70-3A D5-56 80-00 00-00 80-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 40-00 00-00 01-64 39-30>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2517: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/287 (108-byte object <30-00 00-00 80-B3 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-B7 DA-56 20-00 00-00 20-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 D0-C0 DA-56 28-00 00-00 28-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 00-3B D5-56 80-00 00-00 80-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 40-00 00-00 01-64 39-30>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2518: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/288 (108-byte object <31-00 00-00 50-BC DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 00-78 D0-56 00-00 00-00 00-32 63-35 32-38 63-62 35-30 65-66 65-30 65-33 50-C5 DA-56 28-00 00-00 28-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 14-00 00-00 01-64 39-30>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2519: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/289 (108-byte object <31-00 00-00 D0-B7 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 60-04 C6-56 00-00 00-00 00-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 D0-C0 DA-56 28-00 00-00 28-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 14-00 00-00 01-64 39-30>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2520: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/290 (108-byte object <31-00 00-00 50-C5 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 00-78 D0-56 00-00 00-00 00-32 63-35 32-38 63-62 35-30 65-66 65-30 65-33 80-77 DA-56 28-00 00-00 28-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 14-00 00-00 01-64 39-30>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2521: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/291 (108-byte object <31-00 00-00 D0-C0 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 60-04 C6-56 00-00 00-00 00-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 F0-20 DA-56 28-00 00-00 28-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 14-00 00-00 01-64 39-30>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2522: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/292 (108-byte object <31-00 00-00 80-77 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 00-78 D0-56 00-00 00-00 00-32 63-35 32-38 63-62 35-30 65-66 65-30 65-33 30-DA DA-56 28-00 00-00 28-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 14-00 00-00 01-64 39-30>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2523: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/293 (108-byte object <31-00 00-00 F0-20 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 60-04 C6-56 00-00 00-00 00-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 40-DE DA-56 28-00 00-00 28-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 14-00 00-00 01-64 39-30>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2524: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/294 (108-byte object <32-00 00-00 30-8E DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 00-78 D0-56 00-00 00-00 00-32 63-35 32-38 63-62 35-30 65-66 65-30 65-33 50-FB BD-56 54-00 00-00 54-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 2A-00 00-00 01-64 39-30>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2525: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/295 (108-byte object <32-00 00-00 40-DE DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 60-04 C6-56 00-00 00-00 00-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 10-DE B4-56 54-00 00-00 54-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 2A-00 00-00 01-64 39-30>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2526: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/296 (108-byte object <32-00 00-00 60-E6 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 00-78 D0-56 00-00 00-00 00-32 63-35 32-38 63-62 35-30 65-66 65-30 65-33 50-FB BD-56 54-00 00-00 54-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 2A-00 00-00 01-64 39-30>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2527: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/297 (108-byte object <32-00 00-00 80-EF DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 60-04 C6-56 00-00 00-00 00-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 10-DE B4-56 54-00 00-00 54-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 2A-00 00-00 01-64 39-30>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2528: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/298 (108-byte object <32-00 00-00 C0-F3 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 00-78 D0-56 00-00 00-00 00-32 63-35 32-38 63-62 35-30 65-66 65-30 65-33 50-FB BD-56 54-00 00-00 54-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 2A-00 00-00 01-64 39-30>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2529: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/299 (108-byte object <32-00 00-00 00-F8 DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 60-04 C6-56 00-00 00-00 00-00 00-00 32-38 63-62 35-30 65-66 65-30 65-33 10-DE B4-56 54-00 00-00 54-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 2A-00 00-00 01-64 39-30>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2530: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/300 (108-byte object <33-00 00-00 40-FC DA-56 28-00 00-00 28-00 00-00 66-39 33-64 30-33 66-37 33-34 38-37 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-36 63-63 35-34 65-30 62-31 65-33 50-3B D5-56 00-00 00-00 00-32 63-35 32-38 63-62 35-30 65-66 65-30 65-33 50-BE C5-56 80-00 00-00 80-00 00-00 33-66 63-31 31-33 30-33 64-31 30-30 40-00 00-00 01-64 39-30>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2531: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/301 (108-byte object <33-00 00-00 80-00 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 60-04 C6-56 00-00 00-00 00-35 39-61 36-37 62-36 31-31 33-61 64-62 30-62 70-3A D5-56 80-00 00-00 80-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 40-00 00-00 01-65 39-63>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2532: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/302 (108-byte object <33-00 00-00 F0-04 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 50-3B D5-56 00-00 00-00 00-35 39-61 36-37 62-36 31-31 33-61 64-62 30-62 50-BE C5-56 80-00 00-00 80-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 40-00 00-00 01-65 39-63>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2533: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/303 (108-byte object <33-00 00-00 60-09 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 60-04 C6-56 00-00 00-00 00-35 39-61 36-37 62-36 31-31 33-61 64-62 30-62 70-3A D5-56 80-00 00-00 80-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 40-00 00-00 01-65 39-63>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2534: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/304 (108-byte object <33-00 00-00 D0-0D DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 50-3B D5-56 00-00 00-00 00-35 39-61 36-37 62-36 31-31 33-61 64-62 30-62 50-BE C5-56 80-00 00-00 80-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 40-00 00-00 01-65 39-63>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2535: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/305 (108-byte object <33-00 00-00 40-12 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 60-04 C6-56 00-00 00-00 00-35 39-61 36-37 62-36 31-31 33-61 64-62 30-62 70-3A D5-56 80-00 00-00 80-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 40-00 00-00 01-65 39-63>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2536: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/306 (108-byte object <34-00 00-00 30-DA DA-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 80-1D DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 B0-1D DB-56 28-00 00-00 28-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 14-00 00-00 01-65 39-63>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2537: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/307 (108-byte object <34-00 00-00 60-1E DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 90-1E DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 C0-1E DB-56 28-00 00-00 28-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 14-00 00-00 01-65 39-63>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2538: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/308 (108-byte object <34-00 00-00 80-1D DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 B0-1D DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 20-1F DB-56 28-00 00-00 28-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 14-00 00-00 01-65 39-63>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2539: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/309 (108-byte object <34-00 00-00 90-1E DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 C0-1E DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 50-1F DB-56 28-00 00-00 28-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 14-00 00-00 01-65 39-63>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2540: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/310 (108-byte object <34-00 00-00 B0-1D DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 20-1F DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 90-23 DB-56 28-00 00-00 28-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 14-00 00-00 01-65 39-63>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2541: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/311 (108-byte object <34-00 00-00 C0-1E DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 50-1F DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 D0-27 DB-56 28-00 00-00 28-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 14-00 00-00 01-65 39-63>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2542: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/312 (108-byte object <35-00 00-00 90-23 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 10-2C DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 70-47 C9-56 54-00 00-00 54-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 2A-00 00-00 01-65 39-63>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2543: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/313 (108-byte object <35-00 00-00 50-1F DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 D0-27 DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 50-FB BD-56 54-00 00-00 54-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 2A-00 00-00 01-65 39-63>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2544: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/314 (108-byte object <35-00 00-00 10-2C DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 F0-1E DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 70-47 C9-56 54-00 00-00 54-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 2A-00 00-00 01-65 39-63>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2545: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/315 (108-byte object <35-00 00-00 D0-27 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 B0-16 DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 50-FB BD-56 54-00 00-00 54-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 2A-00 00-00 01-65 39-63>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2546: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/316 (108-byte object <35-00 00-00 F0-1E DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 F0-40 DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 70-47 C9-56 54-00 00-00 54-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 2A-00 00-00 01-65 39-63>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2547: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/317 (108-byte object <35-00 00-00 B0-16 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 50-11 C1-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 60-45 DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 50-FB BD-56 54-00 00-00 54-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 2A-00 00-00 01-65 39-63>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2548: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/318 (108-byte object <36-00 00-00 F0-40 DB-56 28-00 00-00 28-00 00-00 35-37 61-30 62-32 61-33 39-63 64-39 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 33-30 62-34 38-31 61-35 63-66 33-37 D0-49 DB-56 28-00 00-00 28-00 00-00 36-37 62-36 31-31 33-61 64-62 30-62 00-3B D5-56 80-00 00-00 80-00 00-00 65-37 31-64 32-62 61-65 66-34 34-36 40-00 00-00 01-65 39-63>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2549: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/319 (108-byte object <36-00 00-00 60-45 DB-56 28-00 00-00 28-00 00-00 61-38 64-35 37-39 61-30 61-66 63-62 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-65 65-38 64-62 62-36 32-66 32-38 40-4E DB-56 28-00 00-00 28-00 00-00 32-39 65-32 36-33 32-37 64-32 32-63 50-BE C5-56 80-00 00-00 80-00 00-00 61-65 31-61 36-61 33-61 63-32 62-64 40-00 00-00 01-30 35-65>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2550: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/320 (108-byte object <36-00 00-00 D0-49 DB-56 28-00 00-00 28-00 00-00 61-38 64-35 37-39 61-30 61-66 63-62 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-65 65-38 64-62 62-36 32-66 32-38 B0-52 DB-56 28-00 00-00 28-00 00-00 32-39 65-32 36-33 32-37 64-32 32-63 00-3B D5-56 80-00 00-00 80-00 00-00 61-65 31-61 36-61 33-61 63-32 62-64 40-00 00-00 01-30 35-65>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2551: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/321 (108-byte object <36-00 00-00 40-4E DB-56 28-00 00-00 28-00 00-00 61-38 64-35 37-39 61-30 61-66 63-62 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-65 65-38 64-62 62-36 32-66 32-38 50-57 DB-56 28-00 00-00 28-00 00-00 32-39 65-32 36-33 32-37 64-32 32-63 50-BE C5-56 80-00 00-00 80-00 00-00 61-65 31-61 36-61 33-61 63-32 62-64 40-00 00-00 01-30 35-65>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2552: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/322 (108-byte object <36-00 00-00 B0-52 DB-56 28-00 00-00 28-00 00-00 61-38 64-35 37-39 61-30 61-66 63-62 D0-F5 D5-56 3C-00 00-00 3C-00 00-00 65-65 65-38 64-62 62-36 32-66 32-38 F0-5B DB-56 28-00 00-00 28-00 00-00 32-39 65-32 36-33 32-37 64-32 32-63 00-3B D5-56 80-00 00-00 80-00 00-00 61-65 31-61 36-61 33-61 63-32 62-64 40-00 00-00 01-30 35-65>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2553: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/323 (108-byte object <36-00 00-00 50-57 DB-56 28-00 00-00 28-00 00-00 61-38 64-35 37-39 61-30 61-66 63-62 50-11 C1-56 3C-00 00-00 3C-00 00-00 65-65 65-38 64-62 62-36 32-66 32-38 90-60 DB-56 28-00 00-00 28-00 00-00 32-39 65-32 36-33 32-37 64-32 32-63 50-BE C5-56 80-00 00-00 80-00 00-00 61-65 31-61 36-61 33-61 63-32 62-64 40-00 00-00 01-30 35-65>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2554: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/324 (108-byte object <37-00 00-00 20-1F DB-56 28-00 00-00 28-00 00-00 61-38 64-35 37-39 61-30 61-66 63-62 00-3B D5-56 80-00 00-00 80-00 00-00 65-65 65-38 64-62 62-36 32-66 32-38 C0-3A D5-56 00-00 00-00 00-30 32-64 32-39 65-32 36-33 32-37 64-32 32-63 10-DE B4-56 54-00 00-00 54-00 00-00 61-65 31-61 36-61 33-61 63-32 62-64 2A-00 00-00 01-30 35-65>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2555: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/325 (108-byte object <37-00 00-00 90-60 DB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 50-BE C5-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 60-04 C6-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 70-47 C9-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2556: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/326 (108-byte object <37-00 00-00 D0-69 DB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 00-3B D5-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 C0-3A D5-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 10-DE B4-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2557: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/327 (108-byte object <37-00 00-00 00-74 DB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 50-BE C5-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 60-04 C6-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 70-47 C9-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2558: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/328 (108-byte object <37-00 00-00 80-78 DB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 00-3B D5-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 C0-3A D5-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 10-DE B4-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2559: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/329 (108-byte object <37-00 00-00 00-7D DB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 50-BE C5-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 60-04 C6-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 70-47 C9-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2560: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/330 (108-byte object <38-00 00-00 00-86 DB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 00-3B D5-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 F0-5B DB-56 28-00 00-00 28-00 00-00 38-39 65-62 61-64 34-66 61-36 33-34 10-DE B4-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2561: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/331 (108-byte object <38-00 00-00 E0-88 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 50-BE C5-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 10-89 DB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 70-47 C9-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2562: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/332 (108-byte object <38-00 00-00 F0-5B DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-3B D5-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-89 DB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 10-DE B4-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2563: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/333 (108-byte object <38-00 00-00 10-89 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 50-BE C5-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 20-8E DB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 70-47 C9-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2564: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/334 (108-byte object <38-00 00-00 70-89 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-3B D5-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-92 DB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 10-DE B4-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2565: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/335 (108-byte object <38-00 00-00 20-8E DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 50-BE C5-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 80-97 DB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 70-47 C9-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2566: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/336 (108-byte object <39-00 00-00 80-81 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-11 C1-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 80-A0 DB-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-E4 DB-56 C0-3F 00-00 C0-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E0-1F 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2567: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/337 (108-byte object <39-00 00-00 80-97 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-A0 DB-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 70-25 DC-56 C0-3F 00-00 C0-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E0-1F 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2568: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/338 (108-byte object <39-00 00-00 E0-A0 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-11 C1-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-24 DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E5 DC-56 C0-3F 00-00 C0-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E0-1F 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2569: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/339 (108-byte object <39-00 00-00 A0-A0 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-67 DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 70-25 DC-56 C0-3F 00-00 C0-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E0-1F 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2570: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/340 (108-byte object <39-00 00-00 30-6D DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-11 C1-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-6B DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-E5 DC-56 C0-3F 00-00 C0-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E0-1F 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2571: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/341 (108-byte object <39-00 00-00 30-71 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-6F DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 70-25 DC-56 C0-3F 00-00 C0-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E0-1F 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2572: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/342 (108-byte object <3A-00 00-00 30-75 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-11 C1-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-9B DB-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 18-78 D0-56 00-00 00-00 00-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E1-1F 00-00 00-32 30-39>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2573: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/343 (108-byte object <3A-00 00-00 50-79 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-77 DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 78-04 C6-56 00-00 00-00 00-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E1-1F 00-00 00-32 30-39>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2574: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/344 (108-byte object <3A-00 00-00 50-7D DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-11 C1-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-7B DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 18-78 D0-56 00-00 00-00 00-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E1-1F 00-00 00-32 30-39>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2575: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/345 (108-byte object <3A-00 00-00 50-81 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-7F DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 78-04 C6-56 00-00 00-00 00-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E1-1F 00-00 00-32 30-39>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2576: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/346 (108-byte object <3A-00 00-00 50-85 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 00-11 C1-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-83 DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 18-78 D0-56 00-00 00-00 00-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E1-1F 00-00 00-32 30-39>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2577: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/347 (108-byte object <3A-00 00-00 50-89 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-87 DC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 78-04 C6-56 00-00 00-00 00-3F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 E1-1F 00-00 00-32 30-39>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2578: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/348 (108-byte object <3B-00 00-00 50-91 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 E8-77 D0-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-92 DB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-11 C1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2579: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/349 (108-byte object <3B-00 00-00 10-94 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 48-04 C6-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 40-94 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2580: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/350 (108-byte object <3B-00 00-00 D0-92 DB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 E8-77 D0-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 A0-94 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-11 C1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2581: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/351 (108-byte object <3B-00 00-00 40-94 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 48-04 C6-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-98 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2582: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/352 (108-byte object <3B-00 00-00 A0-94 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 E8-77 D0-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 C0-9C DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-11 C1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2583: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/353 (108-byte object <3B-00 00-00 B0-98 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 48-04 C6-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-A0 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2584: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/354 (108-byte object <3C-00 00-00 C0-9C DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 A0-F6 D6-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 E0-A4 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-2C DC-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2585: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/355 (108-byte object <3C-00 00-00 D0-A0 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-29 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-2D DC-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2586: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/356 (108-byte object <3C-00 00-00 E0-A4 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 A0-F6 D6-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-2E DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-2C DC-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2587: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/357 (108-byte object <3C-00 00-00 50-29 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 00-33 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-2D DC-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2588: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/358 (108-byte object <3C-00 00-00 50-2E DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 A0-F6 D6-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-37 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 E0-2C DC-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2589: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/359 (108-byte object <3C-00 00-00 00-33 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 C0-3B DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 B0-2D DC-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2590: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/360 (108-byte object <3D-00 00-00 60-37 DC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 70-3A D5-56 82-00 00-00 82-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 20-40 DC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-11 C1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2591: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/361 (108-byte object <3D-00 00-00 C0-3B DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-3B D5-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-44 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2592: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/362 (108-byte object <3D-00 00-00 20-40 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 70-3A D5-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-48 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2593: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/363 (108-byte object <3D-00 00-00 80-44 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-3B D5-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-4D DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2594: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/364 (108-byte object <3D-00 00-00 E0-48 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 70-3A D5-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-51 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2595: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/365 (108-byte object <3D-00 00-00 30-4D DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-3B D5-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-55 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2596: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/366 (108-byte object <3E-00 00-00 80-51 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-2D DC-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-5A DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 E0-62 DC-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2597: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/367 (108-byte object <3E-00 00-00 D0-55 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-5E DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-63 DC-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2598: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/368 (108-byte object <3E-00 00-00 20-5A DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-2D DC-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-64 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 E0-62 DC-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2599: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/369 (108-byte object <3E-00 00-00 C0-5E DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-E9 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-63 DC-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2600: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/370 (108-byte object <3E-00 00-00 50-64 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-2D DC-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-EE DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 E0-62 DC-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2601: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/371 (108-byte object <3E-00 00-00 E0-E9 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-F2 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-63 DC-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2602: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/372 (108-byte object <3F-00 00-00 40-EE DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-FB DC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-F7 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2603: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/373 (108-byte object <3F-00 00-00 A0-F2 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E0-FA DC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-FB DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2604: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/374 (108-byte object <3F-00 00-00 00-F7 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 80-FF DC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-00 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2605: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/375 (108-byte object <3F-00 00-00 60-FB DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-03 DD-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-03 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2606: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/376 (108-byte object <3F-00 00-00 00-00 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-07 DD-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-07 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2607: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/377 (108-byte object <3F-00 00-00 E0-03 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-0B DD-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-0B DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2608: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/378 (108-byte object <40-00 00-00 80-0F DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-13 DD-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-94 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2609: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/379 (108-byte object <40-00 00-00 A0-0B DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-17 DD-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-17 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2610: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/380 (108-byte object <40-00 00-00 B0-13 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 70-94 DC-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-18 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2611: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/381 (108-byte object <40-00 00-00 A0-17 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-17 DD-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-18 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2612: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/382 (108-byte object <40-00 00-00 70-94 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-18 DD-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-1C DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2613: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/383 (108-byte object <40-00 00-00 D0-17 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-18 DD-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-20 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2614: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/384 (108-byte object <41-00 00-00 A0-1C DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 C0-5D AF-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-25 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2615: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/385 (108-byte object <41-00 00-00 60-18 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-3D B2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-20 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2616: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/386 (108-byte object <41-00 00-00 20-25 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 C0-5D AF-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-18 DD-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2617: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/387 (108-byte object <41-00 00-00 E0-20 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-3D B2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-8D DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2618: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/388 (108-byte object <41-00 00-00 00-18 DD-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 C0-5D AF-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-B9 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2619: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/389 (108-byte object <41-00 00-00 50-8D DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-3D B2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-BD DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2620: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/390 (108-byte object <42-00 00-00 50-B9 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-63 DC-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-C1 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 10-CA DB-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2621: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/391 (108-byte object <42-00 00-00 A0-BD DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-C6 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 E0-CA DB-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2622: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/392 (108-byte object <42-00 00-00 F0-C1 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-63 DC-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-CB DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 10-CA DB-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2623: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/393 (108-byte object <42-00 00-00 40-C6 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-D0 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 E0-CA DB-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2624: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/394 (108-byte object <42-00 00-00 80-CB DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-63 DC-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-D4 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 10-CA DB-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2625: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/395 (108-byte object <42-00 00-00 30-D0 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-D8 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 E0-CA DB-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2626: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/396 (108-byte object <43-00 00-00 90-D4 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-FB BD-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-DD DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2627: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/397 (108-byte object <43-00 00-00 F0-D8 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 10-DE B4-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-E1 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2628: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/398 (108-byte object <43-00 00-00 50-DD DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-FB BD-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-E6 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2629: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/399 (108-byte object <43-00 00-00 B0-E1 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 10-DE B4-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-EA DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2630: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/400 (108-byte object <43-00 00-00 10-E6 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-FB BD-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-EE DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2631: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/401 (108-byte object <43-00 00-00 30-EA DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 10-DE B4-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-F2 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2632: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/402 (108-byte object <44-00 00-00 50-EE DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-4D B1-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-F6 DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2633: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/403 (108-byte object <44-00 00-00 70-F2 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-82 B0-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-FB DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2634: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/404 (108-byte object <44-00 00-00 90-F6 DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-4D B1-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-FF DB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2635: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/405 (108-byte object <44-00 00-00 00-FB DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-82 B0-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-03 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2636: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/406 (108-byte object <44-00 00-00 70-FF DB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-4D B1-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-08 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2637: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/407 (108-byte object <44-00 00-00 80-03 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-82 B0-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-0C DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2638: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/408 (108-byte object <45-00 00-00 00-08 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-1A DC-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-11 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2639: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/409 (108-byte object <45-00 00-00 80-0C DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-1B DC-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-15 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2640: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/410 (108-byte object <45-00 00-00 00-11 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-1A DC-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-1C DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2641: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/411 (108-byte object <45-00 00-00 80-15 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-1B DC-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-20 DC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2642: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/412 (108-byte object <45-00 00-00 00-1C DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-1A DC-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-64 DE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-11 C1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2643: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/413 (108-byte object <45-00 00-00 90-20 DC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-1B DC-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-69 DE-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2644: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/414 (108-byte object <46-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-77 D0-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-78 D0-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 30-18 DD-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2645: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/415 (108-byte object <46-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 48-04 C6-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-04 C6-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-69 DE-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2646: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/416 (108-byte object <46-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-77 D0-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-78 D0-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-72 DE-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2647: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/417 (108-byte object <46-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 48-04 C6-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-04 C6-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-7A DE-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2648: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/418 (108-byte object <46-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-77 D0-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-78 D0-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-7D DE-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2649: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/419 (108-byte object <46-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 48-04 C6-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-04 C6-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-81 DE-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2650: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/420 (108-byte object <47-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-77 D0-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-78 D0-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 70-47 C9-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2651: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/421 (108-byte object <47-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 48-04 C6-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-04 C6-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 50-FB BD-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2652: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/422 (108-byte object <47-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-77 D0-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-78 D0-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 70-47 C9-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2653: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/423 (108-byte object <47-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 48-04 C6-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-04 C6-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 50-FB BD-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2654: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/424 (108-byte object <47-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-77 D0-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-78 D0-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 70-47 C9-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2655: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/425 (108-byte object <47-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 48-04 C6-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-04 C6-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 50-FB BD-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2656: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/426 (108-byte object <48-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 38-3B D5-56 00-00 00-00 00-62 39-35 38-34 38-30 36-61 65-65 65-64 61-38 50-3B D5-56 00-00 00-00 00-64 37-39 65-37 63-31 32-32 31-31 62-38 65-33 50-BE C5-56 80-00 00-00 80-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 40-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2657: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/427 (108-byte object <48-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 60-04 C6-56 00-00 00-00 00-65 35-65 62-37 34-38 64-62 31-38 33-64 34-38 70-3A D5-56 80-00 00-00 80-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 40-00 00-00 01-31 38-61>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2658: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/428 (108-byte object <48-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 38-3B D5-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 50-3B D5-56 00-00 00-00 00-65 35-65 62-37 34-38 64-62 31-38 33-64 34-38 50-BE C5-56 80-00 00-00 80-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 40-00 00-00 01-31 38-61>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2659: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/429 (108-byte object <48-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 60-04 C6-56 00-00 00-00 00-65 35-65 62-37 34-38 64-62 31-38 33-64 34-38 70-3A D5-56 80-00 00-00 80-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 40-00 00-00 01-31 38-61>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2660: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/430 (108-byte object <48-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 38-3B D5-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 50-3B D5-56 00-00 00-00 00-65 35-65 62-37 34-38 64-62 31-38 33-64 34-38 50-BE C5-56 80-00 00-00 80-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 40-00 00-00 01-31 38-61>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2661: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/431 (108-byte object <48-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 60-04 C6-56 00-00 00-00 00-65 35-65 62-37 34-38 64-62 31-38 33-64 34-38 70-3A D5-56 80-00 00-00 80-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 40-00 00-00 01-31 38-61>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2662: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/432 (108-byte object <49-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 E8-77 D0-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 70-BC DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 A0-BC DE-56 28-00 00-00 28-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 14-00 00-00 01-31 38-61>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2663: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/433 (108-byte object <49-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 80-BD DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 B0-BD DE-56 28-00 00-00 28-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 14-00 00-00 01-31 38-61>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2664: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/434 (108-byte object <49-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 E8-77 D0-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 A0-BC DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 10-BE DE-56 28-00 00-00 28-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 14-00 00-00 01-31 38-61>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2665: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/435 (108-byte object <49-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 B0-BD DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 20-C2 DE-56 28-00 00-00 28-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 14-00 00-00 01-31 38-61>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2666: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/436 (108-byte object <49-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 E8-77 D0-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 10-BE DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 30-C6 DE-56 28-00 00-00 28-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 14-00 00-00 01-31 38-61>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2667: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/437 (108-byte object <49-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 20-C2 DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 40-CA DE-56 28-00 00-00 28-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 14-00 00-00 01-31 38-61>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2668: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/438 (108-byte object <4A-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 E8-77 D0-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 C0-07 DD-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 10-DE B4-56 54-00 00-00 54-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 2A-00 00-00 01-31 38-61>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2669: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/439 (108-byte object <4A-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 40-CA DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 70-47 C9-56 54-00 00-00 54-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 2A-00 00-00 01-31 38-61>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2670: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/440 (108-byte object <4A-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 E8-77 D0-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 60-D2 DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 10-DE B4-56 54-00 00-00 54-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 2A-00 00-00 01-31 38-61>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2671: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/441 (108-byte object <4A-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 80-DB DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 70-47 C9-56 54-00 00-00 54-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 2A-00 00-00 01-31 38-61>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2672: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/442 (108-byte object <4A-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 E8-77 D0-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 C0-DF DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 10-DE B4-56 54-00 00-00 54-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 2A-00 00-00 01-31 38-61>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2673: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/443 (108-byte object <4A-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 48-04 C6-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 00-E4 DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 70-47 C9-56 54-00 00-00 54-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 2A-00 00-00 01-31 38-61>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2674: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/444 (108-byte object <4B-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 31-36 64-36 61-64 39-36 66-39 61-38 A8-3A D5-56 00-00 00-00 00-66 38-61 37-30 37-65 64-35 63-30 34-38 33-39 40-E8 DE-56 28-00 00-00 28-00 00-00 62-37 34-38 64-62 31-38 33-64 34-38 00-3B D5-56 80-00 00-00 80-00 00-00 31-61 33-66 65-66 63-30 35-63 62-65 40-00 00-00 01-31 38-61>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2675: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/445 (108-byte object <4B-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 48-04 C6-56 00-00 00-00 00-32 65-35 33-62 35-62 61-65 65-37 61-65 37-37 80-EC DE-56 28-00 00-00 28-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 50-BE C5-56 80-00 00-00 80-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 40-00 00-00 01-30 63-61>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2676: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/446 (108-byte object <4B-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 A8-3A D5-56 00-00 00-00 00-32 65-35 33-62 35-62 61-65 65-37 61-65 37-37 F0-F0 DE-56 28-00 00-00 28-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 00-3B D5-56 80-00 00-00 80-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 40-00 00-00 01-30 63-61>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2677: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/447 (108-byte object <4B-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 48-04 C6-56 00-00 00-00 00-32 65-35 33-62 35-62 61-65 65-37 61-65 37-37 60-F5 DE-56 28-00 00-00 28-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 50-BE C5-56 80-00 00-00 80-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 40-00 00-00 01-30 63-61>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2678: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/448 (108-byte object <4B-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 A8-3A D5-56 00-00 00-00 00-32 65-35 33-62 35-62 61-65 65-37 61-65 37-37 D0-F9 DE-56 28-00 00-00 28-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 00-3B D5-56 80-00 00-00 80-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 40-00 00-00 01-30 63-61>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2679: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/449 (108-byte object <4B-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 48-04 C6-56 00-00 00-00 00-32 65-35 33-62 35-62 61-65 65-37 61-65 37-37 40-FE DE-56 28-00 00-00 28-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 50-BE C5-56 80-00 00-00 80-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 40-00 00-00 01-30 63-61>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2680: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/450 (108-byte object <4C-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 20-07 DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 00-78 D0-56 00-00 00-00 00-36 35-36 33-39 38-37 33-39 30-34 33-64 61-35 30-C6 DE-56 28-00 00-00 28-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 14-00 00-00 01-30 63-61>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2681: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/451 (108-byte object <4C-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 00-0A DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 60-04 C6-56 00-00 00-00 00-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 30-0A DF-56 28-00 00-00 28-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 14-00 00-00 01-30 63-61>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2682: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/452 (108-byte object <4C-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 30-C6 DE-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 00-78 D0-56 00-00 00-00 00-36 35-36 33-39 38-37 33-39 30-34 33-64 61-35 90-0A DF-56 28-00 00-00 28-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 14-00 00-00 01-30 63-61>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2683: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/453 (108-byte object <4C-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 30-0A DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 60-04 C6-56 00-00 00-00 00-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 A0-0E DF-56 28-00 00-00 28-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 14-00 00-00 01-30 63-61>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2684: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/454 (108-byte object <4C-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 90-0A DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 00-78 D0-56 00-00 00-00 00-36 35-36 33-39 38-37 33-39 30-34 33-64 61-35 B0-12 DF-56 28-00 00-00 28-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 14-00 00-00 01-30 63-61>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2685: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/455 (108-byte object <4C-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 A0-0E DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 60-04 C6-56 00-00 00-00 00-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 C0-16 DF-56 28-00 00-00 28-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 14-00 00-00 01-30 63-61>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2686: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/456 (108-byte object <4D-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 B0-02 DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 00-78 D0-56 00-00 00-00 00-36 35-36 33-39 38-37 33-39 30-34 33-64 61-35 50-FB BD-56 54-00 00-00 54-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 2A-00 00-00 01-30 63-61>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2687: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/457 (108-byte object <4D-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 C0-16 DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 60-04 C6-56 00-00 00-00 00-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 10-DE B4-56 54-00 00-00 54-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 2A-00 00-00 01-30 63-61>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2688: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/458 (108-byte object <4D-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 E0-1E DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 00-78 D0-56 00-00 00-00 00-36 35-36 33-39 38-37 33-39 30-34 33-64 61-35 50-FB BD-56 54-00 00-00 54-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 2A-00 00-00 01-30 63-61>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2689: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/459 (108-byte object <4D-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 00-28 DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 60-04 C6-56 00-00 00-00 00-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 10-DE B4-56 54-00 00-00 54-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 2A-00 00-00 01-30 63-61>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2690: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/460 (108-byte object <4D-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 40-2C DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 00-78 D0-56 00-00 00-00 00-36 35-36 33-39 38-37 33-39 30-34 33-64 61-35 50-FB BD-56 54-00 00-00 54-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 2A-00 00-00 01-30 63-61>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2691: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/461 (108-byte object <4D-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 80-30 DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 60-04 C6-56 00-00 00-00 00-00 00-00 33-39 38-37 33-39 30-34 33-64 61-35 10-DE B4-56 54-00 00-00 54-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 2A-00 00-00 01-30 63-61>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2692: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/462 (108-byte object <4E-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 38-34 65-62 61-63 33-62 39-30 30-32 C0-34 DF-56 20-00 00-00 20-00 00-00 33-62 35-62 61-65 65-37 61-65 37-37 A0-BE C5-56 00-00 00-00 00-36 35-36 33-39 38-37 33-39 30-34 33-64 61-35 70-3A D5-56 80-00 00-00 80-00 00-00 65-34 32-37 33-36 61-34 30-31 63-38 40-00 00-00 01-30 63-61>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2693: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/463 (108-byte object <4E-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 00-39 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 60-04 C6-56 00-00 00-00 00-62 37-36 38-30 65-61 32-35 62-31 30-31 33-31 00-3B D5-56 80-00 00-00 80-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 40-00 00-00 01-39 63-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2694: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/464 (108-byte object <4E-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 70-3D DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 A0-BE C5-56 00-00 00-00 00-62 37-36 38-30 65-61 32-35 62-31 30-31 33-31 70-3A D5-56 80-00 00-00 80-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 40-00 00-00 01-39 63-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2695: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/465 (108-byte object <4E-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 E0-41 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 60-04 C6-56 00-00 00-00 00-62 37-36 38-30 65-61 32-35 62-31 30-31 33-31 00-3B D5-56 80-00 00-00 80-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 40-00 00-00 01-39 63-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2696: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/466 (108-byte object <4E-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 50-46 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 A0-BE C5-56 00-00 00-00 00-62 37-36 38-30 65-61 32-35 62-31 30-31 33-31 70-3A D5-56 80-00 00-00 80-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 40-00 00-00 01-39 63-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2697: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/467 (108-byte object <4E-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 C0-4A DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 60-04 C6-56 00-00 00-00 00-62 37-36 38-30 65-61 32-35 62-31 30-31 33-31 00-3B D5-56 80-00 00-00 80-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 40-00 00-00 01-39 63-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2698: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/468 (108-byte object <4F-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 B0-12 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 00-56 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 30-56 DF-56 28-00 00-00 28-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 14-00 00-00 01-39 63-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2699: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/469 (108-byte object <4F-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 E0-56 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 10-57 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 40-57 DF-56 28-00 00-00 28-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 14-00 00-00 01-39 63-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2700: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/470 (108-byte object <4F-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 00-56 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 30-56 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 A0-57 DF-56 28-00 00-00 28-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 14-00 00-00 01-39 63-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2701: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/471 (108-byte object <4F-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 10-57 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 40-57 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 D0-57 DF-56 28-00 00-00 28-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 14-00 00-00 01-39 63-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2702: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/472 (108-byte object <4F-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 30-56 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 A0-57 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 10-5C DF-56 28-00 00-00 28-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 14-00 00-00 01-39 63-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2703: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/473 (108-byte object <4F-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 40-57 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 D0-57 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 50-60 DF-56 28-00 00-00 28-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 14-00 00-00 01-39 63-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2704: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/474 (108-byte object <50-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 10-5C DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 90-64 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 70-47 C9-56 54-00 00-00 54-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 2A-00 00-00 01-39 63-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2705: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/475 (108-byte object <50-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 D0-57 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 50-60 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 50-FB BD-56 54-00 00-00 54-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 2A-00 00-00 01-39 63-33>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2706: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/476 (108-byte object <50-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 90-64 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 70-57 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 70-47 C9-56 54-00 00-00 54-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 2A-00 00-00 01-39 63-33>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2707: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/477 (108-byte object <50-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 50-60 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 30-4F DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 50-FB BD-56 54-00 00-00 54-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 2A-00 00-00 01-39 63-33>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2708: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/478 (108-byte object <50-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 70-57 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 70-79 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 70-47 C9-56 54-00 00-00 54-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 2A-00 00-00 01-39 63-33>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2709: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/479 (108-byte object <50-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 30-4F DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 E0-7D DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 50-FB BD-56 54-00 00-00 54-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 2A-00 00-00 01-39 63-33>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2710: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/480 (108-byte object <51-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 63-62 39-63 39-38 37-34 33-39 61-64 70-79 DF-56 20-00 00-00 20-00 00-00 64-33 39-64 39-35 34-66 37-63 61-35 50-82 DF-56 28-00 00-00 28-00 00-00 38-30 65-61 32-35 62-31 30-31 33-31 50-BE C5-56 80-00 00-00 80-00 00-00 33-39 62-61 66-30 38-66 38-65 66-61 40-00 00-00 01-39 63-33>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2711: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/481 (108-byte object <51-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 E0-7D DF-56 20-00 00-00 20-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 C0-86 DF-56 28-00 00-00 28-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 70-3A D5-56 80-00 00-00 80-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 40-00 00-00 01-31 62-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2712: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/482 (108-byte object <51-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 50-82 DF-56 20-00 00-00 20-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 30-8B DF-56 28-00 00-00 28-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 50-BE C5-56 80-00 00-00 80-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 40-00 00-00 01-31 62-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2713: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/483 (108-byte object <51-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 C0-86 DF-56 20-00 00-00 20-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 D0-8F DF-56 28-00 00-00 28-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 70-3A D5-56 80-00 00-00 80-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 40-00 00-00 01-31 62-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2714: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/484 (108-byte object <51-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 30-8B DF-56 20-00 00-00 20-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 70-94 DF-56 28-00 00-00 28-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 50-BE C5-56 80-00 00-00 80-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 40-00 00-00 01-31 62-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2715: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/485 (108-byte object <51-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 D0-8F DF-56 20-00 00-00 20-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 10-99 DF-56 28-00 00-00 28-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 70-3A D5-56 80-00 00-00 80-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 40-00 00-00 01-31 62-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2716: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/486 (108-byte object <52-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 00-78 D0-56 00-00 00-00 00-37 66-36 62-36 63-32 65-38 34-38 34-61 38-63 A0-57 DF-56 28-00 00-00 28-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 14-00 00-00 01-31 62-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2717: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/487 (108-byte object <52-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 60-04 C6-56 00-00 00-00 00-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 10-99 DF-56 28-00 00-00 28-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 14-00 00-00 01-31 62-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2718: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/488 (108-byte object <52-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 00-78 D0-56 00-00 00-00 00-37 66-36 62-36 63-32 65-38 34-38 34-61 38-63 50-A2 DF-56 28-00 00-00 28-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 14-00 00-00 01-31 62-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2719: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/489 (108-byte object <52-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 60-04 C6-56 00-00 00-00 00-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 20-AD DF-56 28-00 00-00 28-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 14-00 00-00 01-31 62-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2720: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/490 (108-byte object <52-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 00-78 D0-56 00-00 00-00 00-37 66-36 62-36 63-32 65-38 34-38 34-61 38-63 50-B1 DF-56 28-00 00-00 28-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 14-00 00-00 01-31 62-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2721: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/491 (108-byte object <52-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 60-04 C6-56 00-00 00-00 00-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 80-B5 DF-56 28-00 00-00 28-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 14-00 00-00 01-31 62-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2722: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/492 (108-byte object <53-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 00-78 D0-56 00-00 00-00 00-37 66-36 62-36 63-32 65-38 34-38 34-61 38-63 10-DE B4-56 54-00 00-00 54-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 2A-00 00-00 01-31 62-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2723: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/493 (108-byte object <53-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 60-04 C6-56 00-00 00-00 00-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 70-47 C9-56 54-00 00-00 54-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 2A-00 00-00 01-31 62-64>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2724: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/494 (108-byte object <53-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 00-78 D0-56 00-00 00-00 00-37 66-36 62-36 63-32 65-38 34-38 34-61 38-63 10-DE B4-56 54-00 00-00 54-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 2A-00 00-00 01-31 62-64>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2725: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/495 (108-byte object <53-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 60-04 C6-56 00-00 00-00 00-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 70-47 C9-56 54-00 00-00 54-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 2A-00 00-00 01-31 62-64>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2726: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/496 (108-byte object <53-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 00-78 D0-56 00-00 00-00 00-37 66-36 62-36 63-32 65-38 34-38 34-61 38-63 10-DE B4-56 54-00 00-00 54-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 2A-00 00-00 01-31 62-64>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2727: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/497 (108-byte object <53-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 60-04 C6-56 00-00 00-00 00-00 00-00 62-36 63-32 65-38 34-38 34-61 38-63 70-47 C9-56 54-00 00-00 54-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 2A-00 00-00 01-31 62-64>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2728: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/498 (108-byte object <54-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-62 37-35 66-63 34-31 32-61 65-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 63-63 32-61 63-66 37-61 35-34 38-31 C0-3A D5-56 00-00 00-00 00-37 66-36 62-36 63-32 65-38 34-38 34-61 38-63 00-3B D5-56 80-00 00-00 80-00 00-00 31-30 66-33 30-35 33-64 34-33 64-38 40-00 00-00 01-31 62-64>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2729: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/499 (108-byte object <54-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 60-04 C6-56 00-00 00-00 00-37 32-30 61-32 64-62 36-63 36-30 35-32 65-64 50-BE C5-56 80-00 00-00 80-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 40-00 00-00 01-35 61-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2730: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/500 (108-byte object <54-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 C0-3A D5-56 00-00 00-00 00-37 32-30 61-32 64-62 36-63 36-30 35-32 65-64 00-3B D5-56 80-00 00-00 80-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 40-00 00-00 01-35 61-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2731: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/501 (108-byte object <54-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 60-04 C6-56 00-00 00-00 00-37 32-30 61-32 64-62 36-63 36-30 35-32 65-64 50-BE C5-56 80-00 00-00 80-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 40-00 00-00 01-35 61-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2732: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/502 (108-byte object <54-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 C0-3A D5-56 00-00 00-00 00-37 32-30 61-32 64-62 36-63 36-30 35-32 65-64 00-3B D5-56 80-00 00-00 80-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 40-00 00-00 01-35 61-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2733: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/503 (108-byte object <54-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 60-04 C6-56 00-00 00-00 00-37 32-30 61-32 64-62 36-63 36-30 35-32 65-64 50-BE C5-56 80-00 00-00 80-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 40-00 00-00 01-35 61-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2734: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/504 (108-byte object <55-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 50-F5 DF-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 80-F5 DF-56 28-00 00-00 28-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 14-00 00-00 01-35 61-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2735: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/505 (108-byte object <55-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 60-F6 DF-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 90-F6 DF-56 28-00 00-00 28-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 14-00 00-00 01-35 61-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2736: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/506 (108-byte object <55-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 80-F5 DF-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 F0-F6 DF-56 28-00 00-00 28-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 14-00 00-00 01-35 61-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2737: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/507 (108-byte object <55-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 90-F6 DF-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 50-FB DF-56 28-00 00-00 28-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 14-00 00-00 01-35 61-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2738: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/508 (108-byte object <55-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 F0-F6 DF-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 B0-FF DF-56 28-00 00-00 28-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 14-00 00-00 01-35 61-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2739: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/509 (108-byte object <55-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 50-FB DF-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 10-04 E0-56 28-00 00-00 28-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 14-00 00-00 01-35 61-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2740: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/510 (108-byte object <56-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 A0-53 DF-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 50-FB BD-56 54-00 00-00 54-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 2A-00 00-00 01-35 61-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2741: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/511 (108-byte object <56-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 10-04 E0-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 10-DE B4-56 54-00 00-00 54-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 2A-00 00-00 01-35 61-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2742: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/512 (108-byte object <56-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 D0-0C E0-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 50-FB BD-56 54-00 00-00 54-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 2A-00 00-00 01-35 61-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2743: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/513 (108-byte object <56-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 E0-16 E0-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 10-DE B4-56 54-00 00-00 54-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 2A-00 00-00 01-35 61-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2744: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/514 (108-byte object <56-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 70-1B E0-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 50-FB BD-56 54-00 00-00 54-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 2A-00 00-00 01-35 61-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2745: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/515 (108-byte object <56-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 40-A7 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 50-48 DA-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 10-DE B4-56 54-00 00-00 54-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 2A-00 00-00 01-35 61-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2746: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/516 (108-byte object <57-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 70-A6 DF-56 3C-00 00-00 3C-00 00-00 35-37 62-38 38-63 30-36 66-34 32-61 E0-4C DA-56 28-00 00-00 28-00 00-00 61-32 64-62 36-63 36-30 35-32 65-64 70-3A D5-56 80-00 00-00 80-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 40-00 00-00 01-35 61-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2747: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/517 (108-byte object <57-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 39-38 39-62 64-38 31-33 38-66 33-64 70-51 DA-56 28-00 00-00 28-00 00-00 31-62 37-65 66-30 30-35 37-38 62-35 00-3B D5-56 80-00 00-00 80-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 40-00 00-00 01-64 30-61>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2748: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/518 (108-byte object <57-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 39-38 39-62 64-38 31-33 38-66 33-64 F0-3D E0-56 28-00 00-00 28-00 00-00 31-62 37-65 66-30 30-35 37-38 62-35 70-3A D5-56 80-00 00-00 80-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 40-00 00-00 01-64 30-61>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2749: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/519 (108-byte object <57-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 39-38 39-62 64-38 31-33 38-66 33-64 B0-42 E0-56 28-00 00-00 28-00 00-00 31-62 37-65 66-30 30-35 37-38 62-35 00-3B D5-56 80-00 00-00 80-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 40-00 00-00 01-64 30-61>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2750: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/520 (108-byte object <57-00 00-00 E0-CA DB-56 40-00 00-00 40-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 70-A6 DF-56 3C-00 00-00 3C-00 00-00 39-38 39-62 64-38 31-33 38-66 33-64 70-47 E0-56 28-00 00-00 28-00 00-00 31-62 37-65 66-30 30-35 37-38 62-35 70-3A D5-56 80-00 00-00 80-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 40-00 00-00 01-64 30-61>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2751: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/521 (108-byte object <57-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 40-A7 DF-56 3C-00 00-00 3C-00 00-00 39-38 39-62 64-38 31-33 38-66 33-64 30-4C E0-56 28-00 00-00 28-00 00-00 31-62 37-65 66-30 30-35 37-38 62-35 00-3B D5-56 80-00 00-00 80-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 40-00 00-00 01-64 30-61>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2752: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/522 (108-byte object <58-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 70-3A D5-56 80-00 00-00 80-00 00-00 39-38 39-62 64-38 31-33 38-66 33-64 A0-BE C5-56 00-00 00-00 00-62 31-61 31-62 37-65 66-30 30-35 37-38 62-35 70-47 C9-56 54-00 00-00 54-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 2A-00 00-00 01-64 30-61>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2753: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/523 (108-byte object <58-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 00-3B D5-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 60-04 C6-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 50-FB BD-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2754: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/524 (108-byte object <58-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 70-3A D5-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 A0-BE C5-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 70-47 C9-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2755: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/525 (108-byte object <58-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 00-3B D5-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 60-04 C6-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 50-FB BD-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2756: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/526 (108-byte object <58-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 70-3A D5-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 A0-BE C5-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 70-47 C9-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2757: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/527 (108-byte object <58-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 00-3B D5-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 60-04 C6-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 50-FB BD-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2758: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/528 (108-byte object <59-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 70-3A D5-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 F0-F2 DF-56 28-00 00-00 28-00 00-00 66-37 65-39 30-32 35-65 34-33 34-62 70-47 C9-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2759: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/529 (108-byte object <59-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 00-3B D5-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-72 E0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-FB BD-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2760: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/530 (108-byte object <59-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-3A D5-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-75 E0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 70-47 C9-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2761: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/531 (108-byte object <59-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 00-3B D5-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-79 E0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-FB BD-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2762: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/532 (108-byte object <59-00 00-00 00-11 C1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-3A D5-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-7E E0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 70-47 C9-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2763: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/533 (108-byte object <59-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 00-3B D5-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 70-83 E0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-FB BD-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2764: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/534 (108-byte object <5A-00 00-00 70-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 C0-8F E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 C0-8A E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 10-90 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2765: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/535 (108-byte object <5A-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-8A E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 70-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2766: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/536 (108-byte object <5A-00 00-00 70-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 C0-8F E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-90 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 10-90 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2767: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/537 (108-byte object <5A-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 70-96 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 70-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2768: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/538 (108-byte object <5A-00 00-00 70-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 C0-8F E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-9A E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 10-90 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2769: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/539 (108-byte object <5A-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-9E E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 70-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2770: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/540 (108-byte object <5B-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-85 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 60-AC E0-56 70-00 00-00 70-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 38-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2771: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/541 (108-byte object <5B-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-A7 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 20-AD E0-56 70-00 00-00 70-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 38-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2772: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/542 (108-byte object <5B-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 40-AC E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 60-AC E0-56 70-00 00-00 70-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 38-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2773: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/543 (108-byte object <5B-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-B1 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 20-AD E0-56 70-00 00-00 70-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 38-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2774: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/544 (108-byte object <5B-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 40-B6 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 60-AC E0-56 70-00 00-00 70-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 38-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2775: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/545 (108-byte object <5B-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 E0-BA E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 20-AD E0-56 70-00 00-00 70-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 38-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2776: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/546 (108-byte object <5C-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-A3 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-7F AF-56 00-01 00-00 00-01 00-00 33-62 66-38 39-31 31-39 35-38 35-38 80-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2777: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/547 (108-byte object <5C-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-C4 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A3 BE-56 00-01 00-00 00-01 00-00 33-62 66-38 39-31 31-39 35-38 35-38 80-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2778: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/548 (108-byte object <5C-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 C0-C8 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-7F AF-56 00-01 00-00 00-01 00-00 33-62 66-38 39-31 31-39 35-38 35-38 80-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2779: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/549 (108-byte object <5C-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-CC E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A3 BE-56 00-01 00-00 00-01 00-00 33-62 66-38 39-31 31-39 35-38 35-38 80-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2780: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/550 (108-byte object <5C-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-D0 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-7F AF-56 00-01 00-00 00-01 00-00 33-62 66-38 39-31 31-39 35-38 35-38 80-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2781: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/551 (108-byte object <5C-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-D4 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-A3 BE-56 00-01 00-00 00-01 00-00 33-62 66-38 39-31 31-39 35-38 35-38 80-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2782: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/552 (108-byte object <5D-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 80-BF E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 B0-23 E1-56 C0-3F 00-00 C0-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E0-1F 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2783: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/553 (108-byte object <5D-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 90-DE E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 E0-63 E1-56 C0-3F 00-00 C0-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E0-1F 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2784: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/554 (108-byte object <5D-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 C0-E3 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 B0-23 E1-56 C0-3F 00-00 C0-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E0-1F 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2785: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/555 (108-byte object <5D-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-A6 E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 E0-63 E1-56 C0-3F 00-00 C0-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E0-1F 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2786: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/556 (108-byte object <5D-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 50-AA E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 B0-23 E1-56 C0-3F 00-00 C0-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E0-1F 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2787: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/557 (108-byte object <5D-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 70-AE E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 E0-63 E1-56 C0-3F 00-00 C0-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E0-1F 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2788: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/558 (108-byte object <5E-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-D9 E0-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 18-78 D0-56 00-00 00-00 00-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E1-1F 00-00 00-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2789: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/559 (108-byte object <5E-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-B6 E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 78-04 C6-56 00-00 00-00 00-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E1-1F 00-00 00-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2790: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/560 (108-byte object <5E-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-BA E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 18-78 D0-56 00-00 00-00 00-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E1-1F 00-00 00-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2791: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/561 (108-byte object <5E-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-BE E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 78-04 C6-56 00-00 00-00 00-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E1-1F 00-00 00-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2792: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/562 (108-byte object <5E-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 10-90 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 10-C3 E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 18-78 D0-56 00-00 00-00 00-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E1-1F 00-00 00-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2793: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/563 (108-byte object <5E-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-C7 E1-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 78-04 C6-56 00-00 00-00 00-3F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 E1-1F 00-00 00-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2794: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/564 (108-byte object <5F-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 E8-77 D0-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-6F E0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 10-90 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2795: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/565 (108-byte object <5F-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 48-04 C6-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-D4 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 20-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2796: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/566 (108-byte object <5F-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 E8-77 D0-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-D5 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 10-90 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2797: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/567 (108-byte object <5F-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 48-04 C6-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 E0-D9 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 20-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2798: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/568 (108-byte object <5F-00 00-00 C0-8F E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 E8-77 D0-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 10-DE E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 10-90 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2799: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/569 (108-byte object <5F-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 48-04 C6-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 40-E2 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 20-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2800: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/570 (108-byte object <60-00 00-00 10-90 E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-67 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2801: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/571 (108-byte object <60-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-6B E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 40-6E E1-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2802: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/572 (108-byte object <60-00 00-00 10-90 E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-71 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2803: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/573 (108-byte object <60-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-75 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 40-6E E1-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2804: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/574 (108-byte object <60-00 00-00 10-90 E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 70-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-7A E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2805: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/575 (108-byte object <60-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-91 E0-56 40-00 00-00 40-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-7E E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 40-6E E1-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2806: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/576 (108-byte object <61-00 00-00 70-91 E0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 50-BE C5-56 82-00 00-00 82-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-83 E1-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 C0-91 E0-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2807: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/577 (108-byte object <61-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-3A D5-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-87 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2808: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/578 (108-byte object <61-00 00-00 70-91 E0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-BE C5-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-8B E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2809: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/579 (108-byte object <61-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-3A D5-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-90 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2810: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/580 (108-byte object <61-00 00-00 70-91 E0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-BE C5-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-94 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 C0-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2811: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/581 (108-byte object <61-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-3A D5-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-99 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2812: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/582 (108-byte object <62-00 00-00 C0-91 E0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-6E E1-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-9E E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2813: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/583 (108-byte object <62-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-91 E0-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-A3 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2814: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/584 (108-byte object <62-00 00-00 C0-91 E0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-6E E1-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-29 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2815: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/585 (108-byte object <62-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-91 E0-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-2E E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2816: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/586 (108-byte object <62-00 00-00 C0-91 E0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-6E E1-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-32 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2817: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/587 (108-byte object <62-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-91 E0-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-37 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2818: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/588 (108-byte object <63-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 00-3E E2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-3B E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2819: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/589 (108-byte object <63-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 E0-3D E2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-40 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2820: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/590 (108-byte object <63-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-E3 E1-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-43 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2821: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/591 (108-byte object <63-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-45 E2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-47 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2822: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/592 (108-byte object <63-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-49 E2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-4B E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2823: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/593 (108-byte object <63-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 E0-4D E2-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-4F E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2824: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/594 (108-byte object <64-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-58 E2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-D4 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2825: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/595 (108-byte object <64-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-5B E2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-5B E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2826: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/596 (108-byte object <64-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-D4 E1-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-5B E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2827: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/597 (108-byte object <64-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-5B E2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-60 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2828: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/598 (108-byte object <64-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 A0-5B E2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-E4 E0-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2829: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/599 (108-byte object <64-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 00-60 E2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-E8 E0-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2830: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/600 (108-byte object <65-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-C2 D2-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-54 E2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2831: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/601 (108-byte object <65-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-5D AF-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-E8 E0-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2832: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/602 (108-byte object <65-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-C2 D2-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 20-F1 E0-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2833: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/603 (108-byte object <65-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-5D AF-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-FA E0-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2834: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/604 (108-byte object <65-00 00-00 40-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-C2 D2-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-FF E0-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-6E E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2835: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/605 (108-byte object <65-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-5D AF-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-03 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2836: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/606 (108-byte object <66-00 00-00 90-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-27 E2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-08 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2837: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/607 (108-byte object <66-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-91 E0-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-0C E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-0F E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2838: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/608 (108-byte object <66-00 00-00 90-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-27 E2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-12 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2839: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/609 (108-byte object <66-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-91 E0-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-16 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-0F E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2840: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/610 (108-byte object <66-00 00-00 90-6E E1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-27 E2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-1B E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2841: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/611 (108-byte object <66-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-91 E0-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-1F E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-0F E1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2842: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/612 (108-byte object <67-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-DE B4-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-24 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2843: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/613 (108-byte object <67-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-47 C9-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-28 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2844: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/614 (108-byte object <67-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-DE B4-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-2C E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2845: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/615 (108-byte object <67-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-47 C9-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-30 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2846: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/616 (108-byte object <67-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 10-DE B4-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-35 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2847: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/617 (108-byte object <67-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-47 C9-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-39 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2848: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/618 (108-byte object <68-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-6A CB-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-3E E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2849: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/619 (108-byte object <68-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-4D B1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-43 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2850: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/620 (108-byte object <68-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-6A CB-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-47 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2851: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/621 (108-byte object <68-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-4D B1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-4C E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2852: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/622 (108-byte object <68-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-6A CB-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-50 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2853: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/623 (108-byte object <68-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-4D B1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-55 E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2854: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/624 (108-byte object <69-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-61 E1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-5A E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 592)' - PASSED gtests.sh: #2855: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/625 (108-byte object <69-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-62 E1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-5E E1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 592)' - PASSED gtests.sh: #2856: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/626 (108-byte object <69-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-61 E1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-A5 E3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 592)' - PASSED gtests.sh: #2857: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/627 (108-byte object <69-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-62 E1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-AA E3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 592)' - PASSED gtests.sh: #2858: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/628 (108-byte object <69-00 00-00 20-27 E2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-61 E1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-AE E3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 70-27 E2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 592)' - PASSED gtests.sh: #2859: 'HkdfSha256/Pkcs11HkdfTest: WycheproofVectors/629 (108-byte object <69-00 00-00 D0-F5 D5-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-62 E1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-B3 E3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-91 E0-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 592)' - PASSED gtests.sh: #2860: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/0 (108-byte object <01-00 00-00 00-2A D2-56 20-00 00-00 20-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 38-F0 C7-56 00-00 00-00 00-39 31-35 62-30 64-65 31-32 34-31 66-38 36-36 50-F0 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 D0-8F D2-56 28-00 00-00 28-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 14-00 00-00 01-37 36-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2861: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/1 (108-byte object <01-00 00-00 A0-8C D4-56 20-00 00-00 20-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 E8-88 BE-56 00-00 00-00 00-36 32-62 39-38 39-62 64-38 31-33 38-66 33-64 00-89 BE-56 00-00 00-00 00-62 31-61 31-62 37-65 66-30 30-35 37-38 62-35 30-C2 B7-56 28-00 00-00 28-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 14-00 00-00 01-64 30-61>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2862: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/2 (108-byte object <01-00 00-00 D0-8F D2-56 20-00 00-00 20-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 38-F0 C7-56 00-00 00-00 00-39 31-35 62-30 64-65 31-32 34-31 66-38 36-36 50-F0 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 A0-1B D6-56 28-00 00-00 28-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 14-00 00-00 01-37 36-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2863: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/3 (108-byte object <01-00 00-00 20-24 D6-56 20-00 00-00 20-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 E8-88 BE-56 00-00 00-00 00-36 32-62 39-38 39-62 64-38 31-33 38-66 33-64 00-89 BE-56 00-00 00-00 00-62 31-61 31-62 37-65 66-30 30-35 37-38 62-35 E0-1F D6-56 28-00 00-00 28-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 14-00 00-00 01-64 30-61>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2864: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/4 (108-byte object <01-00 00-00 A0-1B D6-56 20-00 00-00 20-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 38-F0 C7-56 00-00 00-00 00-39 31-35 62-30 64-65 31-32 34-31 66-38 36-36 50-F0 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 D0-FD D5-56 28-00 00-00 28-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 14-00 00-00 01-37 36-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2865: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/5 (108-byte object <01-00 00-00 E0-1F D6-56 20-00 00-00 20-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 E8-88 BE-56 00-00 00-00 00-36 32-62 39-38 39-62 64-38 31-33 38-66 33-64 00-89 BE-56 00-00 00-00 00-62 31-61 31-62 37-65 66-30 30-35 37-38 62-35 70-31 D6-56 28-00 00-00 28-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 14-00 00-00 01-64 30-61>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2866: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/6 (108-byte object <02-00 00-00 F0-87 D4-56 20-00 00-00 20-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 38-F0 C7-56 00-00 00-00 00-39 31-35 62-30 64-65 31-32 34-31 66-38 36-36 50-F0 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 10-90 BC-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2867: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/7 (108-byte object <02-00 00-00 70-31 D6-56 20-00 00-00 20-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 E8-88 BE-56 00-00 00-00 00-36 32-62 39-38 39-62 64-38 31-33 38-66 33-64 00-89 BE-56 00-00 00-00 00-62 31-61 31-62 37-65 66-30 30-35 37-38 62-35 60-10 D1-56 54-00 00-00 54-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 2A-00 00-00 01-64 30-61>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2868: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/8 (108-byte object <02-00 00-00 50-3A D6-56 20-00 00-00 20-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 38-F0 C7-56 00-00 00-00 00-39 31-35 62-30 64-65 31-32 34-31 66-38 36-36 50-F0 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 10-90 BC-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2869: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/9 (108-byte object <02-00 00-00 E0-B9 D6-56 20-00 00-00 20-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 E8-88 BE-56 00-00 00-00 00-36 32-62 39-38 39-62 64-38 31-33 38-66 33-64 00-89 BE-56 00-00 00-00 00-62 31-61 31-62 37-65 66-30 30-35 37-38 62-35 60-10 D1-56 54-00 00-00 54-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 2A-00 00-00 01-64 30-61>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2870: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/10 (108-byte object <02-00 00-00 30-B5 D6-56 20-00 00-00 20-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 38-F0 C7-56 00-00 00-00 00-39 31-35 62-30 64-65 31-32 34-31 66-38 36-36 50-F0 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 10-90 BC-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2871: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/11 (108-byte object <02-00 00-00 C0-A8 D6-56 20-00 00-00 20-00 00-00 37-33 65-63 32-30 33-62 39-35 31-65 E8-88 BE-56 00-00 00-00 00-36 32-62 39-38 39-62 64-38 31-33 38-66 33-64 00-89 BE-56 00-00 00-00 00-62 31-61 31-62 37-65 66-30 30-35 37-38 62-35 60-10 D1-56 54-00 00-00 54-00 00-00 38-33 66-34 65-35 33-39 32-62 37-32 2A-00 00-00 01-64 30-61>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2872: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/12 (108-byte object <03-00 00-00 A0-97 D6-56 20-00 00-00 20-00 00-00 66-63 66-37 32-38 32-34 66-35 33-36 98-8F C0-56 00-00 00-00 00-64 30-30 35-37 62-38 38-63 30-36 66-34 32-61 B0-8F C0-56 00-00 00-00 00-37 32-30 61-32 64-62 36-63 36-30 35-32 65-64 10-5D B9-56 80-00 00-00 80-00 00-00 30-34 64-39 36-32 31-36 38-32 63-65 40-00 00-00 01-35 61-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2873: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/13 (108-byte object <03-00 00-00 D0-FD D5-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 00-89 BE-56 00-00 00-00 00-62 36-63 65-30 30-35 33-65 37-65 62-34 33-63 60-EB C0-56 80-00 00-00 80-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 40-00 00-00 01-39 66-36>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2874: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/14 (108-byte object <03-00 00-00 10-A9 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 98-8F C0-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 B0-8F C0-56 00-00 00-00 00-62 36-63 65-30 30-35 33-65 37-65 62-34 33-63 10-5D B9-56 80-00 00-00 80-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 40-00 00-00 01-39 66-36>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2875: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/15 (108-byte object <03-00 00-00 10-A5 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 00-89 BE-56 00-00 00-00 00-62 36-63 65-30 30-35 33-65 37-65 62-34 33-63 60-EB C0-56 80-00 00-00 80-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 40-00 00-00 01-39 66-36>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2876: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/16 (108-byte object <03-00 00-00 F0-98 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 98-8F C0-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 B0-8F C0-56 00-00 00-00 00-62 36-63 65-30 30-35 33-65 37-65 62-34 33-63 10-5D B9-56 80-00 00-00 80-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 40-00 00-00 01-39 66-36>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2877: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/17 (108-byte object <03-00 00-00 70-C3 C6-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 00-89 BE-56 00-00 00-00 00-62 36-63 65-30 30-35 33-65 37-65 62-34 33-63 D0-38 C7-56 80-00 00-00 80-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 40-00 00-00 01-39 66-36>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2878: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/18 (108-byte object <04-00 00-00 10-BD D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 38-F0 C7-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 10-B5 D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 E0-67 C0-56 28-00 00-00 28-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 14-00 00-00 01-39 66-36>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2879: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/19 (108-byte object <04-00 00-00 90-7F D6-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 10-AD D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 90-CC D7-56 28-00 00-00 28-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 14-00 00-00 01-39 66-36>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2880: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/20 (108-byte object <04-00 00-00 10-B5 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 38-F0 C7-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 E0-67 C0-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 10-5A D7-56 28-00 00-00 28-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 14-00 00-00 01-39 66-36>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2881: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/21 (108-byte object <04-00 00-00 A0-D0 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 10-55 D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 E0-6B D7-56 28-00 00-00 28-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 14-00 00-00 01-39 66-36>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2882: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/22 (108-byte object <04-00 00-00 E0-67 C0-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 38-F0 C7-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 10-5A D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 40-7D D7-56 28-00 00-00 28-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 14-00 00-00 01-39 66-36>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2883: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/23 (108-byte object <04-00 00-00 40-70 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 F0-78 D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 80-8A D7-56 28-00 00-00 28-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 14-00 00-00 01-39 66-36>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2884: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/24 (108-byte object <05-00 00-00 40-7D D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 38-F0 C7-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 60-1E D8-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 F0-AC BD-56 54-00 00-00 54-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 2A-00 00-00 01-39 66-36>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2885: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/25 (108-byte object <05-00 00-00 F0-78 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 80-8A D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 2A-00 00-00 01-39 66-36>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2886: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/26 (108-byte object <05-00 00-00 10-E5 D6-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 38-F0 C7-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 70-C4 D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 F0-AC BD-56 54-00 00-00 54-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 2A-00 00-00 01-39 66-36>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2887: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/27 (108-byte object <05-00 00-00 80-8A D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 10-B9 D7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 2A-00 00-00 01-39 66-36>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2888: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/28 (108-byte object <05-00 00-00 70-C4 D7-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 38-F0 C7-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 F0-D0 C2-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 F0-AC BD-56 54-00 00-00 54-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 2A-00 00-00 01-39 66-36>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2889: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/29 (108-byte object <05-00 00-00 B0-ED D6-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 E8-88 BE-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 A0-4C D8-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 2A-00 00-00 01-39 66-36>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2890: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/30 (108-byte object <06-00 00-00 F0-D0 C2-56 20-00 00-00 20-00 00-00 66-34 66-63 39-39 65-30 31-33 64-62 08-39 C7-56 00-00 00-00 00-38 35-36 36-30 64-64 33-66 32-34 33-32 62-35 F0-AA B7-56 28-00 00-00 28-00 00-00 65-30 30-35 33-65 37-65 62-34 33-63 60-8F C0-56 80-00 00-00 80-00 00-00 34-38 65-63 65-38 36-38 38-65 36-33 40-00 00-00 01-39 66-36>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2891: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/31 (108-byte object <06-00 00-00 50-22 D7-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 E8-88 BE-56 00-00 00-00 00-62 39-62 31-30 66-39 36-32 65-36 66-61 38-62 C0-26 D7-56 28-00 00-00 28-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 10-5D B9-56 80-00 00-00 80-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 40-00 00-00 01-36 63-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2892: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/32 (108-byte object <06-00 00-00 F0-AA B7-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 08-39 C7-56 00-00 00-00 00-62 39-62 31-30 66-39 36-32 65-36 66-61 38-62 30-1E D7-56 28-00 00-00 28-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 60-8F C0-56 80-00 00-00 80-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 40-00 00-00 01-36 63-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2893: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/33 (108-byte object <06-00 00-00 C0-26 D7-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 E8-88 BE-56 00-00 00-00 00-62 39-62 31-30 66-39 36-32 65-36 66-61 38-62 F0-15 D7-56 28-00 00-00 28-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 40-38 C7-56 80-00 00-00 80-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 40-00 00-00 01-36 63-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2894: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/34 (108-byte object <06-00 00-00 10-A3 D9-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 08-39 C7-56 00-00 00-00 00-62 39-62 31-30 66-39 36-32 65-36 66-61 38-62 F0-FB D6-56 28-00 00-00 28-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 60-8F C0-56 80-00 00-00 80-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 40-00 00-00 01-36 63-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2895: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/35 (108-byte object <06-00 00-00 F0-15 D7-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 E8-88 BE-56 00-00 00-00 00-62 39-62 31-30 66-39 36-32 65-36 66-61 38-62 80-9E D9-56 28-00 00-00 28-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 40-38 C7-56 80-00 00-00 80-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 40-00 00-00 01-36 63-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2896: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/36 (108-byte object <07-00 00-00 F0-99 D9-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 30-1E D7-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 50-F0 C7-56 00-00 00-00 00-62 36-30 39-65 65-65 33-34 61-61 61-61 30-32 20-1F C9-56 28-00 00-00 28-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 14-00 00-00 01-36 63-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2897: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/37 (108-byte object <07-00 00-00 D0-07 DA-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 60-E0 D9-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 00-89 BE-56 00-00 00-00 00-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 90-F0 D9-56 28-00 00-00 28-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 14-00 00-00 01-36 63-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2898: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/38 (108-byte object <07-00 00-00 10-FE C9-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 80-F4 D9-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 50-F0 C7-56 00-00 00-00 00-62 36-30 39-65 65-65 33-34 61-61 61-61 30-32 A0-1C DA-56 28-00 00-00 28-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 14-00 00-00 01-36 63-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2899: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/39 (108-byte object <07-00 00-00 60-E0 D9-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 90-F0 D9-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 00-89 BE-56 00-00 00-00 00-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 70-F8 D9-56 28-00 00-00 28-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 14-00 00-00 01-36 63-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2900: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/40 (108-byte object <07-00 00-00 90-29 DA-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 E0-2D DA-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 50-F0 C7-56 00-00 00-00 00-62 36-30 39-65 65-65 33-34 61-61 61-61 30-32 E0-6E DA-56 28-00 00-00 28-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 14-00 00-00 01-36 63-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2901: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/41 (108-byte object <07-00 00-00 90-F0 D9-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 70-F8 D9-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 00-89 BE-56 00-00 00-00 00-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 10-8A DA-56 28-00 00-00 28-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 14-00 00-00 01-36 63-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2902: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/42 (108-byte object <08-00 00-00 50-C5 DA-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 30-8E DA-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 50-F0 C7-56 00-00 00-00 00-62 36-30 39-65 65-65 33-34 61-61 61-61 30-32 60-10 D1-56 54-00 00-00 54-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 2A-00 00-00 01-36 63-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2903: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/43 (108-byte object <08-00 00-00 80-77 DA-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 F0-20 DA-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 00-89 BE-56 00-00 00-00 00-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 50-F5 DF-56 54-00 00-00 54-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 2A-00 00-00 01-36 63-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2904: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/44 (108-byte object <08-00 00-00 30-8E DA-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 D0-84 DA-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 50-F0 C7-56 00-00 00-00 00-62 36-30 39-65 65-65 33-34 61-61 61-61 30-32 60-10 D1-56 54-00 00-00 54-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 2A-00 00-00 01-36 63-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2905: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/45 (108-byte object <08-00 00-00 60-45 DB-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 D0-49 DB-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 00-89 BE-56 00-00 00-00 00-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 50-F5 DF-56 54-00 00-00 54-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 2A-00 00-00 01-36 63-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2906: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/46 (108-byte object <08-00 00-00 D0-84 DA-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 70-81 CB-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 50-F0 C7-56 00-00 00-00 00-62 36-30 39-65 65-65 33-34 61-61 61-61 30-32 60-10 D1-56 54-00 00-00 54-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 2A-00 00-00 01-36 63-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2907: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/47 (108-byte object <08-00 00-00 D0-49 DB-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 B0-16 DB-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 00-89 BE-56 00-00 00-00 00-00 00-00 39-65 65-65 33-34 61-61 61-61 30-32 50-F5 DF-56 54-00 00-00 54-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 2A-00 00-00 01-36 63-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2908: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/48 (108-byte object <09-00 00-00 30-71 DC-56 20-00 00-00 20-00 00-00 39-37 36-61 35-35 37-34 66-62 37-65 30-6D DC-56 20-00 00-00 20-00 00-00 31-30 66-39 36-32 65-36 66-61 38-62 90-38 C7-56 00-00 00-00 00-62 36-30 39-65 65-65 33-34 61-61 61-61 30-32 D0-38 C7-56 80-00 00-00 80-00 00-00 34-36 37-38 61-30 30-35 36-34 30-66 40-00 00-00 01-36 63-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2909: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/49 (108-byte object <09-00 00-00 B0-16 DB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 F0-73 CB-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 00-89 BE-56 00-00 00-00 00-61 63-64 66-31 34-31 37-33 33-63 63-63 35-34 60-8F C0-56 80-00 00-00 80-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 40-00 00-00 01-62 31-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2910: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/50 (108-byte object <09-00 00-00 30-6D DC-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 80-81 DB-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 90-38 C7-56 00-00 00-00 00-61 63-64 66-31 34-31 37-33 33-63 63-63 35-34 D0-38 C7-56 80-00 00-00 80-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 40-00 00-00 01-62 31-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2911: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/51 (108-byte object <09-00 00-00 C0-F4 CB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 80-97 DB-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 00-89 BE-56 00-00 00-00 00-61 63-64 66-31 34-31 37-33 33-63 63-63 35-34 60-8F C0-56 80-00 00-00 80-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 40-00 00-00 01-62 31-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2912: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/52 (108-byte object <09-00 00-00 80-81 DB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 80-44 DC-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 90-38 C7-56 00-00 00-00 00-61 63-64 66-31 34-31 37-33 33-63 63-63 35-34 D0-38 C7-56 80-00 00-00 80-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 40-00 00-00 01-62 31-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2913: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/53 (108-byte object <09-00 00-00 F0-7C CB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 A0-0B DD-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 00-89 BE-56 00-00 00-00 00-61 63-64 66-31 34-31 37-33 33-63 63-63 35-34 60-8F C0-56 80-00 00-00 80-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 40-00 00-00 01-62 31-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2914: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/54 (108-byte object <0A-00 00-00 00-00 DD-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 E0-03 DD-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 80-97 DB-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 F0-73 CB-56 28-00 00-00 28-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 14-00 00-00 01-62 31-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2915: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/55 (108-byte object <0A-00 00-00 90-F6 DB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 00-FB DB-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 70-F2 DB-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 50-EE DB-56 28-00 00-00 28-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 14-00 00-00 01-62 31-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2916: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/56 (108-byte object <0A-00 00-00 30-EA DB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 B0-E1 DB-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 10-E6 DB-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 A0-0B DD-56 28-00 00-00 28-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 14-00 00-00 01-62 31-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2917: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/57 (108-byte object <0A-00 00-00 F0-73 CB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 E0-03 DD-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 B0-66 CC-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 A0-7D DE-56 28-00 00-00 28-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 14-00 00-00 01-62 31-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2918: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/58 (108-byte object <0A-00 00-00 10-E6 DB-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 A0-0B DD-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 40-7A DE-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 40-69 DE-56 28-00 00-00 28-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 14-00 00-00 01-62 31-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2919: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/59 (108-byte object <0A-00 00-00 20-40 DC-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 00-FB DB-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 B0-E1 DB-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 10-0E CD-56 28-00 00-00 28-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 14-00 00-00 01-62 31-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2920: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/60 (108-byte object <0B-00 00-00 D0-F9 DE-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 60-F5 DE-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 F0-F0 DE-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 A0-B4 D6-56 54-00 00-00 54-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 2A-00 00-00 01-62 31-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2921: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/61 (108-byte object <0B-00 00-00 10-0E CD-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 30-75 DC-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 80-EC DE-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 00-56 DF-56 54-00 00-00 54-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 2A-00 00-00 01-62 31-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2922: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/62 (108-byte object <0B-00 00-00 F0-F0 DE-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 10-BE DE-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 80-44 DC-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 A0-B4 D6-56 54-00 00-00 54-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 2A-00 00-00 01-62 31-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2923: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/63 (108-byte object <0B-00 00-00 10-5C DF-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 B0-E1 DB-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 C0-97 CD-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 00-56 DF-56 54-00 00-00 54-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 2A-00 00-00 01-62 31-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2924: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/64 (108-byte object <0B-00 00-00 80-44 DC-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 B0-12 DF-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 50-46 DF-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 A0-B4 D6-56 54-00 00-00 54-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 2A-00 00-00 01-62 31-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2925: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/65 (108-byte object <0B-00 00-00 80-B5 DF-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 80-EC DE-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 50-B1 DF-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 00-56 DF-56 54-00 00-00 54-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 2A-00 00-00 01-62 31-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2926: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/66 (108-byte object <0C-00 00-00 90-BC CC-56 20-00 00-00 20-00 00-00 38-36 66-33 36-61 36-62 31-34 32-33 10-99 DF-56 20-00 00-00 20-00 00-00 64-35 36-66 61-32 30-31 63-39 36-38 C0-4A DF-56 28-00 00-00 28-00 00-00 66-31 34-31 37-33 33-63 63-63 35-34 40-38 C7-56 80-00 00-00 80-00 00-00 38-34 63-34 66-34 30-65 32-31 32-30 40-00 00-00 01-62 31-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2927: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/67 (108-byte object <0C-00 00-00 50-FB DF-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 A0-09 CD-56 20-00 00-00 20-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 50-A1 C5-56 28-00 00-00 28-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 D0-38 C7-56 80-00 00-00 80-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 40-00 00-00 01-32 62-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2928: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/68 (108-byte object <0C-00 00-00 C0-4A DF-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 F0-F6 DF-56 20-00 00-00 20-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 D0-E9 DF-56 28-00 00-00 28-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 40-38 C7-56 80-00 00-00 80-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 40-00 00-00 01-32 62-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2929: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/69 (108-byte object <0C-00 00-00 B0-FF DF-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 50-B1 DF-56 20-00 00-00 20-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 B0-55 E0-56 28-00 00-00 28-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 D0-38 C7-56 80-00 00-00 80-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 40-00 00-00 01-32 62-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2930: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/70 (108-byte object <0C-00 00-00 D0-E9 DF-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 F0-50 E0-56 20-00 00-00 20-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 70-47 E0-56 28-00 00-00 28-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 40-38 C7-56 80-00 00-00 80-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 40-00 00-00 01-32 62-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2931: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/71 (108-byte object <0C-00 00-00 C0-B3 E0-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 50-A1 C5-56 20-00 00-00 20-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 20-AF E0-56 28-00 00-00 28-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 D0-38 C7-56 80-00 00-00 80-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 40-00 00-00 01-32 62-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2932: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/72 (108-byte object <0D-00 00-00 50-A5 E0-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 40-C0 D7-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 50-F0 C7-56 00-00 00-00 00-65 62-31 61-61 30-32 65-63 30-34 63-33 33-66 10-B7 CD-56 28-00 00-00 28-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 14-00 00-00 01-32 62-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2933: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/73 (108-byte object <0D-00 00-00 50-A1 C5-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 60-10 D1-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 00-89 BE-56 00-00 00-00 00-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 20-AF E0-56 28-00 00-00 28-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 14-00 00-00 01-32 62-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2934: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/74 (108-byte object <0D-00 00-00 10-B7 CD-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 40-C0 D7-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 50-F0 C7-56 00-00 00-00 00-65 62-31 61-61 30-32 65-63 30-34 63-33 33-66 30-4C E0-56 28-00 00-00 28-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 14-00 00-00 01-32 62-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2935: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/75 (108-byte object <0D-00 00-00 10-B0 E1-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 60-10 D1-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 00-89 BE-56 00-00 00-00 00-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 E0-A0 E0-56 28-00 00-00 28-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 14-00 00-00 01-32 62-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2936: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/76 (108-byte object <0D-00 00-00 30-4C E0-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 40-C0 D7-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 50-F0 C7-56 00-00 00-00 00-65 62-31 61-61 30-32 65-63 30-34 63-33 33-66 90-C0 E1-56 28-00 00-00 28-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 14-00 00-00 01-32 62-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2937: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/77 (108-byte object <0D-00 00-00 A0-7E E1-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 60-10 D1-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 00-89 BE-56 00-00 00-00 00-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 20-83 E1-56 28-00 00-00 28-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 14-00 00-00 01-32 62-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2938: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/78 (108-byte object <0E-00 00-00 C0-A9 E0-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 40-C0 D7-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 50-F0 C7-56 00-00 00-00 00-65 62-31 61-61 30-32 65-63 30-34 63-33 33-66 50-F5 DF-56 54-00 00-00 54-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 2A-00 00-00 01-32 62-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2939: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/79 (108-byte object <0E-00 00-00 20-83 E1-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 60-10 D1-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 00-89 BE-56 00-00 00-00 00-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 A0-B4 D6-56 54-00 00-00 54-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 2A-00 00-00 01-32 62-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2940: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/80 (108-byte object <0E-00 00-00 20-71 E1-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 40-C0 D7-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 50-F0 C7-56 00-00 00-00 00-65 62-31 61-61 30-32 65-63 30-34 63-33 33-66 50-F5 DF-56 54-00 00-00 54-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 2A-00 00-00 01-32 62-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2941: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/81 (108-byte object <0E-00 00-00 E0-A0 E0-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 60-10 D1-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 00-89 BE-56 00-00 00-00 00-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 A0-B4 D6-56 54-00 00-00 54-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 2A-00 00-00 01-32 62-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2942: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/82 (108-byte object <0E-00 00-00 F0-FA E0-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 40-C0 D7-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 50-F0 C7-56 00-00 00-00 00-65 62-31 61-61 30-32 65-63 30-34 63-33 33-66 50-F5 DF-56 54-00 00-00 54-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 2A-00 00-00 01-32 62-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2943: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/83 (108-byte object <0E-00 00-00 20-F1 E0-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 60-10 D1-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 00-89 BE-56 00-00 00-00 00-00 00-00 61-61 30-32 65-63 30-34 63-33 33-66 A0-B4 D6-56 54-00 00-00 54-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 2A-00 00-00 01-32 62-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2944: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/84 (108-byte object <0F-00 00-00 00-60 E2-56 20-00 00-00 20-00 00-00 39-66 62-39 30-33 63-37 65-64 34-66 40-C0 D7-56 3C-00 00-00 3C-00 00-00 31-65 38-63 33-37 61-65 66-35 63-30 20-39 C7-56 00-00 00-00 00-65 62-31 61-61 30-32 65-63 30-34 63-33 33-66 60-8F C0-56 80-00 00-00 80-00 00-00 65-39 33-30 61-39 66-38 39-65 63-39 40-00 00-00 01-32 62-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2945: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/85 (108-byte object <0F-00 00-00 80-CC C2-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 00-89 BE-56 00-00 00-00 00-37 66-38 39-32 63-32 31-39 38-38 35-32 34-33 40-38 C7-56 80-00 00-00 80-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 40-00 00-00 01-32 35-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2946: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/86 (108-byte object <0F-00 00-00 D0-5E E1-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 20-39 C7-56 00-00 00-00 00-37 66-38 39-32 63-32 31-39 38-38 35-32 34-33 60-8F C0-56 80-00 00-00 80-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 40-00 00-00 01-32 35-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2947: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/87 (108-byte object <0F-00 00-00 30-5A E1-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 00-89 BE-56 00-00 00-00 00-37 66-38 39-32 63-32 31-39 38-38 35-32 34-33 40-38 C7-56 80-00 00-00 80-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 40-00 00-00 01-32 35-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2948: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/88 (108-byte object <0F-00 00-00 50-4C E1-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 20-39 C7-56 00-00 00-00 00-37 66-38 39-32 63-32 31-39 38-38 35-32 34-33 60-8F C0-56 80-00 00-00 80-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 40-00 00-00 01-32 35-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2949: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/89 (108-byte object <0F-00 00-00 10-43 E1-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 00-89 BE-56 00-00 00-00 00-37 66-38 39-32 63-32 31-39 38-38 35-32 34-33 40-38 C7-56 80-00 00-00 80-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 40-00 00-00 01-32 35-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2950: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/90 (108-byte object <10-00 00-00 B0-38 D4-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 10-32 D3-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 70-8B D2-56 28-00 00-00 28-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 14-00 00-00 01-32 35-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2951: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/91 (108-byte object <10-00 00-00 60-E8 E0-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 B0-AF D1-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 40-B6 C7-56 28-00 00-00 28-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 14-00 00-00 01-32 35-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2952: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/92 (108-byte object <10-00 00-00 10-32 D3-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 70-8B D2-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 C0-B5 C2-56 28-00 00-00 28-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 14-00 00-00 01-32 35-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2953: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/93 (108-byte object <10-00 00-00 B0-AF D1-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 40-B6 C7-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 60-9E C4-56 28-00 00-00 28-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 14-00 00-00 01-32 35-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2954: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/94 (108-byte object <10-00 00-00 70-8B D2-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 C0-B5 C2-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 40-4C C8-56 28-00 00-00 28-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 14-00 00-00 01-32 35-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2955: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/95 (108-byte object <10-00 00-00 40-B6 C7-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 60-9E C4-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 20-8F D4-56 28-00 00-00 28-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 14-00 00-00 01-32 35-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2956: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/96 (108-byte object <11-00 00-00 40-4C C8-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 10-44 D8-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 00-56 DF-56 54-00 00-00 54-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 2A-00 00-00 01-32 35-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2957: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/97 (108-byte object <11-00 00-00 60-9E C4-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 20-8F D4-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 50-F5 DF-56 54-00 00-00 54-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 2A-00 00-00 01-32 35-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2958: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/98 (108-byte object <11-00 00-00 10-44 D8-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 E0-3F C8-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 00-56 DF-56 54-00 00-00 54-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 2A-00 00-00 01-32 35-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2959: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/99 (108-byte object <11-00 00-00 20-8F D4-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 20-7B D2-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 50-F5 DF-56 54-00 00-00 54-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 2A-00 00-00 01-32 35-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2960: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/100 (108-byte object <11-00 00-00 E0-3F C8-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 00-4A E5-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 00-56 DF-56 54-00 00-00 54-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 2A-00 00-00 01-32 35-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2961: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/101 (108-byte object <11-00 00-00 20-7B D2-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 60-10 D1-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 70-4E E5-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 50-F5 DF-56 54-00 00-00 54-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 2A-00 00-00 01-32 35-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2962: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/102 (108-byte object <12-00 00-00 00-4A E5-56 20-00 00-00 20-00 00-00 36-61 61-36 64-34 63-30 31-65 61-30 40-C0 D7-56 3C-00 00-00 3C-00 00-00 65-64 38-32 30-64 39-30 32-38 37-63 E0-52 E5-56 28-00 00-00 28-00 00-00 39-32 63-32 31-39 38-38 35-32 34-33 D0-38 C7-56 80-00 00-00 80-00 00-00 38-36 63-61 38-65 61-62 64-61 34-32 40-00 00-00 01-32 35-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2963: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/103 (108-byte object <12-00 00-00 70-4E E5-56 20-00 00-00 20-00 00-00 62-61 35-35 32-35 37-31 35-32 38-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 32-61 65-63 35-39 64-30 31-34 34-30 50-57 E5-56 28-00 00-00 28-00 00-00 32-66 35-35 31-63 36-64 36-32 62-66 60-8F C0-56 80-00 00-00 80-00 00-00 32-33 65-31 30-66 33-62 66-37 32-37 40-00 00-00 01-33 37-66>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2964: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/104 (108-byte object <12-00 00-00 E0-52 E5-56 20-00 00-00 20-00 00-00 62-61 35-35 32-35 37-31 35-32 38-33 40-C0 D7-56 3C-00 00-00 3C-00 00-00 32-61 65-63 35-39 64-30 31-34 34-30 C0-5B E5-56 28-00 00-00 28-00 00-00 32-66 35-35 31-63 36-64 36-32 62-66 D0-38 C7-56 80-00 00-00 80-00 00-00 32-33 65-31 30-66 33-62 66-37 32-37 40-00 00-00 01-33 37-66>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2965: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/105 (108-byte object <12-00 00-00 50-57 E5-56 20-00 00-00 20-00 00-00 62-61 35-35 32-35 37-31 35-32 38-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 32-61 65-63 35-39 64-30 31-34 34-30 60-60 E5-56 28-00 00-00 28-00 00-00 32-66 35-35 31-63 36-64 36-32 62-66 60-8F C0-56 80-00 00-00 80-00 00-00 32-33 65-31 30-66 33-62 66-37 32-37 40-00 00-00 01-33 37-66>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2966: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/106 (108-byte object <12-00 00-00 C0-5B E5-56 20-00 00-00 20-00 00-00 62-61 35-35 32-35 37-31 35-32 38-33 40-C0 D7-56 3C-00 00-00 3C-00 00-00 32-61 65-63 35-39 64-30 31-34 34-30 00-65 E5-56 28-00 00-00 28-00 00-00 32-66 35-35 31-63 36-64 36-32 62-66 D0-38 C7-56 80-00 00-00 80-00 00-00 32-33 65-31 30-66 33-62 66-37 32-37 40-00 00-00 01-33 37-66>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2967: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/107 (108-byte object <12-00 00-00 60-60 E5-56 20-00 00-00 20-00 00-00 62-61 35-35 32-35 37-31 35-32 38-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 32-61 65-63 35-39 64-30 31-34 34-30 A0-69 E5-56 28-00 00-00 28-00 00-00 32-66 35-35 31-63 36-64 36-32 62-66 60-8F C0-56 80-00 00-00 80-00 00-00 32-33 65-31 30-66 33-62 66-37 32-37 40-00 00-00 01-33 37-66>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2968: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/108 (108-byte object <13-00 00-00 C0-B5 C2-56 20-00 00-00 20-00 00-00 62-61 35-35 32-35 37-31 35-32 38-33 D0-38 C7-56 80-00 00-00 80-00 00-00 32-61 65-63 35-39 64-30 31-34 34-30 90-38 C7-56 00-00 00-00 00-30 66-62 32-66 35-35 31-63 36-64 36-32 62-66 A0-B4 D6-56 54-00 00-00 54-00 00-00 32-33 65-31 30-66 33-62 66-37 32-37 2A-00 00-00 01-33 37-66>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2969: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/109 (108-byte object <13-00 00-00 A0-69 E5-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 60-8F C0-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-89 BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 00-56 DF-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2970: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/110 (108-byte object <13-00 00-00 E0-72 E5-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 D0-38 C7-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 90-38 C7-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 A0-B4 D6-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2971: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/111 (108-byte object <13-00 00-00 10-7D E5-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 60-8F C0-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-89 BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 00-56 DF-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2972: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/112 (108-byte object <13-00 00-00 90-81 E5-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 D0-38 C7-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 90-38 C7-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 A0-B4 D6-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2973: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/113 (108-byte object <13-00 00-00 10-86 E5-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 60-8F C0-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-89 BE-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 00-56 DF-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2974: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/114 (108-byte object <14-00 00-00 10-8F E5-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 D0-38 C7-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-65 E5-56 28-00 00-00 28-00 00-00 64-61 38-66 61-38 65-64 37-61 38-32 A0-B4 D6-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2975: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/115 (108-byte object <14-00 00-00 F0-91 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 60-8F C0-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 20-92 E5-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-56 DF-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2976: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/116 (108-byte object <14-00 00-00 00-65 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 D0-38 C7-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 80-92 E5-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2977: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/117 (108-byte object <14-00 00-00 20-92 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 60-8F C0-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 30-97 E5-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-56 DF-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2978: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/118 (108-byte object <14-00 00-00 80-92 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 D0-38 C7-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-9B E5-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2979: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/119 (108-byte object <14-00 00-00 30-97 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 60-8F C0-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-A0 E5-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-56 DF-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2980: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/120 (108-byte object <15-00 00-00 90-8A E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-A9 E5-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-0E E6-56 A0-5F 00-00 A0-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D0-2F 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2981: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/121 (108-byte object <15-00 00-00 90-A0 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-6F E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 70-A9 E5-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 90-6F E6-56 A0-5F 00-00 A0-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D0-2F 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2982: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/122 (108-byte object <15-00 00-00 F0-A9 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 A0-6E E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-90 E7-56 A0-5F 00-00 A0-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D0-2F 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2983: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/123 (108-byte object <15-00 00-00 B0-A9 E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-6F E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 40-D2 E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 90-6F E6-56 A0-5F 00-00 A0-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D0-2F 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2984: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/124 (108-byte object <15-00 00-00 E0-D7 E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 40-D6 E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 00-90 E7-56 A0-5F 00-00 A0-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D0-2F 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2985: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/125 (108-byte object <15-00 00-00 00-DC E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-6F E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 60-DA E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 90-6F E6-56 A0-5F 00-00 A0-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D0-2F 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2986: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/126 (108-byte object <16-00 00-00 20-E0 E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 C0-A4 E5-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 68-F0 C7-56 00-00 00-00 00-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D1-2F 00-00 00-66 30-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2987: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/127 (108-byte object <16-00 00-00 60-E4 E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-6F E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 C0-E2 E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 18-89 BE-56 00-00 00-00 00-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D1-2F 00-00 00-66 30-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2988: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/128 (108-byte object <16-00 00-00 80-E8 E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-E6 E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 68-F0 C7-56 00-00 00-00 00-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D1-2F 00-00 00-66 30-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2989: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/129 (108-byte object <16-00 00-00 A0-EC E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-6F E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 00-EB E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 18-89 BE-56 00-00 00-00 00-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D1-2F 00-00 00-66 30-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2990: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/130 (108-byte object <16-00 00-00 C0-F0 E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 20-EF E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 68-F0 C7-56 00-00 00-00 00-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D1-2F 00-00 00-66 30-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2991: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/131 (108-byte object <16-00 00-00 00-FD E6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-6F E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 40-F3 E6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 18-89 BE-56 00-00 00-00 00-5F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 D1-2F 00-00 00-66 30-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2992: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/132 (108-byte object <17-00 00-00 40-05 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 38-F0 C7-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-9B E5-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-94 DC-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2993: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/133 (108-byte object <17-00 00-00 00-08 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 E8-88 BE-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 30-08 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 40-C0 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #2994: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/134 (108-byte object <17-00 00-00 E0-9B E5-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 38-F0 C7-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-08 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-94 DC-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #2995: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/135 (108-byte object <17-00 00-00 30-08 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 E8-88 BE-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 A0-0C E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 40-C0 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #2996: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/136 (108-byte object <17-00 00-00 90-08 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 38-F0 C7-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 B0-10 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-94 DC-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #2997: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/137 (108-byte object <17-00 00-00 A0-0C E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 E8-88 BE-56 00-00 00-00 00-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 C0-14 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 40-C0 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #2998: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/138 (108-byte object <18-00 00-00 B0-10 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-AE E5-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 D0-18 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-94 DC-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #2999: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/139 (108-byte object <18-00 00-00 C0-14 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-1C E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 40-C0 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3000: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/140 (108-byte object <18-00 00-00 D0-18 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-AE E5-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 F0-20 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-94 DC-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3001: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/141 (108-byte object <18-00 00-00 E0-1C E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 70-25 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 40-C0 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3002: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/142 (108-byte object <18-00 00-00 F0-20 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 20-AE E5-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 F0-29 E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-94 DC-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3003: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/143 (108-byte object <18-00 00-00 70-25 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-0E E6-56 60-00 00-00 60-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 70-2E E7-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 40-C0 D7-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3004: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/144 (108-byte object <19-00 00-00 F0-29 E7-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-38 C7-56 82-00 00-00 82-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 30-B2 E5-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 80-94 DC-56 40-00 00-00 40-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 20-00 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3005: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/145 (108-byte object <19-00 00-00 70-2E E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 D0-38 C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-B6 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3006: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/146 (108-byte object <19-00 00-00 30-B2 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-38 C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-BB E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3007: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/147 (108-byte object <19-00 00-00 B0-B6 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 D0-38 C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 D0-BF E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3008: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/148 (108-byte object <19-00 00-00 30-BB E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-38 C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-C4 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3009: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/149 (108-byte object <19-00 00-00 D0-BF E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 D0-38 C7-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-C9 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3010: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/150 (108-byte object <1A-00 00-00 70-C4 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-6F E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-CD E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3011: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/151 (108-byte object <1A-00 00-00 10-C9 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-AE E5-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-D2 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3012: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/152 (108-byte object <1A-00 00-00 B0-CD E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-6F E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-D6 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3013: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/153 (108-byte object <1A-00 00-00 50-D2 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-AE E5-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-DB E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3014: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/154 (108-byte object <1A-00 00-00 F0-D6 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-6F E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-DF E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3015: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/155 (108-byte object <1A-00 00-00 70-DB E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-AE E5-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-E4 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3016: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/156 (108-byte object <1B-00 00-00 F0-DF E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-ED E5-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-E8 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3017: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/157 (108-byte object <1B-00 00-00 70-E4 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 F0-EC E5-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-ED E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3018: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/158 (108-byte object <1B-00 00-00 F0-E8 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-F1 E5-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-F2 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3019: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/159 (108-byte object <1B-00 00-00 70-ED E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E0-F5 E5-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-F6 E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3020: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/160 (108-byte object <1B-00 00-00 30-F2 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-FA E5-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 90-FA E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3021: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/161 (108-byte object <1B-00 00-00 60-F6 E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-FE E5-56 10-00 00-00 10-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-FE E5-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3022: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/162 (108-byte object <1C-00 00-00 F0-02 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-07 E6-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-08 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3023: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/163 (108-byte object <1C-00 00-00 C0-FE E5-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 10-0B E6-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 40-0B E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3024: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/164 (108-byte object <1C-00 00-00 20-07 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 60-08 E7-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-0B E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3025: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/165 (108-byte object <1C-00 00-00 10-0B E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-0B E6-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 D0-0B E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3026: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/166 (108-byte object <1C-00 00-00 60-08 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-0B E6-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-0E E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3027: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/167 (108-byte object <1C-00 00-00 40-0B E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 D0-0B E6-56 20-00 00-00 20-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-75 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3028: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/168 (108-byte object <1D-00 00-00 10-0E E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-C2 D2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 E0-79 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3029: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/169 (108-byte object <1D-00 00-00 D0-0B E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-BF B8-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-75 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3030: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/170 (108-byte object <1D-00 00-00 E0-79 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-C2 D2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-0B E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3031: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/171 (108-byte object <1D-00 00-00 A0-75 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-BF B8-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 20-01 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3032: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/172 (108-byte object <1D-00 00-00 70-0B E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-C2 D2-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-8E E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3033: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/173 (108-byte object <1D-00 00-00 20-01 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-BF B8-56 30-00 00-00 30-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 10-93 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3034: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/174 (108-byte object <1E-00 00-00 C0-8E E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-85 DA-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-97 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-9F E6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3035: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/175 (108-byte object <1E-00 00-00 10-93 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-C0 D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 B0-9B E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-A0 E6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3036: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/176 (108-byte object <1E-00 00-00 60-97 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-85 DA-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-A0 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-9F E6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3037: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/177 (108-byte object <1E-00 00-00 B0-9B E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-C0 D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-A5 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-A0 E6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3038: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/178 (108-byte object <1E-00 00-00 F0-A0 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-85 DA-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-AA E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-9F E6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3039: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/179 (108-byte object <1E-00 00-00 A0-A5 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-C0 D7-56 40-00 00-00 40-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 60-AE E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-A0 E6-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3040: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/180 (108-byte object <1F-00 00-00 00-AA E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-F5 DF-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-B2 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3041: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/181 (108-byte object <1F-00 00-00 60-AE E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-B4 D6-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 20-B7 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3042: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/182 (108-byte object <1F-00 00-00 C0-B2 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-F5 DF-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 80-BB E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3043: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/183 (108-byte object <1F-00 00-00 20-B7 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-B4 D6-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 A0-BF E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3044: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/184 (108-byte object <1F-00 00-00 80-BB E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 50-F5 DF-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 C0-C3 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3045: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/185 (108-byte object <1F-00 00-00 A0-BF E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 A0-B4 D6-56 50-00 00-00 50-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 E0-C7 E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3046: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/186 (108-byte object <20-00 00-00 C0-C3 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-0E E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-CC E6-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3047: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/187 (108-byte object <20-00 00-00 E0-C7 E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-6F E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-92 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3048: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/188 (108-byte object <20-00 00-00 00-CC E6-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-0E E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-96 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3049: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/189 (108-byte object <20-00 00-00 00-92 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-6F E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-9A E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3050: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/190 (108-byte object <20-00 00-00 70-96 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-0E E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-9F E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3051: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/191 (108-byte object <20-00 00-00 F0-9A E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 20-6F E6-56 60-00 00-00 60-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-A3 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3052: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/192 (108-byte object <21-00 00-00 70-9F E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-B1 E7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-A8 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3053: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/193 (108-byte object <21-00 00-00 F0-A3 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-B2 E7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-AC E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3054: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/194 (108-byte object <21-00 00-00 70-A8 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-B1 E7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 70-B3 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3055: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/195 (108-byte object <21-00 00-00 F0-AC E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-B2 E7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-B8 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3056: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/196 (108-byte object <21-00 00-00 70-B3 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-B1 E7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 90-BC E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 80-94 DC-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3057: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/197 (108-byte object <21-00 00-00 00-B8 E7-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 70-B2 E7-56 70-00 00-00 70-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 20-C1 E7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-C0 D7-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3058: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/198 (108-byte object <22-00 00-00 90-BC E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 38-F0 C7-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-F0 C7-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 B0-C5 E7-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3059: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/199 (108-byte object <22-00 00-00 20-C1 E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-88 BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-89 BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 40-CA E7-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3060: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/200 (108-byte object <22-00 00-00 B0-C5 E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 38-F0 C7-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-F0 C7-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 D0-CE E7-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3061: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/201 (108-byte object <22-00 00-00 40-CA E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-88 BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-89 BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 10-D2 E7-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3062: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/202 (108-byte object <22-00 00-00 D0-CE E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 38-F0 C7-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-F0 C7-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-D5 E7-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3063: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/203 (108-byte object <22-00 00-00 10-D2 E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-88 BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-89 BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 90-D8 E7-56 28-00 00-00 28-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 14-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3064: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/204 (108-byte object <23-00 00-00 A0-0B E6-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 38-F0 C7-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-F0 C7-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-56 DF-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3065: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/205 (108-byte object <23-00 00-00 90-D8 E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-88 BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-89 BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-F5 DF-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3066: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/206 (108-byte object <23-00 00-00 90-DF E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 38-F0 C7-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-F0 C7-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-56 DF-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3067: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/207 (108-byte object <23-00 00-00 C0-E7 E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-88 BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-89 BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-F5 DF-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3068: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/208 (108-byte object <23-00 00-00 B0-EB E7-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 38-F0 C7-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-F0 C7-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 00-56 DF-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3069: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/209 (108-byte object <23-00 00-00 70-CE E6-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 E8-88 BE-56 00-00 00-00 00-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-89 BE-56 00-00 00-00 00-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 50-F5 DF-56 54-00 00-00 54-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 2A-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3070: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/210 (108-byte object <24-00 00-00 70-12 E6-56 28-00 00-00 28-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 08-39 C7-56 00-00 00-00 00-33 32-31 33-38 61-31 62-64 34-33 36-61 37-62 20-39 C7-56 00-00 00-00 00-34 63-37 65-64 30-61 30-30 62-30 64-33 34-65 60-8F C0-56 80-00 00-00 80-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 40-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3071: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/211 (108-byte object <24-00 00-00 60-16 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 00-89 BE-56 00-00 00-00 00-32 30-33 33-64 31-34 39-66 62-39 35-35 61-32 40-38 C7-56 80-00 00-00 80-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 40-00 00-00 01-37 39-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3072: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/212 (108-byte object <24-00 00-00 80-1A E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 08-39 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 20-39 C7-56 00-00 00-00 00-32 30-33 33-64 31-34 39-66 62-39 35-35 61-32 60-8F C0-56 80-00 00-00 80-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 40-00 00-00 01-37 39-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3073: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/213 (108-byte object <24-00 00-00 A0-1E E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 00-89 BE-56 00-00 00-00 00-32 30-33 33-64 31-34 39-66 62-39 35-35 61-32 40-38 C7-56 80-00 00-00 80-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 40-00 00-00 01-37 39-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3074: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/214 (108-byte object <24-00 00-00 C0-22 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 08-39 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 20-39 C7-56 00-00 00-00 00-32 30-33 33-64 31-34 39-66 62-39 35-35 61-32 60-8F C0-56 80-00 00-00 80-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 40-00 00-00 01-37 39-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3075: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/215 (108-byte object <24-00 00-00 E0-26 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 00-89 BE-56 00-00 00-00 00-32 30-33 33-64 31-34 39-66 62-39 35-35 61-32 40-38 C7-56 80-00 00-00 80-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 40-00 00-00 01-37 39-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3076: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/216 (108-byte object <25-00 00-00 50-D5 E7-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 38-F0 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 80-31 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 B0-31 E6-56 28-00 00-00 28-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 14-00 00-00 01-37 39-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3077: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/217 (108-byte object <25-00 00-00 60-32 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 90-32 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 C0-32 E6-56 28-00 00-00 28-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 14-00 00-00 01-37 39-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3078: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/218 (108-byte object <25-00 00-00 80-31 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 38-F0 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 B0-31 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 20-33 E6-56 28-00 00-00 28-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 14-00 00-00 01-37 39-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3079: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/219 (108-byte object <25-00 00-00 90-32 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 C0-32 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 50-33 E6-56 28-00 00-00 28-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 14-00 00-00 01-37 39-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3080: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/220 (108-byte object <25-00 00-00 B0-31 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 38-F0 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 20-33 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 40-37 E6-56 28-00 00-00 28-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 14-00 00-00 01-37 39-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3081: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/221 (108-byte object <25-00 00-00 C0-32 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 50-33 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 30-3B E6-56 28-00 00-00 28-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 14-00 00-00 01-37 39-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3082: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/222 (108-byte object <26-00 00-00 40-37 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 38-F0 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 20-3F E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 A0-B4 D6-56 54-00 00-00 54-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 2A-00 00-00 01-37 39-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3083: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/223 (108-byte object <26-00 00-00 50-33 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 30-3B E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 00-56 DF-56 54-00 00-00 54-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 2A-00 00-00 01-37 39-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3084: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/224 (108-byte object <26-00 00-00 20-3F E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 38-F0 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 F0-32 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 A0-B4 D6-56 54-00 00-00 54-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 2A-00 00-00 01-37 39-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3085: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/225 (108-byte object <26-00 00-00 30-3B E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 00-2B E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 00-56 DF-56 54-00 00-00 54-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 2A-00 00-00 01-37 39-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3086: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/226 (108-byte object <26-00 00-00 F0-32 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 38-F0 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 70-52 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 A0-B4 D6-56 54-00 00-00 54-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 2A-00 00-00 01-37 39-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3087: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/227 (108-byte object <26-00 00-00 00-2B E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 E8-88 BE-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 90-56 E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 00-56 DF-56 54-00 00-00 54-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 2A-00 00-00 01-37 39-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3088: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/228 (108-byte object <27-00 00-00 70-52 E6-56 28-00 00-00 28-00 00-00 37-61 36-62 39-32 30-66 38-34 61-36 78-38 C7-56 00-00 00-00 00-32 31-35 62-63 34-31 39-34 38-63 37-32 65-39 B0-5A E6-56 28-00 00-00 28-00 00-00 33-64 31-34 39-66 62-39 35-35 61-32 D0-38 C7-56 80-00 00-00 80-00 00-00 35-38 63-33 64-37 36-36 37-63 64-37 40-00 00-00 01-37 39-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3089: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/229 (108-byte object <27-00 00-00 90-56 E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 E8-88 BE-56 00-00 00-00 00-61 34-34 32-37 35-63 63-36 31-62 30-39 30-39 D0-5E E6-56 28-00 00-00 28-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 60-8F C0-56 80-00 00-00 80-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 40-00 00-00 01-62 34-61>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3090: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/230 (108-byte object <27-00 00-00 B0-5A E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 78-38 C7-56 00-00 00-00 00-61 34-34 32-37 35-63 63-36 31-62 30-39 30-39 F0-62 E6-56 28-00 00-00 28-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 D0-38 C7-56 80-00 00-00 80-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 40-00 00-00 01-62 34-61>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3091: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/231 (108-byte object <27-00 00-00 D0-5E E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 E8-88 BE-56 00-00 00-00 00-61 34-34 32-37 35-63 63-36 31-62 30-39 30-39 40-67 E6-56 28-00 00-00 28-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 60-8F C0-56 80-00 00-00 80-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 40-00 00-00 01-62 34-61>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3092: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/232 (108-byte object <27-00 00-00 F0-62 E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 78-38 C7-56 00-00 00-00 00-61 34-34 32-37 35-63 63-36 31-62 30-39 30-39 90-6B E6-56 28-00 00-00 28-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 D0-38 C7-56 80-00 00-00 80-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 40-00 00-00 01-62 34-61>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3093: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/233 (108-byte object <27-00 00-00 40-67 E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 E8-88 BE-56 00-00 00-00 00-61 34-34 32-37 35-63 63-36 31-62 30-39 30-39 E0-6D E6-56 28-00 00-00 28-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 60-8F C0-56 80-00 00-00 80-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 40-00 00-00 01-62 34-61>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3094: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/234 (108-byte object <28-00 00-00 F0-D2 E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 40-D7 E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 50-F0 C7-56 00-00 00-00 00-38 31-39 66-38 39-38 30-33 66-62 36-63 39-39 10-43 E6-56 28-00 00-00 28-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 14-00 00-00 01-62 34-61>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3095: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/235 (108-byte object <28-00 00-00 E0-6D E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 90-DB E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 00-89 BE-56 00-00 00-00 00-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 C0-DB E9-56 28-00 00-00 28-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 14-00 00-00 01-62 34-61>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3096: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/236 (108-byte object <28-00 00-00 40-D7 E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 10-43 E6-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 50-F0 C7-56 00-00 00-00 00-38 31-39 66-38 39-38 30-33 66-62 36-63 39-39 20-DC E9-56 28-00 00-00 28-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 14-00 00-00 01-62 34-61>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3097: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/237 (108-byte object <28-00 00-00 90-DB E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 C0-DB E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 00-89 BE-56 00-00 00-00 00-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 50-DC E9-56 28-00 00-00 28-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 14-00 00-00 01-62 34-61>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3098: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/238 (108-byte object <28-00 00-00 10-43 E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 20-DC E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 50-F0 C7-56 00-00 00-00 00-38 31-39 66-38 39-38 30-33 66-62 36-63 39-39 40-E0 E9-56 28-00 00-00 28-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 14-00 00-00 01-62 34-61>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3099: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/239 (108-byte object <28-00 00-00 C0-DB E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 50-DC E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 00-89 BE-56 00-00 00-00 00-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 30-E4 E9-56 28-00 00-00 28-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 14-00 00-00 01-62 34-61>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3100: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/240 (108-byte object <29-00 00-00 40-E0 E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 20-E8 E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 50-F0 C7-56 00-00 00-00 00-38 31-39 66-38 39-38 30-33 66-62 36-63 39-39 50-F5 DF-56 54-00 00-00 54-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 2A-00 00-00 01-62 34-61>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3101: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/241 (108-byte object <29-00 00-00 50-DC E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 30-E4 E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 00-89 BE-56 00-00 00-00 00-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 A0-B4 D6-56 54-00 00-00 54-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 2A-00 00-00 01-62 34-61>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3102: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/242 (108-byte object <29-00 00-00 20-E8 E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 F0-DB E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 50-F0 C7-56 00-00 00-00 00-38 31-39 66-38 39-38 30-33 66-62 36-63 39-39 50-F5 DF-56 54-00 00-00 54-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 2A-00 00-00 01-62 34-61>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3103: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/243 (108-byte object <29-00 00-00 30-E4 E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 20-33 E6-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 00-89 BE-56 00-00 00-00 00-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 A0-B4 D6-56 54-00 00-00 54-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 2A-00 00-00 01-62 34-61>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3104: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/244 (108-byte object <29-00 00-00 F0-DB E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 70-FB E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 50-F0 C7-56 00-00 00-00 00-38 31-39 66-38 39-38 30-33 66-62 36-63 39-39 50-F5 DF-56 54-00 00-00 54-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 2A-00 00-00 01-62 34-61>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3105: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/245 (108-byte object <29-00 00-00 20-33 E6-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 90-FF E9-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 00-89 BE-56 00-00 00-00 00-00 00-00 66-38 39-38 30-33 66-62 36-63 39-39 A0-B4 D6-56 54-00 00-00 54-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 2A-00 00-00 01-62 34-61>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3106: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/246 (108-byte object <2A-00 00-00 70-FB E9-56 28-00 00-00 28-00 00-00 33-36 38-38 36-32 33-30 37-39 66-63 B0-03 EA-56 20-00 00-00 20-00 00-00 32-37 35-63 63-36 31-62 30-39 30-39 B0-8F C0-56 00-00 00-00 00-38 31-39 66-38 39-38 30-33 66-62 36-63 39-39 40-38 C7-56 80-00 00-00 80-00 00-00 66-36 38-61 62-33 37-39 65-37 61-66 40-00 00-00 01-62 34-61>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3107: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/247 (108-byte object <2A-00 00-00 90-FF E9-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 D0-07 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 00-89 BE-56 00-00 00-00 00-63 32-64 38-36 37-65 30-36 61-39 31-37 33-35 D0-38 C7-56 80-00 00-00 80-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 40-00 00-00 01-31 37-64>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3108: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/248 (108-byte object <2A-00 00-00 B0-03 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 F0-0B EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 B0-8F C0-56 00-00 00-00 00-63 32-64 38-36 37-65 30-36 61-39 31-37 33-35 40-38 C7-56 80-00 00-00 80-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 40-00 00-00 01-31 37-64>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3109: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/249 (108-byte object <2A-00 00-00 D0-07 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 40-10 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 00-89 BE-56 00-00 00-00 00-63 32-64 38-36 37-65 30-36 61-39 31-37 33-35 D0-38 C7-56 80-00 00-00 80-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 40-00 00-00 01-31 37-64>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3110: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/250 (108-byte object <2A-00 00-00 F0-0B EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 90-14 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 B0-8F C0-56 00-00 00-00 00-63 32-64 38-36 37-65 30-36 61-39 31-37 33-35 40-38 C7-56 80-00 00-00 80-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 40-00 00-00 01-31 37-64>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3111: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/251 (108-byte object <2A-00 00-00 40-10 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 E0-18 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 00-89 BE-56 00-00 00-00 00-63 32-64 38-36 37-65 30-36 61-39 31-37 33-35 D0-38 C7-56 80-00 00-00 80-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 40-00 00-00 01-31 37-64>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3112: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/252 (108-byte object <2B-00 00-00 80-21 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 10-EC E9-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 50-25 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 80-25 EA-56 28-00 00-00 28-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 14-00 00-00 01-31 37-64>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3113: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/253 (108-byte object <2B-00 00-00 30-26 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 60-26 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 90-26 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 F0-26 EA-56 28-00 00-00 28-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 14-00 00-00 01-31 37-64>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3114: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/254 (108-byte object <2B-00 00-00 50-25 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 80-25 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 C0-26 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 50-27 EA-56 28-00 00-00 28-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 14-00 00-00 01-31 37-64>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3115: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/255 (108-byte object <2B-00 00-00 90-26 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 F0-26 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 20-27 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 70-2B EA-56 28-00 00-00 28-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 14-00 00-00 01-31 37-64>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3116: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/256 (108-byte object <2B-00 00-00 C0-26 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 50-27 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 E0-18 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 90-2F EA-56 28-00 00-00 28-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 14-00 00-00 01-31 37-64>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3117: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/257 (108-byte object <2B-00 00-00 20-27 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 70-2B EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 10-EC E9-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 B0-33 EA-56 28-00 00-00 28-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 14-00 00-00 01-31 37-64>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3118: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/258 (108-byte object <2C-00 00-00 D0-37 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 80-25 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 F0-26 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 00-56 DF-56 54-00 00-00 54-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 2A-00 00-00 01-31 37-64>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3119: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/259 (108-byte object <2C-00 00-00 70-2B EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 10-EC E9-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 B0-33 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 50-F5 DF-56 54-00 00-00 54-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 2A-00 00-00 01-31 37-64>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3120: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/260 (108-byte object <2C-00 00-00 80-25 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 F0-26 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 90-6B E6-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 00-56 DF-56 54-00 00-00 54-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 2A-00 00-00 01-31 37-64>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3121: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/261 (108-byte object <2C-00 00-00 10-EC E9-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 B0-33 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 50-27 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 50-F5 DF-56 54-00 00-00 54-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 2A-00 00-00 01-31 37-64>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3122: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/262 (108-byte object <2C-00 00-00 F0-26 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 90-6B E6-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 B0-4B EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 00-56 DF-56 54-00 00-00 54-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 2A-00 00-00 01-31 37-64>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3123: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/263 (108-byte object <2C-00 00-00 B0-33 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 50-27 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 00-50 EA-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 50-F5 DF-56 54-00 00-00 54-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 2A-00 00-00 01-31 37-64>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3124: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/264 (108-byte object <2D-00 00-00 50-54 EA-56 28-00 00-00 28-00 00-00 66-33 62-62 31-63 31-37 31-39 30-33 A0-58 EA-56 20-00 00-00 20-00 00-00 63-65 32-66 38-65 61-37 65-65 61-63 E0-F3 E6-56 28-00 00-00 28-00 00-00 38-36 37-65 30-36 61-39 31-37 33-35 60-8F C0-56 80-00 00-00 80-00 00-00 39-39 31-32 38-64 37-36 38-38 37-65 40-00 00-00 01-31 37-64>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3125: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/265 (108-byte object <2D-00 00-00 50-27 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 00-50 EA-56 20-00 00-00 20-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 F0-5C EA-56 28-00 00-00 28-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 40-38 C7-56 80-00 00-00 80-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 40-00 00-00 01-61 35-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3126: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/266 (108-byte object <2D-00 00-00 A0-58 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 E0-F3 E6-56 20-00 00-00 20-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 90-2F EA-56 28-00 00-00 28-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 60-8F C0-56 80-00 00-00 80-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 40-00 00-00 01-61 35-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3127: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/267 (108-byte object <2D-00 00-00 00-50 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 F0-5C EA-56 20-00 00-00 20-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 40-61 EA-56 28-00 00-00 28-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 40-38 C7-56 80-00 00-00 80-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 40-00 00-00 01-61 35-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3128: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/268 (108-byte object <2D-00 00-00 E0-F3 E6-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 90-2F EA-56 20-00 00-00 20-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 C0-65 EA-56 28-00 00-00 28-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 60-8F C0-56 80-00 00-00 80-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 40-00 00-00 01-61 35-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3129: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/269 (108-byte object <2D-00 00-00 F0-5C EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 40-61 EA-56 20-00 00-00 20-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 40-6A EA-56 28-00 00-00 28-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 40-38 C7-56 80-00 00-00 80-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 40-00 00-00 01-61 35-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3130: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/270 (108-byte object <2E-00 00-00 C0-65 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 60-10 D1-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 50-F0 C7-56 00-00 00-00 00-35 34-35 61-64 66-38 35-36 66-30 66-63 34-36 C0-6E EA-56 28-00 00-00 28-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 14-00 00-00 01-61 35-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3131: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/271 (108-byte object <2E-00 00-00 40-61 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 80-94 DC-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 00-89 BE-56 00-00 00-00 00-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 40-6A EA-56 28-00 00-00 28-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 14-00 00-00 01-61 35-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3132: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/272 (108-byte object <2E-00 00-00 C0-6E EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 60-10 D1-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 50-F0 C7-56 00-00 00-00 00-35 34-35 61-64 66-38 35-36 66-30 66-63 34-36 E0-18 EA-56 28-00 00-00 28-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 14-00 00-00 01-61 35-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3133: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/273 (108-byte object <2E-00 00-00 40-6A EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 80-94 DC-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 00-89 BE-56 00-00 00-00 00-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 90-6B E6-56 28-00 00-00 28-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 14-00 00-00 01-61 35-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3134: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/274 (108-byte object <2E-00 00-00 E0-18 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 60-10 D1-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 50-F0 C7-56 00-00 00-00 00-35 34-35 61-64 66-38 35-36 66-30 66-63 34-36 A0-83 EA-56 28-00 00-00 28-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 14-00 00-00 01-61 35-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3135: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/275 (108-byte object <2E-00 00-00 90-6B E6-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 80-94 DC-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 00-89 BE-56 00-00 00-00 00-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 B0-87 EA-56 28-00 00-00 28-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 14-00 00-00 01-61 35-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3136: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/276 (108-byte object <2F-00 00-00 90-2F EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 60-10 D1-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 50-F0 C7-56 00-00 00-00 00-35 34-35 61-64 66-38 35-36 66-30 66-63 34-36 A0-B4 D6-56 54-00 00-00 54-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 2A-00 00-00 01-61 35-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3137: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/277 (108-byte object <2F-00 00-00 B0-87 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 80-94 DC-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 00-89 BE-56 00-00 00-00 00-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 00-56 DF-56 54-00 00-00 54-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 2A-00 00-00 01-61 35-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3138: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/278 (108-byte object <2F-00 00-00 D0-8F EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 60-10 D1-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 50-F0 C7-56 00-00 00-00 00-35 34-35 61-64 66-38 35-36 66-30 66-63 34-36 A0-B4 D6-56 54-00 00-00 54-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 2A-00 00-00 01-61 35-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3139: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/279 (108-byte object <2F-00 00-00 F0-98 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 80-94 DC-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 00-89 BE-56 00-00 00-00 00-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 00-56 DF-56 54-00 00-00 54-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 2A-00 00-00 01-61 35-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3140: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/280 (108-byte object <2F-00 00-00 30-9D EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 60-10 D1-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 50-F0 C7-56 00-00 00-00 00-35 34-35 61-64 66-38 35-36 66-30 66-63 34-36 A0-B4 D6-56 54-00 00-00 54-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 2A-00 00-00 01-61 35-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3141: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/281 (108-byte object <2F-00 00-00 70-A1 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 80-94 DC-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 00-89 BE-56 00-00 00-00 00-00 00-00 61-64 66-38 35-36 66-30 66-63 34-36 00-56 DF-56 54-00 00-00 54-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 2A-00 00-00 01-61 35-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3142: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/282 (108-byte object <30-00 00-00 B0-A5 EA-56 28-00 00-00 28-00 00-00 62-34 33-38 30-63 66-38 35-34 35-39 60-10 D1-56 3C-00 00-00 3C-00 00-00 33-32 66-63 61-64 32-64 36-65 61-35 90-38 C7-56 00-00 00-00 00-35 34-35 61-64 66-38 35-36 66-30 66-63 34-36 D0-38 C7-56 80-00 00-00 80-00 00-00 65-63 65-64 62-31 63-62 66-32 31-39 40-00 00-00 01-61 35-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3143: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/283 (108-byte object <30-00 00-00 F0-A9 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 00-89 BE-56 00-00 00-00 00-61 31-38 35-33 61-31 64-62 32-66 38-39 62-65 60-8F C0-56 80-00 00-00 80-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 40-00 00-00 01-65 62-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3144: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/284 (108-byte object <30-00 00-00 60-AE EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 90-38 C7-56 00-00 00-00 00-61 31-38 35-33 61-31 64-62 32-66 38-39 62-65 D0-38 C7-56 80-00 00-00 80-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 40-00 00-00 01-65 62-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3145: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/285 (108-byte object <30-00 00-00 D0-B2 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 00-89 BE-56 00-00 00-00 00-61 31-38 35-33 61-31 64-62 32-66 38-39 62-65 60-8F C0-56 80-00 00-00 80-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 40-00 00-00 01-65 62-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3146: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/286 (108-byte object <30-00 00-00 40-B7 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 90-38 C7-56 00-00 00-00 00-61 31-38 35-33 61-31 64-62 32-66 38-39 62-65 D0-38 C7-56 80-00 00-00 80-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 40-00 00-00 01-65 62-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3147: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/287 (108-byte object <30-00 00-00 B0-BB EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 00-89 BE-56 00-00 00-00 00-61 31-38 35-33 61-31 64-62 32-66 38-39 62-65 60-8F C0-56 80-00 00-00 80-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 40-00 00-00 01-65 62-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3148: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/288 (108-byte object <31-00 00-00 A0-83 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 F0-C6 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 20-C7 EA-56 28-00 00-00 28-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 14-00 00-00 01-65 62-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3149: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/289 (108-byte object <31-00 00-00 D0-C7 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 00-C8 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 30-C8 EA-56 28-00 00-00 28-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 14-00 00-00 01-65 62-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3150: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/290 (108-byte object <31-00 00-00 F0-C6 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 20-C7 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 90-C8 EA-56 28-00 00-00 28-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 14-00 00-00 01-65 62-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3151: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/291 (108-byte object <31-00 00-00 00-C8 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 30-C8 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 C0-C8 EA-56 28-00 00-00 28-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 14-00 00-00 01-65 62-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3152: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/292 (108-byte object <31-00 00-00 20-C7 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 90-C8 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 00-CD EA-56 28-00 00-00 28-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 14-00 00-00 01-65 62-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3153: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/293 (108-byte object <31-00 00-00 30-C8 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 C0-C8 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 40-D1 EA-56 28-00 00-00 28-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 14-00 00-00 01-65 62-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3154: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/294 (108-byte object <32-00 00-00 00-CD EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 80-D5 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 50-F5 DF-56 54-00 00-00 54-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 2A-00 00-00 01-65 62-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3155: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/295 (108-byte object <32-00 00-00 C0-C8 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 40-D1 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 A0-B4 D6-56 54-00 00-00 54-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 2A-00 00-00 01-65 62-35>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3156: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/296 (108-byte object <32-00 00-00 80-D5 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 60-C8 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 50-F5 DF-56 54-00 00-00 54-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 2A-00 00-00 01-65 62-35>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3157: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/297 (108-byte object <32-00 00-00 40-D1 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 20-C0 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 A0-B4 D6-56 54-00 00-00 54-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 2A-00 00-00 01-65 62-35>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3158: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/298 (108-byte object <32-00 00-00 60-C8 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 60-EA EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 50-F5 DF-56 54-00 00-00 54-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 2A-00 00-00 01-65 62-35>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3159: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/299 (108-byte object <32-00 00-00 20-C0 EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 80-94 DC-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 D0-EE EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 A0-B4 D6-56 54-00 00-00 54-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 2A-00 00-00 01-65 62-35>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3160: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/300 (108-byte object <33-00 00-00 60-EA EA-56 28-00 00-00 28-00 00-00 39-37 34-34 31-63 38-38 62-37 66-33 60-10 D1-56 3C-00 00-00 3C-00 00-00 38-31 62-38 66-34 61-63 65-32 66-35 40-F3 EA-56 28-00 00-00 28-00 00-00 35-33 61-31 64-62 32-66 38-39 62-65 40-38 C7-56 80-00 00-00 80-00 00-00 31-32 63-63 30-35 32-66 33-32 33-34 40-00 00-00 01-65 62-35>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3161: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/301 (108-byte object <33-00 00-00 D0-EE EA-56 28-00 00-00 28-00 00-00 39-35 33-38 63-65 65-39 61-31 61-61 80-94 DC-56 3C-00 00-00 3C-00 00-00 66-35 66-38 39-32 31-32 32-37 33-34 B0-F7 EA-56 28-00 00-00 28-00 00-00 36-33 38-65 61-62 65-32 63-36 39-33 D0-38 C7-56 80-00 00-00 80-00 00-00 35-35 61-34 31-31 61-35 35-35 66-35 40-00 00-00 01-63 65-62>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3162: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/302 (108-byte object <33-00 00-00 40-F3 EA-56 28-00 00-00 28-00 00-00 39-35 33-38 63-65 65-39 61-31 61-61 60-10 D1-56 3C-00 00-00 3C-00 00-00 66-35 66-38 39-32 31-32 32-37 33-34 20-FC EA-56 28-00 00-00 28-00 00-00 36-33 38-65 61-62 65-32 63-36 39-33 40-38 C7-56 80-00 00-00 80-00 00-00 35-35 61-34 31-31 61-35 35-35 66-35 40-00 00-00 01-63 65-62>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3163: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/303 (108-byte object <33-00 00-00 B0-F7 EA-56 28-00 00-00 28-00 00-00 39-35 33-38 63-65 65-39 61-31 61-61 80-94 DC-56 3C-00 00-00 3C-00 00-00 66-35 66-38 39-32 31-32 32-37 33-34 C0-00 EB-56 28-00 00-00 28-00 00-00 36-33 38-65 61-62 65-32 63-36 39-33 D0-38 C7-56 80-00 00-00 80-00 00-00 35-35 61-34 31-31 61-35 35-35 66-35 40-00 00-00 01-63 65-62>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3164: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/304 (108-byte object <33-00 00-00 20-FC EA-56 28-00 00-00 28-00 00-00 39-35 33-38 63-65 65-39 61-31 61-61 60-10 D1-56 3C-00 00-00 3C-00 00-00 66-35 66-38 39-32 31-32 32-37 33-34 60-05 EB-56 28-00 00-00 28-00 00-00 36-33 38-65 61-62 65-32 63-36 39-33 40-38 C7-56 80-00 00-00 80-00 00-00 35-35 61-34 31-31 61-35 35-35 66-35 40-00 00-00 01-63 65-62>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3165: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/305 (108-byte object <33-00 00-00 C0-00 EB-56 28-00 00-00 28-00 00-00 39-35 33-38 63-65 65-39 61-31 61-61 80-94 DC-56 3C-00 00-00 3C-00 00-00 66-35 66-38 39-32 31-32 32-37 33-34 00-0A EB-56 28-00 00-00 28-00 00-00 36-33 38-65 61-62 65-32 63-36 39-33 D0-38 C7-56 80-00 00-00 80-00 00-00 35-35 61-34 31-31 61-35 35-35 66-35 40-00 00-00 01-63 65-62>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3166: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/306 (108-byte object <34-00 00-00 90-C8 EA-56 28-00 00-00 28-00 00-00 39-35 33-38 63-65 65-39 61-31 61-61 40-38 C7-56 80-00 00-00 80-00 00-00 66-35 66-38 39-32 31-32 32-37 33-34 B0-8F C0-56 00-00 00-00 00-61 36-34 36-33 38-65 61-62 65-32 63-36 39-33 00-56 DF-56 54-00 00-00 54-00 00-00 35-35 61-34 31-31 61-35 35-35 66-35 2A-00 00-00 01-63 65-62>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3167: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/307 (108-byte object <34-00 00-00 00-0A EB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 D0-38 C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 00-89 BE-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 50-F5 DF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3168: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/308 (108-byte object <34-00 00-00 40-13 EB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 40-38 C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 B0-8F C0-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 00-56 DF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3169: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/309 (108-byte object <34-00 00-00 70-1D EB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 D0-38 C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 00-89 BE-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 50-F5 DF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3170: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/310 (108-byte object <34-00 00-00 F0-21 EB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 40-38 C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 B0-8F C0-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 00-56 DF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3171: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/311 (108-byte object <34-00 00-00 70-26 EB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 D0-38 C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 00-89 BE-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 50-F5 DF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3172: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/312 (108-byte object <35-00 00-00 70-2F EB-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 40-38 C7-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 60-05 EB-56 28-00 00-00 28-00 00-00 38-39 65-62 61-64 34-66 61-36 33-34 00-56 DF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3173: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/313 (108-byte object <35-00 00-00 50-32 EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-38 C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 80-32 EB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 50-F5 DF-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3174: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/314 (108-byte object <35-00 00-00 60-05 EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-38 C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 E0-32 EB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-56 DF-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3175: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/315 (108-byte object <35-00 00-00 80-32 EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-38 C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 90-37 EB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 50-F5 DF-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3176: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/316 (108-byte object <35-00 00-00 E0-32 EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-38 C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 40-3C EB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 00-56 DF-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3177: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/317 (108-byte object <35-00 00-00 90-37 EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 D0-38 C7-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-40 EB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 50-F5 DF-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3178: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/318 (108-byte object <36-00 00-00 F0-2A EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-49 EB-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 30-AE EB-56 A0-5F 00-00 A0-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D0-2F 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3179: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/319 (108-byte object <36-00 00-00 F0-40 EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-0E E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 D0-49 EB-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-0E EC-56 A0-5F 00-00 A0-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D0-2F 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3180: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/320 (108-byte object <36-00 00-00 50-4A EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 20-0E EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-2E ED-56 A0-5F 00-00 A0-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D0-2F 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3181: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/321 (108-byte object <36-00 00-00 10-4A EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-0E E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 E0-70 EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-0E EC-56 A0-5F 00-00 A0-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D0-2F 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3182: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/322 (108-byte object <36-00 00-00 80-76 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 E0-74 EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-2E ED-56 A0-5F 00-00 A0-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D0-2F 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3183: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/323 (108-byte object <36-00 00-00 A0-7A EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-0E E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 00-79 EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 A0-0E EC-56 A0-5F 00-00 A0-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D0-2F 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3184: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/324 (108-byte object <37-00 00-00 C0-7E EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 20-45 EB-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 68-F0 C7-56 00-00 00-00 00-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D1-2F 00-00 00-32 30-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3185: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/325 (108-byte object <37-00 00-00 00-83 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-0E E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-81 EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 18-89 BE-56 00-00 00-00 00-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D1-2F 00-00 00-32 30-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3186: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/326 (108-byte object <37-00 00-00 20-87 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 80-85 EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 68-F0 C7-56 00-00 00-00 00-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D1-2F 00-00 00-32 30-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3187: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/327 (108-byte object <37-00 00-00 40-8B EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-0E E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 A0-89 EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 18-89 BE-56 00-00 00-00 00-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D1-2F 00-00 00-32 30-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3188: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/328 (108-byte object <37-00 00-00 60-8F EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 C0-8D EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 68-F0 C7-56 00-00 00-00 00-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D1-2F 00-00 00-32 30-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3189: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/329 (108-byte object <37-00 00-00 80-93 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-0E E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 E0-91 EC-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 18-89 BE-56 00-00 00-00 00-5F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 D1-2F 00-00 00-32 30-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3190: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/330 (108-byte object <38-00 00-00 C0-9B EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 38-F0 C7-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 40-3C EB-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-C0 D7-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3191: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/331 (108-byte object <38-00 00-00 80-9E EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 E8-88 BE-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-9E EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-10 D1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3192: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/332 (108-byte object <38-00 00-00 40-3C EB-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 38-F0 C7-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 10-9F EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-C0 D7-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3193: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/333 (108-byte object <38-00 00-00 B0-9E EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 E8-88 BE-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 20-A3 EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-10 D1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3194: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/334 (108-byte object <38-00 00-00 10-9F EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 38-F0 C7-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 30-A7 EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-C0 D7-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3195: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/335 (108-byte object <38-00 00-00 20-A3 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 E8-88 BE-56 00-00 00-00 00-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 40-AB EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-10 D1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3196: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/336 (108-byte object <39-00 00-00 30-A7 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-6F E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-AF EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-C0 D7-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3197: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/337 (108-byte object <39-00 00-00 40-AB EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 60-B3 EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-10 D1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3198: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/338 (108-byte object <39-00 00-00 50-AF EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-6F E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-B7 EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-C0 D7-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3199: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/339 (108-byte object <39-00 00-00 60-B3 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-BB EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-10 D1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3200: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/340 (108-byte object <39-00 00-00 70-B7 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-6F E6-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-C0 EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-C0 D7-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3201: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/341 (108-byte object <39-00 00-00 F0-BB EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 20-AE E5-56 60-00 00-00 60-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 F0-C4 EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 60-10 D1-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3202: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/342 (108-byte object <3A-00 00-00 70-C0 EC-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 60-8F C0-56 82-00 00-00 82-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 70-C9 EC-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 40-C0 D7-56 40-00 00-00 40-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 20-00 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3203: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/343 (108-byte object <3A-00 00-00 F0-C4 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-38 C7-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-0E EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3204: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/344 (108-byte object <3A-00 00-00 70-C9 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-8F C0-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-13 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3205: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/345 (108-byte object <3A-00 00-00 A0-0E EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-38 C7-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-17 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3206: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/346 (108-byte object <3A-00 00-00 20-13 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-8F C0-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-1C EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3207: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/347 (108-byte object <3A-00 00-00 C0-17 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-38 C7-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-21 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3208: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/348 (108-byte object <3B-00 00-00 60-1C EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-0E E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-25 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3209: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/349 (108-byte object <3B-00 00-00 00-21 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-6F E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-2A EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3210: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/350 (108-byte object <3B-00 00-00 A0-25 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-0E E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-2E EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3211: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/351 (108-byte object <3B-00 00-00 40-2A EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-6F E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-33 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3212: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/352 (108-byte object <3B-00 00-00 E0-2E EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-0E E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-37 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3213: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/353 (108-byte object <3B-00 00-00 60-33 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-6F E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-3C EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3214: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/354 (108-byte object <3C-00 00-00 E0-37 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-45 EC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-40 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3215: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/355 (108-byte object <3C-00 00-00 60-3C EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E0-44 EC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-45 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3216: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/356 (108-byte object <3C-00 00-00 E0-40 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-49 EC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-4A EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3217: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/357 (108-byte object <3C-00 00-00 60-45 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 D0-4D EC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-4E EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3218: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/358 (108-byte object <3C-00 00-00 20-4A EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-52 EC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-52 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3219: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/359 (108-byte object <3C-00 00-00 50-4E EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-56 EC-56 10-00 00-00 10-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-56 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3220: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/360 (108-byte object <3D-00 00-00 E0-5A EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 10-5F EC-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 E0-9E EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3221: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/361 (108-byte object <3D-00 00-00 B0-56 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-63 EC-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-63 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3222: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/362 (108-byte object <3D-00 00-00 10-5F EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E0-9E EC-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-63 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3223: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/363 (108-byte object <3D-00 00-00 00-63 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 30-63 EC-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-63 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3224: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/364 (108-byte object <3D-00 00-00 E0-9E EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 90-63 EC-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-68 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3225: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/365 (108-byte object <3D-00 00-00 30-63 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 C0-63 EC-56 20-00 00-00 20-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-6C EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3226: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/366 (108-byte object <3E-00 00-00 00-68 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-3D B2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-31 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3227: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/367 (108-byte object <3E-00 00-00 C0-63 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-C2 D2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 40-6C EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3228: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/368 (108-byte object <3E-00 00-00 50-31 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-3D B2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-63 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3229: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/369 (108-byte object <3E-00 00-00 40-6C EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-C2 D2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-97 EC-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3230: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/370 (108-byte object <3E-00 00-00 60-63 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-3D B2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-45 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3231: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/371 (108-byte object <3E-00 00-00 A0-97 EC-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-C2 D2-56 30-00 00-00 30-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 C0-49 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3232: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/372 (108-byte object <3F-00 00-00 70-45 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-A0 E6-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-4E ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 30-56 ED-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3233: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/373 (108-byte object <3F-00 00-00 C0-49 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-10 D1-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 60-52 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-57 ED-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3234: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/374 (108-byte object <3F-00 00-00 10-4E ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-A0 E6-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 A0-57 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 30-56 ED-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3235: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/375 (108-byte object <3F-00 00-00 60-52 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-10 D1-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-5C ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-57 ED-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3236: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/376 (108-byte object <3F-00 00-00 A0-57 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 50-A0 E6-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-60 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 30-56 ED-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3237: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/377 (108-byte object <3F-00 00-00 50-5C ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 60-10 D1-56 40-00 00-00 40-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 10-65 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 00-57 ED-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3238: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/378 (108-byte object <40-00 00-00 B0-60 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-B4 D6-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-69 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3239: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/379 (108-byte object <40-00 00-00 10-65 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-56 DF-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-6D ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3240: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/380 (108-byte object <40-00 00-00 70-69 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-B4 D6-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-72 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3241: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/381 (108-byte object <40-00 00-00 D0-6D ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-56 DF-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-76 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3242: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/382 (108-byte object <40-00 00-00 30-72 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 A0-B4 D6-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-7A ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3243: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/383 (108-byte object <40-00 00-00 50-76 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-56 DF-56 50-00 00-00 50-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-7E ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3244: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/384 (108-byte object <41-00 00-00 70-7A ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-AE E5-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-82 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3245: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/385 (108-byte object <41-00 00-00 90-7E ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-0E E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-87 ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3246: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/386 (108-byte object <41-00 00-00 B0-82 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-AE E5-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-8B ED-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3247: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/387 (108-byte object <41-00 00-00 20-87 ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-0E E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-50 EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3248: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/388 (108-byte object <41-00 00-00 90-8B ED-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 20-AE E5-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-55 EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3249: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/389 (108-byte object <41-00 00-00 80-50 EB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-0E E6-56 60-00 00-00 60-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-59 EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3250: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/390 (108-byte object <42-00 00-00 00-55 EB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-67 EB-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-5E EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3251: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/391 (108-byte object <42-00 00-00 80-59 EB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-68 EB-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 80-62 EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3252: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/392 (108-byte object <42-00 00-00 00-5E EB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-67 EB-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-69 EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3253: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/393 (108-byte object <42-00 00-00 80-62 EB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-68 EB-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-6D EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3254: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/394 (108-byte object <42-00 00-00 00-69 EB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-67 EB-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 20-72 EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 40-C0 D7-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3255: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/395 (108-byte object <42-00 00-00 90-6D EB-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 00-68 EB-56 70-00 00-00 70-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 B0-76 EB-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 60-10 D1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3256: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/396 (108-byte object <43-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 38-F0 C7-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-F0 C7-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 90-63 EC-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3257: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/397 (108-byte object <43-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-88 BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-89 BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-76 EB-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3258: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/398 (108-byte object <43-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 38-F0 C7-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-F0 C7-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 D0-7F EB-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3259: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/399 (108-byte object <43-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-88 BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-89 BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 B0-87 EB-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3260: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/400 (108-byte object <43-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 38-F0 C7-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-F0 C7-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 10-8B EB-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3261: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/401 (108-byte object <43-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-88 BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-89 BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 70-8E EB-56 28-00 00-00 28-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 14-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3262: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/402 (108-byte object <44-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 38-F0 C7-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-F0 C7-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 50-F5 DF-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3263: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/403 (108-byte object <44-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-88 BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-89 BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-B4 D6-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3264: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/404 (108-byte object <44-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 38-F0 C7-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-F0 C7-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 50-F5 DF-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3265: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/405 (108-byte object <44-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-88 BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-89 BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-B4 D6-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3266: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/406 (108-byte object <44-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 38-F0 C7-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-F0 C7-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 50-F5 DF-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3267: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/407 (108-byte object <44-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 E8-88 BE-56 00-00 00-00 00-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 00-89 BE-56 00-00 00-00 00-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-B4 D6-56 54-00 00-00 54-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 2A-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3268: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/408 (108-byte object <45-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 78-38 C7-56 00-00 00-00 00-62 39-35 38-34 38-30 36-61 65-65 65-64 61-38 90-38 C7-56 00-00 00-00 00-64 37-39 65-37 63-31 32-32 31-31 62-38 65-33 D0-38 C7-56 80-00 00-00 80-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 40-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3269: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/409 (108-byte object <45-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 00-89 BE-56 00-00 00-00 00-35 35-66 61-33 62-66 32-63 37-31 37-32 32-35 60-8F C0-56 80-00 00-00 80-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 40-00 00-00 01-35 38-36>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3270: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/410 (108-byte object <45-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 78-38 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 90-38 C7-56 00-00 00-00 00-35 35-66 61-33 62-66 32-63 37-31 37-32 32-35 D0-38 C7-56 80-00 00-00 80-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 40-00 00-00 01-35 38-36>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3271: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/411 (108-byte object <45-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 00-89 BE-56 00-00 00-00 00-35 35-66 61-33 62-66 32-63 37-31 37-32 32-35 60-8F C0-56 80-00 00-00 80-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 40-00 00-00 01-35 38-36>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3272: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/412 (108-byte object <45-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 78-38 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 90-38 C7-56 00-00 00-00 00-35 35-66 61-33 62-66 32-63 37-31 37-32 32-35 D0-38 C7-56 80-00 00-00 80-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 40-00 00-00 01-35 38-36>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3273: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/413 (108-byte object <45-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 00-89 BE-56 00-00 00-00 00-35 35-66 61-33 62-66 32-63 37-31 37-32 32-35 60-8F C0-56 80-00 00-00 80-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 40-00 00-00 01-35 38-36>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3274: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/414 (108-byte object <46-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 38-F0 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 E0-C9 EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 10-CA EB-56 28-00 00-00 28-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 14-00 00-00 01-35 38-36>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3275: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/415 (108-byte object <46-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 F0-CA EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 20-CB EB-56 28-00 00-00 28-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 14-00 00-00 01-35 38-36>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3276: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/416 (108-byte object <46-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 38-F0 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 10-CA EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 80-CB EB-56 28-00 00-00 28-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 14-00 00-00 01-35 38-36>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3277: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/417 (108-byte object <46-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 20-CB EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 90-CF EB-56 28-00 00-00 28-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 14-00 00-00 01-35 38-36>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3278: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/418 (108-byte object <46-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 38-F0 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 80-CB EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 A0-D3 EB-56 28-00 00-00 28-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 14-00 00-00 01-35 38-36>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3279: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/419 (108-byte object <46-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 90-CF EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 B0-D7 EB-56 28-00 00-00 28-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 14-00 00-00 01-35 38-36>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3280: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/420 (108-byte object <47-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 38-F0 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 80-52 EC-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 00-56 DF-56 54-00 00-00 54-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 2A-00 00-00 01-35 38-36>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3281: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/421 (108-byte object <47-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 B0-D7 EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 50-F5 DF-56 54-00 00-00 54-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 2A-00 00-00 01-35 38-36>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3282: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/422 (108-byte object <47-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 38-F0 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 D0-DF EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 00-56 DF-56 54-00 00-00 54-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 2A-00 00-00 01-35 38-36>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3283: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/423 (108-byte object <47-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 F0-E8 EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 50-F5 DF-56 54-00 00-00 54-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 2A-00 00-00 01-35 38-36>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3284: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/424 (108-byte object <47-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 38-F0 C7-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 30-ED EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 00-56 DF-56 54-00 00-00 54-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 2A-00 00-00 01-35 38-36>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3285: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/425 (108-byte object <47-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 E8-88 BE-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 70-F1 EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 50-F5 DF-56 54-00 00-00 54-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 2A-00 00-00 01-35 38-36>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3286: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/426 (108-byte object <48-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 61-65 61-35 32-37 63-66 62-34 65-33 98-8F C0-56 00-00 00-00 00-37 30-38 32-33 39-65 65-62 36-37 39-37 62-61 B0-F5 EB-56 28-00 00-00 28-00 00-00 61-33 62-66 32-63 37-31 37-32 32-35 40-38 C7-56 80-00 00-00 80-00 00-00 63-30 63-33 31-38 33-30 63-36 34-38 40-00 00-00 01-35 38-36>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3287: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/427 (108-byte object <48-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 E8-88 BE-56 00-00 00-00 00-36 32-33 63-33 65-30 66-34 38-34 33-36 39-65 F0-F9 EB-56 28-00 00-00 28-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 D0-38 C7-56 80-00 00-00 80-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 40-00 00-00 01-36 39-38>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3288: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/428 (108-byte object <48-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 98-8F C0-56 00-00 00-00 00-36 32-33 63-33 65-30 66-34 38-34 33-36 39-65 60-FE EB-56 28-00 00-00 28-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 40-38 C7-56 80-00 00-00 80-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 40-00 00-00 01-36 39-38>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3289: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/429 (108-byte object <48-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 E8-88 BE-56 00-00 00-00 00-36 32-33 63-33 65-30 66-34 38-34 33-36 39-65 D0-02 EC-56 28-00 00-00 28-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 D0-38 C7-56 80-00 00-00 80-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 40-00 00-00 01-36 39-38>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3290: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/430 (108-byte object <48-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 98-8F C0-56 00-00 00-00 00-36 32-33 63-33 65-30 66-34 38-34 33-36 39-65 40-07 EC-56 28-00 00-00 28-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 40-38 C7-56 80-00 00-00 80-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 40-00 00-00 01-36 39-38>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3291: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/431 (108-byte object <48-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 E8-88 BE-56 00-00 00-00 00-36 32-33 63-33 65-30 66-34 38-34 33-36 39-65 B0-0B EC-56 28-00 00-00 28-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 D0-38 C7-56 80-00 00-00 80-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 40-00 00-00 01-36 39-38>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3292: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/432 (108-byte object <49-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 E0-72 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 50-F0 C7-56 00-00 00-00 00-65 34-38 35-66 64-32 33-62 36-65 64-32 62-62 A0-D3 EB-56 28-00 00-00 28-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 14-00 00-00 01-36 39-38>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3293: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/433 (108-byte object <49-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 C0-75 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 00-89 BE-56 00-00 00-00 00-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 F0-75 EF-56 28-00 00-00 28-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 14-00 00-00 01-36 39-38>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3294: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/434 (108-byte object <49-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 A0-D3 EB-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 50-F0 C7-56 00-00 00-00 00-65 34-38 35-66 64-32 33-62 36-65 64-32 62-62 50-76 EF-56 28-00 00-00 28-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 14-00 00-00 01-36 39-38>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3295: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/435 (108-byte object <49-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 F0-75 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 00-89 BE-56 00-00 00-00 00-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 60-7A EF-56 28-00 00-00 28-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 14-00 00-00 01-36 39-38>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3296: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/436 (108-byte object <49-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 50-76 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 50-F0 C7-56 00-00 00-00 00-65 34-38 35-66 64-32 33-62 36-65 64-32 62-62 70-7E EF-56 28-00 00-00 28-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 14-00 00-00 01-36 39-38>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3297: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/437 (108-byte object <49-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 60-7A EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 00-89 BE-56 00-00 00-00 00-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 80-82 EF-56 28-00 00-00 28-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 14-00 00-00 01-36 39-38>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3298: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/438 (108-byte object <4A-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 70-6E EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 50-F0 C7-56 00-00 00-00 00-65 34-38 35-66 64-32 33-62 36-65 64-32 62-62 A0-B4 D6-56 54-00 00-00 54-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 2A-00 00-00 01-36 39-38>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3299: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/439 (108-byte object <4A-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 80-82 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 00-89 BE-56 00-00 00-00 00-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 00-56 DF-56 54-00 00-00 54-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 2A-00 00-00 01-36 39-38>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3300: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/440 (108-byte object <4A-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 A0-8A EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 50-F0 C7-56 00-00 00-00 00-65 34-38 35-66 64-32 33-62 36-65 64-32 62-62 A0-B4 D6-56 54-00 00-00 54-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 2A-00 00-00 01-36 39-38>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3301: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/441 (108-byte object <4A-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 C0-93 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 00-89 BE-56 00-00 00-00 00-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 00-56 DF-56 54-00 00-00 54-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 2A-00 00-00 01-36 39-38>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3302: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/442 (108-byte object <4A-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 00-98 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 50-F0 C7-56 00-00 00-00 00-65 34-38 35-66 64-32 33-62 36-65 64-32 62-62 A0-B4 D6-56 54-00 00-00 54-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 2A-00 00-00 01-36 39-38>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3303: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/443 (108-byte object <4A-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 40-9C EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 00-89 BE-56 00-00 00-00 00-00 00-00 35-66 64-32 33-62 36-65 64-32 62-62 00-56 DF-56 54-00 00-00 54-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 2A-00 00-00 01-36 39-38>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3304: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/444 (108-byte object <4B-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-66 65-65 39-61 65-36 34-35 65-31 80-A0 EF-56 20-00 00-00 20-00 00-00 63-33 65-30 66-34 38-34 33-36 39-65 20-39 C7-56 00-00 00-00 00-65 34-38 35-66 64-32 33-62 36-65 64-32 62-62 60-8F C0-56 80-00 00-00 80-00 00-00 36-37 31-35 38-37 35-66 33-64 30-39 40-00 00-00 01-36 39-38>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3305: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/445 (108-byte object <4B-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 C0-A4 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 00-89 BE-56 00-00 00-00 00-37 30-30 34-31 63-36 30-61 37-61 30-37 35-64 40-38 C7-56 80-00 00-00 80-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 40-00 00-00 01-35 39-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3306: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/446 (108-byte object <4B-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 30-A9 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 20-39 C7-56 00-00 00-00 00-37 30-30 34-31 63-36 30-61 37-61 30-37 35-64 60-8F C0-56 80-00 00-00 80-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 40-00 00-00 01-35 39-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3307: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/447 (108-byte object <4B-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 A0-AD EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 00-89 BE-56 00-00 00-00 00-37 30-30 34-31 63-36 30-61 37-61 30-37 35-64 40-38 C7-56 80-00 00-00 80-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 40-00 00-00 01-35 39-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3308: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/448 (108-byte object <4B-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 10-B2 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 20-39 C7-56 00-00 00-00 00-37 30-30 34-31 63-36 30-61 37-61 30-37 35-64 60-8F C0-56 80-00 00-00 80-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 40-00 00-00 01-35 39-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3309: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/449 (108-byte object <4B-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 80-B6 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 00-89 BE-56 00-00 00-00 00-37 30-30 34-31 63-36 30-61 37-61 30-37 35-64 40-38 C7-56 80-00 00-00 80-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 40-00 00-00 01-35 39-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3310: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/450 (108-byte object <4C-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 70-7E EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 C0-C1 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 F0-C1 EF-56 28-00 00-00 28-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 14-00 00-00 01-35 39-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3311: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/451 (108-byte object <4C-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 A0-C2 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 D0-C2 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 00-C3 EF-56 28-00 00-00 28-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 14-00 00-00 01-35 39-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3312: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/452 (108-byte object <4C-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 C0-C1 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 F0-C1 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 60-C3 EF-56 28-00 00-00 28-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 14-00 00-00 01-35 39-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3313: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/453 (108-byte object <4C-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 D0-C2 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 00-C3 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 90-C3 EF-56 28-00 00-00 28-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 14-00 00-00 01-35 39-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3314: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/454 (108-byte object <4C-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 F0-C1 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 60-C3 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 D0-C7 EF-56 28-00 00-00 28-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 14-00 00-00 01-35 39-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3315: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/455 (108-byte object <4C-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 00-C3 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 90-C3 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 10-CC EF-56 28-00 00-00 28-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 14-00 00-00 01-35 39-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3316: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/456 (108-byte object <4D-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 D0-C7 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 50-D0 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 50-F5 DF-56 54-00 00-00 54-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 2A-00 00-00 01-35 39-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3317: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/457 (108-byte object <4D-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 90-C3 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 10-CC EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 A0-B4 D6-56 54-00 00-00 54-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 2A-00 00-00 01-35 39-31>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3318: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/458 (108-byte object <4D-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 50-D0 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 30-C3 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 50-F5 DF-56 54-00 00-00 54-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 2A-00 00-00 01-35 39-31>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3319: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/459 (108-byte object <4D-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 10-CC EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 F0-BA EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 A0-B4 D6-56 54-00 00-00 54-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 2A-00 00-00 01-35 39-31>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3320: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/460 (108-byte object <4D-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 30-C3 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 30-E5 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 50-F5 DF-56 54-00 00-00 54-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 2A-00 00-00 01-35 39-31>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3321: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/461 (108-byte object <4D-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 F0-BA EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 A0-E9 EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 A0-B4 D6-56 54-00 00-00 54-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 2A-00 00-00 01-35 39-31>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3322: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/462 (108-byte object <4E-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 64-35 63-35 66-62 64-65 61-34 64-62 30-E5 EF-56 20-00 00-00 20-00 00-00 36-62 34-31 32-34 37-31 39-66 39-66 10-EE EF-56 28-00 00-00 28-00 00-00 34-31 63-36 30-61 37-61 30-37 35-64 D0-38 C7-56 80-00 00-00 80-00 00-00 39-34 32-37 31-61 35-33 65-38 37-66 40-00 00-00 01-35 39-31>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3323: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/463 (108-byte object <4E-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 A0-E9 EF-56 20-00 00-00 20-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 80-F2 EF-56 28-00 00-00 28-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 60-8F C0-56 80-00 00-00 80-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 40-00 00-00 01-65 35-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3324: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/464 (108-byte object <4E-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 10-EE EF-56 20-00 00-00 20-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 F0-F6 EF-56 28-00 00-00 28-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 D0-38 C7-56 80-00 00-00 80-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 40-00 00-00 01-65 35-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3325: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/465 (108-byte object <4E-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 80-F2 EF-56 20-00 00-00 20-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 90-FB EF-56 28-00 00-00 28-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 60-8F C0-56 80-00 00-00 80-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 40-00 00-00 01-65 35-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3326: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/466 (108-byte object <4E-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 F0-F6 EF-56 20-00 00-00 20-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 30-00 F0-56 28-00 00-00 28-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 D0-38 C7-56 80-00 00-00 80-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 40-00 00-00 01-65 35-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3327: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/467 (108-byte object <4E-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 90-FB EF-56 20-00 00-00 20-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 D0-04 F0-56 28-00 00-00 28-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 60-8F C0-56 80-00 00-00 80-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 40-00 00-00 01-65 35-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3328: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/468 (108-byte object <4F-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 30-12 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 50-F0 C7-56 00-00 00-00 00-35 64-35 37-37 65-34 66-32 35-35 39-62 39-64 60-C3 EF-56 28-00 00-00 28-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 14-00 00-00 01-65 35-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3329: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/469 (108-byte object <4F-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 00-13 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 00-89 BE-56 00-00 00-00 00-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 D0-04 F0-56 28-00 00-00 28-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 14-00 00-00 01-65 35-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3330: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/470 (108-byte object <4F-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 30-12 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 50-F0 C7-56 00-00 00-00 00-35 64-35 37-37 65-34 66-32 35-35 39-62 39-64 10-0E F0-56 28-00 00-00 28-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 14-00 00-00 01-65 35-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3331: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/471 (108-byte object <4F-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 00-13 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 00-89 BE-56 00-00 00-00 00-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 E0-18 F0-56 28-00 00-00 28-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 14-00 00-00 01-65 35-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3332: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/472 (108-byte object <4F-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 30-12 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 50-F0 C7-56 00-00 00-00 00-35 64-35 37-37 65-34 66-32 35-35 39-62 39-64 10-1D F0-56 28-00 00-00 28-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 14-00 00-00 01-65 35-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3333: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/473 (108-byte object <4F-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 00-13 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 00-89 BE-56 00-00 00-00 00-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 40-21 F0-56 28-00 00-00 28-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 14-00 00-00 01-65 35-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3334: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/474 (108-byte object <50-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 30-12 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 50-F0 C7-56 00-00 00-00 00-35 64-35 37-37 65-34 66-32 35-35 39-62 39-64 00-56 DF-56 54-00 00-00 54-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 2A-00 00-00 01-65 35-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3335: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/475 (108-byte object <50-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 00-13 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 00-89 BE-56 00-00 00-00 00-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 50-F5 DF-56 54-00 00-00 54-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 2A-00 00-00 01-65 35-33>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3336: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/476 (108-byte object <50-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 30-12 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 50-F0 C7-56 00-00 00-00 00-35 64-35 37-37 65-34 66-32 35-35 39-62 39-64 00-56 DF-56 54-00 00-00 54-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 2A-00 00-00 01-65 35-33>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3337: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/477 (108-byte object <50-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 00-13 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 00-89 BE-56 00-00 00-00 00-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 50-F5 DF-56 54-00 00-00 54-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 2A-00 00-00 01-65 35-33>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3338: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/478 (108-byte object <50-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 30-12 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 50-F0 C7-56 00-00 00-00 00-35 64-35 37-37 65-34 66-32 35-35 39-62 39-64 00-56 DF-56 54-00 00-00 54-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 2A-00 00-00 01-65 35-33>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3339: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/479 (108-byte object <50-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 00-13 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 00-89 BE-56 00-00 00-00 00-00 00-00 37-37 65-34 66-32 35-35 39-62 39-64 50-F5 DF-56 54-00 00-00 54-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 2A-00 00-00 01-65 35-33>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3340: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/480 (108-byte object <51-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 33-30 34-65 65-31 66-61 38-61 64-61 30-12 F0-56 3C-00 00-00 3C-00 00-00 61-65 63-39 32-35 65-39 34-34 30-33 B0-8F C0-56 00-00 00-00 00-35 64-35 37-37 65-34 66-32 35-35 39-62 39-64 40-38 C7-56 80-00 00-00 80-00 00-00 39-62 34-66 66-66 65-37 30-31 33-38 40-00 00-00 01-65 35-33>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3341: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/481 (108-byte object <51-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 00-89 BE-56 00-00 00-00 00-31 32-31 63-65 65-63 61-64 63-63 33-36 37-66 D0-38 C7-56 80-00 00-00 80-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 40-00 00-00 01-62 32-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3342: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/482 (108-byte object <51-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 B0-8F C0-56 00-00 00-00 00-31 32-31 63-65 65-63 61-64 63-63 33-36 37-66 40-38 C7-56 80-00 00-00 80-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 40-00 00-00 01-62 32-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3343: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/483 (108-byte object <51-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 00-89 BE-56 00-00 00-00 00-31 32-31 63-65 65-63 61-64 63-63 33-36 37-66 D0-38 C7-56 80-00 00-00 80-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 40-00 00-00 01-62 32-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3344: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/484 (108-byte object <51-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 B0-8F C0-56 00-00 00-00 00-31 32-31 63-65 65-63 61-64 63-63 33-36 37-66 40-38 C7-56 80-00 00-00 80-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 40-00 00-00 01-62 32-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3345: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/485 (108-byte object <51-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 00-89 BE-56 00-00 00-00 00-31 32-31 63-65 65-63 61-64 63-63 33-36 37-66 D0-38 C7-56 80-00 00-00 80-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 40-00 00-00 01-62 32-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3346: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/486 (108-byte object <52-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 10-61 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 40-61 F0-56 28-00 00-00 28-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 14-00 00-00 01-62 32-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3347: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/487 (108-byte object <52-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 20-62 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 50-62 F0-56 28-00 00-00 28-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 14-00 00-00 01-62 32-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3348: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/488 (108-byte object <52-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 40-61 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 B0-62 F0-56 28-00 00-00 28-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 14-00 00-00 01-62 32-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3349: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/489 (108-byte object <52-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 50-62 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 10-67 F0-56 28-00 00-00 28-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 14-00 00-00 01-62 32-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3350: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/490 (108-byte object <52-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 B0-62 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 70-6B F0-56 28-00 00-00 28-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 14-00 00-00 01-62 32-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3351: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/491 (108-byte object <52-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 10-67 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 D0-6F F0-56 28-00 00-00 28-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 14-00 00-00 01-62 32-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3352: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/492 (108-byte object <53-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 60-BF EF-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 A0-B4 D6-56 54-00 00-00 54-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 2A-00 00-00 01-62 32-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3353: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/493 (108-byte object <53-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 D0-6F F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 00-56 DF-56 54-00 00-00 54-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 2A-00 00-00 01-62 32-32>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3354: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/494 (108-byte object <53-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 90-78 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 A0-B4 D6-56 54-00 00-00 54-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 2A-00 00-00 01-62 32-32>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3355: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/495 (108-byte object <53-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 A0-82 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 00-56 DF-56 54-00 00-00 54-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 2A-00 00-00 01-62 32-32>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3356: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/496 (108-byte object <53-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 30-87 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 A0-B4 D6-56 54-00 00-00 54-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 2A-00 00-00 01-62 32-32>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3357: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/497 (108-byte object <53-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 00-13 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 C0-8B F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 00-56 DF-56 54-00 00-00 54-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 2A-00 00-00 01-62 32-32>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3358: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/498 (108-byte object <54-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 64-37 35-63 34-62 34-38 34-64 38-63 30-12 F0-56 3C-00 00-00 3C-00 00-00 35-64 30-63 32-36 38-35 33-39 65-35 50-90 F0-56 28-00 00-00 28-00 00-00 63-65 65-63 61-64 63-63 33-36 37-66 60-8F C0-56 80-00 00-00 80-00 00-00 35-66 63-34 61-64 30-64 30-36 36-34 40-00 00-00 01-62 32-32>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3359: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/499 (108-byte object <54-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 36-31 36-34 30-33 61-63 63-65 30-35 00-13 F0-56 3C-00 00-00 3C-00 00-00 62-31 64-34 39-61 37-62 65-61 66-63 E0-94 F0-56 28-00 00-00 28-00 00-00 65-62 61-38 39-63 35-66 37-39 66-66 40-38 C7-56 80-00 00-00 80-00 00-00 34-35 37-65 36-62 63-35 34-30 33-31 40-00 00-00 01-32 66-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3360: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/500 (108-byte object <54-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 36-31 36-34 30-33 61-63 63-65 30-35 30-12 F0-56 3C-00 00-00 3C-00 00-00 62-31 64-34 39-61 37-62 65-61 66-63 A0-99 F0-56 28-00 00-00 28-00 00-00 65-62 61-38 39-63 35-66 37-39 66-66 60-8F C0-56 80-00 00-00 80-00 00-00 34-35 37-65 36-62 63-35 34-30 33-31 40-00 00-00 01-32 66-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3361: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/501 (108-byte object <54-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 36-31 36-34 30-33 61-63 63-65 30-35 00-13 F0-56 3C-00 00-00 3C-00 00-00 62-31 64-34 39-61 37-62 65-61 66-63 60-9E F0-56 28-00 00-00 28-00 00-00 65-62 61-38 39-63 35-66 37-39 66-66 40-38 C7-56 80-00 00-00 80-00 00-00 34-35 37-65 36-62 63-35 34-30 33-31 40-00 00-00 01-32 66-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3362: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/502 (108-byte object <54-00 00-00 00-57 ED-56 40-00 00-00 40-00 00-00 36-31 36-34 30-33 61-63 63-65 30-35 30-12 F0-56 3C-00 00-00 3C-00 00-00 62-31 64-34 39-61 37-62 65-61 66-63 20-A3 F0-56 28-00 00-00 28-00 00-00 65-62 61-38 39-63 35-66 37-39 66-66 60-8F C0-56 80-00 00-00 80-00 00-00 34-35 37-65 36-62 63-35 34-30 33-31 40-00 00-00 01-32 66-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3363: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/503 (108-byte object <54-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 36-31 36-34 30-33 61-63 63-65 30-35 00-13 F0-56 3C-00 00-00 3C-00 00-00 62-31 64-34 39-61 37-62 65-61 66-63 E0-A7 F0-56 28-00 00-00 28-00 00-00 65-62 61-38 39-63 35-66 37-39 66-66 40-38 C7-56 80-00 00-00 80-00 00-00 34-35 37-65 36-62 63-35 34-30 33-31 40-00 00-00 01-32 66-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3364: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/504 (108-byte object <55-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 36-31 36-34 30-33 61-63 63-65 30-35 60-8F C0-56 80-00 00-00 80-00 00-00 62-31 64-34 39-61 37-62 65-61 66-63 20-39 C7-56 00-00 00-00 00-37 37-65 65-62 61-38 39-63 35-66 37-39 66-66 50-F5 DF-56 54-00 00-00 54-00 00-00 34-35 37-65 36-62 63-35 34-30 33-31 2A-00 00-00 01-32 66-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3365: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/505 (108-byte object <55-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 40-38 C7-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 00-89 BE-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 A0-B4 D6-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3366: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/506 (108-byte object <55-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 60-8F C0-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 20-39 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 50-F5 DF-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3367: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/507 (108-byte object <55-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 40-38 C7-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 00-89 BE-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 A0-B4 D6-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3368: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/508 (108-byte object <55-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 60-8F C0-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 20-39 C7-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 50-F5 DF-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3369: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/509 (108-byte object <55-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 40-38 C7-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 00-89 BE-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 A0-B4 D6-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3370: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/510 (108-byte object <56-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 60-8F C0-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 B0-5E F0-56 28-00 00-00 28-00 00-00 66-37 65-39 30-32 35-65 34-33 34-62 50-F5 DF-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3371: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/511 (108-byte object <56-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-38 C7-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-CE F0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3372: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/512 (108-byte object <56-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 60-8F C0-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-D0 F0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-F5 DF-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3373: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/513 (108-byte object <56-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-38 C7-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 80-D5 F0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3374: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/514 (108-byte object <56-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 60-8F C0-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 50-DA F0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-F5 DF-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3375: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/515 (108-byte object <56-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-38 C7-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 E0-3D EA-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 A0-B4 D6-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3376: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/516 (108-byte object <57-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-45 EA-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 80-5C F1-56 A0-5F 00-00 A0-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D0-2F 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3377: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/517 (108-byte object <57-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-AE E5-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 10-45 EA-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-BC F1-56 A0-5F 00-00 A0-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D0-2F 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3378: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/518 (108-byte object <57-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-4A EA-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 80-5C F1-56 A0-5F 00-00 A0-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D0-2F 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3379: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/519 (108-byte object <57-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-AE E5-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 50-1E F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-BC F1-56 A0-5F 00-00 A0-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D0-2F 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3380: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/520 (108-byte object <57-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-22 F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 80-5C F1-56 A0-5F 00-00 A0-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D0-2F 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3381: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/521 (108-byte object <57-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-AE E5-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-26 F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-BC F1-56 A0-5F 00-00 A0-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D0-2F 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3382: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/522 (108-byte object <58-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 40-40 EA-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 68-F0 C7-56 00-00 00-00 00-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D1-2F 00-00 00-37 66-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3383: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/523 (108-byte object <58-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-AE E5-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-2E F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 18-89 BE-56 00-00 00-00 00-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D1-2F 00-00 00-37 66-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3384: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/524 (108-byte object <58-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 F0-32 F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 68-F0 C7-56 00-00 00-00 00-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D1-2F 00-00 00-37 66-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3385: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/525 (108-byte object <58-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-AE E5-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-37 F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 18-89 BE-56 00-00 00-00 00-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D1-2F 00-00 00-37 66-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3386: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/526 (108-byte object <58-00 00-00 40-C0 D7-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 70-3B F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 68-F0 C7-56 00-00 00-00 00-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D1-2F 00-00 00-37 66-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3387: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/527 (108-byte object <58-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-AE E5-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 B0-3F F2-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 18-89 BE-56 00-00 00-00 00-5F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 D1-2F 00-00 00-37 66-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3388: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/528 (108-byte object <59-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 38-F0 C7-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 50-CB F0-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 90-4C F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3389: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/529 (108-byte object <59-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 E8-88 BE-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 80-4D F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-4D F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3390: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/530 (108-byte object <59-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 38-F0 C7-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-4F F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 90-4C F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3391: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/531 (108-byte object <59-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 E8-88 BE-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-54 F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-4D F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3392: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/532 (108-byte object <59-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 38-F0 C7-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 30-58 F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 90-4C F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3393: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/533 (108-byte object <59-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 E8-88 BE-56 00-00 00-00 00-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-5C F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-4D F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3394: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/534 (108-byte object <5A-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-0E E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 90-60 F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 90-4C F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3395: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/535 (108-byte object <5A-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 C0-64 F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-4D F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3396: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/536 (108-byte object <5A-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-0E E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 60-69 F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 90-4C F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3397: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/537 (108-byte object <5A-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-6E F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-4D F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3398: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/538 (108-byte object <5A-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-0E E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-72 F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 90-4C F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3399: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/539 (108-byte object <5A-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 20-6F E6-56 60-00 00-00 60-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 40-77 F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-4D F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3400: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/540 (108-byte object <5B-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 D0-38 C7-56 82-00 00-00 82-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 00-DC F2-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 90-4C F2-56 40-00 00-00 40-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 20-00 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3401: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/541 (108-byte object <5B-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-8F C0-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-E0 F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3402: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/542 (108-byte object <5B-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 D0-38 C7-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-E5 F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3403: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/543 (108-byte object <5B-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-8F C0-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 20-EA F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3404: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/544 (108-byte object <5B-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 D0-38 C7-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-EE F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3405: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/545 (108-byte object <5B-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-8F C0-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-F3 F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3406: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/546 (108-byte object <5C-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-AE E5-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-F8 F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3407: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/547 (108-byte object <5C-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-0E E6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 20-FD F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3408: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/548 (108-byte object <5C-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-AE E5-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-01 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3409: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/549 (108-byte object <5C-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-0E E6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-06 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3410: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/550 (108-byte object <5C-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-AE E5-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-0B F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3411: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/551 (108-byte object <5C-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-0E E6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-0F F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3412: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/552 (108-byte object <5D-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 C0-16 F3-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-14 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3413: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/553 (108-byte object <5D-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 A0-16 F3-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-18 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3414: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/554 (108-byte object <5D-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-1B F3-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-1D F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3415: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/555 (108-byte object <5D-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 D0-1F F3-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-21 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3416: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/556 (108-byte object <5D-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-24 F3-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-25 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3417: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/557 (108-byte object <5D-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 70-28 F3-56 10-00 00-00 10-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-2A F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3418: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/558 (108-byte object <5E-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 E0-32 F3-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-4E F2-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3419: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/559 (108-byte object <5E-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 A0-35 F3-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-35 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3420: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/560 (108-byte object <5E-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 00-4E F2-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-36 F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3421: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/561 (108-byte object <5E-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 D0-35 F3-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-3A F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3422: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/562 (108-byte object <5E-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-36 F3-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-00 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3423: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/563 (108-byte object <5E-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 90-3A F3-56 20-00 00-00 20-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-04 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3424: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/564 (108-byte object <5F-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 A0-BF B8-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-2E F3-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3425: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/565 (108-byte object <5F-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-3D B2-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-04 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3426: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/566 (108-byte object <5F-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 A0-BF B8-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-0D F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3427: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/567 (108-byte object <5F-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-3D B2-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-17 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3428: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/568 (108-byte object <5F-00 00-00 00-13 F0-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 A0-BF B8-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-1B F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 90-4C F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3429: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/569 (108-byte object <5F-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-3D B2-56 30-00 00-00 30-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-20 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3430: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/570 (108-byte object <60-00 00-00 90-4C F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-4D F2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-24 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3431: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/571 (108-byte object <60-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-4D F2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-29 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 F0-2B F1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3432: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/572 (108-byte object <60-00 00-00 90-4C F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-4D F2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-2E F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3433: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/573 (108-byte object <60-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-4D F2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-33 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 F0-2B F1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3434: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/574 (108-byte object <60-00 00-00 90-4C F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 B0-4D F2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-37 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3435: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/575 (108-byte object <60-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-4D F2-56 40-00 00-00 40-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-3C F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 F0-2B F1-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3436: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/576 (108-byte object <61-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 00-56 DF-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-40 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3437: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/577 (108-byte object <61-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-F5 DF-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-45 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3438: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/578 (108-byte object <61-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 00-56 DF-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 C0-48 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3439: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/579 (108-byte object <61-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-F5 DF-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-4D F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3440: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/580 (108-byte object <61-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 00-56 DF-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-51 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3441: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/581 (108-byte object <61-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 50-F5 DF-56 50-00 00-00 50-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-56 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3442: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/582 (108-byte object <62-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-6F E6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-5B F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3443: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/583 (108-byte object <62-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-AE E5-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-5F F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3444: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/584 (108-byte object <62-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-6F E6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-64 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3445: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/585 (108-byte object <62-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-AE E5-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 D0-68 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3446: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/586 (108-byte object <62-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-6F E6-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-6D F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3447: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/587 (108-byte object <62-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 20-AE E5-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-72 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3448: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/588 (108-byte object <63-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-7E F1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-76 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3449: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/589 (108-byte object <63-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-7F F1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-7B F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3450: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/590 (108-byte object <63-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-7E F1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 00-82 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3451: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/591 (108-byte object <63-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-7F F1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-86 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3452: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/592 (108-byte object <63-00 00-00 B0-4D F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-7E F1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 60-8B F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4E F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3453: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/593 (108-byte object <63-00 00-00 60-10 D1-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 30-7F F1-56 70-00 00-00 70-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-90 F1-56 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 30-4D F2-56 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3454: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/594 (108-byte object <64-00 00-00 40-CF E6-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 D0-9B F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-97 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 40-9C F1-56 60-00 00-00 60-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 30-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3455: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/595 (108-byte object <64-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 20-97 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 F0-9D F1-56 60-00 00-00 60-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 30-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3456: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/596 (108-byte object <64-00 00-00 40-CF E6-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 D0-9B F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-10 D1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 40-9C F1-56 60-00 00-00 60-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 30-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3457: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/597 (108-byte object <64-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-A3 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 F0-9D F1-56 60-00 00-00 60-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 30-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3458: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/598 (108-byte object <64-00 00-00 40-CF E6-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 D0-9B F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-A7 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 40-9C F1-56 60-00 00-00 60-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 30-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3459: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/599 (108-byte object <64-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-AB F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 F0-9D F1-56 60-00 00-00 60-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 30-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3460: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/600 (108-byte object <65-00 00-00 40-9C F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-9E F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-92 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-BA F1-56 B0-00 00-00 B0-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 58-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3461: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/601 (108-byte object <65-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-B4 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 80-BB F1-56 B0-00 00-00 B0-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 58-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3462: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/602 (108-byte object <65-00 00-00 40-9C F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-9E F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-B9 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-BA F1-56 B0-00 00-00 B0-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 58-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3463: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/603 (108-byte object <65-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 40-C0 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 80-BB F1-56 B0-00 00-00 B0-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 58-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3464: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/604 (108-byte object <65-00 00-00 40-9C F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-9E F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-C4 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 60-BA F1-56 B0-00 00-00 B0-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 58-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3465: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/605 (108-byte object <65-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 10-CA F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 80-BB F1-56 B0-00 00-00 B0-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 58-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3466: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/606 (108-byte object <66-00 00-00 40-9C F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-9E F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 E0-AF F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-DB F1-56 80-01 00-00 80-01 00-00 63-64 32-30 62-66 65-32 61-39 30-64 C0-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 608)' - PASSED gtests.sh: #3467: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/607 (108-byte object <66-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 50-D4 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 10-DD F1-56 80-01 00-00 80-01 00-00 63-64 32-30 62-66 65-32 61-39 30-64 C0-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 608)' - PASSED gtests.sh: #3468: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/608 (108-byte object <66-00 00-00 40-9C F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-9E F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-D9 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-DB F1-56 80-01 00-00 80-01 00-00 63-64 32-30 62-66 65-32 61-39 30-64 C0-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 608)' - PASSED gtests.sh: #3469: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/609 (108-byte object <66-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 A0-E5 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 10-DD F1-56 80-01 00-00 80-01 00-00 63-64 32-30 62-66 65-32 61-39 30-64 C0-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 608)' - PASSED gtests.sh: #3470: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/610 (108-byte object <66-00 00-00 40-9C F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 60-9E F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 90-EB F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-DB F1-56 80-01 00-00 80-01 00-00 63-64 32-30 62-66 65-32 61-39 30-64 C0-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 608)' - PASSED gtests.sh: #3471: 'HkdfSha384/Pkcs11HkdfTest: WycheproofVectors/611 (108-byte object <66-00 00-00 10-9D F1-56 60-00 00-00 60-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 80-9D F1-56 60-00 00-00 60-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 80-F1 F1-56 10-00 00-00 10-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 10-DD F1-56 80-01 00-00 80-01 00-00 63-64 32-30 62-66 65-32 61-39 30-64 C0-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 608)' - PASSED gtests.sh: #3472: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/0 (108-byte object <01-00 00-00 10-D1 E1-56 20-00 00-00 20-00 00-00 33-39 64-66 30-00 00-00 30-00 00-00 08-C8 EA-56 00-00 00-00 00-C6 EA-56 20-C7 EA-56 18-C8 EA-56 03-00 00-00 20-C8 EA-56 00-00 00-00 00-35 34-65 33-39 64-66 60-00 00-00 30-00 00-00 00-E4 E0-56 28-00 00-00 28-00 00-00 C0-C8 EA-56 48-C8 EA-56 03-00 00-00 14-00 00-00 01-34 34-62>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3473: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/1 (108-byte object <01-00 00-00 10-B8 E3-56 20-00 00-00 20-00 00-00 62-63 39-64 30-30 38-62 35-39 32-66 18-06 F2-56 00-00 00-00 00-38 38-38 65-38 62-37 38-37 33-35 38-35 66-31 30-06 F2-56 00-00 00-00 00-34 33-62 33-32 34-38 37-33 66-63 32-33 61-33 00-2A D2-56 28-00 00-00 28-00 00-00 37-34 36-35 37-35 66-37 39-64 33-36 14-00 00-00 01-31 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3474: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/2 (108-byte object <01-00 00-00 00-E4 E0-56 20-00 00-00 20-00 00-00 33-39 64-66 30-00 00-00 30-00 00-00 08-C8 EA-56 00-00 00-00 00-C6 EA-56 20-C7 EA-56 18-C8 EA-56 03-00 00-00 20-C8 EA-56 00-00 00-00 00-35 34-65 33-39 64-66 60-00 00-00 30-00 00-00 E0-52 E5-56 28-00 00-00 28-00 00-00 C0-C8 EA-56 48-C8 EA-56 03-00 00-00 14-00 00-00 01-34 34-62>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3475: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/3 (108-byte object <01-00 00-00 C0-5B E5-56 20-00 00-00 20-00 00-00 62-63 39-64 30-30 38-62 35-39 32-66 18-06 F2-56 00-00 00-00 00-38 38-38 65-38 62-37 38-37 33-35 38-35 66-31 30-06 F2-56 00-00 00-00 00-34 33-62 33-32 34-38 37-33 66-63 32-33 61-33 50-57 E5-56 28-00 00-00 28-00 00-00 37-34 36-35 37-35 66-37 39-64 33-36 14-00 00-00 01-31 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3476: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/4 (108-byte object <01-00 00-00 E0-52 E5-56 20-00 00-00 20-00 00-00 33-39 64-66 30-00 00-00 30-00 00-00 08-C8 EA-56 00-00 00-00 00-C6 EA-56 20-C7 EA-56 18-C8 EA-56 03-00 00-00 20-C8 EA-56 00-00 00-00 00-35 34-65 33-39 64-66 60-00 00-00 30-00 00-00 E0-72 E5-56 28-00 00-00 28-00 00-00 C0-C8 EA-56 48-C8 EA-56 03-00 00-00 14-00 00-00 01-34 34-62>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3477: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/5 (108-byte object <01-00 00-00 50-57 E5-56 20-00 00-00 20-00 00-00 62-63 39-64 30-30 38-62 35-39 32-66 18-06 F2-56 00-00 00-00 00-38 38-38 65-38 62-37 38-37 33-35 38-35 66-31 30-06 F2-56 00-00 00-00 00-34 33-62 33-32 34-38 37-33 66-63 32-33 61-33 30-B5 D6-56 28-00 00-00 28-00 00-00 37-34 36-35 37-35 66-37 39-64 33-36 14-00 00-00 01-31 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3478: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/6 (108-byte object <02-00 00-00 60-B3 E3-56 20-00 00-00 20-00 00-00 33-39 64-66 30-00 00-00 30-00 00-00 08-C8 EA-56 00-00 00-00 00-C6 EA-56 20-C7 EA-56 18-C8 EA-56 03-00 00-00 20-C8 EA-56 00-00 00-00 00-35 34-65 33-39 64-66 60-00 00-00 30-00 00-00 20-A5 BD-56 54-00 00-00 54-00 00-00 C0-C8 EA-56 48-C8 EA-56 03-00 00-00 2A-00 00-00 01-34 34-62>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3479: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/7 (108-byte object <02-00 00-00 30-B5 D6-56 20-00 00-00 20-00 00-00 62-63 39-64 30-30 38-62 35-39 32-66 18-06 F2-56 00-00 00-00 00-38 38-38 65-38 62-37 38-37 33-35 38-35 66-31 30-06 F2-56 00-00 00-00 00-34 33-62 33-32 34-38 37-33 66-63 32-33 61-33 C0-75 EF-56 54-00 00-00 54-00 00-00 37-34 36-35 37-35 66-37 39-64 33-36 2A-00 00-00 01-31 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3480: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/8 (108-byte object <02-00 00-00 80-92 E5-56 20-00 00-00 20-00 00-00 33-39 64-66 30-00 00-00 30-00 00-00 08-C8 EA-56 00-00 00-00 00-C6 EA-56 20-C7 EA-56 18-C8 EA-56 03-00 00-00 20-C8 EA-56 00-00 00-00 00-35 34-65 33-39 64-66 60-00 00-00 30-00 00-00 20-A5 BD-56 54-00 00-00 54-00 00-00 C0-C8 EA-56 48-C8 EA-56 03-00 00-00 2A-00 00-00 01-34 34-62>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3481: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/9 (108-byte object <02-00 00-00 A0-0C E7-56 20-00 00-00 20-00 00-00 62-63 39-64 30-30 38-62 35-39 32-66 18-06 F2-56 00-00 00-00 00-38 38-38 65-38 62-37 38-37 33-35 38-35 66-31 30-06 F2-56 00-00 00-00 00-34 33-62 33-32 34-38 37-33 66-63 32-33 61-33 C0-75 EF-56 54-00 00-00 54-00 00-00 37-34 36-35 37-35 66-37 39-64 33-36 2A-00 00-00 01-31 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3482: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/10 (108-byte object <02-00 00-00 E0-9B E5-56 20-00 00-00 20-00 00-00 33-39 64-66 30-00 00-00 30-00 00-00 08-C8 EA-56 00-00 00-00 00-C6 EA-56 20-C7 EA-56 18-C8 EA-56 03-00 00-00 20-C8 EA-56 00-00 00-00 00-35 34-65 33-39 64-66 60-00 00-00 30-00 00-00 20-A5 BD-56 54-00 00-00 54-00 00-00 C0-C8 EA-56 48-C8 EA-56 03-00 00-00 2A-00 00-00 01-34 34-62>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3483: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/11 (108-byte object <02-00 00-00 C0-F0 E6-56 20-00 00-00 20-00 00-00 62-63 39-64 30-30 38-62 35-39 32-66 18-06 F2-56 00-00 00-00 00-38 38-38 65-38 62-37 38-37 33-35 38-35 66-31 30-06 F2-56 00-00 00-00 00-34 33-62 33-32 34-38 37-33 66-63 32-33 61-33 C0-75 EF-56 54-00 00-00 54-00 00-00 37-34 36-35 37-35 66-37 39-64 33-36 2A-00 00-00 01-31 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3484: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/12 (108-byte object <03-00 00-00 A0-97 D6-56 20-00 00-00 20-00 00-00 31-31 31-36 36-39 63-61 62-30 33-64 78-4D E4-56 00-00 00-00 00-63 65-35 39-38 36-30 34-66 32-38 33-32 36-34 90-4D E4-56 00-00 00-00 00-31 38-64 63-63 39-32 35-63 35-33 39-34 62-36 D0-4D E4-56 80-00 00-00 80-00 00-00 39-31 66-62 61-65 31-63 34-63 63-64 40-00 00-00 01-66 64-37>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3485: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/13 (108-byte object <03-00 00-00 E0-72 E5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 30-06 F2-56 00-00 00-00 00-62 61-30 63-33 33-38 30-35 64-35 38-34 33-65 E0-4E E4-56 80-00 00-00 80-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 40-00 00-00 01-30 37-61>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3486: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/14 (108-byte object <03-00 00-00 F0-29 E7-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 78-4D E4-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 90-4D E4-56 00-00 00-00 00-62 61-30 63-33 33-38 30-35 64-35 38-34 33-65 D0-4D E4-56 80-00 00-00 80-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 40-00 00-00 01-30 37-61>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3487: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/15 (108-byte object <03-00 00-00 70-25 E7-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 30-06 F2-56 00-00 00-00 00-62 61-30 63-33 33-38 30-35 64-35 38-34 33-65 E0-4E E4-56 80-00 00-00 80-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 40-00 00-00 01-30 37-61>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3488: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/16 (108-byte object <03-00 00-00 D0-18 E7-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 78-4D E4-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 90-4D E4-56 00-00 00-00 00-62 61-30 63-33 33-38 30-35 64-35 38-34 33-65 D0-4D E4-56 80-00 00-00 80-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 40-00 00-00 01-30 37-61>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3489: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/17 (108-byte object <03-00 00-00 D0-FD D5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 30-06 F2-56 00-00 00-00 00-62 61-30 63-33 33-38 30-35 64-35 38-34 33-65 40-62 E4-56 80-00 00-00 80-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 40-00 00-00 01-30 37-61>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3490: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/18 (108-byte object <04-00 00-00 10-A9 D7-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 08-C8 EA-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 30-BB E5-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 B0-B6 E5-56 28-00 00-00 28-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 14-00 00-00 01-30 37-61>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3491: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/19 (108-byte object <04-00 00-00 40-05 E7-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 70-2E E7-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 B0-CD E5-56 28-00 00-00 28-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 14-00 00-00 01-30 37-61>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3492: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/20 (108-byte object <04-00 00-00 30-BB E5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 08-C8 EA-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 B0-B6 E5-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 F0-DF E5-56 28-00 00-00 28-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 14-00 00-00 01-30 37-61>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3493: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/21 (108-byte object <04-00 00-00 50-D2 E5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 70-DB E5-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 70-ED E5-56 28-00 00-00 28-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 14-00 00-00 01-30 37-61>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3494: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/22 (108-byte object <04-00 00-00 B0-B6 E5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 08-C8 EA-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 F0-DF E5-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 C0-FE E5-56 28-00 00-00 28-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 14-00 00-00 01-30 37-61>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3495: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/23 (108-byte object <04-00 00-00 30-F2 E5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 F0-02 E6-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 E0-79 E6-56 28-00 00-00 28-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 14-00 00-00 01-30 37-61>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3496: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/24 (108-byte object <05-00 00-00 C0-FE E5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 08-C8 EA-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 10-93 E6-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 50-9D BD-56 54-00 00-00 54-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 2A-00 00-00 01-30 37-61>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3497: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/25 (108-byte object <05-00 00-00 F0-02 E6-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 E0-79 E6-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 30-31 C2-56 54-00 00-00 54-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 2A-00 00-00 01-30 37-61>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3498: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/26 (108-byte object <05-00 00-00 00-CC E6-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 08-C8 EA-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 70-C4 E5-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 50-9D BD-56 54-00 00-00 54-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 2A-00 00-00 01-30 37-61>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3499: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/27 (108-byte object <05-00 00-00 E0-79 E6-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 E0-C7 E6-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 30-31 C2-56 54-00 00-00 54-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 2A-00 00-00 01-30 37-61>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3500: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/28 (108-byte object <05-00 00-00 70-C4 E5-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 08-C8 EA-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 A0-BF E6-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 50-9D BD-56 54-00 00-00 54-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 2A-00 00-00 01-30 37-61>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3501: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/29 (108-byte object <05-00 00-00 70-9F E7-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 18-06 F2-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 C0-C3 E6-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 30-31 C2-56 54-00 00-00 54-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 2A-00 00-00 01-30 37-61>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3502: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/30 (108-byte object <06-00 00-00 A0-BF E6-56 20-00 00-00 20-00 00-00 66-66 32-64 36-32 35-37 66-30 32-62 78-62 E4-56 00-00 00-00 00-38 61-32 39-62 65-65 38-34 65-62 65-37 30-34 00-B8 E7-56 28-00 00-00 28-00 00-00 63-33 33-38 30-35 64-35 38-34 33-65 40-4D E4-56 80-00 00-00 80-00 00-00 36-61 31-35 62-30 66-31 66-37 62-33 40-00 00-00 01-30 37-61>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3503: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/31 (108-byte object <06-00 00-00 90-D8 E7-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 18-06 F2-56 00-00 00-00 00-34 33-31 61-64 30-30 37-63 30-61 65-34 32-38 90-DF E7-56 28-00 00-00 28-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 D0-4D E4-56 80-00 00-00 80-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 40-00 00-00 01-62 37-33>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3504: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/32 (108-byte object <06-00 00-00 00-B8 E7-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 78-62 E4-56 00-00 00-00 00-34 33-31 61-64 30-30 37-63 30-61 65-34 32-38 10-D2 E7-56 28-00 00-00 28-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 40-4D E4-56 80-00 00-00 80-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 40-00 00-00 01-62 37-33>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3505: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/33 (108-byte object <06-00 00-00 90-DF E7-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 18-06 F2-56 00-00 00-00 00-34 33-31 61-64 30-30 37-63 30-61 65-34 32-38 40-CA E7-56 28-00 00-00 28-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 B0-61 E4-56 80-00 00-00 80-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 40-00 00-00 01-62 37-33>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3506: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/34 (108-byte object <06-00 00-00 80-1A E6-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 78-62 E4-56 00-00 00-00 00-34 33-31 61-64 30-30 37-63 30-61 65-34 32-38 F0-AC E7-56 28-00 00-00 28-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 40-4D E4-56 80-00 00-00 80-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 40-00 00-00 01-62 37-33>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3507: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/35 (108-byte object <06-00 00-00 40-CA E7-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 18-06 F2-56 00-00 00-00 00-34 33-31 61-64 30-30 37-63 30-61 65-34 32-38 60-16 E6-56 28-00 00-00 28-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 B0-61 E4-56 80-00 00-00 80-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 40-00 00-00 01-62 37-33>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3508: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/36 (108-byte object <07-00 00-00 70-CE E6-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 10-D2 E7-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 20-C8 EA-56 00-00 00-00 00-37 30-61 35-65 34-36 38-37 38-33 63-39 35-31 70-12 E6-56 28-00 00-00 28-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 14-00 00-00 01-62 37-33>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3509: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/37 (108-byte object <07-00 00-00 30-3B E6-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 20-3F E6-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 30-06 F2-56 00-00 00-00 00-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 40-37 E6-56 28-00 00-00 28-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 14-00 00-00 01-62 37-33>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3510: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/38 (108-byte object <07-00 00-00 E0-26 E6-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 A0-D0 D7-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 20-C8 EA-56 00-00 00-00 00-37 30-61 35-65 34-36 38-37 38-33 63-39 35-31 70-52 E6-56 28-00 00-00 28-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 14-00 00-00 01-62 37-33>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3511: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/39 (108-byte object <07-00 00-00 20-3F E6-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 40-37 E6-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 30-06 F2-56 00-00 00-00 00-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 D0-5E E6-56 28-00 00-00 28-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 14-00 00-00 01-62 37-33>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3512: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/40 (108-byte object <07-00 00-00 E0-67 C0-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 B0-5A E6-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 20-C8 EA-56 00-00 00-00 00-37 30-61 35-65 34-36 38-37 38-33 63-39 35-31 E0-6D E6-56 28-00 00-00 28-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 14-00 00-00 01-62 37-33>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3513: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/41 (108-byte object <07-00 00-00 40-37 E6-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 D0-5E E6-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 30-06 F2-56 00-00 00-00 00-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 40-E0 E9-56 28-00 00-00 28-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 14-00 00-00 01-62 37-33>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3514: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/42 (108-byte object <08-00 00-00 70-FB E9-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 D0-07 EA-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 20-C8 EA-56 00-00 00-00 00-37 30-61 35-65 34-36 38-37 38-33 63-39 35-31 C0-75 EF-56 54-00 00-00 54-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 2A-00 00-00 01-62 37-33>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3515: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/43 (108-byte object <08-00 00-00 B0-03 EA-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 40-7D D7-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 30-06 F2-56 00-00 00-00 00-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 50-9D BD-56 54-00 00-00 54-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 2A-00 00-00 01-62 37-33>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3516: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/44 (108-byte object <08-00 00-00 D0-07 EA-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 10-43 E6-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 20-C8 EA-56 00-00 00-00 00-37 30-61 35-65 34-36 38-37 38-33 63-39 35-31 C0-75 EF-56 54-00 00-00 54-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 2A-00 00-00 01-62 37-33>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3517: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/45 (108-byte object <08-00 00-00 50-54 EA-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 A0-58 EA-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 30-06 F2-56 00-00 00-00 00-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 50-9D BD-56 54-00 00-00 54-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 2A-00 00-00 01-62 37-33>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3518: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/46 (108-byte object <08-00 00-00 10-43 E6-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 B0-33 EA-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 20-C8 EA-56 00-00 00-00 00-37 30-61 35-65 34-36 38-37 38-33 63-39 35-31 C0-75 EF-56 54-00 00-00 54-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 2A-00 00-00 01-62 37-33>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3519: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/47 (108-byte object <08-00 00-00 A0-58 EA-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 70-2B EA-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 30-06 F2-56 00-00 00-00 00-00 00-00 35-65 34-36 38-37 38-33 63-39 35-31 50-9D BD-56 54-00 00-00 54-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 2A-00 00-00 01-62 37-33>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3520: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/48 (108-byte object <09-00 00-00 40-61 EA-56 20-00 00-00 20-00 00-00 37-39 64-37 32-36 31-36 36-38 39-33 C0-65 EA-56 20-00 00-00 20-00 00-00 61-64 30-30 37-63 30-61 65-34 32-38 00-62 E4-56 00-00 00-00 00-37 30-61 35-65 34-36 38-37 38-33 63-39 35-31 40-62 E4-56 80-00 00-00 80-00 00-00 31-31 32-64 63-64 34-65 63-65 61-39 40-00 00-00 01-62 37-33>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3521: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/49 (108-byte object <09-00 00-00 70-2B EA-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 F0-5C EA-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 30-06 F2-56 00-00 00-00 00-31 31-63 33-64 63-35 64-39 64-35 36-35 36-31 40-4D E4-56 80-00 00-00 80-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 40-00 00-00 01-38 66-37>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3522: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/50 (108-byte object <09-00 00-00 C0-65 EA-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 E0-F3 E6-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 00-62 E4-56 00-00 00-00 00-31 31-63 33-64 63-35 64-39 64-35 36-35 36-31 40-62 E4-56 80-00 00-00 80-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 40-00 00-00 01-38 66-37>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3523: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/51 (108-byte object <09-00 00-00 E0-18 EA-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 10-E5 D6-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 30-06 F2-56 00-00 00-00 00-31 31-63 33-64 63-35 64-39 64-35 36-35 36-31 40-4D E4-56 80-00 00-00 80-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 40-00 00-00 01-38 66-37>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3524: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/52 (108-byte object <09-00 00-00 E0-F3 E6-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 80-8A D7-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 00-62 E4-56 00-00 00-00 00-31 31-63 33-64 63-35 64-39 64-35 36-35 36-31 40-62 E4-56 80-00 00-00 80-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 40-00 00-00 01-38 66-37>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3525: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/53 (108-byte object <09-00 00-00 B0-BB EA-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 A0-83 EA-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 30-06 F2-56 00-00 00-00 00-31 31-63 33-64 63-35 64-39 64-35 36-35 36-31 40-4D E4-56 80-00 00-00 80-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 40-00 00-00 01-38 66-37>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3526: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/54 (108-byte object <0A-00 00-00 60-AE EA-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 D0-B2 EA-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 10-E5 D6-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 F0-5C EA-56 28-00 00-00 28-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 14-00 00-00 01-38 66-37>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3527: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/55 (108-byte object <0A-00 00-00 70-26 EB-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 70-2F EB-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 F0-21 EB-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 70-1D EB-56 28-00 00-00 28-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 14-00 00-00 01-38 66-37>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3528: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/56 (108-byte object <0A-00 00-00 F0-D0 C2-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 00-0A EB-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 40-13 EB-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 A0-83 EA-56 28-00 00-00 28-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 14-00 00-00 01-38 66-37>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3529: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/57 (108-byte object <0A-00 00-00 F0-5C EA-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 D0-B2 EA-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 60-8F EC-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 40-8B EC-56 28-00 00-00 28-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 14-00 00-00 01-38 66-37>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3530: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/58 (108-byte object <0A-00 00-00 40-13 EB-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 A0-83 EA-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 20-87 EC-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 C0-7E EC-56 28-00 00-00 28-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 14-00 00-00 01-38 66-37>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3531: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/59 (108-byte object <0A-00 00-00 D0-8F EA-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 70-2F EB-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 00-0A EB-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 70-B7 EC-56 28-00 00-00 28-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 14-00 00-00 01-38 66-37>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3532: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/60 (108-byte object <0B-00 00-00 60-3C EC-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 E0-37 EC-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 60-33 EC-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 30-31 C2-56 54-00 00-00 54-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 2A-00 00-00 01-38 66-37>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3533: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/61 (108-byte object <0B-00 00-00 70-B7 EC-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 C0-6E EA-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 E0-2E EC-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 C0-75 EF-56 54-00 00-00 54-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 2A-00 00-00 01-38 66-37>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3534: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/62 (108-byte object <0B-00 00-00 60-33 EC-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 F0-C4 EC-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 80-8A D7-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 30-31 C2-56 54-00 00-00 54-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 2A-00 00-00 01-38 66-37>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3535: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/63 (108-byte object <0B-00 00-00 10-65 ED-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 00-0A EB-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 D0-07 DA-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 C0-75 EF-56 54-00 00-00 54-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 2A-00 00-00 01-38 66-37>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3536: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/64 (108-byte object <0B-00 00-00 80-8A D7-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 B0-60 ED-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 A0-57 ED-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 30-31 C2-56 54-00 00-00 54-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 2A-00 00-00 01-38 66-37>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3537: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/65 (108-byte object <0B-00 00-00 00-69 EB-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 E0-2E EC-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 80-62 EB-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 C0-75 EF-56 54-00 00-00 54-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 2A-00 00-00 01-38 66-37>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3538: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/66 (108-byte object <0C-00 00-00 80-59 EB-56 20-00 00-00 20-00 00-00 36-30 35-66 38-32 31-63 64-61 33-30 80-50 EB-56 20-00 00-00 20-00 00-00 61-34 30-61 31-65 34-63 39-37 35-36 50-5C ED-56 28-00 00-00 28-00 00-00 33-64 63-35 64-39 64-35 36-35 36-31 B0-61 E4-56 80-00 00-00 80-00 00-00 39-32 63-38 31-32 38-62 35-64 33-63 40-00 00-00 01-38 66-37>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3539: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/67 (108-byte object <0C-00 00-00 90-29 DA-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 E0-40 EC-56 20-00 00-00 20-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 40-B2 EB-56 28-00 00-00 28-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 40-62 E4-56 80-00 00-00 80-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 40-00 00-00 01-64 37-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3540: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/68 (108-byte object <0C-00 00-00 50-5C ED-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 00-AE EB-56 20-00 00-00 20-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 E0-A5 EB-56 28-00 00-00 28-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 B0-61 E4-56 80-00 00-00 80-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 40-00 00-00 01-64 37-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3541: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/69 (108-byte object <0C-00 00-00 60-FE EB-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 80-62 EB-56 20-00 00-00 20-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 F0-F9 EB-56 28-00 00-00 28-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 40-62 E4-56 80-00 00-00 80-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 40-00 00-00 01-64 37-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3542: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/70 (108-byte object <0C-00 00-00 E0-A5 EB-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 B0-F5 EB-56 20-00 00-00 20-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 30-ED EB-56 28-00 00-00 28-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 B0-61 E4-56 80-00 00-00 80-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 40-00 00-00 01-64 37-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3543: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/71 (108-byte object <0C-00 00-00 80-A0 EF-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 40-B2 EB-56 20-00 00-00 20-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 40-9C EF-56 28-00 00-00 28-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 40-62 E4-56 80-00 00-00 80-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 40-00 00-00 01-64 37-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3544: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/72 (108-byte object <0D-00 00-00 A0-8A EF-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 A0-9D F1-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 20-C8 EA-56 00-00 00-00 00-38 66-36 61-32 62-66 37-37 32-65 62-65 66-61 C0-93 EF-56 28-00 00-00 28-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 14-00 00-00 01-64 37-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3545: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/73 (108-byte object <0D-00 00-00 40-B2 EB-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 90-1B F2-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 40-9C EF-56 28-00 00-00 28-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 14-00 00-00 01-64 37-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3546: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/74 (108-byte object <0D-00 00-00 C0-93 EF-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 A0-9D F1-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 20-C8 EA-56 00-00 00-00 00-38 66-36 61-32 62-66 37-37 32-65 62-65 66-61 70-F1 EB-56 28-00 00-00 28-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 14-00 00-00 01-64 37-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3547: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/75 (108-byte object <0D-00 00-00 10-EE EF-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 90-1B F2-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 80-82 EF-56 28-00 00-00 28-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 14-00 00-00 01-64 37-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3548: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/76 (108-byte object <0D-00 00-00 70-F1 EB-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 A0-9D F1-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 20-C8 EA-56 00-00 00-00 00-38 66-36 61-32 62-66 37-37 32-65 62-65 66-61 D0-04 F0-56 28-00 00-00 28-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 14-00 00-00 01-64 37-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3549: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/77 (108-byte object <0D-00 00-00 90-55 F0-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 90-1B F2-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 20-5A F0-56 28-00 00-00 28-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 14-00 00-00 01-64 37-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3550: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/78 (108-byte object <0E-00 00-00 00-98 EF-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 A0-9D F1-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 20-C8 EA-56 00-00 00-00 00-38 66-36 61-32 62-66 37-37 32-65 62-65 66-61 50-9D BD-56 54-00 00-00 54-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 2A-00 00-00 01-64 37-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3551: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/79 (108-byte object <0E-00 00-00 20-5A F0-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 90-1B F2-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 30-31 C2-56 54-00 00-00 54-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 2A-00 00-00 01-64 37-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3552: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/80 (108-byte object <0E-00 00-00 E0-47 F0-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 A0-9D F1-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 20-C8 EA-56 00-00 00-00 00-38 66-36 61-32 62-66 37-37 32-65 62-65 66-61 50-9D BD-56 54-00 00-00 54-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 2A-00 00-00 01-64 37-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3553: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/81 (108-byte object <0E-00 00-00 80-82 EF-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 90-1B F2-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 30-31 C2-56 54-00 00-00 54-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 2A-00 00-00 01-64 37-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3554: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/82 (108-byte object <0E-00 00-00 30-6D DC-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 A0-9D F1-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 20-C8 EA-56 00-00 00-00 00-38 66-36 61-32 62-66 37-37 32-65 62-65 66-61 50-9D BD-56 54-00 00-00 54-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 2A-00 00-00 01-64 37-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3555: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/83 (108-byte object <0E-00 00-00 B0-C6 F0-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 90-1B F2-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 62-66 37-37 32-65 62-65 66-61 30-31 C2-56 54-00 00-00 54-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 2A-00 00-00 01-64 37-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3556: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/84 (108-byte object <0F-00 00-00 60-B1 F0-56 20-00 00-00 20-00 00-00 66-39 38-36 39-64 30-63 32-36 31-35 A0-9D F1-56 3C-00 00-00 3C-00 00-00 64-63 34-66 37-31 33-62 34-64 62-63 90-62 E4-56 00-00 00-00 00-38 66-36 61-32 62-66 37-37 32-65 62-65 66-61 40-4D E4-56 80-00 00-00 80-00 00-00 38-30 65-61 31-66 64-36 38-62 39-64 40-00 00-00 01-64 37-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3557: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/85 (108-byte object <0F-00 00-00 E0-A7 F0-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 30-06 F2-56 00-00 00-00 00-62 37-33 63-65 32-33 34-63 66-36 62-66 39-31 B0-61 E4-56 80-00 00-00 80-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 40-00 00-00 01-38 63-62>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3558: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/86 (108-byte object <0F-00 00-00 D0-4F F2-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 90-62 E4-56 00-00 00-00 00-62 37-33 63-65 32-33 34-63 66-36 62-66 39-31 40-4D E4-56 80-00 00-00 80-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 40-00 00-00 01-38 63-62>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3559: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/87 (108-byte object <0F-00 00-00 80-4D F2-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 30-06 F2-56 00-00 00-00 00-62 37-33 63-65 32-33 34-63 66-36 62-66 39-31 B0-61 E4-56 80-00 00-00 80-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 40-00 00-00 01-38 63-62>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3560: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/88 (108-byte object <0F-00 00-00 00-4D F2-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 90-62 E4-56 00-00 00-00 00-62 37-33 63-65 32-33 34-63 66-36 62-66 39-31 40-4D E4-56 80-00 00-00 80-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 40-00 00-00 01-38 63-62>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3561: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/89 (108-byte object <0F-00 00-00 70-41 F2-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 30-06 F2-56 00-00 00-00 00-62 37-33 63-65 32-33 34-63 66-36 62-66 39-31 B0-61 E4-56 80-00 00-00 80-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 40-00 00-00 01-38 63-62>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3562: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/90 (108-byte object <10-00 00-00 60-06 F3-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 00-00 DD-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 C0-01 F3-56 28-00 00-00 28-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 14-00 00-00 01-38 63-62>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3563: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/91 (108-byte object <10-00 00-00 10-C2 F0-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 60-F8 F2-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 40-2A F3-56 28-00 00-00 28-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 14-00 00-00 01-38 63-62>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3564: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/92 (108-byte object <10-00 00-00 00-00 DD-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 C0-01 F3-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 30-36 F3-56 28-00 00-00 28-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 14-00 00-00 01-38 63-62>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3565: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/93 (108-byte object <10-00 00-00 E0-32 F3-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 00-4E F2-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 50-33 F1-56 28-00 00-00 28-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 14-00 00-00 01-38 63-62>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3566: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/94 (108-byte object <10-00 00-00 C0-01 F3-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 30-36 F3-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 50-45 F1-56 28-00 00-00 28-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 14-00 00-00 01-38 63-62>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3567: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/95 (108-byte object <10-00 00-00 D0-37 F1-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 D0-40 F1-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 B0-76 F1-56 28-00 00-00 28-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 14-00 00-00 01-38 63-62>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3568: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/96 (108-byte object <11-00 00-00 50-45 F1-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 B0-86 F1-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 C0-75 EF-56 54-00 00-00 54-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 2A-00 00-00 01-38 63-62>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3569: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/97 (108-byte object <11-00 00-00 D0-40 F1-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 B0-76 F1-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 50-9D BD-56 54-00 00-00 54-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 2A-00 00-00 01-38 63-62>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3570: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/98 (108-byte object <11-00 00-00 E0-FA F1-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 A0-0F F3-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 C0-75 EF-56 54-00 00-00 54-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 2A-00 00-00 01-38 63-62>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3571: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/99 (108-byte object <11-00 00-00 B0-76 F1-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 F0-F4 F1-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 50-9D BD-56 54-00 00-00 54-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 2A-00 00-00 01-38 63-62>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3572: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/100 (108-byte object <11-00 00-00 A0-0F F3-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 00-EF F1-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 C0-75 EF-56 54-00 00-00 54-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 2A-00 00-00 01-38 63-62>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3573: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/101 (108-byte object <11-00 00-00 50-A1 C5-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 90-1B F2-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 D0-F9 DE-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 50-9D BD-56 54-00 00-00 54-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 2A-00 00-00 01-38 63-62>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3574: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/102 (108-byte object <12-00 00-00 00-EF F1-56 20-00 00-00 20-00 00-00 32-33 39-35 35-31 61-63 61-32 31-62 A0-9D F1-56 3C-00 00-00 3C-00 00-00 63-36 34-63 62-36 63-64 35-30 33-63 C0-A9 E0-56 28-00 00-00 28-00 00-00 63-65 32-33 34-63 66-36 62-66 39-31 40-62 E4-56 80-00 00-00 80-00 00-00 39-39 61-33 39-63 34-30 32-65 33-32 40-00 00-00 01-38 63-62>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3575: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/103 (108-byte object <12-00 00-00 B0-AF D1-56 20-00 00-00 20-00 00-00 32-38 31-36 39-35 35-31 35-39 38-37 90-1B F2-56 3C-00 00-00 3C-00 00-00 36-37 64-39 35-62 31-30 31-35 39-32 00-48 C9-56 28-00 00-00 28-00 00-00 37-65 61-38 32-62 61-30 37-35 64-39 40-4D E4-56 80-00 00-00 80-00 00-00 37-64 38-63 61-62 62-33 33-33 36-34 40-00 00-00 01-39 36-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3576: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/104 (108-byte object <12-00 00-00 C0-A9 E0-56 20-00 00-00 20-00 00-00 32-38 31-36 39-35 35-31 35-39 38-37 A0-9D F1-56 3C-00 00-00 3C-00 00-00 36-37 64-39 35-62 31-30 31-35 39-32 10-32 D3-56 28-00 00-00 28-00 00-00 37-65 61-38 32-62 61-30 37-35 64-39 40-62 E4-56 80-00 00-00 80-00 00-00 37-64 38-63 61-62 62-33 33-33 36-34 40-00 00-00 01-39 36-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3577: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/105 (108-byte object <12-00 00-00 00-48 C9-56 20-00 00-00 20-00 00-00 32-38 31-36 39-35 35-31 35-39 38-37 90-1B F2-56 3C-00 00-00 3C-00 00-00 36-37 64-39 35-62 31-30 31-35 39-32 B0-38 D4-56 28-00 00-00 28-00 00-00 37-65 61-38 32-62 61-30 37-35 64-39 40-4D E4-56 80-00 00-00 80-00 00-00 37-64 38-63 61-62 62-33 33-33 36-34 40-00 00-00 01-39 36-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3578: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/106 (108-byte object <12-00 00-00 10-32 D3-56 20-00 00-00 20-00 00-00 32-38 31-36 39-35 35-31 35-39 38-37 A0-9D F1-56 3C-00 00-00 3C-00 00-00 36-37 64-39 35-62 31-30 31-35 39-32 D0-F9 DE-56 28-00 00-00 28-00 00-00 37-65 61-38 32-62 61-30 37-35 64-39 40-62 E4-56 80-00 00-00 80-00 00-00 37-64 38-63 61-62 62-33 33-33 36-34 40-00 00-00 01-39 36-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3579: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/107 (108-byte object <12-00 00-00 B0-38 D4-56 20-00 00-00 20-00 00-00 32-38 31-36 39-35 35-31 35-39 38-37 90-1B F2-56 3C-00 00-00 3C-00 00-00 36-37 64-39 35-62 31-30 31-35 39-32 30-4C E0-56 28-00 00-00 28-00 00-00 37-65 61-38 32-62 61-30 37-35 64-39 40-4D E4-56 80-00 00-00 80-00 00-00 37-64 38-63 61-62 62-33 33-33 36-34 40-00 00-00 01-39 36-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3580: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/108 (108-byte object <13-00 00-00 30-36 F3-56 20-00 00-00 20-00 00-00 32-38 31-36 39-35 35-31 35-39 38-37 40-62 E4-56 80-00 00-00 80-00 00-00 36-37 64-39 35-62 31-30 31-35 39-32 00-62 E4-56 00-00 00-00 00-39 35-35 37-65 61-38 32-62 61-30 37-35 64-39 30-31 C2-56 54-00 00-00 54-00 00-00 37-64 38-63 61-62 62-33 33-33 36-34 2A-00 00-00 01-39 36-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3581: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/109 (108-byte object <13-00 00-00 30-4C E0-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 40-4D E4-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 30-06 F2-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 C0-75 EF-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3582: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/110 (108-byte object <13-00 00-00 E0-BD F6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 40-62 E4-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-62 E4-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 30-31 C2-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3583: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/111 (108-byte object <13-00 00-00 10-C8 F6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 40-4D E4-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 30-06 F2-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 C0-75 EF-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3584: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/112 (108-byte object <13-00 00-00 90-CC F6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 40-62 E4-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 00-62 E4-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 30-31 C2-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3585: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/113 (108-byte object <13-00 00-00 10-D1 F6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 40-4D E4-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 30-06 F2-56 00-00 00-00 00-64 62-66 64-61 38-66 61-38 65-64 37-61 38-32 C0-75 EF-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3586: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/114 (108-byte object <14-00 00-00 10-DA F6-56 20-00 00-00 20-00 00-00 62-61 66-38 33-64 32-61 63-39 35-36 40-62 E4-56 80-00 00-00 80-00 00-00 32-62 32-65 37-33 31-31 36-32 33-64 D0-F9 DE-56 28-00 00-00 28-00 00-00 64-61 38-66 61-38 65-64 37-61 38-32 30-31 C2-56 54-00 00-00 54-00 00-00 61-64 66-37 63-39 64-33 38-38 65-35 2A-00 00-00 01-64 32-34>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3587: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/115 (108-byte object <14-00 00-00 F0-DC F6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-4D E4-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 20-DD F6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C0-75 EF-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3588: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/116 (108-byte object <14-00 00-00 D0-F9 DE-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-62 E4-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 80-DD F6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 30-31 C2-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3589: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/117 (108-byte object <14-00 00-00 20-DD F6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-4D E4-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 30-E2 F6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C0-75 EF-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3590: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/118 (108-byte object <14-00 00-00 80-DD F6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-62 E4-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 E0-E6 F6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 30-31 C2-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3591: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/119 (108-byte object <14-00 00-00 30-E2 F6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-4D E4-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-EB F6-56 28-00 00-00 28-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 C0-75 EF-56 54-00 00-00 54-00 00-00 33-66 65-38 34-61 31-61 36-36 32-31 2A-00 00-00 01-66 30-31>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3592: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/120 (108-byte object <15-00 00-00 90-D5 F6-56 20-00 00-00 20-00 00-00 64-31 38-31 62-39 34-33 31-32 31-35 40-62 E4-56 80-00 00-00 80-00 00-00 33-30 31-39 64-36 31-63 35-30 66-61 90-F4 F6-56 10-00 00-00 10-00 00-00 34-63 38-34 39-61 32-37 36-62 30-63 B0-78 F7-56 80-7F 00-00 80-7F 00-00 33-66 65-38 34-61 31-61 36-36 32-31 C0-3F 00-00 01-66 30-31>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3593: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/121 (108-byte object <15-00 00-00 90-EB F6-56 20-00 00-00 20-00 00-00 61-61 36-65 64-35 34-36 30-36 62-61 40-4D E4-56 80-00 00-00 80-00 00-00 36-38 34-38 63-30 38-64 37-39 63-30 70-F4 F6-56 10-00 00-00 10-00 00-00 32-64 61-65 34-64 36-33 61-30 66-66 00-F9 F7-56 80-7F 00-00 80-7F 00-00 66-32 38-39 34-36 66-33 61-66 35-38 C0-3F 00-00 01-35 66-63>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3594: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/122 (108-byte object <15-00 00-00 F0-F4 F6-56 20-00 00-00 20-00 00-00 61-61 36-65 64-35 34-36 30-36 62-61 40-62 E4-56 80-00 00-00 80-00 00-00 36-38 34-38 63-30 38-64 37-39 63-30 80-F8 F7-56 10-00 00-00 10-00 00-00 32-64 61-65 34-64 36-33 61-30 66-66 C0-78 F9-56 80-7F 00-00 80-7F 00-00 66-32 38-39 34-36 66-33 61-66 35-38 C0-3F 00-00 01-35 66-63>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3595: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/123 (108-byte object <15-00 00-00 B0-F4 F6-56 20-00 00-00 20-00 00-00 61-61 36-65 64-35 34-36 30-36 62-61 40-4D E4-56 80-00 00-00 80-00 00-00 36-38 34-38 63-30 38-64 37-39 63-30 20-7B F8-56 10-00 00-00 10-00 00-00 32-64 61-65 34-64 36-33 61-30 66-66 00-F9 F7-56 80-7F 00-00 80-7F 00-00 66-32 38-39 34-36 66-33 61-66 35-38 C0-3F 00-00 01-35 66-63>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3596: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/124 (108-byte object <15-00 00-00 00-81 F8-56 20-00 00-00 20-00 00-00 61-61 36-65 64-35 34-36 30-36 62-61 40-62 E4-56 80-00 00-00 80-00 00-00 36-38 34-38 63-30 38-64 37-39 63-30 40-7F F8-56 10-00 00-00 10-00 00-00 32-64 61-65 34-64 36-33 61-30 66-66 C0-78 F9-56 80-7F 00-00 80-7F 00-00 66-32 38-39 34-36 66-33 61-66 35-38 C0-3F 00-00 01-35 66-63>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3597: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/125 (108-byte object <15-00 00-00 40-85 F8-56 20-00 00-00 20-00 00-00 61-61 36-65 64-35 34-36 30-36 62-61 40-4D E4-56 80-00 00-00 80-00 00-00 36-38 34-38 63-30 38-64 37-39 63-30 80-83 F8-56 10-00 00-00 10-00 00-00 32-64 61-65 34-64 36-33 61-30 66-66 00-F9 F7-56 80-7F 00-00 80-7F 00-00 66-32 38-39 34-36 66-33 61-66 35-38 C0-3F 00-00 01-35 66-63>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3598: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/126 (108-byte object <16-00 00-00 80-89 F8-56 20-00 00-00 20-00 00-00 61-61 36-65 64-35 34-36 30-36 62-61 40-62 E4-56 80-00 00-00 80-00 00-00 36-38 34-38 63-30 38-64 37-39 63-30 C0-EF F6-56 10-00 00-00 10-00 00-00 32-64 61-65 34-64 36-33 61-30 66-66 18-62 E4-56 00-00 00-00 00-34 35-37 66-32 38-39 34-36 66-33 61-66 35-38 C1-3F 00-00 00-35 66-63>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3599: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/127 (108-byte object <16-00 00-00 E0-8D F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 40-4D E4-56 80-00 00-00 80-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 20-8C F8-56 10-00 00-00 10-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 48-06 F2-56 00-00 00-00 00-62 63-35 66-66 33-32 65-37 39-31 33-39 31-30 C1-3F 00-00 00-63 64-34>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3600: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/128 (108-byte object <16-00 00-00 20-92 F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 40-62 E4-56 80-00 00-00 80-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 60-90 F8-56 10-00 00-00 10-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 18-62 E4-56 00-00 00-00 00-62 63-35 66-66 33-32 65-37 39-31 33-39 31-30 C1-3F 00-00 00-63 64-34>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3601: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/129 (108-byte object <16-00 00-00 60-96 F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 40-4D E4-56 80-00 00-00 80-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 A0-94 F8-56 10-00 00-00 10-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 48-06 F2-56 00-00 00-00 00-62 63-35 66-66 33-32 65-37 39-31 33-39 31-30 C1-3F 00-00 00-63 64-34>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3602: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/130 (108-byte object <16-00 00-00 A0-9A F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 40-62 E4-56 80-00 00-00 80-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 E0-98 F8-56 10-00 00-00 10-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 18-62 E4-56 00-00 00-00 00-62 63-35 66-66 33-32 65-37 39-31 33-39 31-30 C1-3F 00-00 00-63 64-34>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3603: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/131 (108-byte object <16-00 00-00 00-A7 F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 40-4D E4-56 80-00 00-00 80-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 20-9D F8-56 10-00 00-00 10-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 48-06 F2-56 00-00 00-00 00-62 63-35 66-66 33-32 65-37 39-31 33-39 31-30 C1-3F 00-00 00-63 64-34>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3604: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/132 (108-byte object <17-00 00-00 80-AF F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 08-C8 EA-56 00-00 00-00 00-66 30-32 38-62 30-39 38-38 35-33 64-37 37-63 E0-E6 F6-56 28-00 00-00 28-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 60-43 E4-56 40-00 00-00 40-00 00-00 66-66 33-32 65-37 39-31 33-39 31-30 20-00 00-00 01-63 64-34>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3605: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/133 (108-byte object <17-00 00-00 40-B2 F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 18-06 F2-56 00-00 00-00 00-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 70-B2 F8-56 28-00 00-00 28-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 A0-9D F1-56 40-00 00-00 40-00 00-00 66-66 33-32 65-37 39-31 33-39 31-30 20-00 00-00 01-63 64-34>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3606: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/134 (108-byte object <17-00 00-00 E0-E6 F6-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 08-C8 EA-56 00-00 00-00 00-66 30-32 38-62 30-39 38-38 35-33 64-37 37-63 D0-B2 F8-56 28-00 00-00 28-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 60-43 E4-56 40-00 00-00 40-00 00-00 66-66 33-32 65-37 39-31 33-39 31-30 20-00 00-00 01-63 64-34>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3607: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/135 (108-byte object <17-00 00-00 70-B2 F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 18-06 F2-56 00-00 00-00 00-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 E0-B6 F8-56 28-00 00-00 28-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 A0-9D F1-56 40-00 00-00 40-00 00-00 66-66 33-32 65-37 39-31 33-39 31-30 20-00 00-00 01-63 64-34>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3608: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/136 (108-byte object <17-00 00-00 D0-B2 F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 08-C8 EA-56 00-00 00-00 00-66 30-32 38-62 30-39 38-38 35-33 64-37 37-63 F0-BA F8-56 28-00 00-00 28-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 60-43 E4-56 40-00 00-00 40-00 00-00 66-66 33-32 65-37 39-31 33-39 31-30 20-00 00-00 01-63 64-34>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3609: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/137 (108-byte object <17-00 00-00 E0-B6 F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 18-06 F2-56 00-00 00-00 00-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 00-BF F8-56 28-00 00-00 28-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 A0-9D F1-56 40-00 00-00 40-00 00-00 66-66 33-32 65-37 39-31 33-39 31-30 20-00 00-00 01-63 64-34>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3610: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/138 (108-byte object <18-00 00-00 F0-BA F8-56 20-00 00-00 20-00 00-00 62-32 36-61 30-30 33-34 33-31 61-37 B0-61 E4-56 80-00 00-00 80-00 00-00 38-62 30-39 38-38 35-33 64-37 37-63 10-C3 F8-56 28-00 00-00 28-00 00-00 37-64 33-30 34-66 63-66 63-38 35-38 60-43 E4-56 40-00 00-00 40-00 00-00 66-66 33-32 65-37 39-31 33-39 31-30 20-00 00-00 01-63 64-34>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3611: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/139 (108-byte object <18-00 00-00 00-BF F8-56 20-00 00-00 20-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-62 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-C7 F8-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 A0-9D F1-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3612: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/140 (108-byte object <18-00 00-00 10-C3 F8-56 20-00 00-00 20-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-61 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 30-CB F8-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 60-43 E4-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3613: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/141 (108-byte object <18-00 00-00 20-C7 F8-56 20-00 00-00 20-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-62 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 D0-CF F8-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 A0-9D F1-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3614: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/142 (108-byte object <18-00 00-00 30-CB F8-56 20-00 00-00 20-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-61 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 70-D4 F8-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 60-43 E4-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3615: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/143 (108-byte object <18-00 00-00 D0-CF F8-56 20-00 00-00 20-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-62 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 10-D9 F8-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 A0-9D F1-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3616: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/144 (108-byte object <19-00 00-00 70-D4 F8-56 20-00 00-00 20-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-61 E4-56 82-00 00-00 82-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-DD F8-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 60-43 E4-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3617: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/145 (108-byte object <19-00 00-00 10-D9 F8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-62 E4-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 50-E2 F8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-9D F1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3618: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/146 (108-byte object <19-00 00-00 B0-DD F8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-61 E4-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 F0-E6 F8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 60-43 E4-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3619: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/147 (108-byte object <19-00 00-00 50-E2 F8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-62 E4-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 90-EB F8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-9D F1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3620: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/148 (108-byte object <19-00 00-00 F0-E6 F8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-61 E4-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 30-F0 F8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 60-43 E4-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3621: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/149 (108-byte object <19-00 00-00 90-EB F8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 40-62 E4-56 82-00 00-00 82-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 D0-F4 F8-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 A0-9D F1-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3622: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/150 (108-byte object <1A-00 00-00 30-F0 F8-56 20-00 00-00 20-00 00-00 65-66 37-36 62-38 64-65 36-37 63-61 B0-61 E4-56 80-00 00-00 80-00 00-00 33-38 61-31 62-64 34-33 36-61 37-62 00-FB F7-56 28-00 00-00 28-00 00-00 65-64 30-61 30-30 62-30 64-33 34-65 60-43 E4-56 40-00 00-00 40-00 00-00 65-32 65-63 63-31 63-37 37-65 32-33 20-00 00-00 01-35 35-31>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3623: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/151 (108-byte object <1A-00 00-00 D0-F4 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 40-62 E4-56 80-00 00-00 80-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 F0-FE F7-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3624: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/152 (108-byte object <1A-00 00-00 00-FB F7-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 B0-61 E4-56 80-00 00-00 80-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 90-03 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3625: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/153 (108-byte object <1A-00 00-00 F0-FE F7-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 40-62 E4-56 80-00 00-00 80-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-08 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3626: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/154 (108-byte object <1A-00 00-00 90-03 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 B0-61 E4-56 80-00 00-00 80-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 D0-0C F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3627: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/155 (108-byte object <1A-00 00-00 30-08 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 40-62 E4-56 80-00 00-00 80-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 70-11 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3628: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/156 (108-byte object <1B-00 00-00 D0-0C F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 50-1A F8-56 10-00 00-00 10-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 10-16 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3629: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/157 (108-byte object <1B-00 00-00 70-11 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 30-1A F8-56 10-00 00-00 10-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 B0-1A F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3630: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/158 (108-byte object <1B-00 00-00 10-16 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 10-1F F8-56 10-00 00-00 10-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 90-1F F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3631: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/159 (108-byte object <1B-00 00-00 B0-1A F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 40-23 F8-56 10-00 00-00 10-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 C0-23 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3632: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/160 (108-byte object <1B-00 00-00 90-1F F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 70-27 F8-56 10-00 00-00 10-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 F0-27 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3633: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/161 (108-byte object <1B-00 00-00 C0-23 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-2B F8-56 10-00 00-00 10-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-2C F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3634: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/162 (108-byte object <1C-00 00-00 50-30 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 80-34 F8-56 20-00 00-00 20-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 A0-B2 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3635: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/163 (108-byte object <1C-00 00-00 20-2C F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 70-38 F8-56 20-00 00-00 20-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 A0-38 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3636: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/164 (108-byte object <1C-00 00-00 80-34 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-B2 F8-56 20-00 00-00 20-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 00-39 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3637: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/165 (108-byte object <1C-00 00-00 70-38 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-38 F8-56 20-00 00-00 20-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-39 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3638: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/166 (108-byte object <1C-00 00-00 A0-B2 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 00-39 F8-56 20-00 00-00 20-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 70-3D F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3639: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/167 (108-byte object <1C-00 00-00 A0-38 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 30-39 F8-56 20-00 00-00 20-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 B0-41 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3640: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/168 (108-byte object <1D-00 00-00 70-3D F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-BF B8-56 30-00 00-00 30-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 F0-45 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3641: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/169 (108-byte object <1D-00 00-00 30-39 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-86 E6-56 30-00 00-00 30-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 B0-41 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3642: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/170 (108-byte object <1D-00 00-00 F0-45 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-BF B8-56 30-00 00-00 30-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 D0-38 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3643: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/171 (108-byte object <1D-00 00-00 B0-41 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-86 E6-56 30-00 00-00 30-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 40-AB F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3644: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/172 (108-byte object <1D-00 00-00 D0-38 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-BF B8-56 30-00 00-00 30-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 D0-5A F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3645: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/173 (108-byte object <1D-00 00-00 40-AB F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-86 E6-56 30-00 00-00 30-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-5F F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3646: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/174 (108-byte object <1E-00 00-00 D0-5A F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-90 D7-56 40-00 00-00 40-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 70-63 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 90-6B F8-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3647: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/175 (108-byte object <1E-00 00-00 20-5F F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 C0-67 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-6C F8-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3648: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/176 (108-byte object <1E-00 00-00 70-63 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-90 D7-56 40-00 00-00 40-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 00-6D F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 90-6B F8-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3649: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/177 (108-byte object <1E-00 00-00 C0-67 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 B0-71 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-6C F8-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3650: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/178 (108-byte object <1E-00 00-00 00-6D F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-90 D7-56 40-00 00-00 40-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 10-76 F8-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 90-6B F8-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3651: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/179 (108-byte object <1E-00 00-00 B0-71 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 A0-7A F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-6C F8-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3652: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/180 (108-byte object <1F-00 00-00 10-76 F8-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 50-9D BD-56 50-00 00-00 50-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 00-7F F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3653: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/181 (108-byte object <1F-00 00-00 A0-7A F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 30-31 C2-56 50-00 00-00 50-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 60-83 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3654: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/182 (108-byte object <1F-00 00-00 00-7F F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 50-9D BD-56 50-00 00-00 50-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 C0-87 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3655: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/183 (108-byte object <1F-00 00-00 60-83 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 30-31 C2-56 50-00 00-00 50-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 E0-8B F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3656: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/184 (108-byte object <1F-00 00-00 C0-87 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 50-9D BD-56 50-00 00-00 50-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 00-90 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3657: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/185 (108-byte object <1F-00 00-00 E0-8B F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 30-31 C2-56 50-00 00-00 50-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-94 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3658: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/186 (108-byte object <20-00 00-00 00-90 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 F0-9D F1-56 60-00 00-00 60-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 40-98 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3659: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/187 (108-byte object <20-00 00-00 20-94 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 D0-9E F1-56 60-00 00-00 60-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 B0-9C F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3660: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/188 (108-byte object <20-00 00-00 40-98 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 F0-9D F1-56 60-00 00-00 60-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 90-A1 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3661: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/189 (108-byte object <20-00 00-00 B0-9C F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 D0-9E F1-56 60-00 00-00 60-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 10-A6 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3662: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/190 (108-byte object <20-00 00-00 90-A1 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 F0-9D F1-56 60-00 00-00 60-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 90-AA F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3663: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/191 (108-byte object <20-00 00-00 10-A6 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 D0-9E F1-56 60-00 00-00 60-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 10-AF F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3664: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/192 (108-byte object <21-00 00-00 90-AA F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-BC F9-56 70-00 00-00 70-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 90-B3 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3665: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/193 (108-byte object <21-00 00-00 10-AF F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-BD F9-56 70-00 00-00 70-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 10-B8 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3666: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/194 (108-byte object <21-00 00-00 90-B3 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-BC F9-56 70-00 00-00 70-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 90-BE F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3667: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/195 (108-byte object <21-00 00-00 10-B8 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-BD F9-56 70-00 00-00 70-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-C3 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3668: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/196 (108-byte object <21-00 00-00 90-BE F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-BC F9-56 70-00 00-00 70-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 B0-C7 F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-43 E4-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3669: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/197 (108-byte object <21-00 00-00 20-C3 F9-56 20-00 00-00 20-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 90-BD F9-56 70-00 00-00 70-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 40-CC F9-56 28-00 00-00 28-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 A0-9D F1-56 40-00 00-00 40-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 20-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3670: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/198 (108-byte object <22-00 00-00 B0-C7 F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 08-C8 EA-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-C8 EA-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 D0-D0 F9-56 28-00 00-00 28-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 14-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3671: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/199 (108-byte object <22-00 00-00 40-CC F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 18-06 F2-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 60-D5 F9-56 28-00 00-00 28-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 14-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3672: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/200 (108-byte object <22-00 00-00 D0-D0 F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 08-C8 EA-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-C8 EA-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 F0-D9 F9-56 28-00 00-00 28-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 14-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3673: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/201 (108-byte object <22-00 00-00 60-D5 F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 18-06 F2-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 30-DD F9-56 28-00 00-00 28-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 14-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3674: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/202 (108-byte object <22-00 00-00 F0-D9 F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 08-C8 EA-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-C8 EA-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 70-E0 F9-56 28-00 00-00 28-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 14-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3675: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/203 (108-byte object <22-00 00-00 30-DD F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 18-06 F2-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 B0-E3 F9-56 28-00 00-00 28-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 14-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3676: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/204 (108-byte object <23-00 00-00 00-39 F8-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 08-C8 EA-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-C8 EA-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 C0-75 EF-56 54-00 00-00 54-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 2A-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3677: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/205 (108-byte object <23-00 00-00 B0-E3 F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 18-06 F2-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 50-9D BD-56 54-00 00-00 54-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 2A-00 00-00 01-61 35-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3678: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/206 (108-byte object <23-00 00-00 B0-EA F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 08-C8 EA-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-C8 EA-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 C0-75 EF-56 54-00 00-00 54-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 2A-00 00-00 01-61 35-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3679: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/207 (108-byte object <23-00 00-00 E0-F2 F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 18-06 F2-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 50-9D BD-56 54-00 00-00 54-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 2A-00 00-00 01-61 35-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3680: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/208 (108-byte object <23-00 00-00 D0-F6 F9-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 08-C8 EA-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 20-C8 EA-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 C0-75 EF-56 54-00 00-00 54-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 2A-00 00-00 01-61 35-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3681: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/209 (108-byte object <23-00 00-00 30-FC F6-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 18-06 F2-56 00-00 00-00 00-00 00-00 36-35 65-63 61-37 63-64 39-31 62-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-32 65-62 34-65 38-64 35-30 66-66 50-9D BD-56 54-00 00-00 54-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 2A-00 00-00 01-61 35-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3682: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/210 (108-byte object <24-00 00-00 20-00 F7-56 28-00 00-00 28-00 00-00 36-32 62-38 61-65 34-66 34-38 62-39 78-62 E4-56 00-00 00-00 00-30 38-38 36-35 65-63 61-37 63-64 39-31 62-33 90-62 E4-56 00-00 00-00 00-62 66-62 61-32 65-62 34-65 38-64 35-30 66-66 40-4D E4-56 80-00 00-00 80-00 00-00 38-63 34-36 63-64 64-37 37-36 35-33 40-00 00-00 01-61 35-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3683: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/211 (108-byte object <24-00 00-00 10-04 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 30-06 F2-56 00-00 00-00 00-65 35-63 35-34 63-65 61-33 38-38 38-63 61-61 B0-61 E4-56 80-00 00-00 80-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 40-00 00-00 01-32 31-65>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3684: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/212 (108-byte object <24-00 00-00 30-08 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 78-62 E4-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 90-62 E4-56 00-00 00-00 00-65 35-63 35-34 63-65 61-33 38-38 38-63 61-61 40-4D E4-56 80-00 00-00 80-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 40-00 00-00 01-32 31-65>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3685: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/213 (108-byte object <24-00 00-00 50-0C F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 30-06 F2-56 00-00 00-00 00-65 35-63 35-34 63-65 61-33 38-38 38-63 61-61 B0-61 E4-56 80-00 00-00 80-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 40-00 00-00 01-32 31-65>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3686: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/214 (108-byte object <24-00 00-00 70-10 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 78-62 E4-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 90-62 E4-56 00-00 00-00 00-65 35-63 35-34 63-65 61-33 38-38 38-63 61-61 40-4D E4-56 80-00 00-00 80-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 40-00 00-00 01-32 31-65>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3687: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/215 (108-byte object <24-00 00-00 90-14 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 30-06 F2-56 00-00 00-00 00-65 35-63 35-34 63-65 61-33 38-38 38-63 61-61 B0-61 E4-56 80-00 00-00 80-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 40-00 00-00 01-32 31-65>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3688: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/216 (108-byte object <25-00 00-00 70-E0 F9-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 08-C8 EA-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 30-1F F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 60-1F F7-56 28-00 00-00 28-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 14-00 00-00 01-32 31-65>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3689: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/217 (108-byte object <25-00 00-00 10-20 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 40-20 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 70-20 F7-56 28-00 00-00 28-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 14-00 00-00 01-32 31-65>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3690: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/218 (108-byte object <25-00 00-00 30-1F F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 08-C8 EA-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 60-1F F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 D0-20 F7-56 28-00 00-00 28-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 14-00 00-00 01-32 31-65>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3691: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/219 (108-byte object <25-00 00-00 40-20 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 70-20 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 00-21 F7-56 28-00 00-00 28-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 14-00 00-00 01-32 31-65>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3692: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/220 (108-byte object <25-00 00-00 60-1F F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 08-C8 EA-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 D0-20 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 F0-24 F7-56 28-00 00-00 28-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 14-00 00-00 01-32 31-65>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3693: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/221 (108-byte object <25-00 00-00 70-20 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 00-21 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 E0-28 F7-56 28-00 00-00 28-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 14-00 00-00 01-32 31-65>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3694: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/222 (108-byte object <26-00 00-00 F0-24 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 08-C8 EA-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 D0-2C F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 30-31 C2-56 54-00 00-00 54-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 2A-00 00-00 01-32 31-65>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3695: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/223 (108-byte object <26-00 00-00 00-21 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 E0-28 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 C0-75 EF-56 54-00 00-00 54-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 2A-00 00-00 01-32 31-65>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3696: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/224 (108-byte object <26-00 00-00 D0-2C F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 08-C8 EA-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 A0-20 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 30-31 C2-56 54-00 00-00 54-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 2A-00 00-00 01-32 31-65>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3697: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/225 (108-byte object <26-00 00-00 E0-28 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 B0-18 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 C0-75 EF-56 54-00 00-00 54-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 2A-00 00-00 01-32 31-65>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3698: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/226 (108-byte object <26-00 00-00 A0-20 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 08-C8 EA-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 20-40 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 30-31 C2-56 54-00 00-00 54-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 2A-00 00-00 01-32 31-65>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3699: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/227 (108-byte object <26-00 00-00 B0-18 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 18-06 F2-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 40-44 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 C0-75 EF-56 54-00 00-00 54-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 2A-00 00-00 01-32 31-65>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3700: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/228 (108-byte object <27-00 00-00 20-40 F7-56 28-00 00-00 28-00 00-00 37-35 36-30 33-64 33-62 65-63 32-38 E8-61 E4-56 00-00 00-00 00-64 64-65 32-31 63-62 32-61 64-34 31-37 30-38 60-48 F7-56 28-00 00-00 28-00 00-00 35-34 63-65 61-33 38-38 38-63 61-61 40-62 E4-56 80-00 00-00 80-00 00-00 33-36 35-31 61-33 37-63 64-65 30-62 40-00 00-00 01-32 31-65>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3701: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/229 (108-byte object <27-00 00-00 40-44 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 18-06 F2-56 00-00 00-00 00-34 33-30 36-62 35-32 32-66 30-65 33-33 66-33 80-4C F7-56 28-00 00-00 28-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 40-4D E4-56 80-00 00-00 80-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 40-00 00-00 01-64 31-64>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3702: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/230 (108-byte object <27-00 00-00 60-48 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 E8-61 E4-56 00-00 00-00 00-34 33-30 36-62 35-32 32-66 30-65 33-33 66-33 A0-50 F7-56 28-00 00-00 28-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 40-62 E4-56 80-00 00-00 80-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 40-00 00-00 01-64 31-64>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3703: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/231 (108-byte object <27-00 00-00 80-4C F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 18-06 F2-56 00-00 00-00 00-34 33-30 36-62 35-32 32-66 30-65 33-33 66-33 F0-54 F7-56 28-00 00-00 28-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 40-4D E4-56 80-00 00-00 80-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 40-00 00-00 01-64 31-64>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3704: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/232 (108-byte object <27-00 00-00 A0-50 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 E8-61 E4-56 00-00 00-00 00-34 33-30 36-62 35-32 32-66 30-65 33-33 66-33 40-59 F7-56 28-00 00-00 28-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 40-62 E4-56 80-00 00-00 80-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 40-00 00-00 01-64 31-64>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3705: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/233 (108-byte object <27-00 00-00 F0-54 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 18-06 F2-56 00-00 00-00 00-34 33-30 36-62 35-32 32-66 30-65 33-33 66-33 90-5D F7-56 28-00 00-00 28-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 40-4D E4-56 80-00 00-00 80-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 40-00 00-00 01-64 31-64>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3706: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/234 (108-byte object <28-00 00-00 E0-61 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 30-66 F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 20-C8 EA-56 00-00 00-00 00-36 64-34 61-30 39-34 35-30 33-37 35-61 35-30 C0-30 F7-56 28-00 00-00 28-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 14-00 00-00 01-64 31-64>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3707: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/235 (108-byte object <28-00 00-00 90-5D F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 80-6A F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 B0-6A F7-56 28-00 00-00 28-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 14-00 00-00 01-64 31-64>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3708: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/236 (108-byte object <28-00 00-00 30-66 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 C0-30 F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 20-C8 EA-56 00-00 00-00 00-36 64-34 61-30 39-34 35-30 33-37 35-61 35-30 10-6B F7-56 28-00 00-00 28-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 14-00 00-00 01-64 31-64>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3709: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/237 (108-byte object <28-00 00-00 80-6A F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 B0-6A F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 40-6B F7-56 28-00 00-00 28-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 14-00 00-00 01-64 31-64>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3710: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/238 (108-byte object <28-00 00-00 C0-30 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 10-6B F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 20-C8 EA-56 00-00 00-00 00-36 64-34 61-30 39-34 35-30 33-37 35-61 35-30 30-6F F7-56 28-00 00-00 28-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 14-00 00-00 01-64 31-64>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3711: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/239 (108-byte object <28-00 00-00 B0-6A F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 40-6B F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 20-73 F7-56 28-00 00-00 28-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 14-00 00-00 01-64 31-64>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3712: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/240 (108-byte object <29-00 00-00 30-6F F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 10-77 F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 20-C8 EA-56 00-00 00-00 00-36 64-34 61-30 39-34 35-30 33-37 35-61 35-30 50-9D BD-56 54-00 00-00 54-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 2A-00 00-00 01-64 31-64>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3713: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/241 (108-byte object <29-00 00-00 40-6B F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 20-73 F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 30-31 C2-56 54-00 00-00 54-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 2A-00 00-00 01-64 31-64>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3714: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/242 (108-byte object <29-00 00-00 10-77 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 E0-6A F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 20-C8 EA-56 00-00 00-00 00-36 64-34 61-30 39-34 35-30 33-37 35-61 35-30 50-9D BD-56 54-00 00-00 54-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 2A-00 00-00 01-64 31-64>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3715: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/243 (108-byte object <29-00 00-00 20-73 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 D0-20 F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 30-31 C2-56 54-00 00-00 54-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 2A-00 00-00 01-64 31-64>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3716: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/244 (108-byte object <29-00 00-00 E0-6A F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 60-8A F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 20-C8 EA-56 00-00 00-00 00-36 64-34 61-30 39-34 35-30 33-37 35-61 35-30 50-9D BD-56 54-00 00-00 54-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 2A-00 00-00 01-64 31-64>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3717: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/245 (108-byte object <29-00 00-00 D0-20 F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 80-8E F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 30-06 F2-56 00-00 00-00 00-00 00-00 61-30 39-34 35-30 33-37 35-61 35-30 30-31 C2-56 54-00 00-00 54-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 2A-00 00-00 01-64 31-64>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3718: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/246 (108-byte object <2A-00 00-00 60-8A F7-56 28-00 00-00 28-00 00-00 37-31 37-38 63-31 33-64 32-39 35-33 A0-92 F7-56 20-00 00-00 20-00 00-00 36-62 35-32 32-66 30-65 33-33 66-33 90-4D E4-56 00-00 00-00 00-36 64-34 61-30 39-34 35-30 33-37 35-61 35-30 B0-61 E4-56 80-00 00-00 80-00 00-00 34-62 37-61 38-39 36-31 38-61 61-39 40-00 00-00 01-64 31-64>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3719: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/247 (108-byte object <2A-00 00-00 80-8E F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 C0-96 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 30-06 F2-56 00-00 00-00 00-65 38-32 34-64 34-30 33-38 65-30 62-64 62-33 40-62 E4-56 80-00 00-00 80-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 40-00 00-00 01-64 61-63>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3720: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/248 (108-byte object <2A-00 00-00 A0-92 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 E0-9A F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 90-4D E4-56 00-00 00-00 00-65 38-32 34-64 34-30 33-38 65-30 62-64 62-33 B0-61 E4-56 80-00 00-00 80-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 40-00 00-00 01-64 61-63>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3721: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/249 (108-byte object <2A-00 00-00 C0-96 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 30-9F F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 30-06 F2-56 00-00 00-00 00-65 38-32 34-64 34-30 33-38 65-30 62-64 62-33 40-62 E4-56 80-00 00-00 80-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 40-00 00-00 01-64 61-63>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3722: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/250 (108-byte object <2A-00 00-00 E0-9A F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 80-A3 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 90-4D E4-56 00-00 00-00 00-65 38-32 34-64 34-30 33-38 65-30 62-64 62-33 B0-61 E4-56 80-00 00-00 80-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 40-00 00-00 01-64 61-63>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3723: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/251 (108-byte object <2A-00 00-00 30-9F F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 D0-A7 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 30-06 F2-56 00-00 00-00 00-65 38-32 34-64 34-30 33-38 65-30 62-64 62-33 40-62 E4-56 80-00 00-00 80-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 40-00 00-00 01-64 61-63>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3724: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/252 (108-byte object <2B-00 00-00 70-B0 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 00-7B F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 40-B4 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 70-B4 F7-56 28-00 00-00 28-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 14-00 00-00 01-64 61-63>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3725: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/253 (108-byte object <2B-00 00-00 20-B5 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 50-B5 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 80-B5 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 E0-B5 F7-56 28-00 00-00 28-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 14-00 00-00 01-64 61-63>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3726: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/254 (108-byte object <2B-00 00-00 40-B4 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 70-B4 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 B0-B5 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 40-B6 F7-56 28-00 00-00 28-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 14-00 00-00 01-64 61-63>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3727: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/255 (108-byte object <2B-00 00-00 80-B5 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 E0-B5 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 10-B6 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 60-BA F7-56 28-00 00-00 28-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 14-00 00-00 01-64 61-63>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3728: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/256 (108-byte object <2B-00 00-00 B0-B5 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 40-B6 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 D0-A7 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 80-BE F7-56 28-00 00-00 28-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 14-00 00-00 01-64 61-63>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3729: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/257 (108-byte object <2B-00 00-00 10-B6 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 60-BA F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 00-7B F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 A0-C2 F7-56 28-00 00-00 28-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 14-00 00-00 01-64 61-63>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3730: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/258 (108-byte object <2C-00 00-00 C0-C6 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 70-B4 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 E0-B5 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 C0-75 EF-56 54-00 00-00 54-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 2A-00 00-00 01-64 61-63>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3731: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/259 (108-byte object <2C-00 00-00 60-BA F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 00-7B F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 A0-C2 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 50-9D BD-56 54-00 00-00 54-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 2A-00 00-00 01-64 61-63>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3732: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/260 (108-byte object <2C-00 00-00 70-B4 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 E0-B5 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 40-59 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 C0-75 EF-56 54-00 00-00 54-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 2A-00 00-00 01-64 61-63>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3733: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/261 (108-byte object <2C-00 00-00 00-7B F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 A0-C2 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 40-B6 F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 50-9D BD-56 54-00 00-00 54-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 2A-00 00-00 01-64 61-63>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3734: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/262 (108-byte object <2C-00 00-00 E0-B5 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 40-59 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 D0-A4 F8-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 C0-75 EF-56 54-00 00-00 54-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 2A-00 00-00 01-64 61-63>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3735: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/263 (108-byte object <2C-00 00-00 A0-C2 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 40-B6 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 40-DE F7-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 50-9D BD-56 54-00 00-00 54-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 2A-00 00-00 01-64 61-63>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3736: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/264 (108-byte object <2D-00 00-00 90-E2 F7-56 28-00 00-00 28-00 00-00 37-30 65-30 36-39 66-32 37-34 62-31 E0-E6 F7-56 20-00 00-00 20-00 00-00 33-65 34-34 36-35 30-34 63-62 62-66 40-9D F8-56 28-00 00-00 28-00 00-00 34-64 34-30 33-38 65-30 62-64 62-33 40-4D E4-56 80-00 00-00 80-00 00-00 32-64 61-63 64-64 66-65 39-61 61-64 40-00 00-00 01-64 61-63>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3737: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/265 (108-byte object <2D-00 00-00 40-B6 F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 40-DE F7-56 20-00 00-00 20-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 30-EB F7-56 28-00 00-00 28-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 B0-61 E4-56 80-00 00-00 80-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 40-00 00-00 01-35 62-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3738: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/266 (108-byte object <2D-00 00-00 E0-E6 F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 40-9D F8-56 20-00 00-00 20-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 80-BE F7-56 28-00 00-00 28-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 40-4D E4-56 80-00 00-00 80-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 40-00 00-00 01-35 62-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3739: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/267 (108-byte object <2D-00 00-00 40-DE F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 30-EB F7-56 20-00 00-00 20-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 80-EF F7-56 28-00 00-00 28-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 B0-61 E4-56 80-00 00-00 80-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 40-00 00-00 01-35 62-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3740: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/268 (108-byte object <2D-00 00-00 40-9D F8-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 80-BE F7-56 20-00 00-00 20-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 00-F4 F7-56 28-00 00-00 28-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 40-4D E4-56 80-00 00-00 80-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 40-00 00-00 01-35 62-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3741: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/269 (108-byte object <2D-00 00-00 30-EB F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 80-EF F7-56 20-00 00-00 20-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 20-76 FC-56 28-00 00-00 28-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 B0-61 E4-56 80-00 00-00 80-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 40-00 00-00 01-35 62-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3742: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/270 (108-byte object <2E-00 00-00 00-F4 F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 20-C8 EA-56 00-00 00-00 00-32 35-33 37-35 35-33 36-61 35-63 37-32 34-66 80-7A FC-56 28-00 00-00 28-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 14-00 00-00 01-35 62-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3743: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/271 (108-byte object <2E-00 00-00 80-EF F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 30-06 F2-56 00-00 00-00 00-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 20-76 FC-56 28-00 00-00 28-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 14-00 00-00 01-35 62-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3744: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/272 (108-byte object <2E-00 00-00 80-7A FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 20-C8 EA-56 00-00 00-00 00-32 35-33 37-35 35-33 36-61 35-63 37-32 34-66 D0-A7 F7-56 28-00 00-00 28-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 14-00 00-00 01-35 62-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3745: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/273 (108-byte object <2E-00 00-00 20-76 FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 30-06 F2-56 00-00 00-00 00-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 40-59 F7-56 28-00 00-00 28-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 14-00 00-00 01-35 62-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3746: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/274 (108-byte object <2E-00 00-00 D0-A7 F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 20-C8 EA-56 00-00 00-00 00-32 35-33 37-35 35-33 36-61 35-63 37-32 34-66 60-8F FC-56 28-00 00-00 28-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 14-00 00-00 01-35 62-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3747: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/275 (108-byte object <2E-00 00-00 40-59 F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 30-06 F2-56 00-00 00-00 00-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 70-93 FC-56 28-00 00-00 28-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 14-00 00-00 01-35 62-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3748: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/276 (108-byte object <2F-00 00-00 80-BE F7-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 20-C8 EA-56 00-00 00-00 00-32 35-33 37-35 35-33 36-61 35-63 37-32 34-66 30-31 C2-56 54-00 00-00 54-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 2A-00 00-00 01-35 62-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3749: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/277 (108-byte object <2F-00 00-00 70-93 FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 30-06 F2-56 00-00 00-00 00-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 C0-75 EF-56 54-00 00-00 54-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 2A-00 00-00 01-35 62-66>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3750: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/278 (108-byte object <2F-00 00-00 90-9B FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 20-C8 EA-56 00-00 00-00 00-32 35-33 37-35 35-33 36-61 35-63 37-32 34-66 30-31 C2-56 54-00 00-00 54-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 2A-00 00-00 01-35 62-66>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3751: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/279 (108-byte object <2F-00 00-00 B0-A4 FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 30-06 F2-56 00-00 00-00 00-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 C0-75 EF-56 54-00 00-00 54-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 2A-00 00-00 01-35 62-66>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3752: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/280 (108-byte object <2F-00 00-00 F0-A8 FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 20-C8 EA-56 00-00 00-00 00-32 35-33 37-35 35-33 36-61 35-63 37-32 34-66 30-31 C2-56 54-00 00-00 54-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 2A-00 00-00 01-35 62-66>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3753: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/281 (108-byte object <2F-00 00-00 30-AD FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 30-06 F2-56 00-00 00-00 00-00 00-00 37-35 35-33 36-61 35-63 37-32 34-66 C0-75 EF-56 54-00 00-00 54-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 2A-00 00-00 01-35 62-66>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3754: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/282 (108-byte object <30-00 00-00 70-B1 FC-56 28-00 00-00 28-00 00-00 61-37 37-38 61-65 65-34 64-33 33-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 38-34 33-38 37-38 31-35 37-63 62-31 00-62 E4-56 00-00 00-00 00-32 35-33 37-35 35-33 36-61 35-63 37-32 34-66 40-62 E4-56 80-00 00-00 80-00 00-00 64-63 65-38 38-37 38-61 33-63 36-38 40-00 00-00 01-35 62-66>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3755: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/283 (108-byte object <30-00 00-00 B0-B5 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 30-06 F2-56 00-00 00-00 00-33 31-61 30-61 65-30 36-64 65-65 61-39 31-31 40-4D E4-56 80-00 00-00 80-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 40-00 00-00 01-32 32-35>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3756: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/284 (108-byte object <30-00 00-00 20-BA FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 00-62 E4-56 00-00 00-00 00-33 31-61 30-61 65-30 36-64 65-65 61-39 31-31 40-62 E4-56 80-00 00-00 80-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 40-00 00-00 01-32 32-35>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3757: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/285 (108-byte object <30-00 00-00 90-BE FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 30-06 F2-56 00-00 00-00 00-33 31-61 30-61 65-30 36-64 65-65 61-39 31-31 40-4D E4-56 80-00 00-00 80-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 40-00 00-00 01-32 32-35>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3758: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/286 (108-byte object <30-00 00-00 00-C3 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 00-62 E4-56 00-00 00-00 00-33 31-61 30-61 65-30 36-64 65-65 61-39 31-31 40-62 E4-56 80-00 00-00 80-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 40-00 00-00 01-32 32-35>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3759: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/287 (108-byte object <30-00 00-00 70-C7 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 30-06 F2-56 00-00 00-00 00-33 31-61 30-61 65-30 36-64 65-65 61-39 31-31 40-4D E4-56 80-00 00-00 80-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 40-00 00-00 01-32 32-35>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3760: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/288 (108-byte object <31-00 00-00 60-8F FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 B0-D2 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 E0-D2 FC-56 28-00 00-00 28-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 14-00 00-00 01-32 32-35>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3761: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/289 (108-byte object <31-00 00-00 90-D3 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 C0-D3 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 F0-D3 FC-56 28-00 00-00 28-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 14-00 00-00 01-32 32-35>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3762: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/290 (108-byte object <31-00 00-00 B0-D2 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 E0-D2 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 50-D4 FC-56 28-00 00-00 28-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 14-00 00-00 01-32 32-35>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3763: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/291 (108-byte object <31-00 00-00 C0-D3 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 F0-D3 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 80-D4 FC-56 28-00 00-00 28-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 14-00 00-00 01-32 32-35>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3764: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/292 (108-byte object <31-00 00-00 E0-D2 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 50-D4 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 C0-D8 FC-56 28-00 00-00 28-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 14-00 00-00 01-32 32-35>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3765: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/293 (108-byte object <31-00 00-00 F0-D3 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 80-D4 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 00-DD FC-56 28-00 00-00 28-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 14-00 00-00 01-32 32-35>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3766: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/294 (108-byte object <32-00 00-00 C0-D8 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 40-E1 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 50-9D BD-56 54-00 00-00 54-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 2A-00 00-00 01-32 32-35>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3767: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/295 (108-byte object <32-00 00-00 80-D4 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 00-DD FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 30-31 C2-56 54-00 00-00 54-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 2A-00 00-00 01-32 32-35>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3768: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/296 (108-byte object <32-00 00-00 40-E1 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 20-D4 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 50-9D BD-56 54-00 00-00 54-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 2A-00 00-00 01-32 32-35>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3769: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/297 (108-byte object <32-00 00-00 00-DD FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 E0-CB FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 30-31 C2-56 54-00 00-00 54-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 2A-00 00-00 01-32 32-35>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3770: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/298 (108-byte object <32-00 00-00 20-D4 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 20-F6 FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 50-9D BD-56 54-00 00-00 54-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 2A-00 00-00 01-32 32-35>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3771: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/299 (108-byte object <32-00 00-00 E0-CB FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 60-43 E4-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 90-FA FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 30-31 C2-56 54-00 00-00 54-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 2A-00 00-00 01-32 32-35>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3772: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/300 (108-byte object <33-00 00-00 20-F6 FC-56 28-00 00-00 28-00 00-00 36-32 62-39 66-65 64-66 33-35 34-61 90-1B F2-56 3C-00 00-00 3C-00 00-00 39-32 32-31 30-30 38-33 38-65 66-63 00-FF FC-56 28-00 00-00 28-00 00-00 30-61 65-30 36-64 65-65 61-39 31-31 B0-61 E4-56 80-00 00-00 80-00 00-00 63-31 62-63 37-35 66-36 34-39 66-33 40-00 00-00 01-32 32-35>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3773: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/301 (108-byte object <33-00 00-00 90-FA FC-56 28-00 00-00 28-00 00-00 62-63 33-63 33-32 31-64 62-64 66-34 60-43 E4-56 3C-00 00-00 3C-00 00-00 37-32 62-66 36-65 63-38 36-37 62-65 70-03 FD-56 28-00 00-00 28-00 00-00 62-65 35-30 36-64 34-30 30-37 35-61 40-62 E4-56 80-00 00-00 80-00 00-00 63-62 31-39 64-39 35-30 32-38 39-38 40-00 00-00 01-65 38-64>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3774: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/302 (108-byte object <33-00 00-00 00-FF FC-56 28-00 00-00 28-00 00-00 62-63 33-63 33-32 31-64 62-64 66-34 90-1B F2-56 3C-00 00-00 3C-00 00-00 37-32 62-66 36-65 63-38 36-37 62-65 E0-07 FD-56 28-00 00-00 28-00 00-00 62-65 35-30 36-64 34-30 30-37 35-61 B0-61 E4-56 80-00 00-00 80-00 00-00 63-62 31-39 64-39 35-30 32-38 39-38 40-00 00-00 01-65 38-64>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3775: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/303 (108-byte object <33-00 00-00 70-03 FD-56 28-00 00-00 28-00 00-00 62-63 33-63 33-32 31-64 62-64 66-34 60-43 E4-56 3C-00 00-00 3C-00 00-00 37-32 62-66 36-65 63-38 36-37 62-65 80-0C FD-56 28-00 00-00 28-00 00-00 62-65 35-30 36-64 34-30 30-37 35-61 40-62 E4-56 80-00 00-00 80-00 00-00 63-62 31-39 64-39 35-30 32-38 39-38 40-00 00-00 01-65 38-64>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3776: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/304 (108-byte object <33-00 00-00 E0-07 FD-56 28-00 00-00 28-00 00-00 62-63 33-63 33-32 31-64 62-64 66-34 90-1B F2-56 3C-00 00-00 3C-00 00-00 37-32 62-66 36-65 63-38 36-37 62-65 20-11 FD-56 28-00 00-00 28-00 00-00 62-65 35-30 36-64 34-30 30-37 35-61 B0-61 E4-56 80-00 00-00 80-00 00-00 63-62 31-39 64-39 35-30 32-38 39-38 40-00 00-00 01-65 38-64>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3777: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/305 (108-byte object <33-00 00-00 80-0C FD-56 28-00 00-00 28-00 00-00 62-63 33-63 33-32 31-64 62-64 66-34 60-43 E4-56 3C-00 00-00 3C-00 00-00 37-32 62-66 36-65 63-38 36-37 62-65 C0-15 FD-56 28-00 00-00 28-00 00-00 62-65 35-30 36-64 34-30 30-37 35-61 40-62 E4-56 80-00 00-00 80-00 00-00 63-62 31-39 64-39 35-30 32-38 39-38 40-00 00-00 01-65 38-64>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3778: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/306 (108-byte object <34-00 00-00 50-D4 FC-56 28-00 00-00 28-00 00-00 62-63 33-63 33-32 31-64 62-64 66-34 B0-61 E4-56 80-00 00-00 80-00 00-00 37-32 62-66 36-65 63-38 36-37 62-65 90-4D E4-56 00-00 00-00 00-39 39-35 62-65 35-30 36-64 34-30 30-37 35-61 C0-75 EF-56 54-00 00-00 54-00 00-00 63-62 31-39 64-39 35-30 32-38 39-38 2A-00 00-00 01-65 38-64>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3779: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/307 (108-byte object <34-00 00-00 C0-15 FD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 40-62 E4-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 30-06 F2-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 50-9D BD-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3780: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/308 (108-byte object <34-00 00-00 00-1F FD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 B0-61 E4-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 90-4D E4-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 C0-75 EF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3781: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/309 (108-byte object <34-00 00-00 30-29 FD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 40-62 E4-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 30-06 F2-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 50-9D BD-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3782: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/310 (108-byte object <34-00 00-00 B0-2D FD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 B0-61 E4-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 90-4D E4-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 C0-75 EF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3783: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/311 (108-byte object <34-00 00-00 30-32 FD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 40-62 E4-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 30-06 F2-56 00-00 00-00 00-66 61-62 38-39 65-62 61-64 34-66 61-36 33-34 50-9D BD-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3784: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/312 (108-byte object <35-00 00-00 30-3B FD-56 28-00 00-00 28-00 00-00 32-32 35-35 34-33 38-30 39-36 66-34 B0-61 E4-56 80-00 00-00 80-00 00-00 66-64 61-31 32-37 31-38 65-63 35-35 20-11 FD-56 28-00 00-00 28-00 00-00 38-39 65-62 61-64 34-66 61-36 33-34 C0-75 EF-56 54-00 00-00 54-00 00-00 34-63 34-35 38-33 65-36 34-64 32-62 2A-00 00-00 01-38 62-39>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3785: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/313 (108-byte object <35-00 00-00 10-3E FD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-62 E4-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 40-3E FD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 50-9D BD-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3786: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/314 (108-byte object <35-00 00-00 20-11 FD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 B0-61 E4-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 A0-3E FD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C0-75 EF-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3787: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/315 (108-byte object <35-00 00-00 40-3E FD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-62 E4-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 50-43 FD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 50-9D BD-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3788: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/316 (108-byte object <35-00 00-00 A0-3E FD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 B0-61 E4-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 00-48 FD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 C0-75 EF-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3789: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/317 (108-byte object <35-00 00-00 50-43 FD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 40-62 E4-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-4C FD-56 28-00 00-00 28-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 50-9D BD-56 54-00 00-00 54-00 00-00 64-36 62-31 34-39 37-61 65-66 38-32 2A-00 00-00 01-32 30-39>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3790: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/318 (108-byte object <36-00 00-00 B0-36 FD-56 28-00 00-00 28-00 00-00 33-64 66-61 32-61 37-32 63-36 33-36 B0-61 E4-56 80-00 00-00 80-00 00-00 66-33 34-34 37-32 39-65 61-35 36-34 B0-55 FD-56 10-00 00-00 10-00 00-00 64-36 63-34 65-62 34-65 34-38 37-33 D0-D9 FD-56 80-7F 00-00 80-7F 00-00 64-36 62-31 34-39 37-61 65-66 38-32 C0-3F 00-00 01-32 30-39>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3791: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/319 (108-byte object <36-00 00-00 B0-4C FD-56 28-00 00-00 28-00 00-00 33-39 30-61 66-36 35-38 31-30 35-63 40-62 E4-56 80-00 00-00 80-00 00-00 38-64 37-37 34-65 36-31 30-30 36-65 90-55 FD-56 10-00 00-00 10-00 00-00 33-64 33-61 66-66 30-66 33-36 65-63 20-5A FE-56 80-7F 00-00 80-7F 00-00 64-34 36-61 64-38 62-31 31-36 32-30 C0-3F 00-00 01-62 38-31>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3792: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/320 (108-byte object <36-00 00-00 10-56 FD-56 28-00 00-00 28-00 00-00 33-39 30-61 66-36 35-38 31-30 35-63 B0-61 E4-56 80-00 00-00 80-00 00-00 38-64 37-37 34-65 36-31 30-30 36-65 A0-59 FE-56 10-00 00-00 10-00 00-00 33-64 33-61 66-66 30-66 33-36 65-63 E0-D9 FF-56 80-7F 00-00 80-7F 00-00 64-34 36-61 64-38 62-31 31-36 32-30 C0-3F 00-00 01-62 38-31>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3793: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/321 (108-byte object <36-00 00-00 D0-55 FD-56 28-00 00-00 28-00 00-00 33-39 30-61 66-36 35-38 31-30 35-63 40-62 E4-56 80-00 00-00 80-00 00-00 38-64 37-37 34-65 36-31 30-30 36-65 40-DC FE-56 10-00 00-00 10-00 00-00 33-64 33-61 66-66 30-66 33-36 65-63 20-5A FE-56 80-7F 00-00 80-7F 00-00 64-34 36-61 64-38 62-31 31-36 32-30 C0-3F 00-00 01-62 38-31>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3794: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/322 (108-byte object <36-00 00-00 20-E2 FE-56 28-00 00-00 28-00 00-00 33-39 30-61 66-36 35-38 31-30 35-63 B0-61 E4-56 80-00 00-00 80-00 00-00 38-64 37-37 34-65 36-31 30-30 36-65 60-E0 FE-56 10-00 00-00 10-00 00-00 33-64 33-61 66-66 30-66 33-36 65-63 E0-D9 FF-56 80-7F 00-00 80-7F 00-00 64-34 36-61 64-38 62-31 31-36 32-30 C0-3F 00-00 01-62 38-31>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3795: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/323 (108-byte object <36-00 00-00 60-E6 FE-56 28-00 00-00 28-00 00-00 33-39 30-61 66-36 35-38 31-30 35-63 40-62 E4-56 80-00 00-00 80-00 00-00 38-64 37-37 34-65 36-31 30-30 36-65 A0-E4 FE-56 10-00 00-00 10-00 00-00 33-64 33-61 66-66 30-66 33-36 65-63 20-5A FE-56 80-7F 00-00 80-7F 00-00 64-34 36-61 64-38 62-31 31-36 32-30 C0-3F 00-00 01-62 38-31>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3796: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/324 (108-byte object <37-00 00-00 A0-EA FE-56 28-00 00-00 28-00 00-00 33-39 30-61 66-36 35-38 31-30 35-63 B0-61 E4-56 80-00 00-00 80-00 00-00 38-64 37-37 34-65 36-31 30-30 36-65 E0-50 FD-56 10-00 00-00 10-00 00-00 33-64 33-61 66-66 30-66 33-36 65-63 A8-4D E4-56 00-00 00-00 00-64 64-66 64-34 36-61 64-38 62-31 31-36 32-30 C1-3F 00-00 00-62 38-31>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3797: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/325 (108-byte object <37-00 00-00 00-EF FE-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 40-62 E4-56 80-00 00-00 80-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 40-ED FE-56 10-00 00-00 10-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 48-06 F2-56 00-00 00-00 00-39 63-64 31-36 31-36 61-39 64-66 65-34 37-31 C1-3F 00-00 00-35 35-61>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3798: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/326 (108-byte object <37-00 00-00 40-F3 FE-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 B0-61 E4-56 80-00 00-00 80-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 80-F1 FE-56 10-00 00-00 10-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 A8-4D E4-56 00-00 00-00 00-39 63-64 31-36 31-36 61-39 64-66 65-34 37-31 C1-3F 00-00 00-35 35-61>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3799: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/327 (108-byte object <37-00 00-00 80-F7 FE-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 40-62 E4-56 80-00 00-00 80-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 C0-F5 FE-56 10-00 00-00 10-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 48-06 F2-56 00-00 00-00 00-39 63-64 31-36 31-36 61-39 64-66 65-34 37-31 C1-3F 00-00 00-35 35-61>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3800: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/328 (108-byte object <37-00 00-00 C0-FB FE-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 B0-61 E4-56 80-00 00-00 80-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 00-FA FE-56 10-00 00-00 10-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 A8-4D E4-56 00-00 00-00 00-39 63-64 31-36 31-36 61-39 64-66 65-34 37-31 C1-3F 00-00 00-35 35-61>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3801: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/329 (108-byte object <37-00 00-00 00-00 FF-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 40-62 E4-56 80-00 00-00 80-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 40-FE FE-56 10-00 00-00 10-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 48-06 F2-56 00-00 00-00 00-39 63-64 31-36 31-36 61-39 64-66 65-34 37-31 C1-3F 00-00 00-35 35-61>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3802: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/330 (108-byte object <38-00 00-00 80-08 FF-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 08-C8 EA-56 00-00 00-00 00-64 64-37 63-39 66-36 39-61 64-31 65-63 61-32 00-48 FD-56 28-00 00-00 28-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 A0-9D F1-56 40-00 00-00 40-00 00-00 31-36 31-36 61-39 64-66 65-34 37-31 20-00 00-00 01-35 35-61>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3803: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/331 (108-byte object <38-00 00-00 40-0B FF-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 18-06 F2-56 00-00 00-00 00-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 70-0B FF-56 28-00 00-00 28-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 90-1B F2-56 40-00 00-00 40-00 00-00 31-36 31-36 61-39 64-66 65-34 37-31 20-00 00-00 01-35 35-61>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3804: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/332 (108-byte object <38-00 00-00 00-48 FD-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 08-C8 EA-56 00-00 00-00 00-64 64-37 63-39 66-36 39-61 64-31 65-63 61-32 D0-0B FF-56 28-00 00-00 28-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 A0-9D F1-56 40-00 00-00 40-00 00-00 31-36 31-36 61-39 64-66 65-34 37-31 20-00 00-00 01-35 35-61>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3805: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/333 (108-byte object <38-00 00-00 70-0B FF-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 18-06 F2-56 00-00 00-00 00-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 E0-0F FF-56 28-00 00-00 28-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 90-1B F2-56 40-00 00-00 40-00 00-00 31-36 31-36 61-39 64-66 65-34 37-31 20-00 00-00 01-35 35-61>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3806: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/334 (108-byte object <38-00 00-00 D0-0B FF-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 08-C8 EA-56 00-00 00-00 00-64 64-37 63-39 66-36 39-61 64-31 65-63 61-32 F0-13 FF-56 28-00 00-00 28-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 A0-9D F1-56 40-00 00-00 40-00 00-00 31-36 31-36 61-39 64-66 65-34 37-31 20-00 00-00 01-35 35-61>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3807: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/335 (108-byte object <38-00 00-00 E0-0F FF-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 18-06 F2-56 00-00 00-00 00-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 00-18 FF-56 28-00 00-00 28-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 90-1B F2-56 40-00 00-00 40-00 00-00 31-36 31-36 61-39 64-66 65-34 37-31 20-00 00-00 01-35 35-61>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3808: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/336 (108-byte object <39-00 00-00 F0-13 FF-56 28-00 00-00 28-00 00-00 33-32 66-32 61-30 37-62 35-33 31-62 40-4D E4-56 80-00 00-00 80-00 00-00 63-39 66-36 39-61 64-31 65-63 61-32 10-1C FF-56 28-00 00-00 28-00 00-00 33-62 34-64 62-30 37-62 39-31 39-36 A0-9D F1-56 40-00 00-00 40-00 00-00 31-36 31-36 61-39 64-66 65-34 37-31 20-00 00-00 01-35 35-61>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3809: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/337 (108-byte object <39-00 00-00 00-18 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-61 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-20 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 90-1B F2-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3810: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/338 (108-byte object <39-00 00-00 10-1C FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-4D E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 30-24 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 A0-9D F1-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3811: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/339 (108-byte object <39-00 00-00 20-20 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-61 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 D0-28 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 90-1B F2-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3812: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/340 (108-byte object <39-00 00-00 30-24 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-4D E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 70-2D FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 A0-9D F1-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3813: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/341 (108-byte object <39-00 00-00 D0-28 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-61 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 10-32 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 90-1B F2-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3814: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/342 (108-byte object <3A-00 00-00 70-2D FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-4D E4-56 82-00 00-00 82-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-36 FF-56 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 A0-9D F1-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3815: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/343 (108-byte object <3A-00 00-00 10-32 FF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-61 E4-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 50-3B FF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 90-1B F2-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3816: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/344 (108-byte object <3A-00 00-00 B0-36 FF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-4D E4-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 F0-3F FF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-9D F1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3817: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/345 (108-byte object <3A-00 00-00 50-3B FF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-61 E4-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 90-44 FF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 90-1B F2-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3818: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/346 (108-byte object <3A-00 00-00 F0-3F FF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-4D E4-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 30-49 FF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-9D F1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3819: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/347 (108-byte object <3A-00 00-00 90-44 FF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 B0-61 E4-56 82-00 00-00 82-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 D0-4D FF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 90-1B F2-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3820: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/348 (108-byte object <3B-00 00-00 30-49 FF-56 28-00 00-00 28-00 00-00 63-39 35-35 39-30 37-37 33-61 66-63 40-4D E4-56 80-00 00-00 80-00 00-00 38-34 38-30 36-61 65-65 65-64 61-38 70-52 FF-56 28-00 00-00 28-00 00-00 65-37 63-31 32-32 31-31 62-38 65-33 A0-9D F1-56 40-00 00-00 40-00 00-00 39-34 36-64 36-31 31-31 31-61 35-32 20-00 00-00 01-33 39-33>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3821: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/349 (108-byte object <3B-00 00-00 D0-4D FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 B0-61 E4-56 80-00 00-00 80-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 10-57 FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3822: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/350 (108-byte object <3B-00 00-00 70-52 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 40-4D E4-56 80-00 00-00 80-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 D0-5C FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3823: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/351 (108-byte object <3B-00 00-00 10-57 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 B0-61 E4-56 80-00 00-00 80-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 70-61 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3824: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/352 (108-byte object <3B-00 00-00 D0-5C FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 40-4D E4-56 80-00 00-00 80-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 10-66 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3825: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/353 (108-byte object <3B-00 00-00 70-61 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 B0-61 E4-56 80-00 00-00 80-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 B0-6A FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3826: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/354 (108-byte object <3C-00 00-00 10-66 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 90-73 FE-56 10-00 00-00 10-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 50-6F FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3827: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/355 (108-byte object <3C-00 00-00 B0-6A FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 70-73 FE-56 10-00 00-00 10-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 F0-73 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3828: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/356 (108-byte object <3C-00 00-00 50-6F FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 50-78 FE-56 10-00 00-00 10-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 D0-78 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3829: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/357 (108-byte object <3C-00 00-00 F0-73 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 80-7C FE-56 10-00 00-00 10-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 00-7D FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3830: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/358 (108-byte object <3C-00 00-00 D0-78 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 B0-80 FE-56 10-00 00-00 10-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-81 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3831: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/359 (108-byte object <3C-00 00-00 00-7D FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-84 FE-56 10-00 00-00 10-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 60-85 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3832: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/360 (108-byte object <3D-00 00-00 90-89 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 C0-8D FE-56 20-00 00-00 20-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 A0-0B FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3833: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/361 (108-byte object <3D-00 00-00 60-85 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 B0-91 FE-56 20-00 00-00 20-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 E0-91 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3834: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/362 (108-byte object <3D-00 00-00 C0-8D FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 A0-0B FF-56 20-00 00-00 20-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 40-92 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3835: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/363 (108-byte object <3D-00 00-00 B0-91 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-91 FE-56 20-00 00-00 20-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 70-92 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3836: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/364 (108-byte object <3D-00 00-00 A0-0B FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 40-92 FE-56 20-00 00-00 20-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 B0-96 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3837: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/365 (108-byte object <3D-00 00-00 E0-91 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 70-92 FE-56 20-00 00-00 20-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 F0-9A FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3838: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/366 (108-byte object <3E-00 00-00 B0-96 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 20-C2 D2-56 30-00 00-00 30-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-9F FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3839: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/367 (108-byte object <3E-00 00-00 70-92 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 A0-BF B8-56 30-00 00-00 30-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 F0-9A FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3840: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/368 (108-byte object <3E-00 00-00 30-9F FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 20-C2 D2-56 30-00 00-00 30-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 10-92 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3841: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/369 (108-byte object <3E-00 00-00 F0-9A FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 A0-BF B8-56 30-00 00-00 30-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 40-04 FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3842: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/370 (108-byte object <3E-00 00-00 10-92 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 20-C2 D2-56 30-00 00-00 30-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 90-B3 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3843: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/371 (108-byte object <3E-00 00-00 40-04 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 A0-BF B8-56 30-00 00-00 30-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 E0-B7 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3844: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/372 (108-byte object <3F-00 00-00 90-B3 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 60-6C F8-56 40-00 00-00 40-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-BC FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 50-C4 FE-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3845: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/373 (108-byte object <3F-00 00-00 E0-B7 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 90-1B F2-56 40-00 00-00 40-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 80-C0 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 20-C5 FE-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3846: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/374 (108-byte object <3F-00 00-00 30-BC FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 60-6C F8-56 40-00 00-00 40-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 C0-C5 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 50-C4 FE-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3847: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/375 (108-byte object <3F-00 00-00 80-C0 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 90-1B F2-56 40-00 00-00 40-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 70-CA FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 20-C5 FE-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3848: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/376 (108-byte object <3F-00 00-00 C0-C5 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 60-6C F8-56 40-00 00-00 40-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 D0-CE FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 50-C4 FE-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3849: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/377 (108-byte object <3F-00 00-00 70-CA FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 90-1B F2-56 40-00 00-00 40-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-D3 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 20-C5 FE-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3850: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/378 (108-byte object <40-00 00-00 D0-CE FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 30-31 C2-56 50-00 00-00 50-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 90-D7 FE-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3851: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/379 (108-byte object <40-00 00-00 30-D3 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 C0-75 EF-56 50-00 00-00 50-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 90-DC FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3852: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/380 (108-byte object <40-00 00-00 90-D7 FE-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 30-31 C2-56 50-00 00-00 50-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 F0-E0 FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3853: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/381 (108-byte object <40-00 00-00 90-DC FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 C0-75 EF-56 50-00 00-00 50-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 10-E5 FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3854: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/382 (108-byte object <40-00 00-00 F0-E0 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 30-31 C2-56 50-00 00-00 50-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-E9 FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3855: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/383 (108-byte object <40-00 00-00 10-E5 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 C0-75 EF-56 50-00 00-00 50-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 50-ED FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3856: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/384 (108-byte object <41-00 00-00 30-E9 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 60-9E F1-56 60-00 00-00 60-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 70-F1 FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3857: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/385 (108-byte object <41-00 00-00 50-ED FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 F0-9D F1-56 60-00 00-00 60-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 E0-F5 FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3858: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/386 (108-byte object <41-00 00-00 70-F1 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 60-9E F1-56 60-00 00-00 60-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 50-FA FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3859: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/387 (108-byte object <41-00 00-00 E0-F5 FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 F0-9D F1-56 60-00 00-00 60-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 60-FE FF-56 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3860: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/388 (108-byte object <41-00 00-00 50-FA FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 60-9E F1-56 60-00 00-00 60-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 E0-02 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3861: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/389 (108-byte object <41-00 00-00 60-FE FF-56 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 F0-9D F1-56 60-00 00-00 60-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 60-07 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3862: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/390 (108-byte object <42-00 00-00 E0-02 00-57 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-14 00-57 70-00 00-00 70-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 E0-0B 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3863: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/391 (108-byte object <42-00 00-00 60-07 00-57 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-15 00-57 70-00 00-00 70-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 60-10 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3864: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/392 (108-byte object <42-00 00-00 E0-0B 00-57 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-14 00-57 70-00 00-00 70-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 E0-16 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3865: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/393 (108-byte object <42-00 00-00 60-10 00-57 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-15 00-57 70-00 00-00 70-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 70-1B 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3866: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/394 (108-byte object <42-00 00-00 E0-16 00-57 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-14 00-57 70-00 00-00 70-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 00-20 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 A0-9D F1-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3867: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/395 (108-byte object <42-00 00-00 70-1B 00-57 28-00 00-00 28-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E0-15 00-57 70-00 00-00 70-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 90-24 00-57 28-00 00-00 28-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-1B F2-56 40-00 00-00 40-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 20-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3868: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/396 (108-byte object <43-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 08-C8 EA-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 20-C8 EA-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 40-92 FE-56 28-00 00-00 28-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 14-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3869: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/397 (108-byte object <43-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-06 F2-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-24 00-57 28-00 00-00 28-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 14-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3870: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/398 (108-byte object <43-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 08-C8 EA-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 20-C8 EA-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 B0-2D 00-57 28-00 00-00 28-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 14-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3871: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/399 (108-byte object <43-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-06 F2-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 90-35 00-57 28-00 00-00 28-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 14-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3872: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/400 (108-byte object <43-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 08-C8 EA-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 20-C8 EA-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 F0-38 00-57 28-00 00-00 28-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 14-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3873: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/401 (108-byte object <43-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-06 F2-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 50-3C 00-57 28-00 00-00 28-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 14-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3874: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/402 (108-byte object <44-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 08-C8 EA-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 20-C8 EA-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 50-9D BD-56 54-00 00-00 54-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 2A-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3875: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/403 (108-byte object <44-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-06 F2-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 30-31 C2-56 54-00 00-00 54-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 2A-00 00-00 01-66 63-36>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3876: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/404 (108-byte object <44-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 08-C8 EA-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 20-C8 EA-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 50-9D BD-56 54-00 00-00 54-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 2A-00 00-00 01-66 63-36>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3877: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/405 (108-byte object <44-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-06 F2-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 30-31 C2-56 54-00 00-00 54-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 2A-00 00-00 01-66 63-36>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3878: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/406 (108-byte object <44-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 08-C8 EA-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 20-C8 EA-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 50-9D BD-56 54-00 00-00 54-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 2A-00 00-00 01-66 63-36>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3879: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/407 (108-byte object <44-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 30-65 32-36 62-31 34-61 39-64 66-38 30-06 F2-56 00-00 00-00 00-00 00-00 65-35 31-30 64-30 39-35 62-32 34-39 30-31 C2-56 54-00 00-00 54-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 2A-00 00-00 01-66 63-36>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3880: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/408 (108-byte object <45-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-35 34-63 33-33 65-36 61-32 37-62 E8-61 E4-56 00-00 00-00 00-31 66-37 30-65 32-36 62-31 34-61 39-64 66-38 00-62 E4-56 00-00 00-00 00-62 39-36 65-35 31-30 64-30 39-35 62-32 34-39 40-62 E4-56 80-00 00-00 80-00 00-00 36-65 39-30 30-61 31-37 30-35 36-32 40-00 00-00 01-66 63-36>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3881: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/409 (108-byte object <45-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 30-06 F2-56 00-00 00-00 00-63 62-39 38-32 63-66 62-63 66-63 32-32 63-62 40-4D E4-56 80-00 00-00 80-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 40-00 00-00 01-38 61-39>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3882: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/410 (108-byte object <45-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 E8-61 E4-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 00-62 E4-56 00-00 00-00 00-63 62-39 38-32 63-66 62-63 66-63 32-32 63-62 40-62 E4-56 80-00 00-00 80-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 40-00 00-00 01-38 61-39>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3883: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/411 (108-byte object <45-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 30-06 F2-56 00-00 00-00 00-63 62-39 38-32 63-66 62-63 66-63 32-32 63-62 40-4D E4-56 80-00 00-00 80-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 40-00 00-00 01-38 61-39>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3884: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/412 (108-byte object <45-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 E8-61 E4-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 00-62 E4-56 00-00 00-00 00-63 62-39 38-32 63-66 62-63 66-63 32-32 63-62 40-62 E4-56 80-00 00-00 80-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 40-00 00-00 01-38 61-39>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3885: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/413 (108-byte object <45-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 30-06 F2-56 00-00 00-00 00-63 62-39 38-32 63-66 62-63 66-63 32-32 63-62 40-4D E4-56 80-00 00-00 80-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 40-00 00-00 01-38 61-39>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3886: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/414 (108-byte object <46-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 08-C8 EA-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 50-79 FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 80-79 FD-56 28-00 00-00 28-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 14-00 00-00 01-38 61-39>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3887: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/415 (108-byte object <46-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 60-7A FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 90-7A FD-56 28-00 00-00 28-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 14-00 00-00 01-38 61-39>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3888: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/416 (108-byte object <46-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 08-C8 EA-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 80-79 FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 F0-7A FD-56 28-00 00-00 28-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 14-00 00-00 01-38 61-39>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3889: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/417 (108-byte object <46-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 90-7A FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 00-7F FD-56 28-00 00-00 28-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 14-00 00-00 01-38 61-39>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3890: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/418 (108-byte object <46-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 08-C8 EA-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 F0-7A FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 10-83 FD-56 28-00 00-00 28-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 14-00 00-00 01-38 61-39>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3891: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/419 (108-byte object <46-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 00-7F FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 20-87 FD-56 28-00 00-00 28-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 14-00 00-00 01-38 61-39>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3892: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/420 (108-byte object <47-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 08-C8 EA-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 30-81 FE-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 C0-75 EF-56 54-00 00-00 54-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 2A-00 00-00 01-38 61-39>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3893: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/421 (108-byte object <47-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 20-87 FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 50-9D BD-56 54-00 00-00 54-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 2A-00 00-00 01-38 61-39>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3894: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/422 (108-byte object <47-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 08-C8 EA-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 40-8F FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 C0-75 EF-56 54-00 00-00 54-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 2A-00 00-00 01-38 61-39>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3895: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/423 (108-byte object <47-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 60-98 FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 50-9D BD-56 54-00 00-00 54-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 2A-00 00-00 01-38 61-39>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3896: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/424 (108-byte object <47-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 08-C8 EA-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 A0-9C FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 C0-75 EF-56 54-00 00-00 54-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 2A-00 00-00 01-38 61-39>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3897: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/425 (108-byte object <47-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 18-06 F2-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 E0-A0 FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 50-9D BD-56 54-00 00-00 54-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 2A-00 00-00 01-38 61-39>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3898: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/426 (108-byte object <48-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 38-39 39-36 31-66 65-65 64-61 61-30 78-4D E4-56 00-00 00-00 00-65 66-61 37-63 63-30 62-36 33-36 66-38 33-31 20-A5 FD-56 28-00 00-00 28-00 00-00 38-32 63-66 62-63 66-63 32-32 63-62 B0-61 E4-56 80-00 00-00 80-00 00-00 33-33 36-34 34-38 30-39 31-32 31-38 40-00 00-00 01-38 61-39>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3899: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/427 (108-byte object <48-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 18-06 F2-56 00-00 00-00 00-37 37-31 30-64 36-38 33-64 36-36 64-36 30-63 60-A9 FD-56 28-00 00-00 28-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 40-62 E4-56 80-00 00-00 80-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 40-00 00-00 01-65 30-65>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3900: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/428 (108-byte object <48-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 78-4D E4-56 00-00 00-00 00-37 37-31 30-64 36-38 33-64 36-36 64-36 30-63 D0-AD FD-56 28-00 00-00 28-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 B0-61 E4-56 80-00 00-00 80-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 40-00 00-00 01-65 30-65>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3901: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/429 (108-byte object <48-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 18-06 F2-56 00-00 00-00 00-37 37-31 30-64 36-38 33-64 36-36 64-36 30-63 40-B2 FD-56 28-00 00-00 28-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 40-62 E4-56 80-00 00-00 80-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 40-00 00-00 01-65 30-65>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3902: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/430 (108-byte object <48-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 78-4D E4-56 00-00 00-00 00-37 37-31 30-64 36-38 33-64 36-36 64-36 30-63 B0-B6 FD-56 28-00 00-00 28-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 B0-61 E4-56 80-00 00-00 80-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 40-00 00-00 01-65 30-65>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3903: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/431 (108-byte object <48-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 18-06 F2-56 00-00 00-00 00-37 37-31 30-64 36-38 33-64 36-36 64-36 30-63 20-BB FD-56 28-00 00-00 28-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 40-62 E4-56 80-00 00-00 80-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 40-00 00-00 01-65 30-65>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3904: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/432 (108-byte object <49-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 00-C4 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 20-C8 EA-56 00-00 00-00 00-32 63-31 35-32 34-30 62-31 38-66 64-35 33-65 10-83 FD-56 28-00 00-00 28-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 14-00 00-00 01-65 30-65>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3905: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/433 (108-byte object <49-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 E0-C6 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 30-06 F2-56 00-00 00-00 00-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 10-C7 FD-56 28-00 00-00 28-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 14-00 00-00 01-65 30-65>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3906: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/434 (108-byte object <49-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 10-83 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 20-C8 EA-56 00-00 00-00 00-32 63-31 35-32 34-30 62-31 38-66 64-35 33-65 70-C7 FD-56 28-00 00-00 28-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 14-00 00-00 01-65 30-65>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3907: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/435 (108-byte object <49-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 10-C7 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 30-06 F2-56 00-00 00-00 00-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 80-CB FD-56 28-00 00-00 28-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 14-00 00-00 01-65 30-65>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3908: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/436 (108-byte object <49-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 70-C7 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 20-C8 EA-56 00-00 00-00 00-32 63-31 35-32 34-30 62-31 38-66 64-35 33-65 90-CF FD-56 28-00 00-00 28-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 14-00 00-00 01-65 30-65>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3909: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/437 (108-byte object <49-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 80-CB FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 30-06 F2-56 00-00 00-00 00-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 A0-D3 FD-56 28-00 00-00 28-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 14-00 00-00 01-65 30-65>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3910: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/438 (108-byte object <4A-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 90-BF FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 20-C8 EA-56 00-00 00-00 00-32 63-31 35-32 34-30 62-31 38-66 64-35 33-65 30-31 C2-56 54-00 00-00 54-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 2A-00 00-00 01-65 30-65>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3911: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/439 (108-byte object <4A-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 A0-D3 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 30-06 F2-56 00-00 00-00 00-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 C0-75 EF-56 54-00 00-00 54-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 2A-00 00-00 01-65 30-65>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3912: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/440 (108-byte object <4A-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 C0-DB FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 20-C8 EA-56 00-00 00-00 00-32 63-31 35-32 34-30 62-31 38-66 64-35 33-65 30-31 C2-56 54-00 00-00 54-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 2A-00 00-00 01-65 30-65>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3913: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/441 (108-byte object <4A-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 E0-E4 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 30-06 F2-56 00-00 00-00 00-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 C0-75 EF-56 54-00 00-00 54-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 2A-00 00-00 01-65 30-65>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3914: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/442 (108-byte object <4A-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 20-E9 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 20-C8 EA-56 00-00 00-00 00-32 63-31 35-32 34-30 62-31 38-66 64-35 33-65 30-31 C2-56 54-00 00-00 54-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 2A-00 00-00 01-65 30-65>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3915: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/443 (108-byte object <4A-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 60-ED FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 30-06 F2-56 00-00 00-00 00-00 00-00 35-32 34-30 62-31 38-66 64-35 33-65 C0-75 EF-56 54-00 00-00 54-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 2A-00 00-00 01-65 30-65>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3916: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/444 (108-byte object <4B-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-62 36-38 34-32 61-62 66-63 61-31 A0-F1 FD-56 20-00 00-00 20-00 00-00 30-64 36-38 33-64 36-36 64-36 30-63 90-62 E4-56 00-00 00-00 00-32 63-31 35-32 34-30 62-31 38-66 64-35 33-65 40-4D E4-56 80-00 00-00 80-00 00-00 63-32 34-62 33-65 36-38 30-39 35-64 40-00 00-00 01-65 30-65>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3917: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/445 (108-byte object <4B-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 E0-F5 FD-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 30-06 F2-56 00-00 00-00 00-30 37-31 62-66 38-38 36-32 61-39 38-30 34-36 B0-61 E4-56 80-00 00-00 80-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 40-00 00-00 01-38 61-64>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3918: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/446 (108-byte object <4B-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 50-FA FD-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 90-62 E4-56 00-00 00-00 00-30 37-31 62-66 38-38 36-32 61-39 38-30 34-36 40-4D E4-56 80-00 00-00 80-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 40-00 00-00 01-38 61-64>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3919: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/447 (108-byte object <4B-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 C0-FE FD-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 30-06 F2-56 00-00 00-00 00-30 37-31 62-66 38-38 36-32 61-39 38-30 34-36 B0-61 E4-56 80-00 00-00 80-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 40-00 00-00 01-38 61-64>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3920: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/448 (108-byte object <4B-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 30-03 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 90-62 E4-56 00-00 00-00 00-30 37-31 62-66 38-38 36-32 61-39 38-30 34-36 40-4D E4-56 80-00 00-00 80-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 40-00 00-00 01-38 61-64>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3921: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/449 (108-byte object <4B-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 A0-07 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 30-06 F2-56 00-00 00-00 00-30 37-31 62-66 38-38 36-32 61-39 38-30 34-36 B0-61 E4-56 80-00 00-00 80-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 40-00 00-00 01-38 61-64>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3922: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/450 (108-byte object <4C-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 90-CF FD-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 E0-12 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 10-13 FE-56 28-00 00-00 28-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 14-00 00-00 01-38 61-64>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3923: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/451 (108-byte object <4C-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 C0-13 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 F0-13 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 20-14 FE-56 28-00 00-00 28-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 14-00 00-00 01-38 61-64>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3924: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/452 (108-byte object <4C-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 E0-12 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 10-13 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 80-14 FE-56 28-00 00-00 28-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 14-00 00-00 01-38 61-64>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3925: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/453 (108-byte object <4C-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 F0-13 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 20-14 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 B0-14 FE-56 28-00 00-00 28-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 14-00 00-00 01-38 61-64>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3926: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/454 (108-byte object <4C-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 10-13 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 80-14 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 F0-18 FE-56 28-00 00-00 28-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 14-00 00-00 01-38 61-64>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3927: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/455 (108-byte object <4C-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 20-14 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 B0-14 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 30-1D FE-56 28-00 00-00 28-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 14-00 00-00 01-38 61-64>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3928: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/456 (108-byte object <4D-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 F0-18 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 70-21 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 50-9D BD-56 54-00 00-00 54-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 2A-00 00-00 01-38 61-64>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3929: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/457 (108-byte object <4D-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 B0-14 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 30-1D FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 30-31 C2-56 54-00 00-00 54-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 2A-00 00-00 01-38 61-64>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3930: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/458 (108-byte object <4D-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 70-21 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 50-14 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 50-9D BD-56 54-00 00-00 54-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 2A-00 00-00 01-38 61-64>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3931: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/459 (108-byte object <4D-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 30-1D FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 10-0C FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 30-31 C2-56 54-00 00-00 54-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 2A-00 00-00 01-38 61-64>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3932: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/460 (108-byte object <4D-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 50-14 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 50-36 FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 50-9D BD-56 54-00 00-00 54-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 2A-00 00-00 01-38 61-64>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3933: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/461 (108-byte object <4D-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 10-0C FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 C0-3A FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 30-31 C2-56 54-00 00-00 54-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 2A-00 00-00 01-38 61-64>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3934: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/462 (108-byte object <4E-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 64-62 31-66 36-30 36-66 31-63 39-64 50-36 FE-56 20-00 00-00 20-00 00-00 37-37 38-32 38-39 62-33 64-31 30-62 30-3F FE-56 28-00 00-00 28-00 00-00 62-66 38-38 36-32 61-39 38-30 34-36 40-62 E4-56 80-00 00-00 80-00 00-00 31-38 65-62 62-35 32-30 66-65 33-63 40-00 00-00 01-38 61-64>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3935: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/463 (108-byte object <4E-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 C0-3A FE-56 20-00 00-00 20-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 A0-43 FE-56 28-00 00-00 28-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 40-4D E4-56 80-00 00-00 80-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 40-00 00-00 01-64 35-35>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3936: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/464 (108-byte object <4E-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 30-3F FE-56 20-00 00-00 20-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 10-48 FE-56 28-00 00-00 28-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 40-62 E4-56 80-00 00-00 80-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 40-00 00-00 01-64 35-35>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3937: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/465 (108-byte object <4E-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 A0-43 FE-56 20-00 00-00 20-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 B0-4C FE-56 28-00 00-00 28-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 40-4D E4-56 80-00 00-00 80-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 40-00 00-00 01-64 35-35>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3938: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/466 (108-byte object <4E-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 10-48 FE-56 20-00 00-00 20-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 50-51 FE-56 28-00 00-00 28-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 40-62 E4-56 80-00 00-00 80-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 40-00 00-00 01-64 35-35>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3939: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/467 (108-byte object <4E-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 B0-4C FE-56 20-00 00-00 20-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 F0-55 FE-56 28-00 00-00 28-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 40-4D E4-56 80-00 00-00 80-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 40-00 00-00 01-64 35-35>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3940: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/468 (108-byte object <4F-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 20-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 20-C8 EA-56 00-00 00-00 00-39 38-65 35-34 65-32 35-39 32-33 66-36 66-31 80-14 FE-56 28-00 00-00 28-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 14-00 00-00 01-64 35-35>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3941: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/469 (108-byte object <4F-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 F0-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 30-06 F2-56 00-00 00-00 00-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 F0-55 FE-56 28-00 00-00 28-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 14-00 00-00 01-64 35-35>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3942: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/470 (108-byte object <4F-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 20-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 20-C8 EA-56 00-00 00-00 00-39 38-65 35-34 65-32 35-39 32-33 66-36 66-31 00-DC 02-57 28-00 00-00 28-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 14-00 00-00 01-64 35-35>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3943: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/471 (108-byte object <4F-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 F0-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 30-06 F2-56 00-00 00-00 00-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 D0-E6 02-57 28-00 00-00 28-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 14-00 00-00 01-64 35-35>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3944: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/472 (108-byte object <4F-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 20-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 20-C8 EA-56 00-00 00-00 00-39 38-65 35-34 65-32 35-39 32-33 66-36 66-31 00-EB 02-57 28-00 00-00 28-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 14-00 00-00 01-64 35-35>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3945: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/473 (108-byte object <4F-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 F0-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 30-06 F2-56 00-00 00-00 00-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 30-EF 02-57 28-00 00-00 28-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 14-00 00-00 01-64 35-35>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3946: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/474 (108-byte object <50-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 20-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 20-C8 EA-56 00-00 00-00 00-39 38-65 35-34 65-32 35-39 32-33 66-36 66-31 C0-75 EF-56 54-00 00-00 54-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 2A-00 00-00 01-64 35-35>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3947: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/475 (108-byte object <50-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 F0-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 30-06 F2-56 00-00 00-00 00-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 50-9D BD-56 54-00 00-00 54-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 2A-00 00-00 01-64 35-35>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3948: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/476 (108-byte object <50-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 20-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 20-C8 EA-56 00-00 00-00 00-39 38-65 35-34 65-32 35-39 32-33 66-36 66-31 C0-75 EF-56 54-00 00-00 54-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 2A-00 00-00 01-64 35-35>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3949: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/477 (108-byte object <50-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 F0-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 30-06 F2-56 00-00 00-00 00-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 50-9D BD-56 54-00 00-00 54-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 2A-00 00-00 01-64 35-35>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3950: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/478 (108-byte object <50-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 20-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 20-C8 EA-56 00-00 00-00 00-39 38-65 35-34 65-32 35-39 32-33 66-36 66-31 C0-75 EF-56 54-00 00-00 54-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 2A-00 00-00 01-64 35-35>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3951: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/479 (108-byte object <50-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 F0-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 30-06 F2-56 00-00 00-00 00-00 00-00 35-34 65-32 35-39 32-33 66-36 66-31 50-9D BD-56 54-00 00-00 54-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 2A-00 00-00 01-64 35-35>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3952: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/480 (108-byte object <51-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 31-62 30-35 33-65 38-34 38-61 32-34 20-E0 02-57 3C-00 00-00 3C-00 00-00 33-63 31-34 64-63 33-36 34-63 39-30 90-4D E4-56 00-00 00-00 00-39 38-65 35-34 65-32 35-39 32-33 66-36 66-31 B0-61 E4-56 80-00 00-00 80-00 00-00 61-64 37-38 31-35 37-61 63-39 61-30 40-00 00-00 01-64 35-35>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3953: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/481 (108-byte object <51-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 30-06 F2-56 00-00 00-00 00-35 38-37 61-38 65-39 38-65 65-63 33-61 34-66 40-62 E4-56 80-00 00-00 80-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 40-00 00-00 01-30 61-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3954: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/482 (108-byte object <51-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 90-4D E4-56 00-00 00-00 00-35 38-37 61-38 65-39 38-65 65-63 33-61 34-66 B0-61 E4-56 80-00 00-00 80-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 40-00 00-00 01-30 61-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3955: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/483 (108-byte object <51-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 30-06 F2-56 00-00 00-00 00-35 38-37 61-38 65-39 38-65 65-63 33-61 34-66 40-62 E4-56 80-00 00-00 80-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 40-00 00-00 01-30 61-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3956: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/484 (108-byte object <51-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 90-4D E4-56 00-00 00-00 00-35 38-37 61-38 65-39 38-65 65-63 33-61 34-66 B0-61 E4-56 80-00 00-00 80-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 40-00 00-00 01-30 61-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3957: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/485 (108-byte object <51-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 30-06 F2-56 00-00 00-00 00-35 38-37 61-38 65-39 38-65 65-63 33-61 34-66 40-62 E4-56 80-00 00-00 80-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 40-00 00-00 01-30 61-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3958: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/486 (108-byte object <52-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 00-2F 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 30-2F 03-57 28-00 00-00 28-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 14-00 00-00 01-30 61-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3959: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/487 (108-byte object <52-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 10-30 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 40-30 03-57 28-00 00-00 28-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 14-00 00-00 01-30 61-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3960: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/488 (108-byte object <52-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 30-2F 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 A0-30 03-57 28-00 00-00 28-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 14-00 00-00 01-30 61-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3961: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/489 (108-byte object <52-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 40-30 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 00-35 03-57 28-00 00-00 28-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 14-00 00-00 01-30 61-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3962: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/490 (108-byte object <52-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 A0-30 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 60-39 03-57 28-00 00-00 28-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 14-00 00-00 01-30 61-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3963: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/491 (108-byte object <52-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 00-35 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 C0-3D 03-57 28-00 00-00 28-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 14-00 00-00 01-30 61-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3964: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/492 (108-byte object <53-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 80-10 FE-56 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 30-31 C2-56 54-00 00-00 54-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 2A-00 00-00 01-30 61-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3965: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/493 (108-byte object <53-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 C0-3D 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 C0-75 EF-56 54-00 00-00 54-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 2A-00 00-00 01-30 61-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3966: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/494 (108-byte object <53-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 80-46 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 30-31 C2-56 54-00 00-00 54-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 2A-00 00-00 01-30 61-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3967: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/495 (108-byte object <53-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 90-50 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 C0-75 EF-56 54-00 00-00 54-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 2A-00 00-00 01-30 61-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3968: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/496 (108-byte object <53-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 20-55 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 30-31 C2-56 54-00 00-00 54-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 2A-00 00-00 01-30 61-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3969: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/497 (108-byte object <53-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 F0-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 B0-59 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 C0-75 EF-56 54-00 00-00 54-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 2A-00 00-00 01-30 61-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3970: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/498 (108-byte object <54-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 63-33 63-66 65-39 65-64 30-33 61-30 20-E0 02-57 3C-00 00-00 3C-00 00-00 32-35 34-39 33-36 63-30 33-31 33-33 40-5E 03-57 28-00 00-00 28-00 00-00 61-38 65-39 38-65 65-63 33-61 34-66 40-4D E4-56 80-00 00-00 80-00 00-00 34-39 63-31 65-36 61-35 66-63 64-64 40-00 00-00 01-30 61-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3971: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/499 (108-byte object <54-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 62-30 61-65 65-34 61-63 37-34 63-31 F0-E0 02-57 3C-00 00-00 3C-00 00-00 65-30 35-38 38-33 35-65 34-36 65-35 D0-62 03-57 28-00 00-00 28-00 00-00 39-66 65-34 63-36 63-37 36-30 34-32 B0-61 E4-56 80-00 00-00 80-00 00-00 33-34 61-32 35-34 61-35 36-32 61-63 40-00 00-00 01-34 66-31>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3972: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/500 (108-byte object <54-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 62-30 61-65 65-34 61-63 37-34 63-31 20-E0 02-57 3C-00 00-00 3C-00 00-00 65-30 35-38 38-33 35-65 34-36 65-35 90-67 03-57 28-00 00-00 28-00 00-00 39-66 65-34 63-36 63-37 36-30 34-32 40-4D E4-56 80-00 00-00 80-00 00-00 33-34 61-32 35-34 61-35 36-32 61-63 40-00 00-00 01-34 66-31>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3973: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/501 (108-byte object <54-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 62-30 61-65 65-34 61-63 37-34 63-31 F0-E0 02-57 3C-00 00-00 3C-00 00-00 65-30 35-38 38-33 35-65 34-36 65-35 50-6C 03-57 28-00 00-00 28-00 00-00 39-66 65-34 63-36 63-37 36-30 34-32 B0-61 E4-56 80-00 00-00 80-00 00-00 33-34 61-32 35-34 61-35 36-32 61-63 40-00 00-00 01-34 66-31>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3974: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/502 (108-byte object <54-00 00-00 20-C5 FE-56 40-00 00-00 40-00 00-00 62-30 61-65 65-34 61-63 37-34 63-31 20-E0 02-57 3C-00 00-00 3C-00 00-00 65-30 35-38 38-33 35-65 34-36 65-35 10-71 03-57 28-00 00-00 28-00 00-00 39-66 65-34 63-36 63-37 36-30 34-32 40-4D E4-56 80-00 00-00 80-00 00-00 33-34 61-32 35-34 61-35 36-32 61-63 40-00 00-00 01-34 66-31>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3975: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/503 (108-byte object <54-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 62-30 61-65 65-34 61-63 37-34 63-31 F0-E0 02-57 3C-00 00-00 3C-00 00-00 65-30 35-38 38-33 35-65 34-36 65-35 D0-75 03-57 28-00 00-00 28-00 00-00 39-66 65-34 63-36 63-37 36-30 34-32 B0-61 E4-56 80-00 00-00 80-00 00-00 33-34 61-32 35-34 61-35 36-32 61-63 40-00 00-00 01-34 66-31>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3976: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/504 (108-byte object <55-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 62-30 61-65 65-34 61-63 37-34 63-31 40-4D E4-56 80-00 00-00 80-00 00-00 65-30 35-38 38-33 35-65 34-36 65-35 90-62 E4-56 00-00 00-00 00-35 39-39 39-66 65-34 63-36 63-37 36-30 34-32 50-9D BD-56 54-00 00-00 54-00 00-00 33-34 61-32 35-34 61-35 36-32 61-63 2A-00 00-00 01-34 66-31>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3977: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/505 (108-byte object <55-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 B0-61 E4-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 30-06 F2-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 30-31 C2-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3978: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/506 (108-byte object <55-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 40-4D E4-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 90-62 E4-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 50-9D BD-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3979: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/507 (108-byte object <55-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 B0-61 E4-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 30-06 F2-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 30-31 C2-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3980: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/508 (108-byte object <55-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 40-4D E4-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 90-62 E4-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 50-9D BD-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3981: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/509 (108-byte object <55-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 B0-61 E4-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 30-06 F2-56 00-00 00-00 00-61 34-62 66-37 65-39 30-32 35-65 34-33 34-62 30-31 C2-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3982: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/510 (108-byte object <56-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 35-65 37-37 34-36 34-36 62-39 32-36 40-4D E4-56 80-00 00-00 80-00 00-00 62-30 64-65 31-32 34-31 66-38 36-36 A0-2C 03-57 28-00 00-00 28-00 00-00 66-37 65-39 30-32 35-65 34-33 34-62 50-9D BD-56 54-00 00-00 54-00 00-00 36-33 33-30 39-33 30-33 30-35 35-66 2A-00 00-00 01-37 36-39>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3983: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/511 (108-byte object <56-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 B0-61 E4-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 50-9C 03-57 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-31 C2-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3984: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/512 (108-byte object <56-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-4D E4-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 A0-9E 03-57 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-9D BD-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3985: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/513 (108-byte object <56-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 B0-61 E4-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 70-A3 03-57 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-31 C2-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3986: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/514 (108-byte object <56-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-4D E4-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 40-A8 03-57 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-9D BD-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3987: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/515 (108-byte object <56-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 B0-61 E4-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 D0-CC F7-56 28-00 00-00 28-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 30-31 C2-56 54-00 00-00 54-00 00-00 33-62 66-38 39-31 31-39 35-38 35-38 2A-00 00-00 01-37 66-34>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3988: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/516 (108-byte object <57-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 32-32 30-32 64-39 31-38 32-35 38-63 40-4D E4-56 80-00 00-00 80-00 00-00 35-65 34-64 32-33 62-33 66-63 34-33 20-D4 F7-56 10-00 00-00 10-00 00-00 61-64 39-61 36-32 33-33 37-66 62-63 50-4A 04-57 80-7F 00-00 80-7F 00-00 33-62 66-38 39-31 31-39 35-38 35-38 C0-3F 00-00 01-37 66-34>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3989: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/517 (108-byte object <57-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-36 34-64 38-37 61-32 62-33 31-37 B0-61 E4-56 80-00 00-00 80-00 00-00 34-64 66-39 33-62 35-65 39-62 66-31 00-D4 F7-56 10-00 00-00 10-00 00-00 64-65 38-37 38-32 37-33 38-66 62-34 E0-C9 04-57 80-7F 00-00 80-7F 00-00 39-66 32-39 35-36 32-30 33-33 63-62 C0-3F 00-00 01-65 61-32>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3990: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/518 (108-byte object <57-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-36 34-64 38-37 61-32 62-33 31-37 40-4D E4-56 80-00 00-00 80-00 00-00 34-64 66-39 33-62 35-65 39-62 66-31 10-D9 F7-56 10-00 00-00 10-00 00-00 64-65 38-37 38-32 37-33 38-66 62-34 50-4A 04-57 80-7F 00-00 80-7F 00-00 39-66 32-39 35-36 32-30 33-33 63-62 C0-3F 00-00 01-65 61-32>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3991: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/519 (108-byte object <57-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-36 34-64 38-37 61-32 62-33 31-37 B0-61 E4-56 80-00 00-00 80-00 00-00 34-64 66-39 33-62 35-65 39-62 66-31 E0-4B 05-57 10-00 00-00 10-00 00-00 64-65 38-37 38-32 37-33 38-66 62-34 E0-C9 04-57 80-7F 00-00 80-7F 00-00 39-66 32-39 35-36 32-30 33-33 63-62 C0-3F 00-00 01-65 61-32>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3992: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/520 (108-byte object <57-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-36 34-64 38-37 61-32 62-33 31-37 40-4D E4-56 80-00 00-00 80-00 00-00 34-64 66-39 33-62 35-65 39-62 66-31 10-50 05-57 10-00 00-00 10-00 00-00 64-65 38-37 38-32 37-33 38-66 62-34 50-4A 04-57 80-7F 00-00 80-7F 00-00 39-66 32-39 35-36 32-30 33-33 63-62 C0-3F 00-00 01-65 61-32>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3993: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/521 (108-byte object <57-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 65-36 34-64 38-37 61-32 62-33 31-37 B0-61 E4-56 80-00 00-00 80-00 00-00 34-64 66-39 33-62 35-65 39-62 66-31 00-54 05-57 10-00 00-00 10-00 00-00 64-65 38-37 38-32 37-33 38-66 62-34 E0-C9 04-57 80-7F 00-00 80-7F 00-00 39-66 32-39 35-36 32-30 33-33 63-62 C0-3F 00-00 01-65 61-32>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #3994: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/522 (108-byte object <58-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 65-36 34-64 38-37 61-32 62-33 31-37 40-4D E4-56 80-00 00-00 80-00 00-00 34-64 66-39 33-62 35-65 39-62 66-31 30-CF F7-56 10-00 00-00 10-00 00-00 64-65 38-37 38-32 37-33 38-66 62-34 A8-62 E4-56 00-00 00-00 00-33 33-39 39-66 32-39 35-36 32-30 33-33 63-62 C1-3F 00-00 00-65 61-32>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #3995: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/523 (108-byte object <58-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 B0-61 E4-56 80-00 00-00 80-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 C0-5C 05-57 10-00 00-00 10-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 48-06 F2-56 00-00 00-00 00-61 31-38 35-30 34-32 35-36 35-34 34-66 39-32 C1-3F 00-00 00-37 36-31>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #3996: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/524 (108-byte object <58-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 40-4D E4-56 80-00 00-00 80-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 20-61 05-57 10-00 00-00 10-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 A8-62 E4-56 00-00 00-00 00-61 31-38 35-30 34-32 35-36 35-34 34-66 39-32 C1-3F 00-00 00-37 36-31>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #3997: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/525 (108-byte object <58-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 B0-61 E4-56 80-00 00-00 80-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 80-65 05-57 10-00 00-00 10-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 48-06 F2-56 00-00 00-00 00-61 31-38 35-30 34-32 35-36 35-34 34-66 39-32 C1-3F 00-00 00-37 36-31>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #3998: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/526 (108-byte object <58-00 00-00 A0-9D F1-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 40-4D E4-56 80-00 00-00 80-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 E0-69 05-57 10-00 00-00 10-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 A8-62 E4-56 00-00 00-00 00-61 31-38 35-30 34-32 35-36 35-34 34-66 39-32 C1-3F 00-00 00-37 36-31>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #3999: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/527 (108-byte object <58-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 B0-61 E4-56 80-00 00-00 80-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 40-6E 05-57 10-00 00-00 10-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 48-06 F2-56 00-00 00-00 00-61 31-38 35-30 34-32 35-36 35-34 34-66 39-32 C1-3F 00-00 00-37 36-31>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4000: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/528 (108-byte object <59-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 08-C8 EA-56 00-00 00-00 00-33 35-30 32-66 30-62 36-66 63-31 36-33 31-30 40-99 03-57 28-00 00-00 28-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 80-7B 05-57 40-00 00-00 40-00 00-00 35-30 34-32 35-36 35-34 34-66 39-32 20-00 00-00 01-37 36-31>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4001: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/529 (108-byte object <59-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 70-7C 05-57 28-00 00-00 28-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 20-7C 05-57 40-00 00-00 40-00 00-00 35-30 34-32 35-36 35-34 34-66 39-32 20-00 00-00 01-37 36-31>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4002: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/530 (108-byte object <59-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 08-C8 EA-56 00-00 00-00 00-33 35-30 32-66 30-62 36-66 63-31 36-33 31-30 C0-7E 05-57 28-00 00-00 28-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 80-7B 05-57 40-00 00-00 40-00 00-00 35-30 34-32 35-36 35-34 34-66 39-32 20-00 00-00 01-37 36-31>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4003: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/531 (108-byte object <59-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 F0-82 05-57 28-00 00-00 28-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 20-7C 05-57 40-00 00-00 40-00 00-00 35-30 34-32 35-36 35-34 34-66 39-32 20-00 00-00 01-37 36-31>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4004: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/532 (108-byte object <59-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 08-C8 EA-56 00-00 00-00 00-33 35-30 32-66 30-62 36-66 63-31 36-33 31-30 20-87 05-57 28-00 00-00 28-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 80-7B 05-57 40-00 00-00 40-00 00-00 35-30 34-32 35-36 35-34 34-66 39-32 20-00 00-00 01-37 36-31>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4005: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/533 (108-byte object <59-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 18-06 F2-56 00-00 00-00 00-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 50-8B 05-57 28-00 00-00 28-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 20-7C 05-57 40-00 00-00 40-00 00-00 35-30 34-32 35-36 35-34 34-66 39-32 20-00 00-00 01-37 36-31>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4006: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/534 (108-byte object <5A-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 61-30 36-31 64-36 66-66 35-64 37-62 40-62 E4-56 80-00 00-00 80-00 00-00 32-66 30-62 36-66 63-31 36-33 31-30 80-8F 05-57 28-00 00-00 28-00 00-00 65-30 36-33 65-38 32-64 35-38 32-36 80-7B 05-57 40-00 00-00 40-00 00-00 35-30 34-32 35-36 35-34 34-66 39-32 20-00 00-00 01-37 36-31>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4007: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/535 (108-byte object <5A-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-4D E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-93 05-57 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-7C 05-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4008: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/536 (108-byte object <5A-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-62 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 70-98 05-57 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 80-7B 05-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4009: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/537 (108-byte object <5A-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-4D E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 30-9D 05-57 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-7C 05-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4010: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/538 (108-byte object <5A-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-62 E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 F0-A1 05-57 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 80-7B 05-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4011: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/539 (108-byte object <5A-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-4D E4-56 80-00 00-00 80-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 B0-A6 05-57 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-7C 05-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4012: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/540 (108-byte object <5B-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 40-62 E4-56 82-00 00-00 82-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 70-AB 05-57 28-00 00-00 28-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 80-7B 05-57 40-00 00-00 40-00 00-00 30-30 30-30 30-30 30-30 30-30 30-30 20-00 00-00 01-30 30-30>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4013: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/541 (108-byte object <5B-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-4D E4-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-B0 05-57 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-7C 05-57 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4014: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/542 (108-byte object <5B-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-62 E4-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-B4 05-57 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 80-7B 05-57 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4015: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/543 (108-byte object <5B-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-4D E4-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 B0-B9 05-57 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-7C 05-57 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4016: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/544 (108-byte object <5B-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-62 E4-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 70-BE 05-57 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 80-7B 05-57 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4017: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/545 (108-byte object <5B-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-4D E4-56 82-00 00-00 82-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 30-C3 05-57 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 20-7C 05-57 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4018: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/546 (108-byte object <5C-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 39-39 35-33 34-63 31-65 37-65 37-63 40-62 E4-56 80-00 00-00 80-00 00-00 36-38 31-61 66-66 33-65 32-64 33-33 F0-C7 05-57 28-00 00-00 28-00 00-00 36-36 64-63 66-65 33-35 35-37 33-62 80-7B 05-57 40-00 00-00 40-00 00-00 63-64 32-30 62-66 65-32 61-39 30-64 20-00 00-00 01-31 36-37>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4019: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/547 (108-byte object <5C-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-4D E4-56 80-00 00-00 80-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 D0-4C 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4020: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/548 (108-byte object <5C-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-62 E4-56 80-00 00-00 80-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 90-51 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4021: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/549 (108-byte object <5C-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-4D E4-56 80-00 00-00 80-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 50-56 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4022: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/550 (108-byte object <5C-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-62 E4-56 80-00 00-00 80-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 10-5B 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4023: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/551 (108-byte object <5C-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-4D E4-56 80-00 00-00 80-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 D0-5F 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4024: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/552 (108-byte object <5D-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 10-67 06-57 10-00 00-00 10-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 90-64 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4025: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/553 (108-byte object <5D-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 F0-66 06-57 10-00 00-00 10-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 50-69 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4026: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/554 (108-byte object <5D-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 F0-6B 06-57 10-00 00-00 10-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 C0-6D 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4027: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/555 (108-byte object <5D-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-70 06-57 10-00 00-00 10-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 10-72 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4028: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/556 (108-byte object <5D-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 90-74 06-57 10-00 00-00 10-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 60-76 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4029: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/557 (108-byte object <5D-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 E0-78 06-57 10-00 00-00 10-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 B0-7A 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4030: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/558 (108-byte object <5E-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 50-83 06-57 20-00 00-00 20-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 F0-7C 05-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4031: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/559 (108-byte object <5E-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 10-86 06-57 20-00 00-00 20-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 40-86 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4032: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/560 (108-byte object <5E-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 F0-7C 05-57 20-00 00-00 20-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 A0-86 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4033: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/561 (108-byte object <5E-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-86 06-57 20-00 00-00 20-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 00-8B 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4034: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/562 (108-byte object <5E-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 A0-86 06-57 20-00 00-00 20-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 60-8F 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4035: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/563 (108-byte object <5E-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 00-8B 06-57 20-00 00-00 20-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 C0-93 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4036: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/564 (108-byte object <5F-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 A0-86 E6-56 30-00 00-00 30-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 00-7F 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4037: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/565 (108-byte object <5F-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 20-C2 D2-56 30-00 00-00 30-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 C0-93 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4038: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/566 (108-byte object <5F-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 A0-86 E6-56 30-00 00-00 30-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 80-9C 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4039: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/567 (108-byte object <5F-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 20-C2 D2-56 30-00 00-00 30-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 50-A6 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4040: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/568 (108-byte object <5F-00 00-00 F0-E0 02-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 A0-86 E6-56 30-00 00-00 30-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 C0-AA 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4041: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/569 (108-byte object <5F-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 20-C2 D2-56 30-00 00-00 30-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 30-AF 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4042: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/570 (108-byte object <60-00 00-00 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 A0-7C 05-57 40-00 00-00 40-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 A0-B3 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4043: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/571 (108-byte object <60-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 20-7C 05-57 40-00 00-00 40-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 10-B8 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 F0-BA 06-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4044: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/572 (108-byte object <60-00 00-00 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 A0-7C 05-57 40-00 00-00 40-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 D0-BD 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4045: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/573 (108-byte object <60-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 20-7C 05-57 40-00 00-00 40-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 50-C2 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 F0-BA 06-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4046: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/574 (108-byte object <60-00 00-00 80-7B 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 A0-7C 05-57 40-00 00-00 40-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 D0-C6 06-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4047: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/575 (108-byte object <60-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 20-7C 05-57 40-00 00-00 40-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 60-CE 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 F0-BA 06-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4048: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/576 (108-byte object <61-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 C0-75 EF-56 50-00 00-00 50-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 E0-D2 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4049: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/577 (108-byte object <61-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 50-9D BD-56 50-00 00-00 50-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 60-D7 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4050: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/578 (108-byte object <61-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 C0-75 EF-56 50-00 00-00 50-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 F0-D9 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4051: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/579 (108-byte object <61-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 50-9D BD-56 50-00 00-00 50-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 60-DE 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4052: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/580 (108-byte object <61-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 C0-75 EF-56 50-00 00-00 50-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 F0-E2 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4053: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/581 (108-byte object <61-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 50-9D BD-56 50-00 00-00 50-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 80-E7 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4054: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/582 (108-byte object <62-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 D0-9E F1-56 60-00 00-00 60-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 10-EC 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4055: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/583 (108-byte object <62-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 60-9E F1-56 60-00 00-00 60-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 A0-F0 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4056: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/584 (108-byte object <62-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 D0-9E F1-56 60-00 00-00 60-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 40-F5 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4057: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/585 (108-byte object <62-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 60-9E F1-56 60-00 00-00 60-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 E0-F9 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4058: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/586 (108-byte object <62-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 D0-9E F1-56 60-00 00-00 60-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 80-FE 03-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4059: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/587 (108-byte object <62-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 60-9E F1-56 60-00 00-00 60-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 20-03 04-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4060: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/588 (108-byte object <63-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-0F 04-57 70-00 00-00 70-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 C0-07 04-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4061: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/589 (108-byte object <63-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-10 04-57 70-00 00-00 70-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 60-0C 04-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4062: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/590 (108-byte object <63-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-0F 04-57 70-00 00-00 70-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 10-13 04-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4063: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/591 (108-byte object <63-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-10 04-57 70-00 00-00 70-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 C0-17 04-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4064: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/592 (108-byte object <63-00 00-00 A0-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-0F 04-57 70-00 00-00 70-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 70-1C 04-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7D 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4065: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/593 (108-byte object <63-00 00-00 90-1B F2-56 40-00 00-00 40-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 40-10 04-57 70-00 00-00 70-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 20-21 04-57 28-00 00-00 28-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 20-7C 05-57 40-00 00-00 40-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 20-00 00-00 01-61 30-38>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4066: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/594 (108-byte object <64-00 00-00 E0-2C 04-57 80-00 00-00 80-00 00-00 30-63 35-38 65-65 66-34 33-35 62-62 70-2D 04-57 80-00 00-00 80-00 00-00 63-66 32-63 38-37 39-36 33-39 64-31 50-28 04-57 10-00 00-00 10-00 00-00 38-32 32-61 61-35 66-34 30-36 62-39 00-2E 04-57 80-00 00-00 80-00 00-00 30-63 35-36 66-30 38-35 36-37 30-39 40-00 00-00 01-61 30-38>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4067: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/595 (108-byte object <64-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 65-63 61-62 63-38 65-64 31-66 66-63 A0-2F 04-57 80-00 00-00 80-00 00-00 32-31 38-30 65-32 38-38 38-62 62-65 30-28 04-57 10-00 00-00 10-00 00-00 38-63 35-65 30-66 37-39 63-61 62-66 30-30 04-57 80-00 00-00 80-00 00-00 62-65 31-35 32-61 61-65 31-35 35-62 40-00 00-00 01-39 66-39>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4068: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/596 (108-byte object <64-00 00-00 E0-2C 04-57 80-00 00-00 80-00 00-00 65-63 61-62 63-38 65-64 31-66 66-63 70-2D 04-57 80-00 00-00 80-00 00-00 32-31 38-30 65-32 38-38 38-62 62-65 90-2E 04-57 10-00 00-00 10-00 00-00 38-63 35-65 30-66 37-39 63-61 62-66 00-2E 04-57 80-00 00-00 80-00 00-00 62-65 31-35 32-61 61-65 31-35 35-62 40-00 00-00 01-39 66-39>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4069: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/597 (108-byte object <64-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 65-63 61-62 63-38 65-64 31-66 66-63 A0-2F 04-57 80-00 00-00 80-00 00-00 32-31 38-30 65-32 38-38 38-62 62-65 E0-35 04-57 10-00 00-00 10-00 00-00 38-63 35-65 30-66 37-39 63-61 62-66 30-30 04-57 80-00 00-00 80-00 00-00 62-65 31-35 32-61 61-65 31-35 35-62 40-00 00-00 01-39 66-39>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4070: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/598 (108-byte object <64-00 00-00 E0-2C 04-57 80-00 00-00 80-00 00-00 65-63 61-62 63-38 65-64 31-66 66-63 70-2D 04-57 80-00 00-00 80-00 00-00 32-31 38-30 65-32 38-38 38-62 62-65 60-3A 04-57 10-00 00-00 10-00 00-00 38-63 35-65 30-66 37-39 63-61 62-66 00-2E 04-57 80-00 00-00 80-00 00-00 62-65 31-35 32-61 61-65 31-35 35-62 40-00 00-00 01-39 66-39>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4071: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/599 (108-byte object <64-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 65-63 61-62 63-38 65-64 31-66 66-63 A0-2F 04-57 80-00 00-00 80-00 00-00 32-31 38-30 65-32 38-38 38-62 62-65 E0-3E 04-57 10-00 00-00 10-00 00-00 38-63 35-65 30-66 37-39 63-61 62-66 30-30 04-57 80-00 00-00 80-00 00-00 62-65 31-35 32-61 61-65 31-35 35-62 40-00 00-00 01-39 66-39>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4072: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/600 (108-byte object <65-00 00-00 70-2D 04-57 80-00 00-00 80-00 00-00 38-30 37-35 39-63 30-34 32-61 36-64 00-2E 04-57 80-00 00-00 80-00 00-00 66-64 36-66 62-30 36-36 38-30 35-63 80-23 04-57 10-00 00-00 10-00 00-00 30-37 38-61 65-34 34-64 63-62 38-38 10-4F 04-57 F0-00 00-00 F0-00 00-00 36-62 66-36 33-39 34-61 61-64 33-36 78-00 00-00 01-38 62-37>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4073: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/601 (108-byte object <65-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 61-66 33-38 34-63 63-32 38-39 63-31 A0-2F 04-57 80-00 00-00 80-00 00-00 39-32 33-36 63-30 34-31 30-36 65-30 C0-48 04-57 10-00 00-00 10-00 00-00 31-30 65-34 31-30 37-62 36-62 37-38 70-50 04-57 F0-00 00-00 F0-00 00-00 62-35 39-63 37-63 30-31 31-36 31-63 78-00 00-00 01-31 61-37>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4074: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/602 (108-byte object <65-00 00-00 70-2D 04-57 80-00 00-00 80-00 00-00 61-66 33-38 34-63 63-32 38-39 63-31 00-2E 04-57 80-00 00-00 80-00 00-00 39-32 33-36 63-30 34-31 30-36 65-30 F0-4D 04-57 10-00 00-00 10-00 00-00 31-30 65-34 31-30 37-62 36-62 37-38 10-4F 04-57 F0-00 00-00 F0-00 00-00 62-35 39-63 37-63 30-31 31-36 31-63 78-00 00-00 01-31 61-37>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4075: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/603 (108-byte object <65-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 61-66 33-38 34-63 63-32 38-39 63-31 A0-2F 04-57 80-00 00-00 80-00 00-00 39-32 33-36 63-30 34-31 30-36 65-30 70-56 04-57 10-00 00-00 10-00 00-00 31-30 65-34 31-30 37-62 36-62 37-38 70-50 04-57 F0-00 00-00 F0-00 00-00 62-35 39-63 37-63 30-31 31-36 31-63 78-00 00-00 01-31 61-37>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4076: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/604 (108-byte object <65-00 00-00 70-2D 04-57 80-00 00-00 80-00 00-00 61-66 33-38 34-63 63-32 38-39 63-31 00-2E 04-57 80-00 00-00 80-00 00-00 39-32 33-36 63-30 34-31 30-36 65-30 F0-5A 04-57 10-00 00-00 10-00 00-00 31-30 65-34 31-30 37-62 36-62 37-38 10-4F 04-57 F0-00 00-00 F0-00 00-00 62-35 39-63 37-63 30-31 31-36 31-63 78-00 00-00 01-31 61-37>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4077: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/605 (108-byte object <65-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 61-66 33-38 34-63 63-32 38-39 63-31 A0-2F 04-57 80-00 00-00 80-00 00-00 39-32 33-36 63-30 34-31 30-36 65-30 90-60 04-57 10-00 00-00 10-00 00-00 31-30 65-34 31-30 37-62 36-62 37-38 70-50 04-57 F0-00 00-00 F0-00 00-00 62-35 39-63 37-63 30-31 31-36 31-63 78-00 00-00 01-31 61-37>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4078: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/606 (108-byte object <66-00 00-00 70-2D 04-57 80-00 00-00 80-00 00-00 61-66 33-38 34-63 63-32 38-39 63-31 00-2E 04-57 80-00 00-00 80-00 00-00 39-32 33-36 63-30 34-31 30-36 65-30 90-43 04-57 10-00 00-00 10-00 00-00 31-30 65-34 31-30 37-62 36-62 37-38 90-C0 B0-56 00-02 00-00 00-02 00-00 62-35 39-63 37-63 30-31 31-36 31-63 00-01 00-00 01-31 61-37>, 4-byte object <00-00 00-00>, 624)' - PASSED gtests.sh: #4079: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/607 (108-byte object <66-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 34-39 37-36 33-37 32-62 34-61 63-38 A0-2F 04-57 80-00 00-00 80-00 00-00 66-33 38-37 35-63 64-33 31-64 66-64 D0-6B 04-57 10-00 00-00 10-00 00-00 37-62 62-38 65-35 64-32 39-33 30-61 30-EC BF-56 00-02 00-00 00-02 00-00 61-34 65-34 38-63 38-33 39-35 62-35 00-01 00-00 01-37 66-62>, 4-byte object <01-00 00-00>, 624)' - PASSED gtests.sh: #4080: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/608 (108-byte object <66-00 00-00 70-2D 04-57 80-00 00-00 80-00 00-00 34-39 37-36 33-37 32-62 34-61 63-38 00-2E 04-57 80-00 00-00 80-00 00-00 66-33 38-37 35-63 64-33 31-64 66-64 70-71 04-57 10-00 00-00 10-00 00-00 37-62 62-38 65-35 64-32 39-33 30-61 90-C0 B0-56 00-02 00-00 00-02 00-00 61-34 65-34 38-63 38-33 39-35 62-35 00-01 00-00 01-37 66-62>, 4-byte object <02-00 00-00>, 624)' - PASSED gtests.sh: #4081: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/609 (108-byte object <66-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 34-39 37-36 33-37 32-62 34-61 63-38 A0-2F 04-57 80-00 00-00 80-00 00-00 66-33 38-37 35-63 64-33 31-64 66-64 10-76 04-57 10-00 00-00 10-00 00-00 37-62 62-38 65-35 64-32 39-33 30-61 30-EC BF-56 00-02 00-00 00-02 00-00 61-34 65-34 38-63 38-33 39-35 62-35 00-01 00-00 01-37 66-62>, 4-byte object <03-00 00-00>, 624)' - PASSED gtests.sh: #4082: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/610 (108-byte object <66-00 00-00 70-2D 04-57 80-00 00-00 80-00 00-00 34-39 37-36 33-37 32-62 34-61 63-38 00-2E 04-57 80-00 00-00 80-00 00-00 66-33 38-37 35-63 64-33 31-64 66-64 C0-7C 04-57 10-00 00-00 10-00 00-00 37-62 62-38 65-35 64-32 39-33 30-61 90-C0 B0-56 00-02 00-00 00-02 00-00 61-34 65-34 38-63 38-33 39-35 62-35 00-01 00-00 01-37 66-62>, 4-byte object <04-00 00-00>, 624)' - PASSED gtests.sh: #4083: 'HkdfSha512/Pkcs11HkdfTest: WycheproofVectors/611 (108-byte object <66-00 00-00 10-2F 04-57 80-00 00-00 80-00 00-00 34-39 37-36 33-37 32-62 34-61 63-38 A0-2F 04-57 80-00 00-00 80-00 00-00 66-33 38-37 35-63 64-33 31-64 66-64 70-83 04-57 10-00 00-00 10-00 00-00 37-62 62-38 65-35 64-32 39-33 30-61 30-EC BF-56 00-02 00-00 00-02 00-00 61-34 65-34 38-63 38-33 39-35 62-35 00-01 00-00 01-37 66-62>, 4-byte object <05-00 00-00>, 624)' - PASSED gtests.sh: #4084: 'EncryptDeriveTests/EncryptDeriveTest: Test/0 306' - PASSED gtests.sh: #4085: 'EncryptDeriveTests/EncryptDeriveTest: Test/1 307' - PASSED gtests.sh: #4086: 'EncryptDeriveTests/EncryptDeriveTest: Test/2 4225' - PASSED gtests.sh: #4087: 'EncryptDeriveTests/EncryptDeriveTest: Test/3 4225' - PASSED gtests.sh: #4088: 'EncryptDeriveTests/EncryptDeriveTest: Test/4 4226' - PASSED gtests.sh: #4089: 'EncryptDeriveTests/EncryptDeriveTest: Test/5 1361' - PASSED gtests.sh: #4090: 'EncryptDeriveTests/EncryptDeriveTest: Test/6 1362' - PASSED gtests.sh: #4091: 'EncryptDeriveTests/EncryptDeriveTest: Test/7 1617' - PASSED gtests.sh: #4092: 'EncryptDeriveTests/EncryptDeriveTest: Test/8 1618' - PASSED gtests.sh: #4093: 'Encrypt3DeriveTests/EncryptDerive3Test: Test/0 306' - PASSED gtests.sh: #4094: 'Encrypt3DeriveTests/EncryptDerive3Test: Test/1 307' - PASSED gtests.sh: #4095: 'EddsaSignVerify/Pkcs11EddsaTest: SignAndVerify/0 32-byte object <20-C2 D2-56 30-00 00-00 30-CB B7-56 2C-00 00-00 90-5C AF-56 01-00 00-00 40-BB 06-57 40-00 00-00>' - PASSED gtests.sh: #4096: 'EddsaSignVerify/Pkcs11EddsaTest: SignAndVerify/1 32-byte object <20-C2 D2-56 30-00 00-00 30-CB B7-56 2C-00 00-00 90-5C AF-56 02-00 00-00 40-BB 06-57 40-00 00-00>' - PASSED gtests.sh: #4097: 'EddsaSignVerify/Pkcs11EddsaTest: SignAndVerify/2 32-byte object <20-C2 D2-56 30-00 00-00 F0-F3 BB-56 2C-00 00-00 A0-4A BE-56 FF-03 00-00 40-BB 06-57 40-00 00-00>' - PASSED gtests.sh: #4098: 'EddsaSignVerify/Pkcs11EddsaTest: ImportExport/0 32-byte object <20-C2 D2-56 30-00 00-00 D0-13 B3-56 2C-00 00-00 C0-01 B1-56 01-00 00-00 30-47 B3-56 40-00 00-00>' - PASSED gtests.sh: #4099: 'EddsaSignVerify/Pkcs11EddsaTest: ImportExport/1 32-byte object <20-C2 D2-56 30-00 00-00 F0-39 B2-56 2C-00 00-00 C0-01 B1-56 02-00 00-00 A0-86 B7-56 40-00 00-00>' - PASSED gtests.sh: #4100: 'EddsaSignVerify/Pkcs11EddsaTest: ImportExport/2 32-byte object <20-C2 D2-56 30-00 00-00 10-D1 B3-56 2C-00 00-00 F0-5E BE-56 FF-03 00-00 A0-86 B7-56 40-00 00-00>' - PASSED gtests.sh: #4101: 'EddsaSignVerify/Pkcs11EddsaTest: ImportConvertToPublic/0 32-byte object <20-C2 D2-56 30-00 00-00 60-EB B7-56 2C-00 00-00 C0-01 B1-56 01-00 00-00 80-8F BE-56 40-00 00-00>' - PASSED gtests.sh: #4102: 'EddsaSignVerify/Pkcs11EddsaTest: ImportConvertToPublic/1 32-byte object <20-C2 D2-56 30-00 00-00 70-29 B2-56 2C-00 00-00 30-74 B1-56 02-00 00-00 40-AA AF-56 40-00 00-00>' - PASSED gtests.sh: #4103: 'EddsaSignVerify/Pkcs11EddsaTest: ImportConvertToPublic/2 32-byte object <20-C2 D2-56 30-00 00-00 B0-78 B3-56 2C-00 00-00 B0-4E BE-56 FF-03 00-00 40-AA AF-56 40-00 00-00>' - PASSED gtests.sh: #4104: 'EddsaSignVerify/Pkcs11EddsaTest: ImportPublicCreateSubjectPKInfo/0 32-byte object <20-C2 D2-56 30-00 00-00 B0-67 B3-56 2C-00 00-00 90-8B AF-56 01-00 00-00 40-AA AF-56 40-00 00-00>' - PASSED gtests.sh: #4105: 'EddsaSignVerify/Pkcs11EddsaTest: ImportPublicCreateSubjectPKInfo/1 32-byte object <20-C2 D2-56 30-00 00-00 B0-67 B3-56 2C-00 00-00 90-8B AF-56 02-00 00-00 D0-FC C0-56 40-00 00-00>' - PASSED gtests.sh: #4106: 'EddsaSignVerify/Pkcs11EddsaTest: ImportPublicCreateSubjectPKInfo/2 32-byte object <20-C2 D2-56 30-00 00-00 10-17 C6-56 2C-00 00-00 00-63 BE-56 FF-03 00-00 D0-FC C0-56 40-00 00-00>' - PASSED gtests.sh: #4107: 'EddsaRound/Pkcs11EddsaRoundtripTest: GenerateExportImportSignVerify/0 32-byte object <20-C2 D2-56 30-00 00-00 D0-39 C6-56 2C-00 00-00 90-8B AF-56 01-00 00-00 50-FE BB-56 40-00 00-00>' - PASSED gtests.sh: #4108: 'EddsaRound/Pkcs11EddsaRoundtripTest: GenerateExportImportSignVerify/1 32-byte object <20-C2 D2-56 30-00 00-00 D0-74 C6-56 2C-00 00-00 90-8B AF-56 02-00 00-00 50-FE BB-56 40-00 00-00>' - PASSED gtests.sh: #4109: 'EddsaRound/Pkcs11EddsaRoundtripTest: GenerateExportImportSignVerify/2 32-byte object <20-C2 D2-56 30-00 00-00 B0-64 C6-56 2C-00 00-00 60-65 BE-56 FF-03 00-00 A0-D5 B2-56 40-00 00-00>' - PASSED gtests.sh: #4110: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/0 36-byte object <BF-00 00-00 30-30 04-57 8A-00 00-00 50-9D BD-56 5B-00 00-00 30-74 B1-56 06-00 00-00 E0-8D AF-56 40-00 00-00>' - PASSED gtests.sh: #4111: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/1 36-byte object <BF-00 00-00 30-30 04-57 88-00 00-00 50-9D BD-56 5B-00 00-00 30-74 B1-56 06-00 00-00 80-3B B2-56 40-00 00-00>' - PASSED gtests.sh: #4112: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/2 36-byte object <BF-00 00-00 30-30 04-57 8B-00 00-00 90-9A C3-56 5B-00 00-00 30-74 B1-56 06-00 00-00 80-3B B2-56 40-00 00-00>' - PASSED gtests.sh: #4113: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/3 36-byte object <C0-00 00-00 60-BA F1-56 B9-00 00-00 10-53 B3-56 78-00 00-00 30-74 B1-56 06-00 00-00 60-9E F1-56 60-00 00-00>' - PASSED gtests.sh: #4114: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/4 36-byte object <BF-00 00-00 60-BA F1-56 B7-00 00-00 10-53 B3-56 78-00 00-00 30-74 B1-56 06-00 00-00 60-9E F1-56 60-00 00-00>' - PASSED gtests.sh: #4115: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/5 36-byte object <BF-00 00-00 60-BA F1-56 BA-00 00-00 10-53 B3-56 78-00 00-00 30-74 B1-56 06-00 00-00 60-56 BE-56 60-00 00-00>' - PASSED gtests.sh: #4116: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/6 36-byte object <C1-00 00-00 10-4F 04-57 F0-00 00-00 C0-67 BE-56 9E-00 00-00 30-74 B1-56 06-00 00-00 30-32 DA-56 84-00 00-00>' - PASSED gtests.sh: #4117: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/7 36-byte object <BF-00 00-00 10-4F 04-57 EF-00 00-00 C0-67 BE-56 9E-00 00-00 80-0A B4-56 06-00 00-00 80-9E EC-56 84-00 00-00>' - PASSED gtests.sh: #4118: 'EcdsaSignVerify/Pkcs11EcdsaTest: Verify/8 36-byte object <BF-00 00-00 10-4F 04-57 F2-00 00-00 C0-67 BE-56 9E-00 00-00 80-0A B4-56 06-00 00-00 80-9E EC-56 84-00 00-00>' - PASSED gtests.sh: #4119: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/0 36-byte object <BF-00 00-00 10-0B E6-56 8A-00 00-00 50-FD C0-56 5B-00 00-00 80-AB B0-56 06-00 00-00 D0-D3 BD-56 40-00 00-00>' - PASSED gtests.sh: #4120: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/1 36-byte object <BF-00 00-00 10-0B E6-56 88-00 00-00 50-FD C0-56 5B-00 00-00 80-AB B0-56 06-00 00-00 80-76 B3-56 40-00 00-00>' - PASSED gtests.sh: #4121: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/2 36-byte object <BF-00 00-00 10-0B E6-56 8B-00 00-00 B0-90 BB-56 5B-00 00-00 80-AB B0-56 06-00 00-00 80-76 B3-56 40-00 00-00>' - PASSED gtests.sh: #4122: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/3 36-byte object <C0-00 00-00 60-BA F1-56 B9-00 00-00 10-53 B3-56 78-00 00-00 80-AB B0-56 06-00 00-00 C0-20 F7-56 60-00 00-00>' - PASSED gtests.sh: #4123: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/4 36-byte object <BF-00 00-00 60-BA F1-56 B7-00 00-00 10-53 B3-56 78-00 00-00 80-AB B0-56 06-00 00-00 C0-20 F7-56 60-00 00-00>' - PASSED gtests.sh: #4124: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/5 36-byte object <BF-00 00-00 60-BA F1-56 BA-00 00-00 10-53 B3-56 78-00 00-00 80-AB B0-56 06-00 00-00 C0-20 F7-56 60-00 00-00>' - PASSED gtests.sh: #4125: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/6 36-byte object <C1-00 00-00 10-4F 04-57 F0-00 00-00 E0-D5 E3-56 9E-00 00-00 60-4D B4-56 06-00 00-00 90-31 B6-56 84-00 00-00>' - PASSED gtests.sh: #4126: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/7 36-byte object <BF-00 00-00 10-4F 04-57 EF-00 00-00 E0-D5 E3-56 9E-00 00-00 60-4D B4-56 06-00 00-00 90-31 B6-56 84-00 00-00>' - PASSED gtests.sh: #4127: 'EcdsaSignVerify/Pkcs11EcdsaTest: SignAndVerify/8 36-byte object <BF-00 00-00 10-4F 04-57 F2-00 00-00 E0-D5 E3-56 9E-00 00-00 60-4D B4-56 06-00 00-00 90-31 B6-56 84-00 00-00>' - PASSED gtests.sh: #4128: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/0 36-byte object <BF-00 00-00 10-8C C7-56 8A-00 00-00 F0-ED B4-56 5B-00 00-00 80-AB B0-56 06-00 00-00 20-D9 B5-56 40-00 00-00>' - PASSED gtests.sh: #4129: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/1 36-byte object <BF-00 00-00 10-8C C7-56 88-00 00-00 F0-ED B4-56 5B-00 00-00 80-AB B0-56 06-00 00-00 40-09 C7-56 40-00 00-00>' - PASSED gtests.sh: #4130: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/2 36-byte object <BF-00 00-00 10-8C C7-56 8B-00 00-00 20-6E BD-56 5B-00 00-00 80-AB B0-56 06-00 00-00 40-09 C7-56 40-00 00-00>' - PASSED gtests.sh: #4131: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/3 36-byte object <C0-00 00-00 60-BA F1-56 B9-00 00-00 10-53 B3-56 78-00 00-00 80-AB B0-56 06-00 00-00 B0-F4 F6-56 60-00 00-00>' - PASSED gtests.sh: #4132: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/4 36-byte object <BF-00 00-00 60-BA F1-56 B7-00 00-00 10-53 B3-56 78-00 00-00 80-AB B0-56 06-00 00-00 B0-F4 F6-56 60-00 00-00>' - PASSED gtests.sh: #4133: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/5 36-byte object <BF-00 00-00 60-BA F1-56 BA-00 00-00 10-53 B3-56 78-00 00-00 F0-65 B4-56 06-00 00-00 B0-F4 F6-56 60-00 00-00>' - PASSED gtests.sh: #4134: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/6 36-byte object <C1-00 00-00 10-4F 04-57 F0-00 00-00 90-EB E3-56 9E-00 00-00 F0-65 B4-56 06-00 00-00 10-8C C7-56 84-00 00-00>' - PASSED gtests.sh: #4135: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/7 36-byte object <BF-00 00-00 10-4F 04-57 EF-00 00-00 90-EB E3-56 9E-00 00-00 F0-65 B4-56 06-00 00-00 10-8C C7-56 84-00 00-00>' - PASSED gtests.sh: #4136: 'EcdsaSignVerify/Pkcs11EcdsaTest: ImportExport/8 36-byte object <BF-00 00-00 10-4F 04-57 F2-00 00-00 90-EB E3-56 9E-00 00-00 F0-65 B4-56 06-00 00-00 10-8C C7-56 84-00 00-00>' - PASSED gtests.sh: #4137: 'Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest: GenerateExportImportSignVerify/0 208' - PASSED gtests.sh: #4138: 'Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest: GenerateExportImportSignVerify/1 220' - PASSED gtests.sh: #4139: 'Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest: GenerateExportImportSignVerify/2 221' - PASSED gtests.sh: #4140: 'Pkcs11EcdsaRoundtripTest/Pkcs11EcdsaRoundtripTest: GenerateExportImportSignVerify/3 355' - PASSED gtests.sh: #4141: 'EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest: Verify/0 36-byte object <C1-00 00-00 00-00 00-00 00-00 00-00 F0-0A BE-56 5B-00 00-00 80-AB B0-56 0A-00 00-00 40-09 C7-56 40-00 00-00>' - PASSED gtests.sh: #4142: 'EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest: Verify/1 36-byte object <C1-00 00-00 00-00 00-00 00-00 00-00 F0-0A BE-56 5B-00 00-00 80-AB B0-56 0A-00 00-00 20-7D 05-57 3E-00 00-00>' - PASSED gtests.sh: #4143: 'EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest: Verify/2 36-byte object <C1-00 00-00 00-00 00-00 00-00 00-00 10-53 B3-56 78-00 00-00 30-74 B1-56 0A-00 00-00 60-56 BE-56 60-00 00-00>' - PASSED gtests.sh: #4144: 'EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest: Verify/3 36-byte object <C1-00 00-00 00-00 00-00 00-00 00-00 10-53 B3-56 78-00 00-00 B0-2F B3-56 0A-00 00-00 60-56 BE-56 5E-00 00-00>' - PASSED gtests.sh: #4145: 'EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest: Verify/4 36-byte object <C1-00 00-00 00-00 00-00 00-00 00-00 30-00 E4-56 9E-00 00-00 B0-2F B3-56 0A-00 00-00 B0-61 E4-56 84-00 00-00>' - PASSED gtests.sh: #4146: 'EcdsaVerifyUnpaddedSignatures/Pkcs11EcdsaUnpaddedSignatureTest: Verify/5 36-byte object <C1-00 00-00 00-00 00-00 00-00 00-00 30-00 E4-56 9E-00 00-00 B0-2F B3-56 0A-00 00-00 B0-61 E4-56 82-00 00-00>' - PASSED gtests.sh: #4147: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/0 48-byte object <04-00 00-00 01-00 00-00 D0-A3 12-57 FE-A3 12-57 FE-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-08 CE-56 66-08 CE-56 66-08 CE-56 01-00 00-00>' - PASSED gtests.sh: #4148: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/1 48-byte object <04-00 00-00 02-00 00-00 D0-A3 12-57 FF-A3 12-57 FF-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-08 CE-56 66-08 CE-56 66-08 CE-56 01-00 00-00>' - PASSED gtests.sh: #4149: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/2 48-byte object <04-00 00-00 03-00 00-00 D0-A3 12-57 00-A4 12-57 00-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-C6 E0-56 66-C6 E0-56 66-C6 E0-56 00-00 00-00>' - PASSED gtests.sh: #4150: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/3 48-byte object <04-00 00-00 04-00 00-00 D0-A3 12-57 01-A4 12-57 01-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4151: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/4 48-byte object <04-00 00-00 05-00 00-00 D0-A3 12-57 FF-A3 12-57 FF-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4152: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/5 48-byte object <04-00 00-00 06-00 00-00 D0-A3 12-57 FF-A3 12-57 FF-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4153: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/6 48-byte object <04-00 00-00 07-00 00-00 D0-A3 12-57 04-A4 12-57 04-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4154: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/7 48-byte object <04-00 00-00 08-00 00-00 D0-A3 12-57 08-A4 12-57 08-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4155: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/8 48-byte object <04-00 00-00 09-00 00-00 D0-A3 12-57 03-A4 12-57 03-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4156: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/9 48-byte object <04-00 00-00 0A-00 00-00 D0-A3 12-57 03-A4 12-57 03-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4157: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/10 48-byte object <04-00 00-00 0B-00 00-00 D0-A3 12-57 04-A4 12-57 04-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-D5 E1-56 D6-D5 E1-56 D6-D5 E1-56 00-00 00-00>' - PASSED gtests.sh: #4158: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/11 48-byte object <04-00 00-00 0C-00 00-00 D0-A3 12-57 07-A4 12-57 07-A4 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-99 E1-56 A6-99 E1-56 A6-99 E1-56 00-00 00-00>' - PASSED gtests.sh: #4159: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/12 48-byte object <04-00 00-00 0D-00 00-00 D0-A3 12-57 FF-A3 12-57 FF-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-99 E1-56 A6-99 E1-56 A6-99 E1-56 00-00 00-00>' - PASSED gtests.sh: #4160: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/13 48-byte object <04-00 00-00 0E-00 00-00 D0-A3 12-57 FF-A3 12-57 FF-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-99 E1-56 A6-99 E1-56 A6-99 E1-56 00-00 00-00>' - PASSED gtests.sh: #4161: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/14 48-byte object <04-00 00-00 0F-00 00-00 D0-A3 12-57 FF-A3 12-57 FF-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-99 E1-56 A6-99 E1-56 A6-99 E1-56 00-00 00-00>' - PASSED gtests.sh: #4162: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/15 48-byte object <04-00 00-00 10-00 00-00 D0-A3 12-57 FF-A3 12-57 FF-A3 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-99 E1-56 A6-99 E1-56 A6-99 E1-56 00-00 00-00>' - PASSED gtests.sh: #4163: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/16 48-byte object <04-00 00-00 11-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-99 E1-56 A6-99 E1-56 A6-99 E1-56 00-00 00-00>' - PASSED gtests.sh: #4164: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/17 48-byte object <04-00 00-00 12-00 00-00 A0-99 E1-56 A1-99 E1-56 A1-99 E1-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 E0-94 E1-56 E6-94 E1-56 E6-94 E1-56 00-00 00-00>' - PASSED gtests.sh: #4165: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/18 48-byte object <04-00 00-00 13-00 00-00 D0-A7 12-57 01-A8 12-57 01-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4166: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/19 48-byte object <04-00 00-00 14-00 00-00 D0-A7 12-57 01-A8 12-57 01-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4167: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/20 48-byte object <04-00 00-00 15-00 00-00 D0-A7 12-57 01-A8 12-57 01-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4168: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/21 48-byte object <04-00 00-00 16-00 00-00 D0-A7 12-57 01-A8 12-57 01-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4169: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/22 48-byte object <04-00 00-00 17-00 00-00 D0-A7 12-57 04-A8 12-57 04-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4170: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/23 48-byte object <04-00 00-00 18-00 00-00 D0-A7 12-57 03-A8 12-57 03-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4171: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/24 48-byte object <04-00 00-00 19-00 00-00 D0-A7 12-57 07-A8 12-57 07-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4172: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/25 48-byte object <04-00 00-00 1A-00 00-00 D0-A7 12-57 04-A8 12-57 04-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CD E0-56 A6-CD E0-56 A6-CD E0-56 00-00 00-00>' - PASSED gtests.sh: #4173: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/26 48-byte object <04-00 00-00 1B-00 00-00 D0-A7 12-57 03-A8 12-57 03-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4174: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/27 48-byte object <04-00 00-00 1C-00 00-00 D0-A7 12-57 07-A8 12-57 07-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4175: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/28 48-byte object <04-00 00-00 1D-00 00-00 D0-A7 12-57 04-A8 12-57 04-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4176: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/29 48-byte object <04-00 00-00 1E-00 00-00 D0-A7 12-57 03-A8 12-57 03-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4177: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/30 48-byte object <04-00 00-00 1F-00 00-00 D0-A7 12-57 07-A8 12-57 07-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4178: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/31 48-byte object <04-00 00-00 20-00 00-00 D0-A7 12-57 07-A8 12-57 07-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4179: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/32 48-byte object <04-00 00-00 21-00 00-00 D0-A7 12-57 05-A8 12-57 05-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4180: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/33 48-byte object <04-00 00-00 22-00 00-00 D0-A7 12-57 07-A8 12-57 07-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-03 E1-56 F6-03 E1-56 F6-03 E1-56 00-00 00-00>' - PASSED gtests.sh: #4181: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/34 48-byte object <04-00 00-00 23-00 00-00 D0-A7 12-57 05-A8 12-57 05-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-24 E1-56 96-24 E1-56 96-24 E1-56 00-00 00-00>' - PASSED gtests.sh: #4182: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/35 48-byte object <04-00 00-00 24-00 00-00 D0-A7 12-57 07-A8 12-57 07-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-24 E1-56 96-24 E1-56 96-24 E1-56 00-00 00-00>' - PASSED gtests.sh: #4183: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/36 48-byte object <04-00 00-00 25-00 00-00 D0-A7 12-57 05-A8 12-57 05-A8 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-24 E1-56 96-24 E1-56 96-24 E1-56 00-00 00-00>' - PASSED gtests.sh: #4184: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/37 48-byte object <04-00 00-00 26-00 00-00 90-24 E1-56 92-24 E1-56 92-24 E1-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 10-20 E1-56 16-20 E1-56 16-20 E1-56 00-00 00-00>' - PASSED gtests.sh: #4185: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/38 48-byte object <04-00 00-00 27-00 00-00 30-ED 12-57 63-ED 12-57 63-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-AA E3-56 26-AA E3-56 26-AA E3-56 00-00 00-00>' - PASSED gtests.sh: #4186: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/39 48-byte object <04-00 00-00 28-00 00-00 30-ED 12-57 63-ED 12-57 63-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-AA E3-56 26-AA E3-56 26-AA E3-56 00-00 00-00>' - PASSED gtests.sh: #4187: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/40 48-byte object <04-00 00-00 29-00 00-00 30-ED 12-57 63-ED 12-57 63-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-AA E3-56 26-AA E3-56 26-AA E3-56 00-00 00-00>' - PASSED gtests.sh: #4188: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/41 48-byte object <04-00 00-00 2A-00 00-00 30-ED 12-57 63-ED 12-57 63-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-AA E3-56 26-AA E3-56 26-AA E3-56 00-00 00-00>' - PASSED gtests.sh: #4189: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/42 48-byte object <04-00 00-00 2B-00 00-00 30-ED 12-57 63-ED 12-57 63-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-AA E3-56 26-AA E3-56 26-AA E3-56 00-00 00-00>' - PASSED gtests.sh: #4190: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/43 48-byte object <04-00 00-00 2C-00 00-00 30-ED 12-57 63-ED 12-57 63-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-A5 E3-56 76-A5 E3-56 76-A5 E3-56 00-00 00-00>' - PASSED gtests.sh: #4191: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/44 48-byte object <04-00 00-00 2D-00 00-00 70-A5 E3-56 72-A5 E3-56 72-A5 E3-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-3E E1-56 A6-3E E1-56 A6-3E E1-56 00-00 00-00>' - PASSED gtests.sh: #4192: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/45 48-byte object <04-00 00-00 2E-00 00-00 70-ED 12-57 9F-ED 12-57 9F-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-B4 D1-56 66-B4 D1-56 66-B4 D1-56 00-00 00-00>' - PASSED gtests.sh: #4193: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/46 48-byte object <04-00 00-00 2F-00 00-00 70-ED 12-57 9F-ED 12-57 9F-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-B4 D1-56 66-B4 D1-56 66-B4 D1-56 00-00 00-00>' - PASSED gtests.sh: #4194: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/47 48-byte object <04-00 00-00 30-00 00-00 70-ED 12-57 9F-ED 12-57 9F-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-B4 D1-56 66-B4 D1-56 66-B4 D1-56 00-00 00-00>' - PASSED gtests.sh: #4195: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/48 48-byte object <04-00 00-00 31-00 00-00 70-ED 12-57 9F-ED 12-57 9F-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-B4 D1-56 66-B4 D1-56 66-B4 D1-56 00-00 00-00>' - PASSED gtests.sh: #4196: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/49 48-byte object <04-00 00-00 32-00 00-00 70-ED 12-57 9F-ED 12-57 9F-ED 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-B4 D1-56 66-B4 D1-56 66-B4 D1-56 00-00 00-00>' - PASSED gtests.sh: #4197: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/50 48-byte object <04-00 00-00 33-00 00-00 40-41 D1-56 42-41 D1-56 42-41 D1-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-E6 D0-56 C6-E6 D0-56 C6-E6 D0-56 00-00 00-00>' - PASSED gtests.sh: #4198: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/51 48-byte object <04-00 00-00 34-00 00-00 B0-35 13-57 E3-35 13-57 E3-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-41 D1-56 46-41 D1-56 46-41 D1-56 00-00 00-00>' - PASSED gtests.sh: #4199: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/52 48-byte object <04-00 00-00 35-00 00-00 B0-35 13-57 DE-35 13-57 DE-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-41 D1-56 46-41 D1-56 46-41 D1-56 00-00 00-00>' - PASSED gtests.sh: #4200: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/53 48-byte object <04-00 00-00 36-00 00-00 B0-35 13-57 DE-35 13-57 DE-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-41 D1-56 46-41 D1-56 46-41 D1-56 00-00 00-00>' - PASSED gtests.sh: #4201: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/54 48-byte object <04-00 00-00 37-00 00-00 B0-35 13-57 E1-35 13-57 E1-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-41 D1-56 46-41 D1-56 46-41 D1-56 00-00 00-00>' - PASSED gtests.sh: #4202: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/55 48-byte object <04-00 00-00 38-00 00-00 B0-35 13-57 E0-35 13-57 E0-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4203: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/56 48-byte object <04-00 00-00 39-00 00-00 B0-35 13-57 E3-35 13-57 E3-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4204: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/57 48-byte object <04-00 00-00 3A-00 00-00 B0-35 13-57 E5-35 13-57 E5-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4205: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/58 48-byte object <04-00 00-00 3B-00 00-00 B0-35 13-57 E5-35 13-57 E5-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4206: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/59 48-byte object <04-00 00-00 3C-00 00-00 B0-35 13-57 E3-35 13-57 E3-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4207: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/60 48-byte object <04-00 00-00 3D-00 00-00 B0-35 13-57 E1-35 13-57 E1-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4208: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/61 48-byte object <04-00 00-00 3E-00 00-00 B0-35 13-57 E1-35 13-57 E1-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4209: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/62 48-byte object <04-00 00-00 3F-00 00-00 B0-35 13-57 E2-35 13-57 E2-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-2F D4-56 D6-2F D4-56 D6-2F D4-56 00-00 00-00>' - PASSED gtests.sh: #4210: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/63 48-byte object <04-00 00-00 40-00 00-00 B0-35 13-57 E1-35 13-57 E1-35 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-F4 C0-56 F6-F4 C0-56 F6-F4 C0-56 00-00 00-00>' - PASSED gtests.sh: #4211: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/64 48-byte object <04-00 00-00 41-00 00-00 00-4B C5-56 19-4B C5-56 19-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-F4 C0-56 F6-F4 C0-56 F6-F4 C0-56 00-00 00-00>' - PASSED gtests.sh: #4212: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/65 48-byte object <04-00 00-00 42-00 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-F4 C0-56 F6-F4 C0-56 F6-F4 C0-56 00-00 00-00>' - PASSED gtests.sh: #4213: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/66 48-byte object <04-00 00-00 43-00 00-00 50-64 13-57 80-64 13-57 80-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-F4 C0-56 F6-F4 C0-56 F6-F4 C0-56 00-00 00-00>' - PASSED gtests.sh: #4214: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/67 48-byte object <04-00 00-00 44-00 00-00 50-64 13-57 80-64 13-57 80-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-F4 C0-56 F6-F4 C0-56 F6-F4 C0-56 00-00 00-00>' - PASSED gtests.sh: #4215: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/68 48-byte object <04-00 00-00 45-00 00-00 50-64 13-57 81-64 13-57 81-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4216: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/69 48-byte object <04-00 00-00 46-00 00-00 50-64 13-57 81-64 13-57 81-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4217: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/70 48-byte object <04-00 00-00 47-00 00-00 50-64 13-57 7F-64 13-57 7F-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4218: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/71 48-byte object <04-00 00-00 48-00 00-00 50-64 13-57 7F-64 13-57 7F-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4219: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/72 48-byte object <04-00 00-00 49-00 00-00 50-64 13-57 7F-64 13-57 7F-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4220: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/73 48-byte object <04-00 00-00 4A-00 00-00 50-64 13-57 7F-64 13-57 7F-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4221: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/74 48-byte object <04-00 00-00 4B-00 00-00 50-64 13-57 84-64 13-57 84-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4222: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/75 48-byte object <04-00 00-00 4C-00 00-00 50-64 13-57 84-64 13-57 84-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-FB E6-56 76-FB E6-56 76-FB E6-56 00-00 00-00>' - PASSED gtests.sh: #4223: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/76 48-byte object <04-00 00-00 4D-00 00-00 50-64 13-57 88-64 13-57 88-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4224: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/77 48-byte object <04-00 00-00 4E-00 00-00 50-64 13-57 88-64 13-57 88-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4225: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/78 48-byte object <04-00 00-00 4F-00 00-00 50-64 13-57 83-64 13-57 83-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4226: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/79 48-byte object <04-00 00-00 50-00 00-00 50-64 13-57 83-64 13-57 83-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4227: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/80 48-byte object <04-00 00-00 51-00 00-00 50-64 13-57 83-64 13-57 83-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4228: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/81 48-byte object <04-00 00-00 52-00 00-00 50-64 13-57 83-64 13-57 83-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4229: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/82 48-byte object <04-00 00-00 53-00 00-00 50-64 13-57 84-64 13-57 84-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4230: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/83 48-byte object <04-00 00-00 54-00 00-00 50-64 13-57 84-64 13-57 84-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-DC E6-56 26-DC E6-56 26-DC E6-56 00-00 00-00>' - PASSED gtests.sh: #4231: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/84 48-byte object <04-00 00-00 55-00 00-00 50-64 13-57 87-64 13-57 87-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4232: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/85 48-byte object <04-00 00-00 56-00 00-00 50-64 13-57 87-64 13-57 87-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4233: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/86 48-byte object <04-00 00-00 57-00 00-00 50-64 13-57 7F-64 13-57 7F-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4234: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/87 48-byte object <04-00 00-00 58-00 00-00 50-64 13-57 7F-64 13-57 7F-64 13-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4235: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/88 48-byte object <04-00 00-00 59-00 00-00 00-4B C5-56 18-4B C5-56 18-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4236: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/89 48-byte object <04-00 00-00 5A-00 00-00 00-4B C5-56 19-4B C5-56 19-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4237: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/90 48-byte object <04-00 00-00 5B-00 00-00 00-4B C5-56 1A-4B C5-56 1A-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4238: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/91 48-byte object <04-00 00-00 5C-00 00-00 60-02 14-57 91-02 14-57 91-02 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-96 E7-56 96-96 E7-56 96-96 E7-56 00-00 00-00>' - PASSED gtests.sh: #4239: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/92 48-byte object <04-00 00-00 5D-00 00-00 60-02 14-57 91-02 14-57 91-02 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4240: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/93 48-byte object <04-00 00-00 5E-00 00-00 60-02 14-57 91-02 14-57 91-02 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4241: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/94 48-byte object <04-00 00-00 5F-00 00-00 60-02 14-57 91-02 14-57 91-02 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4242: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/95 48-byte object <04-00 00-00 60-00 00-00 60-02 14-57 91-02 14-57 91-02 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4243: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/96 48-byte object <04-00 00-00 61-00 00-00 60-02 14-57 91-02 14-57 91-02 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4244: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/97 48-byte object <04-00 00-00 62-00 00-00 60-02 14-57 91-02 14-57 91-02 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4245: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/98 48-byte object <04-00 00-00 63-00 00-00 00-4B C5-56 1A-4B C5-56 1A-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4246: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/99 48-byte object <04-00 00-00 64-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-37 EB-56 B6-37 EB-56 B6-37 EB-56 00-00 00-00>' - PASSED gtests.sh: #4247: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/100 48-byte object <04-00 00-00 65-00 00-00 00-4B C5-56 1A-4B C5-56 1A-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4248: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/101 48-byte object <04-00 00-00 66-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4249: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/102 48-byte object <04-00 00-00 67-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4250: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/103 48-byte object <04-00 00-00 68-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4251: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/104 48-byte object <04-00 00-00 69-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4252: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/105 48-byte object <04-00 00-00 6A-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4253: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/106 48-byte object <04-00 00-00 6B-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4254: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/107 48-byte object <04-00 00-00 6C-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A7 EC-56 56-A7 EC-56 56-A7 EC-56 00-00 00-00>' - PASSED gtests.sh: #4255: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/108 48-byte object <04-00 00-00 6D-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4256: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/109 48-byte object <04-00 00-00 6E-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4257: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/110 48-byte object <04-00 00-00 6F-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4258: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/111 48-byte object <04-00 00-00 70-00 00-00 50-31 14-57 7F-31 14-57 7F-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4259: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/112 48-byte object <04-00 00-00 71-00 00-00 00-4B C5-56 1A-4B C5-56 1A-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4260: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/113 48-byte object <04-00 00-00 72-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4261: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/114 48-byte object <04-00 00-00 73-00 00-00 D0-31 14-57 03-32 14-57 03-32 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4262: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/115 48-byte object <04-00 00-00 74-00 00-00 D0-31 14-57 03-32 14-57 03-32 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-25 EC-56 C6-25 EC-56 C6-25 EC-56 00-00 00-00>' - PASSED gtests.sh: #4263: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/116 48-byte object <04-00 00-00 75-00 00-00 D0-31 14-57 FF-31 14-57 FF-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4264: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/117 48-byte object <04-00 00-00 76-00 00-00 D0-31 14-57 FF-31 14-57 FF-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4265: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/118 48-byte object <04-00 00-00 77-00 00-00 D0-31 14-57 FF-31 14-57 FF-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4266: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/119 48-byte object <04-00 00-00 78-00 00-00 D0-31 14-57 FF-31 14-57 FF-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4267: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/120 48-byte object <04-00 00-00 79-00 00-00 D0-31 14-57 FE-31 14-57 FE-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4268: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/121 48-byte object <04-00 00-00 7A-00 00-00 D0-31 14-57 FE-31 14-57 FE-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4269: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/122 48-byte object <04-00 00-00 7B-00 00-00 D0-31 14-57 FE-31 14-57 FE-31 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4270: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/123 48-byte object <04-00 00-00 7C-00 00-00 D0-31 14-57 00-32 14-57 00-32 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-31 ED-56 76-31 ED-56 76-31 ED-56 00-00 00-00>' - PASSED gtests.sh: #4271: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/124 48-byte object <04-00 00-00 7D-00 00-00 D0-31 14-57 00-32 14-57 00-32 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4272: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/125 48-byte object <04-00 00-00 7E-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4273: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/126 48-byte object <04-00 00-00 7F-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4274: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/127 48-byte object <04-00 00-00 80-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4275: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/128 48-byte object <04-00 00-00 81-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4276: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/129 48-byte object <04-00 00-00 82-00 00-00 20-AD 14-57 4F-AD 14-57 4F-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4277: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/130 48-byte object <04-00 00-00 83-00 00-00 20-AD 14-57 4E-AD 14-57 4E-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4278: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/131 48-byte object <04-00 00-00 84-00 00-00 20-AD 14-57 4F-AD 14-57 4F-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-6D ED-56 F6-6D ED-56 F6-6D ED-56 00-00 00-00>' - PASSED gtests.sh: #4279: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/132 48-byte object <04-00 00-00 85-00 00-00 20-AD 14-57 4E-AD 14-57 4E-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4280: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/133 48-byte object <04-00 00-00 86-00 00-00 20-AD 14-57 4F-AD 14-57 4F-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4281: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/134 48-byte object <04-00 00-00 87-00 00-00 20-AD 14-57 4F-AD 14-57 4F-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4282: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/135 48-byte object <04-00 00-00 88-00 00-00 20-AD 14-57 4E-AD 14-57 4E-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4283: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/136 48-byte object <04-00 00-00 89-00 00-00 20-AD 14-57 50-AD 14-57 50-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4284: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/137 48-byte object <04-00 00-00 8A-00 00-00 20-AD 14-57 4F-AD 14-57 4F-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4285: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/138 48-byte object <04-00 00-00 8B-00 00-00 20-AD 14-57 4F-AD 14-57 4F-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4286: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/139 48-byte object <04-00 00-00 8C-00 00-00 20-AD 14-57 4F-AD 14-57 4F-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-8B ED-56 B6-8B ED-56 B6-8B ED-56 00-00 00-00>' - PASSED gtests.sh: #4287: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/140 48-byte object <04-00 00-00 8D-00 00-00 20-AD 14-57 50-AD 14-57 50-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-8B EB-56 36-8B EB-56 36-8B EB-56 00-00 00-00>' - PASSED gtests.sh: #4288: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/141 48-byte object <04-00 00-00 8E-00 00-00 20-AD 14-57 50-AD 14-57 50-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-8B EB-56 36-8B EB-56 36-8B EB-56 00-00 00-00>' - PASSED gtests.sh: #4289: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/142 48-byte object <04-00 00-00 8F-00 00-00 20-AD 14-57 50-AD 14-57 50-AD 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-8B EB-56 36-8B EB-56 36-8B EB-56 00-00 00-00>' - PASSED gtests.sh: #4290: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/143 48-byte object <04-00 00-00 90-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-8B EB-56 36-8B EB-56 36-8B EB-56 00-00 00-00>' - PASSED gtests.sh: #4291: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/144 48-byte object <04-00 00-00 91-00 00-00 30-8B EB-56 38-8B EB-56 38-8B EB-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-87 EB-56 D6-87 EB-56 D6-87 EB-56 00-00 00-00>' - PASSED gtests.sh: #4292: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/145 48-byte object <04-00 00-00 92-00 00-00 40-87 ED-56 48-87 ED-56 48-87 ED-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 B0-F0 D9-56 B6-F0 D9-56 B6-F0 D9-56 00-00 00-00>' - PASSED gtests.sh: #4293: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/146 48-byte object <04-00 00-00 93-00 00-00 60-C3 EB-56 68-C3 EB-56 68-C3 EB-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-BF EB-56 26-BF EB-56 26-BF EB-56 00-00 00-00>' - PASSED gtests.sh: #4294: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/147 48-byte object <04-00 00-00 94-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-BF EB-56 26-BF EB-56 26-BF EB-56 00-00 00-00>' - PASSED gtests.sh: #4295: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/148 48-byte object <04-00 00-00 95-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-BF EB-56 26-BF EB-56 26-BF EB-56 00-00 00-00>' - PASSED gtests.sh: #4296: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/149 48-byte object <04-00 00-00 96-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-BF EB-56 26-BF EB-56 26-BF EB-56 00-00 00-00>' - PASSED gtests.sh: #4297: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/150 48-byte object <04-00 00-00 97-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-BF EB-56 26-BF EB-56 26-BF EB-56 00-00 00-00>' - PASSED gtests.sh: #4298: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/151 48-byte object <04-00 00-00 98-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-BF EB-56 26-BF EB-56 26-BF EB-56 00-00 00-00>' - PASSED gtests.sh: #4299: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/152 48-byte object <04-00 00-00 99-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 20-BF EB-56 26-BF EB-56 26-BF EB-56 00-00 00-00>' - PASSED gtests.sh: #4300: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/153 48-byte object <04-00 00-00 9A-00 00-00 80-E9 12-57 0A-EA 12-57 0A-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-76 EF-56 76-76 EF-56 76-76 EF-56 00-00 00-00>' - PASSED gtests.sh: #4301: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/154 48-byte object <04-00 00-00 9B-00 00-00 70-76 EF-56 7A-76 EF-56 7A-76 EF-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-D3 EB-56 C6-D3 EB-56 C6-D3 EB-56 00-00 00-00>' - PASSED gtests.sh: #4302: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/155 48-byte object <04-00 00-00 9C-00 00-00 70-76 EF-56 78-76 EF-56 78-76 EF-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-D3 EB-56 C6-D3 EB-56 C6-D3 EB-56 00-00 00-00>' - PASSED gtests.sh: #4303: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/156 48-byte object <04-00 00-00 9D-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-7E EF-56 96-7E EF-56 96-7E EF-56 00-00 00-00>' - PASSED gtests.sh: #4304: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/157 48-byte object <04-00 00-00 9E-00 00-00 90-7E EF-56 98-7E EF-56 98-7E EF-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-B6 EF-56 A6-B6 EF-56 A6-B6 EF-56 00-00 00-00>' - PASSED gtests.sh: #4305: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/158 48-byte object <04-00 00-00 9F-00 00-00 C0-AD EF-56 C8-AD EF-56 C8-AD EF-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A9 EF-56 56-A9 EF-56 56-A9 EF-56 00-00 00-00>' - PASSED gtests.sh: #4306: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/159 48-byte object <04-00 00-00 A0-00 00-00 50-A9 EF-56 58-A9 EF-56 58-A9 EF-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-6E EF-56 96-6E EF-56 96-6E EF-56 00-00 00-00>' - PASSED gtests.sh: #4307: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/160 48-byte object <04-00 00-00 A1-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A9 EF-56 56-A9 EF-56 56-A9 EF-56 00-00 00-00>' - PASSED gtests.sh: #4308: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/161 48-byte object <04-00 00-00 A2-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A9 EF-56 56-A9 EF-56 56-A9 EF-56 00-00 00-00>' - PASSED gtests.sh: #4309: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/162 48-byte object <04-00 00-00 A3-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A9 EF-56 56-A9 EF-56 56-A9 EF-56 00-00 00-00>' - PASSED gtests.sh: #4310: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/163 48-byte object <04-00 00-00 A4-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-A9 EF-56 56-A9 EF-56 56-A9 EF-56 00-00 00-00>' - PASSED gtests.sh: #4311: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/164 48-byte object <04-00 00-00 A5-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-1D F0-56 36-1D F0-56 36-1D F0-56 00-00 00-00>' - PASSED gtests.sh: #4312: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/165 48-byte object <04-00 00-00 A6-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-1D F0-56 36-1D F0-56 36-1D F0-56 00-00 00-00>' - PASSED gtests.sh: #4313: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/166 48-byte object <04-00 00-00 A7-00 00-00 80-E9 12-57 0A-EA 12-57 0A-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-1D F0-56 36-1D F0-56 36-1D F0-56 00-00 00-00>' - PASSED gtests.sh: #4314: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/167 48-byte object <04-00 00-00 A8-00 00-00 30-1D F0-56 3A-1D F0-56 3A-1D F0-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-E9 EF-56 C6-E9 EF-56 C6-E9 EF-56 00-00 00-00>' - PASSED gtests.sh: #4315: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/168 48-byte object <04-00 00-00 A9-00 00-00 30-67 F0-56 38-67 F0-56 38-67 F0-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-62 F0-56 D6-62 F0-56 D6-62 F0-56 00-00 00-00>' - PASSED gtests.sh: #4316: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/169 48-byte object <04-00 00-00 AA-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-00 F0-56 56-00 F0-56 56-00 F0-56 00-00 00-00>' - PASSED gtests.sh: #4317: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/170 48-byte object <04-00 00-00 AB-00 00-00 50-00 F0-56 58-00 F0-56 58-00 F0-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-29 F0-56 C6-29 F0-56 C6-29 F0-56 00-00 00-00>' - PASSED gtests.sh: #4318: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/171 48-byte object <04-00 00-00 AC-00 00-00 C0-29 F0-56 C8-29 F0-56 C8-29 F0-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-02 EC-56 F6-02 EC-56 F6-02 EC-56 00-00 00-00>' - PASSED gtests.sh: #4319: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/172 48-byte object <04-00 00-00 AD-00 00-00 C0-29 F0-56 C8-29 F0-56 C8-29 F0-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-02 EC-56 F6-02 EC-56 F6-02 EC-56 00-00 00-00>' - PASSED gtests.sh: #4320: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/173 48-byte object <04-00 00-00 AE-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-71 DC-56 56-71 DC-56 56-71 DC-56 00-00 00-00>' - PASSED gtests.sh: #4321: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/174 48-byte object <04-00 00-00 AF-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-71 DC-56 56-71 DC-56 56-71 DC-56 00-00 00-00>' - PASSED gtests.sh: #4322: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/175 48-byte object <04-00 00-00 B0-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-71 DC-56 56-71 DC-56 56-71 DC-56 00-00 00-00>' - PASSED gtests.sh: #4323: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/176 48-byte object <04-00 00-00 B1-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-71 DC-56 56-71 DC-56 56-71 DC-56 00-00 00-00>' - PASSED gtests.sh: #4324: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/177 48-byte object <04-00 00-00 B2-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-71 DC-56 56-71 DC-56 56-71 DC-56 00-00 00-00>' - PASSED gtests.sh: #4325: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/178 48-byte object <04-00 00-00 B3-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-71 DC-56 56-71 DC-56 56-71 DC-56 00-00 00-00>' - PASSED gtests.sh: #4326: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/179 48-byte object <04-00 00-00 B4-00 00-00 80-E9 12-57 0A-EA 12-57 0A-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-71 DC-56 56-71 DC-56 56-71 DC-56 00-00 00-00>' - PASSED gtests.sh: #4327: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/180 48-byte object <04-00 00-00 B5-00 00-00 50-71 DC-56 5A-71 DC-56 5A-71 DC-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 E0-8B F0-56 E6-8B F0-56 E6-8B F0-56 00-00 00-00>' - PASSED gtests.sh: #4328: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/181 48-byte object <04-00 00-00 B6-00 00-00 F0-02 EC-56 F8-02 EC-56 F8-02 EC-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-90 F0-56 76-90 F0-56 76-90 F0-56 00-00 00-00>' - PASSED gtests.sh: #4329: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/182 48-byte object <04-00 00-00 B7-00 00-00 90-8C 15-57 BF-8C 15-57 BF-8C 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-99 F0-56 C6-99 F0-56 C6-99 F0-56 00-00 00-00>' - PASSED gtests.sh: #4330: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/183 48-byte object <04-00 00-00 B8-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-99 F0-56 C6-99 F0-56 C6-99 F0-56 00-00 00-00>' - PASSED gtests.sh: #4331: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/184 48-byte object <04-00 00-00 B9-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-99 F0-56 C6-99 F0-56 C6-99 F0-56 00-00 00-00>' - PASSED gtests.sh: #4332: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/185 48-byte object <04-00 00-00 BA-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-99 F0-56 C6-99 F0-56 C6-99 F0-56 00-00 00-00>' - PASSED gtests.sh: #4333: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/186 48-byte object <04-00 00-00 BB-00 00-00 B0-9D 15-57 DE-9D 15-57 DE-9D 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-99 F0-56 C6-99 F0-56 C6-99 F0-56 00-00 00-00>' - PASSED gtests.sh: #4334: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/187 48-byte object <04-00 00-00 BC-00 00-00 B0-9D 15-57 DE-9D 15-57 DE-9D 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-99 F0-56 C6-99 F0-56 C6-99 F0-56 00-00 00-00>' - PASSED gtests.sh: #4335: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/188 48-byte object <04-00 00-00 BD-00 00-00 B0-9D 15-57 DF-9D 15-57 DF-9D 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-99 F0-56 C6-99 F0-56 C6-99 F0-56 00-00 00-00>' - PASSED gtests.sh: #4336: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/189 48-byte object <04-00 00-00 BE-00 00-00 B0-9D 15-57 DF-9D 15-57 DF-9D 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-47 EA-56 A6-47 EA-56 A6-47 EA-56 00-00 00-00>' - PASSED gtests.sh: #4337: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/190 48-byte object <04-00 00-00 BF-00 00-00 B0-9D 15-57 DF-9D 15-57 DF-9D 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-47 EA-56 A6-47 EA-56 A6-47 EA-56 00-00 00-00>' - PASSED gtests.sh: #4338: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/191 48-byte object <04-00 00-00 C0-00 00-00 B0-9D 15-57 DF-9D 15-57 DF-9D 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-47 EA-56 A6-47 EA-56 A6-47 EA-56 00-00 00-00>' - PASSED gtests.sh: #4339: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/192 48-byte object <04-00 00-00 C1-00 00-00 10-AC 12-57 AD-AC 12-57 AD-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-47 EA-56 A6-47 EA-56 A6-47 EA-56 00-00 00-00>' - PASSED gtests.sh: #4340: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/193 48-byte object <04-00 00-00 C2-00 00-00 E0-BB 15-57 FD-BB 15-57 FD-BB 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-47 EA-56 A6-47 EA-56 A6-47 EA-56 00-00 00-00>' - PASSED gtests.sh: #4341: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/194 48-byte object <04-00 00-00 C3-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4342: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/195 48-byte object <04-00 00-00 C4-00 00-00 F0-C4 15-57 1F-C5 15-57 1F-C5 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4343: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/196 48-byte object <04-00 00-00 C5-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4344: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/197 48-byte object <04-00 00-00 C6-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4345: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/198 48-byte object <04-00 00-00 C7-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4346: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/199 48-byte object <04-00 00-00 C8-00 00-00 A0-D5 15-57 CE-D5 15-57 CE-D5 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4347: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/200 48-byte object <04-00 00-00 C9-00 00-00 A0-D5 15-57 CE-D5 15-57 CE-D5 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4348: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/201 48-byte object <04-00 00-00 CA-00 00-00 A0-D5 15-57 CF-D5 15-57 CF-D5 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 50-58 F2-56 56-58 F2-56 56-58 F2-56 00-00 00-00>' - PASSED gtests.sh: #4349: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/202 48-byte object <04-00 00-00 CB-00 00-00 A0-D5 15-57 CF-D5 15-57 CF-D5 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4350: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/203 48-byte object <04-00 00-00 CC-00 00-00 A0-D5 15-57 CF-D5 15-57 CF-D5 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4351: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/204 48-byte object <04-00 00-00 CD-00 00-00 A0-D5 15-57 CF-D5 15-57 CF-D5 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4352: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/205 48-byte object <04-00 00-00 CE-00 00-00 10-AC 12-57 AD-AC 12-57 AD-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4353: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/206 48-byte object <04-00 00-00 CF-00 00-00 D0-F3 15-57 ED-F3 15-57 ED-F3 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4354: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/207 48-byte object <04-00 00-00 D0-00 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4355: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/208 48-byte object <04-00 00-00 D1-00 00-00 E0-FC 15-57 10-FD 15-57 10-FD 15-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4356: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/209 48-byte object <04-00 00-00 D2-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-77 F2-56 66-77 F2-56 66-77 F2-56 00-00 00-00>' - PASSED gtests.sh: #4357: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/210 48-byte object <04-00 00-00 D3-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4358: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/211 48-byte object <04-00 00-00 D4-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4359: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/212 48-byte object <04-00 00-00 D5-00 00-00 90-0D 16-57 BF-0D 16-57 BF-0D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4360: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/213 48-byte object <04-00 00-00 D6-00 00-00 90-0D 16-57 BF-0D 16-57 BF-0D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4361: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/214 48-byte object <04-00 00-00 D7-00 00-00 90-0D 16-57 C0-0D 16-57 C0-0D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4362: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/215 48-byte object <04-00 00-00 D8-00 00-00 90-0D 16-57 C0-0D 16-57 C0-0D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4363: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/216 48-byte object <04-00 00-00 D9-00 00-00 90-0D 16-57 C0-0D 16-57 C0-0D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4364: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/217 48-byte object <04-00 00-00 DA-00 00-00 90-0D 16-57 C0-0D 16-57 C0-0D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 70-1D F3-56 76-1D F3-56 76-1D F3-56 00-00 00-00>' - PASSED gtests.sh: #4365: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/218 48-byte object <04-00 00-00 DB-00 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4366: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/219 48-byte object <04-00 00-00 DC-00 00-00 C0-2B 16-57 DE-2B 16-57 DE-2B 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4367: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/220 48-byte object <04-00 00-00 DD-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4368: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/221 48-byte object <04-00 00-00 DE-00 00-00 D0-34 16-57 00-35 16-57 00-35 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4369: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/222 48-byte object <04-00 00-00 DF-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4370: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/223 48-byte object <04-00 00-00 E0-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4371: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/224 48-byte object <04-00 00-00 E1-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4372: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/225 48-byte object <04-00 00-00 E2-00 00-00 80-45 16-57 AF-45 16-57 AF-45 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-24 F1-56 C6-24 F1-56 C6-24 F1-56 00-00 00-00>' - PASSED gtests.sh: #4373: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/226 48-byte object <04-00 00-00 E3-00 00-00 80-45 16-57 AF-45 16-57 AF-45 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4374: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/227 48-byte object <04-00 00-00 E4-00 00-00 80-45 16-57 B0-45 16-57 B0-45 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4375: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/228 48-byte object <04-00 00-00 E5-00 00-00 80-45 16-57 B0-45 16-57 B0-45 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4376: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/229 48-byte object <04-00 00-00 E6-00 00-00 80-45 16-57 B0-45 16-57 B0-45 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4377: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/230 48-byte object <04-00 00-00 E7-00 00-00 80-45 16-57 B0-45 16-57 B0-45 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4378: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/231 48-byte object <04-00 00-00 E8-00 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4379: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/232 48-byte object <04-00 00-00 E9-00 00-00 B0-63 16-57 CE-63 16-57 CE-63 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4380: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/233 48-byte object <04-00 00-00 EA-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-68 F1-56 F6-68 F1-56 F6-68 F1-56 00-00 00-00>' - PASSED gtests.sh: #4381: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/234 48-byte object <04-00 00-00 EB-00 00-00 C0-6C 16-57 F0-6C 16-57 F0-6C 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4382: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/235 48-byte object <04-00 00-00 EC-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4383: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/236 48-byte object <04-00 00-00 ED-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4384: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/237 48-byte object <04-00 00-00 EE-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4385: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/238 48-byte object <04-00 00-00 EF-00 00-00 70-7D 16-57 9F-7D 16-57 9F-7D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4386: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/239 48-byte object <04-00 00-00 F0-00 00-00 70-7D 16-57 9F-7D 16-57 9F-7D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4387: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/240 48-byte object <04-00 00-00 F1-00 00-00 70-7D 16-57 A0-7D 16-57 A0-7D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4388: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/241 48-byte object <04-00 00-00 F2-00 00-00 70-7D 16-57 A0-7D 16-57 A0-7D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-40 DC-56 46-40 DC-56 46-40 DC-56 00-00 00-00>' - PASSED gtests.sh: #4389: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/242 48-byte object <04-00 00-00 F3-00 00-00 70-7D 16-57 A0-7D 16-57 A0-7D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4390: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/243 48-byte object <04-00 00-00 F4-00 00-00 70-7D 16-57 A0-7D 16-57 A0-7D 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4391: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/244 48-byte object <04-00 00-00 F5-00 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4392: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/245 48-byte object <04-00 00-00 F6-00 00-00 A0-9B 16-57 BE-9B 16-57 BE-9B 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4393: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/246 48-byte object <04-00 00-00 F7-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4394: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/247 48-byte object <04-00 00-00 F8-00 00-00 B0-A4 16-57 E0-A4 16-57 E0-A4 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4395: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/248 48-byte object <04-00 00-00 F9-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4396: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/249 48-byte object <04-00 00-00 FA-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-5C DF-56 36-5C DF-56 36-5C DF-56 00-00 00-00>' - PASSED gtests.sh: #4397: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/250 48-byte object <04-00 00-00 FB-00 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4398: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/251 48-byte object <04-00 00-00 FC-00 00-00 60-B5 16-57 8F-B5 16-57 8F-B5 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4399: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/252 48-byte object <04-00 00-00 FD-00 00-00 60-B5 16-57 8F-B5 16-57 8F-B5 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4400: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/253 48-byte object <04-00 00-00 FE-00 00-00 60-B5 16-57 90-B5 16-57 90-B5 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4401: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/254 48-byte object <04-00 00-00 FF-00 00-00 60-B5 16-57 90-B5 16-57 90-B5 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4402: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/255 48-byte object <04-00 00-00 00-01 00-00 60-B5 16-57 90-B5 16-57 90-B5 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4403: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/256 48-byte object <04-00 00-00 01-01 00-00 60-B5 16-57 90-B5 16-57 90-B5 16-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4404: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/257 48-byte object <04-00 00-00 02-01 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-E9 DF-56 F6-E9 DF-56 F6-E9 DF-56 00-00 00-00>' - PASSED gtests.sh: #4405: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/258 48-byte object <04-00 00-00 03-01 00-00 D0-A8 14-57 EE-A8 14-57 EE-A8 14-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4406: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/259 48-byte object <04-00 00-00 04-01 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4407: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/260 48-byte object <04-00 00-00 05-01 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4408: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/261 48-byte object <04-00 00-00 06-01 00-00 80-E9 12-57 0A-EA 12-57 0A-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4409: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/262 48-byte object <04-00 00-00 07-01 00-00 80-E9 12-57 0A-EA 12-57 0A-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4410: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/263 48-byte object <04-00 00-00 08-01 00-00 80-E9 12-57 0A-EA 12-57 0A-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4411: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/264 48-byte object <04-00 00-00 09-01 00-00 10-AC 12-57 AD-AC 12-57 AD-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4412: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/265 48-byte object <04-00 00-00 0A-01 00-00 10-AC 12-57 AD-AC 12-57 AD-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 A0-CC C2-56 A6-CC C2-56 A6-CC C2-56 00-00 00-00>' - PASSED gtests.sh: #4413: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/266 48-byte object <04-00 00-00 0B-01 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4414: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/267 48-byte object <04-00 00-00 0C-01 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4415: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/268 48-byte object <04-00 00-00 0D-01 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4416: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/269 48-byte object <04-00 00-00 0E-01 00-00 10-AC 12-57 AE-AC 12-57 AE-AC 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4417: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/270 48-byte object <04-00 00-00 0F-01 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4418: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/271 48-byte object <04-00 00-00 10-01 00-00 80-E9 12-57 0C-EA 12-57 0C-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4419: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/272 48-byte object <04-00 00-00 11-01 00-00 80-E9 12-57 0A-EA 12-57 0A-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4420: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/273 48-byte object <04-00 00-00 12-01 00-00 C0-20 17-57 DE-20 17-57 DE-20 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 D0-1B F2-56 D6-1B F2-56 D6-1B F2-56 00-00 00-00>' - PASSED gtests.sh: #4421: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/274 48-byte object <04-00 00-00 13-01 00-00 90-2F 04-57 9A-2F 04-57 9A-2F 04-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-47 B0-56 96-47 B0-56 96-47 B0-56 00-00 00-00>' - PASSED gtests.sh: #4422: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/275 48-byte object <04-00 00-00 14-01 00-00 90-47 B0-56 9A-47 B0-56 9A-47 B0-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-0B FF-56 F6-0B FF-56 F6-0B FF-56 00-00 00-00>' - PASSED gtests.sh: #4423: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/276 48-byte object <04-00 00-00 15-01 00-00 90-47 B0-56 9A-47 B0-56 9A-47 B0-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-0B FF-56 F6-0B FF-56 F6-0B FF-56 00-00 00-00>' - PASSED gtests.sh: #4424: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/277 48-byte object <04-00 00-00 16-01 00-00 30-31 17-57 4D-31 17-57 4D-31 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-59 00-57 66-59 00-57 66-59 00-57 00-00 00-00>' - PASSED gtests.sh: #4425: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/278 48-byte object <04-00 00-00 17-01 00-00 30-31 17-57 4D-31 17-57 4D-31 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-59 00-57 66-59 00-57 66-59 00-57 00-00 00-00>' - PASSED gtests.sh: #4426: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/279 48-byte object <04-00 00-00 18-01 00-00 30-31 17-57 4E-31 17-57 4E-31 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-59 00-57 66-59 00-57 66-59 00-57 00-00 00-00>' - PASSED gtests.sh: #4427: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/280 48-byte object <04-00 00-00 19-01 00-00 30-31 17-57 4E-31 17-57 4E-31 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-59 00-57 66-59 00-57 66-59 00-57 00-00 00-00>' - PASSED gtests.sh: #4428: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/281 48-byte object <04-00 00-00 1A-01 00-00 30-31 17-57 4E-31 17-57 4E-31 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-59 00-57 66-59 00-57 66-59 00-57 00-00 00-00>' - PASSED gtests.sh: #4429: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/282 48-byte object <04-00 00-00 1B-01 00-00 30-31 17-57 4E-31 17-57 4E-31 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-59 00-57 66-59 00-57 66-59 00-57 00-00 00-00>' - PASSED gtests.sh: #4430: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/283 48-byte object <04-00 00-00 1C-01 00-00 80-E9 12-57 0C-EA 12-57 0C-EA 12-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 60-59 00-57 66-59 00-57 66-59 00-57 00-00 00-00>' - PASSED gtests.sh: #4431: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/284 48-byte object <04-00 00-00 1D-01 00-00 60-59 00-57 6C-59 00-57 6C-59 00-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 30-89 BE-56 36-89 BE-56 36-89 BE-56 00-00 00-00>' - PASSED gtests.sh: #4432: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/285 48-byte object <04-00 00-00 1E-01 00-00 F0-0B FF-56 FA-0B FF-56 FA-0B FF-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 E0-8F C0-56 E6-8F C0-56 E6-8F C0-56 00-00 00-00>' - PASSED gtests.sh: #4433: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/286 48-byte object <04-00 00-00 1F-01 00-00 90-04 C6-56 98-04 C6-56 98-04 C6-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-C0 B5-56 C6-C0 B5-56 C6-C0 B5-56 00-00 00-00>' - PASSED gtests.sh: #4434: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/287 48-byte object <04-00 00-00 20-01 00-00 90-04 C6-56 97-04 C6-56 97-04 C6-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-C0 B5-56 C6-C0 B5-56 C6-C0 B5-56 00-00 00-00>' - PASSED gtests.sh: #4435: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/288 48-byte object <04-00 00-00 21-01 00-00 10-4A C6-56 1B-4A C6-56 1B-4A C6-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 40-A0 C0-56 46-A0 C0-56 46-A0 C0-56 00-00 00-00>' - PASSED gtests.sh: #4436: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/289 48-byte object <04-00 00-00 22-01 00-00 90-E2 B5-56 9A-E2 B5-56 9A-E2 B5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 80-0E C6-56 86-0E C6-56 86-0E C6-56 00-00 00-00>' - PASSED gtests.sh: #4437: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/290 48-byte object <04-00 00-00 23-01 00-00 50-75 B1-56 55-75 B1-56 55-75 B1-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-B2 F8-56 F6-B2 F8-56 F6-B2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4438: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/291 48-byte object <04-00 00-00 24-01 00-00 50-75 B1-56 58-75 B1-56 58-75 B1-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-B2 F8-56 F6-B2 F8-56 F6-B2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4439: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/292 48-byte object <04-00 00-00 25-01 00-00 E0-71 17-57 10-72 17-57 10-72 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-0F F3-56 C6-0F F3-56 C6-0F F3-56 01-00 00-00>' - PASSED gtests.sh: #4440: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/293 48-byte object <04-00 00-00 26-01 00-00 E0-71 17-57 0E-72 17-57 0E-72 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-0F F3-56 C6-0F F3-56 C6-0F F3-56 01-00 00-00>' - PASSED gtests.sh: #4441: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/294 48-byte object <04-00 00-00 27-01 00-00 E0-71 17-57 0E-72 17-57 0E-72 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-0F F3-56 C6-0F F3-56 C6-0F F3-56 01-00 00-00>' - PASSED gtests.sh: #4442: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/295 48-byte object <04-00 00-00 28-01 00-00 E0-71 17-57 0E-72 17-57 0E-72 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-0F F3-56 C6-0F F3-56 C6-0F F3-56 01-00 00-00>' - PASSED gtests.sh: #4443: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/296 48-byte object <04-00 00-00 29-01 00-00 E0-71 17-57 0E-72 17-57 0E-72 17-57 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 C0-0F F3-56 C6-0F F3-56 C6-0F F3-56 01-00 00-00>' - PASSED gtests.sh: #4444: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/297 48-byte object <04-00 00-00 2A-01 00-00 C0-C9 B5-56 C8-C9 B5-56 C8-C9 B5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-53 B3-56 94-53 B3-56 94-53 B3-56 01-00 00-00>' - PASSED gtests.sh: #4445: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/298 48-byte object <04-00 00-00 2B-01 00-00 C0-C9 B5-56 C8-C9 B5-56 C8-C9 B5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 90-53 B3-56 94-53 B3-56 94-53 B3-56 01-00 00-00>' - PASSED gtests.sh: #4446: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/299 48-byte object <04-00 00-00 2C-01 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-F3 B0-56 F4-F3 B0-56 F4-F3 B0-56 01-00 00-00>' - PASSED gtests.sh: #4447: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/300 48-byte object <04-00 00-00 2D-01 00-00 00-4B C5-56 1C-4B C5-56 1C-4B C5-56 10-A4 12-57 CA-A5 12-57 CA-A5 12-57 F0-F3 B0-56 F4-F3 B0-56 F4-F3 B0-56 01-00 00-00>' - PASSED gtests.sh: #4448: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/301 48-byte object <04-00 00-00 2E-01 00-00 00-4B C5-56 1B-4B C5-56 1B-4B C5-56 10-A4 12-57 C8-A5 12-57 C8-A5 12-57 F0-F3 B0-56 F4-F3 B0-56 F4-F3 B0-56 01-00 00-00>' - PASSED gtests.sh: #4449: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/302 48-byte object <35-01 00-00 2F-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-F3 B0-56 F5-F3 B0-56 F5-F3 B0-56 01-00 00-00>' - PASSED gtests.sh: #4450: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/303 48-byte object <35-01 00-00 30-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-F3 B0-56 F5-F3 B0-56 F5-F3 B0-56 01-00 00-00>' - PASSED gtests.sh: #4451: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/304 48-byte object <35-01 00-00 31-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-F3 B0-56 F5-F3 B0-56 F5-F3 B0-56 00-00 00-00>' - PASSED gtests.sh: #4452: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/305 48-byte object <35-01 00-00 32-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-F3 B0-56 F5-F3 B0-56 F5-F3 B0-56 00-00 00-00>' - PASSED gtests.sh: #4453: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/306 48-byte object <35-01 00-00 33-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-F3 B0-56 F5-F3 B0-56 F5-F3 B0-56 00-00 00-00>' - PASSED gtests.sh: #4454: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/307 48-byte object <35-01 00-00 34-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-F3 B0-56 F5-F3 B0-56 F5-F3 B0-56 00-00 00-00>' - PASSED gtests.sh: #4455: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/308 48-byte object <35-01 00-00 35-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-F3 B0-56 F5-F3 B0-56 F5-F3 B0-56 00-00 00-00>' - PASSED gtests.sh: #4456: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/309 48-byte object <35-01 00-00 36-01 00-00 20-CC 12-57 68-CC 12-57 68-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4457: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/310 48-byte object <35-01 00-00 37-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4458: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/311 48-byte object <35-01 00-00 38-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4459: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/312 48-byte object <35-01 00-00 39-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4460: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/313 48-byte object <35-01 00-00 3A-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4461: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/314 48-byte object <35-01 00-00 3B-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4462: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/315 48-byte object <35-01 00-00 3C-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4463: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/316 48-byte object <35-01 00-00 3D-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-E2 F8-56 75-E2 F8-56 75-E2 F8-56 00-00 00-00>' - PASSED gtests.sh: #4464: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/317 48-byte object <35-01 00-00 3E-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-FF F7-56 15-FF F7-56 15-FF F7-56 00-00 00-00>' - PASSED gtests.sh: #4465: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/318 48-byte object <35-01 00-00 3F-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-FF F7-56 15-FF F7-56 15-FF F7-56 00-00 00-00>' - PASSED gtests.sh: #4466: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/319 48-byte object <35-01 00-00 40-01 00-00 10-FF F7-56 11-FF F7-56 11-FF F7-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-FB F7-56 25-FB F7-56 25-FB F7-56 00-00 00-00>' - PASSED gtests.sh: #4467: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/320 48-byte object <35-01 00-00 41-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-FF F7-56 15-FF F7-56 15-FF F7-56 00-00 00-00>' - PASSED gtests.sh: #4468: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/321 48-byte object <35-01 00-00 42-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-FF F7-56 15-FF F7-56 15-FF F7-56 00-00 00-00>' - PASSED gtests.sh: #4469: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/322 48-byte object <35-01 00-00 43-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-FF F7-56 15-FF F7-56 15-FF F7-56 00-00 00-00>' - PASSED gtests.sh: #4470: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/323 48-byte object <35-01 00-00 44-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-FF F7-56 15-FF F7-56 15-FF F7-56 00-00 00-00>' - PASSED gtests.sh: #4471: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/324 48-byte object <35-01 00-00 45-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4472: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/325 48-byte object <35-01 00-00 46-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4473: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/326 48-byte object <35-01 00-00 47-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4474: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/327 48-byte object <35-01 00-00 48-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4475: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/328 48-byte object <35-01 00-00 49-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4476: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/329 48-byte object <35-01 00-00 4A-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4477: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/330 48-byte object <35-01 00-00 4B-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4478: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/331 48-byte object <35-01 00-00 4C-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-2B B4-56 45-2B B4-56 45-2B B4-56 00-00 00-00>' - PASSED gtests.sh: #4479: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/332 48-byte object <35-01 00-00 4D-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4480: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/333 48-byte object <35-01 00-00 4E-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4481: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/334 48-byte object <35-01 00-00 4F-01 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4482: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/335 48-byte object <35-01 00-00 50-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4483: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/336 48-byte object <35-01 00-00 51-01 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4484: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/337 48-byte object <35-01 00-00 52-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4485: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/338 48-byte object <35-01 00-00 53-01 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4486: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/339 48-byte object <35-01 00-00 54-01 00-00 F0-18 E7-56 F2-18 E7-56 F2-18 E7-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-3D F8-56 95-3D F8-56 95-3D F8-56 00-00 00-00>' - PASSED gtests.sh: #4487: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/340 48-byte object <35-01 00-00 55-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4488: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/341 48-byte object <35-01 00-00 56-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4489: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/342 48-byte object <35-01 00-00 57-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4490: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/343 48-byte object <35-01 00-00 58-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4491: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/344 48-byte object <35-01 00-00 59-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4492: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/345 48-byte object <35-01 00-00 5A-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4493: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/346 48-byte object <35-01 00-00 5B-01 00-00 F0-18 E7-56 F2-18 E7-56 F2-18 E7-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-3D F8-56 95-3D F8-56 95-3D F8-56 00-00 00-00>' - PASSED gtests.sh: #4494: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/347 48-byte object <35-01 00-00 5C-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4495: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/348 48-byte object <35-01 00-00 5D-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4496: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/349 48-byte object <35-01 00-00 5E-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4497: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/350 48-byte object <35-01 00-00 5F-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4498: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/351 48-byte object <35-01 00-00 60-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-18 E7-56 F5-18 E7-56 F5-18 E7-56 00-00 00-00>' - PASSED gtests.sh: #4499: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/352 48-byte object <35-01 00-00 61-01 00-00 F0-18 E7-56 F2-18 E7-56 F2-18 E7-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-3D F8-56 95-3D F8-56 95-3D F8-56 00-00 00-00>' - PASSED gtests.sh: #4500: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/353 48-byte object <35-01 00-00 62-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4501: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/354 48-byte object <35-01 00-00 63-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4502: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/355 48-byte object <35-01 00-00 64-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4503: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/356 48-byte object <35-01 00-00 65-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4504: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/357 48-byte object <35-01 00-00 66-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4505: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/358 48-byte object <35-01 00-00 67-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4506: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/359 48-byte object <35-01 00-00 68-01 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4507: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/360 48-byte object <35-01 00-00 69-01 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-E3 BA-56 05-E3 BA-56 05-E3 BA-56 00-00 00-00>' - PASSED gtests.sh: #4508: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/361 48-byte object <35-01 00-00 6A-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4509: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/362 48-byte object <35-01 00-00 6B-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4510: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/363 48-byte object <35-01 00-00 6C-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4511: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/364 48-byte object <35-01 00-00 6D-01 00-00 20-CC 12-57 62-CC 12-57 62-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4512: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/365 48-byte object <35-01 00-00 6E-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4513: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/366 48-byte object <35-01 00-00 6F-01 00-00 70-1E 19-57 90-1E 19-57 90-1E 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4514: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/367 48-byte object <35-01 00-00 70-01 00-00 60-56 BE-56 BE-56 BE-56 BE-56 BE-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4515: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/368 48-byte object <35-01 00-00 71-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-9D BD-56 A5-9D BD-56 A5-9D BD-56 00-00 00-00>' - PASSED gtests.sh: #4516: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/369 48-byte object <35-01 00-00 72-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4517: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/370 48-byte object <35-01 00-00 73-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4518: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/371 48-byte object <35-01 00-00 74-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4519: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/372 48-byte object <35-01 00-00 75-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4520: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/373 48-byte object <35-01 00-00 76-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4521: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/374 48-byte object <35-01 00-00 77-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4522: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/375 48-byte object <35-01 00-00 78-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4523: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/376 48-byte object <35-01 00-00 79-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-DE B4-56 65-DE B4-56 65-DE B4-56 00-00 00-00>' - PASSED gtests.sh: #4524: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/377 48-byte object <35-01 00-00 7A-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4525: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/378 48-byte object <35-01 00-00 7B-01 00-00 20-CC 12-57 68-CC 12-57 68-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4526: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/379 48-byte object <35-01 00-00 7C-01 00-00 20-CC 12-57 68-CC 12-57 68-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4527: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/380 48-byte object <35-01 00-00 7D-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4528: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/381 48-byte object <35-01 00-00 7E-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4529: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/382 48-byte object <35-01 00-00 7F-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4530: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/383 48-byte object <35-01 00-00 80-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4531: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/384 48-byte object <35-01 00-00 81-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 B0-B3 FE-56 B5-B3 FE-56 B5-B3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4532: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/385 48-byte object <35-01 00-00 82-01 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4533: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/386 48-byte object <35-01 00-00 83-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4534: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/387 48-byte object <35-01 00-00 84-01 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4535: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/388 48-byte object <35-01 00-00 85-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4536: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/389 48-byte object <35-01 00-00 86-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4537: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/390 48-byte object <35-01 00-00 87-01 00-00 F0-AC 19-57 11-AD 19-57 11-AD 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4538: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/391 48-byte object <35-01 00-00 88-01 00-00 F0-AC 19-57 12-AD 19-57 12-AD 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4539: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/392 48-byte object <35-01 00-00 89-01 00-00 F0-AC 19-57 11-AD 19-57 11-AD 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 55-D3 FE-56 55-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4540: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/393 48-byte object <35-01 00-00 8A-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-F6 FF-56 05-F6 FF-56 05-F6 FF-56 00-00 00-00>' - PASSED gtests.sh: #4541: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/394 48-byte object <35-01 00-00 8B-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-F6 FF-56 05-F6 FF-56 05-F6 FF-56 00-00 00-00>' - PASSED gtests.sh: #4542: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/395 48-byte object <35-01 00-00 8C-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-F6 FF-56 05-F6 FF-56 05-F6 FF-56 00-00 00-00>' - PASSED gtests.sh: #4543: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/396 48-byte object <35-01 00-00 8D-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-F6 FF-56 05-F6 FF-56 05-F6 FF-56 00-00 00-00>' - PASSED gtests.sh: #4544: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/397 48-byte object <35-01 00-00 8E-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-F6 FF-56 05-F6 FF-56 05-F6 FF-56 00-00 00-00>' - PASSED gtests.sh: #4545: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/398 48-byte object <35-01 00-00 8F-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4546: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/399 48-byte object <35-01 00-00 90-01 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4547: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/400 48-byte object <35-01 00-00 91-01 00-00 F0-E7 19-57 13-E8 19-57 13-E8 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4548: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/401 48-byte object <35-01 00-00 92-01 00-00 F0-E7 19-57 12-E8 19-57 12-E8 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4549: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/402 48-byte object <35-01 00-00 93-01 00-00 F0-E7 19-57 13-E8 19-57 13-E8 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4550: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/403 48-byte object <35-01 00-00 94-01 00-00 F0-E7 19-57 12-E8 19-57 12-E8 19-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4551: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/404 48-byte object <35-01 00-00 95-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4552: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/405 48-byte object <35-01 00-00 96-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-3C 00-57 75-3C 00-57 75-3C 00-57 00-00 00-00>' - PASSED gtests.sh: #4553: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/406 48-byte object <35-01 00-00 97-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4554: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/407 48-byte object <35-01 00-00 98-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4555: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/408 48-byte object <35-01 00-00 99-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4556: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/409 48-byte object <35-01 00-00 9A-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4557: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/410 48-byte object <35-01 00-00 9B-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4558: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/411 48-byte object <35-01 00-00 9C-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4559: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/412 48-byte object <35-01 00-00 9D-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4560: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/413 48-byte object <35-01 00-00 9E-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-68 C0-56 05-68 C0-56 05-68 C0-56 00-00 00-00>' - PASSED gtests.sh: #4561: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/414 48-byte object <35-01 00-00 9F-01 00-00 90-3A 1A-57 B3-3A 1A-57 B3-3A 1A-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4562: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/415 48-byte object <35-01 00-00 A0-01 00-00 90-3A 1A-57 B2-3A 1A-57 B2-3A 1A-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4563: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/416 48-byte object <35-01 00-00 A1-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4564: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/417 48-byte object <35-01 00-00 A2-01 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4565: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/418 48-byte object <35-01 00-00 A3-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4566: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/419 48-byte object <35-01 00-00 A4-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4567: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/420 48-byte object <35-01 00-00 A5-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4568: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/421 48-byte object <35-01 00-00 A6-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-81 FE-56 55-81 FE-56 55-81 FE-56 00-00 00-00>' - PASSED gtests.sh: #4569: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/422 48-byte object <35-01 00-00 A7-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4570: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/423 48-byte object <35-01 00-00 A8-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4571: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/424 48-byte object <35-01 00-00 A9-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4572: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/425 48-byte object <35-01 00-00 AA-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4573: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/426 48-byte object <35-01 00-00 AB-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4574: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/427 48-byte object <35-01 00-00 AC-01 00-00 80-87 1A-57 A4-87 1A-57 A4-87 1A-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4575: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/428 48-byte object <35-01 00-00 AD-01 00-00 80-87 1A-57 A3-87 1A-57 A3-87 1A-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4576: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/429 48-byte object <35-01 00-00 AE-01 00-00 80-87 1A-57 A4-87 1A-57 A4-87 1A-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-AD FD-56 F5-AD FD-56 F5-AD FD-56 00-00 00-00>' - PASSED gtests.sh: #4577: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/430 48-byte object <35-01 00-00 AF-01 00-00 80-87 1A-57 A3-87 1A-57 A3-87 1A-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4578: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/431 48-byte object <35-01 00-00 B0-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4579: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/432 48-byte object <35-01 00-00 B1-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4580: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/433 48-byte object <35-01 00-00 B2-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4581: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/434 48-byte object <35-01 00-00 B3-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4582: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/435 48-byte object <35-01 00-00 B4-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4583: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/436 48-byte object <35-01 00-00 B5-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4584: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/437 48-byte object <35-01 00-00 B6-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 A0-CB FD-56 A5-CB FD-56 A5-CB FD-56 00-00 00-00>' - PASSED gtests.sh: #4585: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/438 48-byte object <35-01 00-00 B7-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4586: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/439 48-byte object <35-01 00-00 B8-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4587: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/440 48-byte object <35-01 00-00 B9-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4588: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/441 48-byte object <35-01 00-00 BA-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4589: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/442 48-byte object <35-01 00-00 BB-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4590: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/443 48-byte object <35-01 00-00 BC-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4591: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/444 48-byte object <35-01 00-00 BD-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4592: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/445 48-byte object <35-01 00-00 BE-01 00-00 E0-F1 1A-57 04-F2 1A-57 04-F2 1A-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-19 FE-56 15-19 FE-56 15-19 FE-56 00-00 00-00>' - PASSED gtests.sh: #4593: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/446 48-byte object <35-01 00-00 BF-01 00-00 C0-43 FE-56 C8-43 FE-56 C8-43 FE-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-3F FE-56 55-3F FE-56 55-3F FE-56 00-00 00-00>' - PASSED gtests.sh: #4594: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/447 48-byte object <35-01 00-00 C0-01 00-00 50-3F FE-56 58-3F FE-56 58-3F FE-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 E0-3A FE-56 E5-3A FE-56 E5-3A FE-56 00-00 00-00>' - PASSED gtests.sh: #4595: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/448 48-byte object <35-01 00-00 C1-01 00-00 50-3F FE-56 58-3F FE-56 58-3F FE-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 E0-3A FE-56 E5-3A FE-56 E5-3A FE-56 00-00 00-00>' - PASSED gtests.sh: #4596: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/449 48-byte object <35-01 00-00 C2-01 00-00 90-08 1B-57 B3-08 1B-57 B3-08 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-07 FE-56 C5-07 FE-56 C5-07 FE-56 00-00 00-00>' - PASSED gtests.sh: #4597: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/450 48-byte object <35-01 00-00 C3-01 00-00 90-08 1B-57 B3-08 1B-57 B3-08 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-07 FE-56 C5-07 FE-56 C5-07 FE-56 00-00 00-00>' - PASSED gtests.sh: #4598: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/451 48-byte object <35-01 00-00 C4-01 00-00 90-08 1B-57 B4-08 1B-57 B4-08 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-07 FE-56 C5-07 FE-56 C5-07 FE-56 00-00 00-00>' - PASSED gtests.sh: #4599: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/452 48-byte object <35-01 00-00 C5-01 00-00 90-08 1B-57 B4-08 1B-57 B4-08 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-07 FE-56 C5-07 FE-56 C5-07 FE-56 00-00 00-00>' - PASSED gtests.sh: #4600: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/453 48-byte object <35-01 00-00 C6-01 00-00 90-08 1B-57 B4-08 1B-57 B4-08 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-07 FE-56 C5-07 FE-56 C5-07 FE-56 00-00 00-00>' - PASSED gtests.sh: #4601: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/454 48-byte object <35-01 00-00 C7-01 00-00 90-08 1B-57 B4-08 1B-57 B4-08 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-07 FE-56 C5-07 FE-56 C5-07 FE-56 00-00 00-00>' - PASSED gtests.sh: #4602: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/455 48-byte object <35-01 00-00 C8-01 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-07 FE-56 C5-07 FE-56 C5-07 FE-56 00-00 00-00>' - PASSED gtests.sh: #4603: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/456 48-byte object <35-01 00-00 C9-01 00-00 C0-07 FE-56 CA-07 FE-56 CA-07 FE-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-EB 02-57 25-EB 02-57 25-EB 02-57 00-00 00-00>' - PASSED gtests.sh: #4604: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/457 48-byte object <35-01 00-00 CA-01 00-00 E0-3A FE-56 E8-3A FE-56 E8-3A FE-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 80-F3 02-57 85-F3 02-57 85-F3 02-57 00-00 00-00>' - PASSED gtests.sh: #4605: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/458 48-byte object <35-01 00-00 CB-01 00-00 60-3D 1B-57 84-3D 1B-57 84-3D 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-58 EA-56 C5-58 EA-56 C5-58 EA-56 00-00 00-00>' - PASSED gtests.sh: #4606: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/459 48-byte object <35-01 00-00 CC-01 00-00 C0-58 EA-56 C8-58 EA-56 C8-58 EA-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-0D 03-57 05-0D 03-57 05-0D 03-57 00-00 00-00>' - PASSED gtests.sh: #4607: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/460 48-byte object <35-01 00-00 CD-01 00-00 C0-58 EA-56 C8-58 EA-56 C8-58 EA-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-0D 03-57 05-0D 03-57 05-0D 03-57 00-00 00-00>' - PASSED gtests.sh: #4608: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/461 48-byte object <35-01 00-00 CE-01 00-00 20-EB 02-57 28-EB 02-57 28-EB 02-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-53 E5-56 05-53 E5-56 05-53 E5-56 00-00 00-00>' - PASSED gtests.sh: #4609: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/462 48-byte object <35-01 00-00 CF-01 00-00 10-54 1B-57 33-54 1B-57 33-54 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4610: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/463 48-byte object <35-01 00-00 D0-01 00-00 10-54 1B-57 33-54 1B-57 33-54 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4611: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/464 48-byte object <35-01 00-00 D1-01 00-00 10-54 1B-57 34-54 1B-57 34-54 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4612: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/465 48-byte object <35-01 00-00 D2-01 00-00 10-54 1B-57 34-54 1B-57 34-54 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4613: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/466 48-byte object <35-01 00-00 D3-01 00-00 10-54 1B-57 34-54 1B-57 34-54 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4614: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/467 48-byte object <35-01 00-00 D4-01 00-00 10-54 1B-57 34-54 1B-57 34-54 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4615: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/468 48-byte object <35-01 00-00 D5-01 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4616: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/469 48-byte object <35-01 00-00 D6-01 00-00 D0-59 03-57 DA-59 03-57 DA-59 03-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-55 03-57 45-55 03-57 45-55 03-57 00-00 00-00>' - PASSED gtests.sh: #4617: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/470 48-byte object <35-01 00-00 D7-01 00-00 D0-59 03-57 D8-59 03-57 D8-59 03-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-55 03-57 45-55 03-57 45-55 03-57 00-00 00-00>' - PASSED gtests.sh: #4618: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/471 48-byte object <35-01 00-00 D8-01 00-00 E0-88 1B-57 04-89 1B-57 04-89 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-59 03-57 D5-59 03-57 D5-59 03-57 00-00 00-00>' - PASSED gtests.sh: #4619: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/472 48-byte object <35-01 00-00 D9-01 00-00 D0-59 03-57 D8-59 03-57 D8-59 03-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-55 03-57 45-55 03-57 45-55 03-57 00-00 00-00>' - PASSED gtests.sh: #4620: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/473 48-byte object <35-01 00-00 DA-01 00-00 F0-62 03-57 F8-62 03-57 F8-62 03-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 60-A8 03-57 65-A8 03-57 65-A8 03-57 00-00 00-00>' - PASSED gtests.sh: #4621: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/474 48-byte object <35-01 00-00 DB-01 00-00 C0-9E 03-57 C8-9E 03-57 C8-9E 03-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-2C 03-57 C5-2C 03-57 C5-2C 03-57 00-00 00-00>' - PASSED gtests.sh: #4622: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/475 48-byte object <35-01 00-00 DC-01 00-00 90-9F 1B-57 B3-9F 1B-57 B3-9F 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-2C 03-57 C5-2C 03-57 C5-2C 03-57 00-00 00-00>' - PASSED gtests.sh: #4623: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/476 48-byte object <35-01 00-00 DD-01 00-00 90-9F 1B-57 B3-9F 1B-57 B3-9F 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-2C 03-57 C5-2C 03-57 C5-2C 03-57 00-00 00-00>' - PASSED gtests.sh: #4624: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/477 48-byte object <35-01 00-00 DE-01 00-00 90-9F 1B-57 B4-9F 1B-57 B4-9F 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-2C 03-57 C5-2C 03-57 C5-2C 03-57 00-00 00-00>' - PASSED gtests.sh: #4625: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/478 48-byte object <35-01 00-00 DF-01 00-00 90-9F 1B-57 B4-9F 1B-57 B4-9F 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-2C 03-57 C5-2C 03-57 C5-2C 03-57 00-00 00-00>' - PASSED gtests.sh: #4626: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/479 48-byte object <35-01 00-00 E0-01 00-00 90-9F 1B-57 B4-9F 1B-57 B4-9F 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-2C 03-57 C5-2C 03-57 C5-2C 03-57 00-00 00-00>' - PASSED gtests.sh: #4627: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/480 48-byte object <35-01 00-00 E1-01 00-00 90-9F 1B-57 B4-9F 1B-57 B4-9F 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 C0-2C 03-57 C5-2C 03-57 C5-2C 03-57 00-00 00-00>' - PASSED gtests.sh: #4628: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/481 48-byte object <35-01 00-00 E2-01 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 80-67 05-57 85-67 05-57 85-67 05-57 00-00 00-00>' - PASSED gtests.sh: #4629: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/482 48-byte object <35-01 00-00 E3-01 00-00 80-67 05-57 8A-67 05-57 8A-67 05-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-63 05-57 25-63 05-57 25-63 05-57 00-00 00-00>' - PASSED gtests.sh: #4630: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/483 48-byte object <35-01 00-00 E4-01 00-00 80-67 05-57 88-67 05-57 88-67 05-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-63 05-57 25-63 05-57 25-63 05-57 00-00 00-00>' - PASSED gtests.sh: #4631: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/484 48-byte object <35-01 00-00 E5-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-BB EA-56 D5-BB EA-56 D5-BB EA-56 00-00 00-00>' - PASSED gtests.sh: #4632: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/485 48-byte object <35-01 00-00 E6-01 00-00 50-DA 1B-57 73-DA 1B-57 73-DA 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-BB EA-56 D5-BB EA-56 D5-BB EA-56 00-00 00-00>' - PASSED gtests.sh: #4633: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/486 48-byte object <35-01 00-00 E7-01 00-00 50-DA 1B-57 73-DA 1B-57 73-DA 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-BB EA-56 D5-BB EA-56 D5-BB EA-56 00-00 00-00>' - PASSED gtests.sh: #4634: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/487 48-byte object <35-01 00-00 E8-01 00-00 50-DA 1B-57 73-DA 1B-57 73-DA 1B-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-BB EA-56 D5-BB EA-56 D5-BB EA-56 00-00 00-00>' - PASSED gtests.sh: #4635: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/488 48-byte object <35-01 00-00 E9-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-BB EA-56 D5-BB EA-56 D5-BB EA-56 00-00 00-00>' - PASSED gtests.sh: #4636: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/489 48-byte object <35-01 00-00 EA-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4637: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/490 48-byte object <35-01 00-00 EB-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4638: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/491 48-byte object <35-01 00-00 EC-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4639: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/492 48-byte object <35-01 00-00 ED-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4640: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/493 48-byte object <35-01 00-00 EE-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4641: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/494 48-byte object <35-01 00-00 EF-01 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4642: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/495 48-byte object <35-01 00-00 F0-01 00-00 C0-19 1C-57 E5-19 1C-57 E5-19 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4643: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/496 48-byte object <35-01 00-00 F1-01 00-00 C0-19 1C-57 E3-19 1C-57 E3-19 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-C8 05-57 15-C8 05-57 15-C8 05-57 00-00 00-00>' - PASSED gtests.sh: #4644: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/497 48-byte object <35-01 00-00 F2-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4645: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/498 48-byte object <35-01 00-00 F3-01 00-00 C0-25 1C-57 E3-25 1C-57 E3-25 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4646: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/499 48-byte object <35-01 00-00 F4-01 00-00 C0-25 1C-57 E3-25 1C-57 E3-25 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4647: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/500 48-byte object <35-01 00-00 F5-01 00-00 C0-25 1C-57 E3-25 1C-57 E3-25 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4648: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/501 48-byte object <35-01 00-00 F6-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4649: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/502 48-byte object <35-01 00-00 F7-01 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4650: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/503 48-byte object <35-01 00-00 F8-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4651: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/504 48-byte object <35-01 00-00 F9-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-69 06-57 75-69 06-57 75-69 06-57 00-00 00-00>' - PASSED gtests.sh: #4652: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/505 48-byte object <35-01 00-00 FA-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4653: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/506 48-byte object <35-01 00-00 FB-01 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4654: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/507 48-byte object <35-01 00-00 FC-01 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4655: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/508 48-byte object <35-01 00-00 FD-01 00-00 30-67 1C-57 55-67 1C-57 55-67 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4656: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/509 48-byte object <35-01 00-00 FE-01 00-00 30-67 1C-57 53-67 1C-57 53-67 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4657: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/510 48-byte object <35-01 00-00 FF-01 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4658: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/511 48-byte object <35-01 00-00 00-02 00-00 30-73 1C-57 54-73 1C-57 54-73 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4659: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/512 48-byte object <35-01 00-00 01-02 00-00 30-73 1C-57 54-73 1C-57 54-73 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-8B 06-57 25-8B 06-57 25-8B 06-57 00-00 00-00>' - PASSED gtests.sh: #4660: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/513 48-byte object <35-01 00-00 02-02 00-00 30-73 1C-57 54-73 1C-57 54-73 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-DA 03-57 15-DA 03-57 15-DA 03-57 00-00 00-00>' - PASSED gtests.sh: #4661: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/514 48-byte object <35-01 00-00 03-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-DA 03-57 15-DA 03-57 15-DA 03-57 00-00 00-00>' - PASSED gtests.sh: #4662: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/515 48-byte object <35-01 00-00 04-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-DA 03-57 15-DA 03-57 15-DA 03-57 00-00 00-00>' - PASSED gtests.sh: #4663: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/516 48-byte object <35-01 00-00 05-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-DA 03-57 15-DA 03-57 15-DA 03-57 00-00 00-00>' - PASSED gtests.sh: #4664: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/517 48-byte object <35-01 00-00 06-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-DA 03-57 15-DA 03-57 15-DA 03-57 00-00 00-00>' - PASSED gtests.sh: #4665: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/518 48-byte object <35-01 00-00 07-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-DA 03-57 15-DA 03-57 15-DA 03-57 00-00 00-00>' - PASSED gtests.sh: #4666: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/519 48-byte object <35-01 00-00 08-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-DA 03-57 15-DA 03-57 15-DA 03-57 00-00 00-00>' - PASSED gtests.sh: #4667: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/520 48-byte object <35-01 00-00 09-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4668: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/521 48-byte object <35-01 00-00 0A-02 00-00 A0-C4 1C-57 C6-C4 1C-57 C6-C4 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4669: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/522 48-byte object <35-01 00-00 0B-02 00-00 A0-C4 1C-57 C4-C4 1C-57 C4-C4 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4670: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/523 48-byte object <35-01 00-00 0C-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4671: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/524 48-byte object <35-01 00-00 0D-02 00-00 A0-D0 1C-57 C4-D0 1C-57 C4-D0 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4672: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/525 48-byte object <35-01 00-00 0E-02 00-00 A0-D0 1C-57 C4-D0 1C-57 C4-D0 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4673: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/526 48-byte object <35-01 00-00 0F-02 00-00 A0-D0 1C-57 C4-D0 1C-57 C4-D0 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4674: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/527 48-byte object <35-01 00-00 10-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-FA 03-57 05-FA 03-57 05-FA 03-57 00-00 00-00>' - PASSED gtests.sh: #4675: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/528 48-byte object <35-01 00-00 11-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4676: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/529 48-byte object <35-01 00-00 12-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4677: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/530 48-byte object <35-01 00-00 13-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4678: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/531 48-byte object <35-01 00-00 14-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4679: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/532 48-byte object <35-01 00-00 15-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4680: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/533 48-byte object <35-01 00-00 16-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4681: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/534 48-byte object <35-01 00-00 17-02 00-00 10-12 1D-57 36-12 1D-57 36-12 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4682: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/535 48-byte object <35-01 00-00 18-02 00-00 10-12 1D-57 34-12 1D-57 34-12 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-1C 04-57 95-1C 04-57 95-1C 04-57 00-00 00-00>' - PASSED gtests.sh: #4683: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/536 48-byte object <35-01 00-00 19-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4684: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/537 48-byte object <35-01 00-00 1A-02 00-00 10-1E 1D-57 34-1E 1D-57 34-1E 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4685: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/538 48-byte object <35-01 00-00 1B-02 00-00 10-1E 1D-57 34-1E 1D-57 34-1E 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4686: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/539 48-byte object <35-01 00-00 1C-02 00-00 10-1E 1D-57 34-1E 1D-57 34-1E 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4687: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/540 48-byte object <35-01 00-00 1D-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4688: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/541 48-byte object <35-01 00-00 1E-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4689: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/542 48-byte object <35-01 00-00 1F-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4690: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/543 48-byte object <35-01 00-00 20-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 F0-8F EA-56 F5-8F EA-56 F5-8F EA-56 00-00 00-00>' - PASSED gtests.sh: #4691: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/544 48-byte object <35-01 00-00 21-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4692: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/545 48-byte object <35-01 00-00 22-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4693: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/546 48-byte object <35-01 00-00 23-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4694: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/547 48-byte object <35-01 00-00 24-02 00-00 80-5F 1D-57 A6-5F 1D-57 A6-5F 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4695: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/548 48-byte object <35-01 00-00 25-02 00-00 80-5F 1D-57 A4-5F 1D-57 A4-5F 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4696: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/549 48-byte object <35-01 00-00 26-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4697: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/550 48-byte object <35-01 00-00 27-02 00-00 80-6B 1D-57 A4-6B 1D-57 A4-6B 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4698: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/551 48-byte object <35-01 00-00 28-02 00-00 80-6B 1D-57 A4-6B 1D-57 A4-6B 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-65 ED-56 35-65 ED-56 35-65 ED-56 00-00 00-00>' - PASSED gtests.sh: #4699: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/552 48-byte object <35-01 00-00 29-02 00-00 80-6B 1D-57 A4-6B 1D-57 A4-6B 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4700: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/553 48-byte object <35-01 00-00 2A-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4701: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/554 48-byte object <35-01 00-00 2B-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4702: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/555 48-byte object <35-01 00-00 2C-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4703: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/556 48-byte object <35-01 00-00 2D-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4704: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/557 48-byte object <35-01 00-00 2E-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4705: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/558 48-byte object <35-01 00-00 2F-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4706: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/559 48-byte object <35-01 00-00 30-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A6 EB-56 05-A6 EB-56 05-A6 EB-56 00-00 00-00>' - PASSED gtests.sh: #4707: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/560 48-byte object <35-01 00-00 31-02 00-00 F0-AC 1D-57 16-AD 1D-57 16-AD 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4708: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/561 48-byte object <35-01 00-00 32-02 00-00 F0-AC 1D-57 14-AD 1D-57 14-AD 1D-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4709: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/562 48-byte object <35-01 00-00 33-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4710: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/563 48-byte object <35-01 00-00 34-02 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4711: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/564 48-byte object <35-01 00-00 35-02 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4712: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/565 48-byte object <35-01 00-00 36-02 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4713: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/566 48-byte object <35-01 00-00 37-02 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4714: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/567 48-byte object <35-01 00-00 38-02 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 20-98 EF-56 25-98 EF-56 25-98 EF-56 00-00 00-00>' - PASSED gtests.sh: #4715: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/568 48-byte object <35-01 00-00 39-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A8 F0-56 05-A8 F0-56 05-A8 F0-56 00-00 00-00>' - PASSED gtests.sh: #4716: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/569 48-byte object <35-01 00-00 3A-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A8 F0-56 05-A8 F0-56 05-A8 F0-56 00-00 00-00>' - PASSED gtests.sh: #4717: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/570 48-byte object <35-01 00-00 3B-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A8 F0-56 05-A8 F0-56 05-A8 F0-56 00-00 00-00>' - PASSED gtests.sh: #4718: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/571 48-byte object <35-01 00-00 3C-02 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A8 F0-56 05-A8 F0-56 05-A8 F0-56 00-00 00-00>' - PASSED gtests.sh: #4719: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/572 48-byte object <35-01 00-00 3D-02 00-00 60-FE 1D-57 6E-00 1E-57 6E-00 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-A8 F0-56 05-A8 F0-56 05-A8 F0-56 00-00 00-00>' - PASSED gtests.sh: #4720: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/573 48-byte object <35-01 00-00 3E-02 00-00 80-0C 1E-57 8E-0D 1E-57 8E-0D 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-05 C3-56 D5-05 C3-56 D5-05 C3-56 00-00 00-00>' - PASSED gtests.sh: #4721: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/574 48-byte object <35-01 00-00 3F-02 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-05 C3-56 D5-05 C3-56 D5-05 C3-56 00-00 00-00>' - PASSED gtests.sh: #4722: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/575 48-byte object <35-01 00-00 40-02 00-00 40-1B 1E-57 66-1B 1E-57 66-1B 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-05 C3-56 D5-05 C3-56 D5-05 C3-56 00-00 00-00>' - PASSED gtests.sh: #4723: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/576 48-byte object <35-01 00-00 41-02 00-00 D0-05 C3-56 DA-05 C3-56 DA-05 C3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 E0-01 F3-56 E5-01 F3-56 E5-01 F3-56 00-00 00-00>' - PASSED gtests.sh: #4724: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/577 48-byte object <35-01 00-00 42-02 00-00 C0-EA B3-56 CA-EA B3-56 CA-EA B3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-3A B2-56 15-3A B2-56 15-3A B2-56 00-00 00-00>' - PASSED gtests.sh: #4725: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/578 48-byte object <35-01 00-00 43-02 00-00 50-45 B2-56 5A-45 B2-56 5A-45 B2-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-F4 BB-56 15-F4 BB-56 15-F4 BB-56 00-00 00-00>' - PASSED gtests.sh: #4726: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/579 48-byte object <35-01 00-00 44-02 00-00 F0-31 1E-57 15-32 1E-57 15-32 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-C6 F0-56 D5-C6 F0-56 D5-C6 F0-56 00-00 00-00>' - PASSED gtests.sh: #4727: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/580 48-byte object <35-01 00-00 45-02 00-00 F0-31 1E-57 15-32 1E-57 15-32 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-C6 F0-56 D5-C6 F0-56 D5-C6 F0-56 00-00 00-00>' - PASSED gtests.sh: #4728: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/581 48-byte object <35-01 00-00 46-02 00-00 F0-31 1E-57 16-32 1E-57 16-32 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-C6 F0-56 D5-C6 F0-56 D5-C6 F0-56 00-00 00-00>' - PASSED gtests.sh: #4729: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/582 48-byte object <35-01 00-00 47-02 00-00 F0-31 1E-57 16-32 1E-57 16-32 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-C6 F0-56 D5-C6 F0-56 D5-C6 F0-56 00-00 00-00>' - PASSED gtests.sh: #4730: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/583 48-byte object <35-01 00-00 48-02 00-00 F0-31 1E-57 16-32 1E-57 16-32 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-C6 F0-56 D5-C6 F0-56 D5-C6 F0-56 00-00 00-00>' - PASSED gtests.sh: #4731: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/584 48-byte object <35-01 00-00 49-02 00-00 F0-31 1E-57 16-32 1E-57 16-32 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-C6 F0-56 D5-C6 F0-56 D5-C6 F0-56 00-00 00-00>' - PASSED gtests.sh: #4732: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/585 48-byte object <35-01 00-00 4A-02 00-00 80-0C 1E-57 8E-0D 1E-57 8E-0D 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-C6 F0-56 D5-C6 F0-56 D5-C6 F0-56 00-00 00-00>' - PASSED gtests.sh: #4733: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/586 48-byte object <35-01 00-00 4B-02 00-00 30-D1 B3-56 3C-D1 B3-56 3C-D1 B3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-E2 B3-56 95-E2 B3-56 95-E2 B3-56 00-00 00-00>' - PASSED gtests.sh: #4734: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/587 48-byte object <35-01 00-00 4C-02 00-00 90-E2 B3-56 9A-E2 B3-56 9A-E2 B3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-54 B3-56 95-54 B3-56 95-54 B3-56 00-00 00-00>' - PASSED gtests.sh: #4735: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/588 48-byte object <35-01 00-00 4D-02 00-00 90-E2 B3-56 98-E2 B3-56 98-E2 B3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-54 B3-56 95-54 B3-56 95-54 B3-56 00-00 00-00>' - PASSED gtests.sh: #4736: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/589 48-byte object <35-01 00-00 4E-02 00-00 60-12 B2-56 67-12 B2-56 67-12 B2-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 00-B1 B4-56 05-B1 B4-56 05-B1 B4-56 00-00 00-00>' - PASSED gtests.sh: #4737: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/590 48-byte object <35-01 00-00 4F-02 00-00 B0-13 B4-56 BB-13 B4-56 BB-13 B4-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-29 B2-56 95-29 B2-56 95-29 B2-56 00-00 00-00>' - PASSED gtests.sh: #4738: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/591 48-byte object <35-01 00-00 50-02 00-00 90-29 B2-56 9A-29 B2-56 9A-29 B2-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 80-EB B7-56 85-EB B7-56 85-EB B7-56 00-00 00-00>' - PASSED gtests.sh: #4739: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/592 48-byte object <35-01 00-00 51-02 00-00 90-29 B2-56 95-29 B2-56 95-29 B2-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 80-EB B7-56 85-EB B7-56 85-EB B7-56 00-00 00-00>' - PASSED gtests.sh: #4740: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/593 48-byte object <35-01 00-00 52-02 00-00 F0-8B B3-56 F8-8B B3-56 F8-8B B3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 90-03 BD-56 95-03 BD-56 95-03 BD-56 00-00 00-00>' - PASSED gtests.sh: #4741: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/594 48-byte object <35-01 00-00 53-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-67 B3-56 D5-67 B3-56 D5-67 B3-56 01-00 00-00>' - PASSED gtests.sh: #4742: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/595 48-byte object <35-01 00-00 54-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-67 B3-56 D5-67 B3-56 D5-67 B3-56 01-00 00-00>' - PASSED gtests.sh: #4743: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/596 48-byte object <35-01 00-00 55-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-67 B3-56 D5-67 B3-56 D5-67 B3-56 01-00 00-00>' - PASSED gtests.sh: #4744: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/597 48-byte object <35-01 00-00 56-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-67 B3-56 D5-67 B3-56 D5-67 B3-56 01-00 00-00>' - PASSED gtests.sh: #4745: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/598 48-byte object <35-01 00-00 57-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 D0-67 B3-56 D5-67 B3-56 D5-67 B3-56 01-00 00-00>' - PASSED gtests.sh: #4746: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/599 48-byte object <35-01 00-00 58-02 00-00 D0-67 B3-56 D8-67 B3-56 D8-67 B3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 70-22 B3-56 74-22 B3-56 74-22 B3-56 01-00 00-00>' - PASSED gtests.sh: #4747: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/600 48-byte object <35-01 00-00 59-02 00-00 90-03 BD-56 98-03 BD-56 98-03 BD-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 40-A9 B3-56 44-A9 B3-56 44-A9 B3-56 01-00 00-00>' - PASSED gtests.sh: #4748: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/601 48-byte object <35-01 00-00 5A-02 00-00 80-B1 1E-57 A4-B1 1E-57 A4-B1 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-92 AF-56 14-92 AF-56 14-92 AF-56 01-00 00-00>' - PASSED gtests.sh: #4749: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/602 48-byte object <35-01 00-00 5B-02 00-00 80-B1 1E-57 A4-B1 1E-57 A4-B1 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-92 AF-56 14-92 AF-56 14-92 AF-56 01-00 00-00>' - PASSED gtests.sh: #4750: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/603 48-byte object <35-01 00-00 5C-02 00-00 80-B1 1E-57 A3-B1 1E-57 A3-B1 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-92 AF-56 14-92 AF-56 14-92 AF-56 01-00 00-00>' - PASSED gtests.sh: #4751: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/604 48-byte object <BF-00 00-00 5D-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-92 AF-56 14-92 AF-56 14-92 AF-56 01-00 00-00>' - PASSED gtests.sh: #4752: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/605 48-byte object <BF-00 00-00 5E-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-92 AF-56 14-92 AF-56 14-92 AF-56 01-00 00-00>' - PASSED gtests.sh: #4753: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/606 48-byte object <BF-00 00-00 5F-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-92 AF-56 14-92 AF-56 14-92 AF-56 00-00 00-00>' - PASSED gtests.sh: #4754: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/607 48-byte object <BF-00 00-00 60-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-92 AF-56 14-92 AF-56 14-92 AF-56 00-00 00-00>' - PASSED gtests.sh: #4755: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/608 48-byte object <BF-00 00-00 61-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4756: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/609 48-byte object <BF-00 00-00 62-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4757: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/610 48-byte object <BF-00 00-00 63-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4758: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/611 48-byte object <BF-00 00-00 64-02 00-00 20-CC 12-57 68-CC 12-57 68-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4759: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/612 48-byte object <BF-00 00-00 65-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4760: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/613 48-byte object <BF-00 00-00 66-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4761: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/614 48-byte object <BF-00 00-00 67-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4762: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/615 48-byte object <BF-00 00-00 68-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 30-C3 F8-56 34-C3 F8-56 34-C3 F8-56 00-00 00-00>' - PASSED gtests.sh: #4763: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/616 48-byte object <BF-00 00-00 69-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-AD 14-57 14-AD 14-57 14-AD 14-57 00-00 00-00>' - PASSED gtests.sh: #4764: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/617 48-byte object <BF-00 00-00 6A-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-AD 14-57 14-AD 14-57 14-AD 14-57 00-00 00-00>' - PASSED gtests.sh: #4765: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/618 48-byte object <BF-00 00-00 6B-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-AD 14-57 14-AD 14-57 14-AD 14-57 00-00 00-00>' - PASSED gtests.sh: #4766: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/619 48-byte object <BF-00 00-00 6C-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-AD 14-57 14-AD 14-57 14-AD 14-57 00-00 00-00>' - PASSED gtests.sh: #4767: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/620 48-byte object <BF-00 00-00 6D-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 10-AD 14-57 14-AD 14-57 14-AD 14-57 00-00 00-00>' - PASSED gtests.sh: #4768: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/621 48-byte object <BF-00 00-00 6E-02 00-00 10-AD 14-57 11-AD 14-57 11-AD 14-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-76 B3-56 54-76 B3-56 54-76 B3-56 00-00 00-00>' - PASSED gtests.sh: #4769: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/622 48-byte object <BF-00 00-00 6F-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4770: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/623 48-byte object <BF-00 00-00 70-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4771: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/624 48-byte object <BF-00 00-00 71-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4772: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/625 48-byte object <BF-00 00-00 72-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4773: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/626 48-byte object <BF-00 00-00 73-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4774: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/627 48-byte object <BF-00 00-00 74-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4775: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/628 48-byte object <BF-00 00-00 75-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4776: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/629 48-byte object <BF-00 00-00 76-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4777: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/630 48-byte object <BF-00 00-00 77-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4778: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/631 48-byte object <BF-00 00-00 78-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4779: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/632 48-byte object <BF-00 00-00 79-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4780: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/633 48-byte object <BF-00 00-00 7A-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4781: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/634 48-byte object <BF-00 00-00 7B-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4782: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/635 48-byte object <BF-00 00-00 7C-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4783: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/636 48-byte object <BF-00 00-00 7D-02 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4784: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/637 48-byte object <BF-00 00-00 7E-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4785: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/638 48-byte object <BF-00 00-00 7F-02 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4786: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/639 48-byte object <BF-00 00-00 80-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4787: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/640 48-byte object <BF-00 00-00 81-02 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4788: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/641 48-byte object <BF-00 00-00 82-02 00-00 50-36 F3-56 52-36 F3-56 52-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4789: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/642 48-byte object <BF-00 00-00 83-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4790: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/643 48-byte object <BF-00 00-00 84-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4791: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/644 48-byte object <BF-00 00-00 85-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4792: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/645 48-byte object <BF-00 00-00 86-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4793: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/646 48-byte object <BF-00 00-00 87-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4794: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/647 48-byte object <BF-00 00-00 88-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4795: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/648 48-byte object <BF-00 00-00 89-02 00-00 50-36 F3-56 52-36 F3-56 52-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4796: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/649 48-byte object <BF-00 00-00 8A-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4797: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/650 48-byte object <BF-00 00-00 8B-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4798: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/651 48-byte object <BF-00 00-00 8C-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4799: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/652 48-byte object <BF-00 00-00 8D-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4800: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/653 48-byte object <BF-00 00-00 8E-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4801: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/654 48-byte object <BF-00 00-00 8F-02 00-00 50-36 F3-56 52-36 F3-56 52-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4802: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/655 48-byte object <BF-00 00-00 90-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4803: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/656 48-byte object <BF-00 00-00 91-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4804: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/657 48-byte object <BF-00 00-00 92-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4805: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/658 48-byte object <BF-00 00-00 93-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4806: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/659 48-byte object <BF-00 00-00 94-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4807: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/660 48-byte object <BF-00 00-00 95-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4808: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/661 48-byte object <BF-00 00-00 96-02 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4809: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/662 48-byte object <BF-00 00-00 97-02 00-00 20-CC 12-57 65-CC 12-57 65-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4810: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/663 48-byte object <BF-00 00-00 98-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4811: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/664 48-byte object <BF-00 00-00 99-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4812: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/665 48-byte object <BF-00 00-00 9A-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4813: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/666 48-byte object <BF-00 00-00 9B-02 00-00 20-CC 12-57 62-CC 12-57 62-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4814: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/667 48-byte object <BF-00 00-00 9C-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4815: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/668 48-byte object <BF-00 00-00 9D-02 00-00 A0-3F 20-57 C1-3F 20-57 C1-3F 20-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4816: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/669 48-byte object <BF-00 00-00 9E-02 00-00 60-56 BE-56 BD-56 BE-56 BD-56 BE-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4817: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/670 48-byte object <BF-00 00-00 9F-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4818: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/671 48-byte object <BF-00 00-00 A0-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4819: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/672 48-byte object <BF-00 00-00 A1-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4820: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/673 48-byte object <BF-00 00-00 A2-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4821: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/674 48-byte object <BF-00 00-00 A3-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4822: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/675 48-byte object <BF-00 00-00 A4-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4823: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/676 48-byte object <BF-00 00-00 A5-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4824: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/677 48-byte object <BF-00 00-00 A6-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4825: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/678 48-byte object <BF-00 00-00 A7-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4826: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/679 48-byte object <BF-00 00-00 A8-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4827: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/680 48-byte object <BF-00 00-00 A9-02 00-00 20-CC 12-57 68-CC 12-57 68-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4828: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/681 48-byte object <BF-00 00-00 AA-02 00-00 20-CC 12-57 68-CC 12-57 68-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4829: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/682 48-byte object <BF-00 00-00 AB-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4830: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/683 48-byte object <BF-00 00-00 AC-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4831: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/684 48-byte object <BF-00 00-00 AD-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4832: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/685 48-byte object <BF-00 00-00 AE-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4833: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/686 48-byte object <BF-00 00-00 AF-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4834: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/687 48-byte object <BF-00 00-00 B0-02 00-00 20-CC 12-57 64-CC 12-57 64-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4835: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/688 48-byte object <BF-00 00-00 B1-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4836: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/689 48-byte object <BF-00 00-00 B2-02 00-00 20-CC 12-57 67-CC 12-57 67-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4837: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/690 48-byte object <BF-00 00-00 B3-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4838: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/691 48-byte object <BF-00 00-00 B4-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4839: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/692 48-byte object <BF-00 00-00 B5-02 00-00 A0-CF 20-57 C0-CF 20-57 C0-CF 20-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4840: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/693 48-byte object <BF-00 00-00 B6-02 00-00 A0-CF 20-57 C1-CF 20-57 C1-CF 20-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4841: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/694 48-byte object <BF-00 00-00 B7-02 00-00 A0-CF 20-57 C2-CF 20-57 C2-CF 20-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4842: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/695 48-byte object <BF-00 00-00 B8-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4843: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/696 48-byte object <BF-00 00-00 B9-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4844: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/697 48-byte object <BF-00 00-00 BA-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4845: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/698 48-byte object <BF-00 00-00 BB-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4846: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/699 48-byte object <BF-00 00-00 BC-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4847: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/700 48-byte object <BF-00 00-00 BD-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4848: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/701 48-byte object <BF-00 00-00 BE-02 00-00 20-CC 12-57 61-CC 12-57 61-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4849: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/702 48-byte object <BF-00 00-00 BF-02 00-00 40-0B 21-57 62-0B 21-57 62-0B 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4850: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/703 48-byte object <BF-00 00-00 C0-02 00-00 40-0B 21-57 63-0B 21-57 63-0B 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4851: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/704 48-byte object <BF-00 00-00 C1-02 00-00 40-0B 21-57 62-0B 21-57 62-0B 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4852: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/705 48-byte object <BF-00 00-00 C2-02 00-00 40-0B 21-57 63-0B 21-57 63-0B 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4853: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/706 48-byte object <BF-00 00-00 C3-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4854: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/707 48-byte object <BF-00 00-00 C4-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4855: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/708 48-byte object <BF-00 00-00 C5-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4856: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/709 48-byte object <BF-00 00-00 C6-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4857: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/710 48-byte object <BF-00 00-00 C7-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4858: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/711 48-byte object <BF-00 00-00 C8-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4859: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/712 48-byte object <BF-00 00-00 C9-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4860: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/713 48-byte object <BF-00 00-00 CA-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4861: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/714 48-byte object <BF-00 00-00 CB-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4862: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/715 48-byte object <BF-00 00-00 CC-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4863: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/716 48-byte object <BF-00 00-00 CD-02 00-00 C0-5E 21-57 E2-5E 21-57 E2-5E 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4864: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/717 48-byte object <BF-00 00-00 CE-02 00-00 C0-5E 21-57 E3-5E 21-57 E3-5E 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4865: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/718 48-byte object <BF-00 00-00 CF-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4866: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/719 48-byte object <BF-00 00-00 D0-02 00-00 20-CC 12-57 63-CC 12-57 63-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4867: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/720 48-byte object <BF-00 00-00 D1-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4868: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/721 48-byte object <BF-00 00-00 D2-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4869: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/722 48-byte object <BF-00 00-00 D3-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4870: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/723 48-byte object <BF-00 00-00 D4-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4871: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/724 48-byte object <BF-00 00-00 D5-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4872: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/725 48-byte object <BF-00 00-00 D6-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4873: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/726 48-byte object <BF-00 00-00 D7-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4874: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/727 48-byte object <BF-00 00-00 D8-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4875: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/728 48-byte object <BF-00 00-00 D9-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4876: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/729 48-byte object <BF-00 00-00 DA-02 00-00 80-AC 21-57 A3-AC 21-57 A3-AC 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4877: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/730 48-byte object <BF-00 00-00 DB-02 00-00 80-AC 21-57 A4-AC 21-57 A4-AC 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4878: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/731 48-byte object <BF-00 00-00 DC-02 00-00 80-AC 21-57 A3-AC 21-57 A3-AC 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4879: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/732 48-byte object <BF-00 00-00 DD-02 00-00 80-AC 21-57 A4-AC 21-57 A4-AC 21-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4880: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/733 48-byte object <BF-00 00-00 DE-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4881: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/734 48-byte object <BF-00 00-00 DF-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4882: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/735 48-byte object <BF-00 00-00 E0-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4883: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/736 48-byte object <BF-00 00-00 E1-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4884: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/737 48-byte object <BF-00 00-00 E2-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4885: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/738 48-byte object <BF-00 00-00 E3-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4886: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/739 48-byte object <BF-00 00-00 E4-02 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4887: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/740 48-byte object <BF-00 00-00 E5-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4888: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/741 48-byte object <BF-00 00-00 E6-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4889: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/742 48-byte object <BF-00 00-00 E7-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4890: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/743 48-byte object <BF-00 00-00 E8-02 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4891: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/744 48-byte object <BF-00 00-00 E9-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4892: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/745 48-byte object <BF-00 00-00 EA-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4893: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/746 48-byte object <BF-00 00-00 EB-02 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4894: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/747 48-byte object <BF-00 00-00 EC-02 00-00 00-18 22-57 24-18 22-57 24-18 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4895: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/748 48-byte object <BF-00 00-00 ED-02 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4896: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/749 48-byte object <BF-00 00-00 EE-02 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4897: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/750 48-byte object <BF-00 00-00 EF-02 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4898: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/751 48-byte object <BF-00 00-00 F0-02 00-00 50-2F 22-57 73-2F 22-57 73-2F 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4899: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/752 48-byte object <BF-00 00-00 F1-02 00-00 50-2F 22-57 73-2F 22-57 73-2F 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4900: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/753 48-byte object <BF-00 00-00 F2-02 00-00 50-2F 22-57 74-2F 22-57 74-2F 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4901: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/754 48-byte object <BF-00 00-00 F3-02 00-00 50-2F 22-57 74-2F 22-57 74-2F 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4902: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/755 48-byte object <BF-00 00-00 F4-02 00-00 50-2F 22-57 74-2F 22-57 74-2F 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4903: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/756 48-byte object <BF-00 00-00 F5-02 00-00 50-2F 22-57 74-2F 22-57 74-2F 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4904: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/757 48-byte object <BF-00 00-00 F6-02 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4905: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/758 48-byte object <BF-00 00-00 F7-02 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4906: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/759 48-byte object <BF-00 00-00 F8-02 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4907: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/760 48-byte object <BF-00 00-00 F9-02 00-00 D0-64 22-57 F4-64 22-57 F4-64 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4908: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/761 48-byte object <BF-00 00-00 FA-02 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4909: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/762 48-byte object <BF-00 00-00 FB-02 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4910: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/763 48-byte object <BF-00 00-00 FC-02 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4911: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/764 48-byte object <BF-00 00-00 FD-02 00-00 F0-7B 22-57 13-7C 22-57 13-7C 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4912: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/765 48-byte object <BF-00 00-00 FE-02 00-00 F0-7B 22-57 13-7C 22-57 13-7C 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4913: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/766 48-byte object <BF-00 00-00 FF-02 00-00 F0-7B 22-57 14-7C 22-57 14-7C 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4914: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/767 48-byte object <BF-00 00-00 00-03 00-00 F0-7B 22-57 14-7C 22-57 14-7C 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4915: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/768 48-byte object <BF-00 00-00 01-03 00-00 F0-7B 22-57 14-7C 22-57 14-7C 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4916: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/769 48-byte object <BF-00 00-00 02-03 00-00 F0-7B 22-57 14-7C 22-57 14-7C 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4917: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/770 48-byte object <BF-00 00-00 03-03 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4918: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/771 48-byte object <BF-00 00-00 04-03 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4919: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/772 48-byte object <BF-00 00-00 05-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4920: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/773 48-byte object <BF-00 00-00 06-03 00-00 70-B1 22-57 94-B1 22-57 94-B1 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4921: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/774 48-byte object <BF-00 00-00 07-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4922: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/775 48-byte object <BF-00 00-00 08-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4923: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/776 48-byte object <BF-00 00-00 09-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4924: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/777 48-byte object <BF-00 00-00 0A-03 00-00 90-C8 22-57 B3-C8 22-57 B3-C8 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4925: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/778 48-byte object <BF-00 00-00 0B-03 00-00 90-C8 22-57 B3-C8 22-57 B3-C8 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4926: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/779 48-byte object <BF-00 00-00 0C-03 00-00 90-C8 22-57 B4-C8 22-57 B4-C8 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4927: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/780 48-byte object <BF-00 00-00 0D-03 00-00 90-C8 22-57 B4-C8 22-57 B4-C8 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4928: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/781 48-byte object <BF-00 00-00 0E-03 00-00 90-C8 22-57 B4-C8 22-57 B4-C8 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4929: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/782 48-byte object <BF-00 00-00 0F-03 00-00 90-C8 22-57 B4-C8 22-57 B4-C8 22-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4930: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/783 48-byte object <BF-00 00-00 10-03 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4931: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/784 48-byte object <BF-00 00-00 11-03 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4932: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/785 48-byte object <BF-00 00-00 12-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #4933: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/786 48-byte object <BF-00 00-00 13-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4934: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/787 48-byte object <BF-00 00-00 14-03 00-00 00-04 23-57 23-04 23-57 23-04 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4935: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/788 48-byte object <BF-00 00-00 15-03 00-00 00-04 23-57 23-04 23-57 23-04 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4936: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/789 48-byte object <BF-00 00-00 16-03 00-00 00-04 23-57 23-04 23-57 23-04 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4937: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/790 48-byte object <BF-00 00-00 17-03 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4938: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/791 48-byte object <BF-00 00-00 18-03 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4939: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/792 48-byte object <BF-00 00-00 19-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4940: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/793 48-byte object <BF-00 00-00 1A-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4941: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/794 48-byte object <BF-00 00-00 1B-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4942: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/795 48-byte object <BF-00 00-00 1C-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4943: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/796 48-byte object <BF-00 00-00 1D-03 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4944: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/797 48-byte object <BF-00 00-00 1E-03 00-00 60-40 23-57 85-40 23-57 85-40 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4945: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/798 48-byte object <BF-00 00-00 1F-03 00-00 60-40 23-57 83-40 23-57 83-40 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4946: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/799 48-byte object <BF-00 00-00 20-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4947: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/800 48-byte object <BF-00 00-00 21-03 00-00 80-4C 23-57 A3-4C 23-57 A3-4C 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4948: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/801 48-byte object <BF-00 00-00 22-03 00-00 80-4C 23-57 A3-4C 23-57 A3-4C 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4949: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/802 48-byte object <BF-00 00-00 23-03 00-00 80-4C 23-57 A3-4C 23-57 A3-4C 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4950: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/803 48-byte object <BF-00 00-00 24-03 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4951: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/804 48-byte object <BF-00 00-00 25-03 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4952: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/805 48-byte object <BF-00 00-00 26-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4953: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/806 48-byte object <BF-00 00-00 27-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4954: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/807 48-byte object <BF-00 00-00 28-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4955: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/808 48-byte object <BF-00 00-00 29-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4956: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/809 48-byte object <BF-00 00-00 2A-03 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4957: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/810 48-byte object <BF-00 00-00 2B-03 00-00 A0-8E 23-57 C5-8E 23-57 C5-8E 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4958: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/811 48-byte object <BF-00 00-00 2C-03 00-00 A0-8E 23-57 C3-8E 23-57 C3-8E 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4959: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/812 48-byte object <BF-00 00-00 2D-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4960: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/813 48-byte object <BF-00 00-00 2E-03 00-00 C0-9A 23-57 E4-9A 23-57 E4-9A 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4961: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/814 48-byte object <BF-00 00-00 2F-03 00-00 C0-9A 23-57 E4-9A 23-57 E4-9A 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4962: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/815 48-byte object <BF-00 00-00 30-03 00-00 C0-9A 23-57 E4-9A 23-57 E4-9A 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4963: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/816 48-byte object <BF-00 00-00 31-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4964: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/817 48-byte object <BF-00 00-00 32-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4965: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/818 48-byte object <BF-00 00-00 33-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4966: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/819 48-byte object <BF-00 00-00 34-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4967: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/820 48-byte object <BF-00 00-00 35-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4968: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/821 48-byte object <BF-00 00-00 36-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4969: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/822 48-byte object <BF-00 00-00 37-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4970: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/823 48-byte object <BF-00 00-00 38-03 00-00 E0-DC 23-57 06-DD 23-57 06-DD 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4971: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/824 48-byte object <BF-00 00-00 39-03 00-00 E0-DC 23-57 04-DD 23-57 04-DD 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4972: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/825 48-byte object <BF-00 00-00 3A-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4973: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/826 48-byte object <BF-00 00-00 3B-03 00-00 00-E9 23-57 24-E9 23-57 24-E9 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4974: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/827 48-byte object <BF-00 00-00 3C-03 00-00 00-E9 23-57 24-E9 23-57 24-E9 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4975: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/828 48-byte object <BF-00 00-00 3D-03 00-00 00-E9 23-57 24-E9 23-57 24-E9 23-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4976: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/829 48-byte object <BF-00 00-00 3E-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4977: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/830 48-byte object <BF-00 00-00 3F-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4978: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/831 48-byte object <BF-00 00-00 40-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4979: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/832 48-byte object <BF-00 00-00 41-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4980: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/833 48-byte object <BF-00 00-00 42-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4981: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/834 48-byte object <BF-00 00-00 43-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4982: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/835 48-byte object <BF-00 00-00 44-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4983: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/836 48-byte object <BF-00 00-00 45-03 00-00 20-2B 24-57 46-2B 24-57 46-2B 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4984: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/837 48-byte object <BF-00 00-00 46-03 00-00 20-2B 24-57 44-2B 24-57 44-2B 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4985: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/838 48-byte object <BF-00 00-00 47-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4986: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/839 48-byte object <BF-00 00-00 48-03 00-00 40-37 24-57 64-37 24-57 64-37 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4987: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/840 48-byte object <BF-00 00-00 49-03 00-00 40-37 24-57 64-37 24-57 64-37 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4988: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/841 48-byte object <BF-00 00-00 4A-03 00-00 40-37 24-57 64-37 24-57 64-37 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4989: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/842 48-byte object <BF-00 00-00 4B-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4990: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/843 48-byte object <BF-00 00-00 4C-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4991: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/844 48-byte object <BF-00 00-00 4D-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4992: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/845 48-byte object <BF-00 00-00 4E-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4993: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/846 48-byte object <BF-00 00-00 4F-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4994: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/847 48-byte object <BF-00 00-00 50-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4995: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/848 48-byte object <BF-00 00-00 51-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4996: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/849 48-byte object <BF-00 00-00 52-03 00-00 60-79 24-57 86-79 24-57 86-79 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4997: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/850 48-byte object <BF-00 00-00 53-03 00-00 60-79 24-57 84-79 24-57 84-79 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4998: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/851 48-byte object <BF-00 00-00 54-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #4999: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/852 48-byte object <BF-00 00-00 55-03 00-00 80-85 24-57 A4-85 24-57 A4-85 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5000: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/853 48-byte object <BF-00 00-00 56-03 00-00 80-85 24-57 A4-85 24-57 A4-85 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5001: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/854 48-byte object <BF-00 00-00 57-03 00-00 80-85 24-57 A4-85 24-57 A4-85 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5002: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/855 48-byte object <BF-00 00-00 58-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5003: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/856 48-byte object <BF-00 00-00 59-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5004: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/857 48-byte object <BF-00 00-00 5A-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5005: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/858 48-byte object <BF-00 00-00 5B-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5006: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/859 48-byte object <BF-00 00-00 5C-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5007: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/860 48-byte object <BF-00 00-00 5D-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5008: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/861 48-byte object <BF-00 00-00 5E-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5009: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/862 48-byte object <BF-00 00-00 5F-03 00-00 A0-C7 24-57 C6-C7 24-57 C6-C7 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5010: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/863 48-byte object <BF-00 00-00 60-03 00-00 A0-C7 24-57 C4-C7 24-57 C4-C7 24-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5011: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/864 48-byte object <BF-00 00-00 61-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5012: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/865 48-byte object <BF-00 00-00 62-03 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5013: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/866 48-byte object <BF-00 00-00 63-03 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5014: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/867 48-byte object <BF-00 00-00 64-03 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5015: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/868 48-byte object <BF-00 00-00 65-03 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5016: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/869 48-byte object <BF-00 00-00 66-03 00-00 70-11 1C-57 97-12 1C-57 97-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5017: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/870 48-byte object <BF-00 00-00 67-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5018: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/871 48-byte object <BF-00 00-00 68-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5019: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/872 48-byte object <BF-00 00-00 69-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5020: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/873 48-byte object <BF-00 00-00 6A-03 00-00 70-11 1C-57 98-12 1C-57 98-12 1C-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5021: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/874 48-byte object <BF-00 00-00 6B-03 00-00 60-FE 1D-57 6E-00 1E-57 6E-00 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5022: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/875 48-byte object <BF-00 00-00 6C-03 00-00 80-0C 1E-57 8E-0D 1E-57 8E-0D 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5023: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/876 48-byte object <BF-00 00-00 6D-03 00-00 C0-FA AC-56 CC-FB AC-56 CC-FB AC-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5024: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/877 48-byte object <BF-00 00-00 6E-03 00-00 20-2D 25-57 46-2D 25-57 46-2D 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5025: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/878 48-byte object <BF-00 00-00 6F-03 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5026: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/879 48-byte object <BF-00 00-00 70-03 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5027: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/880 48-byte object <BF-00 00-00 71-03 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5028: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/881 48-byte object <BF-00 00-00 72-03 00-00 70-44 25-57 95-44 25-57 95-44 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5029: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/882 48-byte object <BF-00 00-00 73-03 00-00 70-44 25-57 95-44 25-57 95-44 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5030: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/883 48-byte object <BF-00 00-00 74-03 00-00 70-44 25-57 96-44 25-57 96-44 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5031: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/884 48-byte object <BF-00 00-00 75-03 00-00 70-44 25-57 96-44 25-57 96-44 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5032: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/885 48-byte object <BF-00 00-00 76-03 00-00 70-44 25-57 96-44 25-57 96-44 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5033: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/886 48-byte object <BF-00 00-00 77-03 00-00 70-44 25-57 96-44 25-57 96-44 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5034: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/887 48-byte object <BF-00 00-00 78-03 00-00 80-0C 1E-57 8E-0D 1E-57 8E-0D 1E-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 00-00 00-00>' - PASSED gtests.sh: #5035: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/888 48-byte object <BF-00 00-00 79-03 00-00 50-36 F3-56 5C-36 F3-56 5C-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5036: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/889 48-byte object <BF-00 00-00 7A-03 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5037: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/890 48-byte object <BF-00 00-00 7B-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5038: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/891 48-byte object <BF-00 00-00 7C-03 00-00 50-36 F3-56 57-36 F3-56 57-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5039: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/892 48-byte object <BF-00 00-00 7D-03 00-00 50-36 F3-56 5B-36 F3-56 5B-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5040: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/893 48-byte object <BF-00 00-00 7E-03 00-00 50-36 F3-56 5A-36 F3-56 5A-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5041: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/894 48-byte object <BF-00 00-00 7F-03 00-00 50-36 F3-56 55-36 F3-56 55-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5042: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/895 48-byte object <BF-00 00-00 80-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 00-00 00-00>' - PASSED gtests.sh: #5043: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/896 48-byte object <BF-00 00-00 81-03 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5044: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/897 48-byte object <BF-00 00-00 82-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5045: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/898 48-byte object <BF-00 00-00 83-03 00-00 20-CC 12-57 5E-CC 12-57 5E-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5046: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/899 48-byte object <BF-00 00-00 84-03 00-00 20-CC 12-57 60-CC 12-57 60-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5047: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/900 48-byte object <BF-00 00-00 85-03 00-00 20-CC 12-57 5F-CC 12-57 5F-CC 12-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5048: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/901 48-byte object <BF-00 00-00 86-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A7-9F 17-57 A7-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 01-00 00-00>' - PASSED gtests.sh: #5049: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/902 48-byte object <BF-00 00-00 87-03 00-00 50-36 F3-56 58-36 F3-56 58-36 F3-56 60-9C 17-57 A7-9F 17-57 A7-9F 17-57 50-D3 FE-56 54-D3 FE-56 54-D3 FE-56 01-00 00-00>' - PASSED gtests.sh: #5050: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/903 48-byte object <BF-00 00-00 88-03 00-00 00-C6 25-57 24-C6 25-57 24-C6 25-57 60-9C 17-57 A7-9F 17-57 A7-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5051: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/904 48-byte object <BF-00 00-00 89-03 00-00 00-C6 25-57 24-C6 25-57 24-C6 25-57 60-9C 17-57 A7-9F 17-57 A7-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5052: 'DsaTest/Pkcs11DsaTest: WycheproofVectors/905 48-byte object <BF-00 00-00 8A-03 00-00 00-C6 25-57 23-C6 25-57 23-C6 25-57 60-9C 17-57 A6-9F 17-57 A6-9F 17-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 01-00 00-00>' - PASSED gtests.sh: #5053: 'NSSTestVector/Pkcs11Curve25519ParamTest: TestVectors/0 48-byte object <00-00 00-00 00-00 00-00 B0-F4 F6-56 19-F5 F6-56 19-F5 F6-56 D0-69 BE-56 0B-6A BE-56 0B-6A BE-56 D0-22 14-57 F0-22 14-57 F0-22 14-57 00-01 4C-3B>' - PASSED gtests.sh: #5054: 'NSSTestVector/Pkcs11Curve25519ParamTest: TestVectors/1 48-byte object <01-00 00-00 00-00 00-00 B0-F4 F6-56 19-F5 F6-56 19-F5 F6-56 10-3E FD-56 4A-3E FD-56 4A-3E FD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C8-5B>' - PASSED gtests.sh: #5055: 'NSSTestVector/Pkcs11Curve25519ParamTest: TestVectors/2 48-byte object <02-00 00-00 00-00 00-00 B0-F4 F6-56 19-F5 F6-56 19-F5 F6-56 10-3E FD-56 4C-3E FD-56 4C-3E FD-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C8-5B>' - PASSED gtests.sh: #5056: 'NSSTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/0 68-byte object <00-00 00-00 30-EE BB-56 A2-EE BB-56 A2-EE BB-56 50-36 F3-56 5C-36 F3-56 5C-36 F3-56 D0-22 14-57 F0-22 14-57 F0-22 14-57 50-D3 FE-56 5C-D3 FE-56 5C-D3 FE-56 E0-2C 04-57 62-2D 04-57 62-2D 04-57 00-00 CC-56>' - PASSED gtests.sh: #5057: 'NSSTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/1 68-byte object <01-00 00-00 90-90 AF-56 99-91 AF-56 99-91 AF-56 50-36 F3-56 5C-36 F3-56 5C-36 F3-56 F0-3F FF-56 10-40 FF-56 10-40 FF-56 50-D3 FE-56 5C-D3 FE-56 5C-D3 FE-56 00-38 12-57 19-39 12-57 19-39 12-57 00-00 CC-56>' - PASSED gtests.sh: #5058: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/0 68-byte object <00-00 00-00 F0-1D 0E-57 62-1E 0E-57 62-1E 0E-57 10-AA C5-56 1C-AA C5-56 1C-AA C5-56 10-72 1E-57 30-72 1E-57 30-72 1E-57 90-B2 C5-56 9C-B2 C5-56 9C-B2 C5-56 70-1E 0E-57 F2-1E 0E-57 F2-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5059: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/1 68-byte object <01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-72 1E-57 30-72 1E-57 30-72 1E-57 80-6F C5-56 8C-6F C5-56 8C-6F C5-56 20-25 0E-57 30-25 0E-57 30-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5060: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/2 68-byte object <02-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 80-6F C5-56 88-6F C5-56 88-6F C5-56 80-B1 1E-57 A0-B1 1E-57 A0-B1 1E-57 50-66 C5-56 5C-66 C5-56 5C-66 C5-56 20-25 0E-57 30-25 0E-57 30-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5061: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/3 68-byte object <03-00 00-00 30-BD B0-56 31-BD B0-56 31-BD B0-56 00-00 00-00 00-00 00-00 00-00 00-00 60-06 F3-56 80-06 F3-56 80-06 F3-56 A0-C4 B0-56 AC-C4 B0-56 AC-C4 B0-56 20-25 0E-57 31-25 0E-57 31-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5062: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/4 68-byte object <04-00 00-00 30-BD B0-56 31-BD B0-56 31-BD B0-56 A0-C4 B0-56 A8-C4 B0-56 A8-C4 B0-56 60-06 F3-56 80-06 F3-56 80-06 F3-56 00-54 C5-56 0C-54 C5-56 0C-54 C5-56 20-25 0E-57 31-25 0E-57 31-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5063: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/5 68-byte object <05-00 00-00 50-AE C5-56 52-AE C5-56 52-AE C5-56 00-00 00-00 00-00 00-00 00-00 00-00 50-C3 1E-57 70-C3 1E-57 70-C3 1E-57 50-66 C5-56 5C-66 C5-56 5C-66 C5-56 20-25 0E-57 32-25 0E-57 32-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5064: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/6 68-byte object <06-00 00-00 E0-88 C8-56 E2-88 C8-56 E2-88 C8-56 F0-85 BE-56 F8-85 BE-56 F8-85 BE-56 50-C3 1E-57 70-C3 1E-57 70-C3 1E-57 D0-54 B6-56 DC-54 B6-56 DC-54 B6-56 20-25 0E-57 32-25 0E-57 32-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5065: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/7 68-byte object <07-00 00-00 20-EC BF-56 23-EC BF-56 23-EC BF-56 00-00 00-00 00-00 00-00 00-00 00-00 F0-21 1F-57 10-22 1F-57 10-22 1F-57 20-44 C8-56 2C-44 C8-56 2C-44 C8-56 20-25 0E-57 33-25 0E-57 33-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5066: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/8 68-byte object <08-00 00-00 50-AE C5-56 53-AE C5-56 53-AE C5-56 A0-C4 B0-56 A8-C4 B0-56 A8-C4 B0-56 F0-21 1F-57 10-22 1F-57 10-22 1F-57 00-54 C5-56 0C-54 C5-56 0C-54 C5-56 20-25 0E-57 33-25 0E-57 33-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5067: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/9 68-byte object <09-00 00-00 F0-D1 B5-56 F4-D1 B5-56 F4-D1 B5-56 00-00 00-00 00-00 00-00 00-00 00-00 70-74 1F-57 90-74 1F-57 90-74 1F-57 C0-78 C1-56 CC-78 C1-56 CC-78 C1-56 20-25 0E-57 34-25 0E-57 34-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5068: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/10 68-byte object <0A-00 00-00 C0-78 C1-56 C4-78 C1-56 C4-78 C1-56 D0-54 B6-56 D8-54 B6-56 D8-54 B6-56 C0-56 1F-57 E0-56 1F-57 E0-56 1F-57 F0-85 BE-56 FC-85 BE-56 FC-85 BE-56 20-25 0E-57 34-25 0E-57 34-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5069: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/11 68-byte object <0B-00 00-00 A0-C4 B0-56 A5-C4 B0-56 A5-C4 B0-56 00-00 00-00 00-00 00-00 00-00 00-00 70-41 F2-56 90-41 F2-56 90-41 F2-56 F0-D1 B5-56 FC-D1 B5-56 FC-D1 B5-56 20-25 0E-57 35-25 0E-57 35-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5070: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/12 68-byte object <0C-00 00-00 F0-9C C8-56 F5-9C C8-56 F5-9C C8-56 A0-CB BA-56 A8-CB BA-56 A8-CB BA-56 70-41 F2-56 90-41 F2-56 90-41 F2-56 00-54 C5-56 0C-54 C5-56 0C-54 C5-56 20-25 0E-57 35-25 0E-57 35-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5071: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/13 68-byte object <0D-00 00-00 00-2D C1-56 06-2D C1-56 06-2D C1-56 00-00 00-00 00-00 00-00 00-00 00-00 60-7A 1F-57 80-7A 1F-57 80-7A 1F-57 90-EC B7-56 9C-EC B7-56 9C-EC B7-56 20-25 0E-57 36-25 0E-57 36-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5072: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/14 68-byte object <0E-00 00-00 A0-C4 B0-56 A6-C4 B0-56 A6-C4 B0-56 D0-54 B6-56 D8-54 B6-56 D8-54 B6-56 60-7A 1F-57 80-7A 1F-57 80-7A 1F-57 F0-85 BE-56 FC-85 BE-56 FC-85 BE-56 20-25 0E-57 36-25 0E-57 36-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5073: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/15 68-byte object <0F-00 00-00 80-C8 C2-56 87-C8 C2-56 87-C8 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 10-CE 1F-57 30-CE 1F-57 30-CE 1F-57 00-54 C5-56 0C-54 C5-56 0C-54 C5-56 20-25 0E-57 37-25 0E-57 37-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5074: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/16 68-byte object <10-00 00-00 A0-CB BA-56 A7-CB BA-56 A7-CB BA-56 00-2D C1-56 08-2D C1-56 08-2D C1-56 20-BC 1F-57 40-BC 1F-57 40-BC 1F-57 80-BB C8-56 8C-BB C8-56 8C-BB C8-56 20-25 0E-57 37-25 0E-57 37-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5075: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/17 68-byte object <11-00 00-00 80-C8 C2-56 88-C8 C2-56 88-C8 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 20-BC 1F-57 40-BC 1F-57 40-BC 1F-57 00-54 C5-56 0C-54 C5-56 0C-54 C5-56 20-25 0E-57 38-25 0E-57 38-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5076: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/18 68-byte object <12-00 00-00 60-C4 C8-56 68-C4 C8-56 68-C4 C8-56 D0-54 B6-56 D8-54 B6-56 D8-54 B6-56 F0-6E 04-57 10-6F 04-57 10-6F 04-57 F0-85 BE-56 FC-85 BE-56 FC-85 BE-56 20-25 0E-57 38-25 0E-57 38-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5077: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/19 68-byte object <13-00 00-00 F0-85 BE-56 F9-85 BE-56 F9-85 BE-56 00-00 00-00 00-00 00-00 00-00 00-00 E0-EB 1F-57 00-EC 1F-57 00-EC 1F-57 20-EC BF-56 2C-EC BF-56 2C-EC BF-56 20-25 0E-57 39-25 0E-57 39-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5078: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/20 68-byte object <14-00 00-00 F0-85 BE-56 F9-85 BE-56 F9-85 BE-56 20-EC BF-56 28-EC BF-56 28-EC BF-56 E0-EB 1F-57 00-EC 1F-57 00-EC 1F-57 20-DA C8-56 2C-DA C8-56 2C-DA C8-56 20-25 0E-57 39-25 0E-57 39-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5079: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/21 68-byte object <15-00 00-00 80-C8 C2-56 8A-C8 C2-56 8A-C8 C2-56 00-00 00-00 00-00 00-00 00-00 00-00 B0-FD 1F-57 D0-FD 1F-57 D0-FD 1F-57 D0-54 B6-56 DC-54 B6-56 DC-54 B6-56 20-25 0E-57 3A-25 0E-57 3A-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5080: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/22 68-byte object <16-00 00-00 20-CE C9-56 2A-CE C9-56 2A-CE C9-56 B0-EE C9-56 B8-EE C9-56 B8-EE C9-56 B0-FD 1F-57 D0-FD 1F-57 D0-FD 1F-57 40-CD C8-56 4C-CD C8-56 4C-CD C8-56 20-25 0E-57 3A-25 0E-57 3A-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5081: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/23 68-byte object <17-00 00-00 F0-FB C8-56 FB-FB C8-56 FB-FB C8-56 00-00 00-00 00-00 00-00 00-00 00-00 E0-45 20-57 00-46 20-57 00-46 20-57 70-53 CA-56 7C-53 CA-56 7C-53 CA-56 20-25 0E-57 3B-25 0E-57 3B-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5082: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/24 68-byte object <18-00 00-00 80-C8 C2-56 8B-C8 C2-56 8B-C8 C2-56 20-EC BF-56 28-EC BF-56 28-EC BF-56 80-BD 1E-57 A0-BD 1E-57 A0-BD 1E-57 20-DA C8-56 2C-DA C8-56 2C-DA C8-56 20-25 0E-57 3B-25 0E-57 3B-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5083: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/25 68-byte object <19-00 00-00 80-BB C8-56 8C-BB C8-56 8C-BB C8-56 00-00 00-00 00-00 00-00 00-00 00-00 80-BD 1E-57 A0-BD 1E-57 A0-BD 1E-57 00-2D C1-56 0C-2D C1-56 0C-2D C1-56 20-25 0E-57 3C-25 0E-57 3C-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5084: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/26 68-byte object <1A-00 00-00 00-2D C1-56 0C-2D C1-56 0C-2D C1-56 40-CD C8-56 48-CD C8-56 48-CD C8-56 A0-5D 20-57 C0-5D 20-57 C0-5D 20-57 B0-EE C9-56 BC-EE C9-56 BC-EE C9-56 20-25 0E-57 3C-25 0E-57 3C-25 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5085: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/27 68-byte object <1B-00 00-00 20-25 0E-57 2D-25 0E-57 2D-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 A0-7B 20-57 C0-7B 20-57 C0-7B 20-57 20-EC BF-56 2C-EC BF-56 2C-EC BF-56 A0-75 20-57 BD-75 20-57 BD-75 20-57 00-00 F2-24>' - PASSED gtests.sh: #5086: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/28 68-byte object <1C-00 00-00 20-25 0E-57 2D-25 0E-57 2D-25 0E-57 20-EC BF-56 28-EC BF-56 28-EC BF-56 A0-3F 20-57 C0-3F 20-57 C0-3F 20-57 80-BB C8-56 8C-BB C8-56 8C-BB C8-56 A0-B1 20-57 BD-B1 20-57 BD-B1 20-57 00-00 F2-24>' - PASSED gtests.sh: #5087: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/29 68-byte object <1D-00 00-00 20-25 0E-57 2E-25 0E-57 2E-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 A0-B1 20-57 C0-B1 20-57 C0-B1 20-57 30-6C C9-56 3C-6C C9-56 3C-6C C9-56 A0-A5 20-57 BE-A5 20-57 BE-A5 20-57 00-00 F2-24>' - PASSED gtests.sh: #5088: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/30 68-byte object <1E-00 00-00 20-25 0E-57 2E-25 0E-57 2E-25 0E-57 30-6C C9-56 38-6C C9-56 38-6C C9-56 A0-8D 20-57 C0-8D 20-57 C0-8D 20-57 30-40 C9-56 3C-40 C9-56 3C-40 C9-56 A0-E1 20-57 BE-E1 20-57 BE-E1 20-57 00-00 F2-24>' - PASSED gtests.sh: #5089: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/31 68-byte object <1F-00 00-00 20-25 0E-57 2F-25 0E-57 2F-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 A0-E1 20-57 C0-E1 20-57 C0-E1 20-57 30-6C C9-56 3C-6C C9-56 3C-6C C9-56 E0-D5 20-57 FF-D5 20-57 FF-D5 20-57 00-00 F2-24>' - PASSED gtests.sh: #5090: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/32 68-byte object <20-00 00-00 20-25 0E-57 2F-25 0E-57 2F-25 0E-57 30-6C C9-56 38-6C C9-56 38-6C C9-56 A0-BD 20-57 C0-BD 20-57 C0-BD 20-57 30-40 C9-56 3C-40 C9-56 3C-40 C9-56 80-11 21-57 9F-11 21-57 9F-11 21-57 00-00 F2-24>' - PASSED gtests.sh: #5091: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/33 68-byte object <21-00 00-00 20-25 0E-57 30-25 0E-57 30-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 80-11 21-57 A0-11 21-57 A0-11 21-57 80-BB C8-56 8C-BB C8-56 8C-BB C8-56 40-05 21-57 60-05 21-57 60-05 21-57 00-00 F2-24>' - PASSED gtests.sh: #5092: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/34 68-byte object <22-00 00-00 20-25 0E-57 30-25 0E-57 30-25 0E-57 80-BB C8-56 88-BB C8-56 88-BB C8-56 40-F9 20-57 60-F9 20-57 60-F9 20-57 60-3B CB-56 6C-3B CB-56 6C-3B CB-56 C0-46 21-57 E0-46 21-57 E0-46 21-57 00-00 F2-24>' - PASSED gtests.sh: #5093: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/35 68-byte object <23-00 00-00 20-25 0E-57 31-25 0E-57 31-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 C0-46 21-57 E0-46 21-57 E0-46 21-57 C0-3F CB-56 CC-3F CB-56 CC-3F CB-56 C0-3A 21-57 E1-3A 21-57 E1-3A 21-57 00-00 F2-24>' - PASSED gtests.sh: #5094: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/36 68-byte object <24-00 00-00 20-25 0E-57 31-25 0E-57 31-25 0E-57 C0-3F CB-56 C8-3F CB-56 C8-3F CB-56 40-0B 21-57 60-0B 21-57 60-0B 21-57 D0-28 CB-56 DC-28 CB-56 DC-28 CB-56 80-7C 21-57 A1-7C 21-57 A1-7C 21-57 00-00 F2-24>' - PASSED gtests.sh: #5095: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/37 68-byte object <25-00 00-00 20-25 0E-57 32-25 0E-57 32-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 80-7C 21-57 A0-7C 21-57 A0-7C 21-57 C0-3F CB-56 CC-3F CB-56 CC-3F CB-56 E0-6A 21-57 02-6B 21-57 02-6B 21-57 00-00 F2-24>' - PASSED gtests.sh: #5096: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/38 68-byte object <26-00 00-00 20-25 0E-57 32-25 0E-57 32-25 0E-57 C0-3F CB-56 C8-3F CB-56 C8-3F CB-56 C0-52 21-57 E0-52 21-57 E0-52 21-57 D0-28 CB-56 DC-28 CB-56 DC-28 CB-56 00-65 21-57 22-65 21-57 22-65 21-57 00-00 F2-24>' - PASSED gtests.sh: #5097: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/39 68-byte object <27-00 00-00 20-25 0E-57 33-25 0E-57 33-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 00-65 21-57 20-65 21-57 20-65 21-57 30-40 C9-56 3C-40 C9-56 3C-40 C9-56 80-A0 21-57 A3-A0 21-57 A3-A0 21-57 00-00 F2-24>' - PASSED gtests.sh: #5098: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/40 68-byte object <28-00 00-00 20-25 0E-57 33-25 0E-57 33-25 0E-57 30-40 C9-56 38-40 C9-56 38-40 C9-56 80-88 21-57 A0-88 21-57 A0-88 21-57 E0-D5 C8-56 EC-D5 C8-56 EC-D5 C8-56 00-E2 21-57 23-E2 21-57 23-E2 21-57 00-00 F2-24>' - PASSED gtests.sh: #5099: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/41 68-byte object <29-00 00-00 20-25 0E-57 34-25 0E-57 34-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 00-E2 21-57 20-E2 21-57 20-E2 21-57 E0-D5 C8-56 EC-D5 C8-56 EC-D5 C8-56 00-D6 21-57 24-D6 21-57 24-D6 21-57 00-00 F2-24>' - PASSED gtests.sh: #5100: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/42 68-byte object <2A-00 00-00 20-25 0E-57 34-25 0E-57 34-25 0E-57 E0-D5 C8-56 E8-D5 C8-56 E8-D5 C8-56 C0-B2 21-57 E0-B2 21-57 E0-B2 21-57 60-55 CB-56 6C-55 CB-56 6C-55 CB-56 00-0C 22-57 24-0C 22-57 24-0C 22-57 00-00 F2-24>' - PASSED gtests.sh: #5101: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/43 68-byte object <2B-00 00-00 20-25 0E-57 35-25 0E-57 35-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 00-0C 22-57 20-0C 22-57 20-0C 22-57 30-91 CB-56 3C-91 CB-56 3C-91 CB-56 00-00 22-57 25-00 22-57 25-00 22-57 00-00 F2-24>' - PASSED gtests.sh: #5102: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/44 68-byte object <2C-00 00-00 20-25 0E-57 35-25 0E-57 35-25 0E-57 30-91 CB-56 38-91 CB-56 38-91 CB-56 E0-B7 13-57 00-B8 13-57 00-B8 13-57 C0-95 CB-56 CC-95 CB-56 CC-95 CB-56 20-41 22-57 45-41 22-57 45-41 22-57 00-00 F2-24>' - PASSED gtests.sh: #5103: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/45 68-byte object <2D-00 00-00 20-25 0E-57 36-25 0E-57 36-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 20-41 22-57 40-41 22-57 40-41 22-57 A0-5D CB-56 AC-5D CB-56 AC-5D CB-56 80-35 22-57 A6-35 22-57 A6-35 22-57 00-00 F2-24>' - PASSED gtests.sh: #5104: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/46 68-byte object <2E-00 00-00 20-25 0E-57 36-25 0E-57 36-25 0E-57 A0-5D CB-56 A8-5D CB-56 A8-5D CB-56 80-BE 21-57 A0-BE 21-57 A0-BE 21-57 80-48 CB-56 8C-48 CB-56 8C-48 CB-56 20-82 22-57 46-82 22-57 46-82 22-57 00-00 F2-24>' - PASSED gtests.sh: #5105: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/47 68-byte object <2F-00 00-00 20-25 0E-57 37-25 0E-57 37-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 20-82 22-57 40-82 22-57 40-82 22-57 A0-5D CB-56 AC-5D CB-56 AC-5D CB-56 D0-64 22-57 F7-64 22-57 F7-64 22-57 00-00 F2-24>' - PASSED gtests.sh: #5106: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/48 68-byte object <30-00 00-00 20-25 0E-57 37-25 0E-57 37-25 0E-57 A0-5D CB-56 A8-5D CB-56 A8-5D CB-56 50-2F 22-57 70-2F 22-57 70-2F 22-57 80-48 CB-56 8C-48 CB-56 8C-48 CB-56 70-B1 22-57 97-B1 22-57 97-B1 22-57 00-00 F2-24>' - PASSED gtests.sh: #5107: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/49 68-byte object <31-00 00-00 20-25 0E-57 38-25 0E-57 38-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 70-B1 22-57 90-B1 22-57 90-B1 22-57 C0-95 CB-56 CC-95 CB-56 CC-95 CB-56 60-9F 22-57 88-9F 22-57 88-9F 22-57 00-00 F2-24>' - PASSED gtests.sh: #5108: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/50 68-byte object <32-00 00-00 20-25 0E-57 38-25 0E-57 38-25 0E-57 C0-95 CB-56 C8-95 CB-56 C8-95 CB-56 C0-8D 22-57 E0-8D 22-57 E0-8D 22-57 60-BC CB-56 6C-BC CB-56 6C-BC CB-56 00-EC 22-57 28-EC 22-57 28-EC 22-57 00-00 F2-24>' - PASSED gtests.sh: #5109: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/51 68-byte object <33-00 00-00 20-25 0E-57 39-25 0E-57 39-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 00-EC 22-57 20-EC 22-57 20-EC 22-57 50-C0 CB-56 5C-C0 CB-56 5C-C0 CB-56 40-E0 22-57 69-E0 22-57 69-E0 22-57 00-00 F2-24>' - PASSED gtests.sh: #5110: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/52 68-byte object <34-00 00-00 20-25 0E-57 39-25 0E-57 39-25 0E-57 50-C0 CB-56 58-C0 CB-56 58-C0 CB-56 C0-CE 22-57 E0-CE 22-57 E0-CE 22-57 70-A3 CB-56 7C-A3 CB-56 7C-A3 CB-56 80-2D 23-57 A9-2D 23-57 A9-2D 23-57 00-00 F2-24>' - PASSED gtests.sh: #5111: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/53 68-byte object <35-00 00-00 20-25 0E-57 3A-25 0E-57 3A-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 80-2D 23-57 A0-2D 23-57 A0-2D 23-57 50-C0 CB-56 5C-C0 CB-56 5C-C0 CB-56 E0-15 23-57 0A-16 23-57 0A-16 23-57 00-00 F2-24>' - PASSED gtests.sh: #5112: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/54 68-byte object <36-00 00-00 20-25 0E-57 3A-25 0E-57 3A-25 0E-57 50-C0 CB-56 58-C0 CB-56 58-C0 CB-56 20-E6 22-57 40-E6 22-57 40-E6 22-57 70-A3 CB-56 7C-A3 CB-56 7C-A3 CB-56 60-58 23-57 8A-58 23-57 8A-58 23-57 00-00 F2-24>' - PASSED gtests.sh: #5113: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/55 68-byte object <37-00 00-00 20-25 0E-57 3B-25 0E-57 3B-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 60-58 23-57 80-58 23-57 80-58 23-57 80-48 CB-56 8C-48 CB-56 8C-48 CB-56 C0-D1 13-57 EB-D1 13-57 EB-D1 13-57 00-00 F2-24>' - PASSED gtests.sh: #5114: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/56 68-byte object <38-00 00-00 20-25 0E-57 3B-25 0E-57 3B-25 0E-57 80-48 CB-56 88-48 CB-56 88-48 CB-56 80-39 23-57 A0-39 23-57 A0-39 23-57 30-AD CB-56 3C-AD CB-56 3C-AD CB-56 10-D6 13-57 3B-D6 13-57 3B-D6 13-57 00-00 F2-24>' - PASSED gtests.sh: #5115: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/57 68-byte object <39-00 00-00 20-25 0E-57 3C-25 0E-57 3C-25 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 10-D6 13-57 30-D6 13-57 30-D6 13-57 30-AD CB-56 3C-AD CB-56 3C-AD CB-56 C0-81 23-57 EC-81 23-57 EC-81 23-57 00-00 F2-24>' - PASSED gtests.sh: #5116: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/58 68-byte object <3A-00 00-00 20-25 0E-57 3C-25 0E-57 3C-25 0E-57 30-AD CB-56 38-AD CB-56 38-AD CB-56 20-64 23-57 40-64 23-57 40-64 23-57 C0-18 CE-56 CC-18 CE-56 CC-18 CE-56 00-C4 23-57 2C-C4 23-57 2C-C4 23-57 00-00 F2-24>' - PASSED gtests.sh: #5117: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/59 68-byte object <3B-00 00-00 00-C4 23-57 1D-C4 23-57 1D-C4 23-57 00-00 00-00 00-00 00-00 00-00 00-00 60-B2 23-57 80-B2 23-57 80-B2 23-57 80-3B D0-56 8C-3B D0-56 8C-3B D0-56 B0-23 0E-57 DD-23 0E-57 DD-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5118: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/60 68-byte object <3C-00 00-00 A0-8E 23-57 BD-8E 23-57 BD-8E 23-57 80-3B D0-56 88-3B D0-56 88-3B D0-56 E0-F4 23-57 00-F5 23-57 00-F5 23-57 C0-34 D0-56 CC-34 D0-56 CC-34 D0-56 B0-23 0E-57 DD-23 0E-57 DD-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5119: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/61 68-byte object <3D-00 00-00 E0-F4 23-57 FE-F4 23-57 FE-F4 23-57 00-00 00-00 00-00 00-00 00-00 00-00 E0-DC 23-57 00-DD 23-57 00-DD 23-57 10-F9 CF-56 1C-F9 CF-56 1C-F9 CF-56 B0-23 0E-57 DE-23 0E-57 DE-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5120: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/62 68-byte object <3E-00 00-00 00-CA 23-57 1E-CA 23-57 1E-CA 23-57 10-F9 CF-56 18-F9 CF-56 18-F9 CF-56 40-24 24-57 60-24 24-57 60-24 24-57 A0-F4 CF-56 AC-F4 CF-56 AC-F4 CF-56 B0-23 0E-57 DE-23 0E-57 DE-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5121: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/63 68-byte object <3F-00 00-00 40-24 24-57 5F-24 24-57 5F-24 24-57 00-00 00-00 00-00 00-00 00-00 00-00 40-18 24-57 60-18 24-57 60-18 24-57 10-F9 CF-56 1C-F9 CF-56 1C-F9 CF-56 B0-23 0E-57 DF-23 0E-57 DF-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5122: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/64 68-byte object <40-00 00-00 B0-DE 13-57 CF-DE 13-57 CF-DE 13-57 10-F9 CF-56 18-F9 CF-56 18-F9 CF-56 20-3F 24-57 40-3F 24-57 40-3F 24-57 A0-F4 CF-56 AC-F4 CF-56 AC-F4 CF-56 B0-23 0E-57 DF-23 0E-57 DF-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5123: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/65 68-byte object <41-00 00-00 20-3F 24-57 40-3F 24-57 40-3F 24-57 00-00 00-00 00-00 00-00 00-00 00-00 40-37 24-57 60-37 24-57 60-37 24-57 C0-34 D0-56 CC-34 D0-56 CC-34 D0-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5124: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/66 68-byte object <42-00 00-00 20-2B 24-57 40-2B 24-57 40-2B 24-57 C0-34 D0-56 C8-34 D0-56 C8-34 D0-56 A0-7F 24-57 C0-7F 24-57 C0-7F 24-57 D0-E3 CF-56 DC-E3 CF-56 DC-E3 CF-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5125: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/67 68-byte object <43-00 00-00 A0-7F 24-57 C1-7F 24-57 C1-7F 24-57 00-00 00-00 00-00 00-00 00-00 00-00 50-E7 13-57 70-E7 13-57 70-E7 13-57 F0-E7 CF-56 FC-E7 CF-56 FC-E7 CF-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5126: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/68 68-byte object <44-00 00-00 80-66 24-57 A1-66 24-57 A1-66 24-57 F0-E7 CF-56 F8-E7 CF-56 F8-E7 CF-56 C0-BA 24-57 E0-BA 24-57 E0-BA 24-57 90-BB CF-56 9C-BB CF-56 9C-BB CF-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5127: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/69 68-byte object <45-00 00-00 B0-23 0E-57 DF-23 0E-57 DF-23 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 C0-BA 24-57 E0-BA 24-57 E0-BA 24-57 F0-E7 CF-56 FC-E7 CF-56 FC-E7 CF-56 C0-72 09-57 FF-72 09-57 FF-72 09-57 00-00 F2-24>' - PASSED gtests.sh: #5128: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/70 68-byte object <46-00 00-00 B0-23 0E-57 DF-23 0E-57 DF-23 0E-57 F0-E7 CF-56 F8-E7 CF-56 F8-E7 CF-56 C0-BA 24-57 E0-BA 24-57 E0-BA 24-57 90-BB CF-56 9C-BB CF-56 9C-BB CF-56 C0-72 09-57 FF-72 09-57 FF-72 09-57 00-00 F2-24>' - PASSED gtests.sh: #5129: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/71 68-byte object <47-00 00-00 C0-72 09-57 00-73 09-57 00-73 09-57 00-00 00-00 00-00 00-00 00-00 00-00 C0-C0 24-57 E0-C0 24-57 E0-C0 24-57 A0-F4 CF-56 AC-F4 CF-56 AC-F4 CF-56 E0-66 22-57 30-67 22-57 30-67 22-57 00-00 F2-24>' - PASSED gtests.sh: #5130: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/72 68-byte object <48-00 00-00 C0-72 09-57 00-73 09-57 00-73 09-57 A0-F4 CF-56 A8-F4 CF-56 A8-F4 CF-56 C0-C0 24-57 E0-C0 24-57 E0-C0 24-57 30-F0 CF-56 3C-F0 CF-56 3C-F0 CF-56 F0-DE 23-57 40-DF 23-57 40-DF 23-57 00-00 F2-24>' - PASSED gtests.sh: #5131: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/73 68-byte object <49-00 00-00 20-A3 12-57 81-A3 12-57 81-A3 12-57 00-00 00-00 00-00 00-00 00-00 00-00 20-2D 25-57 40-2D 25-57 40-2D 25-57 30-F0 CF-56 3C-F0 CF-56 3C-F0 CF-56 F0-1D 0E-57 61-1E 0E-57 61-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5132: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/74 68-byte object <4A-00 00-00 20-A3 12-57 81-A3 12-57 81-A3 12-57 30-F0 CF-56 38-F0 CF-56 38-F0 CF-56 90-1F 25-57 B0-1F 25-57 B0-1F 25-57 20-04 CE-56 2C-04 CE-56 2C-04 CE-56 F0-1D 0E-57 61-1E 0E-57 61-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5133: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/75 68-byte object <4B-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 90-1F 25-57 B0-1F 25-57 B0-1F 25-57 D0-8D C7-56 DC-8D C7-56 DC-8D C7-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5134: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/76 68-byte object <4C-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 D0-8D C7-56 D8-8D C7-56 D8-8D C7-56 60-33 25-57 80-33 25-57 80-33 25-57 C0-69 CE-56 CC-69 CE-56 CC-69 CE-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5135: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/77 68-byte object <4D-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 90-90 CE-56 91-90 CE-56 91-90 CE-56 20-5C 25-57 40-5C 25-57 40-5C 25-57 B0-8C CE-56 BC-8C CE-56 BC-8C CE-56 40-56 25-57 60-56 25-57 60-56 25-57 00-00 F2-24>' - PASSED gtests.sh: #5136: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/78 68-byte object <4E-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-8C CE-56 B2-8C CE-56 B2-8C CE-56 60-26 25-57 80-26 25-57 80-26 25-57 70-D9 CE-56 7C-D9 CE-56 7C-D9 CE-56 80-9C 25-57 A0-9C 25-57 A0-9C 25-57 00-00 F2-24>' - PASSED gtests.sh: #5137: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/79 68-byte object <4F-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-8C CE-56 B3-8C CE-56 B3-8C CE-56 80-9C 25-57 A0-9C 25-57 A0-9C 25-57 70-D9 CE-56 7C-D9 CE-56 7C-D9 CE-56 00-91 25-57 20-91 25-57 20-91 25-57 00-00 F2-24>' - PASSED gtests.sh: #5138: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/80 68-byte object <50-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 90-BF CE-56 94-BF CE-56 94-BF CE-56 00-7A 25-57 20-7A 25-57 20-7A 25-57 30-7D CE-56 3C-7D CE-56 3C-7D CE-56 40-C0 25-57 60-C0 25-57 60-C0 25-57 00-00 F2-24>' - PASSED gtests.sh: #5139: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/81 68-byte object <51-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 50-79 CE-56 55-79 CE-56 55-79 CE-56 40-C0 25-57 60-C0 25-57 60-C0 25-57 10-95 C5-56 1C-95 C5-56 1C-95 C5-56 50-B4 25-57 70-B4 25-57 70-B4 25-57 00-00 F2-24>' - PASSED gtests.sh: #5140: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/82 68-byte object <52-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 10-95 C5-56 16-95 C5-56 16-95 C5-56 60-A8 25-57 80-A8 25-57 80-A8 25-57 50-DE CD-56 5C-DE CD-56 5C-DE CD-56 10-12 14-57 30-12 14-57 30-12 14-57 00-00 F2-24>' - PASSED gtests.sh: #5141: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/83 68-byte object <53-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 10-95 C5-56 17-95 C5-56 17-95 C5-56 10-12 14-57 30-12 14-57 30-12 14-57 50-DE CD-56 5C-DE CD-56 5C-DE CD-56 70-09 14-57 90-09 14-57 90-09 14-57 00-00 F2-24>' - PASSED gtests.sh: #5142: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/84 68-byte object <54-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 E0-81 C5-56 E9-81 C5-56 E9-81 C5-56 10-C8 25-57 30-C8 25-57 30-C8 25-57 20-CB CD-56 2C-CB CD-56 2C-CB CD-56 10-AF F9-56 30-AF F9-56 30-AF F9-56 00-00 F2-24>' - PASSED gtests.sh: #5143: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/85 68-byte object <55-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 E0-81 CD-56 EA-81 CD-56 EA-81 CD-56 10-AF F9-56 30-AF F9-56 30-AF F9-56 10-AF CD-56 1C-AF CD-56 1C-AF CD-56 10-B8 F9-56 30-B8 F9-56 30-B8 F9-56 00-00 F2-24>' - PASSED gtests.sh: #5144: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/86 68-byte object <56-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 10-AF CD-56 1B-AF CD-56 1B-AF CD-56 C0-87 F9-56 E0-87 F9-56 E0-87 F9-56 20-B3 CD-56 2C-B3 CD-56 2C-B3 CD-56 40-CC F9-56 60-CC F9-56 60-CC F9-56 00-00 F2-24>' - PASSED gtests.sh: #5145: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/87 68-byte object <57-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 10-AF CD-56 1C-AF CD-56 1C-AF CD-56 40-CC F9-56 60-CC F9-56 60-CC F9-56 20-B3 CD-56 2C-B3 CD-56 2C-B3 CD-56 60-D5 F9-56 80-D5 F9-56 80-D5 F9-56 00-00 F2-24>' - PASSED gtests.sh: #5146: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/88 68-byte object <58-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 C0-8C 09-57 CD-8C 09-57 CD-8C 09-57 10-A6 F9-56 30-A6 F9-56 30-A6 F9-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 D0-F6 F9-56 F0-F6 F9-56 F0-F6 F9-56 00-00 F2-24>' - PASSED gtests.sh: #5147: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/89 68-byte object <59-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 C0-8C 09-57 CE-8C 09-57 CE-8C 09-57 D0-F6 F9-56 F0-F6 F9-56 F0-F6 F9-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 30-FC F6-56 50-FC F6-56 50-FC F6-56 00-00 F2-24>' - PASSED gtests.sh: #5148: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/90 68-byte object <5A-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 C0-8C 09-57 CF-8C 09-57 CF-8C 09-57 10-B8 E3-56 30-B8 E3-56 30-B8 E3-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 90-14 F7-56 B0-14 F7-56 B0-14 F7-56 00-00 F2-24>' - PASSED gtests.sh: #5149: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/91 68-byte object <5B-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 C0-8C 09-57 D0-8C 09-57 D0-8C 09-57 90-14 F7-56 B0-14 F7-56 B0-14 F7-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 50-D2 E5-56 70-D2 E5-56 70-D2 E5-56 00-00 F2-24>' - PASSED gtests.sh: #5150: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/92 68-byte object <5C-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 C0-8C 09-57 D1-8C 09-57 D1-8C 09-57 B0-EA F9-56 D0-EA F9-56 D0-EA F9-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 B0-B6 E5-56 D0-B6 E5-56 D0-B6 E5-56 00-00 F2-24>' - PASSED gtests.sh: #5151: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/93 68-byte object <5D-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-B6 E5-56 CE-B6 E5-56 CE-B6 E5-56 60-48 F7-56 80-48 F7-56 80-48 F7-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 A0-50 F7-56 C0-50 F7-56 C0-50 F7-56 00-00 F2-24>' - PASSED gtests.sh: #5152: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/94 68-byte object <5E-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 A0-C7 24-57 BF-C7 24-57 BF-C7 24-57 50-D2 E5-56 70-D2 E5-56 70-D2 E5-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 B0-EA F9-56 D0-EA F9-56 D0-EA F9-56 00-00 F2-24>' - PASSED gtests.sh: #5153: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/95 68-byte object <5F-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-18 F7-56 D0-18 F7-56 D0-18 F7-56 A0-50 F7-56 C0-50 F7-56 C0-50 F7-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 A0-92 F7-56 C0-92 F7-56 C0-92 F7-56 00-00 F2-24>' - PASSED gtests.sh: #5154: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/96 68-byte object <60-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 A0-92 F7-56 C1-92 F7-56 C1-92 F7-56 E0-9A F7-56 00-9B F7-56 00-9B F7-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 10-77 F7-56 30-77 F7-56 30-77 F7-56 00-00 F2-24>' - PASSED gtests.sh: #5155: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/97 68-byte object <61-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-23 0E-57 DF-23 0E-57 DF-23 0E-57 B0-B6 E5-56 D0-B6 E5-56 D0-B6 E5-56 F0-C6 CD-56 FC-C6 CD-56 FC-C6 CD-56 B0-18 F7-56 D0-18 F7-56 D0-18 F7-56 00-00 F2-24>' - PASSED gtests.sh: #5156: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/98 68-byte object <62-00 00-00 B0-18 F7-56 D0-18 F7-56 D0-18 F7-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 60-8A F7-56 80-8A F7-56 80-8A F7-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5157: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/99 68-byte object <63-00 00-00 20-C4 09-57 60-C4 09-57 60-C4 09-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 20-73 F7-56 40-73 F7-56 40-73 F7-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 F0-DE 23-57 40-DF 23-57 40-DF 23-57 00-00 F2-24>' - PASSED gtests.sh: #5158: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/100 68-byte object <64-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 00-CC E6-56 20-CC E6-56 20-CC E6-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5159: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/101 68-byte object <65-00 00-00 00-CC E6-56 20-CC E6-56 20-CC E6-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 80-7A FC-56 A0-7A FC-56 A0-7A FC-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5160: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/102 68-byte object <66-00 00-00 C0-C4 09-57 00-C5 09-57 00-C5 09-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 60-8A F7-56 80-8A F7-56 80-8A F7-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 F0-DE 23-57 40-DF 23-57 40-DF 23-57 00-00 F2-24>' - PASSED gtests.sh: #5161: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/103 68-byte object <67-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 60-8A F7-56 80-8A F7-56 80-8A F7-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5162: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/104 68-byte object <68-00 00-00 70-B1 FC-56 90-B1 FC-56 90-B1 FC-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-B5 FC-56 D0-B5 FC-56 D0-B5 FC-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5163: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/105 68-byte object <69-00 00-00 D0-CD 09-57 10-CE 09-57 10-CE 09-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-B5 FC-56 D0-B5 FC-56 D0-B5 FC-56 30-4A CD-56 3C-4A CD-56 3C-4A CD-56 F0-DE 23-57 40-DF 23-57 40-DF 23-57 00-00 F2-24>' - PASSED gtests.sh: #5164: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/106 68-byte object <6A-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 B0-B5 FC-56 D0-B5 FC-56 D0-B5 FC-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5165: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/107 68-byte object <6B-00 00-00 30-AD FC-56 50-AD FC-56 50-AD FC-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 C0-D8 FC-56 E0-D8 FC-56 E0-D8 FC-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5166: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/108 68-byte object <6C-00 00-00 80-9A 04-57 C0-9A 04-57 C0-9A 04-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 00-FF FC-56 20-FF FC-56 20-FF FC-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 F0-DE 23-57 40-DF 23-57 40-DF 23-57 00-00 F2-24>' - PASSED gtests.sh: #5167: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/109 68-byte object <6D-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 60-8F FC-56 80-8F FC-56 80-8F FC-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5168: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/110 68-byte object <6E-00 00-00 F0-A8 FC-56 10-A9 FC-56 10-A9 FC-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 70-C7 FC-56 90-C7 FC-56 90-C7 FC-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5169: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/111 68-byte object <6F-00 00-00 90-A3 04-57 D0-A3 04-57 D0-A3 04-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 E0-CB FC-56 00-CC FC-56 00-CC FC-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 F0-75 BD-56 40-76 BD-56 40-76 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5170: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/112 68-byte object <70-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 30-32 FD-56 50-32 FD-56 50-32 FD-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5171: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/113 68-byte object <71-00 00-00 30-32 FD-56 50-32 FD-56 50-32 FD-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 00-1F FD-56 20-1F FD-56 20-1F FD-56 D0-2E C5-56 DC-2E C5-56 DC-2E C5-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5172: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/114 68-byte object <72-00 00-00 80-AC 04-57 C0-AC 04-57 C0-AC 04-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 70-C7 FC-56 90-C7 FC-56 90-C7 FC-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 F0-75 BD-56 40-76 BD-56 40-76 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5173: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/115 68-byte object <73-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 70-C7 FC-56 90-C7 FC-56 90-C7 FC-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5174: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/116 68-byte object <74-00 00-00 C0-FB FE-56 E0-FB FE-56 E0-FB FE-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 00-B8 E7-56 20-B8 E7-56 20-B8 E7-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5175: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/117 68-byte object <75-00 00-00 90-B5 04-57 D0-B5 04-57 D0-B5 04-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 00-B8 E7-56 20-B8 E7-56 20-B8 E7-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 F0-75 BD-56 40-76 BD-56 40-76 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5176: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/118 68-byte object <76-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 00-B8 E7-56 20-B8 E7-56 20-B8 E7-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5177: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/119 68-byte object <77-00 00-00 80-F7 FE-56 A0-F7 FE-56 A0-F7 FE-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5178: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/120 68-byte object <78-00 00-00 A0-BE 04-57 E0-BE 04-57 E0-BE 04-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 80-1A E6-56 A0-1A E6-56 A0-1A E6-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 F0-75 BD-56 40-76 BD-56 40-76 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5179: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/121 68-byte object <79-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 10-32 FF-56 30-32 FF-56 30-32 FF-56 50-21 CC-56 5C-21 CC-56 5C-21 CC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5180: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/122 68-byte object <7A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 D0-96 CC-56 D3-96 CC-56 D3-96 CC-56 F0-13 FF-56 10-14 FF-56 10-14 FF-56 70-5A CC-56 7C-5A CC-56 7C-5A CC-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5181: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/123 68-byte object <7B-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-5A CC-56 73-5A CC-56 73-5A CC-56 F0-13 FF-56 10-14 FF-56 10-14 FF-56 60-02 C5-56 6C-02 C5-56 6C-02 C5-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5182: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/124 68-byte object <7C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-5A CC-56 73-5A CC-56 73-5A CC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 60-02 C5-56 6C-02 C5-56 6C-02 C5-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5183: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/125 68-byte object <7D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-A6 CC-56 F3-A6 CC-56 F3-A6 CC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 30-08 CC-56 3C-08 CC-56 3C-08 CC-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5184: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/126 68-byte object <7E-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 C0-E0 CB-56 C3-E0 CB-56 C3-E0 CB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-CC CB-56 2C-CC CB-56 2C-CC CB-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5185: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/127 68-byte object <7F-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-CC CB-56 23-CC CB-56 23-CC CB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-13 C7-56 EC-13 C7-56 EC-13 C7-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5186: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/128 68-byte object <80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-CC CB-56 23-CC CB-56 23-CC CB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-13 C7-56 EC-13 C7-56 EC-13 C7-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5187: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/129 68-byte object <81-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-F0 CB-56 F3-F0 CB-56 F3-F0 CB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-AF D0-56 EC-AF D0-56 EC-AF D0-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5188: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/130 68-byte object <82-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-B4 D0-56 53-B4 D0-56 53-B4 D0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 C0-B8 D0-56 CC-B8 D0-56 CC-B8 D0-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5189: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/131 68-byte object <83-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 50-B4 D0-56 53-B4 D0-56 53-B4 D0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 C0-B8 D0-56 CC-B8 D0-56 CC-B8 D0-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5190: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/132 68-byte object <84-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-F7 D0-56 F3-F7 D0-56 F3-F7 D0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-AA C7-56 9C-AA C7-56 9C-AA C7-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5191: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/133 68-byte object <85-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-C1 D0-56 A3-C1 D0-56 A3-C1 D0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-9E D0-56 8C-9E D0-56 8C-9E D0-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5192: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/134 68-byte object <86-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-18 CC-56 B3-18 CC-56 B3-18 CC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-47 CC-56 2C-47 CC-56 2C-47 CC-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5193: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/135 68-byte object <87-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 B0-18 CC-56 B3-18 CC-56 B3-18 CC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-47 CC-56 2C-47 CC-56 2C-47 CC-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5194: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/136 68-byte object <88-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 70-B2 C7-56 73-B2 C7-56 73-B2 C7-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-4A D1-56 5C-4A D1-56 5C-4A D1-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5195: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/137 68-byte object <89-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 40-05 D1-56 43-05 D1-56 43-05 D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 B0-80 D0-56 BC-80 D0-56 BC-80 D0-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5196: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/138 68-byte object <8A-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-FC D0-56 63-FC D0-56 63-FC D0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-00 D1-56 DC-00 D1-56 DC-00 D1-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5197: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/139 68-byte object <8B-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 60-FC D0-56 63-FC D0-56 63-FC D0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-00 D1-56 DC-00 D1-56 DC-00 D1-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5198: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/140 68-byte object <8C-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 F0-37 CC-56 F3-37 CC-56 F3-37 CC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 F0-4E D1-56 FC-4E D1-56 FC-4E D1-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5199: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/141 68-byte object <8D-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-67 D1-56 A3-67 D1-56 A3-67 D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 30-CD D0-56 3C-CD D0-56 3C-CD D0-56 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 01-00 F2-24>' - PASSED gtests.sh: #5200: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/142 68-byte object <8E-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 90-53 D1-56 93-53 D1-56 93-53 D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-5C D1-56 DC-5C D1-56 DC-5C D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5201: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/143 68-byte object <8F-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 90-53 D1-56 93-53 D1-56 93-53 D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-5C D1-56 DC-5C D1-56 DC-5C D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5202: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/144 68-byte object <90-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 70-E1 D1-56 73-E1 D1-56 73-E1 D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-E6 D1-56 0C-E6 D1-56 0C-E6 D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5203: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/145 68-byte object <91-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 E0-C5 D1-56 E3-C5 D1-56 E3-C5 D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-6B D1-56 DC-6B D1-56 DC-6B D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5204: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/146 68-byte object <92-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 80-AE C7-56 83-AE C7-56 83-AE C7-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-C1 D1-56 8C-C1 D1-56 8C-C1 D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5205: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/147 68-byte object <93-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 80-AE C7-56 83-AE C7-56 83-AE C7-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-C1 D1-56 8C-C1 D1-56 8C-C1 D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5206: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/148 68-byte object <94-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 80-BD D1-56 83-BD D1-56 83-BD D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-2F D2-56 8C-2F D2-56 8C-2F D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5207: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/149 68-byte object <95-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 20-EF D1-56 23-EF D1-56 23-EF D1-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-0E D1-56 2C-0E D1-56 2C-0E D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5208: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/150 68-byte object <96-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 50-9E C7-56 53-9E C7-56 53-9E C7-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-EA D1-56 9C-EA D1-56 9C-EA D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5209: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/151 68-byte object <97-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 50-9E C7-56 53-9E C7-56 53-9E C7-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-EA D1-56 9C-EA D1-56 9C-EA D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5210: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/152 68-byte object <98-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 20-D2 C7-56 23-D2 C7-56 23-D2 C7-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-BC D2-56 8C-BC D2-56 8C-BC D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5211: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/153 68-byte object <99-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 F0-3D D2-56 F3-3D D2-56 F3-3D D2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 B0-F3 D1-56 BC-F3 D1-56 BC-F3 D1-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5212: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/154 68-byte object <9A-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 50-34 D2-56 53-34 D2-56 53-34 D2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-39 D2-56 2C-39 D2-56 2C-39 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5213: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/155 68-byte object <9B-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 50-34 D2-56 53-34 D2-56 53-34 D2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-39 D2-56 2C-39 D2-56 2C-39 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5214: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/156 68-byte object <9C-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 F0-68 D2-56 F3-68 D2-56 F3-68 D2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 A0-72 D2-56 AC-72 D2-56 AC-72 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5215: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/157 68-byte object <9D-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 40-1A D3-56 43-1A D3-56 43-1A D3-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 C0-42 D2-56 CC-42 D2-56 CC-42 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5216: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/158 68-byte object <9E-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 E0-C0 D2-56 E3-C0 D2-56 E3-C0 D2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-B4 D2-56 EC-B4 D2-56 EC-B4 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5217: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/159 68-byte object <9F-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 E0-C0 D2-56 E3-C0 D2-56 E3-C0 D2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-B4 D2-56 EC-B4 D2-56 EC-B4 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5218: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/160 68-byte object <A0-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 30-18 D4-56 33-18 D4-56 33-18 D4-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 A0-1C D4-56 AC-1C D4-56 AC-1C D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5219: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/161 68-byte object <A1-00 00-00 A0-8C 09-57 B0-8C 09-57 B0-8C 09-57 80-05 D4-56 83-05 D4-56 83-05 D4-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-23 D3-56 0C-23 D3-56 0C-23 D3-56 E0-05 05-57 00-06 05-57 00-06 05-57 01-00 F2-24>' - PASSED gtests.sh: #5220: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/162 68-byte object <A2-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 F0-76 D2-56 F3-76 D2-56 F3-76 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 50-94 D2-56 5C-94 D2-56 5C-94 D2-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5221: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/163 68-byte object <A3-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 F0-76 D2-56 F3-76 D2-56 F3-76 D2-56 E0-05 05-57 00-06 05-57 00-06 05-57 50-94 D2-56 5C-94 D2-56 5C-94 D2-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5222: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/164 68-byte object <A4-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 30-5C D4-56 33-5C D4-56 33-5C D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 D0-60 D4-56 DC-60 D4-56 DC-60 D4-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5223: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/165 68-byte object <A5-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 E0-49 D4-56 E3-49 D4-56 E3-49 D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 80-E7 C7-56 8C-E7 C7-56 8C-E7 C7-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5224: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/166 68-byte object <A6-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 10-21 D4-56 13-21 D4-56 13-21 D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 50-45 D4-56 5C-45 D4-56 5C-45 D4-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5225: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/167 68-byte object <A7-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 10-21 D4-56 13-21 D4-56 13-21 D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 50-45 D4-56 5C-45 D4-56 5C-45 D4-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5226: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/168 68-byte object <A8-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 00-10 C8-56 03-10 C8-56 03-10 C8-56 E0-05 05-57 00-06 05-57 00-06 05-57 20-14 C8-56 2C-14 C8-56 2C-14 C8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5227: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/169 68-byte object <A9-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 10-6A D4-56 13-6A D4-56 13-6A D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 70-4E D4-56 7C-4E D4-56 7C-4E D4-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5228: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/170 68-byte object <AA-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 70-65 D4-56 73-65 D4-56 73-65 D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 D0-EB C7-56 DC-EB C7-56 DC-EB C7-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5229: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/171 68-byte object <AB-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 70-65 D4-56 73-65 D4-56 73-65 D4-56 E0-05 05-57 00-06 05-57 00-06 05-57 D0-EB C7-56 DC-EB C7-56 DC-EB C7-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5230: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/172 68-byte object <AC-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 10-36 C8-56 13-36 C8-56 13-36 C8-56 E0-05 05-57 00-06 05-57 00-06 05-57 40-72 C8-56 4C-72 C8-56 4C-72 C8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5231: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/173 68-byte object <AD-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 80-20 C8-56 83-20 C8-56 83-20 C8-56 E0-05 05-57 00-06 05-57 00-06 05-57 B0-6E D4-56 BC-6E D4-56 BC-6E D4-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5232: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/174 68-byte object <AE-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 40-18 C8-56 43-18 C8-56 43-18 C8-56 E0-05 05-57 00-06 05-57 00-06 05-57 60-1C C8-56 6C-1C C8-56 6C-1C C8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5233: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/175 68-byte object <AF-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 40-18 C8-56 43-18 C8-56 43-18 C8-56 E0-05 05-57 00-06 05-57 00-06 05-57 60-1C C8-56 6C-1C C8-56 6C-1C C8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5234: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/176 68-byte object <B0-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 C0-1F C1-56 C3-1F C1-56 C3-1F C1-56 E0-05 05-57 00-06 05-57 00-06 05-57 C0-25 C1-56 CC-25 C1-56 CC-25 C1-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5235: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/177 68-byte object <B1-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 10-20 C7-56 13-20 C7-56 13-20 C7-56 E0-05 05-57 00-06 05-57 00-06 05-57 20-65 C8-56 2C-65 C8-56 2C-65 C8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5236: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/178 68-byte object <B2-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 80-5C C8-56 83-5C C8-56 83-5C C8-56 E0-05 05-57 00-06 05-57 00-06 05-57 70-69 C8-56 7C-69 C8-56 7C-69 C8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5237: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/179 68-byte object <B3-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 80-5C C8-56 83-5C C8-56 83-5C C8-56 E0-05 05-57 00-06 05-57 00-06 05-57 70-69 C8-56 7C-69 C8-56 7C-69 C8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5238: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/180 68-byte object <B4-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 10-7B D6-56 13-7B D6-56 13-7B D6-56 E0-05 05-57 00-06 05-57 00-06 05-57 90-8D D6-56 9C-8D D6-56 9C-8D D6-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5239: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/181 68-byte object <B5-00 00-00 10-1C FF-56 31-1C FF-56 31-1C FF-56 50-86 CC-56 53-86 CC-56 53-86 CC-56 E0-05 05-57 00-06 05-57 00-06 05-57 60-3B D8-56 6C-3B D8-56 6C-3B D8-56 B0-23 0E-57 E1-23 0E-57 E1-23 0E-57 01-00 F2-24>' - PASSED gtests.sh: #5240: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/182 68-byte object <B6-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-25 DC-56 0C-25 DC-56 0C-25 DC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5241: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/183 68-byte object <B7-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-25 DC-56 0C-25 DC-56 0C-25 DC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5242: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/184 68-byte object <B8-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-25 DC-56 0C-25 DC-56 0C-25 DC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5243: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/185 68-byte object <B9-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-25 DC-56 0C-25 DC-56 0C-25 DC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5244: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/186 68-byte object <BA-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-25 DC-56 0C-25 DC-56 0C-25 DC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5245: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/187 68-byte object <BB-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-25 DC-56 0C-25 DC-56 0C-25 DC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5246: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/188 68-byte object <BC-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-25 DC-56 0C-25 DC-56 0C-25 DC-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5247: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/189 68-byte object <BD-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5248: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/190 68-byte object <BE-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5249: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/191 68-byte object <BF-00 00-00 80-1F 0E-57 00-20 0E-57 00-20 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 C0-84 09-57 C0-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5250: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/192 68-byte object <C0-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5251: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/193 68-byte object <C1-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5252: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/194 68-byte object <C2-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5253: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/195 68-byte object <C3-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5254: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/196 68-byte object <C4-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-34 D7-56 5C-34 D7-56 5C-34 D7-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5255: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/197 68-byte object <C5-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5256: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/198 68-byte object <C6-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5257: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/199 68-byte object <C7-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5258: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/200 68-byte object <C8-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5259: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/201 68-byte object <C9-00 00-00 80-1F 0E-57 FF-1F 0E-57 FF-1F 0E-57 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 30-84 09-57 BF-84 09-57 BF-84 09-57 00-00 F2-24>' - PASSED gtests.sh: #5260: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/202 68-byte object <CA-00 00-00 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-B4 F5-56 70-B4 F5-56 70-B4 F5-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 F0-75 BD-56 40-76 BD-56 40-76 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5261: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/203 68-byte object <CB-00 00-00 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-B4 F5-56 70-B4 F5-56 70-B4 F5-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5262: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/204 68-byte object <CC-00 00-00 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-B4 F5-56 70-B4 F5-56 70-B4 F5-56 10-C0 D9-56 1C-C0 D9-56 1C-C0 D9-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5263: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/205 68-byte object <CD-00 00-00 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-B4 F5-56 70-B4 F5-56 70-B4 F5-56 20-D4 D9-56 2C-D4 D9-56 2C-D4 D9-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5264: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/206 68-byte object <CE-00 00-00 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-B4 F5-56 70-B4 F5-56 70-B4 F5-56 20-D4 D9-56 2C-D4 D9-56 2C-D4 D9-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5265: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/207 68-byte object <CF-00 00-00 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-B4 F5-56 70-B4 F5-56 70-B4 F5-56 20-D4 D9-56 2C-D4 D9-56 2C-D4 D9-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5266: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/208 68-byte object <D0-00 00-00 10-68 F5-56 50-68 F5-56 50-68 F5-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-B4 F5-56 70-B4 F5-56 70-B4 F5-56 20-D4 D9-56 2C-D4 D9-56 2C-D4 D9-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5267: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/209 68-byte object <D1-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 20-D4 D9-56 24-D4 D9-56 24-D4 D9-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 30-10 DA-56 3C-10 DA-56 3C-10 DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5268: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/210 68-byte object <D2-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 F0-B3 D9-56 F4-B3 D9-56 F4-B3 D9-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-3E DA-56 EC-3E DA-56 EC-3E DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5269: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/211 68-byte object <D3-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 70-62 DA-56 74-62 DA-56 74-62 DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-E3 C2-56 EC-E3 C2-56 EC-E3 C2-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5270: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/212 68-byte object <D4-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 E0-E3 C2-56 E4-E3 C2-56 E4-E3 C2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 60-00 C9-56 6C-00 C9-56 6C-00 C9-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5271: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/213 68-byte object <D5-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 E0-E3 C2-56 E4-E3 C2-56 E4-E3 C2-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 60-00 C9-56 6C-00 C9-56 6C-00 C9-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5272: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/214 68-byte object <D6-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 30-5A DA-56 34-5A DA-56 34-5A DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 B0-A6 DA-56 BC-A6 DA-56 BC-A6 DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5273: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/215 68-byte object <D7-00 00-00 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 A0-B3 DA-56 A4-B3 DA-56 A4-B3 DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-66 DA-56 9C-66 DA-56 9C-66 DA-56 90-ED F5-56 D0-ED F5-56 D0-ED F5-56 00-00 F2-24>' - PASSED gtests.sh: #5274: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/216 68-byte object <D8-00 00-00 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 90-66 DA-56 94-66 DA-56 94-66 DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-14 DA-56 5C-14 DA-56 5C-14 DA-56 90-ED F5-56 D0-ED F5-56 D0-ED F5-56 00-00 F2-24>' - PASSED gtests.sh: #5275: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/217 68-byte object <D9-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 90-66 DA-56 94-66 DA-56 94-66 DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-14 DA-56 5C-14 DA-56 5C-14 DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5276: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/218 68-byte object <DA-00 00-00 E0-ED F5-56 20-EE F5-56 20-EE F5-56 B0-9A DA-56 B4-9A DA-56 B4-9A DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-9E C9-56 DC-9E C9-56 DC-9E C9-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5277: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/219 68-byte object <DB-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 60-FC DA-56 64-FC DA-56 64-FC DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 70-BC DA-56 7C-BC DA-56 7C-BC DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5278: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/220 68-byte object <DC-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 70-BC DA-56 74-BC DA-56 74-BC DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 B0-6A DA-56 BC-6A DA-56 BC-6A DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5279: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/221 68-byte object <DD-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 70-BC DA-56 74-BC DA-56 74-BC DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 B0-6A DA-56 BC-6A DA-56 BC-6A DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5280: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/222 68-byte object <DE-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 20-F8 DA-56 24-F8 DA-56 24-F8 DA-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-DA DA-56 5C-DA DA-56 5C-DA DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5281: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/223 68-byte object <DF-00 00-00 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 60-4E DB-56 64-4E DB-56 64-4E DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 A0-00 DB-56 AC-00 DB-56 AC-00 DB-56 10-0B F6-56 50-0B F6-56 50-0B F6-56 00-00 F2-24>' - PASSED gtests.sh: #5282: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/224 68-byte object <E0-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 A0-00 DB-56 A4-00 DB-56 A4-00 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-24 CB-56 8C-24 CB-56 8C-24 CB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5283: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/225 68-byte object <E1-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 A0-00 DB-56 A4-00 DB-56 A4-00 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-24 CB-56 8C-24 CB-56 8C-24 CB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5284: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/226 68-byte object <E2-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 70-D4 C4-56 74-D4 C4-56 74-D4 C4-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 A0-78 DB-56 AC-78 DB-56 AC-78 DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5285: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/227 68-byte object <E3-00 00-00 60-50 0A-57 A0-50 0A-57 A0-50 0A-57 20-7D DB-56 24-7D DB-56 24-7D DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-52 DB-56 DC-52 DB-56 DC-52 DB-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5286: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/228 68-byte object <E4-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 D0-52 DB-56 D4-52 DB-56 D4-52 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-05 DB-56 1C-05 DB-56 1C-05 DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5287: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/229 68-byte object <E5-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 D0-52 DB-56 D4-52 DB-56 D4-52 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-05 DB-56 1C-05 DB-56 1C-05 DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5288: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/230 68-byte object <E6-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 30-AE C4-56 34-AE C4-56 34-AE C4-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 70-85 DC-56 7C-85 DC-56 7C-85 DC-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5289: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/231 68-byte object <E7-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 10-6B CB-56 14-6B CB-56 14-6B CB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-86 DB-56 2C-86 DB-56 2C-86 DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5290: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/232 68-byte object <E8-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 20-86 DB-56 24-86 DB-56 24-86 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 70-57 DB-56 7C-57 DB-56 7C-57 DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5291: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/233 68-byte object <E9-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 20-86 DB-56 24-86 DB-56 24-86 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 70-57 DB-56 7C-57 DB-56 7C-57 DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5292: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/234 68-byte object <EA-00 00-00 50-6A 0A-57 90-6A 0A-57 90-6A 0A-57 70-91 DC-56 74-91 DC-56 74-91 DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 70-29 DC-56 7C-29 DC-56 7C-29 DC-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5293: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/235 68-byte object <EB-00 00-00 50-6A 0A-57 90-6A 0A-57 90-6A 0A-57 A0-51 DC-56 A4-51 DC-56 A4-51 DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 F0-92 DB-56 FC-92 DB-56 FC-92 DB-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5294: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/236 68-byte object <EC-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 F0-92 DB-56 F4-92 DB-56 F4-92 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-5C DB-56 1C-5C DB-56 1C-5C DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5295: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/237 68-byte object <ED-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 F0-92 DB-56 F4-92 DB-56 F4-92 DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 10-5C DB-56 1C-5C DB-56 1C-5C DB-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5296: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/238 68-byte object <EE-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 70-2E DC-56 74-2E DC-56 74-2E DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-EA DC-56 0C-EA DC-56 0C-EA DC-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5297: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/239 68-byte object <EF-00 00-00 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 D0-13 DD-56 D4-13 DD-56 D4-13 DD-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 F0-55 DC-56 FC-55 DC-56 FC-55 DC-56 E0-7C 0A-57 20-7D 0A-57 20-7D 0A-57 00-00 F2-24>' - PASSED gtests.sh: #5298: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/240 68-byte object <F0-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 F0-55 DC-56 F4-55 DC-56 F4-55 DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-98 DC-56 DC-98 DC-56 DC-98 DC-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5299: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/241 68-byte object <F1-00 00-00 30-7D 0A-57 70-7D 0A-57 70-7D 0A-57 F0-55 DC-56 F4-55 DC-56 F4-55 DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-98 DC-56 DC-98 DC-56 DC-98 DC-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5300: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/242 68-byte object <F2-00 00-00 B0-23 0E-57 E0-23 0E-57 E0-23 0E-57 60-EE DC-56 64-EE DC-56 64-EE DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 70-B9 DB-56 7C-B9 DB-56 7C-B9 DB-56 30-7D 0A-57 70-7D 0A-57 70-7D 0A-57 00-00 F2-24>' - PASSED gtests.sh: #5301: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/243 68-byte object <F3-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 90-FF DB-56 94-FF DB-56 94-FF DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 C0-1C DD-56 CC-1C DD-56 CC-1C DD-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5302: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/244 68-byte object <F4-00 00-00 80-7D 0A-57 C0-7D 0A-57 C0-7D 0A-57 C0-1C DD-56 C4-1C DD-56 C4-1C DD-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 40-5A DC-56 4C-5A DC-56 4C-5A DC-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5303: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/245 68-byte object <F5-00 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 C0-1C DD-56 C4-1C DD-56 C4-1C DD-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 40-5A DC-56 4C-5A DC-56 4C-5A DC-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5304: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/246 68-byte object <F6-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 C0-BD DB-56 C4-BD DB-56 C4-BD DB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 A0-15 DC-56 AC-15 DC-56 AC-15 DC-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5305: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/247 68-byte object <F7-00 00-00 D0-8F 0A-57 10-90 0A-57 10-90 0A-57 E0-88 DE-56 E4-88 DE-56 E4-88 DE-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 A0-03 DC-56 AC-03 DC-56 AC-03 DC-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5306: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/248 68-byte object <F8-00 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 A0-03 DC-56 A4-03 DC-56 A4-03 DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 40-25 DD-56 4C-25 DD-56 4C-25 DD-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5307: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/249 68-byte object <F9-00 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 A0-03 DC-56 A4-03 DC-56 A4-03 DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 40-25 DD-56 4C-25 DD-56 4C-25 DD-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5308: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/250 68-byte object <FA-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 20-1C DC-56 24-1C DC-56 24-1C DC-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 30-A9 DE-56 3C-A9 DE-56 3C-A9 DE-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5309: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/251 68-byte object <FB-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 80-D2 DE-56 84-D2 DE-56 84-D2 DE-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-64 DE-56 DC-64 DE-56 DC-64 DE-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5310: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/252 68-byte object <FC-00 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 D0-64 DE-56 D4-64 DE-56 D4-64 DE-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-08 DC-56 2C-08 DC-56 2C-08 DC-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5311: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/253 68-byte object <FD-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 D0-64 DE-56 D4-64 DE-56 D4-64 DE-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-08 DC-56 2C-08 DC-56 2C-08 DC-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5312: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/254 68-byte object <FE-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 70-AD DE-56 74-AD DE-56 74-AD DE-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 C0-0E DF-56 CC-0E DF-56 CC-0E DF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5313: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/255 68-byte object <FF-00 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 E0-16 DF-56 E4-16 DF-56 E4-16 DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 A0-DB DE-56 AC-DB DE-56 AC-DB DE-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5314: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/256 68-byte object <00-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 A0-DB DE-56 A4-DB DE-56 A4-DB DE-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-98 DE-56 9C-98 DE-56 9C-98 DE-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5315: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/257 68-byte object <01-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 A0-DB DE-56 A4-DB DE-56 A4-DB DE-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-98 DE-56 9C-98 DE-56 9C-98 DE-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5316: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/258 68-byte object <02-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 D0-02 DF-56 D4-02 DF-56 D4-02 DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-D3 FE-56 5C-D3 FE-56 5C-D3 FE-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5317: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/259 68-byte object <03-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 C0-5C B4-56 C4-5C B4-56 C4-5C B4-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 B0-2F B3-56 BC-2F B3-56 BC-2F B3-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5318: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/260 68-byte object <04-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 B0-2F B3-56 B4-2F B3-56 B4-2F B3-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 60-4C B4-56 6C-4C B4-56 6C-4C B4-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5319: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/261 68-byte object <05-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 B0-2F B3-56 B4-2F B3-56 B4-2F B3-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 60-4C B4-56 6C-4C B4-56 6C-4C B4-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5320: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/262 68-byte object <06-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 50-36 F3-56 54-36 F3-56 54-36 F3-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 F0-0C E0-56 FC-0C E0-56 FC-0C E0-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5321: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/263 68-byte object <07-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 10-3E E0-56 14-3E E0-56 14-3E E0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-6B E0-56 2C-6B E0-56 2C-6B E0-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5322: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/264 68-byte object <08-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 20-6B E0-56 24-6B E0-56 24-6B E0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-4D DA-56 0C-4D DA-56 0C-4D DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5323: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/265 68-byte object <09-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 20-6B E0-56 24-6B E0-56 24-6B E0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-4D DA-56 0C-4D DA-56 0C-4D DA-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5324: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/266 68-byte object <0A-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 F0-CE DF-56 F4-CE DF-56 F4-CE DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-94 DF-56 9C-94 DF-56 9C-94 DF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5325: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/267 68-byte object <0B-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 E0-E2 CD-56 E4-E2 CD-56 E4-E2 CD-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 30-04 E0-56 3C-04 E0-56 3C-04 E0-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5326: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/268 68-byte object <0C-01 00-00 D0-F0 0A-57 10-F1 0A-57 10-F1 0A-57 30-04 E0-56 34-04 E0-56 34-04 E0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 40-DC DF-56 4C-DC DF-56 4C-DC DF-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5327: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/269 68-byte object <0D-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 30-04 E0-56 34-04 E0-56 34-04 E0-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 40-DC DF-56 4C-DC DF-56 4C-DC DF-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5328: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/270 68-byte object <0E-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 50-4F DF-56 54-4F DF-56 54-4F DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-28 DF-56 2C-28 DF-56 2C-28 DF-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5329: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/271 68-byte object <0F-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-BE DF-56 04-BE DF-56 04-BE DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 50-8B DF-56 5C-8B DF-56 5C-8B DF-56 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5330: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/272 68-byte object <10-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 50-8B DF-56 54-8B DF-56 54-8B DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-86 DF-56 EC-86 DF-56 EC-86 DF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5331: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/273 68-byte object <11-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 50-8B DF-56 54-8B DF-56 54-8B DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-86 DF-56 EC-86 DF-56 EC-86 DF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5332: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/274 68-byte object <12-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 60-D4 CB-56 64-D4 CB-56 64-D4 CB-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-DF DE-56 EC-DF DE-56 EC-DF DE-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5333: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/275 68-byte object <13-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 70-60 DF-56 74-60 DF-56 74-60 DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-34 DF-56 EC-34 DF-56 EC-34 DF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5334: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/276 68-byte object <14-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 E0-34 DF-56 E4-34 DF-56 E4-34 DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-39 DF-56 2C-39 DF-56 2C-39 DF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5335: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/277 68-byte object <15-01 00-00 80-12 0B-57 C0-12 0B-57 C0-12 0B-57 E0-34 DF-56 E4-34 DF-56 E4-34 DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-39 DF-56 2C-39 DF-56 2C-39 DF-56 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5336: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/278 68-byte object <16-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-1F DF-56 04-1F DF-56 04-1F DF-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 F0-78 14-57 FC-78 14-57 FC-78 14-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5337: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/279 68-byte object <17-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 50-70 14-57 54-70 14-57 54-70 14-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-6C 14-57 0C-6C 14-57 0C-6C 14-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5338: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/280 68-byte object <18-01 00-00 20-13 0B-57 60-13 0B-57 60-13 0B-57 00-6C 14-57 04-6C 14-57 04-6C 14-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 F0-67 14-57 FC-67 14-57 FC-67 14-57 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5339: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/281 68-byte object <19-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-6C 14-57 04-6C 14-57 04-6C 14-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 F0-67 14-57 FC-67 14-57 FC-67 14-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5340: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/282 68-byte object <1A-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 A0-74 14-57 A4-74 14-57 A4-74 14-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 20-DB 14-57 2C-DB 14-57 2C-DB 14-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5341: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/283 68-byte object <1B-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 D0-D6 14-57 D4-D6 14-57 D4-D6 14-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 40-B0 14-57 4C-B0 14-57 4C-B0 14-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5342: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/284 68-byte object <1C-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 40-B0 14-57 44-B0 14-57 44-B0 14-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-FE FF-56 8C-FE FF-56 8C-FE FF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5343: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/285 68-byte object <1D-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 40-B0 14-57 44-B0 14-57 44-B0 14-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-FE FF-56 8C-FE FF-56 8C-FE FF-56 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5344: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/286 68-byte object <1E-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-27 E6-56 04-27 E6-56 04-27 E6-56 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-37 15-57 0C-37 15-57 0C-37 15-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5345: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/287 68-byte object <1F-01 00-00 20-38 0B-57 60-38 0B-57 60-38 0B-57 80-2E 15-57 84-2E 15-57 84-2E 15-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 C0-0C 15-57 CC-0C 15-57 CC-0C 15-57 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5346: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/288 68-byte object <20-01 00-00 20-38 0B-57 60-38 0B-57 60-38 0B-57 C0-0C 15-57 C4-0C 15-57 C4-0C 15-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-08 15-57 9C-08 15-57 9C-08 15-57 B0-56 BD-56 00-57 BD-56 00-57 BD-56 00-00 F2-24>' - PASSED gtests.sh: #5347: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/289 68-byte object <21-01 00-00 B0-56 BD-56 00-57 BD-56 00-57 BD-56 C0-0C 15-57 C4-0C 15-57 C4-0C 15-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 90-08 15-57 9C-08 15-57 9C-08 15-57 20-A3 12-57 80-A3 12-57 80-A3 12-57 00-00 F2-24>' - PASSED gtests.sh: #5348: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/290 68-byte object <22-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 90-32 15-57 94-32 15-57 94-32 15-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 80-93 15-57 8C-93 15-57 8C-93 15-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5349: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/291 68-byte object <23-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 A0-8A 15-57 A4-8A 15-57 A4-8A 15-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-68 15-57 DC-68 15-57 DC-68 15-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5350: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/292 68-byte object <24-01 00-00 20-A3 12-57 80-A3 12-57 80-A3 12-57 D0-68 15-57 D4-68 15-57 D4-68 15-57 10-1C FF-56 30-1C FF-56 30-1C FF-56 C0-64 15-57 CC-64 15-57 CC-64 15-57 F0-1D 0E-57 60-1E 0E-57 60-1E 0E-57 00-00 F2-24>' - PASSED gtests.sh: #5351: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/293 68-byte object <25-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-1C FF-56 30-1C FF-56 30-1C FF-56 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-01 F2-24>' - PASSED gtests.sh: #5352: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/294 68-byte object <26-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-68 15-57 D8-68 15-57 D8-68 15-57 00-00 00-00 00-00 00-00 00-00 00-00 01-01 F2-24>' - PASSED gtests.sh: #5353: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/295 68-byte object <27-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-1C FF-56 30-1C FF-56 30-1C FF-56 D0-68 15-57 DB-68 15-57 DB-68 15-57 00-00 00-00 00-00 00-00 00-00 00-00 01-01 F2-24>' - PASSED gtests.sh: #5354: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/296 68-byte object <28-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-56 0B-57 ED-56 0B-57 ED-56 0B-57 00-00 00-00 00-00 00-00 00-00 00-00 01-01 F2-24>' - PASSED gtests.sh: #5355: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/297 68-byte object <29-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-56 0B-57 EE-56 0B-57 EE-56 0B-57 00-00 00-00 00-00 00-00 00-00 00-00 01-01 F2-24>' - PASSED gtests.sh: #5356: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/298 68-byte object <2A-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-56 0B-57 F0-56 0B-57 F0-56 0B-57 00-00 00-00 00-00 00-00 00-00 00-00 01-01 F2-24>' - PASSED gtests.sh: #5357: 'WycheproofTestVector/Pkcs11ChaCha20Poly1305Test: TestVectors/299 68-byte object <2B-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 10-1C FF-56 30-1C FF-56 30-1C FF-56 E0-56 0B-57 F4-56 0B-57 F4-56 0B-57 00-00 00-00 00-00 00-00 00-00 00-00 01-01 F2-24>' - PASSED gtests.sh: #5358: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt/0 4229' - PASSED gtests.sh: #5359: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt/1 4226' - PASSED gtests.sh: #5360: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt/2 310' - PASSED gtests.sh: #5361: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt/3 307' - PASSED gtests.sh: #5362: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecrypt/0 4229' - PASSED gtests.sh: #5363: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecrypt/1 4226' - PASSED gtests.sh: #5364: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecrypt/2 310' - PASSED gtests.sh: #5365: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecrypt/3 307' - PASSED gtests.sh: #5366: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecryptTwoParts/0 4229' - PASSED gtests.sh: #5367: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecryptTwoParts/1 4226' - PASSED gtests.sh: #5368: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecryptTwoParts/2 310' - PASSED gtests.sh: #5369: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextEncryptDecryptTwoParts/3 307' - PASSED gtests.sh: #5370: 'EncryptDecrypt/Pkcs11CbcPadTest: FailDecryptSimple/0 4229' - PASSED gtests.sh: #5371: 'EncryptDecrypt/Pkcs11CbcPadTest: FailDecryptSimple/1 4226' - PASSED gtests.sh: #5372: 'EncryptDecrypt/Pkcs11CbcPadTest: FailDecryptSimple/2 310' - PASSED gtests.sh: #5373: 'EncryptDecrypt/Pkcs11CbcPadTest: FailDecryptSimple/3 307' - PASSED gtests.sh: #5374: 'EncryptDecrypt/Pkcs11CbcPadTest: FailEncryptSimple/0 4229' - PASSED gtests.sh: #5375: 'EncryptDecrypt/Pkcs11CbcPadTest: FailEncryptSimple/1 4226' - PASSED gtests.sh: #5376: 'EncryptDecrypt/Pkcs11CbcPadTest: FailEncryptSimple/2 310' - PASSED gtests.sh: #5377: 'EncryptDecrypt/Pkcs11CbcPadTest: FailEncryptSimple/3 307' - PASSED gtests.sh: #5378: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptSimple/0 4229' - PASSED gtests.sh: #5379: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptSimple/1 4226' - PASSED gtests.sh: #5380: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptSimple/2 310' - PASSED gtests.sh: #5381: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptSimple/3 307' - PASSED gtests.sh: #5382: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptInvalidBlockSize/0 4229' - PASSED gtests.sh: #5383: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptInvalidBlockSize/1 4226' - PASSED gtests.sh: #5384: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptInvalidBlockSize/2 310' - PASSED gtests.sh: #5385: 'EncryptDecrypt/Pkcs11CbcPadTest: ContextFailDecryptInvalidBlockSize/3 307' - PASSED gtests.sh: #5386: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_PaddingTooLong/0 4229' - PASSED gtests.sh: #5387: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_PaddingTooLong/1 4226' - PASSED gtests.sh: #5388: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_PaddingTooLong/2 310' - PASSED gtests.sh: #5389: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_PaddingTooLong/3 307' - PASSED gtests.sh: #5390: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding1/0 4229' - PASSED gtests.sh: #5391: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding1/1 4226' - PASSED gtests.sh: #5392: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding1/2 310' - PASSED gtests.sh: #5393: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding1/3 307' - PASSED gtests.sh: #5394: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding2/0 4229' - PASSED gtests.sh: #5395: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding2/1 4226' - PASSED gtests.sh: #5396: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding2/2 310' - PASSED gtests.sh: #5397: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortPadding2/3 307' - PASSED gtests.sh: #5398: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ZeroLengthPadding/0 4229' - PASSED gtests.sh: #5399: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ZeroLengthPadding/1 4226' - PASSED gtests.sh: #5400: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ZeroLengthPadding/2 310' - PASSED gtests.sh: #5401: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ZeroLengthPadding/3 307' - PASSED gtests.sh: #5402: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_OverflowPadding/0 4229' - PASSED gtests.sh: #5403: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_OverflowPadding/1 4226' - PASSED gtests.sh: #5404: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_OverflowPadding/2 310' - PASSED gtests.sh: #5405: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_OverflowPadding/3 307' - PASSED gtests.sh: #5406: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortValidPadding/0 4229' - PASSED gtests.sh: #5407: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortValidPadding/1 4226' - PASSED gtests.sh: #5408: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortValidPadding/2 310' - PASSED gtests.sh: #5409: 'EncryptDecrypt/Pkcs11CbcPadTest: EncryptDecrypt_ShortValidPadding/3 307' - PASSED gtests.sh: #5410: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/0 104-byte object <01-00 00-00 90-51 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-FF FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-F1 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 40-4E F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5411: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/1 104-byte object <02-00 00-00 50-44 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-41 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-54 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5412: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/2 104-byte object <03-00 00-00 40-4E F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-91 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-03 0E-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5413: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/3 104-byte object <04-00 00-00 E0-E5 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-03 0E-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-51 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-6C C1-56 80-00 00-00 80-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5414: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/4 104-byte object <05-00 00-00 30-58 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 02-00 00-00 33-66 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-72 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-54 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5415: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/5 104-byte object <06-00 00-00 90-88 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 04-00 00-00 32-37 64-39 00-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-91 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-E5 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5416: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/6 104-byte object <07-00 00-00 E0-54 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 06-00 00-00 35-30 62-34 32-38 00-FF FF-FF FF-FF FF-FF FF-FF C0-CA F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-C7 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5417: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/7 104-byte object <08-00 00-00 40-C4 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 08-00 00-00 30-62 39-32 36-32 65-63 00-FF FF-FF FF-FF FF-FF 00-C1 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-88 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5418: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/8 104-byte object <09-00 00-00 60-C7 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0A-00 00-00 65-61 61-39 31-32 37-33 65-37 00-FF FF-FF FF-FF 10-F3 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-EF F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5419: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/9 104-byte object <0A-00 00-00 40-C4 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0C-00 00-00 36-31 32-33 63-35 35-36 63-35 63-63 00-FF FF-FF 10-9A F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-51 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5420: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/10 104-byte object <0B-00 00-00 90-51 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0E-00 00-00 37-65 34-38 66-30 36-31 38-33 61-61 34-30 00-FF E0-54 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-88 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5421: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/11 104-byte object <0C-00 00-00 40-C4 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 10-9A F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-F6 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5422: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/12 104-byte object <0D-00 00-00 D0-F6 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 12-00 00-00 12-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 30-01 F6-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-FD F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5423: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/13 104-byte object <0E-00 00-00 40-C4 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 14-00 00-00 14-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 10-9A F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-17 F6-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5424: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/14 104-byte object <0F-00 00-00 60-17 F6-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 16-00 00-00 16-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 50-55 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-52 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5425: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/15 104-byte object <10-00 00-00 40-C4 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 18-00 00-00 18-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 10-9A F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF C0-67 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5426: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/16 104-byte object <11-00 00-00 C0-67 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 1A-00 00-00 1A-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 50-73 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-6F 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5427: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/17 104-byte object <12-00 00-00 40-C4 F5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-9A F5-56 1C-00 00-00 1C-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF B0-82 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-91 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5428: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/18 104-byte object <13-00 00-00 50-73 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-8D 0A-57 1E-00 00-00 1E-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 40-89 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-AA 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5429: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/19 104-byte object <14-00 00-00 80-D7 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-D3 0A-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 50-D0 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5430: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/20 104-byte object <15-00 00-00 A0-81 20-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-BC 0A-57 28-00 00-00 28-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 50-73 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5431: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/21 104-byte object <16-00 00-00 40-89 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 3E-00 00-00 3E-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-8D 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5432: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/22 104-byte object <17-00 00-00 80-8D 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-56 BD-56 50-00 00-00 50-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF D0-6F 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-88 0B-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5433: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/23 104-byte object <18-00 00-00 C0-F2 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-8D 0B-57 A0-00 00-00 A0-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 40-EE 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-8D 0B-57 C0-00 00-00 C0-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5434: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/24 104-byte object <19-00 00-00 C0-E6 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF F0-E2 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-DF 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5435: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/25 104-byte object <1A-00 00-00 90-EA 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 40-EE 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-08 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5436: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/26 104-byte object <1B-00 00-00 B0-00 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-FC 0A-57 1E-00 00-00 1E-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-F9 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF C0-E6 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5437: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/27 104-byte object <1C-00 00-00 90-EA 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-08 0B-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 40-EE 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5438: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/28 104-byte object <1D-00 00-00 40-EE 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-2A 0B-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF A0-26 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5439: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/29 104-byte object <1E-00 00-00 90-EA 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 50-08 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-2D 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5440: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/30 104-byte object <1F-00 00-00 F0-2D 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF A0-99 20-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-35 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5441: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/31 104-byte object <20-00 00-00 90-EA 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-08 0B-57 1E-00 00-00 1E-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 00-48 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-54 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5442: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/32 104-byte object <21-00 00-00 A0-99 20-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-51 0B-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF B0-4E 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5443: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/33 104-byte object <22-00 00-00 90-7D B5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF C0-DB 20-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 90-EA 0A-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5444: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/34 104-byte object <23-00 00-00 40-1E 22-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 50-3B 22-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-F4 21-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5445: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/35 104-byte object <24-00 00-00 00-DC 21-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-D4 1E-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-7D B5-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5446: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/36 104-byte object <25-00 00-00 80-27 23-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-D4 22-57 1E-00 00-00 1E-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 90-C8 22-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-78 FE-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5447: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/37 104-byte object <26-00 00-00 60-F8 1E-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-A6 23-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF A0-A2 23-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5448: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/38 104-byte object <27-00 00-00 60-40 23-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-46 23-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-27 23-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5449: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/39 104-byte object <28-00 00-00 90-C8 22-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 90-D4 22-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5450: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/40 104-byte object <29-00 00-00 90-D4 22-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-AC 21-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5451: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/41 104-byte object <2A-00 00-00 80-72 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-79 24-57 1E-00 00-00 1E-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 00-E3 13-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5452: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/42 104-byte object <2B-00 00-00 00-E3 13-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-F0 23-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 40-1E 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C9 0B-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5453: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/43 104-byte object <2C-00 00-00 80-72 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-79 24-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF A0-EB 13-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C9 0B-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5454: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/44 104-byte object <2D-00 00-00 A0-EB 13-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 60-8D 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-4A 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5455: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/45 104-byte object <2E-00 00-00 80-72 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 60-79 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-0A 25-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5456: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/46 104-byte object <2F-00 00-00 00-0A 25-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF C0-96 25-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF A0-4A 25-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5457: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/47 104-byte object <30-00 00-00 80-72 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-79 24-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5458: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/48 104-byte object <31-00 00-00 C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 20-C3 F9-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-B3 F9-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5459: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/49 104-byte object <32-00 00-00 80-72 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 60-79 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5460: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/50 104-byte object <33-00 00-00 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 40-44 F7-56 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF D0-2C F7-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5461: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/51 104-byte object <34-00 00-00 A0-46 23-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-27 23-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-72 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5462: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/52 104-byte object <35-00 00-00 80-72 24-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF A0-50 F7-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-35 12-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5463: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/53 104-byte object <36-00 00-00 20-35 12-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5464: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/54 104-byte object <37-00 00-00 C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-46 23-57 1E-00 00-00 1E-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-27 23-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EA 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5465: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/55 104-byte object <38-00 00-00 E0-ED 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-35 12-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5466: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/56 104-byte object <39-00 00-00 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-F2 0B-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 30-F2 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5467: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/57 104-byte object <3A-00 00-00 30-F2 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-50 F7-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5468: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/58 104-byte object <3B-00 00-00 A0-50 F7-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF E0-ED 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-35 12-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5469: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/59 104-byte object <3C-00 00-00 20-35 12-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF 00-F2 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5470: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/60 104-byte object <3D-00 00-00 00-F2 0B-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-F2 0B-57 22-00 00-00 22-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5471: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/61 104-byte object <3E-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-50 F7-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5472: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/62 104-byte object <3F-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF C0-0D 14-57 20-00 00-00 20-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF A0-50 F7-56 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5473: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/63 104-byte object <40-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-14 0C-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5474: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/64 104-byte object <41-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-14 0C-57 60-00 00-00 60-00 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-1F 0E-57 80-00 00-00 80-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5475: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/65 104-byte object <42-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 02-00 00-00 35-38 00-00 66-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5476: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/66 104-byte object <43-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 04-00 00-00 30-66 37-65 00-30 36-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5477: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/67 104-byte object <44-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 06-00 00-00 33-33 66-35 33-30 00-31 38-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5478: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/68 104-byte object <45-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 08-00 00-00 33-61 61-37 33-63 34-38 00-33 61-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5479: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/69 104-byte object <46-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0A-00 00-00 37-65 34-63 36-39 30-61 38-38 00-61 34-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5480: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/70 104-byte object <47-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0C-00 00-00 65-39 35-32 30-32 38-30 39-37 33-62 00-30 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5481: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/71 104-byte object <48-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0E-00 00-00 34-38 38-30 62-34 31-32 32-38 37-61 30-62 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5482: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/72 104-byte object <49-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5483: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/73 104-byte object <4A-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 12-00 00-00 12-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5484: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/74 104-byte object <4B-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 14-00 00-00 14-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5485: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/75 104-byte object <4C-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 16-00 00-00 16-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5486: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/76 104-byte object <4D-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 18-00 00-00 18-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5487: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/77 104-byte object <4E-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 1A-00 00-00 1A-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF C0-0D 14-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5488: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/78 104-byte object <4F-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF C0-0D 14-57 1C-00 00-00 1C-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 80-6E 1F-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-3F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5489: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/79 104-byte object <50-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-3F 0C-57 1E-00 00-00 1E-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 90-47 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-4B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5490: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/80 104-byte object <51-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-4B 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 80-4F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5491: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/81 104-byte object <52-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-4B 0C-57 28-00 00-00 28-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 80-4F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5492: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/82 104-byte object <53-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 3E-00 00-00 3E-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 70-4B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5493: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/83 104-byte object <54-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-56 BD-56 50-00 00-00 50-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 70-4B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-63 0C-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5494: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/84 104-byte object <55-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-69 0C-57 A0-00 00-00 A0-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 70-4B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-8D 0B-57 C0-00 00-00 C0-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5495: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/85 104-byte object <56-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 70-4B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-5B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5496: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/86 104-byte object <57-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 70-4B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-5B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5497: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/87 104-byte object <58-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-4B 0C-57 1E-00 00-00 1E-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 00-5B 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5498: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/88 104-byte object <59-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6F 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF E0-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5499: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/89 104-byte object <5A-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6F 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF E0-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5500: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/90 104-byte object <5B-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 80-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5501: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/91 104-byte object <5C-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 80-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5502: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/92 104-byte object <5D-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-6F 0C-57 1E-00 00-00 1E-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF E0-6F 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-76 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5503: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/93 104-byte object <5E-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-76 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-80 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5504: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/94 104-byte object <5F-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-76 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-80 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5505: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/95 104-byte object <60-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 10-76 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-80 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5506: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/96 104-byte object <61-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 10-76 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-80 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5507: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/97 104-byte object <62-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-76 0C-57 1E-00 00-00 1E-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-80 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5508: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/98 104-byte object <63-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 10-94 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5509: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/99 104-byte object <64-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 10-94 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5510: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/100 104-byte object <65-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5511: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/101 104-byte object <66-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5512: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/102 104-byte object <67-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 1E-00 00-00 1E-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5513: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/103 104-byte object <68-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-B3 0C-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5514: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/104 104-byte object <69-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-B3 0C-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5515: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/105 104-byte object <6A-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5516: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/106 104-byte object <6B-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5517: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/107 104-byte object <6C-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5518: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/108 104-byte object <6D-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5519: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/109 104-byte object <6E-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5520: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/110 104-byte object <6F-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5521: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/111 104-byte object <70-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5522: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/112 104-byte object <71-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5523: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/113 104-byte object <72-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5524: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/114 104-byte object <73-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 20-89 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5525: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/115 104-byte object <74-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 20-89 0C-57 1E-00 00-00 1E-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 50-9C 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5526: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/116 104-byte object <75-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5527: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/117 104-byte object <76-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-D3 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5528: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/118 104-byte object <77-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5529: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/119 104-byte object <78-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5530: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/120 104-byte object <79-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5531: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/121 104-byte object <7A-00 00-00 50-3D 0A-57 30-00 00-00 30-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-D3 0C-57 22-00 00-00 22-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5532: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/122 104-byte object <7B-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5533: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/123 104-byte object <7C-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF 90-DB 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5534: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/124 104-byte object <7D-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-07 0D-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5535: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/125 104-byte object <7E-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-07 0D-57 60-00 00-00 60-00 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-1F 0E-57 80-00 00-00 80-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5536: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/126 104-byte object <7F-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 02-00 00-00 34-30 00-00 62-34 31-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5537: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/127 104-byte object <80-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 04-00 00-00 36-36 30-31 00-34 31-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5538: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/128 104-byte object <81-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 06-00 00-00 66-31 64-33 30-30 00-32 32-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5539: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/129 104-byte object <82-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 08-00 00-00 32-61 65-36 33-63 62-66 00-38 37-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5540: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/130 104-byte object <83-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0A-00 00-00 61-66 33-61 30-31 35-65 61-31 00-61 30-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5541: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/131 104-byte object <84-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0C-00 00-00 33-66 35-36 39-33 35-64 65-66 33-66 00-62 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5542: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/132 104-byte object <85-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 0E-00 00-00 35-37 62-62 38-36 62-65 65-64 31-35 36-66 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5543: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/133 104-byte object <86-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5544: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/134 104-byte object <87-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 12-00 00-00 12-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5545: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/135 104-byte object <88-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 14-00 00-00 14-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5546: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/136 104-byte object <89-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 16-00 00-00 16-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5547: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/137 104-byte object <8A-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 18-00 00-00 18-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5548: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/138 104-byte object <8B-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 1A-00 00-00 1A-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF B0-D3 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5549: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/139 104-byte object <8C-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-D3 0C-57 1C-00 00-00 1C-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF F0-FA 0C-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-3A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5550: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/140 104-byte object <8D-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 60-3A 0D-57 1E-00 00-00 1E-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 40-42 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-46 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5551: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/141 104-byte object <8E-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-46 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 50-4A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5552: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/142 104-byte object <8F-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-46 0D-57 28-00 00-00 28-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 50-4A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5553: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/143 104-byte object <90-00 00-00 60-EB 09-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 3E-00 00-00 3E-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 30-46 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5554: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/144 104-byte object <91-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF B0-56 BD-56 50-00 00-00 50-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 30-46 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 10-EB 09-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5555: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/145 104-byte object <92-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-64 0D-57 A0-00 00-00 A0-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 30-46 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-8D 0B-57 C0-00 00-00 C0-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 01-FF FF-FF>' - PASSED gtests.sh: #5556: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/146 104-byte object <93-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 30-46 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-56 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5557: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/147 104-byte object <94-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 30-46 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-56 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5558: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/148 104-byte object <95-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-46 0D-57 1E-00 00-00 1E-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF F0-56 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5559: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/149 104-byte object <96-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-6A 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5560: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/150 104-byte object <97-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-6A 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5561: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/151 104-byte object <98-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 70-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5562: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/152 104-byte object <99-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 70-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5563: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/153 104-byte object <9A-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-6A 0D-57 1E-00 00-00 1E-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-6A 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-70 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5564: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/154 104-byte object <9B-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-70 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF E0-7C 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5565: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/155 104-byte object <9C-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-70 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF E0-7C 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5566: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/156 104-byte object <9D-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 80-70 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-7C 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5567: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/157 104-byte object <9E-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 80-70 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF E0-7C 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5568: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/158 104-byte object <9F-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-70 0D-57 1E-00 00-00 1E-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF E0-7C 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5569: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/159 104-byte object <A0-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF E0-90 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5570: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/160 104-byte object <A1-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF E0-90 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5571: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/161 104-byte object <A2-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5572: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/162 104-byte object <A3-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5573: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/163 104-byte object <A4-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 1E-00 00-00 1E-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5574: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/164 104-byte object <A5-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-B1 0D-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5575: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/165 104-byte object <A6-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-B1 0D-57 60-00 00-00 60-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5576: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/166 104-byte object <A7-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5577: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/167 104-byte object <A8-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5578: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/168 104-byte object <A9-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5579: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/169 104-byte object <AA-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5580: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/170 104-byte object <AB-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5581: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/171 104-byte object <AC-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5582: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/172 104-byte object <AD-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5583: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/173 104-byte object <AE-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5584: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/174 104-byte object <AF-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5585: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/175 104-byte object <B0-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF D0-84 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5586: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/176 104-byte object <B1-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF D0-84 0D-57 1E-00 00-00 1E-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF A0-98 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-D1 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5587: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/177 104-byte object <B2-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-D1 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 80-D9 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5588: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/178 104-byte object <B3-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-D1 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 80-D9 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5589: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/179 104-byte object <B4-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF A4-E7 09-57 00-00 00-00 00-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 30-D1 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-D9 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5590: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/180 104-byte object <B5-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF F0-C6 1C-57 10-00 00-00 10-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 30-D1 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 80-D9 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5591: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/181 104-byte object <B6-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-D1 0D-57 20-00 00-00 20-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 80-D9 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5592: 'WycheproofTestVector/Pkcs11AesCbcWycheproofTest: TestVectors/182 104-byte object <B7-00 00-00 40-3C 0A-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 30-D1 0D-57 22-00 00-00 22-00 00-00 38-36 62-65 65-64 31-35 36-66 00-FF 80-D9 0D-57 20-00 00-00 20-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 70-52 0D-57 40-00 00-00 40-00 00-00 FF-FF FF-FF FF-FF FF-FF FF-FF FF-FF 00-FF FF-FF>' - PASSED gtests.sh: #5593: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/0 64-byte object <01-00 00-00 F0-BD 15-57 00-BE 15-57 00-BE 15-57 10-BE 15-57 20-BE 15-57 20-BE 15-57 30-BE 15-57 48-BE 15-57 48-BE 15-57 31-64 34-32 00-00 00-00 40-33 17-57 40-33 17-57 60-33 17-57 02-00 00-00>' - PASSED gtests.sh: #5594: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/1 64-byte object <02-00 00-00 E0-AA 14-57 F0-AA 14-57 F0-AA 14-57 00-AB 14-57 10-AB 14-57 10-AB 14-57 20-AB 14-57 38-AB 14-57 38-AB 14-57 31-64 34-32 00-00 00-00 D0-22 17-57 D0-22 17-57 B0-9D 16-57 02-00 00-00>' - PASSED gtests.sh: #5595: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/2 64-byte object <03-00 00-00 F0-BD 15-57 00-BE 15-57 00-BE 15-57 80-33 17-57 90-33 17-57 90-33 17-57 60-33 17-57 78-33 17-57 78-33 17-57 31-64 34-32 00-00 00-00 40-33 17-57 40-33 17-57 30-BE 15-57 02-00 00-00>' - PASSED gtests.sh: #5596: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/3 64-byte object <04-00 00-00 30-BE 15-57 40-BE 15-57 40-BE 15-57 20-EA 19-57 38-EA 19-57 38-EA 19-57 50-1D 1E-57 70-1D 1E-57 70-1D 1E-57 31-64 34-32 00-00 00-00 E0-AA 14-57 E0-AA 14-57 20-AF 19-57 02-00 00-00>' - PASSED gtests.sh: #5597: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/4 64-byte object <05-00 00-00 20-AF 19-57 30-AF 19-57 30-AF 19-57 B0-9D 16-57 C8-9D 16-57 C8-9D 16-57 50-1D 1E-57 70-1D 1E-57 70-1D 1E-57 31-64 34-32 00-00 00-00 D0-22 17-57 D0-22 17-57 20-AB 14-57 02-00 00-00>' - PASSED gtests.sh: #5598: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/5 64-byte object <06-00 00-00 40-33 17-57 50-33 17-57 50-33 17-57 60-33 17-57 78-33 17-57 78-33 17-57 50-1D 1E-57 70-1D 1E-57 70-1D 1E-57 31-64 34-32 00-00 00-00 30-BE 15-57 30-BE 15-57 E0-AA 14-57 02-00 00-00>' - PASSED gtests.sh: #5599: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/6 64-byte object <07-00 00-00 E0-AA 14-57 F0-AA 14-57 F0-AA 14-57 50-1D 1E-57 70-1D 1E-57 70-1D 1E-57 B0-41 20-57 D8-41 20-57 D8-41 20-57 31-64 34-32 00-00 00-00 00-AB 14-57 00-AB 14-57 20-EA 19-57 02-00 00-00>' - PASSED gtests.sh: #5600: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/7 64-byte object <08-00 00-00 00-AB 14-57 10-AB 14-57 10-AB 14-57 50-1D 1E-57 70-1D 1E-57 70-1D 1E-57 B0-41 20-57 D8-41 20-57 D8-41 20-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 20-AF 19-57 02-00 00-00>' - PASSED gtests.sh: #5601: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/8 64-byte object <09-00 00-00 20-EA 19-57 30-EA 19-57 30-EA 19-57 50-1D 1E-57 70-1D 1E-57 70-1D 1E-57 B0-41 20-57 D8-41 20-57 D8-41 20-57 31-64 34-32 00-00 00-00 20-AF 19-57 20-AF 19-57 F0-BD 15-57 02-00 00-00>' - PASSED gtests.sh: #5602: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/9 64-byte object <0A-00 00-00 20-AF 19-57 30-AF 19-57 30-AF 19-57 D0-E4 09-57 50-E6 09-57 50-E6 09-57 30-15 0A-57 B8-16 0A-57 B8-16 0A-57 31-64 34-32 00-00 00-00 F0-BD 15-57 F0-BD 15-57 20-AB 14-57 02-00 00-00>' - PASSED gtests.sh: #5603: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/10 64-byte object <0B-00 00-00 F0-BD 15-57 00-BE 15-57 00-BE 15-57 00-00 00-00 00-00 00-00 00-00 00-00 60-0E 18-57 68-0E 18-57 68-0E 18-57 31-64 34-32 00-00 00-00 20-AB 14-57 20-AB 14-57 D0-22 17-57 02-00 00-00>' - PASSED gtests.sh: #5604: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/11 64-byte object <0C-00 00-00 20-AB 14-57 30-AB 14-57 30-AB 14-57 60-0E 18-57 68-0E 18-57 68-0E 18-57 D0-22 17-57 E0-22 17-57 E0-22 17-57 31-64 34-32 00-00 00-00 40-33 17-57 40-33 17-57 E0-AA 14-57 02-00 00-00>' - PASSED gtests.sh: #5605: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/12 64-byte object <0D-00 00-00 E0-AA 14-57 F0-AA 14-57 F0-AA 14-57 60-0E 18-57 61-0E 18-57 61-0E 18-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 00-AB 14-57 00-AB 14-57 20-EA 19-57 02-00 00-00>' - PASSED gtests.sh: #5606: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/13 64-byte object <0E-00 00-00 00-AB 14-57 10-AB 14-57 10-AB 14-57 60-0E 18-57 62-0E 18-57 62-0E 18-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 20-AF 19-57 02-00 00-00>' - PASSED gtests.sh: #5607: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/14 64-byte object <0F-00 00-00 20-EA 19-57 30-EA 19-57 30-EA 19-57 60-0E 18-57 63-0E 18-57 63-0E 18-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 20-AF 19-57 20-AF 19-57 F0-BD 15-57 02-00 00-00>' - PASSED gtests.sh: #5608: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/15 64-byte object <10-00 00-00 20-AF 19-57 30-AF 19-57 30-AF 19-57 60-0E 18-57 64-0E 18-57 64-0E 18-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 F0-BD 15-57 F0-BD 15-57 A0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5609: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/16 64-byte object <11-00 00-00 F0-BD 15-57 00-BE 15-57 00-BE 15-57 30-A1 19-57 35-A1 19-57 35-A1 19-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 A0-25 0A-57 A0-25 0A-57 C0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5610: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/17 64-byte object <12-00 00-00 A0-25 0A-57 B0-25 0A-57 B0-25 0A-57 30-A1 19-57 36-A1 19-57 36-A1 19-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 C0-25 0A-57 C0-25 0A-57 C0-25 0A-57 01-00 00-00>' - PASSED gtests.sh: #5611: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/18 64-byte object <13-00 00-00 A0-25 0A-57 B0-25 0A-57 B0-25 0A-57 30-A1 19-57 37-A1 19-57 37-A1 19-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 C0-25 0A-57 C0-25 0A-57 20-AB 14-57 02-00 00-00>' - PASSED gtests.sh: #5612: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/19 64-byte object <14-00 00-00 C0-25 0A-57 D0-25 0A-57 D0-25 0A-57 20-AB 14-57 34-AB 14-57 34-AB 14-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 E0-AA 14-57 E0-AA 14-57 00-AB 14-57 02-00 00-00>' - PASSED gtests.sh: #5613: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/20 64-byte object <15-00 00-00 00-AB 14-57 10-AB 14-57 10-AB 14-57 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 B0-38 0A-57 02-00 00-00>' - PASSED gtests.sh: #5614: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/21 64-byte object <16-00 00-00 20-EA 19-57 30-EA 19-57 30-EA 19-57 00-00 00-00 00-00 00-00 00-00 00-00 30-A1 19-57 31-A1 19-57 31-A1 19-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 D0-38 0A-57 02-00 00-00>' - PASSED gtests.sh: #5615: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/22 64-byte object <17-00 00-00 B0-38 0A-57 C0-38 0A-57 C0-38 0A-57 00-00 00-00 00-00 00-00 00-00 00-00 30-A1 19-57 34-A1 19-57 34-A1 19-57 31-64 34-32 00-00 00-00 D0-38 0A-57 D0-38 0A-57 A0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5616: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/23 64-byte object <18-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 00-00 00-00 00-00 00-00 00-00 00-00 30-A1 19-57 38-A1 19-57 38-A1 19-57 31-64 34-32 00-00 00-00 A0-25 0A-57 A0-25 0A-57 90-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5617: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/24 64-byte object <19-00 00-00 A0-25 0A-57 B0-25 0A-57 B0-25 0A-57 00-00 00-00 00-00 00-00 00-00 00-00 90-AE 21-57 9F-AE 21-57 9F-AE 21-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5618: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/25 64-byte object <1A-00 00-00 C0-25 0A-57 D0-25 0A-57 D0-25 0A-57 00-00 00-00 00-00 00-00 00-00 00-00 00-AB 14-57 11-AB 14-57 11-AB 14-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 B0-38 0A-57 02-00 00-00>' - PASSED gtests.sh: #5619: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/26 64-byte object <1B-00 00-00 B0-38 0A-57 C0-38 0A-57 C0-38 0A-57 00-00 00-00 00-00 00-00 00-00 00-00 D0-38 0A-57 E4-38 0A-57 E4-38 0A-57 31-64 34-32 00-00 00-00 E0-37 0E-57 E0-37 0E-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5620: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/27 64-byte object <1C-00 00-00 00-38 0E-57 10-38 0E-57 10-38 0E-57 A0-25 0A-57 B0-25 0A-57 B0-25 0A-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 31-64 34-32 00-00 00-00 90-AE 21-57 90-AE 21-57 C0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5621: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/28 64-byte object <1C-00 00-00 00-AB 14-57 10-AB 14-57 10-AB 14-57 B0-38 0A-57 C0-38 0A-57 C0-38 0A-57 E0-37 0E-57 F9-37 0E-57 F9-37 0E-57 31-64 34-32 00-00 00-00 D0-38 0A-57 D0-38 0A-57 D0-38 0A-57 01-00 00-00>' - PASSED gtests.sh: #5622: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/29 64-byte object <1D-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 D0-41 0E-57 E0-41 0E-57 E0-41 0E-57 00-38 0E-57 18-38 0E-57 18-38 0E-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 C0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5623: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/30 64-byte object <1E-00 00-00 B0-AE 21-57 C0-AE 21-57 C0-AE 21-57 00-AB 14-57 10-AB 14-57 10-AB 14-57 E0-37 0E-57 F8-37 0E-57 F8-37 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 90-47 0E-57 02-00 00-00>' - PASSED gtests.sh: #5624: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/31 64-byte object <1F-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 90-AE 21-57 A0-AE 21-57 A0-AE 21-57 C0-25 0A-57 D8-25 0A-57 D8-25 0A-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5625: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/32 64-byte object <20-00 00-00 B0-AE 21-57 C0-AE 21-57 C0-AE 21-57 10-48 0E-57 20-48 0E-57 20-48 0E-57 90-47 0E-57 A8-47 0E-57 A8-47 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 E0-37 0E-57 02-00 00-00>' - PASSED gtests.sh: #5626: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/33 64-byte object <21-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 40-4B 0E-57 50-4B 0E-57 50-4B 0E-57 00-38 0E-57 18-38 0E-57 18-38 0E-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 C0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5627: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/34 64-byte object <22-00 00-00 B0-AE 21-57 C0-AE 21-57 C0-AE 21-57 70-4E 0E-57 80-4E 0E-57 80-4E 0E-57 E0-37 0E-57 F8-37 0E-57 F8-37 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 90-47 0E-57 02-00 00-00>' - PASSED gtests.sh: #5628: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/35 64-byte object <23-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 A0-51 0E-57 B0-51 0E-57 B0-51 0E-57 C0-25 0A-57 D8-25 0A-57 D8-25 0A-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5629: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/36 64-byte object <24-00 00-00 B0-AE 21-57 C0-AE 21-57 C0-AE 21-57 D0-54 0E-57 E0-54 0E-57 E0-54 0E-57 90-47 0E-57 A8-47 0E-57 A8-47 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 E0-37 0E-57 02-00 00-00>' - PASSED gtests.sh: #5630: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/37 64-byte object <25-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 00-58 0E-57 10-58 0E-57 10-58 0E-57 00-38 0E-57 18-38 0E-57 18-38 0E-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 C0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5631: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/38 64-byte object <26-00 00-00 B0-AE 21-57 C0-AE 21-57 C0-AE 21-57 30-5B 0E-57 40-5B 0E-57 40-5B 0E-57 E0-37 0E-57 F8-37 0E-57 F8-37 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 90-47 0E-57 02-00 00-00>' - PASSED gtests.sh: #5632: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/39 64-byte object <27-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 60-5E 0E-57 70-5E 0E-57 70-5E 0E-57 C0-25 0A-57 D8-25 0A-57 D8-25 0A-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5633: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/40 64-byte object <28-00 00-00 B0-AE 21-57 C0-AE 21-57 C0-AE 21-57 90-61 0E-57 A0-61 0E-57 A0-61 0E-57 90-47 0E-57 A8-47 0E-57 A8-47 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 E0-37 0E-57 02-00 00-00>' - PASSED gtests.sh: #5634: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/41 64-byte object <29-00 00-00 D0-38 0A-57 E0-38 0A-57 E0-38 0A-57 C0-64 0E-57 D0-64 0E-57 D0-64 0E-57 00-38 0E-57 18-38 0E-57 18-38 0E-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 C0-25 0A-57 02-00 00-00>' - PASSED gtests.sh: #5635: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/42 64-byte object <2A-00 00-00 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 F0-67 0E-57 00-68 0E-57 00-68 0E-57 E0-37 0E-57 F8-37 0E-57 F8-37 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 90-47 0E-57 02-00 00-00>' - PASSED gtests.sh: #5636: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/43 64-byte object <2B-00 00-00 D0-38 0A-57 E8-38 0A-57 E8-38 0A-57 20-6B 0E-57 30-6B 0E-57 30-6B 0E-57 C0-25 0A-57 D8-25 0A-57 D8-25 0A-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5637: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/44 64-byte object <2C-00 00-00 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 50-6E 0E-57 60-6E 0E-57 60-6E 0E-57 90-47 0E-57 A8-47 0E-57 A8-47 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 E0-37 0E-57 02-00 00-00>' - PASSED gtests.sh: #5638: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/45 64-byte object <2D-00 00-00 D0-38 0A-57 E8-38 0A-57 E8-38 0A-57 80-71 0E-57 98-71 0E-57 98-71 0E-57 F0-78 0E-57 10-79 0E-57 10-79 0E-57 31-64 34-32 00-00 00-00 00-38 0E-57 00-38 0E-57 20-EA 19-57 02-00 00-00>' - PASSED gtests.sh: #5639: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/46 64-byte object <2E-00 00-00 20-EA 19-57 38-EA 19-57 38-EA 19-57 E0-77 0E-57 F8-77 0E-57 F8-77 0E-57 F0-78 0E-57 10-79 0E-57 10-79 0E-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 B0-74 0E-57 02-00 00-00>' - PASSED gtests.sh: #5640: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/47 64-byte object <2F-00 00-00 B0-74 0E-57 C8-74 0E-57 C8-74 0E-57 E0-37 0E-57 F8-37 0E-57 F8-37 0E-57 F0-78 0E-57 10-79 0E-57 10-79 0E-57 31-64 34-32 00-00 00-00 B0-38 0A-57 B0-38 0A-57 90-47 0E-57 02-00 00-00>' - PASSED gtests.sh: #5641: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/48 64-byte object <30-00 00-00 90-47 0E-57 A8-47 0E-57 A8-47 0E-57 F0-78 0E-57 10-79 0E-57 10-79 0E-57 30-7E 0E-57 58-7E 0E-57 58-7E 0E-57 31-64 34-32 00-00 00-00 D0-38 0A-57 D0-38 0A-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5642: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/49 64-byte object <31-00 00-00 D0-38 0A-57 E8-38 0A-57 E8-38 0A-57 F0-78 0E-57 10-79 0E-57 10-79 0E-57 30-7E 0E-57 58-7E 0E-57 58-7E 0E-57 31-64 34-32 00-00 00-00 00-38 0E-57 00-38 0E-57 80-71 0E-57 02-00 00-00>' - PASSED gtests.sh: #5643: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/50 64-byte object <32-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 F0-78 0E-57 10-79 0E-57 10-79 0E-57 30-7E 0E-57 58-7E 0E-57 58-7E 0E-57 31-64 34-32 00-00 00-00 80-71 0E-57 80-71 0E-57 20-EA 19-57 02-00 00-00>' - PASSED gtests.sh: #5644: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/51 64-byte object <33-00 00-00 80-71 0E-57 98-71 0E-57 98-71 0E-57 D0-E4 09-57 50-E6 09-57 50-E6 09-57 30-15 0A-57 B8-16 0A-57 B8-16 0A-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5645: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/52 64-byte object <34-00 00-00 20-EA 19-57 38-EA 19-57 38-EA 19-57 00-00 00-00 00-00 00-00 00-00 00-00 30-A1 19-57 38-A1 19-57 38-A1 19-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 E0-77 0E-57 02-00 00-00>' - PASSED gtests.sh: #5646: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/53 64-byte object <35-00 00-00 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 30-A1 19-57 38-A1 19-57 38-A1 19-57 E0-77 0E-57 F0-77 0E-57 F0-77 0E-57 31-64 34-32 00-00 00-00 B0-74 0E-57 B0-74 0E-57 90-47 0E-57 02-00 00-00>' - PASSED gtests.sh: #5647: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/54 64-byte object <36-00 00-00 90-47 0E-57 A8-47 0E-57 A8-47 0E-57 C0-34 1A-57 C1-34 1A-57 C1-34 1A-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 D0-38 0A-57 D0-38 0A-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5648: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/55 64-byte object <37-00 00-00 D0-38 0A-57 E8-38 0A-57 E8-38 0A-57 C0-34 1A-57 C2-34 1A-57 C2-34 1A-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 00-38 0E-57 00-38 0E-57 80-71 0E-57 02-00 00-00>' - PASSED gtests.sh: #5649: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/56 64-byte object <38-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 C0-34 1A-57 C3-34 1A-57 C3-34 1A-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 80-71 0E-57 80-71 0E-57 20-EA 19-57 02-00 00-00>' - PASSED gtests.sh: #5650: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/57 64-byte object <39-00 00-00 80-71 0E-57 98-71 0E-57 98-71 0E-57 C0-34 1A-57 C4-34 1A-57 C4-34 1A-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 90-97 0E-57 02-00 00-00>' - PASSED gtests.sh: #5651: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/58 64-byte object <3A-00 00-00 20-EA 19-57 38-EA 19-57 38-EA 19-57 C0-34 1A-57 C5-34 1A-57 C5-34 1A-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 B0-97 0E-57 02-00 00-00>' - PASSED gtests.sh: #5652: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/59 64-byte object <3B-00 00-00 90-97 0E-57 A8-97 0E-57 A8-97 0E-57 C0-34 1A-57 C6-34 1A-57 C6-34 1A-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 B0-97 0E-57 B0-97 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5653: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/60 64-byte object <3C-00 00-00 B0-97 0E-57 C8-97 0E-57 C8-97 0E-57 C0-34 1A-57 C7-34 1A-57 C7-34 1A-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 90-47 0E-57 02-00 00-00>' - PASSED gtests.sh: #5654: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/61 64-byte object <3D-00 00-00 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 90-47 0E-57 A4-47 0E-57 A4-47 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 D0-38 0A-57 D0-38 0A-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5655: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/62 64-byte object <3E-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 80-71 0E-57 80-71 0E-57 20-EA 19-57 02-00 00-00>' - PASSED gtests.sh: #5656: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/63 64-byte object <3F-00 00-00 80-71 0E-57 98-71 0E-57 98-71 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 C0-34 1A-57 C1-34 1A-57 C1-34 1A-57 31-64 34-32 00-00 00-00 20-EA 19-57 20-EA 19-57 90-97 0E-57 02-00 00-00>' - PASSED gtests.sh: #5657: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/64 64-byte object <40-00 00-00 20-EA 19-57 38-EA 19-57 38-EA 19-57 00-00 00-00 00-00 00-00 00-00 00-00 30-43 CC-56 34-43 CC-56 34-43 CC-56 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 B0-97 0E-57 02-00 00-00>' - PASSED gtests.sh: #5658: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/65 64-byte object <41-00 00-00 90-97 0E-57 A8-97 0E-57 A8-97 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 30-43 CC-56 38-43 CC-56 38-43 CC-56 31-64 34-32 00-00 00-00 B0-97 0E-57 B0-97 0E-57 A0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5659: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/66 64-byte object <42-00 00-00 B0-97 0E-57 C8-97 0E-57 C8-97 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 A0-AE 0E-57 AF-AE 0E-57 AF-AE 0E-57 31-64 34-32 00-00 00-00 C0-AE 0E-57 C0-AE 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5660: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/67 64-byte object <43-00 00-00 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 00-00 00-00 00-00 00-00 00-00 00-00 00-38 0E-57 11-38 0E-57 11-38 0E-57 31-64 34-32 00-00 00-00 80-71 0E-57 80-71 0E-57 20-EA 19-57 02-00 00-00>' - PASSED gtests.sh: #5661: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/68 64-byte object <44-00 00-00 20-EA 19-57 38-EA 19-57 38-EA 19-57 00-00 00-00 00-00 00-00 00-00 00-00 90-97 0E-57 A4-97 0E-57 A4-97 0E-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5662: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/69 64-byte object <45-00 00-00 90-BD 0E-57 A8-BD 0E-57 A8-BD 0E-57 B0-97 0E-57 C0-97 0E-57 C0-97 0E-57 C0-AE 0E-57 D9-AE 0E-57 D9-AE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5663: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/70 64-byte object <46-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 20-EA 19-57 30-EA 19-57 30-EA 19-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 E0-C6 0E-57 02-00 00-00>' - PASSED gtests.sh: #5664: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/71 64-byte object <47-00 00-00 90-BD 0E-57 A8-BD 0E-57 A8-BD 0E-57 80-71 0E-57 90-71 0E-57 90-71 0E-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5665: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/72 64-byte object <48-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 60-C7 0E-57 70-C7 0E-57 70-C7 0E-57 E0-C6 0E-57 F8-C6 0E-57 F8-C6 0E-57 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5666: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/73 64-byte object <49-00 00-00 90-BD 0E-57 A8-BD 0E-57 A8-BD 0E-57 90-CA 0E-57 A0-CA 0E-57 A0-CA 0E-57 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5667: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/74 64-byte object <4A-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 C0-CD 0E-57 D0-CD 0E-57 D0-CD 0E-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 E0-C6 0E-57 02-00 00-00>' - PASSED gtests.sh: #5668: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/75 64-byte object <4B-00 00-00 90-BD 0E-57 A8-BD 0E-57 A8-BD 0E-57 F0-D0 0E-57 00-D1 0E-57 00-D1 0E-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5669: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/76 64-byte object <4C-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 20-D4 0E-57 30-D4 0E-57 30-D4 0E-57 E0-C6 0E-57 F8-C6 0E-57 F8-C6 0E-57 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5670: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/77 64-byte object <4D-00 00-00 90-BD 0E-57 A8-BD 0E-57 A8-BD 0E-57 50-D7 0E-57 60-D7 0E-57 60-D7 0E-57 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5671: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/78 64-byte object <4E-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 80-DA 0E-57 90-DA 0E-57 90-DA 0E-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 E0-C6 0E-57 02-00 00-00>' - PASSED gtests.sh: #5672: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/79 64-byte object <4F-00 00-00 90-BD 0E-57 A8-BD 0E-57 A8-BD 0E-57 B0-DD 0E-57 C0-DD 0E-57 C0-DD 0E-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5673: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/80 64-byte object <50-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 E0-E0 0E-57 F0-E0 0E-57 F0-E0 0E-57 E0-C6 0E-57 F8-C6 0E-57 F8-C6 0E-57 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5674: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/81 64-byte object <51-00 00-00 90-BD 0E-57 A8-BD 0E-57 A8-BD 0E-57 10-E4 0E-57 20-E4 0E-57 20-E4 0E-57 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5675: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/82 64-byte object <52-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 90-97 0E-57 02-00 00-00>' - PASSED gtests.sh: #5676: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/83 64-byte object <53-00 00-00 90-97 0E-57 A8-97 0E-57 A8-97 0E-57 A0-ED 0E-57 B8-ED 0E-57 B8-ED 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 70-EA 0E-57 02-00 00-00>' - PASSED gtests.sh: #5677: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/84 64-byte object <54-00 00-00 70-EA 0E-57 88-EA 0E-57 88-EA 0E-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5678: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/85 64-byte object <55-00 00-00 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 00-38 0E-57 18-38 0E-57 18-38 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 40-E7 0E-57 02-00 00-00>' - PASSED gtests.sh: #5679: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/86 64-byte object <56-00 00-00 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 90-97 0E-57 A8-97 0E-57 A8-97 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 A0-ED 0E-57 02-00 00-00>' - PASSED gtests.sh: #5680: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/87 64-byte object <57-00 00-00 A0-ED 0E-57 B8-ED 0E-57 B8-ED 0E-57 70-EA 0E-57 88-EA 0E-57 88-EA 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5681: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/88 64-byte object <58-00 00-00 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 00-38 0E-57 02-00 00-00>' - PASSED gtests.sh: #5682: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/89 64-byte object <59-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 90-97 0E-57 02-00 00-00>' - PASSED gtests.sh: #5683: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/90 64-byte object <5A-00 00-00 90-97 0E-57 A8-97 0E-57 A8-97 0E-57 A0-ED 0E-57 B8-ED 0E-57 B8-ED 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 70-EA 0E-57 02-00 00-00>' - PASSED gtests.sh: #5684: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/91 64-byte object <5B-00 00-00 70-EA 0E-57 88-EA 0E-57 88-EA 0E-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5685: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/92 64-byte object <5C-00 00-00 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 00-38 0E-57 18-38 0E-57 18-38 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 40-E7 0E-57 02-00 00-00>' - PASSED gtests.sh: #5686: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/93 64-byte object <5D-00 00-00 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 90-97 0E-57 A8-97 0E-57 A8-97 0E-57 B0-EE 0E-57 D0-EE 0E-57 D0-EE 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 A0-ED 0E-57 02-00 00-00>' - PASSED gtests.sh: #5687: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/94 64-byte object <5E-00 00-00 A0-ED 0E-57 B8-ED 0E-57 B8-ED 0E-57 70-EA 0E-57 80-EA 0E-57 80-EA 0E-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5688: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/95 64-byte object <5F-00 00-00 00-38 0E-57 18-38 0E-57 18-38 0E-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 30-11 0F-57 50-11 0F-57 50-11 0F-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 90-97 0E-57 02-00 00-00>' - PASSED gtests.sh: #5689: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/96 64-byte object <60-00 00-00 30-11 0F-57 50-11 0F-57 50-11 0F-57 90-97 0E-57 A0-97 0E-57 A0-97 0E-57 30-18 0F-57 48-18 0F-57 48-18 0F-57 31-64 34-32 00-00 00-00 A0-ED 0E-57 A0-ED 0E-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5690: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/97 64-byte object <61-00 00-00 30-11 0F-57 50-11 0F-57 50-11 0F-57 90-BD 0E-57 A0-BD 0E-57 A0-BD 0E-57 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5691: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/98 64-byte object <62-00 00-00 30-11 0F-57 50-11 0F-57 50-11 0F-57 70-BD 0E-57 80-BD 0E-57 80-BD 0E-57 00-38 0E-57 18-38 0E-57 18-38 0E-57 31-64 34-32 00-00 00-00 A0-AE 0E-57 A0-AE 0E-57 40-E7 0E-57 02-00 00-00>' - PASSED gtests.sh: #5692: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/99 64-byte object <63-00 00-00 30-11 0F-57 50-11 0F-57 50-11 0F-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 60-21 0F-57 80-21 0F-57 80-21 0F-57 31-64 34-32 00-00 00-00 90-97 0E-57 90-97 0E-57 A0-ED 0E-57 02-00 00-00>' - PASSED gtests.sh: #5693: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/100 64-byte object <64-00 00-00 30-11 0F-57 50-11 0F-57 50-11 0F-57 90-97 0E-57 A8-97 0E-57 A8-97 0E-57 60-21 0F-57 80-21 0F-57 80-21 0F-57 31-64 34-32 00-00 00-00 A0-ED 0E-57 A0-ED 0E-57 30-18 0F-57 02-00 00-00>' - PASSED gtests.sh: #5694: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/101 64-byte object <65-00 00-00 30-11 0F-57 50-11 0F-57 50-11 0F-57 A0-ED 0E-57 B8-ED 0E-57 B8-ED 0E-57 60-21 0F-57 80-21 0F-57 80-21 0F-57 31-64 34-32 00-00 00-00 30-18 0F-57 30-18 0F-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5695: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/102 64-byte object <66-00 00-00 30-11 0F-57 50-11 0F-57 50-11 0F-57 60-21 0F-57 80-21 0F-57 80-21 0F-57 40-28 0F-57 68-28 0F-57 68-28 0F-57 31-64 34-32 00-00 00-00 30-18 0F-57 30-18 0F-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5696: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/103 64-byte object <67-00 00-00 40-28 0F-57 60-28 0F-57 60-28 0F-57 80-2B 0F-57 A0-2B 0F-57 A0-2B 0F-57 D0-2E 0F-57 F8-2E 0F-57 F8-2E 0F-57 31-64 34-32 00-00 00-00 30-18 0F-57 30-18 0F-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5697: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/104 64-byte object <68-00 00-00 D0-2E 0F-57 F0-2E 0F-57 F0-2E 0F-57 50-32 0F-57 70-32 0F-57 70-32 0F-57 80-32 0F-57 A8-32 0F-57 A8-32 0F-57 31-64 34-32 00-00 00-00 30-18 0F-57 30-18 0F-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5698: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/105 64-byte object <69-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 D0-E4 09-57 50-E6 09-57 50-E6 09-57 30-15 0A-57 B8-16 0A-57 B8-16 0A-57 31-64 34-32 00-00 00-00 30-18 0F-57 30-18 0F-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5699: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/106 64-byte object <6A-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 30-43 CC-56 38-43 CC-56 38-43 CC-56 31-64 34-32 00-00 00-00 30-18 0F-57 30-18 0F-57 90-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5700: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/107 64-byte object <6B-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-43 CC-56 38-43 CC-56 38-43 CC-56 30-18 0F-57 40-18 0F-57 40-18 0F-57 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5701: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/108 64-byte object <6C-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-43 CC-56 31-43 CC-56 31-43 CC-56 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5702: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/109 64-byte object <6D-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-43 CC-56 32-43 CC-56 32-43 CC-56 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5703: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/110 64-byte object <6E-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-43 CC-56 33-43 CC-56 33-43 CC-56 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5704: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/111 64-byte object <6F-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-43 CC-56 34-43 CC-56 34-43 CC-56 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5705: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/112 64-byte object <70-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-0E C2-56 35-0E C2-56 35-0E C2-56 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5706: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/113 64-byte object <71-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-0E C2-56 36-0E C2-56 36-0E C2-56 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5707: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/114 64-byte object <72-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 30-0E C2-56 37-0E C2-56 37-0E C2-56 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 90-BD 0E-57 90-BD 0E-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5708: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/115 64-byte object <73-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 90-BD 0E-57 A4-BD 0E-57 A4-BD 0E-57 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5709: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/116 64-byte object <74-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5710: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/117 64-byte object <75-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 30-0E C2-56 31-0E C2-56 31-0E C2-56 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5711: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/118 64-byte object <76-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 30-0E C2-56 34-0E C2-56 34-0E C2-56 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5712: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/119 64-byte object <77-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 30-0E C2-56 38-0E C2-56 38-0E C2-56 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5713: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/120 64-byte object <78-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 B0-AE 21-57 BF-AE 21-57 BF-AE 21-57 31-64 34-32 00-00 00-00 C0-AE 0E-57 C0-AE 0E-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5714: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/121 64-byte object <79-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 C0-AE 0E-57 D1-AE 0E-57 D1-AE 0E-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 40-E7 0E-57 02-00 00-00>' - PASSED gtests.sh: #5715: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/122 64-byte object <7A-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-00 00-00 00-00 00-00 00-00 00-00 70-BD 0E-57 84-BD 0E-57 84-BD 0E-57 31-64 34-32 00-00 00-00 40-E7 0E-57 40-E7 0E-57 F0-44 0F-57 02-00 00-00>' - PASSED gtests.sh: #5716: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/123 64-byte object <7B-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 40-E7 0E-57 50-E7 0E-57 50-E7 0E-57 F0-44 0F-57 09-45 0F-57 09-45 0F-57 31-64 34-32 00-00 00-00 E0-5C 0F-57 E0-5C 0F-57 00-6C 0F-57 02-00 00-00>' - PASSED gtests.sh: #5717: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/124 64-byte object <7C-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-6C 0F-57 10-6C 0F-57 10-6C 0F-57 20-6C 0F-57 38-6C 0F-57 38-6C 0F-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5718: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/125 64-byte object <7D-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 C0-AE 0E-57 D0-AE 0E-57 D0-AE 0E-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 31-64 34-32 00-00 00-00 A0-75 0F-57 A0-75 0F-57 C0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5719: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/126 64-byte object <7E-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 C0-75 0F-57 D0-75 0F-57 D0-75 0F-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 31-64 34-32 00-00 00-00 E0-5C 0F-57 E0-5C 0F-57 F0-44 0F-57 02-00 00-00>' - PASSED gtests.sh: #5720: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/127 64-byte object <7F-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 F0-44 0F-57 00-45 0F-57 00-45 0F-57 00-6C 0F-57 18-6C 0F-57 18-6C 0F-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 20-6C 0F-57 02-00 00-00>' - PASSED gtests.sh: #5721: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/128 64-byte object <80-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 20-6C 0F-57 30-6C 0F-57 30-6C 0F-57 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 31-64 34-32 00-00 00-00 A0-75 0F-57 A0-75 0F-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5722: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/129 64-byte object <81-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 70-BD 0E-57 80-BD 0E-57 80-BD 0E-57 C0-75 0F-57 D8-75 0F-57 D8-75 0F-57 31-64 34-32 00-00 00-00 E0-5C 0F-57 E0-5C 0F-57 40-E7 0E-57 02-00 00-00>' - PASSED gtests.sh: #5723: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/130 64-byte object <82-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 40-E7 0E-57 50-E7 0E-57 50-E7 0E-57 F0-44 0F-57 08-45 0F-57 08-45 0F-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 00-6C 0F-57 02-00 00-00>' - PASSED gtests.sh: #5724: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/131 64-byte object <83-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-6C 0F-57 10-6C 0F-57 10-6C 0F-57 20-6C 0F-57 38-6C 0F-57 38-6C 0F-57 31-64 34-32 00-00 00-00 A0-75 0F-57 A0-75 0F-57 C0-AE 0E-57 02-00 00-00>' - PASSED gtests.sh: #5725: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/132 64-byte object <84-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 C0-AE 0E-57 D0-AE 0E-57 D0-AE 0E-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 31-64 34-32 00-00 00-00 E0-5C 0F-57 E0-5C 0F-57 C0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5726: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/133 64-byte object <85-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 C0-75 0F-57 D0-75 0F-57 D0-75 0F-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 F0-44 0F-57 02-00 00-00>' - PASSED gtests.sh: #5727: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/134 64-byte object <86-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 F0-44 0F-57 00-45 0F-57 00-45 0F-57 00-6C 0F-57 18-6C 0F-57 18-6C 0F-57 31-64 34-32 00-00 00-00 A0-75 0F-57 A0-75 0F-57 20-6C 0F-57 02-00 00-00>' - PASSED gtests.sh: #5728: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/135 64-byte object <87-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 20-6C 0F-57 30-6C 0F-57 30-6C 0F-57 C0-AE 0E-57 D8-AE 0E-57 D8-AE 0E-57 31-64 34-32 00-00 00-00 E0-5C 0F-57 E0-5C 0F-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5729: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/136 64-byte object <88-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 C0-75 0F-57 C0-75 0F-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5730: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/137 64-byte object <89-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 C0-75 0F-57 D8-75 0F-57 D8-75 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 40-E7 0E-57 02-00 00-00>' - PASSED gtests.sh: #5731: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/138 64-byte object <8A-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 40-E7 0E-57 40-E7 0E-57 F0-44 0F-57 02-00 00-00>' - PASSED gtests.sh: #5732: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/139 64-byte object <8B-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5733: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/140 64-byte object <8C-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 F0-44 0F-57 08-45 0F-57 08-45 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 A0-75 0F-57 A0-75 0F-57 00-6C 0F-57 02-00 00-00>' - PASSED gtests.sh: #5734: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/141 64-byte object <8D-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 A0-75 0F-57 B8-75 0F-57 B8-75 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 00-6C 0F-57 00-6C 0F-57 20-6C 0F-57 02-00 00-00>' - PASSED gtests.sh: #5735: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/142 64-byte object <8E-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 00-6C 0F-57 18-6C 0F-57 18-6C 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 20-6C 0F-57 20-6C 0F-57 70-BD 0E-57 02-00 00-00>' - PASSED gtests.sh: #5736: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/143 64-byte object <8F-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 20-6C 0F-57 38-6C 0F-57 38-6C 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 C0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5737: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/144 64-byte object <90-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 70-BD 0E-57 88-BD 0E-57 88-BD 0E-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 C0-75 0F-57 C0-75 0F-57 B0-AE 21-57 02-00 00-00>' - PASSED gtests.sh: #5738: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/145 64-byte object <91-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 C0-75 0F-57 D8-75 0F-57 D8-75 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 B0-AE 21-57 B0-AE 21-57 40-E7 0E-57 02-00 00-00>' - PASSED gtests.sh: #5739: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/146 64-byte object <92-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 B0-AE 21-57 C8-AE 21-57 C8-AE 21-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 40-E7 0E-57 40-E7 0E-57 F0-44 0F-57 02-00 00-00>' - PASSED gtests.sh: #5740: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/147 64-byte object <93-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 40-E7 0E-57 58-E7 0E-57 58-E7 0E-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5741: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/148 64-byte object <94-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 C0-C0 0F-57 E8-C0 0F-57 E8-C0 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5742: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/149 64-byte object <95-00 00-00 C0-C0 0F-57 E0-C0 0F-57 E0-C0 0F-57 60-C7 0F-57 80-C7 0F-57 80-C7 0F-57 B0-CA 0F-57 D8-CA 0F-57 D8-CA 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5743: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/150 64-byte object <96-00 00-00 B0-CA 0F-57 D0-CA 0F-57 D0-CA 0F-57 30-CE 0F-57 50-CE 0F-57 50-CE 0F-57 60-CE 0F-57 88-CE 0F-57 88-CE 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5744: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/151 64-byte object <97-00 00-00 60-CE 0F-57 80-CE 0F-57 80-CE 0F-57 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 70-9F 0F-57 98-9F 0F-57 98-9F 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5745: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/152 64-byte object <98-00 00-00 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 C0-C0 0F-57 E0-C0 0F-57 E0-C0 0F-57 60-C7 0F-57 88-C7 0F-57 88-C7 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5746: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/153 64-byte object <99-00 00-00 60-C7 0F-57 80-C7 0F-57 80-C7 0F-57 B0-CA 0F-57 D0-CA 0F-57 D0-CA 0F-57 30-CE 0F-57 58-CE 0F-57 58-CE 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5747: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/154 64-byte object <9A-00 00-00 30-CE 0F-57 50-CE 0F-57 50-CE 0F-57 60-CE 0F-57 80-CE 0F-57 80-CE 0F-57 80-32 0F-57 A8-32 0F-57 A8-32 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5748: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/155 64-byte object <9B-00 00-00 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 C0-C0 0F-57 E8-C0 0F-57 E8-C0 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5749: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/156 64-byte object <9C-00 00-00 C0-C0 0F-57 E0-C0 0F-57 E0-C0 0F-57 60-C7 0F-57 80-C7 0F-57 80-C7 0F-57 B0-CA 0F-57 D8-CA 0F-57 D8-CA 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5750: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/157 64-byte object <9D-00 00-00 B0-CA 0F-57 D0-CA 0F-57 D0-CA 0F-57 30-CE 0F-57 50-CE 0F-57 50-CE 0F-57 60-CE 0F-57 88-CE 0F-57 88-CE 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5751: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/158 64-byte object <9E-00 00-00 60-CE 0F-57 80-CE 0F-57 80-CE 0F-57 80-32 0F-57 A0-32 0F-57 A0-32 0F-57 70-9F 0F-57 98-9F 0F-57 98-9F 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5752: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/159 64-byte object <9F-00 00-00 70-9F 0F-57 90-9F 0F-57 90-9F 0F-57 C0-C0 0F-57 E0-C0 0F-57 E0-C0 0F-57 60-C7 0F-57 88-C7 0F-57 88-C7 0F-57 31-64 34-32 00-00 00-00 F0-44 0F-57 F0-44 0F-57 A0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5753: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/160 64-byte object <A0-00 00-00 60-C7 0F-57 80-C7 0F-57 80-C7 0F-57 F0-44 0F-57 00-45 0F-57 00-45 0F-57 A0-75 0F-57 B8-75 0F-57 B8-75 0F-57 31-64 34-32 00-00 00-00 00-6C 0F-57 00-6C 0F-57 20-6C 0F-57 02-00 00-00>' - PASSED gtests.sh: #5754: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/161 64-byte object <A1-00 00-00 60-C7 0F-57 80-C7 0F-57 80-C7 0F-57 20-6C 0F-57 38-6C 0F-57 38-6C 0F-57 30-CE 0F-57 50-CE 0F-57 50-CE 0F-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 C0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5755: 'Pkcs11WycheproofAESKWTest/Pkcs11AESKeyWrapTest: TestVectors/162 64-byte object <A2-00 00-00 60-C7 0F-57 80-C7 0F-57 80-C7 0F-57 30-CE 0F-57 50-CE 0F-57 50-CE 0F-57 80-32 0F-57 A8-32 0F-57 A8-32 0F-57 31-64 34-32 00-00 00-00 70-BD 0E-57 70-BD 0E-57 C0-75 0F-57 02-00 00-00>' - PASSED gtests.sh: #5756: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/0 176-byte object <01-00 00-00 F0-8C F5-56 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 92-62 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-FD 59-BB ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-04 0B-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-17 F6-56 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5757: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/1 176-byte object <02-00 00-00 60-D5 0D-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-CD 0D-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-FD 59-BB ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-E5 04-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-50 B0-56 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5758: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/2 176-byte object <03-00 00-00 60-17 F6-56 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-1F 0E-57 80-00 00-00 80-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-FD 59-BB ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-F2 0A-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 20-FB 09-57 A0-00 00-00 A0-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5759: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/3 176-byte object <04-00 00-00 D0-CB 0C-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A D0-58 0A-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-17 0D-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5760: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/4 176-byte object <05-00 00-00 60-BD 0C-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 30-B9 0C-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-C0 0C-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5761: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/5 176-byte object <06-00 00-00 90-90 B3-56 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 90-66 0D-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-17 0D-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5762: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/6 176-byte object <07-00 00-00 A0-F3 C0-56 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-C0 0C-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 90-B4 0C-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5763: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/7 176-byte object <08-00 00-00 A0-F3 C0-56 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-E6 1B-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-2D 1C-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-50 B0-56 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5764: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/8 176-byte object <09-00 00-00 A0-F3 C0-56 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-1F 0E-57 80-00 00-00 80-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-BD 1B-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F B0-12 0A-57 A0-00 00-00 A0-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5765: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/9 176-byte object <0A-00 00-00 A0-F3 C0-56 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-93 06-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-88 1B-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5766: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/10 176-byte object <0B-00 00-00 A0-F3 C0-56 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-A5 1B-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-AC 1C-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5767: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/11 176-byte object <0C-00 00-00 B0-23 0E-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A D0-C2 1B-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-14 1B-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5768: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/12 176-byte object <0D-00 00-00 30-31 C2-56 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-DA 1A-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F F0-EB 1A-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5769: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/13 176-byte object <0E-00 00-00 30-5F C9-56 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-C2 1B-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-14 1B-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 20-CC 12-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5770: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/14 176-byte object <0F-00 00-00 E0-F5 B4-56 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-1F 0E-57 80-00 00-00 80-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-9F 1A-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 40-14 10-57 A0-00 00-00 A0-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5771: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/15 176-byte object <10-00 00-00 E0-F5 B4-56 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 30-D4 1A-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-2B 1B-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5772: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/16 176-byte object <11-00 00-00 E0-F5 B4-56 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 00-7F 06-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-CE 1A-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5773: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/17 176-byte object <12-00 00-00 E0-F5 B4-56 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FF 09-57 78-00 00-00 78-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 90-3A 1A-57 28-00 00-00 28-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-E7 19-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-FC 0D-57 98-00 00-00 98-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5774: 'NISTTestVector/Pkcs11AesGcmTest: TestVectors/18 176-byte object <13-00 00-00 AC-B9 F1-56 00-00 00-00 00-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-C2 1A-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-F5 B4-56 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5775: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/0 176-byte object <01-00 00-00 B0-D3 0C-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-BD 0D-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-FA 0C-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5776: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/1 176-byte object <02-00 00-00 20-35 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-FE 0D-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 50-F9 09-57 20-00 00-00 20-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-C2 1A-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5777: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/2 176-byte object <03-00 00-00 B0-D3 0C-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-FA 0C-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-5B 11-57 10-00 00-00 10-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-BD 0D-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5778: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/3 176-byte object <04-00 00-00 B0-69 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-69 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 20-35 12-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5779: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/4 176-byte object <05-00 00-00 60-6E 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 02-00 00-00 33-35 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-6E 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F B0-D3 0C-57 22-00 00-00 22-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5780: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/5 176-byte object <06-00 00-00 B0-D3 0C-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-5B 11-57 10-00 00-00 10-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-72 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 30-00 00-00 30-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5781: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/6 176-byte object <07-00 00-00 F0-72 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-69 11-57 1E-00 00-00 1E-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-77 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 3E-00 00-00 3E-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5782: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/7 176-byte object <08-00 00-00 70-7C 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-7C 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-D3 0C-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5783: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/8 176-byte object <09-00 00-00 40-81 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-81 11-57 22-00 00-00 22-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-72 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 42-00 00-00 42-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5784: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/9 176-byte object <0A-00 00-00 70-7C 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-77 11-57 30-00 00-00 30-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-76 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 50-8B 11-57 50-00 00-00 50-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5785: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/10 176-byte object <0B-00 00-00 10-81 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-8A 11-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 02-00 00-00 63-33 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-8A 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5786: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/11 176-byte object <0C-00 00-00 F0-72 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-81 11-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-5B 11-57 10-00 00-00 10-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-7C 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5787: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/12 176-byte object <0D-00 00-00 80-95 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-95 11-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 10-81 11-57 20-00 00-00 20-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-85 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5788: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/13 176-byte object <0E-00 00-00 F0-72 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-95 11-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 80-77 11-57 30-00 00-00 30-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-7C 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-5B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5789: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/14 176-byte object <0F-00 00-00 90-9F 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-A4 11-57 80-00 00-00 80-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-9F 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 10-A5 11-57 A0-00 00-00 A0-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5790: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/15 176-byte object <10-00 00-00 C0-9A 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-AC 11-57 00-01 00-00 00-01 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-A3 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-8F AF-56 20-01 00-00 20-01 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5791: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/16 176-byte object <11-00 00-00 50-A4 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-5E 11-57 02-02 00-00 02-02 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-95 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-B4 11-57 22-02 00-00 22-02 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5792: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/17 176-byte object <12-00 00-00 70-AC 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-B3 11-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 00-A7 11-57 80-00 00-00 80-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-B4 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5793: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/18 176-byte object <13-00 00-00 70-C6 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-C6 11-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A A0-AC 11-57 00-01 00-00 00-01 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-A4 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5794: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/19 176-byte object <14-00 00-00 E0-CC 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-CD 11-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A A0-5E 11-57 02-02 00-00 02-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-AC 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5795: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/20 176-byte object <15-00 00-00 50-D2 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-D2 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-C6 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5796: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/21 176-byte object <16-00 00-00 10-D9 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-D9 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-CC 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5797: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/22 176-byte object <17-00 00-00 C0-DD 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-DD 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-D2 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5798: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/23 176-byte object <18-00 00-00 70-E2 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-E2 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-D9 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5799: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/24 176-byte object <19-00 00-00 20-E7 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-E7 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-DD 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5800: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/25 176-byte object <1A-00 00-00 D0-EB 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-EC 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-E2 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5801: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/26 176-byte object <1B-00 00-00 80-F0 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-F0 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-E7 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5802: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/27 176-byte object <1C-00 00-00 30-F5 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-F5 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-EB 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5803: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/28 176-byte object <1D-00 00-00 E0-F9 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-FA 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-F0 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5804: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/29 176-byte object <1E-00 00-00 90-FE 11-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-FE 11-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-F5 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5805: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/30 176-byte object <1F-00 00-00 40-03 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-03 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-F9 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5806: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/31 176-byte object <20-00 00-00 F0-07 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-08 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-FE 11-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5807: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/32 176-byte object <21-00 00-00 A0-0C 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-0C 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-03 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5808: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/33 176-byte object <22-00 00-00 50-11 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-11 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-07 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5809: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/34 176-byte object <23-00 00-00 00-16 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-16 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-0C 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5810: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/35 176-byte object <24-00 00-00 B0-1A 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-1A 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-11 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5811: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/36 176-byte object <25-00 00-00 60-1F 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 90-1F 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-16 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5812: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/37 176-byte object <26-00 00-00 10-24 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-24 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-1A 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5813: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/38 176-byte object <27-00 00-00 C0-28 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-28 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-1F 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5814: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/39 176-byte object <28-00 00-00 70-2D 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-2D 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-24 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5815: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/40 176-byte object <29-00 00-00 20-32 12-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-32 12-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-28 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5816: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/41 176-byte object <2A-00 00-00 30-DE 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-DE 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-2D 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5817: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/42 176-byte object <2B-00 00-00 E0-E2 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-E3 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-32 12-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5818: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/43 176-byte object <2C-00 00-00 90-E7 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-E7 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-DE 25-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5819: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/44 176-byte object <2D-00 00-00 40-EC 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-EC 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-E2 25-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5820: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/45 176-byte object <2E-00 00-00 F0-F0 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-F1 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-E7 25-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5821: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/46 176-byte object <2F-00 00-00 A0-F5 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-F5 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-EC 25-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5822: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/47 176-byte object <30-00 00-00 50-FA 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-FA 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-F0 25-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5823: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/48 176-byte object <31-00 00-00 00-FF 25-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-FF 25-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-F5 25-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5824: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/49 176-byte object <32-00 00-00 B0-03 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-03 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-5B 11-57 10-00 00-00 10-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-FA 25-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5825: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/50 176-byte object <33-00 00-00 60-08 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-08 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-FF 25-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5826: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/51 176-byte object <34-00 00-00 70-0D 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-0D 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-03 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5827: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/52 176-byte object <35-00 00-00 90-11 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-77 11-57 30-00 00-00 30-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-77 11-57 30-00 00-00 30-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-08 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 50-8B 11-57 50-00 00-00 50-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5828: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/53 176-byte object <36-00 00-00 40-16 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-0D 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-11 26-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5829: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/54 176-byte object <37-00 00-00 90-11 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 02-00 00-00 30-31 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-08 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-11 26-57 22-00 00-00 22-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5830: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/55 176-byte object <38-00 00-00 E0-1B 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-11 26-57 1E-00 00-00 1E-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-16 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 3E-00 00-00 3E-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5831: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/56 176-byte object <39-00 00-00 40-16 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-11 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-16 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5832: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/57 176-byte object <3A-00 00-00 90-11 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-8B 11-57 40-00 00-00 40-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-0D 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 40-CF E6-56 60-00 00-00 60-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5833: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/58 176-byte object <3B-00 00-00 A0-2E 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-16 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5834: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/59 176-byte object <3C-00 00-00 D0-32 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-11 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5835: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/60 176-byte object <3D-00 00-00 70-39 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-2E 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5836: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/61 176-byte object <3E-00 00-00 90-3E 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-32 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5837: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/62 176-byte object <3F-00 00-00 B0-43 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-39 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5838: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/63 176-byte object <40-00 00-00 D0-48 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-3E 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5839: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/64 176-byte object <41-00 00-00 F0-4D 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-43 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5840: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/65 176-byte object <42-00 00-00 10-53 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-48 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5841: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/66 176-byte object <43-00 00-00 30-58 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-4D 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5842: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/67 176-byte object <44-00 00-00 50-5D 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-53 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5843: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/68 176-byte object <45-00 00-00 70-62 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-58 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5844: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/69 176-byte object <46-00 00-00 90-67 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-5D 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5845: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/70 176-byte object <47-00 00-00 B0-6C 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-6C 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-67 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5846: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/71 176-byte object <48-00 00-00 90-67 26-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-6C 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-67 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5847: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/72 176-byte object <49-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-5B 11-57 14-00 00-00 14-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 30-5C 11-57 10-00 00-00 10-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-71 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 34-00 00-00 34-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5848: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/73 176-byte object <4A-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 0C-00 00-00 61-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-7B 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 90-67 26-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5849: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/74 176-byte object <4B-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-6C 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-67 26-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5850: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/75 176-byte object <4C-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 02-00 00-00 32-61 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-6C 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-84 26-57 22-00 00-00 22-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5851: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/76 176-byte object <4D-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 10-00 00-00 10-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-84 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 30-00 00-00 30-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5852: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/77 176-byte object <4E-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 90-84 26-57 1E-00 00-00 1E-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-88 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 3E-00 00-00 3E-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5853: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/78 176-byte object <4F-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-8D 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-6C 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5854: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/79 176-byte object <50-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-91 26-57 22-00 00-00 22-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-97 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 42-00 00-00 42-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5855: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/80 176-byte object <51-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-77 11-57 30-00 00-00 30-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-61 62-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-97 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 50-8B 11-57 50-00 00-00 50-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5856: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/81 176-byte object <52-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-97 26-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 02-00 00-00 63-30 00-62 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-9C 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5857: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/82 176-byte object <53-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-A1 26-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 30-5C 11-57 10-00 00-00 10-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-91 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5858: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/83 176-byte object <54-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-A5 26-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 60-AA 26-57 20-00 00-00 20-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-AA 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5859: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/84 176-byte object <55-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-AF 26-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 80-77 11-57 30-00 00-00 30-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-AF 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5860: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/85 176-byte object <56-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-A5 11-57 80-00 00-00 80-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-91 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F F0-B9 26-57 A0-00 00-00 A0-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5861: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/86 176-byte object <57-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-AD 11-57 00-01 00-00 00-01 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-91 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-8F AF-56 20-01 00-00 20-01 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5862: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/87 176-byte object <58-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-BA 11-57 02-02 00-00 02-02 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-91 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-B4 11-57 22-02 00-00 22-02 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5863: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/88 176-byte object <59-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-91 26-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-A5 11-57 80-00 00-00 80-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-B9 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5864: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/89 176-byte object <5A-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-C4 26-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A B0-AD 11-57 00-01 00-00 00-01 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-D0 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5865: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/90 176-byte object <5B-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-D0 26-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A D0-BA 11-57 02-02 00-00 02-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-D6 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5866: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/91 176-byte object <5C-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-D6 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-DC 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5867: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/92 176-byte object <5D-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-DC 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-E3 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5868: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/93 176-byte object <5E-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 90-E3 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-E8 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5869: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/94 176-byte object <5F-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-E8 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-EC 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5870: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/95 176-byte object <60-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-ED 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-F1 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5871: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/96 176-byte object <61-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-F2 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-F6 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5872: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/97 176-byte object <62-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-F6 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-FB 26-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5873: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/98 176-byte object <63-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-FB 26-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-00 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5874: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/99 176-byte object <64-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-00 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-04 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5875: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/100 176-byte object <65-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-05 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-09 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5876: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/101 176-byte object <66-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-0A 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-0E 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5877: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/102 176-byte object <67-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-0E 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-13 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5878: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/103 176-byte object <68-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-13 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-18 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5879: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/104 176-byte object <69-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-18 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-1C 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5880: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/105 176-byte object <6A-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-1D 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-21 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5881: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/106 176-byte object <6B-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-22 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-26 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5882: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/107 176-byte object <6C-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-26 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-2B 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5883: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/108 176-byte object <6D-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-2B 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-30 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5884: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/109 176-byte object <6E-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 90-30 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-35 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5885: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/110 176-byte object <6F-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-35 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-39 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5886: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/111 176-byte object <70-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-3A 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-3E 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5887: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/112 176-byte object <71-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-3F 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-43 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5888: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/113 176-byte object <72-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-43 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-48 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5889: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/114 176-byte object <73-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-48 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-4D 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5890: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/115 176-byte object <74-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-4D 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-51 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5891: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/116 176-byte object <75-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-52 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-56 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5892: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/117 176-byte object <76-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-57 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-5B 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5893: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/118 176-byte object <77-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-5B 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-60 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5894: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/119 176-byte object <78-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-60 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-65 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5895: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/120 176-byte object <79-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-69 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5896: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/121 176-byte object <7A-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-6E 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5897: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/122 176-byte object <7B-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-73 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5898: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/123 176-byte object <7C-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-78 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5899: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/124 176-byte object <7D-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-7E 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5900: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/125 176-byte object <7E-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-83 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5901: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/126 176-byte object <7F-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-88 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5902: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/127 176-byte object <80-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-8D 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5903: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/128 176-byte object <81-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-92 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5904: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/129 176-byte object <82-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-98 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5905: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/130 176-byte object <83-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-9D 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5906: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/131 176-byte object <84-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-AA 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5907: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/132 176-byte object <85-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-AA 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-AF 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5908: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/133 176-byte object <86-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-B5 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-9D 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5909: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/134 176-byte object <87-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-BA 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-AA 27-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5910: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/135 176-byte object <88-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 02-00 00-00 34-36 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-BE 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 10-B5 27-57 22-00 00-00 22-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5911: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/136 176-byte object <89-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-C2 27-57 1E-00 00-00 1E-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-B9 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 3E-00 00-00 3E-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5912: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/137 176-byte object <8A-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 70-C7 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-BE 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5913: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/138 176-byte object <8B-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-8B 11-57 40-00 00-00 40-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-CC 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 40-CF E6-56 60-00 00-00 60-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5914: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/139 176-byte object <8C-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-C7 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-D0 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5915: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/140 176-byte object <8D-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-D0 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-C7 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5916: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/141 176-byte object <8E-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-D5 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 40-DA 27-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5917: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/142 176-byte object <8F-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 02-00 00-00 65-33 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-DA 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-DF 27-57 22-00 00-00 22-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5918: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/143 176-byte object <90-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 10-00 00-00 10-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-DF 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-77 11-57 30-00 00-00 30-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5919: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/144 176-byte object <91-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-DF 27-57 1E-00 00-00 1E-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-E3 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 3E-00 00-00 3E-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5920: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/145 176-byte object <92-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-E8 27-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-DA 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5921: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/146 176-byte object <93-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-ED 27-57 22-00 00-00 22-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-F1 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 42-00 00-00 42-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5922: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/147 176-byte object <94-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-77 11-57 30-00 00-00 30-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-F2 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 50-8B 11-57 50-00 00-00 50-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5923: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/148 176-byte object <95-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-F2 27-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 02-00 00-00 63-62 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-F6 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5924: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/149 176-byte object <96-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-FA 27-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 30-5C 11-57 10-00 00-00 10-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-ED 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5925: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/150 176-byte object <97-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-00 28-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A E0-04 28-57 20-00 00-00 20-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-05 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5926: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/151 176-byte object <98-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-09 28-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-77 11-57 30-00 00-00 30-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-0A 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5927: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/152 176-byte object <99-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-A5 11-57 80-00 00-00 80-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-ED 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-14 28-57 A0-00 00-00 A0-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5928: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/153 176-byte object <9A-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-AD 11-57 00-01 00-00 00-01 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-ED 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-8F AF-56 20-01 00-00 20-01 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5929: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/154 176-byte object <9B-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 90-B6 11-57 02-02 00-00 02-02 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-ED 27-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-B4 11-57 22-02 00-00 22-02 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5930: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/155 176-byte object <9C-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-ED 27-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A C0-A5 11-57 80-00 00-00 80-00 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-14 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5931: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/156 176-byte object <9D-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-1F 28-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A B0-AD 11-57 00-01 00-00 00-01 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-25 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5932: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/157 176-byte object <9E-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-25 28-57 28-00 00-00 28-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A 90-B6 11-57 02-02 00-00 02-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-2A 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 48-00 00-00 48-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5933: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/158 176-byte object <9F-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-2B 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-30 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5934: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/159 176-byte object <A0-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-31 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-35 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5935: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/160 176-byte object <A1-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-35 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-3A 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5936: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/161 176-byte object <A2-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-3A 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-3F 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5937: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/162 176-byte object <A3-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-3F 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-43 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5938: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/163 176-byte object <A4-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-44 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-48 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5939: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/164 176-byte object <A5-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-48 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-4D 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5940: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/165 176-byte object <A6-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-4D 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-52 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5941: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/166 176-byte object <A7-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-52 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-56 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5942: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/167 176-byte object <A8-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-57 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-5B 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5943: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/168 176-byte object <A9-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-5B 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-60 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5944: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/169 176-byte object <AA-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-60 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-65 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5945: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/170 176-byte object <AB-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-65 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-69 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5946: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/171 176-byte object <AC-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-6A 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-6E 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5947: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/172 176-byte object <AD-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-6E 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-73 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5948: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/173 176-byte object <AE-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-73 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-78 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5949: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/174 176-byte object <AF-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-78 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-7C 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5950: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/175 176-byte object <B0-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-7D 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-81 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5951: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/176 176-byte object <B1-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-81 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-86 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5952: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/177 176-byte object <B2-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-86 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-8B 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5953: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/178 176-byte object <B3-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-8B 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-8F 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5954: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/179 176-byte object <B4-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-90 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-94 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5955: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/180 176-byte object <B5-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-94 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-99 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5956: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/181 176-byte object <B6-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-99 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-9E 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5957: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/182 176-byte object <B7-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-9E 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-A2 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5958: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/183 176-byte object <B8-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-A3 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-A7 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5959: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/184 176-byte object <B9-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-A7 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-AC 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-00 99-7C>' - PASSED gtests.sh: #5960: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/185 176-byte object <BA-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-B1 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5961: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/186 176-byte object <BB-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-B5 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5962: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/187 176-byte object <BC-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-BA 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5963: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/188 176-byte object <BD-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-C0 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5964: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/189 176-byte object <BE-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-C5 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5965: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/190 176-byte object <BF-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-CA 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5966: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/191 176-byte object <C0-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-CF 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5967: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/192 176-byte object <C1-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-D5 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5968: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/193 176-byte object <C2-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-DA 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5969: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/194 176-byte object <C3-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-DF 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5970: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/195 176-byte object <C4-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-E4 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5971: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/196 176-byte object <C5-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 50-8B 11-57 50-00 00-00 50-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-EA 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 30-33 26-57 70-00 00-00 70-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5972: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/197 176-byte object <C6-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-EA 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-EF 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5973: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/198 176-byte object <C7-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 B0-F4 28-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-E5 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5974: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/199 176-byte object <C8-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-FB 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-EA 28-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5975: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/200 176-byte object <C9-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 02-00 00-00 65-64 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-FF 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F B0-F4 28-57 22-00 00-00 22-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5976: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/201 176-byte object <CA-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-04 29-57 1E-00 00-00 1E-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-FA 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 3E-00 00-00 3E-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5977: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/202 176-byte object <CB-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-08 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-FF 28-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5978: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/203 176-byte object <CC-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C0-5C 11-57 40-00 00-00 40-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-0D 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 40-CF E6-56 60-00 00-00 60-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5979: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/204 176-byte object <CD-00 00-00 10-08 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-12 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5980: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/205 176-byte object <CE-00 00-00 60-17 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-0D 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5981: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/206 176-byte object <CF-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-1C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5982: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/207 176-byte object <D0-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 10-21 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5983: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/208 176-byte object <D1-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-17 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5984: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/209 176-byte object <D2-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-2A 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5985: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/210 176-byte object <D3-00 00-00 30-2B 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-2F 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5986: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/211 176-byte object <D4-00 00-00 60-2F 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-33 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5987: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/212 176-byte object <D5-00 00-00 90-33 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-37 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5988: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/213 176-byte object <D6-00 00-00 C0-37 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5989: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/214 176-byte object <D7-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5990: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/215 176-byte object <D8-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5991: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/216 176-byte object <D9-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5992: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/217 176-byte object <DA-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5993: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/218 176-byte object <DB-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5994: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/219 176-byte object <DC-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5995: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/220 176-byte object <DD-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5996: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/221 176-byte object <DE-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 30-5C 11-57 18-00 00-00 18-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-3C 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-77 11-57 38-00 00-00 38-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #5997: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/222 176-byte object <DF-00 00-00 C0-3C 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-64 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 10-69 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-01 99-7C>' - PASSED gtests.sh: #5998: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/223 176-byte object <E0-00 00-00 70-74 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 A0-74 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-74 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-01 99-7C>' - PASSED gtests.sh: #5999: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/224 176-byte object <E1-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-79 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-79 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-01 99-7C>' - PASSED gtests.sh: #6000: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/225 176-byte object <E2-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-74 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-7D 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-01 99-7C>' - PASSED gtests.sh: #6001: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/226 176-byte object <E3-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E F0-7D 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-74 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-01 99-7C>' - PASSED gtests.sh: #6002: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/227 176-byte object <E4-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-81 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-86 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 01-01 99-7C>' - PASSED gtests.sh: #6003: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/228 176-byte object <E5-00 00-00 80-86 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-8A 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F B0-8A 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6004: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/229 176-byte object <E6-00 00-00 50-90 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 80-90 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-81 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6005: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/230 176-byte object <E7-00 00-00 F0-94 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-95 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-86 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6006: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/231 176-byte object <E8-00 00-00 30-99 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-99 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-90 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6007: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/232 176-byte object <E9-00 00-00 70-9D 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-9D 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F F0-94 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6008: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/233 176-byte object <EA-00 00-00 B0-A1 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-A1 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-99 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6009: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/234 176-byte object <EB-00 00-00 F0-A5 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 20-A6 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 70-9D 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6010: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/235 176-byte object <EC-00 00-00 30-AA 29-57 20-00 00-00 20-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 60-AA 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-A1 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6011: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/236 176-byte object <ED-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-AE 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-AE 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6012: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/237 176-byte object <EE-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-AA 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-B2 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6013: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/238 176-byte object <EF-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-B3 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 60-AA 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6014: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/239 176-byte object <F0-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-B7 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-BB 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6015: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/240 176-byte object <F1-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-BB 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F B0-BF 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6016: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/241 176-byte object <F2-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 10-C0 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 50-C4 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6017: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/242 176-byte object <F3-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E B0-C4 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F A0-C8 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6018: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/243 176-byte object <F4-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 00-C9 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 40-CD 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6019: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/244 176-byte object <F5-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-CD 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 90-D1 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6020: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/245 176-byte object <F6-00 00-00 80-77 11-57 30-00 00-00 30-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-D1 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 30-D6 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 00-8B 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6021: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/246 176-byte object <F7-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-D6 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F E0-DA 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6022: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/247 176-byte object <F8-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 40-DB 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E A0-DF 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6023: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/248 176-byte object <F9-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 00-E0 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-E3 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6024: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/249 176-byte object <FA-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 20-E4 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 60-E9 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6025: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/250 176-byte object <FB-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E C0-E9 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 70-ED 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6026: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/251 176-byte object <FC-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 D0-ED 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 70-F2 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6027: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/252 176-byte object <FD-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E D0-F2 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 80-F6 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6028: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/253 176-byte object <FE-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 E0-F6 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 80-FB 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6029: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/254 176-byte object <FF-00 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 C4-B9 F1-56 00-00 00-00 00-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E E0-FB 29-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F 90-FF 29-57 20-00 00-00 20-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED gtests.sh: #6030: 'WycheproofTestVector/Pkcs11AesGcmTest: TestVectors/255 176-byte object <00-01 00-00 00-8B 11-57 40-00 00-00 40-00 00-00 01-06 05-2B 81-04 00-22 04-81 9F-30 F0-FF 29-57 20-00 00-00 20-00 00-00 5A-47 27-34 E3-95 93-02 44-C0 56-8A DC-B9 F1-56 00-00 00-00 00-02 00-00 ... 5C-D2 00-87 03-FD 6F-89 6F-70 EA-2E 90-04 2A-57 20-00 00-00 20-00 00-00 D3-B2 BE-B6 48-56 E9-7A 59-EB 88-2F C0-5C 11-57 40-00 00-00 40-00 00-00 19-B4 23-12 A0-D6 AC-2C 0D-66 81-2C 00-00 99-7C>' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: util_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/util_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/util_gtest -n dummy -s CN=dummy -t ,, -x -m 6 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #6031: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/util_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing util_gtest [==========] Running 1965 tests from 15 test suites. [----------] Global test environment set-up. [----------] 4 tests from Utf8Zeroes [ RUN ] Utf8Zeroes.From32To8 [ OK ] Utf8Zeroes.From32To8 (0 ms) [ RUN ] Utf8Zeroes.From16To8 [ OK ] Utf8Zeroes.From16To8 (0 ms) [ RUN ] Utf8Zeroes.From8To32 [ OK ] Utf8Zeroes.From8To32 (0 ms) [ RUN ] Utf8Zeroes.From8To16 [ OK ] Utf8Zeroes.From8To16 (0 ms) [----------] 4 tests from Utf8Zeroes (0 ms total) [----------] 4 tests from SelectTest [ RUN ] SelectTest.TestSelectZero [ OK ] SelectTest.TestSelectZero (0 ms) [ RUN ] SelectTest.TestSelectOne [ OK ] SelectTest.TestSelectOne (0 ms) [ RUN ] SelectTest.TestSelect170 [ OK ] SelectTest.TestSelect170 (0 ms) [ RUN ] SelectTest.TestSelect255 [ OK ] SelectTest.TestSelect255 (0 ms) [----------] 4 tests from SelectTest (0 ms total) [----------] 1 test from SECASN1DTest [ RUN ] SECASN1DTest.IndefiniteSequenceInIndefiniteGroup [ OK ] SECASN1DTest.IndefiniteSequenceInIndefiniteGroup (0 ms) [----------] 1 test from SECASN1DTest (0 ms total) [----------] 6 tests from PK11URITest [ RUN ] PK11URITest.CreateTest [ OK ] PK11URITest.CreateTest (0 ms) [ RUN ] PK11URITest.CreateRetrieveTest [ OK ] PK11URITest.CreateRetrieveTest (0 ms) [ RUN ] PK11URITest.CreateFormatTest [ OK ] PK11URITest.CreateFormatTest (0 ms) [ RUN ] PK11URITest.ParseTest [ OK ] PK11URITest.ParseTest (0 ms) [ RUN ] PK11URITest.ParseRetrieveTest [ OK ] PK11URITest.ParseRetrieveTest (0 ms) [ RUN ] PK11URITest.ParseFormatTest [ OK ] PK11URITest.ParseFormatTest (0 ms) [----------] 6 tests from PK11URITest (0 ms total) [----------] 4 tests from MemcmpZeroTest [ RUN ] MemcmpZeroTest.TestMemcmpZeroTrue [ OK ] MemcmpZeroTest.TestMemcmpZeroTrue (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse5 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse5 (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse37 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse37 (0 ms) [ RUN ] MemcmpZeroTest.TestMemcmpZeroFalse0 [ OK ] MemcmpZeroTest.TestMemcmpZeroFalse0 (0 ms) [----------] 4 tests from MemcmpZeroTest (0 ms total) [----------] 4 tests from B64EncodeDecodeTest [ RUN ] B64EncodeDecodeTest.DecEncTest [ OK ] B64EncodeDecodeTest.DecEncTest (0 ms) [ RUN ] B64EncodeDecodeTest.EncDecTest [ OK ] B64EncodeDecodeTest.EncDecTest (0 ms) [ RUN ] B64EncodeDecodeTest.FakeDecTest [ OK ] B64EncodeDecodeTest.FakeDecTest (0 ms) [ RUN ] B64EncodeDecodeTest.FakeEncDecTest [ OK ] B64EncodeDecodeTest.FakeEncDecTest (0 ms) [----------] 4 tests from B64EncodeDecodeTest (0 ms total) [----------] 678 tests from Ucs4TestCases/Ucs4Test [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/0 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/1 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/2 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/3 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/4 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/5 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/6 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/7 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/8 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/9 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/10 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/11 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/12 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/13 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/14 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/15 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/16 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/17 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/18 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/19 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/20 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/21 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/22 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/23 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/24 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/25 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/26 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/27 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/28 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/29 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/30 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/31 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/32 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/33 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/34 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/35 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/36 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/37 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/38 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/39 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/40 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/41 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/42 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/43 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/44 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/45 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/46 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/47 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/48 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/49 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/50 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/51 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/52 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/53 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/54 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/55 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/56 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/57 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/58 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/59 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/60 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/61 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/62 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/63 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/64 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/65 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/66 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/67 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/68 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/69 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/70 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/71 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/72 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/73 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/74 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/75 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/76 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/77 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/78 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/79 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/80 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/81 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/82 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/83 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/84 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/85 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/86 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/87 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/88 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/89 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/90 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/91 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/92 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/93 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/94 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/95 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/96 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/97 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/98 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/99 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/100 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/101 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/102 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/103 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/104 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/105 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/106 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/107 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/108 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/109 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/110 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/111 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/112 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/113 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/114 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/115 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/116 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/117 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/118 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/119 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/120 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/121 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/122 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/123 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/124 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/125 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/126 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/127 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/128 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/129 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/130 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/131 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/132 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/133 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/134 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/135 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/136 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/137 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/138 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/139 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/140 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/141 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/142 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/143 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/144 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/145 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/146 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/147 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/148 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/149 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/150 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/151 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/152 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/153 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/154 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/155 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/156 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/157 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/158 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/159 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/160 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/161 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/162 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/163 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/164 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/165 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/166 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/167 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/168 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/169 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/170 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/171 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/172 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/173 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/174 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/175 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/176 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/177 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/178 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/179 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/180 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/181 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/182 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/183 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/184 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/185 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/186 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/187 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/188 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/189 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/190 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/191 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/192 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/193 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/194 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/195 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/196 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/197 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/198 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/199 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/200 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/201 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/202 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/203 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/204 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/205 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/206 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/207 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/208 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/209 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/210 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/211 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/212 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/213 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/214 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/215 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/216 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/217 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/218 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/219 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/220 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/221 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/222 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/223 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/224 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.ToUtf8/225 [ OK ] Ucs4TestCases/Ucs4Test.ToUtf8/225 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/0 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/1 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/2 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/3 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/4 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/5 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/6 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/7 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/8 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/9 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/10 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/11 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/12 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/13 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/14 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/15 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/16 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/17 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/18 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/19 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/20 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/21 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/22 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/23 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/24 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/25 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/26 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/27 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/28 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/29 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/30 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/31 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/32 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/33 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/34 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/35 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/36 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/37 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/38 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/39 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/40 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/41 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/42 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/43 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/44 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/45 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/46 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/47 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/48 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/49 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/50 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/51 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/52 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/53 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/54 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/55 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/56 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/57 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/58 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/59 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/60 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/61 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/62 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/63 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/64 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/65 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/66 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/67 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/68 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/69 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/70 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/71 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/72 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/73 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/74 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/75 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/76 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/77 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/78 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/79 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/80 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/81 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/82 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/83 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/84 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/85 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/86 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/87 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/88 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/89 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/90 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/91 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/92 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/93 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/94 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/95 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/96 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/97 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/98 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/99 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/100 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/101 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/102 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/103 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/104 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/105 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/106 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/107 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/108 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/109 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/110 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/111 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/112 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/113 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/114 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/115 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/116 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/117 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/118 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/119 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/120 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/121 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/122 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/123 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/124 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/125 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/126 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/127 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/128 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/129 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/130 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/131 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/132 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/133 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/134 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/135 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/136 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/137 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/138 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/139 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/140 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/141 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/142 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/143 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/144 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/145 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/146 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/147 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/148 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/149 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/150 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/151 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/152 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/153 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/154 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/155 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/156 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/157 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/158 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/159 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/160 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/161 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/162 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/163 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/164 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/165 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/166 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/167 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/168 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/169 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/170 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/171 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/172 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/173 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/174 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/175 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/176 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/177 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/178 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/179 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/180 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/181 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/182 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/183 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/184 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/185 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/186 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/187 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/188 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/189 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/190 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/191 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/192 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/193 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/194 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/195 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/196 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/197 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/198 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/199 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/200 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/201 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/202 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/203 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/204 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/205 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/206 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/207 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/208 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/209 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/210 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/211 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/212 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/213 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/214 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/215 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/216 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/217 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/218 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/219 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/220 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/221 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/222 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/223 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/224 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.FromUtf8/225 [ OK ] Ucs4TestCases/Ucs4Test.FromUtf8/225 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/0 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/1 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/2 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/3 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/4 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/5 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/6 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/7 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/8 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/9 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/10 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/11 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/12 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/13 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/14 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/15 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/16 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/17 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/18 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/19 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/20 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/21 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/22 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/23 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/24 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/25 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/26 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/27 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/28 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/29 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/30 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/31 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/32 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/33 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/34 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/35 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/36 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/37 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/38 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/39 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/40 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/41 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/42 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/43 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/44 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/45 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/46 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/47 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/48 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/49 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/50 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/51 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/52 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/53 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/54 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/55 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/56 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/57 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/58 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/59 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/60 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/61 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/62 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/63 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/64 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/65 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/66 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/67 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/68 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/69 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/70 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/71 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/72 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/73 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/74 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/75 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/76 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/77 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/78 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/79 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/80 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/81 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/82 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/83 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/84 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/85 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/86 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/87 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/88 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/89 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/90 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/91 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/92 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/93 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/94 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/95 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/96 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/97 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/98 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/99 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/100 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/101 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/102 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/103 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/104 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/105 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/106 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/107 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/108 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/109 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/110 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/111 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/112 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/113 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/114 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/115 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/116 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/117 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/118 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/119 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/120 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/121 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/122 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/123 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/124 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/125 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/126 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/127 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/128 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/129 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/130 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/131 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/132 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/133 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/134 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/135 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/136 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/137 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/138 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/139 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/140 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/141 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/142 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/143 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/144 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/145 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/146 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/147 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/148 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/149 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/150 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/151 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/152 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/153 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/154 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/155 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/156 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/157 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/158 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/159 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/160 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/161 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/162 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/163 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/164 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/165 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/166 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/167 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/168 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/169 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/170 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/171 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/172 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/173 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/174 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/175 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/176 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/177 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/178 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/179 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/180 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/181 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/182 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/183 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/184 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/185 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/186 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/187 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/188 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/189 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/190 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/191 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/192 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/193 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/194 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/195 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/196 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/197 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/198 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/199 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/200 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/201 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/202 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/203 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/204 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/205 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/206 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/207 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/208 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/209 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/210 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/211 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/212 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/213 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/214 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/215 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/216 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/217 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/218 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/219 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/220 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/221 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/222 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/223 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/224 (0 ms) [ RUN ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 [ OK ] Ucs4TestCases/Ucs4Test.DestTooSmall/225 (0 ms) [----------] 678 tests from Ucs4TestCases/Ucs4Test (2 ms total) [----------] 66 tests from Iso88591TestCases/Ucs2Test [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/0 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/1 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/2 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/3 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/4 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/5 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/6 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/7 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/8 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/9 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/10 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/11 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/12 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/13 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/14 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/15 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/16 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/17 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/18 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/19 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/20 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.ToUtf8/21 [ OK ] Iso88591TestCases/Ucs2Test.ToUtf8/21 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/0 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/1 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/2 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/3 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/4 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/5 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/6 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/7 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/8 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/9 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/10 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/11 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/12 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/13 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/14 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/15 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/16 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/17 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/18 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/19 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/20 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.FromUtf8/21 [ OK ] Iso88591TestCases/Ucs2Test.FromUtf8/21 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/0 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/1 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/2 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/3 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/4 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/5 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/6 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/7 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/8 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/9 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/10 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/11 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/12 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/13 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/14 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/15 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/16 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/17 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/18 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/19 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/20 (0 ms) [ RUN ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 [ OK ] Iso88591TestCases/Ucs2Test.DestTooSmall/21 (0 ms) [----------] 66 tests from Iso88591TestCases/Ucs2Test (0 ms total) [----------] 327 tests from Ucs2TestCases/Ucs2Test [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/0 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/1 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/2 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/3 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/4 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/5 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/6 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/7 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/8 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/9 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/10 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/11 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/12 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/13 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/14 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/15 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/16 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/17 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/18 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/19 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/20 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/21 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/22 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/23 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/24 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/25 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/26 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/27 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/28 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/29 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/30 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/31 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/32 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/33 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/34 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/35 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/36 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/37 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/38 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/39 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/40 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/41 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/42 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/43 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/44 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/45 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/46 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/47 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/48 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/49 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/50 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/51 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/52 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/53 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/54 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/55 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/56 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/57 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/58 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/59 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/60 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/61 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/62 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/63 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/64 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/65 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/66 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/67 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/68 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/69 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/70 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/71 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/72 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/73 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/74 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/75 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/76 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/77 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/78 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/79 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/80 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/81 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/82 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/83 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/84 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/85 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/86 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/87 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/88 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/89 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/90 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/91 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/92 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/93 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/94 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/95 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/96 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/97 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/98 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/99 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/100 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/101 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/102 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/103 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/104 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/105 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/106 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/107 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.ToUtf8/108 [ OK ] Ucs2TestCases/Ucs2Test.ToUtf8/108 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/0 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/1 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/2 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/3 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/4 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/5 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/6 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/7 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/8 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/9 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/10 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/11 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/12 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/13 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/14 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/15 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/16 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/17 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/18 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/19 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/20 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/21 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/22 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/23 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/24 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/25 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/26 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/27 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/28 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/29 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/30 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/31 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/32 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/33 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/34 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/35 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/36 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/37 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/38 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/39 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/40 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/41 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/42 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/43 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/44 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/45 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/46 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/47 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/48 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/49 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/50 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/51 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/52 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/53 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/54 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/55 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/56 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/57 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/58 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/59 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/60 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/61 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/62 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/63 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/64 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/65 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/66 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/67 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/68 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/69 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/70 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/71 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/72 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/73 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/74 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/75 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/76 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/77 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/78 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/79 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/80 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/81 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/82 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/83 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/84 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/85 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/86 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/87 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/88 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/89 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/90 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/91 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/92 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/93 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/94 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/95 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/96 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/97 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/98 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/99 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/100 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/101 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/102 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/103 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/104 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/105 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/106 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/107 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.FromUtf8/108 [ OK ] Ucs2TestCases/Ucs2Test.FromUtf8/108 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/0 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/1 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/2 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/3 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/4 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/5 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/6 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/7 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/8 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/9 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/10 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/11 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/12 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/13 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/14 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/15 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/16 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/17 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/18 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/19 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/20 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/21 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/22 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/23 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/24 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/25 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/26 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/27 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/28 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/29 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/30 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/31 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/32 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/33 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/34 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/35 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/36 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/37 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/38 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/39 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/40 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/41 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/42 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/43 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/44 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/45 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/46 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/47 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/48 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/49 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/50 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/51 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/52 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/53 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/54 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/55 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/56 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/57 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/58 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/59 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/60 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/61 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/62 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/63 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/64 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/65 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/66 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/67 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/68 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/69 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/70 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/71 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/72 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/73 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/74 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/75 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/76 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/77 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/78 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/79 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/80 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/81 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/82 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/83 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/84 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/85 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/86 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/87 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/88 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/89 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/90 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/91 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/92 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/93 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/94 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/95 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/96 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/97 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/98 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/99 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/100 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/101 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/102 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/103 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/104 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/105 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/106 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/107 (0 ms) [ RUN ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 [ OK ] Ucs2TestCases/Ucs2Test.DestTooSmall/108 (0 ms) [----------] 327 tests from Ucs2TestCases/Ucs2Test (1 ms total) [----------] 738 tests from Utf16TestCases/Utf16Test [ RUN ] Utf16TestCases/Utf16Test.From16To32/0 [ OK ] Utf16TestCases/Utf16Test.From16To32/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/1 [ OK ] Utf16TestCases/Utf16Test.From16To32/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/2 [ OK ] Utf16TestCases/Utf16Test.From16To32/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/3 [ OK ] Utf16TestCases/Utf16Test.From16To32/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/4 [ OK ] Utf16TestCases/Utf16Test.From16To32/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/5 [ OK ] Utf16TestCases/Utf16Test.From16To32/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/6 [ OK ] Utf16TestCases/Utf16Test.From16To32/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/7 [ OK ] Utf16TestCases/Utf16Test.From16To32/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/8 [ OK ] Utf16TestCases/Utf16Test.From16To32/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/9 [ OK ] Utf16TestCases/Utf16Test.From16To32/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/10 [ OK ] Utf16TestCases/Utf16Test.From16To32/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/11 [ OK ] Utf16TestCases/Utf16Test.From16To32/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/12 [ OK ] Utf16TestCases/Utf16Test.From16To32/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/13 [ OK ] Utf16TestCases/Utf16Test.From16To32/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/14 [ OK ] Utf16TestCases/Utf16Test.From16To32/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/15 [ OK ] Utf16TestCases/Utf16Test.From16To32/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/16 [ OK ] Utf16TestCases/Utf16Test.From16To32/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/17 [ OK ] Utf16TestCases/Utf16Test.From16To32/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/18 [ OK ] Utf16TestCases/Utf16Test.From16To32/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/19 [ OK ] Utf16TestCases/Utf16Test.From16To32/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/20 [ OK ] Utf16TestCases/Utf16Test.From16To32/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/21 [ OK ] Utf16TestCases/Utf16Test.From16To32/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/22 [ OK ] Utf16TestCases/Utf16Test.From16To32/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/23 [ OK ] Utf16TestCases/Utf16Test.From16To32/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/24 [ OK ] Utf16TestCases/Utf16Test.From16To32/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/25 [ OK ] Utf16TestCases/Utf16Test.From16To32/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/26 [ OK ] Utf16TestCases/Utf16Test.From16To32/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/27 [ OK ] Utf16TestCases/Utf16Test.From16To32/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/28 [ OK ] Utf16TestCases/Utf16Test.From16To32/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/29 [ OK ] Utf16TestCases/Utf16Test.From16To32/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/30 [ OK ] Utf16TestCases/Utf16Test.From16To32/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/31 [ OK ] Utf16TestCases/Utf16Test.From16To32/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/32 [ OK ] Utf16TestCases/Utf16Test.From16To32/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/33 [ OK ] Utf16TestCases/Utf16Test.From16To32/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/34 [ OK ] Utf16TestCases/Utf16Test.From16To32/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/35 [ OK ] Utf16TestCases/Utf16Test.From16To32/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/36 [ OK ] Utf16TestCases/Utf16Test.From16To32/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/37 [ OK ] Utf16TestCases/Utf16Test.From16To32/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/38 [ OK ] Utf16TestCases/Utf16Test.From16To32/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/39 [ OK ] Utf16TestCases/Utf16Test.From16To32/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/40 [ OK ] Utf16TestCases/Utf16Test.From16To32/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/41 [ OK ] Utf16TestCases/Utf16Test.From16To32/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/42 [ OK ] Utf16TestCases/Utf16Test.From16To32/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/43 [ OK ] Utf16TestCases/Utf16Test.From16To32/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/44 [ OK ] Utf16TestCases/Utf16Test.From16To32/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/45 [ OK ] Utf16TestCases/Utf16Test.From16To32/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/46 [ OK ] Utf16TestCases/Utf16Test.From16To32/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/47 [ OK ] Utf16TestCases/Utf16Test.From16To32/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/48 [ OK ] Utf16TestCases/Utf16Test.From16To32/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/49 [ OK ] Utf16TestCases/Utf16Test.From16To32/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/50 [ OK ] Utf16TestCases/Utf16Test.From16To32/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/51 [ OK ] Utf16TestCases/Utf16Test.From16To32/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/52 [ OK ] Utf16TestCases/Utf16Test.From16To32/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/53 [ OK ] Utf16TestCases/Utf16Test.From16To32/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/54 [ OK ] Utf16TestCases/Utf16Test.From16To32/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/55 [ OK ] Utf16TestCases/Utf16Test.From16To32/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/56 [ OK ] Utf16TestCases/Utf16Test.From16To32/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/57 [ OK ] Utf16TestCases/Utf16Test.From16To32/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/58 [ OK ] Utf16TestCases/Utf16Test.From16To32/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/59 [ OK ] Utf16TestCases/Utf16Test.From16To32/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/60 [ OK ] Utf16TestCases/Utf16Test.From16To32/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/61 [ OK ] Utf16TestCases/Utf16Test.From16To32/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/62 [ OK ] Utf16TestCases/Utf16Test.From16To32/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/63 [ OK ] Utf16TestCases/Utf16Test.From16To32/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/64 [ OK ] Utf16TestCases/Utf16Test.From16To32/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/65 [ OK ] Utf16TestCases/Utf16Test.From16To32/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/66 [ OK ] Utf16TestCases/Utf16Test.From16To32/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/67 [ OK ] Utf16TestCases/Utf16Test.From16To32/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/68 [ OK ] Utf16TestCases/Utf16Test.From16To32/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/69 [ OK ] Utf16TestCases/Utf16Test.From16To32/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/70 [ OK ] Utf16TestCases/Utf16Test.From16To32/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/71 [ OK ] Utf16TestCases/Utf16Test.From16To32/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/72 [ OK ] Utf16TestCases/Utf16Test.From16To32/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/73 [ OK ] Utf16TestCases/Utf16Test.From16To32/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/74 [ OK ] Utf16TestCases/Utf16Test.From16To32/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/75 [ OK ] Utf16TestCases/Utf16Test.From16To32/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/76 [ OK ] Utf16TestCases/Utf16Test.From16To32/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/77 [ OK ] Utf16TestCases/Utf16Test.From16To32/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/78 [ OK ] Utf16TestCases/Utf16Test.From16To32/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/79 [ OK ] Utf16TestCases/Utf16Test.From16To32/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/80 [ OK ] Utf16TestCases/Utf16Test.From16To32/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/81 [ OK ] Utf16TestCases/Utf16Test.From16To32/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/82 [ OK ] Utf16TestCases/Utf16Test.From16To32/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/83 [ OK ] Utf16TestCases/Utf16Test.From16To32/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/84 [ OK ] Utf16TestCases/Utf16Test.From16To32/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/85 [ OK ] Utf16TestCases/Utf16Test.From16To32/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/86 [ OK ] Utf16TestCases/Utf16Test.From16To32/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/87 [ OK ] Utf16TestCases/Utf16Test.From16To32/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/88 [ OK ] Utf16TestCases/Utf16Test.From16To32/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/89 [ OK ] Utf16TestCases/Utf16Test.From16To32/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/90 [ OK ] Utf16TestCases/Utf16Test.From16To32/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/91 [ OK ] Utf16TestCases/Utf16Test.From16To32/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/92 [ OK ] Utf16TestCases/Utf16Test.From16To32/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/93 [ OK ] Utf16TestCases/Utf16Test.From16To32/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/94 [ OK ] Utf16TestCases/Utf16Test.From16To32/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/95 [ OK ] Utf16TestCases/Utf16Test.From16To32/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/96 [ OK ] Utf16TestCases/Utf16Test.From16To32/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/97 [ OK ] Utf16TestCases/Utf16Test.From16To32/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/98 [ OK ] Utf16TestCases/Utf16Test.From16To32/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/99 [ OK ] Utf16TestCases/Utf16Test.From16To32/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/100 [ OK ] Utf16TestCases/Utf16Test.From16To32/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/101 [ OK ] Utf16TestCases/Utf16Test.From16To32/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/102 [ OK ] Utf16TestCases/Utf16Test.From16To32/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/103 [ OK ] Utf16TestCases/Utf16Test.From16To32/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/104 [ OK ] Utf16TestCases/Utf16Test.From16To32/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/105 [ OK ] Utf16TestCases/Utf16Test.From16To32/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/106 [ OK ] Utf16TestCases/Utf16Test.From16To32/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/107 [ OK ] Utf16TestCases/Utf16Test.From16To32/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/108 [ OK ] Utf16TestCases/Utf16Test.From16To32/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/109 [ OK ] Utf16TestCases/Utf16Test.From16To32/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/110 [ OK ] Utf16TestCases/Utf16Test.From16To32/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/111 [ OK ] Utf16TestCases/Utf16Test.From16To32/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/112 [ OK ] Utf16TestCases/Utf16Test.From16To32/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/113 [ OK ] Utf16TestCases/Utf16Test.From16To32/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/114 [ OK ] Utf16TestCases/Utf16Test.From16To32/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/115 [ OK ] Utf16TestCases/Utf16Test.From16To32/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/116 [ OK ] Utf16TestCases/Utf16Test.From16To32/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/117 [ OK ] Utf16TestCases/Utf16Test.From16To32/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/118 [ OK ] Utf16TestCases/Utf16Test.From16To32/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/119 [ OK ] Utf16TestCases/Utf16Test.From16To32/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/120 [ OK ] Utf16TestCases/Utf16Test.From16To32/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/121 [ OK ] Utf16TestCases/Utf16Test.From16To32/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/122 [ OK ] Utf16TestCases/Utf16Test.From16To32/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/123 [ OK ] Utf16TestCases/Utf16Test.From16To32/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/124 [ OK ] Utf16TestCases/Utf16Test.From16To32/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/125 [ OK ] Utf16TestCases/Utf16Test.From16To32/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/126 [ OK ] Utf16TestCases/Utf16Test.From16To32/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/127 [ OK ] Utf16TestCases/Utf16Test.From16To32/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/128 [ OK ] Utf16TestCases/Utf16Test.From16To32/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/129 [ OK ] Utf16TestCases/Utf16Test.From16To32/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/130 [ OK ] Utf16TestCases/Utf16Test.From16To32/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/131 [ OK ] Utf16TestCases/Utf16Test.From16To32/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/132 [ OK ] Utf16TestCases/Utf16Test.From16To32/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/133 [ OK ] Utf16TestCases/Utf16Test.From16To32/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/134 [ OK ] Utf16TestCases/Utf16Test.From16To32/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/135 [ OK ] Utf16TestCases/Utf16Test.From16To32/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/136 [ OK ] Utf16TestCases/Utf16Test.From16To32/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/137 [ OK ] Utf16TestCases/Utf16Test.From16To32/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/138 [ OK ] Utf16TestCases/Utf16Test.From16To32/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/139 [ OK ] Utf16TestCases/Utf16Test.From16To32/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/140 [ OK ] Utf16TestCases/Utf16Test.From16To32/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/141 [ OK ] Utf16TestCases/Utf16Test.From16To32/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/142 [ OK ] Utf16TestCases/Utf16Test.From16To32/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/143 [ OK ] Utf16TestCases/Utf16Test.From16To32/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/144 [ OK ] Utf16TestCases/Utf16Test.From16To32/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/145 [ OK ] Utf16TestCases/Utf16Test.From16To32/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/146 [ OK ] Utf16TestCases/Utf16Test.From16To32/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/147 [ OK ] Utf16TestCases/Utf16Test.From16To32/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/148 [ OK ] Utf16TestCases/Utf16Test.From16To32/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/149 [ OK ] Utf16TestCases/Utf16Test.From16To32/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/150 [ OK ] Utf16TestCases/Utf16Test.From16To32/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/151 [ OK ] Utf16TestCases/Utf16Test.From16To32/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/152 [ OK ] Utf16TestCases/Utf16Test.From16To32/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/153 [ OK ] Utf16TestCases/Utf16Test.From16To32/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/154 [ OK ] Utf16TestCases/Utf16Test.From16To32/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/155 [ OK ] Utf16TestCases/Utf16Test.From16To32/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/156 [ OK ] Utf16TestCases/Utf16Test.From16To32/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/157 [ OK ] Utf16TestCases/Utf16Test.From16To32/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/158 [ OK ] Utf16TestCases/Utf16Test.From16To32/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/159 [ OK ] Utf16TestCases/Utf16Test.From16To32/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/160 [ OK ] Utf16TestCases/Utf16Test.From16To32/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/161 [ OK ] Utf16TestCases/Utf16Test.From16To32/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/162 [ OK ] Utf16TestCases/Utf16Test.From16To32/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/163 [ OK ] Utf16TestCases/Utf16Test.From16To32/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/164 [ OK ] Utf16TestCases/Utf16Test.From16To32/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/165 [ OK ] Utf16TestCases/Utf16Test.From16To32/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/166 [ OK ] Utf16TestCases/Utf16Test.From16To32/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/167 [ OK ] Utf16TestCases/Utf16Test.From16To32/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/168 [ OK ] Utf16TestCases/Utf16Test.From16To32/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/169 [ OK ] Utf16TestCases/Utf16Test.From16To32/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/170 [ OK ] Utf16TestCases/Utf16Test.From16To32/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/171 [ OK ] Utf16TestCases/Utf16Test.From16To32/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/172 [ OK ] Utf16TestCases/Utf16Test.From16To32/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/173 [ OK ] Utf16TestCases/Utf16Test.From16To32/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/174 [ OK ] Utf16TestCases/Utf16Test.From16To32/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/175 [ OK ] Utf16TestCases/Utf16Test.From16To32/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/176 [ OK ] Utf16TestCases/Utf16Test.From16To32/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/177 [ OK ] Utf16TestCases/Utf16Test.From16To32/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/178 [ OK ] Utf16TestCases/Utf16Test.From16To32/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/179 [ OK ] Utf16TestCases/Utf16Test.From16To32/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/180 [ OK ] Utf16TestCases/Utf16Test.From16To32/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/181 [ OK ] Utf16TestCases/Utf16Test.From16To32/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/182 [ OK ] Utf16TestCases/Utf16Test.From16To32/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/183 [ OK ] Utf16TestCases/Utf16Test.From16To32/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/184 [ OK ] Utf16TestCases/Utf16Test.From16To32/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/185 [ OK ] Utf16TestCases/Utf16Test.From16To32/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/186 [ OK ] Utf16TestCases/Utf16Test.From16To32/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/187 [ OK ] Utf16TestCases/Utf16Test.From16To32/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/188 [ OK ] Utf16TestCases/Utf16Test.From16To32/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/189 [ OK ] Utf16TestCases/Utf16Test.From16To32/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/190 [ OK ] Utf16TestCases/Utf16Test.From16To32/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/191 [ OK ] Utf16TestCases/Utf16Test.From16To32/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/192 [ OK ] Utf16TestCases/Utf16Test.From16To32/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/193 [ OK ] Utf16TestCases/Utf16Test.From16To32/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/194 [ OK ] Utf16TestCases/Utf16Test.From16To32/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/195 [ OK ] Utf16TestCases/Utf16Test.From16To32/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/196 [ OK ] Utf16TestCases/Utf16Test.From16To32/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/197 [ OK ] Utf16TestCases/Utf16Test.From16To32/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/198 [ OK ] Utf16TestCases/Utf16Test.From16To32/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/199 [ OK ] Utf16TestCases/Utf16Test.From16To32/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/200 [ OK ] Utf16TestCases/Utf16Test.From16To32/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/201 [ OK ] Utf16TestCases/Utf16Test.From16To32/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/202 [ OK ] Utf16TestCases/Utf16Test.From16To32/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/203 [ OK ] Utf16TestCases/Utf16Test.From16To32/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/204 [ OK ] Utf16TestCases/Utf16Test.From16To32/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/205 [ OK ] Utf16TestCases/Utf16Test.From16To32/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/206 [ OK ] Utf16TestCases/Utf16Test.From16To32/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/207 [ OK ] Utf16TestCases/Utf16Test.From16To32/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/208 [ OK ] Utf16TestCases/Utf16Test.From16To32/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/209 [ OK ] Utf16TestCases/Utf16Test.From16To32/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/210 [ OK ] Utf16TestCases/Utf16Test.From16To32/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/211 [ OK ] Utf16TestCases/Utf16Test.From16To32/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/212 [ OK ] Utf16TestCases/Utf16Test.From16To32/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/213 [ OK ] Utf16TestCases/Utf16Test.From16To32/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/214 [ OK ] Utf16TestCases/Utf16Test.From16To32/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/215 [ OK ] Utf16TestCases/Utf16Test.From16To32/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/216 [ OK ] Utf16TestCases/Utf16Test.From16To32/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/217 [ OK ] Utf16TestCases/Utf16Test.From16To32/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/218 [ OK ] Utf16TestCases/Utf16Test.From16To32/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/219 [ OK ] Utf16TestCases/Utf16Test.From16To32/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/220 [ OK ] Utf16TestCases/Utf16Test.From16To32/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/221 [ OK ] Utf16TestCases/Utf16Test.From16To32/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/222 [ OK ] Utf16TestCases/Utf16Test.From16To32/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/223 [ OK ] Utf16TestCases/Utf16Test.From16To32/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/224 [ OK ] Utf16TestCases/Utf16Test.From16To32/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/225 [ OK ] Utf16TestCases/Utf16Test.From16To32/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/226 [ OK ] Utf16TestCases/Utf16Test.From16To32/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/227 [ OK ] Utf16TestCases/Utf16Test.From16To32/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/228 [ OK ] Utf16TestCases/Utf16Test.From16To32/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/229 [ OK ] Utf16TestCases/Utf16Test.From16To32/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/230 [ OK ] Utf16TestCases/Utf16Test.From16To32/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/231 [ OK ] Utf16TestCases/Utf16Test.From16To32/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/232 [ OK ] Utf16TestCases/Utf16Test.From16To32/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/233 [ OK ] Utf16TestCases/Utf16Test.From16To32/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/234 [ OK ] Utf16TestCases/Utf16Test.From16To32/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/235 [ OK ] Utf16TestCases/Utf16Test.From16To32/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/236 [ OK ] Utf16TestCases/Utf16Test.From16To32/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/237 [ OK ] Utf16TestCases/Utf16Test.From16To32/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/238 [ OK ] Utf16TestCases/Utf16Test.From16To32/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/239 [ OK ] Utf16TestCases/Utf16Test.From16To32/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/240 [ OK ] Utf16TestCases/Utf16Test.From16To32/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/241 [ OK ] Utf16TestCases/Utf16Test.From16To32/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/242 [ OK ] Utf16TestCases/Utf16Test.From16To32/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/243 [ OK ] Utf16TestCases/Utf16Test.From16To32/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/244 [ OK ] Utf16TestCases/Utf16Test.From16To32/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From16To32/245 [ OK ] Utf16TestCases/Utf16Test.From16To32/245 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/0 [ OK ] Utf16TestCases/Utf16Test.From32To16/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/1 [ OK ] Utf16TestCases/Utf16Test.From32To16/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/2 [ OK ] Utf16TestCases/Utf16Test.From32To16/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/3 [ OK ] Utf16TestCases/Utf16Test.From32To16/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/4 [ OK ] Utf16TestCases/Utf16Test.From32To16/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/5 [ OK ] Utf16TestCases/Utf16Test.From32To16/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/6 [ OK ] Utf16TestCases/Utf16Test.From32To16/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/7 [ OK ] Utf16TestCases/Utf16Test.From32To16/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/8 [ OK ] Utf16TestCases/Utf16Test.From32To16/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/9 [ OK ] Utf16TestCases/Utf16Test.From32To16/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/10 [ OK ] Utf16TestCases/Utf16Test.From32To16/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/11 [ OK ] Utf16TestCases/Utf16Test.From32To16/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/12 [ OK ] Utf16TestCases/Utf16Test.From32To16/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/13 [ OK ] Utf16TestCases/Utf16Test.From32To16/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/14 [ OK ] Utf16TestCases/Utf16Test.From32To16/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/15 [ OK ] Utf16TestCases/Utf16Test.From32To16/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/16 [ OK ] Utf16TestCases/Utf16Test.From32To16/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/17 [ OK ] Utf16TestCases/Utf16Test.From32To16/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/18 [ OK ] Utf16TestCases/Utf16Test.From32To16/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/19 [ OK ] Utf16TestCases/Utf16Test.From32To16/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/20 [ OK ] Utf16TestCases/Utf16Test.From32To16/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/21 [ OK ] Utf16TestCases/Utf16Test.From32To16/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/22 [ OK ] Utf16TestCases/Utf16Test.From32To16/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/23 [ OK ] Utf16TestCases/Utf16Test.From32To16/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/24 [ OK ] Utf16TestCases/Utf16Test.From32To16/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/25 [ OK ] Utf16TestCases/Utf16Test.From32To16/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/26 [ OK ] Utf16TestCases/Utf16Test.From32To16/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/27 [ OK ] Utf16TestCases/Utf16Test.From32To16/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/28 [ OK ] Utf16TestCases/Utf16Test.From32To16/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/29 [ OK ] Utf16TestCases/Utf16Test.From32To16/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/30 [ OK ] Utf16TestCases/Utf16Test.From32To16/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/31 [ OK ] Utf16TestCases/Utf16Test.From32To16/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/32 [ OK ] Utf16TestCases/Utf16Test.From32To16/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/33 [ OK ] Utf16TestCases/Utf16Test.From32To16/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/34 [ OK ] Utf16TestCases/Utf16Test.From32To16/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/35 [ OK ] Utf16TestCases/Utf16Test.From32To16/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/36 [ OK ] Utf16TestCases/Utf16Test.From32To16/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/37 [ OK ] Utf16TestCases/Utf16Test.From32To16/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/38 [ OK ] Utf16TestCases/Utf16Test.From32To16/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/39 [ OK ] Utf16TestCases/Utf16Test.From32To16/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/40 [ OK ] Utf16TestCases/Utf16Test.From32To16/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/41 [ OK ] Utf16TestCases/Utf16Test.From32To16/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/42 [ OK ] Utf16TestCases/Utf16Test.From32To16/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/43 [ OK ] Utf16TestCases/Utf16Test.From32To16/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/44 [ OK ] Utf16TestCases/Utf16Test.From32To16/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/45 [ OK ] Utf16TestCases/Utf16Test.From32To16/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/46 [ OK ] Utf16TestCases/Utf16Test.From32To16/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/47 [ OK ] Utf16TestCases/Utf16Test.From32To16/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/48 [ OK ] Utf16TestCases/Utf16Test.From32To16/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/49 [ OK ] Utf16TestCases/Utf16Test.From32To16/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/50 [ OK ] Utf16TestCases/Utf16Test.From32To16/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/51 [ OK ] Utf16TestCases/Utf16Test.From32To16/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/52 [ OK ] Utf16TestCases/Utf16Test.From32To16/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/53 [ OK ] Utf16TestCases/Utf16Test.From32To16/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/54 [ OK ] Utf16TestCases/Utf16Test.From32To16/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/55 [ OK ] Utf16TestCases/Utf16Test.From32To16/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/56 [ OK ] Utf16TestCases/Utf16Test.From32To16/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/57 [ OK ] Utf16TestCases/Utf16Test.From32To16/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/58 [ OK ] Utf16TestCases/Utf16Test.From32To16/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/59 [ OK ] Utf16TestCases/Utf16Test.From32To16/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/60 [ OK ] Utf16TestCases/Utf16Test.From32To16/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/61 [ OK ] Utf16TestCases/Utf16Test.From32To16/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/62 [ OK ] Utf16TestCases/Utf16Test.From32To16/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/63 [ OK ] Utf16TestCases/Utf16Test.From32To16/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/64 [ OK ] Utf16TestCases/Utf16Test.From32To16/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/65 [ OK ] Utf16TestCases/Utf16Test.From32To16/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/66 [ OK ] Utf16TestCases/Utf16Test.From32To16/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/67 [ OK ] Utf16TestCases/Utf16Test.From32To16/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/68 [ OK ] Utf16TestCases/Utf16Test.From32To16/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/69 [ OK ] Utf16TestCases/Utf16Test.From32To16/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/70 [ OK ] Utf16TestCases/Utf16Test.From32To16/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/71 [ OK ] Utf16TestCases/Utf16Test.From32To16/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/72 [ OK ] Utf16TestCases/Utf16Test.From32To16/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/73 [ OK ] Utf16TestCases/Utf16Test.From32To16/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/74 [ OK ] Utf16TestCases/Utf16Test.From32To16/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/75 [ OK ] Utf16TestCases/Utf16Test.From32To16/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/76 [ OK ] Utf16TestCases/Utf16Test.From32To16/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/77 [ OK ] Utf16TestCases/Utf16Test.From32To16/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/78 [ OK ] Utf16TestCases/Utf16Test.From32To16/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/79 [ OK ] Utf16TestCases/Utf16Test.From32To16/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/80 [ OK ] Utf16TestCases/Utf16Test.From32To16/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/81 [ OK ] Utf16TestCases/Utf16Test.From32To16/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/82 [ OK ] Utf16TestCases/Utf16Test.From32To16/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/83 [ OK ] Utf16TestCases/Utf16Test.From32To16/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/84 [ OK ] Utf16TestCases/Utf16Test.From32To16/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/85 [ OK ] Utf16TestCases/Utf16Test.From32To16/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/86 [ OK ] Utf16TestCases/Utf16Test.From32To16/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/87 [ OK ] Utf16TestCases/Utf16Test.From32To16/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/88 [ OK ] Utf16TestCases/Utf16Test.From32To16/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/89 [ OK ] Utf16TestCases/Utf16Test.From32To16/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/90 [ OK ] Utf16TestCases/Utf16Test.From32To16/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/91 [ OK ] Utf16TestCases/Utf16Test.From32To16/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/92 [ OK ] Utf16TestCases/Utf16Test.From32To16/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/93 [ OK ] Utf16TestCases/Utf16Test.From32To16/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/94 [ OK ] Utf16TestCases/Utf16Test.From32To16/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/95 [ OK ] Utf16TestCases/Utf16Test.From32To16/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/96 [ OK ] Utf16TestCases/Utf16Test.From32To16/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/97 [ OK ] Utf16TestCases/Utf16Test.From32To16/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/98 [ OK ] Utf16TestCases/Utf16Test.From32To16/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/99 [ OK ] Utf16TestCases/Utf16Test.From32To16/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/100 [ OK ] Utf16TestCases/Utf16Test.From32To16/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/101 [ OK ] Utf16TestCases/Utf16Test.From32To16/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/102 [ OK ] Utf16TestCases/Utf16Test.From32To16/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/103 [ OK ] Utf16TestCases/Utf16Test.From32To16/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/104 [ OK ] Utf16TestCases/Utf16Test.From32To16/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/105 [ OK ] Utf16TestCases/Utf16Test.From32To16/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/106 [ OK ] Utf16TestCases/Utf16Test.From32To16/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/107 [ OK ] Utf16TestCases/Utf16Test.From32To16/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/108 [ OK ] Utf16TestCases/Utf16Test.From32To16/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/109 [ OK ] Utf16TestCases/Utf16Test.From32To16/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/110 [ OK ] Utf16TestCases/Utf16Test.From32To16/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/111 [ OK ] Utf16TestCases/Utf16Test.From32To16/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/112 [ OK ] Utf16TestCases/Utf16Test.From32To16/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/113 [ OK ] Utf16TestCases/Utf16Test.From32To16/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/114 [ OK ] Utf16TestCases/Utf16Test.From32To16/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/115 [ OK ] Utf16TestCases/Utf16Test.From32To16/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/116 [ OK ] Utf16TestCases/Utf16Test.From32To16/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/117 [ OK ] Utf16TestCases/Utf16Test.From32To16/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/118 [ OK ] Utf16TestCases/Utf16Test.From32To16/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/119 [ OK ] Utf16TestCases/Utf16Test.From32To16/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/120 [ OK ] Utf16TestCases/Utf16Test.From32To16/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/121 [ OK ] Utf16TestCases/Utf16Test.From32To16/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/122 [ OK ] Utf16TestCases/Utf16Test.From32To16/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/123 [ OK ] Utf16TestCases/Utf16Test.From32To16/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/124 [ OK ] Utf16TestCases/Utf16Test.From32To16/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/125 [ OK ] Utf16TestCases/Utf16Test.From32To16/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/126 [ OK ] Utf16TestCases/Utf16Test.From32To16/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/127 [ OK ] Utf16TestCases/Utf16Test.From32To16/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/128 [ OK ] Utf16TestCases/Utf16Test.From32To16/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/129 [ OK ] Utf16TestCases/Utf16Test.From32To16/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/130 [ OK ] Utf16TestCases/Utf16Test.From32To16/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/131 [ OK ] Utf16TestCases/Utf16Test.From32To16/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/132 [ OK ] Utf16TestCases/Utf16Test.From32To16/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/133 [ OK ] Utf16TestCases/Utf16Test.From32To16/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/134 [ OK ] Utf16TestCases/Utf16Test.From32To16/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/135 [ OK ] Utf16TestCases/Utf16Test.From32To16/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/136 [ OK ] Utf16TestCases/Utf16Test.From32To16/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/137 [ OK ] Utf16TestCases/Utf16Test.From32To16/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/138 [ OK ] Utf16TestCases/Utf16Test.From32To16/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/139 [ OK ] Utf16TestCases/Utf16Test.From32To16/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/140 [ OK ] Utf16TestCases/Utf16Test.From32To16/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/141 [ OK ] Utf16TestCases/Utf16Test.From32To16/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/142 [ OK ] Utf16TestCases/Utf16Test.From32To16/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/143 [ OK ] Utf16TestCases/Utf16Test.From32To16/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/144 [ OK ] Utf16TestCases/Utf16Test.From32To16/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/145 [ OK ] Utf16TestCases/Utf16Test.From32To16/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/146 [ OK ] Utf16TestCases/Utf16Test.From32To16/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/147 [ OK ] Utf16TestCases/Utf16Test.From32To16/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/148 [ OK ] Utf16TestCases/Utf16Test.From32To16/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/149 [ OK ] Utf16TestCases/Utf16Test.From32To16/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/150 [ OK ] Utf16TestCases/Utf16Test.From32To16/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/151 [ OK ] Utf16TestCases/Utf16Test.From32To16/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/152 [ OK ] Utf16TestCases/Utf16Test.From32To16/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/153 [ OK ] Utf16TestCases/Utf16Test.From32To16/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/154 [ OK ] Utf16TestCases/Utf16Test.From32To16/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/155 [ OK ] Utf16TestCases/Utf16Test.From32To16/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/156 [ OK ] Utf16TestCases/Utf16Test.From32To16/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/157 [ OK ] Utf16TestCases/Utf16Test.From32To16/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/158 [ OK ] Utf16TestCases/Utf16Test.From32To16/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/159 [ OK ] Utf16TestCases/Utf16Test.From32To16/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/160 [ OK ] Utf16TestCases/Utf16Test.From32To16/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/161 [ OK ] Utf16TestCases/Utf16Test.From32To16/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/162 [ OK ] Utf16TestCases/Utf16Test.From32To16/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/163 [ OK ] Utf16TestCases/Utf16Test.From32To16/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/164 [ OK ] Utf16TestCases/Utf16Test.From32To16/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/165 [ OK ] Utf16TestCases/Utf16Test.From32To16/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/166 [ OK ] Utf16TestCases/Utf16Test.From32To16/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/167 [ OK ] Utf16TestCases/Utf16Test.From32To16/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/168 [ OK ] Utf16TestCases/Utf16Test.From32To16/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/169 [ OK ] Utf16TestCases/Utf16Test.From32To16/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/170 [ OK ] Utf16TestCases/Utf16Test.From32To16/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/171 [ OK ] Utf16TestCases/Utf16Test.From32To16/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/172 [ OK ] Utf16TestCases/Utf16Test.From32To16/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/173 [ OK ] Utf16TestCases/Utf16Test.From32To16/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/174 [ OK ] Utf16TestCases/Utf16Test.From32To16/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/175 [ OK ] Utf16TestCases/Utf16Test.From32To16/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/176 [ OK ] Utf16TestCases/Utf16Test.From32To16/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/177 [ OK ] Utf16TestCases/Utf16Test.From32To16/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/178 [ OK ] Utf16TestCases/Utf16Test.From32To16/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/179 [ OK ] Utf16TestCases/Utf16Test.From32To16/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/180 [ OK ] Utf16TestCases/Utf16Test.From32To16/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/181 [ OK ] Utf16TestCases/Utf16Test.From32To16/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/182 [ OK ] Utf16TestCases/Utf16Test.From32To16/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/183 [ OK ] Utf16TestCases/Utf16Test.From32To16/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/184 [ OK ] Utf16TestCases/Utf16Test.From32To16/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/185 [ OK ] Utf16TestCases/Utf16Test.From32To16/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/186 [ OK ] Utf16TestCases/Utf16Test.From32To16/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/187 [ OK ] Utf16TestCases/Utf16Test.From32To16/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/188 [ OK ] Utf16TestCases/Utf16Test.From32To16/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/189 [ OK ] Utf16TestCases/Utf16Test.From32To16/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/190 [ OK ] Utf16TestCases/Utf16Test.From32To16/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/191 [ OK ] Utf16TestCases/Utf16Test.From32To16/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/192 [ OK ] Utf16TestCases/Utf16Test.From32To16/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/193 [ OK ] Utf16TestCases/Utf16Test.From32To16/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/194 [ OK ] Utf16TestCases/Utf16Test.From32To16/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/195 [ OK ] Utf16TestCases/Utf16Test.From32To16/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/196 [ OK ] Utf16TestCases/Utf16Test.From32To16/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/197 [ OK ] Utf16TestCases/Utf16Test.From32To16/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/198 [ OK ] Utf16TestCases/Utf16Test.From32To16/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/199 [ OK ] Utf16TestCases/Utf16Test.From32To16/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/200 [ OK ] Utf16TestCases/Utf16Test.From32To16/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/201 [ OK ] Utf16TestCases/Utf16Test.From32To16/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/202 [ OK ] Utf16TestCases/Utf16Test.From32To16/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/203 [ OK ] Utf16TestCases/Utf16Test.From32To16/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/204 [ OK ] Utf16TestCases/Utf16Test.From32To16/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/205 [ OK ] Utf16TestCases/Utf16Test.From32To16/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/206 [ OK ] Utf16TestCases/Utf16Test.From32To16/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/207 [ OK ] Utf16TestCases/Utf16Test.From32To16/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/208 [ OK ] Utf16TestCases/Utf16Test.From32To16/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/209 [ OK ] Utf16TestCases/Utf16Test.From32To16/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/210 [ OK ] Utf16TestCases/Utf16Test.From32To16/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/211 [ OK ] Utf16TestCases/Utf16Test.From32To16/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/212 [ OK ] Utf16TestCases/Utf16Test.From32To16/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/213 [ OK ] Utf16TestCases/Utf16Test.From32To16/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/214 [ OK ] Utf16TestCases/Utf16Test.From32To16/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/215 [ OK ] Utf16TestCases/Utf16Test.From32To16/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/216 [ OK ] Utf16TestCases/Utf16Test.From32To16/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/217 [ OK ] Utf16TestCases/Utf16Test.From32To16/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/218 [ OK ] Utf16TestCases/Utf16Test.From32To16/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/219 [ OK ] Utf16TestCases/Utf16Test.From32To16/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/220 [ OK ] Utf16TestCases/Utf16Test.From32To16/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/221 [ OK ] Utf16TestCases/Utf16Test.From32To16/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/222 [ OK ] Utf16TestCases/Utf16Test.From32To16/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/223 [ OK ] Utf16TestCases/Utf16Test.From32To16/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/224 [ OK ] Utf16TestCases/Utf16Test.From32To16/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/225 [ OK ] Utf16TestCases/Utf16Test.From32To16/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/226 [ OK ] Utf16TestCases/Utf16Test.From32To16/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/227 [ OK ] Utf16TestCases/Utf16Test.From32To16/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/228 [ OK ] Utf16TestCases/Utf16Test.From32To16/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/229 [ OK ] Utf16TestCases/Utf16Test.From32To16/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/230 [ OK ] Utf16TestCases/Utf16Test.From32To16/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/231 [ OK ] Utf16TestCases/Utf16Test.From32To16/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/232 [ OK ] Utf16TestCases/Utf16Test.From32To16/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/233 [ OK ] Utf16TestCases/Utf16Test.From32To16/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/234 [ OK ] Utf16TestCases/Utf16Test.From32To16/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/235 [ OK ] Utf16TestCases/Utf16Test.From32To16/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/236 [ OK ] Utf16TestCases/Utf16Test.From32To16/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/237 [ OK ] Utf16TestCases/Utf16Test.From32To16/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/238 [ OK ] Utf16TestCases/Utf16Test.From32To16/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/239 [ OK ] Utf16TestCases/Utf16Test.From32To16/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/240 [ OK ] Utf16TestCases/Utf16Test.From32To16/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/241 [ OK ] Utf16TestCases/Utf16Test.From32To16/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/242 [ OK ] Utf16TestCases/Utf16Test.From32To16/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/243 [ OK ] Utf16TestCases/Utf16Test.From32To16/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/244 [ OK ] Utf16TestCases/Utf16Test.From32To16/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.From32To16/245 [ OK ] Utf16TestCases/Utf16Test.From32To16/245 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/0 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/0 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/1 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/1 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/2 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/2 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/3 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/3 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/4 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/4 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/5 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/5 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/6 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/6 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/7 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/7 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/8 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/8 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/9 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/9 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/10 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/10 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/11 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/11 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/12 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/12 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/13 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/13 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/14 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/14 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/15 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/15 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/16 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/16 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/17 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/17 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/18 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/18 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/19 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/19 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/20 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/20 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/21 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/21 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/22 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/22 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/23 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/23 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/24 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/24 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/25 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/25 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/26 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/26 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/27 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/27 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/28 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/28 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/29 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/29 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/30 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/30 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/31 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/31 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/32 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/32 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/33 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/33 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/34 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/34 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/35 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/35 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/36 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/36 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/37 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/37 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/38 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/38 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/39 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/39 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/40 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/40 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/41 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/41 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/42 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/42 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/43 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/43 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/44 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/44 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/45 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/45 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/46 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/46 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/47 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/47 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/48 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/48 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/49 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/49 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/50 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/50 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/51 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/51 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/52 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/52 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/53 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/53 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/54 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/54 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/55 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/55 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/56 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/56 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/57 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/57 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/58 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/58 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/59 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/59 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/60 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/60 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/61 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/61 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/62 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/62 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/63 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/63 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/64 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/64 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/65 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/65 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/66 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/66 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/67 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/67 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/68 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/68 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/69 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/69 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/70 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/70 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/71 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/71 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/72 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/72 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/73 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/73 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/74 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/74 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/75 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/75 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/76 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/76 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/77 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/77 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/78 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/78 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/79 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/79 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/80 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/80 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/81 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/81 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/82 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/82 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/83 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/83 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/84 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/84 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/85 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/85 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/86 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/86 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/87 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/87 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/88 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/88 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/89 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/89 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/90 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/90 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/91 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/91 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/92 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/92 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/93 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/93 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/94 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/94 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/95 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/95 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/96 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/96 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/97 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/97 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/98 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/98 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/99 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/99 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/100 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/100 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/101 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/101 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/102 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/102 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/103 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/103 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/104 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/104 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/105 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/105 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/106 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/106 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/107 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/107 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/108 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/108 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/109 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/109 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/110 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/110 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/111 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/111 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/112 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/112 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/113 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/113 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/114 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/114 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/115 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/115 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/116 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/116 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/117 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/117 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/118 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/118 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/119 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/119 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/120 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/120 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/121 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/121 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/122 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/122 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/123 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/123 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/124 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/124 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/125 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/125 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/126 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/126 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/127 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/127 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/128 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/128 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/129 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/129 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/130 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/130 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/131 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/131 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/132 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/132 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/133 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/133 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/134 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/134 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/135 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/135 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/136 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/136 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/137 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/137 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/138 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/138 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/139 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/139 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/140 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/140 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/141 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/141 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/142 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/142 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/143 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/143 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/144 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/144 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/145 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/145 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/146 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/146 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/147 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/147 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/148 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/148 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/149 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/149 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/150 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/150 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/151 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/151 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/152 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/152 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/153 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/153 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/154 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/154 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/155 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/155 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/156 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/156 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/157 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/157 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/158 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/158 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/159 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/159 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/160 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/160 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/161 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/161 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/162 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/162 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/163 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/163 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/164 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/164 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/165 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/165 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/166 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/166 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/167 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/167 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/168 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/168 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/169 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/169 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/170 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/170 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/171 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/171 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/172 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/172 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/173 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/173 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/174 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/174 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/175 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/175 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/176 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/176 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/177 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/177 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/178 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/178 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/179 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/179 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/180 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/180 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/181 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/181 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/182 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/182 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/183 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/183 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/184 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/184 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/185 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/185 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/186 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/186 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/187 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/187 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/188 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/188 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/189 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/189 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/190 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/190 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/191 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/191 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/192 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/192 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/193 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/193 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/194 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/194 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/195 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/195 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/196 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/196 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/197 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/197 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/198 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/198 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/199 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/199 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/200 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/200 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/201 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/201 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/202 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/202 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/203 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/203 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/204 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/204 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/205 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/205 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/206 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/206 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/207 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/207 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/208 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/208 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/209 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/209 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/210 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/210 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/211 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/211 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/212 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/212 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/213 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/213 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/214 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/214 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/215 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/215 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/216 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/216 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/217 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/217 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/218 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/218 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/219 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/219 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/220 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/220 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/221 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/221 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/222 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/222 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/223 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/223 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/224 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/224 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/225 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/225 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/226 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/226 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/227 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/227 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/228 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/228 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/229 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/229 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/230 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/230 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/231 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/231 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/232 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/232 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/233 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/233 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/234 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/234 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/235 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/235 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/236 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/236 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/237 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/237 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/238 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/238 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/239 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/239 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/240 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/240 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/241 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/241 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/242 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/242 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/243 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/243 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/244 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/244 (0 ms) [ RUN ] Utf16TestCases/Utf16Test.SameUtf8/245 [ OK ] Utf16TestCases/Utf16Test.SameUtf8/245 (0 ms) [----------] 738 tests from Utf16TestCases/Utf16Test (13 ms total) [----------] 78 tests from BadUtf8TestCases/BadUtf8Test [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/0 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/1 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/2 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/3 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/4 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/5 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/6 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/7 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/8 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/9 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/10 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/11 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/12 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/13 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/14 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/15 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/16 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/17 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/18 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/19 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/20 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/21 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/22 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/23 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/24 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/25 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/26 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/27 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/28 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/29 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/30 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/31 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/32 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/33 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/34 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/35 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/36 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/37 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs2/38 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/0 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/1 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/2 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/3 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/4 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/5 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/6 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/7 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/8 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/9 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/10 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/11 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/12 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/13 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/14 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/15 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/16 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/17 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/18 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/19 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/20 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/21 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/22 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/23 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/24 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/25 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/26 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/27 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/28 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/29 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/30 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/31 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/32 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/33 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/34 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/35 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/36 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/37 (0 ms) [ RUN ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 [ OK ] BadUtf8TestCases/BadUtf8Test.HasNoUcs4/38 (0 ms) [----------] 78 tests from BadUtf8TestCases/BadUtf8Test (0 ms total) [----------] 9 tests from BadUtf16TestCases/BadUtf16Test [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/0 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/1 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/2 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/3 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/4 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/5 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/6 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/7 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/7 (0 ms) [ RUN ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/8 [ OK ] BadUtf16TestCases/BadUtf16Test.HasNoUtf8/8 (0 ms) [----------] 9 tests from BadUtf16TestCases/BadUtf16Test (0 ms total) [----------] 22 tests from Iso88591TestCases/Iso88591Test [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/0 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/0 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/1 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/1 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/2 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/2 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/3 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/3 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/4 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/4 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/5 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/5 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/6 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/6 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/7 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/7 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/8 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/8 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/9 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/9 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/10 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/10 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/11 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/11 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/12 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/12 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/13 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/13 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/14 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/14 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/15 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/15 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/16 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/16 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/17 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/17 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/18 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/18 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/19 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/19 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/20 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/20 (0 ms) [ RUN ] Iso88591TestCases/Iso88591Test.ToUtf8/21 [ OK ] Iso88591TestCases/Iso88591Test.ToUtf8/21 (0 ms) [----------] 22 tests from Iso88591TestCases/Iso88591Test (0 ms total) [----------] 14 tests from AllAligned/AlignedMallocTest [ RUN ] AllAligned/AlignedMallocTest.TestNew/0 [ OK ] AllAligned/AlignedMallocTest.TestNew/0 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/1 [ OK ] AllAligned/AlignedMallocTest.TestNew/1 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/2 [ OK ] AllAligned/AlignedMallocTest.TestNew/2 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/3 [ OK ] AllAligned/AlignedMallocTest.TestNew/3 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/4 [ OK ] AllAligned/AlignedMallocTest.TestNew/4 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/5 [ OK ] AllAligned/AlignedMallocTest.TestNew/5 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestNew/6 [ OK ] AllAligned/AlignedMallocTest.TestNew/6 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/0 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/0 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/1 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/1 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/2 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/2 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/3 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/3 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/4 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/4 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/5 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/5 (0 ms) [ RUN ] AllAligned/AlignedMallocTest.TestAlloc/6 [ OK ] AllAligned/AlignedMallocTest.TestAlloc/6 (0 ms) [----------] 14 tests from AllAligned/AlignedMallocTest (0 ms total) [----------] 10 tests from AllAlignedBadSize/AlignedMallocTestBadSize [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/0 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/0 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/1 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/1 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/2 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/2 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/3 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/3 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/4 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestNew/4 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/0 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/0 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/1 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/1 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/2 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/2 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/3 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/3 (0 ms) [ RUN ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/4 [ OK ] AllAlignedBadSize/AlignedMallocTestBadSize.TestAlloc/4 (0 ms) [----------] 10 tests from AllAlignedBadSize/AlignedMallocTestBadSize (0 ms total) [----------] Global test environment tear-down [==========] 1965 tests from 15 test suites ran. (17 ms total) [ PASSED ] 1965 tests. YOU HAVE 3 DISABLED TESTS gtests.sh: #6032: util_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/util_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #6033: 'Utf8Zeroes: From32To8' - PASSED gtests.sh: #6034: 'Utf8Zeroes: From16To8' - PASSED gtests.sh: #6035: 'Utf8Zeroes: From8To32' - PASSED gtests.sh: #6036: 'Utf8Zeroes: From8To16' - PASSED gtests.sh: #6037: 'SelectTest: TestSelectZero' - PASSED gtests.sh: #6038: 'SelectTest: TestSelectOne' - PASSED gtests.sh: #6039: 'SelectTest: TestSelect170' - PASSED gtests.sh: #6040: 'SelectTest: TestSelect255' - PASSED gtests.sh: #6041: 'SECASN1DTest: IndefiniteSequenceInIndefiniteGroup' - PASSED gtests.sh: #6042: 'PK11URITest: CreateTest' - PASSED gtests.sh: #6043: 'PK11URITest: CreateRetrieveTest' - PASSED gtests.sh: #6044: 'PK11URITest: CreateFormatTest' - PASSED gtests.sh: #6045: 'PK11URITest: ParseTest' - PASSED gtests.sh: #6046: 'PK11URITest: ParseRetrieveTest' - PASSED gtests.sh: #6047: 'PK11URITest: ParseFormatTest' - PASSED gtests.sh: #6048: 'MemcmpZeroTest: TestMemcmpZeroTrue' - PASSED gtests.sh: #6049: 'MemcmpZeroTest: TestMemcmpZeroFalse5' - PASSED gtests.sh: #6050: 'MemcmpZeroTest: TestMemcmpZeroFalse37' - PASSED gtests.sh: #6051: 'MemcmpZeroTest: TestMemcmpZeroFalse0' - PASSED gtests.sh: #6052: 'B64EncodeDecodeTest: DecEncTest' - PASSED gtests.sh: #6053: 'B64EncodeDecodeTest: EncDecTest' - PASSED gtests.sh: #6054: 'B64EncodeDecodeTest: FakeDecTest' - PASSED gtests.sh: #6055: 'B64EncodeDecodeTest: FakeEncDecTest' - PASSED gtests.sh: #6056: 'Ucs4TestCases/Ucs4Test: ToUtf8/0 8-byte object <01-00 00-00 BA-D2 5C-56>' - PASSED gtests.sh: #6057: 'Ucs4TestCases/Ucs4Test: ToUtf8/1 8-byte object <02-00 00-00 BC-D2 5C-56>' - PASSED gtests.sh: #6058: 'Ucs4TestCases/Ucs4Test: ToUtf8/2 8-byte object <03-00 00-00 BE-D2 5C-56>' - PASSED gtests.sh: #6059: 'Ucs4TestCases/Ucs4Test: ToUtf8/3 8-byte object <04-00 00-00 C0-D2 5C-56>' - PASSED gtests.sh: #6060: 'Ucs4TestCases/Ucs4Test: ToUtf8/4 8-byte object <07-00 00-00 C2-D2 5C-56>' - PASSED gtests.sh: #6061: 'Ucs4TestCases/Ucs4Test: ToUtf8/5 8-byte object <08-00 00-00 C4-D2 5C-56>' - PASSED gtests.sh: #6062: 'Ucs4TestCases/Ucs4Test: ToUtf8/6 8-byte object <0F-00 00-00 C6-D2 5C-56>' - PASSED gtests.sh: #6063: 'Ucs4TestCases/Ucs4Test: ToUtf8/7 8-byte object <10-00 00-00 C8-D2 5C-56>' - PASSED gtests.sh: #6064: 'Ucs4TestCases/Ucs4Test: ToUtf8/8 8-byte object <1F-00 00-00 CA-D2 5C-56>' - PASSED gtests.sh: #6065: 'Ucs4TestCases/Ucs4Test: ToUtf8/9 8-byte object <20-00 00-00 DB-47 5D-56>' - PASSED gtests.sh: #6066: 'Ucs4TestCases/Ucs4Test: ToUtf8/10 8-byte object <3F-00 00-00 E7-97 5C-56>' - PASSED gtests.sh: #6067: 'Ucs4TestCases/Ucs4Test: ToUtf8/11 8-byte object <40-00 00-00 0A-98 5C-56>' - PASSED gtests.sh: #6068: 'Ucs4TestCases/Ucs4Test: ToUtf8/12 8-byte object <7F-00 00-00 CC-D2 5C-56>' - PASSED gtests.sh: #6069: 'Ucs4TestCases/Ucs4Test: ToUtf8/13 8-byte object <80-00 00-00 CE-D2 5C-56>' - PASSED gtests.sh: #6070: 'Ucs4TestCases/Ucs4Test: ToUtf8/14 8-byte object <81-00 00-00 D1-D2 5C-56>' - PASSED gtests.sh: #6071: 'Ucs4TestCases/Ucs4Test: ToUtf8/15 8-byte object <82-00 00-00 D4-D2 5C-56>' - PASSED gtests.sh: #6072: 'Ucs4TestCases/Ucs4Test: ToUtf8/16 8-byte object <84-00 00-00 D7-D2 5C-56>' - PASSED gtests.sh: #6073: 'Ucs4TestCases/Ucs4Test: ToUtf8/17 8-byte object <88-00 00-00 DA-D2 5C-56>' - PASSED gtests.sh: #6074: 'Ucs4TestCases/Ucs4Test: ToUtf8/18 8-byte object <90-00 00-00 DD-D2 5C-56>' - PASSED gtests.sh: #6075: 'Ucs4TestCases/Ucs4Test: ToUtf8/19 8-byte object <A0-00 00-00 E0-D2 5C-56>' - PASSED gtests.sh: #6076: 'Ucs4TestCases/Ucs4Test: ToUtf8/20 8-byte object <C0-00 00-00 15-D1 5C-56>' - PASSED gtests.sh: #6077: 'Ucs4TestCases/Ucs4Test: ToUtf8/21 8-byte object <FF-00 00-00 E3-D2 5C-56>' - PASSED gtests.sh: #6078: 'Ucs4TestCases/Ucs4Test: ToUtf8/22 8-byte object <00-01 00-00 2B-D1 5C-56>' - PASSED gtests.sh: #6079: 'Ucs4TestCases/Ucs4Test: ToUtf8/23 8-byte object <01-01 00-00 2E-D1 5C-56>' - PASSED gtests.sh: #6080: 'Ucs4TestCases/Ucs4Test: ToUtf8/24 8-byte object <02-01 00-00 31-D1 5C-56>' - PASSED gtests.sh: #6081: 'Ucs4TestCases/Ucs4Test: ToUtf8/25 8-byte object <04-01 00-00 34-D1 5C-56>' - PASSED gtests.sh: #6082: 'Ucs4TestCases/Ucs4Test: ToUtf8/26 8-byte object <08-01 00-00 37-D1 5C-56>' - PASSED gtests.sh: #6083: 'Ucs4TestCases/Ucs4Test: ToUtf8/27 8-byte object <10-01 00-00 3A-D1 5C-56>' - PASSED gtests.sh: #6084: 'Ucs4TestCases/Ucs4Test: ToUtf8/28 8-byte object <20-01 00-00 3D-D1 5C-56>' - PASSED gtests.sh: #6085: 'Ucs4TestCases/Ucs4Test: ToUtf8/29 8-byte object <40-01 00-00 40-D1 5C-56>' - PASSED gtests.sh: #6086: 'Ucs4TestCases/Ucs4Test: ToUtf8/30 8-byte object <80-01 00-00 43-D1 5C-56>' - PASSED gtests.sh: #6087: 'Ucs4TestCases/Ucs4Test: ToUtf8/31 8-byte object <FF-01 00-00 46-D1 5C-56>' - PASSED gtests.sh: #6088: 'Ucs4TestCases/Ucs4Test: ToUtf8/32 8-byte object <00-02 00-00 49-D1 5C-56>' - PASSED gtests.sh: #6089: 'Ucs4TestCases/Ucs4Test: ToUtf8/33 8-byte object <01-02 00-00 4C-D1 5C-56>' - PASSED gtests.sh: #6090: 'Ucs4TestCases/Ucs4Test: ToUtf8/34 8-byte object <02-02 00-00 4F-D1 5C-56>' - PASSED gtests.sh: #6091: 'Ucs4TestCases/Ucs4Test: ToUtf8/35 8-byte object <04-02 00-00 52-D1 5C-56>' - PASSED gtests.sh: #6092: 'Ucs4TestCases/Ucs4Test: ToUtf8/36 8-byte object <08-02 00-00 55-D1 5C-56>' - PASSED gtests.sh: #6093: 'Ucs4TestCases/Ucs4Test: ToUtf8/37 8-byte object <10-02 00-00 58-D1 5C-56>' - PASSED gtests.sh: #6094: 'Ucs4TestCases/Ucs4Test: ToUtf8/38 8-byte object <20-02 00-00 5B-D1 5C-56>' - PASSED gtests.sh: #6095: 'Ucs4TestCases/Ucs4Test: ToUtf8/39 8-byte object <40-02 00-00 5E-D1 5C-56>' - PASSED gtests.sh: #6096: 'Ucs4TestCases/Ucs4Test: ToUtf8/40 8-byte object <80-02 00-00 61-D1 5C-56>' - PASSED gtests.sh: #6097: 'Ucs4TestCases/Ucs4Test: ToUtf8/41 8-byte object <00-03 00-00 64-D1 5C-56>' - PASSED gtests.sh: #6098: 'Ucs4TestCases/Ucs4Test: ToUtf8/42 8-byte object <FF-03 00-00 67-D1 5C-56>' - PASSED gtests.sh: #6099: 'Ucs4TestCases/Ucs4Test: ToUtf8/43 8-byte object <00-04 00-00 6A-D1 5C-56>' - PASSED gtests.sh: #6100: 'Ucs4TestCases/Ucs4Test: ToUtf8/44 8-byte object <01-04 00-00 6D-D1 5C-56>' - PASSED gtests.sh: #6101: 'Ucs4TestCases/Ucs4Test: ToUtf8/45 8-byte object <02-04 00-00 70-D1 5C-56>' - PASSED gtests.sh: #6102: 'Ucs4TestCases/Ucs4Test: ToUtf8/46 8-byte object <04-04 00-00 73-D1 5C-56>' - PASSED gtests.sh: #6103: 'Ucs4TestCases/Ucs4Test: ToUtf8/47 8-byte object <08-04 00-00 76-D1 5C-56>' - PASSED gtests.sh: #6104: 'Ucs4TestCases/Ucs4Test: ToUtf8/48 8-byte object <10-04 00-00 79-D1 5C-56>' - PASSED gtests.sh: #6105: 'Ucs4TestCases/Ucs4Test: ToUtf8/49 8-byte object <20-04 00-00 7C-D1 5C-56>' - PASSED gtests.sh: #6106: 'Ucs4TestCases/Ucs4Test: ToUtf8/50 8-byte object <40-04 00-00 7F-D1 5C-56>' - PASSED gtests.sh: #6107: 'Ucs4TestCases/Ucs4Test: ToUtf8/51 8-byte object <80-04 00-00 82-D1 5C-56>' - PASSED gtests.sh: #6108: 'Ucs4TestCases/Ucs4Test: ToUtf8/52 8-byte object <00-05 00-00 85-D1 5C-56>' - PASSED gtests.sh: #6109: 'Ucs4TestCases/Ucs4Test: ToUtf8/53 8-byte object <00-06 00-00 88-D1 5C-56>' - PASSED gtests.sh: #6110: 'Ucs4TestCases/Ucs4Test: ToUtf8/54 8-byte object <FF-07 00-00 8B-D1 5C-56>' - PASSED gtests.sh: #6111: 'Ucs4TestCases/Ucs4Test: ToUtf8/55 8-byte object <00-08 00-00 8E-D1 5C-56>' - PASSED gtests.sh: #6112: 'Ucs4TestCases/Ucs4Test: ToUtf8/56 8-byte object <01-08 00-00 92-D1 5C-56>' - PASSED gtests.sh: #6113: 'Ucs4TestCases/Ucs4Test: ToUtf8/57 8-byte object <02-08 00-00 96-D1 5C-56>' - PASSED gtests.sh: #6114: 'Ucs4TestCases/Ucs4Test: ToUtf8/58 8-byte object <04-08 00-00 9A-D1 5C-56>' - PASSED gtests.sh: #6115: 'Ucs4TestCases/Ucs4Test: ToUtf8/59 8-byte object <08-08 00-00 9E-D1 5C-56>' - PASSED gtests.sh: #6116: 'Ucs4TestCases/Ucs4Test: ToUtf8/60 8-byte object <10-08 00-00 A2-D1 5C-56>' - PASSED gtests.sh: #6117: 'Ucs4TestCases/Ucs4Test: ToUtf8/61 8-byte object <20-08 00-00 A6-D1 5C-56>' - PASSED gtests.sh: #6118: 'Ucs4TestCases/Ucs4Test: ToUtf8/62 8-byte object <40-08 00-00 AA-D1 5C-56>' - PASSED gtests.sh: #6119: 'Ucs4TestCases/Ucs4Test: ToUtf8/63 8-byte object <80-08 00-00 AE-D1 5C-56>' - PASSED gtests.sh: #6120: 'Ucs4TestCases/Ucs4Test: ToUtf8/64 8-byte object <00-09 00-00 B2-D1 5C-56>' - PASSED gtests.sh: #6121: 'Ucs4TestCases/Ucs4Test: ToUtf8/65 8-byte object <00-0A 00-00 B6-D1 5C-56>' - PASSED gtests.sh: #6122: 'Ucs4TestCases/Ucs4Test: ToUtf8/66 8-byte object <00-0C 00-00 BA-D1 5C-56>' - PASSED gtests.sh: #6123: 'Ucs4TestCases/Ucs4Test: ToUtf8/67 8-byte object <FF-0F 00-00 27-D1 5C-56>' - PASSED gtests.sh: #6124: 'Ucs4TestCases/Ucs4Test: ToUtf8/68 8-byte object <00-10 00-00 BE-D1 5C-56>' - PASSED gtests.sh: #6125: 'Ucs4TestCases/Ucs4Test: ToUtf8/69 8-byte object <01-10 00-00 C2-D1 5C-56>' - PASSED gtests.sh: #6126: 'Ucs4TestCases/Ucs4Test: ToUtf8/70 8-byte object <02-10 00-00 C6-D1 5C-56>' - PASSED gtests.sh: #6127: 'Ucs4TestCases/Ucs4Test: ToUtf8/71 8-byte object <04-10 00-00 CA-D1 5C-56>' - PASSED gtests.sh: #6128: 'Ucs4TestCases/Ucs4Test: ToUtf8/72 8-byte object <08-10 00-00 CE-D1 5C-56>' - PASSED gtests.sh: #6129: 'Ucs4TestCases/Ucs4Test: ToUtf8/73 8-byte object <10-10 00-00 D2-D1 5C-56>' - PASSED gtests.sh: #6130: 'Ucs4TestCases/Ucs4Test: ToUtf8/74 8-byte object <20-10 00-00 D6-D1 5C-56>' - PASSED gtests.sh: #6131: 'Ucs4TestCases/Ucs4Test: ToUtf8/75 8-byte object <40-10 00-00 DA-D1 5C-56>' - PASSED gtests.sh: #6132: 'Ucs4TestCases/Ucs4Test: ToUtf8/76 8-byte object <80-10 00-00 DE-D1 5C-56>' - PASSED gtests.sh: #6133: 'Ucs4TestCases/Ucs4Test: ToUtf8/77 8-byte object <00-11 00-00 E2-D1 5C-56>' - PASSED gtests.sh: #6134: 'Ucs4TestCases/Ucs4Test: ToUtf8/78 8-byte object <00-12 00-00 E6-D1 5C-56>' - PASSED gtests.sh: #6135: 'Ucs4TestCases/Ucs4Test: ToUtf8/79 8-byte object <00-14 00-00 EA-D1 5C-56>' - PASSED gtests.sh: #6136: 'Ucs4TestCases/Ucs4Test: ToUtf8/80 8-byte object <00-18 00-00 EE-D1 5C-56>' - PASSED gtests.sh: #6137: 'Ucs4TestCases/Ucs4Test: ToUtf8/81 8-byte object <FF-1F 00-00 F2-D1 5C-56>' - PASSED gtests.sh: #6138: 'Ucs4TestCases/Ucs4Test: ToUtf8/82 8-byte object <00-20 00-00 F6-D1 5C-56>' - PASSED gtests.sh: #6139: 'Ucs4TestCases/Ucs4Test: ToUtf8/83 8-byte object <01-20 00-00 FA-D1 5C-56>' - PASSED gtests.sh: #6140: 'Ucs4TestCases/Ucs4Test: ToUtf8/84 8-byte object <02-20 00-00 FE-D1 5C-56>' - PASSED gtests.sh: #6141: 'Ucs4TestCases/Ucs4Test: ToUtf8/85 8-byte object <04-20 00-00 02-D2 5C-56>' - PASSED gtests.sh: #6142: 'Ucs4TestCases/Ucs4Test: ToUtf8/86 8-byte object <08-20 00-00 06-D2 5C-56>' - PASSED gtests.sh: #6143: 'Ucs4TestCases/Ucs4Test: ToUtf8/87 8-byte object <10-20 00-00 0A-D2 5C-56>' - PASSED gtests.sh: #6144: 'Ucs4TestCases/Ucs4Test: ToUtf8/88 8-byte object <20-20 00-00 0E-D2 5C-56>' - PASSED gtests.sh: #6145: 'Ucs4TestCases/Ucs4Test: ToUtf8/89 8-byte object <40-20 00-00 12-D2 5C-56>' - PASSED gtests.sh: #6146: 'Ucs4TestCases/Ucs4Test: ToUtf8/90 8-byte object <80-20 00-00 16-D2 5C-56>' - PASSED gtests.sh: #6147: 'Ucs4TestCases/Ucs4Test: ToUtf8/91 8-byte object <00-21 00-00 1A-D2 5C-56>' - PASSED gtests.sh: #6148: 'Ucs4TestCases/Ucs4Test: ToUtf8/92 8-byte object <00-22 00-00 1E-D2 5C-56>' - PASSED gtests.sh: #6149: 'Ucs4TestCases/Ucs4Test: ToUtf8/93 8-byte object <00-24 00-00 22-D2 5C-56>' - PASSED gtests.sh: #6150: 'Ucs4TestCases/Ucs4Test: ToUtf8/94 8-byte object <00-28 00-00 26-D2 5C-56>' - PASSED gtests.sh: #6151: 'Ucs4TestCases/Ucs4Test: ToUtf8/95 8-byte object <00-30 00-00 2A-D2 5C-56>' - PASSED gtests.sh: #6152: 'Ucs4TestCases/Ucs4Test: ToUtf8/96 8-byte object <FF-3F 00-00 2E-D2 5C-56>' - PASSED gtests.sh: #6153: 'Ucs4TestCases/Ucs4Test: ToUtf8/97 8-byte object <00-40 00-00 32-D2 5C-56>' - PASSED gtests.sh: #6154: 'Ucs4TestCases/Ucs4Test: ToUtf8/98 8-byte object <01-40 00-00 36-D2 5C-56>' - PASSED gtests.sh: #6155: 'Ucs4TestCases/Ucs4Test: ToUtf8/99 8-byte object <02-40 00-00 3A-D2 5C-56>' - PASSED gtests.sh: #6156: 'Ucs4TestCases/Ucs4Test: ToUtf8/100 8-byte object <04-40 00-00 3E-D2 5C-56>' - PASSED gtests.sh: #6157: 'Ucs4TestCases/Ucs4Test: ToUtf8/101 8-byte object <08-40 00-00 42-D2 5C-56>' - PASSED gtests.sh: #6158: 'Ucs4TestCases/Ucs4Test: ToUtf8/102 8-byte object <10-40 00-00 46-D2 5C-56>' - PASSED gtests.sh: #6159: 'Ucs4TestCases/Ucs4Test: ToUtf8/103 8-byte object <20-40 00-00 4A-D2 5C-56>' - PASSED gtests.sh: #6160: 'Ucs4TestCases/Ucs4Test: ToUtf8/104 8-byte object <40-40 00-00 4E-D2 5C-56>' - PASSED gtests.sh: #6161: 'Ucs4TestCases/Ucs4Test: ToUtf8/105 8-byte object <80-40 00-00 52-D2 5C-56>' - PASSED gtests.sh: #6162: 'Ucs4TestCases/Ucs4Test: ToUtf8/106 8-byte object <00-41 00-00 56-D2 5C-56>' - PASSED gtests.sh: #6163: 'Ucs4TestCases/Ucs4Test: ToUtf8/107 8-byte object <00-42 00-00 5A-D2 5C-56>' - PASSED gtests.sh: #6164: 'Ucs4TestCases/Ucs4Test: ToUtf8/108 8-byte object <00-44 00-00 5E-D2 5C-56>' - PASSED gtests.sh: #6165: 'Ucs4TestCases/Ucs4Test: ToUtf8/109 8-byte object <00-48 00-00 62-D2 5C-56>' - PASSED gtests.sh: #6166: 'Ucs4TestCases/Ucs4Test: ToUtf8/110 8-byte object <00-50 00-00 66-D2 5C-56>' - PASSED gtests.sh: #6167: 'Ucs4TestCases/Ucs4Test: ToUtf8/111 8-byte object <00-60 00-00 6A-D2 5C-56>' - PASSED gtests.sh: #6168: 'Ucs4TestCases/Ucs4Test: ToUtf8/112 8-byte object <FF-7F 00-00 6E-D2 5C-56>' - PASSED gtests.sh: #6169: 'Ucs4TestCases/Ucs4Test: ToUtf8/113 8-byte object <00-80 00-00 72-D2 5C-56>' - PASSED gtests.sh: #6170: 'Ucs4TestCases/Ucs4Test: ToUtf8/114 8-byte object <01-80 00-00 76-D2 5C-56>' - PASSED gtests.sh: #6171: 'Ucs4TestCases/Ucs4Test: ToUtf8/115 8-byte object <02-80 00-00 7A-D2 5C-56>' - PASSED gtests.sh: #6172: 'Ucs4TestCases/Ucs4Test: ToUtf8/116 8-byte object <04-80 00-00 7E-D2 5C-56>' - PASSED gtests.sh: #6173: 'Ucs4TestCases/Ucs4Test: ToUtf8/117 8-byte object <08-80 00-00 82-D2 5C-56>' - PASSED gtests.sh: #6174: 'Ucs4TestCases/Ucs4Test: ToUtf8/118 8-byte object <10-80 00-00 86-D2 5C-56>' - PASSED gtests.sh: #6175: 'Ucs4TestCases/Ucs4Test: ToUtf8/119 8-byte object <20-80 00-00 8A-D2 5C-56>' - PASSED gtests.sh: #6176: 'Ucs4TestCases/Ucs4Test: ToUtf8/120 8-byte object <40-80 00-00 8E-D2 5C-56>' - PASSED gtests.sh: #6177: 'Ucs4TestCases/Ucs4Test: ToUtf8/121 8-byte object <80-80 00-00 92-D2 5C-56>' - PASSED gtests.sh: #6178: 'Ucs4TestCases/Ucs4Test: ToUtf8/122 8-byte object <00-81 00-00 96-D2 5C-56>' - PASSED gtests.sh: #6179: 'Ucs4TestCases/Ucs4Test: ToUtf8/123 8-byte object <00-82 00-00 9A-D2 5C-56>' - PASSED gtests.sh: #6180: 'Ucs4TestCases/Ucs4Test: ToUtf8/124 8-byte object <00-84 00-00 9E-D2 5C-56>' - PASSED gtests.sh: #6181: 'Ucs4TestCases/Ucs4Test: ToUtf8/125 8-byte object <00-88 00-00 A2-D2 5C-56>' - PASSED gtests.sh: #6182: 'Ucs4TestCases/Ucs4Test: ToUtf8/126 8-byte object <00-90 00-00 A6-D2 5C-56>' - PASSED gtests.sh: #6183: 'Ucs4TestCases/Ucs4Test: ToUtf8/127 8-byte object <00-A0 00-00 AA-D2 5C-56>' - PASSED gtests.sh: #6184: 'Ucs4TestCases/Ucs4Test: ToUtf8/128 8-byte object <00-C0 00-00 AE-D2 5C-56>' - PASSED gtests.sh: #6185: 'Ucs4TestCases/Ucs4Test: ToUtf8/129 8-byte object <FF-FF 00-00 B6-D2 5C-56>' - PASSED gtests.sh: #6186: 'Ucs4TestCases/Ucs4Test: ToUtf8/130 8-byte object <00-00 01-00 E6-D2 5C-56>' - PASSED gtests.sh: #6187: 'Ucs4TestCases/Ucs4Test: ToUtf8/131 8-byte object <01-00 01-00 EB-D2 5C-56>' - PASSED gtests.sh: #6188: 'Ucs4TestCases/Ucs4Test: ToUtf8/132 8-byte object <02-00 01-00 F0-D2 5C-56>' - PASSED gtests.sh: #6189: 'Ucs4TestCases/Ucs4Test: ToUtf8/133 8-byte object <04-00 01-00 F5-D2 5C-56>' - PASSED gtests.sh: #6190: 'Ucs4TestCases/Ucs4Test: ToUtf8/134 8-byte object <08-00 01-00 FA-D2 5C-56>' - PASSED gtests.sh: #6191: 'Ucs4TestCases/Ucs4Test: ToUtf8/135 8-byte object <10-00 01-00 FF-D2 5C-56>' - PASSED gtests.sh: #6192: 'Ucs4TestCases/Ucs4Test: ToUtf8/136 8-byte object <20-00 01-00 04-D3 5C-56>' - PASSED gtests.sh: #6193: 'Ucs4TestCases/Ucs4Test: ToUtf8/137 8-byte object <40-00 01-00 09-D3 5C-56>' - PASSED gtests.sh: #6194: 'Ucs4TestCases/Ucs4Test: ToUtf8/138 8-byte object <80-00 01-00 0E-D3 5C-56>' - PASSED gtests.sh: #6195: 'Ucs4TestCases/Ucs4Test: ToUtf8/139 8-byte object <00-01 01-00 13-D3 5C-56>' - PASSED gtests.sh: #6196: 'Ucs4TestCases/Ucs4Test: ToUtf8/140 8-byte object <00-02 01-00 18-D3 5C-56>' - PASSED gtests.sh: #6197: 'Ucs4TestCases/Ucs4Test: ToUtf8/141 8-byte object <00-04 01-00 1D-D3 5C-56>' - PASSED gtests.sh: #6198: 'Ucs4TestCases/Ucs4Test: ToUtf8/142 8-byte object <00-08 01-00 22-D3 5C-56>' - PASSED gtests.sh: #6199: 'Ucs4TestCases/Ucs4Test: ToUtf8/143 8-byte object <00-10 01-00 27-D3 5C-56>' - PASSED gtests.sh: #6200: 'Ucs4TestCases/Ucs4Test: ToUtf8/144 8-byte object <00-20 01-00 2C-D3 5C-56>' - PASSED gtests.sh: #6201: 'Ucs4TestCases/Ucs4Test: ToUtf8/145 8-byte object <00-40 01-00 31-D3 5C-56>' - PASSED gtests.sh: #6202: 'Ucs4TestCases/Ucs4Test: ToUtf8/146 8-byte object <00-80 01-00 36-D3 5C-56>' - PASSED gtests.sh: #6203: 'Ucs4TestCases/Ucs4Test: ToUtf8/147 8-byte object <FF-FF 01-00 3B-D3 5C-56>' - PASSED gtests.sh: #6204: 'Ucs4TestCases/Ucs4Test: ToUtf8/148 8-byte object <00-00 02-00 40-D3 5C-56>' - PASSED gtests.sh: #6205: 'Ucs4TestCases/Ucs4Test: ToUtf8/149 8-byte object <01-00 02-00 45-D3 5C-56>' - PASSED gtests.sh: #6206: 'Ucs4TestCases/Ucs4Test: ToUtf8/150 8-byte object <02-00 02-00 4A-D3 5C-56>' - PASSED gtests.sh: #6207: 'Ucs4TestCases/Ucs4Test: ToUtf8/151 8-byte object <04-00 02-00 4F-D3 5C-56>' - PASSED gtests.sh: #6208: 'Ucs4TestCases/Ucs4Test: ToUtf8/152 8-byte object <08-00 02-00 54-D3 5C-56>' - PASSED gtests.sh: #6209: 'Ucs4TestCases/Ucs4Test: ToUtf8/153 8-byte object <10-00 02-00 59-D3 5C-56>' - PASSED gtests.sh: #6210: 'Ucs4TestCases/Ucs4Test: ToUtf8/154 8-byte object <20-00 02-00 5E-D3 5C-56>' - PASSED gtests.sh: #6211: 'Ucs4TestCases/Ucs4Test: ToUtf8/155 8-byte object <40-00 02-00 63-D3 5C-56>' - PASSED gtests.sh: #6212: 'Ucs4TestCases/Ucs4Test: ToUtf8/156 8-byte object <80-00 02-00 68-D3 5C-56>' - PASSED gtests.sh: #6213: 'Ucs4TestCases/Ucs4Test: ToUtf8/157 8-byte object <00-01 02-00 6D-D3 5C-56>' - PASSED gtests.sh: #6214: 'Ucs4TestCases/Ucs4Test: ToUtf8/158 8-byte object <00-02 02-00 72-D3 5C-56>' - PASSED gtests.sh: #6215: 'Ucs4TestCases/Ucs4Test: ToUtf8/159 8-byte object <00-04 02-00 77-D3 5C-56>' - PASSED gtests.sh: #6216: 'Ucs4TestCases/Ucs4Test: ToUtf8/160 8-byte object <00-08 02-00 7C-D3 5C-56>' - PASSED gtests.sh: #6217: 'Ucs4TestCases/Ucs4Test: ToUtf8/161 8-byte object <00-10 02-00 81-D3 5C-56>' - PASSED gtests.sh: #6218: 'Ucs4TestCases/Ucs4Test: ToUtf8/162 8-byte object <00-20 02-00 86-D3 5C-56>' - PASSED gtests.sh: #6219: 'Ucs4TestCases/Ucs4Test: ToUtf8/163 8-byte object <00-40 02-00 8B-D3 5C-56>' - PASSED gtests.sh: #6220: 'Ucs4TestCases/Ucs4Test: ToUtf8/164 8-byte object <00-80 02-00 90-D3 5C-56>' - PASSED gtests.sh: #6221: 'Ucs4TestCases/Ucs4Test: ToUtf8/165 8-byte object <00-00 03-00 95-D3 5C-56>' - PASSED gtests.sh: #6222: 'Ucs4TestCases/Ucs4Test: ToUtf8/166 8-byte object <FF-FF 03-00 9A-D3 5C-56>' - PASSED gtests.sh: #6223: 'Ucs4TestCases/Ucs4Test: ToUtf8/167 8-byte object <00-00 04-00 9F-D3 5C-56>' - PASSED gtests.sh: #6224: 'Ucs4TestCases/Ucs4Test: ToUtf8/168 8-byte object <01-00 04-00 A4-D3 5C-56>' - PASSED gtests.sh: #6225: 'Ucs4TestCases/Ucs4Test: ToUtf8/169 8-byte object <02-00 04-00 A9-D3 5C-56>' - PASSED gtests.sh: #6226: 'Ucs4TestCases/Ucs4Test: ToUtf8/170 8-byte object <04-00 04-00 AE-D3 5C-56>' - PASSED gtests.sh: #6227: 'Ucs4TestCases/Ucs4Test: ToUtf8/171 8-byte object <08-00 04-00 B3-D3 5C-56>' - PASSED gtests.sh: #6228: 'Ucs4TestCases/Ucs4Test: ToUtf8/172 8-byte object <10-00 04-00 B8-D3 5C-56>' - PASSED gtests.sh: #6229: 'Ucs4TestCases/Ucs4Test: ToUtf8/173 8-byte object <20-00 04-00 BD-D3 5C-56>' - PASSED gtests.sh: #6230: 'Ucs4TestCases/Ucs4Test: ToUtf8/174 8-byte object <40-00 04-00 C2-D3 5C-56>' - PASSED gtests.sh: #6231: 'Ucs4TestCases/Ucs4Test: ToUtf8/175 8-byte object <80-00 04-00 C7-D3 5C-56>' - PASSED gtests.sh: #6232: 'Ucs4TestCases/Ucs4Test: ToUtf8/176 8-byte object <00-01 04-00 CC-D3 5C-56>' - PASSED gtests.sh: #6233: 'Ucs4TestCases/Ucs4Test: ToUtf8/177 8-byte object <00-02 04-00 D1-D3 5C-56>' - PASSED gtests.sh: #6234: 'Ucs4TestCases/Ucs4Test: ToUtf8/178 8-byte object <00-04 04-00 D6-D3 5C-56>' - PASSED gtests.sh: #6235: 'Ucs4TestCases/Ucs4Test: ToUtf8/179 8-byte object <00-08 04-00 DB-D3 5C-56>' - PASSED gtests.sh: #6236: 'Ucs4TestCases/Ucs4Test: ToUtf8/180 8-byte object <00-10 04-00 E0-D3 5C-56>' - PASSED gtests.sh: #6237: 'Ucs4TestCases/Ucs4Test: ToUtf8/181 8-byte object <00-20 04-00 E5-D3 5C-56>' - PASSED gtests.sh: #6238: 'Ucs4TestCases/Ucs4Test: ToUtf8/182 8-byte object <00-40 04-00 EA-D3 5C-56>' - PASSED gtests.sh: #6239: 'Ucs4TestCases/Ucs4Test: ToUtf8/183 8-byte object <00-80 04-00 EF-D3 5C-56>' - PASSED gtests.sh: #6240: 'Ucs4TestCases/Ucs4Test: ToUtf8/184 8-byte object <00-00 05-00 F4-D3 5C-56>' - PASSED gtests.sh: #6241: 'Ucs4TestCases/Ucs4Test: ToUtf8/185 8-byte object <00-00 06-00 F9-D3 5C-56>' - PASSED gtests.sh: #6242: 'Ucs4TestCases/Ucs4Test: ToUtf8/186 8-byte object <FF-FF 07-00 FE-D3 5C-56>' - PASSED gtests.sh: #6243: 'Ucs4TestCases/Ucs4Test: ToUtf8/187 8-byte object <00-00 08-00 03-D4 5C-56>' - PASSED gtests.sh: #6244: 'Ucs4TestCases/Ucs4Test: ToUtf8/188 8-byte object <01-00 08-00 08-D4 5C-56>' - PASSED gtests.sh: #6245: 'Ucs4TestCases/Ucs4Test: ToUtf8/189 8-byte object <02-00 08-00 0D-D4 5C-56>' - PASSED gtests.sh: #6246: 'Ucs4TestCases/Ucs4Test: ToUtf8/190 8-byte object <04-00 08-00 12-D4 5C-56>' - PASSED gtests.sh: #6247: 'Ucs4TestCases/Ucs4Test: ToUtf8/191 8-byte object <08-00 08-00 17-D4 5C-56>' - PASSED gtests.sh: #6248: 'Ucs4TestCases/Ucs4Test: ToUtf8/192 8-byte object <10-00 08-00 1C-D4 5C-56>' - PASSED gtests.sh: #6249: 'Ucs4TestCases/Ucs4Test: ToUtf8/193 8-byte object <20-00 08-00 21-D4 5C-56>' - PASSED gtests.sh: #6250: 'Ucs4TestCases/Ucs4Test: ToUtf8/194 8-byte object <40-00 08-00 26-D4 5C-56>' - PASSED gtests.sh: #6251: 'Ucs4TestCases/Ucs4Test: ToUtf8/195 8-byte object <80-00 08-00 2B-D4 5C-56>' - PASSED gtests.sh: #6252: 'Ucs4TestCases/Ucs4Test: ToUtf8/196 8-byte object <00-01 08-00 30-D4 5C-56>' - PASSED gtests.sh: #6253: 'Ucs4TestCases/Ucs4Test: ToUtf8/197 8-byte object <00-02 08-00 35-D4 5C-56>' - PASSED gtests.sh: #6254: 'Ucs4TestCases/Ucs4Test: ToUtf8/198 8-byte object <00-04 08-00 3A-D4 5C-56>' - PASSED gtests.sh: #6255: 'Ucs4TestCases/Ucs4Test: ToUtf8/199 8-byte object <00-08 08-00 3F-D4 5C-56>' - PASSED gtests.sh: #6256: 'Ucs4TestCases/Ucs4Test: ToUtf8/200 8-byte object <00-10 08-00 44-D4 5C-56>' - PASSED gtests.sh: #6257: 'Ucs4TestCases/Ucs4Test: ToUtf8/201 8-byte object <00-20 08-00 49-D4 5C-56>' - PASSED gtests.sh: #6258: 'Ucs4TestCases/Ucs4Test: ToUtf8/202 8-byte object <00-40 08-00 4E-D4 5C-56>' - PASSED gtests.sh: #6259: 'Ucs4TestCases/Ucs4Test: ToUtf8/203 8-byte object <00-80 08-00 53-D4 5C-56>' - PASSED gtests.sh: #6260: 'Ucs4TestCases/Ucs4Test: ToUtf8/204 8-byte object <00-00 09-00 58-D4 5C-56>' - PASSED gtests.sh: #6261: 'Ucs4TestCases/Ucs4Test: ToUtf8/205 8-byte object <00-00 0A-00 5D-D4 5C-56>' - PASSED gtests.sh: #6262: 'Ucs4TestCases/Ucs4Test: ToUtf8/206 8-byte object <00-00 0C-00 62-D4 5C-56>' - PASSED gtests.sh: #6263: 'Ucs4TestCases/Ucs4Test: ToUtf8/207 8-byte object <FF-FF 0F-00 67-D4 5C-56>' - PASSED gtests.sh: #6264: 'Ucs4TestCases/Ucs4Test: ToUtf8/208 8-byte object <00-00 10-00 6C-D4 5C-56>' - PASSED gtests.sh: #6265: 'Ucs4TestCases/Ucs4Test: ToUtf8/209 8-byte object <01-00 10-00 71-D4 5C-56>' - PASSED gtests.sh: #6266: 'Ucs4TestCases/Ucs4Test: ToUtf8/210 8-byte object <02-00 10-00 76-D4 5C-56>' - PASSED gtests.sh: #6267: 'Ucs4TestCases/Ucs4Test: ToUtf8/211 8-byte object <04-00 10-00 7B-D4 5C-56>' - PASSED gtests.sh: #6268: 'Ucs4TestCases/Ucs4Test: ToUtf8/212 8-byte object <08-00 10-00 80-D4 5C-56>' - PASSED gtests.sh: #6269: 'Ucs4TestCases/Ucs4Test: ToUtf8/213 8-byte object <10-00 10-00 85-D4 5C-56>' - PASSED gtests.sh: #6270: 'Ucs4TestCases/Ucs4Test: ToUtf8/214 8-byte object <20-00 10-00 8A-D4 5C-56>' - PASSED gtests.sh: #6271: 'Ucs4TestCases/Ucs4Test: ToUtf8/215 8-byte object <40-00 10-00 8F-D4 5C-56>' - PASSED gtests.sh: #6272: 'Ucs4TestCases/Ucs4Test: ToUtf8/216 8-byte object <80-00 10-00 94-D4 5C-56>' - PASSED gtests.sh: #6273: 'Ucs4TestCases/Ucs4Test: ToUtf8/217 8-byte object <00-01 10-00 99-D4 5C-56>' - PASSED gtests.sh: #6274: 'Ucs4TestCases/Ucs4Test: ToUtf8/218 8-byte object <00-02 10-00 9E-D4 5C-56>' - PASSED gtests.sh: #6275: 'Ucs4TestCases/Ucs4Test: ToUtf8/219 8-byte object <00-04 10-00 A3-D4 5C-56>' - PASSED gtests.sh: #6276: 'Ucs4TestCases/Ucs4Test: ToUtf8/220 8-byte object <00-08 10-00 A8-D4 5C-56>' - PASSED gtests.sh: #6277: 'Ucs4TestCases/Ucs4Test: ToUtf8/221 8-byte object <00-10 10-00 AD-D4 5C-56>' - PASSED gtests.sh: #6278: 'Ucs4TestCases/Ucs4Test: ToUtf8/222 8-byte object <00-20 10-00 B2-D4 5C-56>' - PASSED gtests.sh: #6279: 'Ucs4TestCases/Ucs4Test: ToUtf8/223 8-byte object <00-40 10-00 B7-D4 5C-56>' - PASSED gtests.sh: #6280: 'Ucs4TestCases/Ucs4Test: ToUtf8/224 8-byte object <00-80 10-00 BC-D4 5C-56>' - PASSED gtests.sh: #6281: 'Ucs4TestCases/Ucs4Test: ToUtf8/225 8-byte object <FF-FF 10-00 C1-D4 5C-56>' - PASSED gtests.sh: #6282: 'Ucs4TestCases/Ucs4Test: FromUtf8/0 8-byte object <01-00 00-00 BA-D2 5C-56>' - PASSED gtests.sh: #6283: 'Ucs4TestCases/Ucs4Test: FromUtf8/1 8-byte object <02-00 00-00 BC-D2 5C-56>' - PASSED gtests.sh: #6284: 'Ucs4TestCases/Ucs4Test: FromUtf8/2 8-byte object <03-00 00-00 BE-D2 5C-56>' - PASSED gtests.sh: #6285: 'Ucs4TestCases/Ucs4Test: FromUtf8/3 8-byte object <04-00 00-00 C0-D2 5C-56>' - PASSED gtests.sh: #6286: 'Ucs4TestCases/Ucs4Test: FromUtf8/4 8-byte object <07-00 00-00 C2-D2 5C-56>' - PASSED gtests.sh: #6287: 'Ucs4TestCases/Ucs4Test: FromUtf8/5 8-byte object <08-00 00-00 C4-D2 5C-56>' - PASSED gtests.sh: #6288: 'Ucs4TestCases/Ucs4Test: FromUtf8/6 8-byte object <0F-00 00-00 C6-D2 5C-56>' - PASSED gtests.sh: #6289: 'Ucs4TestCases/Ucs4Test: FromUtf8/7 8-byte object <10-00 00-00 C8-D2 5C-56>' - PASSED gtests.sh: #6290: 'Ucs4TestCases/Ucs4Test: FromUtf8/8 8-byte object <1F-00 00-00 CA-D2 5C-56>' - PASSED gtests.sh: #6291: 'Ucs4TestCases/Ucs4Test: FromUtf8/9 8-byte object <20-00 00-00 DB-47 5D-56>' - PASSED gtests.sh: #6292: 'Ucs4TestCases/Ucs4Test: FromUtf8/10 8-byte object <3F-00 00-00 E7-97 5C-56>' - PASSED gtests.sh: #6293: 'Ucs4TestCases/Ucs4Test: FromUtf8/11 8-byte object <40-00 00-00 0A-98 5C-56>' - PASSED gtests.sh: #6294: 'Ucs4TestCases/Ucs4Test: FromUtf8/12 8-byte object <7F-00 00-00 CC-D2 5C-56>' - PASSED gtests.sh: #6295: 'Ucs4TestCases/Ucs4Test: FromUtf8/13 8-byte object <80-00 00-00 CE-D2 5C-56>' - PASSED gtests.sh: #6296: 'Ucs4TestCases/Ucs4Test: FromUtf8/14 8-byte object <81-00 00-00 D1-D2 5C-56>' - PASSED gtests.sh: #6297: 'Ucs4TestCases/Ucs4Test: FromUtf8/15 8-byte object <82-00 00-00 D4-D2 5C-56>' - PASSED gtests.sh: #6298: 'Ucs4TestCases/Ucs4Test: FromUtf8/16 8-byte object <84-00 00-00 D7-D2 5C-56>' - PASSED gtests.sh: #6299: 'Ucs4TestCases/Ucs4Test: FromUtf8/17 8-byte object <88-00 00-00 DA-D2 5C-56>' - PASSED gtests.sh: #6300: 'Ucs4TestCases/Ucs4Test: FromUtf8/18 8-byte object <90-00 00-00 DD-D2 5C-56>' - PASSED gtests.sh: #6301: 'Ucs4TestCases/Ucs4Test: FromUtf8/19 8-byte object <A0-00 00-00 E0-D2 5C-56>' - PASSED gtests.sh: #6302: 'Ucs4TestCases/Ucs4Test: FromUtf8/20 8-byte object <C0-00 00-00 15-D1 5C-56>' - PASSED gtests.sh: #6303: 'Ucs4TestCases/Ucs4Test: FromUtf8/21 8-byte object <FF-00 00-00 E3-D2 5C-56>' - PASSED gtests.sh: #6304: 'Ucs4TestCases/Ucs4Test: FromUtf8/22 8-byte object <00-01 00-00 2B-D1 5C-56>' - PASSED gtests.sh: #6305: 'Ucs4TestCases/Ucs4Test: FromUtf8/23 8-byte object <01-01 00-00 2E-D1 5C-56>' - PASSED gtests.sh: #6306: 'Ucs4TestCases/Ucs4Test: FromUtf8/24 8-byte object <02-01 00-00 31-D1 5C-56>' - PASSED gtests.sh: #6307: 'Ucs4TestCases/Ucs4Test: FromUtf8/25 8-byte object <04-01 00-00 34-D1 5C-56>' - PASSED gtests.sh: #6308: 'Ucs4TestCases/Ucs4Test: FromUtf8/26 8-byte object <08-01 00-00 37-D1 5C-56>' - PASSED gtests.sh: #6309: 'Ucs4TestCases/Ucs4Test: FromUtf8/27 8-byte object <10-01 00-00 3A-D1 5C-56>' - PASSED gtests.sh: #6310: 'Ucs4TestCases/Ucs4Test: FromUtf8/28 8-byte object <20-01 00-00 3D-D1 5C-56>' - PASSED gtests.sh: #6311: 'Ucs4TestCases/Ucs4Test: FromUtf8/29 8-byte object <40-01 00-00 40-D1 5C-56>' - PASSED gtests.sh: #6312: 'Ucs4TestCases/Ucs4Test: FromUtf8/30 8-byte object <80-01 00-00 43-D1 5C-56>' - PASSED gtests.sh: #6313: 'Ucs4TestCases/Ucs4Test: FromUtf8/31 8-byte object <FF-01 00-00 46-D1 5C-56>' - PASSED gtests.sh: #6314: 'Ucs4TestCases/Ucs4Test: FromUtf8/32 8-byte object <00-02 00-00 49-D1 5C-56>' - PASSED gtests.sh: #6315: 'Ucs4TestCases/Ucs4Test: FromUtf8/33 8-byte object <01-02 00-00 4C-D1 5C-56>' - PASSED gtests.sh: #6316: 'Ucs4TestCases/Ucs4Test: FromUtf8/34 8-byte object <02-02 00-00 4F-D1 5C-56>' - PASSED gtests.sh: #6317: 'Ucs4TestCases/Ucs4Test: FromUtf8/35 8-byte object <04-02 00-00 52-D1 5C-56>' - PASSED gtests.sh: #6318: 'Ucs4TestCases/Ucs4Test: FromUtf8/36 8-byte object <08-02 00-00 55-D1 5C-56>' - PASSED gtests.sh: #6319: 'Ucs4TestCases/Ucs4Test: FromUtf8/37 8-byte object <10-02 00-00 58-D1 5C-56>' - PASSED gtests.sh: #6320: 'Ucs4TestCases/Ucs4Test: FromUtf8/38 8-byte object <20-02 00-00 5B-D1 5C-56>' - PASSED gtests.sh: #6321: 'Ucs4TestCases/Ucs4Test: FromUtf8/39 8-byte object <40-02 00-00 5E-D1 5C-56>' - PASSED gtests.sh: #6322: 'Ucs4TestCases/Ucs4Test: FromUtf8/40 8-byte object <80-02 00-00 61-D1 5C-56>' - PASSED gtests.sh: #6323: 'Ucs4TestCases/Ucs4Test: FromUtf8/41 8-byte object <00-03 00-00 64-D1 5C-56>' - PASSED gtests.sh: #6324: 'Ucs4TestCases/Ucs4Test: FromUtf8/42 8-byte object <FF-03 00-00 67-D1 5C-56>' - PASSED gtests.sh: #6325: 'Ucs4TestCases/Ucs4Test: FromUtf8/43 8-byte object <00-04 00-00 6A-D1 5C-56>' - PASSED gtests.sh: #6326: 'Ucs4TestCases/Ucs4Test: FromUtf8/44 8-byte object <01-04 00-00 6D-D1 5C-56>' - PASSED gtests.sh: #6327: 'Ucs4TestCases/Ucs4Test: FromUtf8/45 8-byte object <02-04 00-00 70-D1 5C-56>' - PASSED gtests.sh: #6328: 'Ucs4TestCases/Ucs4Test: FromUtf8/46 8-byte object <04-04 00-00 73-D1 5C-56>' - PASSED gtests.sh: #6329: 'Ucs4TestCases/Ucs4Test: FromUtf8/47 8-byte object <08-04 00-00 76-D1 5C-56>' - PASSED gtests.sh: #6330: 'Ucs4TestCases/Ucs4Test: FromUtf8/48 8-byte object <10-04 00-00 79-D1 5C-56>' - PASSED gtests.sh: #6331: 'Ucs4TestCases/Ucs4Test: FromUtf8/49 8-byte object <20-04 00-00 7C-D1 5C-56>' - PASSED gtests.sh: #6332: 'Ucs4TestCases/Ucs4Test: FromUtf8/50 8-byte object <40-04 00-00 7F-D1 5C-56>' - PASSED gtests.sh: #6333: 'Ucs4TestCases/Ucs4Test: FromUtf8/51 8-byte object <80-04 00-00 82-D1 5C-56>' - PASSED gtests.sh: #6334: 'Ucs4TestCases/Ucs4Test: FromUtf8/52 8-byte object <00-05 00-00 85-D1 5C-56>' - PASSED gtests.sh: #6335: 'Ucs4TestCases/Ucs4Test: FromUtf8/53 8-byte object <00-06 00-00 88-D1 5C-56>' - PASSED gtests.sh: #6336: 'Ucs4TestCases/Ucs4Test: FromUtf8/54 8-byte object <FF-07 00-00 8B-D1 5C-56>' - PASSED gtests.sh: #6337: 'Ucs4TestCases/Ucs4Test: FromUtf8/55 8-byte object <00-08 00-00 8E-D1 5C-56>' - PASSED gtests.sh: #6338: 'Ucs4TestCases/Ucs4Test: FromUtf8/56 8-byte object <01-08 00-00 92-D1 5C-56>' - PASSED gtests.sh: #6339: 'Ucs4TestCases/Ucs4Test: FromUtf8/57 8-byte object <02-08 00-00 96-D1 5C-56>' - PASSED gtests.sh: #6340: 'Ucs4TestCases/Ucs4Test: FromUtf8/58 8-byte object <04-08 00-00 9A-D1 5C-56>' - PASSED gtests.sh: #6341: 'Ucs4TestCases/Ucs4Test: FromUtf8/59 8-byte object <08-08 00-00 9E-D1 5C-56>' - PASSED gtests.sh: #6342: 'Ucs4TestCases/Ucs4Test: FromUtf8/60 8-byte object <10-08 00-00 A2-D1 5C-56>' - PASSED gtests.sh: #6343: 'Ucs4TestCases/Ucs4Test: FromUtf8/61 8-byte object <20-08 00-00 A6-D1 5C-56>' - PASSED gtests.sh: #6344: 'Ucs4TestCases/Ucs4Test: FromUtf8/62 8-byte object <40-08 00-00 AA-D1 5C-56>' - PASSED gtests.sh: #6345: 'Ucs4TestCases/Ucs4Test: FromUtf8/63 8-byte object <80-08 00-00 AE-D1 5C-56>' - PASSED gtests.sh: #6346: 'Ucs4TestCases/Ucs4Test: FromUtf8/64 8-byte object <00-09 00-00 B2-D1 5C-56>' - PASSED gtests.sh: #6347: 'Ucs4TestCases/Ucs4Test: FromUtf8/65 8-byte object <00-0A 00-00 B6-D1 5C-56>' - PASSED gtests.sh: #6348: 'Ucs4TestCases/Ucs4Test: FromUtf8/66 8-byte object <00-0C 00-00 BA-D1 5C-56>' - PASSED gtests.sh: #6349: 'Ucs4TestCases/Ucs4Test: FromUtf8/67 8-byte object <FF-0F 00-00 27-D1 5C-56>' - PASSED gtests.sh: #6350: 'Ucs4TestCases/Ucs4Test: FromUtf8/68 8-byte object <00-10 00-00 BE-D1 5C-56>' - PASSED gtests.sh: #6351: 'Ucs4TestCases/Ucs4Test: FromUtf8/69 8-byte object <01-10 00-00 C2-D1 5C-56>' - PASSED gtests.sh: #6352: 'Ucs4TestCases/Ucs4Test: FromUtf8/70 8-byte object <02-10 00-00 C6-D1 5C-56>' - PASSED gtests.sh: #6353: 'Ucs4TestCases/Ucs4Test: FromUtf8/71 8-byte object <04-10 00-00 CA-D1 5C-56>' - PASSED gtests.sh: #6354: 'Ucs4TestCases/Ucs4Test: FromUtf8/72 8-byte object <08-10 00-00 CE-D1 5C-56>' - PASSED gtests.sh: #6355: 'Ucs4TestCases/Ucs4Test: FromUtf8/73 8-byte object <10-10 00-00 D2-D1 5C-56>' - PASSED gtests.sh: #6356: 'Ucs4TestCases/Ucs4Test: FromUtf8/74 8-byte object <20-10 00-00 D6-D1 5C-56>' - PASSED gtests.sh: #6357: 'Ucs4TestCases/Ucs4Test: FromUtf8/75 8-byte object <40-10 00-00 DA-D1 5C-56>' - PASSED gtests.sh: #6358: 'Ucs4TestCases/Ucs4Test: FromUtf8/76 8-byte object <80-10 00-00 DE-D1 5C-56>' - PASSED gtests.sh: #6359: 'Ucs4TestCases/Ucs4Test: FromUtf8/77 8-byte object <00-11 00-00 E2-D1 5C-56>' - PASSED gtests.sh: #6360: 'Ucs4TestCases/Ucs4Test: FromUtf8/78 8-byte object <00-12 00-00 E6-D1 5C-56>' - PASSED gtests.sh: #6361: 'Ucs4TestCases/Ucs4Test: FromUtf8/79 8-byte object <00-14 00-00 EA-D1 5C-56>' - PASSED gtests.sh: #6362: 'Ucs4TestCases/Ucs4Test: FromUtf8/80 8-byte object <00-18 00-00 EE-D1 5C-56>' - PASSED gtests.sh: #6363: 'Ucs4TestCases/Ucs4Test: FromUtf8/81 8-byte object <FF-1F 00-00 F2-D1 5C-56>' - PASSED gtests.sh: #6364: 'Ucs4TestCases/Ucs4Test: FromUtf8/82 8-byte object <00-20 00-00 F6-D1 5C-56>' - PASSED gtests.sh: #6365: 'Ucs4TestCases/Ucs4Test: FromUtf8/83 8-byte object <01-20 00-00 FA-D1 5C-56>' - PASSED gtests.sh: #6366: 'Ucs4TestCases/Ucs4Test: FromUtf8/84 8-byte object <02-20 00-00 FE-D1 5C-56>' - PASSED gtests.sh: #6367: 'Ucs4TestCases/Ucs4Test: FromUtf8/85 8-byte object <04-20 00-00 02-D2 5C-56>' - PASSED gtests.sh: #6368: 'Ucs4TestCases/Ucs4Test: FromUtf8/86 8-byte object <08-20 00-00 06-D2 5C-56>' - PASSED gtests.sh: #6369: 'Ucs4TestCases/Ucs4Test: FromUtf8/87 8-byte object <10-20 00-00 0A-D2 5C-56>' - PASSED gtests.sh: #6370: 'Ucs4TestCases/Ucs4Test: FromUtf8/88 8-byte object <20-20 00-00 0E-D2 5C-56>' - PASSED gtests.sh: #6371: 'Ucs4TestCases/Ucs4Test: FromUtf8/89 8-byte object <40-20 00-00 12-D2 5C-56>' - PASSED gtests.sh: #6372: 'Ucs4TestCases/Ucs4Test: FromUtf8/90 8-byte object <80-20 00-00 16-D2 5C-56>' - PASSED gtests.sh: #6373: 'Ucs4TestCases/Ucs4Test: FromUtf8/91 8-byte object <00-21 00-00 1A-D2 5C-56>' - PASSED gtests.sh: #6374: 'Ucs4TestCases/Ucs4Test: FromUtf8/92 8-byte object <00-22 00-00 1E-D2 5C-56>' - PASSED gtests.sh: #6375: 'Ucs4TestCases/Ucs4Test: FromUtf8/93 8-byte object <00-24 00-00 22-D2 5C-56>' - PASSED gtests.sh: #6376: 'Ucs4TestCases/Ucs4Test: FromUtf8/94 8-byte object <00-28 00-00 26-D2 5C-56>' - PASSED gtests.sh: #6377: 'Ucs4TestCases/Ucs4Test: FromUtf8/95 8-byte object <00-30 00-00 2A-D2 5C-56>' - PASSED gtests.sh: #6378: 'Ucs4TestCases/Ucs4Test: FromUtf8/96 8-byte object <FF-3F 00-00 2E-D2 5C-56>' - PASSED gtests.sh: #6379: 'Ucs4TestCases/Ucs4Test: FromUtf8/97 8-byte object <00-40 00-00 32-D2 5C-56>' - PASSED gtests.sh: #6380: 'Ucs4TestCases/Ucs4Test: FromUtf8/98 8-byte object <01-40 00-00 36-D2 5C-56>' - PASSED gtests.sh: #6381: 'Ucs4TestCases/Ucs4Test: FromUtf8/99 8-byte object <02-40 00-00 3A-D2 5C-56>' - PASSED gtests.sh: #6382: 'Ucs4TestCases/Ucs4Test: FromUtf8/100 8-byte object <04-40 00-00 3E-D2 5C-56>' - PASSED gtests.sh: #6383: 'Ucs4TestCases/Ucs4Test: FromUtf8/101 8-byte object <08-40 00-00 42-D2 5C-56>' - PASSED gtests.sh: #6384: 'Ucs4TestCases/Ucs4Test: FromUtf8/102 8-byte object <10-40 00-00 46-D2 5C-56>' - PASSED gtests.sh: #6385: 'Ucs4TestCases/Ucs4Test: FromUtf8/103 8-byte object <20-40 00-00 4A-D2 5C-56>' - PASSED gtests.sh: #6386: 'Ucs4TestCases/Ucs4Test: FromUtf8/104 8-byte object <40-40 00-00 4E-D2 5C-56>' - PASSED gtests.sh: #6387: 'Ucs4TestCases/Ucs4Test: FromUtf8/105 8-byte object <80-40 00-00 52-D2 5C-56>' - PASSED gtests.sh: #6388: 'Ucs4TestCases/Ucs4Test: FromUtf8/106 8-byte object <00-41 00-00 56-D2 5C-56>' - PASSED gtests.sh: #6389: 'Ucs4TestCases/Ucs4Test: FromUtf8/107 8-byte object <00-42 00-00 5A-D2 5C-56>' - PASSED gtests.sh: #6390: 'Ucs4TestCases/Ucs4Test: FromUtf8/108 8-byte object <00-44 00-00 5E-D2 5C-56>' - PASSED gtests.sh: #6391: 'Ucs4TestCases/Ucs4Test: FromUtf8/109 8-byte object <00-48 00-00 62-D2 5C-56>' - PASSED gtests.sh: #6392: 'Ucs4TestCases/Ucs4Test: FromUtf8/110 8-byte object <00-50 00-00 66-D2 5C-56>' - PASSED gtests.sh: #6393: 'Ucs4TestCases/Ucs4Test: FromUtf8/111 8-byte object <00-60 00-00 6A-D2 5C-56>' - PASSED gtests.sh: #6394: 'Ucs4TestCases/Ucs4Test: FromUtf8/112 8-byte object <FF-7F 00-00 6E-D2 5C-56>' - PASSED gtests.sh: #6395: 'Ucs4TestCases/Ucs4Test: FromUtf8/113 8-byte object <00-80 00-00 72-D2 5C-56>' - PASSED gtests.sh: #6396: 'Ucs4TestCases/Ucs4Test: FromUtf8/114 8-byte object <01-80 00-00 76-D2 5C-56>' - PASSED gtests.sh: #6397: 'Ucs4TestCases/Ucs4Test: FromUtf8/115 8-byte object <02-80 00-00 7A-D2 5C-56>' - PASSED gtests.sh: #6398: 'Ucs4TestCases/Ucs4Test: FromUtf8/116 8-byte object <04-80 00-00 7E-D2 5C-56>' - PASSED gtests.sh: #6399: 'Ucs4TestCases/Ucs4Test: FromUtf8/117 8-byte object <08-80 00-00 82-D2 5C-56>' - PASSED gtests.sh: #6400: 'Ucs4TestCases/Ucs4Test: FromUtf8/118 8-byte object <10-80 00-00 86-D2 5C-56>' - PASSED gtests.sh: #6401: 'Ucs4TestCases/Ucs4Test: FromUtf8/119 8-byte object <20-80 00-00 8A-D2 5C-56>' - PASSED gtests.sh: #6402: 'Ucs4TestCases/Ucs4Test: FromUtf8/120 8-byte object <40-80 00-00 8E-D2 5C-56>' - PASSED gtests.sh: #6403: 'Ucs4TestCases/Ucs4Test: FromUtf8/121 8-byte object <80-80 00-00 92-D2 5C-56>' - PASSED gtests.sh: #6404: 'Ucs4TestCases/Ucs4Test: FromUtf8/122 8-byte object <00-81 00-00 96-D2 5C-56>' - PASSED gtests.sh: #6405: 'Ucs4TestCases/Ucs4Test: FromUtf8/123 8-byte object <00-82 00-00 9A-D2 5C-56>' - PASSED gtests.sh: #6406: 'Ucs4TestCases/Ucs4Test: FromUtf8/124 8-byte object <00-84 00-00 9E-D2 5C-56>' - PASSED gtests.sh: #6407: 'Ucs4TestCases/Ucs4Test: FromUtf8/125 8-byte object <00-88 00-00 A2-D2 5C-56>' - PASSED gtests.sh: #6408: 'Ucs4TestCases/Ucs4Test: FromUtf8/126 8-byte object <00-90 00-00 A6-D2 5C-56>' - PASSED gtests.sh: #6409: 'Ucs4TestCases/Ucs4Test: FromUtf8/127 8-byte object <00-A0 00-00 AA-D2 5C-56>' - PASSED gtests.sh: #6410: 'Ucs4TestCases/Ucs4Test: FromUtf8/128 8-byte object <00-C0 00-00 AE-D2 5C-56>' - PASSED gtests.sh: #6411: 'Ucs4TestCases/Ucs4Test: FromUtf8/129 8-byte object <FF-FF 00-00 B6-D2 5C-56>' - PASSED gtests.sh: #6412: 'Ucs4TestCases/Ucs4Test: FromUtf8/130 8-byte object <00-00 01-00 E6-D2 5C-56>' - PASSED gtests.sh: #6413: 'Ucs4TestCases/Ucs4Test: FromUtf8/131 8-byte object <01-00 01-00 EB-D2 5C-56>' - PASSED gtests.sh: #6414: 'Ucs4TestCases/Ucs4Test: FromUtf8/132 8-byte object <02-00 01-00 F0-D2 5C-56>' - PASSED gtests.sh: #6415: 'Ucs4TestCases/Ucs4Test: FromUtf8/133 8-byte object <04-00 01-00 F5-D2 5C-56>' - PASSED gtests.sh: #6416: 'Ucs4TestCases/Ucs4Test: FromUtf8/134 8-byte object <08-00 01-00 FA-D2 5C-56>' - PASSED gtests.sh: #6417: 'Ucs4TestCases/Ucs4Test: FromUtf8/135 8-byte object <10-00 01-00 FF-D2 5C-56>' - PASSED gtests.sh: #6418: 'Ucs4TestCases/Ucs4Test: FromUtf8/136 8-byte object <20-00 01-00 04-D3 5C-56>' - PASSED gtests.sh: #6419: 'Ucs4TestCases/Ucs4Test: FromUtf8/137 8-byte object <40-00 01-00 09-D3 5C-56>' - PASSED gtests.sh: #6420: 'Ucs4TestCases/Ucs4Test: FromUtf8/138 8-byte object <80-00 01-00 0E-D3 5C-56>' - PASSED gtests.sh: #6421: 'Ucs4TestCases/Ucs4Test: FromUtf8/139 8-byte object <00-01 01-00 13-D3 5C-56>' - PASSED gtests.sh: #6422: 'Ucs4TestCases/Ucs4Test: FromUtf8/140 8-byte object <00-02 01-00 18-D3 5C-56>' - PASSED gtests.sh: #6423: 'Ucs4TestCases/Ucs4Test: FromUtf8/141 8-byte object <00-04 01-00 1D-D3 5C-56>' - PASSED gtests.sh: #6424: 'Ucs4TestCases/Ucs4Test: FromUtf8/142 8-byte object <00-08 01-00 22-D3 5C-56>' - PASSED gtests.sh: #6425: 'Ucs4TestCases/Ucs4Test: FromUtf8/143 8-byte object <00-10 01-00 27-D3 5C-56>' - PASSED gtests.sh: #6426: 'Ucs4TestCases/Ucs4Test: FromUtf8/144 8-byte object <00-20 01-00 2C-D3 5C-56>' - PASSED gtests.sh: #6427: 'Ucs4TestCases/Ucs4Test: FromUtf8/145 8-byte object <00-40 01-00 31-D3 5C-56>' - PASSED gtests.sh: #6428: 'Ucs4TestCases/Ucs4Test: FromUtf8/146 8-byte object <00-80 01-00 36-D3 5C-56>' - PASSED gtests.sh: #6429: 'Ucs4TestCases/Ucs4Test: FromUtf8/147 8-byte object <FF-FF 01-00 3B-D3 5C-56>' - PASSED gtests.sh: #6430: 'Ucs4TestCases/Ucs4Test: FromUtf8/148 8-byte object <00-00 02-00 40-D3 5C-56>' - PASSED gtests.sh: #6431: 'Ucs4TestCases/Ucs4Test: FromUtf8/149 8-byte object <01-00 02-00 45-D3 5C-56>' - PASSED gtests.sh: #6432: 'Ucs4TestCases/Ucs4Test: FromUtf8/150 8-byte object <02-00 02-00 4A-D3 5C-56>' - PASSED gtests.sh: #6433: 'Ucs4TestCases/Ucs4Test: FromUtf8/151 8-byte object <04-00 02-00 4F-D3 5C-56>' - PASSED gtests.sh: #6434: 'Ucs4TestCases/Ucs4Test: FromUtf8/152 8-byte object <08-00 02-00 54-D3 5C-56>' - PASSED gtests.sh: #6435: 'Ucs4TestCases/Ucs4Test: FromUtf8/153 8-byte object <10-00 02-00 59-D3 5C-56>' - PASSED gtests.sh: #6436: 'Ucs4TestCases/Ucs4Test: FromUtf8/154 8-byte object <20-00 02-00 5E-D3 5C-56>' - PASSED gtests.sh: #6437: 'Ucs4TestCases/Ucs4Test: FromUtf8/155 8-byte object <40-00 02-00 63-D3 5C-56>' - PASSED gtests.sh: #6438: 'Ucs4TestCases/Ucs4Test: FromUtf8/156 8-byte object <80-00 02-00 68-D3 5C-56>' - PASSED gtests.sh: #6439: 'Ucs4TestCases/Ucs4Test: FromUtf8/157 8-byte object <00-01 02-00 6D-D3 5C-56>' - PASSED gtests.sh: #6440: 'Ucs4TestCases/Ucs4Test: FromUtf8/158 8-byte object <00-02 02-00 72-D3 5C-56>' - PASSED gtests.sh: #6441: 'Ucs4TestCases/Ucs4Test: FromUtf8/159 8-byte object <00-04 02-00 77-D3 5C-56>' - PASSED gtests.sh: #6442: 'Ucs4TestCases/Ucs4Test: FromUtf8/160 8-byte object <00-08 02-00 7C-D3 5C-56>' - PASSED gtests.sh: #6443: 'Ucs4TestCases/Ucs4Test: FromUtf8/161 8-byte object <00-10 02-00 81-D3 5C-56>' - PASSED gtests.sh: #6444: 'Ucs4TestCases/Ucs4Test: FromUtf8/162 8-byte object <00-20 02-00 86-D3 5C-56>' - PASSED gtests.sh: #6445: 'Ucs4TestCases/Ucs4Test: FromUtf8/163 8-byte object <00-40 02-00 8B-D3 5C-56>' - PASSED gtests.sh: #6446: 'Ucs4TestCases/Ucs4Test: FromUtf8/164 8-byte object <00-80 02-00 90-D3 5C-56>' - PASSED gtests.sh: #6447: 'Ucs4TestCases/Ucs4Test: FromUtf8/165 8-byte object <00-00 03-00 95-D3 5C-56>' - PASSED gtests.sh: #6448: 'Ucs4TestCases/Ucs4Test: FromUtf8/166 8-byte object <FF-FF 03-00 9A-D3 5C-56>' - PASSED gtests.sh: #6449: 'Ucs4TestCases/Ucs4Test: FromUtf8/167 8-byte object <00-00 04-00 9F-D3 5C-56>' - PASSED gtests.sh: #6450: 'Ucs4TestCases/Ucs4Test: FromUtf8/168 8-byte object <01-00 04-00 A4-D3 5C-56>' - PASSED gtests.sh: #6451: 'Ucs4TestCases/Ucs4Test: FromUtf8/169 8-byte object <02-00 04-00 A9-D3 5C-56>' - PASSED gtests.sh: #6452: 'Ucs4TestCases/Ucs4Test: FromUtf8/170 8-byte object <04-00 04-00 AE-D3 5C-56>' - PASSED gtests.sh: #6453: 'Ucs4TestCases/Ucs4Test: FromUtf8/171 8-byte object <08-00 04-00 B3-D3 5C-56>' - PASSED gtests.sh: #6454: 'Ucs4TestCases/Ucs4Test: FromUtf8/172 8-byte object <10-00 04-00 B8-D3 5C-56>' - PASSED gtests.sh: #6455: 'Ucs4TestCases/Ucs4Test: FromUtf8/173 8-byte object <20-00 04-00 BD-D3 5C-56>' - PASSED gtests.sh: #6456: 'Ucs4TestCases/Ucs4Test: FromUtf8/174 8-byte object <40-00 04-00 C2-D3 5C-56>' - PASSED gtests.sh: #6457: 'Ucs4TestCases/Ucs4Test: FromUtf8/175 8-byte object <80-00 04-00 C7-D3 5C-56>' - PASSED gtests.sh: #6458: 'Ucs4TestCases/Ucs4Test: FromUtf8/176 8-byte object <00-01 04-00 CC-D3 5C-56>' - PASSED gtests.sh: #6459: 'Ucs4TestCases/Ucs4Test: FromUtf8/177 8-byte object <00-02 04-00 D1-D3 5C-56>' - PASSED gtests.sh: #6460: 'Ucs4TestCases/Ucs4Test: FromUtf8/178 8-byte object <00-04 04-00 D6-D3 5C-56>' - PASSED gtests.sh: #6461: 'Ucs4TestCases/Ucs4Test: FromUtf8/179 8-byte object <00-08 04-00 DB-D3 5C-56>' - PASSED gtests.sh: #6462: 'Ucs4TestCases/Ucs4Test: FromUtf8/180 8-byte object <00-10 04-00 E0-D3 5C-56>' - PASSED gtests.sh: #6463: 'Ucs4TestCases/Ucs4Test: FromUtf8/181 8-byte object <00-20 04-00 E5-D3 5C-56>' - PASSED gtests.sh: #6464: 'Ucs4TestCases/Ucs4Test: FromUtf8/182 8-byte object <00-40 04-00 EA-D3 5C-56>' - PASSED gtests.sh: #6465: 'Ucs4TestCases/Ucs4Test: FromUtf8/183 8-byte object <00-80 04-00 EF-D3 5C-56>' - PASSED gtests.sh: #6466: 'Ucs4TestCases/Ucs4Test: FromUtf8/184 8-byte object <00-00 05-00 F4-D3 5C-56>' - PASSED gtests.sh: #6467: 'Ucs4TestCases/Ucs4Test: FromUtf8/185 8-byte object <00-00 06-00 F9-D3 5C-56>' - PASSED gtests.sh: #6468: 'Ucs4TestCases/Ucs4Test: FromUtf8/186 8-byte object <FF-FF 07-00 FE-D3 5C-56>' - PASSED gtests.sh: #6469: 'Ucs4TestCases/Ucs4Test: FromUtf8/187 8-byte object <00-00 08-00 03-D4 5C-56>' - PASSED gtests.sh: #6470: 'Ucs4TestCases/Ucs4Test: FromUtf8/188 8-byte object <01-00 08-00 08-D4 5C-56>' - PASSED gtests.sh: #6471: 'Ucs4TestCases/Ucs4Test: FromUtf8/189 8-byte object <02-00 08-00 0D-D4 5C-56>' - PASSED gtests.sh: #6472: 'Ucs4TestCases/Ucs4Test: FromUtf8/190 8-byte object <04-00 08-00 12-D4 5C-56>' - PASSED gtests.sh: #6473: 'Ucs4TestCases/Ucs4Test: FromUtf8/191 8-byte object <08-00 08-00 17-D4 5C-56>' - PASSED gtests.sh: #6474: 'Ucs4TestCases/Ucs4Test: FromUtf8/192 8-byte object <10-00 08-00 1C-D4 5C-56>' - PASSED gtests.sh: #6475: 'Ucs4TestCases/Ucs4Test: FromUtf8/193 8-byte object <20-00 08-00 21-D4 5C-56>' - PASSED gtests.sh: #6476: 'Ucs4TestCases/Ucs4Test: FromUtf8/194 8-byte object <40-00 08-00 26-D4 5C-56>' - PASSED gtests.sh: #6477: 'Ucs4TestCases/Ucs4Test: FromUtf8/195 8-byte object <80-00 08-00 2B-D4 5C-56>' - PASSED gtests.sh: #6478: 'Ucs4TestCases/Ucs4Test: FromUtf8/196 8-byte object <00-01 08-00 30-D4 5C-56>' - PASSED gtests.sh: #6479: 'Ucs4TestCases/Ucs4Test: FromUtf8/197 8-byte object <00-02 08-00 35-D4 5C-56>' - PASSED gtests.sh: #6480: 'Ucs4TestCases/Ucs4Test: FromUtf8/198 8-byte object <00-04 08-00 3A-D4 5C-56>' - PASSED gtests.sh: #6481: 'Ucs4TestCases/Ucs4Test: FromUtf8/199 8-byte object <00-08 08-00 3F-D4 5C-56>' - PASSED gtests.sh: #6482: 'Ucs4TestCases/Ucs4Test: FromUtf8/200 8-byte object <00-10 08-00 44-D4 5C-56>' - PASSED gtests.sh: #6483: 'Ucs4TestCases/Ucs4Test: FromUtf8/201 8-byte object <00-20 08-00 49-D4 5C-56>' - PASSED gtests.sh: #6484: 'Ucs4TestCases/Ucs4Test: FromUtf8/202 8-byte object <00-40 08-00 4E-D4 5C-56>' - PASSED gtests.sh: #6485: 'Ucs4TestCases/Ucs4Test: FromUtf8/203 8-byte object <00-80 08-00 53-D4 5C-56>' - PASSED gtests.sh: #6486: 'Ucs4TestCases/Ucs4Test: FromUtf8/204 8-byte object <00-00 09-00 58-D4 5C-56>' - PASSED gtests.sh: #6487: 'Ucs4TestCases/Ucs4Test: FromUtf8/205 8-byte object <00-00 0A-00 5D-D4 5C-56>' - PASSED gtests.sh: #6488: 'Ucs4TestCases/Ucs4Test: FromUtf8/206 8-byte object <00-00 0C-00 62-D4 5C-56>' - PASSED gtests.sh: #6489: 'Ucs4TestCases/Ucs4Test: FromUtf8/207 8-byte object <FF-FF 0F-00 67-D4 5C-56>' - PASSED gtests.sh: #6490: 'Ucs4TestCases/Ucs4Test: FromUtf8/208 8-byte object <00-00 10-00 6C-D4 5C-56>' - PASSED gtests.sh: #6491: 'Ucs4TestCases/Ucs4Test: FromUtf8/209 8-byte object <01-00 10-00 71-D4 5C-56>' - PASSED gtests.sh: #6492: 'Ucs4TestCases/Ucs4Test: FromUtf8/210 8-byte object <02-00 10-00 76-D4 5C-56>' - PASSED gtests.sh: #6493: 'Ucs4TestCases/Ucs4Test: FromUtf8/211 8-byte object <04-00 10-00 7B-D4 5C-56>' - PASSED gtests.sh: #6494: 'Ucs4TestCases/Ucs4Test: FromUtf8/212 8-byte object <08-00 10-00 80-D4 5C-56>' - PASSED gtests.sh: #6495: 'Ucs4TestCases/Ucs4Test: FromUtf8/213 8-byte object <10-00 10-00 85-D4 5C-56>' - PASSED gtests.sh: #6496: 'Ucs4TestCases/Ucs4Test: FromUtf8/214 8-byte object <20-00 10-00 8A-D4 5C-56>' - PASSED gtests.sh: #6497: 'Ucs4TestCases/Ucs4Test: FromUtf8/215 8-byte object <40-00 10-00 8F-D4 5C-56>' - PASSED gtests.sh: #6498: 'Ucs4TestCases/Ucs4Test: FromUtf8/216 8-byte object <80-00 10-00 94-D4 5C-56>' - PASSED gtests.sh: #6499: 'Ucs4TestCases/Ucs4Test: FromUtf8/217 8-byte object <00-01 10-00 99-D4 5C-56>' - PASSED gtests.sh: #6500: 'Ucs4TestCases/Ucs4Test: FromUtf8/218 8-byte object <00-02 10-00 9E-D4 5C-56>' - PASSED gtests.sh: #6501: 'Ucs4TestCases/Ucs4Test: FromUtf8/219 8-byte object <00-04 10-00 A3-D4 5C-56>' - PASSED gtests.sh: #6502: 'Ucs4TestCases/Ucs4Test: FromUtf8/220 8-byte object <00-08 10-00 A8-D4 5C-56>' - PASSED gtests.sh: #6503: 'Ucs4TestCases/Ucs4Test: FromUtf8/221 8-byte object <00-10 10-00 AD-D4 5C-56>' - PASSED gtests.sh: #6504: 'Ucs4TestCases/Ucs4Test: FromUtf8/222 8-byte object <00-20 10-00 B2-D4 5C-56>' - PASSED gtests.sh: #6505: 'Ucs4TestCases/Ucs4Test: FromUtf8/223 8-byte object <00-40 10-00 B7-D4 5C-56>' - PASSED gtests.sh: #6506: 'Ucs4TestCases/Ucs4Test: FromUtf8/224 8-byte object <00-80 10-00 BC-D4 5C-56>' - PASSED gtests.sh: #6507: 'Ucs4TestCases/Ucs4Test: FromUtf8/225 8-byte object <FF-FF 10-00 C1-D4 5C-56>' - PASSED gtests.sh: #6508: 'Ucs4TestCases/Ucs4Test: DestTooSmall/0 8-byte object <01-00 00-00 BA-D2 5C-56>' - PASSED gtests.sh: #6509: 'Ucs4TestCases/Ucs4Test: DestTooSmall/1 8-byte object <02-00 00-00 BC-D2 5C-56>' - PASSED gtests.sh: #6510: 'Ucs4TestCases/Ucs4Test: DestTooSmall/2 8-byte object <03-00 00-00 BE-D2 5C-56>' - PASSED gtests.sh: #6511: 'Ucs4TestCases/Ucs4Test: DestTooSmall/3 8-byte object <04-00 00-00 C0-D2 5C-56>' - PASSED gtests.sh: #6512: 'Ucs4TestCases/Ucs4Test: DestTooSmall/4 8-byte object <07-00 00-00 C2-D2 5C-56>' - PASSED gtests.sh: #6513: 'Ucs4TestCases/Ucs4Test: DestTooSmall/5 8-byte object <08-00 00-00 C4-D2 5C-56>' - PASSED gtests.sh: #6514: 'Ucs4TestCases/Ucs4Test: DestTooSmall/6 8-byte object <0F-00 00-00 C6-D2 5C-56>' - PASSED gtests.sh: #6515: 'Ucs4TestCases/Ucs4Test: DestTooSmall/7 8-byte object <10-00 00-00 C8-D2 5C-56>' - PASSED gtests.sh: #6516: 'Ucs4TestCases/Ucs4Test: DestTooSmall/8 8-byte object <1F-00 00-00 CA-D2 5C-56>' - PASSED gtests.sh: #6517: 'Ucs4TestCases/Ucs4Test: DestTooSmall/9 8-byte object <20-00 00-00 DB-47 5D-56>' - PASSED gtests.sh: #6518: 'Ucs4TestCases/Ucs4Test: DestTooSmall/10 8-byte object <3F-00 00-00 E7-97 5C-56>' - PASSED gtests.sh: #6519: 'Ucs4TestCases/Ucs4Test: DestTooSmall/11 8-byte object <40-00 00-00 0A-98 5C-56>' - PASSED gtests.sh: #6520: 'Ucs4TestCases/Ucs4Test: DestTooSmall/12 8-byte object <7F-00 00-00 CC-D2 5C-56>' - PASSED gtests.sh: #6521: 'Ucs4TestCases/Ucs4Test: DestTooSmall/13 8-byte object <80-00 00-00 CE-D2 5C-56>' - PASSED gtests.sh: #6522: 'Ucs4TestCases/Ucs4Test: DestTooSmall/14 8-byte object <81-00 00-00 D1-D2 5C-56>' - PASSED gtests.sh: #6523: 'Ucs4TestCases/Ucs4Test: DestTooSmall/15 8-byte object <82-00 00-00 D4-D2 5C-56>' - PASSED gtests.sh: #6524: 'Ucs4TestCases/Ucs4Test: DestTooSmall/16 8-byte object <84-00 00-00 D7-D2 5C-56>' - PASSED gtests.sh: #6525: 'Ucs4TestCases/Ucs4Test: DestTooSmall/17 8-byte object <88-00 00-00 DA-D2 5C-56>' - PASSED gtests.sh: #6526: 'Ucs4TestCases/Ucs4Test: DestTooSmall/18 8-byte object <90-00 00-00 DD-D2 5C-56>' - PASSED gtests.sh: #6527: 'Ucs4TestCases/Ucs4Test: DestTooSmall/19 8-byte object <A0-00 00-00 E0-D2 5C-56>' - PASSED gtests.sh: #6528: 'Ucs4TestCases/Ucs4Test: DestTooSmall/20 8-byte object <C0-00 00-00 15-D1 5C-56>' - PASSED gtests.sh: #6529: 'Ucs4TestCases/Ucs4Test: DestTooSmall/21 8-byte object <FF-00 00-00 E3-D2 5C-56>' - PASSED gtests.sh: #6530: 'Ucs4TestCases/Ucs4Test: DestTooSmall/22 8-byte object <00-01 00-00 2B-D1 5C-56>' - PASSED gtests.sh: #6531: 'Ucs4TestCases/Ucs4Test: DestTooSmall/23 8-byte object <01-01 00-00 2E-D1 5C-56>' - PASSED gtests.sh: #6532: 'Ucs4TestCases/Ucs4Test: DestTooSmall/24 8-byte object <02-01 00-00 31-D1 5C-56>' - PASSED gtests.sh: #6533: 'Ucs4TestCases/Ucs4Test: DestTooSmall/25 8-byte object <04-01 00-00 34-D1 5C-56>' - PASSED gtests.sh: #6534: 'Ucs4TestCases/Ucs4Test: DestTooSmall/26 8-byte object <08-01 00-00 37-D1 5C-56>' - PASSED gtests.sh: #6535: 'Ucs4TestCases/Ucs4Test: DestTooSmall/27 8-byte object <10-01 00-00 3A-D1 5C-56>' - PASSED gtests.sh: #6536: 'Ucs4TestCases/Ucs4Test: DestTooSmall/28 8-byte object <20-01 00-00 3D-D1 5C-56>' - PASSED gtests.sh: #6537: 'Ucs4TestCases/Ucs4Test: DestTooSmall/29 8-byte object <40-01 00-00 40-D1 5C-56>' - PASSED gtests.sh: #6538: 'Ucs4TestCases/Ucs4Test: DestTooSmall/30 8-byte object <80-01 00-00 43-D1 5C-56>' - PASSED gtests.sh: #6539: 'Ucs4TestCases/Ucs4Test: DestTooSmall/31 8-byte object <FF-01 00-00 46-D1 5C-56>' - PASSED gtests.sh: #6540: 'Ucs4TestCases/Ucs4Test: DestTooSmall/32 8-byte object <00-02 00-00 49-D1 5C-56>' - PASSED gtests.sh: #6541: 'Ucs4TestCases/Ucs4Test: DestTooSmall/33 8-byte object <01-02 00-00 4C-D1 5C-56>' - PASSED gtests.sh: #6542: 'Ucs4TestCases/Ucs4Test: DestTooSmall/34 8-byte object <02-02 00-00 4F-D1 5C-56>' - PASSED gtests.sh: #6543: 'Ucs4TestCases/Ucs4Test: DestTooSmall/35 8-byte object <04-02 00-00 52-D1 5C-56>' - PASSED gtests.sh: #6544: 'Ucs4TestCases/Ucs4Test: DestTooSmall/36 8-byte object <08-02 00-00 55-D1 5C-56>' - PASSED gtests.sh: #6545: 'Ucs4TestCases/Ucs4Test: DestTooSmall/37 8-byte object <10-02 00-00 58-D1 5C-56>' - PASSED gtests.sh: #6546: 'Ucs4TestCases/Ucs4Test: DestTooSmall/38 8-byte object <20-02 00-00 5B-D1 5C-56>' - PASSED gtests.sh: #6547: 'Ucs4TestCases/Ucs4Test: DestTooSmall/39 8-byte object <40-02 00-00 5E-D1 5C-56>' - PASSED gtests.sh: #6548: 'Ucs4TestCases/Ucs4Test: DestTooSmall/40 8-byte object <80-02 00-00 61-D1 5C-56>' - PASSED gtests.sh: #6549: 'Ucs4TestCases/Ucs4Test: DestTooSmall/41 8-byte object <00-03 00-00 64-D1 5C-56>' - PASSED gtests.sh: #6550: 'Ucs4TestCases/Ucs4Test: DestTooSmall/42 8-byte object <FF-03 00-00 67-D1 5C-56>' - PASSED gtests.sh: #6551: 'Ucs4TestCases/Ucs4Test: DestTooSmall/43 8-byte object <00-04 00-00 6A-D1 5C-56>' - PASSED gtests.sh: #6552: 'Ucs4TestCases/Ucs4Test: DestTooSmall/44 8-byte object <01-04 00-00 6D-D1 5C-56>' - PASSED gtests.sh: #6553: 'Ucs4TestCases/Ucs4Test: DestTooSmall/45 8-byte object <02-04 00-00 70-D1 5C-56>' - PASSED gtests.sh: #6554: 'Ucs4TestCases/Ucs4Test: DestTooSmall/46 8-byte object <04-04 00-00 73-D1 5C-56>' - PASSED gtests.sh: #6555: 'Ucs4TestCases/Ucs4Test: DestTooSmall/47 8-byte object <08-04 00-00 76-D1 5C-56>' - PASSED gtests.sh: #6556: 'Ucs4TestCases/Ucs4Test: DestTooSmall/48 8-byte object <10-04 00-00 79-D1 5C-56>' - PASSED gtests.sh: #6557: 'Ucs4TestCases/Ucs4Test: DestTooSmall/49 8-byte object <20-04 00-00 7C-D1 5C-56>' - PASSED gtests.sh: #6558: 'Ucs4TestCases/Ucs4Test: DestTooSmall/50 8-byte object <40-04 00-00 7F-D1 5C-56>' - PASSED gtests.sh: #6559: 'Ucs4TestCases/Ucs4Test: DestTooSmall/51 8-byte object <80-04 00-00 82-D1 5C-56>' - PASSED gtests.sh: #6560: 'Ucs4TestCases/Ucs4Test: DestTooSmall/52 8-byte object <00-05 00-00 85-D1 5C-56>' - PASSED gtests.sh: #6561: 'Ucs4TestCases/Ucs4Test: DestTooSmall/53 8-byte object <00-06 00-00 88-D1 5C-56>' - PASSED gtests.sh: #6562: 'Ucs4TestCases/Ucs4Test: DestTooSmall/54 8-byte object <FF-07 00-00 8B-D1 5C-56>' - PASSED gtests.sh: #6563: 'Ucs4TestCases/Ucs4Test: DestTooSmall/55 8-byte object <00-08 00-00 8E-D1 5C-56>' - PASSED gtests.sh: #6564: 'Ucs4TestCases/Ucs4Test: DestTooSmall/56 8-byte object <01-08 00-00 92-D1 5C-56>' - PASSED gtests.sh: #6565: 'Ucs4TestCases/Ucs4Test: DestTooSmall/57 8-byte object <02-08 00-00 96-D1 5C-56>' - PASSED gtests.sh: #6566: 'Ucs4TestCases/Ucs4Test: DestTooSmall/58 8-byte object <04-08 00-00 9A-D1 5C-56>' - PASSED gtests.sh: #6567: 'Ucs4TestCases/Ucs4Test: DestTooSmall/59 8-byte object <08-08 00-00 9E-D1 5C-56>' - PASSED gtests.sh: #6568: 'Ucs4TestCases/Ucs4Test: DestTooSmall/60 8-byte object <10-08 00-00 A2-D1 5C-56>' - PASSED gtests.sh: #6569: 'Ucs4TestCases/Ucs4Test: DestTooSmall/61 8-byte object <20-08 00-00 A6-D1 5C-56>' - PASSED gtests.sh: #6570: 'Ucs4TestCases/Ucs4Test: DestTooSmall/62 8-byte object <40-08 00-00 AA-D1 5C-56>' - PASSED gtests.sh: #6571: 'Ucs4TestCases/Ucs4Test: DestTooSmall/63 8-byte object <80-08 00-00 AE-D1 5C-56>' - PASSED gtests.sh: #6572: 'Ucs4TestCases/Ucs4Test: DestTooSmall/64 8-byte object <00-09 00-00 B2-D1 5C-56>' - PASSED gtests.sh: #6573: 'Ucs4TestCases/Ucs4Test: DestTooSmall/65 8-byte object <00-0A 00-00 B6-D1 5C-56>' - PASSED gtests.sh: #6574: 'Ucs4TestCases/Ucs4Test: DestTooSmall/66 8-byte object <00-0C 00-00 BA-D1 5C-56>' - PASSED gtests.sh: #6575: 'Ucs4TestCases/Ucs4Test: DestTooSmall/67 8-byte object <FF-0F 00-00 27-D1 5C-56>' - PASSED gtests.sh: #6576: 'Ucs4TestCases/Ucs4Test: DestTooSmall/68 8-byte object <00-10 00-00 BE-D1 5C-56>' - PASSED gtests.sh: #6577: 'Ucs4TestCases/Ucs4Test: DestTooSmall/69 8-byte object <01-10 00-00 C2-D1 5C-56>' - PASSED gtests.sh: #6578: 'Ucs4TestCases/Ucs4Test: DestTooSmall/70 8-byte object <02-10 00-00 C6-D1 5C-56>' - PASSED gtests.sh: #6579: 'Ucs4TestCases/Ucs4Test: DestTooSmall/71 8-byte object <04-10 00-00 CA-D1 5C-56>' - PASSED gtests.sh: #6580: 'Ucs4TestCases/Ucs4Test: DestTooSmall/72 8-byte object <08-10 00-00 CE-D1 5C-56>' - PASSED gtests.sh: #6581: 'Ucs4TestCases/Ucs4Test: DestTooSmall/73 8-byte object <10-10 00-00 D2-D1 5C-56>' - PASSED gtests.sh: #6582: 'Ucs4TestCases/Ucs4Test: DestTooSmall/74 8-byte object <20-10 00-00 D6-D1 5C-56>' - PASSED gtests.sh: #6583: 'Ucs4TestCases/Ucs4Test: DestTooSmall/75 8-byte object <40-10 00-00 DA-D1 5C-56>' - PASSED gtests.sh: #6584: 'Ucs4TestCases/Ucs4Test: DestTooSmall/76 8-byte object <80-10 00-00 DE-D1 5C-56>' - PASSED gtests.sh: #6585: 'Ucs4TestCases/Ucs4Test: DestTooSmall/77 8-byte object <00-11 00-00 E2-D1 5C-56>' - PASSED gtests.sh: #6586: 'Ucs4TestCases/Ucs4Test: DestTooSmall/78 8-byte object <00-12 00-00 E6-D1 5C-56>' - PASSED gtests.sh: #6587: 'Ucs4TestCases/Ucs4Test: DestTooSmall/79 8-byte object <00-14 00-00 EA-D1 5C-56>' - PASSED gtests.sh: #6588: 'Ucs4TestCases/Ucs4Test: DestTooSmall/80 8-byte object <00-18 00-00 EE-D1 5C-56>' - PASSED gtests.sh: #6589: 'Ucs4TestCases/Ucs4Test: DestTooSmall/81 8-byte object <FF-1F 00-00 F2-D1 5C-56>' - PASSED gtests.sh: #6590: 'Ucs4TestCases/Ucs4Test: DestTooSmall/82 8-byte object <00-20 00-00 F6-D1 5C-56>' - PASSED gtests.sh: #6591: 'Ucs4TestCases/Ucs4Test: DestTooSmall/83 8-byte object <01-20 00-00 FA-D1 5C-56>' - PASSED gtests.sh: #6592: 'Ucs4TestCases/Ucs4Test: DestTooSmall/84 8-byte object <02-20 00-00 FE-D1 5C-56>' - PASSED gtests.sh: #6593: 'Ucs4TestCases/Ucs4Test: DestTooSmall/85 8-byte object <04-20 00-00 02-D2 5C-56>' - PASSED gtests.sh: #6594: 'Ucs4TestCases/Ucs4Test: DestTooSmall/86 8-byte object <08-20 00-00 06-D2 5C-56>' - PASSED gtests.sh: #6595: 'Ucs4TestCases/Ucs4Test: DestTooSmall/87 8-byte object <10-20 00-00 0A-D2 5C-56>' - PASSED gtests.sh: #6596: 'Ucs4TestCases/Ucs4Test: DestTooSmall/88 8-byte object <20-20 00-00 0E-D2 5C-56>' - PASSED gtests.sh: #6597: 'Ucs4TestCases/Ucs4Test: DestTooSmall/89 8-byte object <40-20 00-00 12-D2 5C-56>' - PASSED gtests.sh: #6598: 'Ucs4TestCases/Ucs4Test: DestTooSmall/90 8-byte object <80-20 00-00 16-D2 5C-56>' - PASSED gtests.sh: #6599: 'Ucs4TestCases/Ucs4Test: DestTooSmall/91 8-byte object <00-21 00-00 1A-D2 5C-56>' - PASSED gtests.sh: #6600: 'Ucs4TestCases/Ucs4Test: DestTooSmall/92 8-byte object <00-22 00-00 1E-D2 5C-56>' - PASSED gtests.sh: #6601: 'Ucs4TestCases/Ucs4Test: DestTooSmall/93 8-byte object <00-24 00-00 22-D2 5C-56>' - PASSED gtests.sh: #6602: 'Ucs4TestCases/Ucs4Test: DestTooSmall/94 8-byte object <00-28 00-00 26-D2 5C-56>' - PASSED gtests.sh: #6603: 'Ucs4TestCases/Ucs4Test: DestTooSmall/95 8-byte object <00-30 00-00 2A-D2 5C-56>' - PASSED gtests.sh: #6604: 'Ucs4TestCases/Ucs4Test: DestTooSmall/96 8-byte object <FF-3F 00-00 2E-D2 5C-56>' - PASSED gtests.sh: #6605: 'Ucs4TestCases/Ucs4Test: DestTooSmall/97 8-byte object <00-40 00-00 32-D2 5C-56>' - PASSED gtests.sh: #6606: 'Ucs4TestCases/Ucs4Test: DestTooSmall/98 8-byte object <01-40 00-00 36-D2 5C-56>' - PASSED gtests.sh: #6607: 'Ucs4TestCases/Ucs4Test: DestTooSmall/99 8-byte object <02-40 00-00 3A-D2 5C-56>' - PASSED gtests.sh: #6608: 'Ucs4TestCases/Ucs4Test: DestTooSmall/100 8-byte object <04-40 00-00 3E-D2 5C-56>' - PASSED gtests.sh: #6609: 'Ucs4TestCases/Ucs4Test: DestTooSmall/101 8-byte object <08-40 00-00 42-D2 5C-56>' - PASSED gtests.sh: #6610: 'Ucs4TestCases/Ucs4Test: DestTooSmall/102 8-byte object <10-40 00-00 46-D2 5C-56>' - PASSED gtests.sh: #6611: 'Ucs4TestCases/Ucs4Test: DestTooSmall/103 8-byte object <20-40 00-00 4A-D2 5C-56>' - PASSED gtests.sh: #6612: 'Ucs4TestCases/Ucs4Test: DestTooSmall/104 8-byte object <40-40 00-00 4E-D2 5C-56>' - PASSED gtests.sh: #6613: 'Ucs4TestCases/Ucs4Test: DestTooSmall/105 8-byte object <80-40 00-00 52-D2 5C-56>' - PASSED gtests.sh: #6614: 'Ucs4TestCases/Ucs4Test: DestTooSmall/106 8-byte object <00-41 00-00 56-D2 5C-56>' - PASSED gtests.sh: #6615: 'Ucs4TestCases/Ucs4Test: DestTooSmall/107 8-byte object <00-42 00-00 5A-D2 5C-56>' - PASSED gtests.sh: #6616: 'Ucs4TestCases/Ucs4Test: DestTooSmall/108 8-byte object <00-44 00-00 5E-D2 5C-56>' - PASSED gtests.sh: #6617: 'Ucs4TestCases/Ucs4Test: DestTooSmall/109 8-byte object <00-48 00-00 62-D2 5C-56>' - PASSED gtests.sh: #6618: 'Ucs4TestCases/Ucs4Test: DestTooSmall/110 8-byte object <00-50 00-00 66-D2 5C-56>' - PASSED gtests.sh: #6619: 'Ucs4TestCases/Ucs4Test: DestTooSmall/111 8-byte object <00-60 00-00 6A-D2 5C-56>' - PASSED gtests.sh: #6620: 'Ucs4TestCases/Ucs4Test: DestTooSmall/112 8-byte object <FF-7F 00-00 6E-D2 5C-56>' - PASSED gtests.sh: #6621: 'Ucs4TestCases/Ucs4Test: DestTooSmall/113 8-byte object <00-80 00-00 72-D2 5C-56>' - PASSED gtests.sh: #6622: 'Ucs4TestCases/Ucs4Test: DestTooSmall/114 8-byte object <01-80 00-00 76-D2 5C-56>' - PASSED gtests.sh: #6623: 'Ucs4TestCases/Ucs4Test: DestTooSmall/115 8-byte object <02-80 00-00 7A-D2 5C-56>' - PASSED gtests.sh: #6624: 'Ucs4TestCases/Ucs4Test: DestTooSmall/116 8-byte object <04-80 00-00 7E-D2 5C-56>' - PASSED gtests.sh: #6625: 'Ucs4TestCases/Ucs4Test: DestTooSmall/117 8-byte object <08-80 00-00 82-D2 5C-56>' - PASSED gtests.sh: #6626: 'Ucs4TestCases/Ucs4Test: DestTooSmall/118 8-byte object <10-80 00-00 86-D2 5C-56>' - PASSED gtests.sh: #6627: 'Ucs4TestCases/Ucs4Test: DestTooSmall/119 8-byte object <20-80 00-00 8A-D2 5C-56>' - PASSED gtests.sh: #6628: 'Ucs4TestCases/Ucs4Test: DestTooSmall/120 8-byte object <40-80 00-00 8E-D2 5C-56>' - PASSED gtests.sh: #6629: 'Ucs4TestCases/Ucs4Test: DestTooSmall/121 8-byte object <80-80 00-00 92-D2 5C-56>' - PASSED gtests.sh: #6630: 'Ucs4TestCases/Ucs4Test: DestTooSmall/122 8-byte object <00-81 00-00 96-D2 5C-56>' - PASSED gtests.sh: #6631: 'Ucs4TestCases/Ucs4Test: DestTooSmall/123 8-byte object <00-82 00-00 9A-D2 5C-56>' - PASSED gtests.sh: #6632: 'Ucs4TestCases/Ucs4Test: DestTooSmall/124 8-byte object <00-84 00-00 9E-D2 5C-56>' - PASSED gtests.sh: #6633: 'Ucs4TestCases/Ucs4Test: DestTooSmall/125 8-byte object <00-88 00-00 A2-D2 5C-56>' - PASSED gtests.sh: #6634: 'Ucs4TestCases/Ucs4Test: DestTooSmall/126 8-byte object <00-90 00-00 A6-D2 5C-56>' - PASSED gtests.sh: #6635: 'Ucs4TestCases/Ucs4Test: DestTooSmall/127 8-byte object <00-A0 00-00 AA-D2 5C-56>' - PASSED gtests.sh: #6636: 'Ucs4TestCases/Ucs4Test: DestTooSmall/128 8-byte object <00-C0 00-00 AE-D2 5C-56>' - PASSED gtests.sh: #6637: 'Ucs4TestCases/Ucs4Test: DestTooSmall/129 8-byte object <FF-FF 00-00 B6-D2 5C-56>' - PASSED gtests.sh: #6638: 'Ucs4TestCases/Ucs4Test: DestTooSmall/130 8-byte object <00-00 01-00 E6-D2 5C-56>' - PASSED gtests.sh: #6639: 'Ucs4TestCases/Ucs4Test: DestTooSmall/131 8-byte object <01-00 01-00 EB-D2 5C-56>' - PASSED gtests.sh: #6640: 'Ucs4TestCases/Ucs4Test: DestTooSmall/132 8-byte object <02-00 01-00 F0-D2 5C-56>' - PASSED gtests.sh: #6641: 'Ucs4TestCases/Ucs4Test: DestTooSmall/133 8-byte object <04-00 01-00 F5-D2 5C-56>' - PASSED gtests.sh: #6642: 'Ucs4TestCases/Ucs4Test: DestTooSmall/134 8-byte object <08-00 01-00 FA-D2 5C-56>' - PASSED gtests.sh: #6643: 'Ucs4TestCases/Ucs4Test: DestTooSmall/135 8-byte object <10-00 01-00 FF-D2 5C-56>' - PASSED gtests.sh: #6644: 'Ucs4TestCases/Ucs4Test: DestTooSmall/136 8-byte object <20-00 01-00 04-D3 5C-56>' - PASSED gtests.sh: #6645: 'Ucs4TestCases/Ucs4Test: DestTooSmall/137 8-byte object <40-00 01-00 09-D3 5C-56>' - PASSED gtests.sh: #6646: 'Ucs4TestCases/Ucs4Test: DestTooSmall/138 8-byte object <80-00 01-00 0E-D3 5C-56>' - PASSED gtests.sh: #6647: 'Ucs4TestCases/Ucs4Test: DestTooSmall/139 8-byte object <00-01 01-00 13-D3 5C-56>' - PASSED gtests.sh: #6648: 'Ucs4TestCases/Ucs4Test: DestTooSmall/140 8-byte object <00-02 01-00 18-D3 5C-56>' - PASSED gtests.sh: #6649: 'Ucs4TestCases/Ucs4Test: DestTooSmall/141 8-byte object <00-04 01-00 1D-D3 5C-56>' - PASSED gtests.sh: #6650: 'Ucs4TestCases/Ucs4Test: DestTooSmall/142 8-byte object <00-08 01-00 22-D3 5C-56>' - PASSED gtests.sh: #6651: 'Ucs4TestCases/Ucs4Test: DestTooSmall/143 8-byte object <00-10 01-00 27-D3 5C-56>' - PASSED gtests.sh: #6652: 'Ucs4TestCases/Ucs4Test: DestTooSmall/144 8-byte object <00-20 01-00 2C-D3 5C-56>' - PASSED gtests.sh: #6653: 'Ucs4TestCases/Ucs4Test: DestTooSmall/145 8-byte object <00-40 01-00 31-D3 5C-56>' - PASSED gtests.sh: #6654: 'Ucs4TestCases/Ucs4Test: DestTooSmall/146 8-byte object <00-80 01-00 36-D3 5C-56>' - PASSED gtests.sh: #6655: 'Ucs4TestCases/Ucs4Test: DestTooSmall/147 8-byte object <FF-FF 01-00 3B-D3 5C-56>' - PASSED gtests.sh: #6656: 'Ucs4TestCases/Ucs4Test: DestTooSmall/148 8-byte object <00-00 02-00 40-D3 5C-56>' - PASSED gtests.sh: #6657: 'Ucs4TestCases/Ucs4Test: DestTooSmall/149 8-byte object <01-00 02-00 45-D3 5C-56>' - PASSED gtests.sh: #6658: 'Ucs4TestCases/Ucs4Test: DestTooSmall/150 8-byte object <02-00 02-00 4A-D3 5C-56>' - PASSED gtests.sh: #6659: 'Ucs4TestCases/Ucs4Test: DestTooSmall/151 8-byte object <04-00 02-00 4F-D3 5C-56>' - PASSED gtests.sh: #6660: 'Ucs4TestCases/Ucs4Test: DestTooSmall/152 8-byte object <08-00 02-00 54-D3 5C-56>' - PASSED gtests.sh: #6661: 'Ucs4TestCases/Ucs4Test: DestTooSmall/153 8-byte object <10-00 02-00 59-D3 5C-56>' - PASSED gtests.sh: #6662: 'Ucs4TestCases/Ucs4Test: DestTooSmall/154 8-byte object <20-00 02-00 5E-D3 5C-56>' - PASSED gtests.sh: #6663: 'Ucs4TestCases/Ucs4Test: DestTooSmall/155 8-byte object <40-00 02-00 63-D3 5C-56>' - PASSED gtests.sh: #6664: 'Ucs4TestCases/Ucs4Test: DestTooSmall/156 8-byte object <80-00 02-00 68-D3 5C-56>' - PASSED gtests.sh: #6665: 'Ucs4TestCases/Ucs4Test: DestTooSmall/157 8-byte object <00-01 02-00 6D-D3 5C-56>' - PASSED gtests.sh: #6666: 'Ucs4TestCases/Ucs4Test: DestTooSmall/158 8-byte object <00-02 02-00 72-D3 5C-56>' - PASSED gtests.sh: #6667: 'Ucs4TestCases/Ucs4Test: DestTooSmall/159 8-byte object <00-04 02-00 77-D3 5C-56>' - PASSED gtests.sh: #6668: 'Ucs4TestCases/Ucs4Test: DestTooSmall/160 8-byte object <00-08 02-00 7C-D3 5C-56>' - PASSED gtests.sh: #6669: 'Ucs4TestCases/Ucs4Test: DestTooSmall/161 8-byte object <00-10 02-00 81-D3 5C-56>' - PASSED gtests.sh: #6670: 'Ucs4TestCases/Ucs4Test: DestTooSmall/162 8-byte object <00-20 02-00 86-D3 5C-56>' - PASSED gtests.sh: #6671: 'Ucs4TestCases/Ucs4Test: DestTooSmall/163 8-byte object <00-40 02-00 8B-D3 5C-56>' - PASSED gtests.sh: #6672: 'Ucs4TestCases/Ucs4Test: DestTooSmall/164 8-byte object <00-80 02-00 90-D3 5C-56>' - PASSED gtests.sh: #6673: 'Ucs4TestCases/Ucs4Test: DestTooSmall/165 8-byte object <00-00 03-00 95-D3 5C-56>' - PASSED gtests.sh: #6674: 'Ucs4TestCases/Ucs4Test: DestTooSmall/166 8-byte object <FF-FF 03-00 9A-D3 5C-56>' - PASSED gtests.sh: #6675: 'Ucs4TestCases/Ucs4Test: DestTooSmall/167 8-byte object <00-00 04-00 9F-D3 5C-56>' - PASSED gtests.sh: #6676: 'Ucs4TestCases/Ucs4Test: DestTooSmall/168 8-byte object <01-00 04-00 A4-D3 5C-56>' - PASSED gtests.sh: #6677: 'Ucs4TestCases/Ucs4Test: DestTooSmall/169 8-byte object <02-00 04-00 A9-D3 5C-56>' - PASSED gtests.sh: #6678: 'Ucs4TestCases/Ucs4Test: DestTooSmall/170 8-byte object <04-00 04-00 AE-D3 5C-56>' - PASSED gtests.sh: #6679: 'Ucs4TestCases/Ucs4Test: DestTooSmall/171 8-byte object <08-00 04-00 B3-D3 5C-56>' - PASSED gtests.sh: #6680: 'Ucs4TestCases/Ucs4Test: DestTooSmall/172 8-byte object <10-00 04-00 B8-D3 5C-56>' - PASSED gtests.sh: #6681: 'Ucs4TestCases/Ucs4Test: DestTooSmall/173 8-byte object <20-00 04-00 BD-D3 5C-56>' - PASSED gtests.sh: #6682: 'Ucs4TestCases/Ucs4Test: DestTooSmall/174 8-byte object <40-00 04-00 C2-D3 5C-56>' - PASSED gtests.sh: #6683: 'Ucs4TestCases/Ucs4Test: DestTooSmall/175 8-byte object <80-00 04-00 C7-D3 5C-56>' - PASSED gtests.sh: #6684: 'Ucs4TestCases/Ucs4Test: DestTooSmall/176 8-byte object <00-01 04-00 CC-D3 5C-56>' - PASSED gtests.sh: #6685: 'Ucs4TestCases/Ucs4Test: DestTooSmall/177 8-byte object <00-02 04-00 D1-D3 5C-56>' - PASSED gtests.sh: #6686: 'Ucs4TestCases/Ucs4Test: DestTooSmall/178 8-byte object <00-04 04-00 D6-D3 5C-56>' - PASSED gtests.sh: #6687: 'Ucs4TestCases/Ucs4Test: DestTooSmall/179 8-byte object <00-08 04-00 DB-D3 5C-56>' - PASSED gtests.sh: #6688: 'Ucs4TestCases/Ucs4Test: DestTooSmall/180 8-byte object <00-10 04-00 E0-D3 5C-56>' - PASSED gtests.sh: #6689: 'Ucs4TestCases/Ucs4Test: DestTooSmall/181 8-byte object <00-20 04-00 E5-D3 5C-56>' - PASSED gtests.sh: #6690: 'Ucs4TestCases/Ucs4Test: DestTooSmall/182 8-byte object <00-40 04-00 EA-D3 5C-56>' - PASSED gtests.sh: #6691: 'Ucs4TestCases/Ucs4Test: DestTooSmall/183 8-byte object <00-80 04-00 EF-D3 5C-56>' - PASSED gtests.sh: #6692: 'Ucs4TestCases/Ucs4Test: DestTooSmall/184 8-byte object <00-00 05-00 F4-D3 5C-56>' - PASSED gtests.sh: #6693: 'Ucs4TestCases/Ucs4Test: DestTooSmall/185 8-byte object <00-00 06-00 F9-D3 5C-56>' - PASSED gtests.sh: #6694: 'Ucs4TestCases/Ucs4Test: DestTooSmall/186 8-byte object <FF-FF 07-00 FE-D3 5C-56>' - PASSED gtests.sh: #6695: 'Ucs4TestCases/Ucs4Test: DestTooSmall/187 8-byte object <00-00 08-00 03-D4 5C-56>' - PASSED gtests.sh: #6696: 'Ucs4TestCases/Ucs4Test: DestTooSmall/188 8-byte object <01-00 08-00 08-D4 5C-56>' - PASSED gtests.sh: #6697: 'Ucs4TestCases/Ucs4Test: DestTooSmall/189 8-byte object <02-00 08-00 0D-D4 5C-56>' - PASSED gtests.sh: #6698: 'Ucs4TestCases/Ucs4Test: DestTooSmall/190 8-byte object <04-00 08-00 12-D4 5C-56>' - PASSED gtests.sh: #6699: 'Ucs4TestCases/Ucs4Test: DestTooSmall/191 8-byte object <08-00 08-00 17-D4 5C-56>' - PASSED gtests.sh: #6700: 'Ucs4TestCases/Ucs4Test: DestTooSmall/192 8-byte object <10-00 08-00 1C-D4 5C-56>' - PASSED gtests.sh: #6701: 'Ucs4TestCases/Ucs4Test: DestTooSmall/193 8-byte object <20-00 08-00 21-D4 5C-56>' - PASSED gtests.sh: #6702: 'Ucs4TestCases/Ucs4Test: DestTooSmall/194 8-byte object <40-00 08-00 26-D4 5C-56>' - PASSED gtests.sh: #6703: 'Ucs4TestCases/Ucs4Test: DestTooSmall/195 8-byte object <80-00 08-00 2B-D4 5C-56>' - PASSED gtests.sh: #6704: 'Ucs4TestCases/Ucs4Test: DestTooSmall/196 8-byte object <00-01 08-00 30-D4 5C-56>' - PASSED gtests.sh: #6705: 'Ucs4TestCases/Ucs4Test: DestTooSmall/197 8-byte object <00-02 08-00 35-D4 5C-56>' - PASSED gtests.sh: #6706: 'Ucs4TestCases/Ucs4Test: DestTooSmall/198 8-byte object <00-04 08-00 3A-D4 5C-56>' - PASSED gtests.sh: #6707: 'Ucs4TestCases/Ucs4Test: DestTooSmall/199 8-byte object <00-08 08-00 3F-D4 5C-56>' - PASSED gtests.sh: #6708: 'Ucs4TestCases/Ucs4Test: DestTooSmall/200 8-byte object <00-10 08-00 44-D4 5C-56>' - PASSED gtests.sh: #6709: 'Ucs4TestCases/Ucs4Test: DestTooSmall/201 8-byte object <00-20 08-00 49-D4 5C-56>' - PASSED gtests.sh: #6710: 'Ucs4TestCases/Ucs4Test: DestTooSmall/202 8-byte object <00-40 08-00 4E-D4 5C-56>' - PASSED gtests.sh: #6711: 'Ucs4TestCases/Ucs4Test: DestTooSmall/203 8-byte object <00-80 08-00 53-D4 5C-56>' - PASSED gtests.sh: #6712: 'Ucs4TestCases/Ucs4Test: DestTooSmall/204 8-byte object <00-00 09-00 58-D4 5C-56>' - PASSED gtests.sh: #6713: 'Ucs4TestCases/Ucs4Test: DestTooSmall/205 8-byte object <00-00 0A-00 5D-D4 5C-56>' - PASSED gtests.sh: #6714: 'Ucs4TestCases/Ucs4Test: DestTooSmall/206 8-byte object <00-00 0C-00 62-D4 5C-56>' - PASSED gtests.sh: #6715: 'Ucs4TestCases/Ucs4Test: DestTooSmall/207 8-byte object <FF-FF 0F-00 67-D4 5C-56>' - PASSED gtests.sh: #6716: 'Ucs4TestCases/Ucs4Test: DestTooSmall/208 8-byte object <00-00 10-00 6C-D4 5C-56>' - PASSED gtests.sh: #6717: 'Ucs4TestCases/Ucs4Test: DestTooSmall/209 8-byte object <01-00 10-00 71-D4 5C-56>' - PASSED gtests.sh: #6718: 'Ucs4TestCases/Ucs4Test: DestTooSmall/210 8-byte object <02-00 10-00 76-D4 5C-56>' - PASSED gtests.sh: #6719: 'Ucs4TestCases/Ucs4Test: DestTooSmall/211 8-byte object <04-00 10-00 7B-D4 5C-56>' - PASSED gtests.sh: #6720: 'Ucs4TestCases/Ucs4Test: DestTooSmall/212 8-byte object <08-00 10-00 80-D4 5C-56>' - PASSED gtests.sh: #6721: 'Ucs4TestCases/Ucs4Test: DestTooSmall/213 8-byte object <10-00 10-00 85-D4 5C-56>' - PASSED gtests.sh: #6722: 'Ucs4TestCases/Ucs4Test: DestTooSmall/214 8-byte object <20-00 10-00 8A-D4 5C-56>' - PASSED gtests.sh: #6723: 'Ucs4TestCases/Ucs4Test: DestTooSmall/215 8-byte object <40-00 10-00 8F-D4 5C-56>' - PASSED gtests.sh: #6724: 'Ucs4TestCases/Ucs4Test: DestTooSmall/216 8-byte object <80-00 10-00 94-D4 5C-56>' - PASSED gtests.sh: #6725: 'Ucs4TestCases/Ucs4Test: DestTooSmall/217 8-byte object <00-01 10-00 99-D4 5C-56>' - PASSED gtests.sh: #6726: 'Ucs4TestCases/Ucs4Test: DestTooSmall/218 8-byte object <00-02 10-00 9E-D4 5C-56>' - PASSED gtests.sh: #6727: 'Ucs4TestCases/Ucs4Test: DestTooSmall/219 8-byte object <00-04 10-00 A3-D4 5C-56>' - PASSED gtests.sh: #6728: 'Ucs4TestCases/Ucs4Test: DestTooSmall/220 8-byte object <00-08 10-00 A8-D4 5C-56>' - PASSED gtests.sh: #6729: 'Ucs4TestCases/Ucs4Test: DestTooSmall/221 8-byte object <00-10 10-00 AD-D4 5C-56>' - PASSED gtests.sh: #6730: 'Ucs4TestCases/Ucs4Test: DestTooSmall/222 8-byte object <00-20 10-00 B2-D4 5C-56>' - PASSED gtests.sh: #6731: 'Ucs4TestCases/Ucs4Test: DestTooSmall/223 8-byte object <00-40 10-00 B7-D4 5C-56>' - PASSED gtests.sh: #6732: 'Ucs4TestCases/Ucs4Test: DestTooSmall/224 8-byte object <00-80 10-00 BC-D4 5C-56>' - PASSED gtests.sh: #6733: 'Ucs4TestCases/Ucs4Test: DestTooSmall/225 8-byte object <FF-FF 10-00 C1-D4 5C-56>' - PASSED gtests.sh: #6734: 'Iso88591TestCases/Ucs2Test: ToUtf8/0 8-byte object <01-00 00-00 BA-D2 5C-56>' - PASSED gtests.sh: #6735: 'Iso88591TestCases/Ucs2Test: ToUtf8/1 8-byte object <02-00 00-00 BC-D2 5C-56>' - PASSED gtests.sh: #6736: 'Iso88591TestCases/Ucs2Test: ToUtf8/2 8-byte object <03-00 00-00 BE-D2 5C-56>' - PASSED gtests.sh: #6737: 'Iso88591TestCases/Ucs2Test: ToUtf8/3 8-byte object <04-00 00-00 C0-D2 5C-56>' - PASSED gtests.sh: #6738: 'Iso88591TestCases/Ucs2Test: ToUtf8/4 8-byte object <07-00 00-00 C2-D2 5C-56>' - PASSED gtests.sh: #6739: 'Iso88591TestCases/Ucs2Test: ToUtf8/5 8-byte object <08-00 00-00 C4-D2 5C-56>' - PASSED gtests.sh: #6740: 'Iso88591TestCases/Ucs2Test: ToUtf8/6 8-byte object <0F-00 00-00 C6-D2 5C-56>' - PASSED gtests.sh: #6741: 'Iso88591TestCases/Ucs2Test: ToUtf8/7 8-byte object <10-00 00-00 C8-D2 5C-56>' - PASSED gtests.sh: #6742: 'Iso88591TestCases/Ucs2Test: ToUtf8/8 8-byte object <1F-00 00-00 CA-D2 5C-56>' - PASSED gtests.sh: #6743: 'Iso88591TestCases/Ucs2Test: ToUtf8/9 8-byte object <20-00 00-00 DB-47 5D-56>' - PASSED gtests.sh: #6744: 'Iso88591TestCases/Ucs2Test: ToUtf8/10 8-byte object <3F-00 00-00 E7-97 5C-56>' - PASSED gtests.sh: #6745: 'Iso88591TestCases/Ucs2Test: ToUtf8/11 8-byte object <40-00 00-00 0A-98 5C-56>' - PASSED gtests.sh: #6746: 'Iso88591TestCases/Ucs2Test: ToUtf8/12 8-byte object <7F-00 00-00 CC-D2 5C-56>' - PASSED gtests.sh: #6747: 'Iso88591TestCases/Ucs2Test: ToUtf8/13 8-byte object <80-00 00-00 CE-D2 5C-56>' - PASSED gtests.sh: #6748: 'Iso88591TestCases/Ucs2Test: ToUtf8/14 8-byte object <81-00 00-00 D1-D2 5C-56>' - PASSED gtests.sh: #6749: 'Iso88591TestCases/Ucs2Test: ToUtf8/15 8-byte object <82-00 00-00 D4-D2 5C-56>' - PASSED gtests.sh: #6750: 'Iso88591TestCases/Ucs2Test: ToUtf8/16 8-byte object <84-00 00-00 D7-D2 5C-56>' - PASSED gtests.sh: #6751: 'Iso88591TestCases/Ucs2Test: ToUtf8/17 8-byte object <88-00 00-00 DA-D2 5C-56>' - PASSED gtests.sh: #6752: 'Iso88591TestCases/Ucs2Test: ToUtf8/18 8-byte object <90-00 00-00 DD-D2 5C-56>' - PASSED gtests.sh: #6753: 'Iso88591TestCases/Ucs2Test: ToUtf8/19 8-byte object <A0-00 00-00 E0-D2 5C-56>' - PASSED gtests.sh: #6754: 'Iso88591TestCases/Ucs2Test: ToUtf8/20 8-byte object <C0-00 00-00 15-D1 5C-56>' - PASSED gtests.sh: #6755: 'Iso88591TestCases/Ucs2Test: ToUtf8/21 8-byte object <FF-00 00-00 E3-D2 5C-56>' - PASSED gtests.sh: #6756: 'Iso88591TestCases/Ucs2Test: FromUtf8/0 8-byte object <01-00 00-00 BA-D2 5C-56>' - PASSED gtests.sh: #6757: 'Iso88591TestCases/Ucs2Test: FromUtf8/1 8-byte object <02-00 00-00 BC-D2 5C-56>' - PASSED gtests.sh: #6758: 'Iso88591TestCases/Ucs2Test: FromUtf8/2 8-byte object <03-00 00-00 BE-D2 5C-56>' - PASSED gtests.sh: #6759: 'Iso88591TestCases/Ucs2Test: FromUtf8/3 8-byte object <04-00 00-00 C0-D2 5C-56>' - PASSED gtests.sh: #6760: 'Iso88591TestCases/Ucs2Test: FromUtf8/4 8-byte object <07-00 00-00 C2-D2 5C-56>' - PASSED gtests.sh: #6761: 'Iso88591TestCases/Ucs2Test: FromUtf8/5 8-byte object <08-00 00-00 C4-D2 5C-56>' - PASSED gtests.sh: #6762: 'Iso88591TestCases/Ucs2Test: FromUtf8/6 8-byte object <0F-00 00-00 C6-D2 5C-56>' - PASSED gtests.sh: #6763: 'Iso88591TestCases/Ucs2Test: FromUtf8/7 8-byte object <10-00 00-00 C8-D2 5C-56>' - PASSED gtests.sh: #6764: 'Iso88591TestCases/Ucs2Test: FromUtf8/8 8-byte object <1F-00 00-00 CA-D2 5C-56>' - PASSED gtests.sh: #6765: 'Iso88591TestCases/Ucs2Test: FromUtf8/9 8-byte object <20-00 00-00 DB-47 5D-56>' - PASSED gtests.sh: #6766: 'Iso88591TestCases/Ucs2Test: FromUtf8/10 8-byte object <3F-00 00-00 E7-97 5C-56>' - PASSED gtests.sh: #6767: 'Iso88591TestCases/Ucs2Test: FromUtf8/11 8-byte object <40-00 00-00 0A-98 5C-56>' - PASSED gtests.sh: #6768: 'Iso88591TestCases/Ucs2Test: FromUtf8/12 8-byte object <7F-00 00-00 CC-D2 5C-56>' - PASSED gtests.sh: #6769: 'Iso88591TestCases/Ucs2Test: FromUtf8/13 8-byte object <80-00 00-00 CE-D2 5C-56>' - PASSED gtests.sh: #6770: 'Iso88591TestCases/Ucs2Test: FromUtf8/14 8-byte object <81-00 00-00 D1-D2 5C-56>' - PASSED gtests.sh: #6771: 'Iso88591TestCases/Ucs2Test: FromUtf8/15 8-byte object <82-00 00-00 D4-D2 5C-56>' - PASSED gtests.sh: #6772: 'Iso88591TestCases/Ucs2Test: FromUtf8/16 8-byte object <84-00 00-00 D7-D2 5C-56>' - PASSED gtests.sh: #6773: 'Iso88591TestCases/Ucs2Test: FromUtf8/17 8-byte object <88-00 00-00 DA-D2 5C-56>' - PASSED gtests.sh: #6774: 'Iso88591TestCases/Ucs2Test: FromUtf8/18 8-byte object <90-00 00-00 DD-D2 5C-56>' - PASSED gtests.sh: #6775: 'Iso88591TestCases/Ucs2Test: FromUtf8/19 8-byte object <A0-00 00-00 E0-D2 5C-56>' - PASSED gtests.sh: #6776: 'Iso88591TestCases/Ucs2Test: FromUtf8/20 8-byte object <C0-00 00-00 15-D1 5C-56>' - PASSED gtests.sh: #6777: 'Iso88591TestCases/Ucs2Test: FromUtf8/21 8-byte object <FF-00 00-00 E3-D2 5C-56>' - PASSED gtests.sh: #6778: 'Iso88591TestCases/Ucs2Test: DestTooSmall/0 8-byte object <01-00 00-00 BA-D2 5C-56>' - PASSED gtests.sh: #6779: 'Iso88591TestCases/Ucs2Test: DestTooSmall/1 8-byte object <02-00 00-00 BC-D2 5C-56>' - PASSED gtests.sh: #6780: 'Iso88591TestCases/Ucs2Test: DestTooSmall/2 8-byte object <03-00 00-00 BE-D2 5C-56>' - PASSED gtests.sh: #6781: 'Iso88591TestCases/Ucs2Test: DestTooSmall/3 8-byte object <04-00 00-00 C0-D2 5C-56>' - PASSED gtests.sh: #6782: 'Iso88591TestCases/Ucs2Test: DestTooSmall/4 8-byte object <07-00 00-00 C2-D2 5C-56>' - PASSED gtests.sh: #6783: 'Iso88591TestCases/Ucs2Test: DestTooSmall/5 8-byte object <08-00 00-00 C4-D2 5C-56>' - PASSED gtests.sh: #6784: 'Iso88591TestCases/Ucs2Test: DestTooSmall/6 8-byte object <0F-00 00-00 C6-D2 5C-56>' - PASSED gtests.sh: #6785: 'Iso88591TestCases/Ucs2Test: DestTooSmall/7 8-byte object <10-00 00-00 C8-D2 5C-56>' - PASSED gtests.sh: #6786: 'Iso88591TestCases/Ucs2Test: DestTooSmall/8 8-byte object <1F-00 00-00 CA-D2 5C-56>' - PASSED gtests.sh: #6787: 'Iso88591TestCases/Ucs2Test: DestTooSmall/9 8-byte object <20-00 00-00 DB-47 5D-56>' - PASSED gtests.sh: #6788: 'Iso88591TestCases/Ucs2Test: DestTooSmall/10 8-byte object <3F-00 00-00 E7-97 5C-56>' - PASSED gtests.sh: #6789: 'Iso88591TestCases/Ucs2Test: DestTooSmall/11 8-byte object <40-00 00-00 0A-98 5C-56>' - PASSED gtests.sh: #6790: 'Iso88591TestCases/Ucs2Test: DestTooSmall/12 8-byte object <7F-00 00-00 CC-D2 5C-56>' - PASSED gtests.sh: #6791: 'Iso88591TestCases/Ucs2Test: DestTooSmall/13 8-byte object <80-00 00-00 CE-D2 5C-56>' - PASSED gtests.sh: #6792: 'Iso88591TestCases/Ucs2Test: DestTooSmall/14 8-byte object <81-00 00-00 D1-D2 5C-56>' - PASSED gtests.sh: #6793: 'Iso88591TestCases/Ucs2Test: DestTooSmall/15 8-byte object <82-00 00-00 D4-D2 5C-56>' - PASSED gtests.sh: #6794: 'Iso88591TestCases/Ucs2Test: DestTooSmall/16 8-byte object <84-00 00-00 D7-D2 5C-56>' - PASSED gtests.sh: #6795: 'Iso88591TestCases/Ucs2Test: DestTooSmall/17 8-byte object <88-00 00-00 DA-D2 5C-56>' - PASSED gtests.sh: #6796: 'Iso88591TestCases/Ucs2Test: DestTooSmall/18 8-byte object <90-00 00-00 DD-D2 5C-56>' - PASSED gtests.sh: #6797: 'Iso88591TestCases/Ucs2Test: DestTooSmall/19 8-byte object <A0-00 00-00 E0-D2 5C-56>' - PASSED gtests.sh: #6798: 'Iso88591TestCases/Ucs2Test: DestTooSmall/20 8-byte object <C0-00 00-00 15-D1 5C-56>' - PASSED gtests.sh: #6799: 'Iso88591TestCases/Ucs2Test: DestTooSmall/21 8-byte object <FF-00 00-00 E3-D2 5C-56>' - PASSED gtests.sh: #6800: 'Ucs2TestCases/Ucs2Test: ToUtf8/0 8-byte object <00-01 00-00 2B-D1 5C-56>' - PASSED gtests.sh: #6801: 'Ucs2TestCases/Ucs2Test: ToUtf8/1 8-byte object <01-01 00-00 2E-D1 5C-56>' - PASSED gtests.sh: #6802: 'Ucs2TestCases/Ucs2Test: ToUtf8/2 8-byte object <02-01 00-00 31-D1 5C-56>' - PASSED gtests.sh: #6803: 'Ucs2TestCases/Ucs2Test: ToUtf8/3 8-byte object <04-01 00-00 34-D1 5C-56>' - PASSED gtests.sh: #6804: 'Ucs2TestCases/Ucs2Test: ToUtf8/4 8-byte object <08-01 00-00 37-D1 5C-56>' - PASSED gtests.sh: #6805: 'Ucs2TestCases/Ucs2Test: ToUtf8/5 8-byte object <10-01 00-00 3A-D1 5C-56>' - PASSED gtests.sh: #6806: 'Ucs2TestCases/Ucs2Test: ToUtf8/6 8-byte object <20-01 00-00 3D-D1 5C-56>' - PASSED gtests.sh: #6807: 'Ucs2TestCases/Ucs2Test: ToUtf8/7 8-byte object <40-01 00-00 40-D1 5C-56>' - PASSED gtests.sh: #6808: 'Ucs2TestCases/Ucs2Test: ToUtf8/8 8-byte object <80-01 00-00 43-D1 5C-56>' - PASSED gtests.sh: #6809: 'Ucs2TestCases/Ucs2Test: ToUtf8/9 8-byte object <FF-01 00-00 46-D1 5C-56>' - PASSED gtests.sh: #6810: 'Ucs2TestCases/Ucs2Test: ToUtf8/10 8-byte object <00-02 00-00 49-D1 5C-56>' - PASSED gtests.sh: #6811: 'Ucs2TestCases/Ucs2Test: ToUtf8/11 8-byte object <01-02 00-00 4C-D1 5C-56>' - PASSED gtests.sh: #6812: 'Ucs2TestCases/Ucs2Test: ToUtf8/12 8-byte object <02-02 00-00 4F-D1 5C-56>' - PASSED gtests.sh: #6813: 'Ucs2TestCases/Ucs2Test: ToUtf8/13 8-byte object <04-02 00-00 52-D1 5C-56>' - PASSED gtests.sh: #6814: 'Ucs2TestCases/Ucs2Test: ToUtf8/14 8-byte object <08-02 00-00 55-D1 5C-56>' - PASSED gtests.sh: #6815: 'Ucs2TestCases/Ucs2Test: ToUtf8/15 8-byte object <10-02 00-00 58-D1 5C-56>' - PASSED gtests.sh: #6816: 'Ucs2TestCases/Ucs2Test: ToUtf8/16 8-byte object <20-02 00-00 5B-D1 5C-56>' - PASSED gtests.sh: #6817: 'Ucs2TestCases/Ucs2Test: ToUtf8/17 8-byte object <40-02 00-00 5E-D1 5C-56>' - PASSED gtests.sh: #6818: 'Ucs2TestCases/Ucs2Test: ToUtf8/18 8-byte object <80-02 00-00 61-D1 5C-56>' - PASSED gtests.sh: #6819: 'Ucs2TestCases/Ucs2Test: ToUtf8/19 8-byte object <00-03 00-00 64-D1 5C-56>' - PASSED gtests.sh: #6820: 'Ucs2TestCases/Ucs2Test: ToUtf8/20 8-byte object <FF-03 00-00 67-D1 5C-56>' - PASSED gtests.sh: #6821: 'Ucs2TestCases/Ucs2Test: ToUtf8/21 8-byte object <00-04 00-00 6A-D1 5C-56>' - PASSED gtests.sh: #6822: 'Ucs2TestCases/Ucs2Test: ToUtf8/22 8-byte object <01-04 00-00 6D-D1 5C-56>' - PASSED gtests.sh: #6823: 'Ucs2TestCases/Ucs2Test: ToUtf8/23 8-byte object <02-04 00-00 70-D1 5C-56>' - PASSED gtests.sh: #6824: 'Ucs2TestCases/Ucs2Test: ToUtf8/24 8-byte object <04-04 00-00 73-D1 5C-56>' - PASSED gtests.sh: #6825: 'Ucs2TestCases/Ucs2Test: ToUtf8/25 8-byte object <08-04 00-00 76-D1 5C-56>' - PASSED gtests.sh: #6826: 'Ucs2TestCases/Ucs2Test: ToUtf8/26 8-byte object <10-04 00-00 79-D1 5C-56>' - PASSED gtests.sh: #6827: 'Ucs2TestCases/Ucs2Test: ToUtf8/27 8-byte object <20-04 00-00 7C-D1 5C-56>' - PASSED gtests.sh: #6828: 'Ucs2TestCases/Ucs2Test: ToUtf8/28 8-byte object <40-04 00-00 7F-D1 5C-56>' - PASSED gtests.sh: #6829: 'Ucs2TestCases/Ucs2Test: ToUtf8/29 8-byte object <80-04 00-00 82-D1 5C-56>' - PASSED gtests.sh: #6830: 'Ucs2TestCases/Ucs2Test: ToUtf8/30 8-byte object <00-05 00-00 85-D1 5C-56>' - PASSED gtests.sh: #6831: 'Ucs2TestCases/Ucs2Test: ToUtf8/31 8-byte object <00-06 00-00 88-D1 5C-56>' - PASSED gtests.sh: #6832: 'Ucs2TestCases/Ucs2Test: ToUtf8/32 8-byte object <FF-07 00-00 8B-D1 5C-56>' - PASSED gtests.sh: #6833: 'Ucs2TestCases/Ucs2Test: ToUtf8/33 8-byte object <00-08 00-00 8E-D1 5C-56>' - PASSED gtests.sh: #6834: 'Ucs2TestCases/Ucs2Test: ToUtf8/34 8-byte object <01-08 00-00 92-D1 5C-56>' - PASSED gtests.sh: #6835: 'Ucs2TestCases/Ucs2Test: ToUtf8/35 8-byte object <02-08 00-00 96-D1 5C-56>' - PASSED gtests.sh: #6836: 'Ucs2TestCases/Ucs2Test: ToUtf8/36 8-byte object <04-08 00-00 9A-D1 5C-56>' - PASSED gtests.sh: #6837: 'Ucs2TestCases/Ucs2Test: ToUtf8/37 8-byte object <08-08 00-00 9E-D1 5C-56>' - PASSED gtests.sh: #6838: 'Ucs2TestCases/Ucs2Test: ToUtf8/38 8-byte object <10-08 00-00 A2-D1 5C-56>' - PASSED gtests.sh: #6839: 'Ucs2TestCases/Ucs2Test: ToUtf8/39 8-byte object <20-08 00-00 A6-D1 5C-56>' - PASSED gtests.sh: #6840: 'Ucs2TestCases/Ucs2Test: ToUtf8/40 8-byte object <40-08 00-00 AA-D1 5C-56>' - PASSED gtests.sh: #6841: 'Ucs2TestCases/Ucs2Test: ToUtf8/41 8-byte object <80-08 00-00 AE-D1 5C-56>' - PASSED gtests.sh: #6842: 'Ucs2TestCases/Ucs2Test: ToUtf8/42 8-byte object <00-09 00-00 B2-D1 5C-56>' - PASSED gtests.sh: #6843: 'Ucs2TestCases/Ucs2Test: ToUtf8/43 8-byte object <00-0A 00-00 B6-D1 5C-56>' - PASSED gtests.sh: #6844: 'Ucs2TestCases/Ucs2Test: ToUtf8/44 8-byte object <00-0C 00-00 BA-D1 5C-56>' - PASSED gtests.sh: #6845: 'Ucs2TestCases/Ucs2Test: ToUtf8/45 8-byte object <FF-0F 00-00 27-D1 5C-56>' - PASSED gtests.sh: #6846: 'Ucs2TestCases/Ucs2Test: ToUtf8/46 8-byte object <00-10 00-00 BE-D1 5C-56>' - PASSED gtests.sh: #6847: 'Ucs2TestCases/Ucs2Test: ToUtf8/47 8-byte object <01-10 00-00 C2-D1 5C-56>' - PASSED gtests.sh: #6848: 'Ucs2TestCases/Ucs2Test: ToUtf8/48 8-byte object <02-10 00-00 C6-D1 5C-56>' - PASSED gtests.sh: #6849: 'Ucs2TestCases/Ucs2Test: ToUtf8/49 8-byte object <04-10 00-00 CA-D1 5C-56>' - PASSED gtests.sh: #6850: 'Ucs2TestCases/Ucs2Test: ToUtf8/50 8-byte object <08-10 00-00 CE-D1 5C-56>' - PASSED gtests.sh: #6851: 'Ucs2TestCases/Ucs2Test: ToUtf8/51 8-byte object <10-10 00-00 D2-D1 5C-56>' - PASSED gtests.sh: #6852: 'Ucs2TestCases/Ucs2Test: ToUtf8/52 8-byte object <20-10 00-00 D6-D1 5C-56>' - PASSED gtests.sh: #6853: 'Ucs2TestCases/Ucs2Test: ToUtf8/53 8-byte object <40-10 00-00 DA-D1 5C-56>' - PASSED gtests.sh: #6854: 'Ucs2TestCases/Ucs2Test: ToUtf8/54 8-byte object <80-10 00-00 DE-D1 5C-56>' - PASSED gtests.sh: #6855: 'Ucs2TestCases/Ucs2Test: ToUtf8/55 8-byte object <00-11 00-00 E2-D1 5C-56>' - PASSED gtests.sh: #6856: 'Ucs2TestCases/Ucs2Test: ToUtf8/56 8-byte object <00-12 00-00 E6-D1 5C-56>' - PASSED gtests.sh: #6857: 'Ucs2TestCases/Ucs2Test: ToUtf8/57 8-byte object <00-14 00-00 EA-D1 5C-56>' - PASSED gtests.sh: #6858: 'Ucs2TestCases/Ucs2Test: ToUtf8/58 8-byte object <00-18 00-00 EE-D1 5C-56>' - PASSED gtests.sh: #6859: 'Ucs2TestCases/Ucs2Test: ToUtf8/59 8-byte object <FF-1F 00-00 F2-D1 5C-56>' - PASSED gtests.sh: #6860: 'Ucs2TestCases/Ucs2Test: ToUtf8/60 8-byte object <00-20 00-00 F6-D1 5C-56>' - PASSED gtests.sh: #6861: 'Ucs2TestCases/Ucs2Test: ToUtf8/61 8-byte object <01-20 00-00 FA-D1 5C-56>' - PASSED gtests.sh: #6862: 'Ucs2TestCases/Ucs2Test: ToUtf8/62 8-byte object <02-20 00-00 FE-D1 5C-56>' - PASSED gtests.sh: #6863: 'Ucs2TestCases/Ucs2Test: ToUtf8/63 8-byte object <04-20 00-00 02-D2 5C-56>' - PASSED gtests.sh: #6864: 'Ucs2TestCases/Ucs2Test: ToUtf8/64 8-byte object <08-20 00-00 06-D2 5C-56>' - PASSED gtests.sh: #6865: 'Ucs2TestCases/Ucs2Test: ToUtf8/65 8-byte object <10-20 00-00 0A-D2 5C-56>' - PASSED gtests.sh: #6866: 'Ucs2TestCases/Ucs2Test: ToUtf8/66 8-byte object <20-20 00-00 0E-D2 5C-56>' - PASSED gtests.sh: #6867: 'Ucs2TestCases/Ucs2Test: ToUtf8/67 8-byte object <40-20 00-00 12-D2 5C-56>' - PASSED gtests.sh: #6868: 'Ucs2TestCases/Ucs2Test: ToUtf8/68 8-byte object <80-20 00-00 16-D2 5C-56>' - PASSED gtests.sh: #6869: 'Ucs2TestCases/Ucs2Test: ToUtf8/69 8-byte object <00-21 00-00 1A-D2 5C-56>' - PASSED gtests.sh: #6870: 'Ucs2TestCases/Ucs2Test: ToUtf8/70 8-byte object <00-22 00-00 1E-D2 5C-56>' - PASSED gtests.sh: #6871: 'Ucs2TestCases/Ucs2Test: ToUtf8/71 8-byte object <00-24 00-00 22-D2 5C-56>' - PASSED gtests.sh: #6872: 'Ucs2TestCases/Ucs2Test: ToUtf8/72 8-byte object <00-28 00-00 26-D2 5C-56>' - PASSED gtests.sh: #6873: 'Ucs2TestCases/Ucs2Test: ToUtf8/73 8-byte object <00-30 00-00 2A-D2 5C-56>' - PASSED gtests.sh: #6874: 'Ucs2TestCases/Ucs2Test: ToUtf8/74 8-byte object <FF-3F 00-00 2E-D2 5C-56>' - PASSED gtests.sh: #6875: 'Ucs2TestCases/Ucs2Test: ToUtf8/75 8-byte object <00-40 00-00 32-D2 5C-56>' - PASSED gtests.sh: #6876: 'Ucs2TestCases/Ucs2Test: ToUtf8/76 8-byte object <01-40 00-00 36-D2 5C-56>' - PASSED gtests.sh: #6877: 'Ucs2TestCases/Ucs2Test: ToUtf8/77 8-byte object <02-40 00-00 3A-D2 5C-56>' - PASSED gtests.sh: #6878: 'Ucs2TestCases/Ucs2Test: ToUtf8/78 8-byte object <04-40 00-00 3E-D2 5C-56>' - PASSED gtests.sh: #6879: 'Ucs2TestCases/Ucs2Test: ToUtf8/79 8-byte object <08-40 00-00 42-D2 5C-56>' - PASSED gtests.sh: #6880: 'Ucs2TestCases/Ucs2Test: ToUtf8/80 8-byte object <10-40 00-00 46-D2 5C-56>' - PASSED gtests.sh: #6881: 'Ucs2TestCases/Ucs2Test: ToUtf8/81 8-byte object <20-40 00-00 4A-D2 5C-56>' - PASSED gtests.sh: #6882: 'Ucs2TestCases/Ucs2Test: ToUtf8/82 8-byte object <40-40 00-00 4E-D2 5C-56>' - PASSED gtests.sh: #6883: 'Ucs2TestCases/Ucs2Test: ToUtf8/83 8-byte object <80-40 00-00 52-D2 5C-56>' - PASSED gtests.sh: #6884: 'Ucs2TestCases/Ucs2Test: ToUtf8/84 8-byte object <00-41 00-00 56-D2 5C-56>' - PASSED gtests.sh: #6885: 'Ucs2TestCases/Ucs2Test: ToUtf8/85 8-byte object <00-42 00-00 5A-D2 5C-56>' - PASSED gtests.sh: #6886: 'Ucs2TestCases/Ucs2Test: ToUtf8/86 8-byte object <00-44 00-00 5E-D2 5C-56>' - PASSED gtests.sh: #6887: 'Ucs2TestCases/Ucs2Test: ToUtf8/87 8-byte object <00-48 00-00 62-D2 5C-56>' - PASSED gtests.sh: #6888: 'Ucs2TestCases/Ucs2Test: ToUtf8/88 8-byte object <00-50 00-00 66-D2 5C-56>' - PASSED gtests.sh: #6889: 'Ucs2TestCases/Ucs2Test: ToUtf8/89 8-byte object <00-60 00-00 6A-D2 5C-56>' - PASSED gtests.sh: #6890: 'Ucs2TestCases/Ucs2Test: ToUtf8/90 8-byte object <FF-7F 00-00 6E-D2 5C-56>' - PASSED gtests.sh: #6891: 'Ucs2TestCases/Ucs2Test: ToUtf8/91 8-byte object <00-80 00-00 72-D2 5C-56>' - PASSED gtests.sh: #6892: 'Ucs2TestCases/Ucs2Test: ToUtf8/92 8-byte object <01-80 00-00 76-D2 5C-56>' - PASSED gtests.sh: #6893: 'Ucs2TestCases/Ucs2Test: ToUtf8/93 8-byte object <02-80 00-00 7A-D2 5C-56>' - PASSED gtests.sh: #6894: 'Ucs2TestCases/Ucs2Test: ToUtf8/94 8-byte object <04-80 00-00 7E-D2 5C-56>' - PASSED gtests.sh: #6895: 'Ucs2TestCases/Ucs2Test: ToUtf8/95 8-byte object <08-80 00-00 82-D2 5C-56>' - PASSED gtests.sh: #6896: 'Ucs2TestCases/Ucs2Test: ToUtf8/96 8-byte object <10-80 00-00 86-D2 5C-56>' - PASSED gtests.sh: #6897: 'Ucs2TestCases/Ucs2Test: ToUtf8/97 8-byte object <20-80 00-00 8A-D2 5C-56>' - PASSED gtests.sh: #6898: 'Ucs2TestCases/Ucs2Test: ToUtf8/98 8-byte object <40-80 00-00 8E-D2 5C-56>' - PASSED gtests.sh: #6899: 'Ucs2TestCases/Ucs2Test: ToUtf8/99 8-byte object <80-80 00-00 92-D2 5C-56>' - PASSED gtests.sh: #6900: 'Ucs2TestCases/Ucs2Test: ToUtf8/100 8-byte object <00-81 00-00 96-D2 5C-56>' - PASSED gtests.sh: #6901: 'Ucs2TestCases/Ucs2Test: ToUtf8/101 8-byte object <00-82 00-00 9A-D2 5C-56>' - PASSED gtests.sh: #6902: 'Ucs2TestCases/Ucs2Test: ToUtf8/102 8-byte object <00-84 00-00 9E-D2 5C-56>' - PASSED gtests.sh: #6903: 'Ucs2TestCases/Ucs2Test: ToUtf8/103 8-byte object <00-88 00-00 A2-D2 5C-56>' - PASSED gtests.sh: #6904: 'Ucs2TestCases/Ucs2Test: ToUtf8/104 8-byte object <00-90 00-00 A6-D2 5C-56>' - PASSED gtests.sh: #6905: 'Ucs2TestCases/Ucs2Test: ToUtf8/105 8-byte object <00-A0 00-00 AA-D2 5C-56>' - PASSED gtests.sh: #6906: 'Ucs2TestCases/Ucs2Test: ToUtf8/106 8-byte object <00-C0 00-00 AE-D2 5C-56>' - PASSED gtests.sh: #6907: 'Ucs2TestCases/Ucs2Test: ToUtf8/107 8-byte object <01-FB 00-00 B2-D2 5C-56>' - PASSED gtests.sh: #6908: 'Ucs2TestCases/Ucs2Test: ToUtf8/108 8-byte object <FF-FF 00-00 B6-D2 5C-56>' - PASSED gtests.sh: #6909: 'Ucs2TestCases/Ucs2Test: FromUtf8/0 8-byte object <00-01 00-00 2B-D1 5C-56>' - PASSED gtests.sh: #6910: 'Ucs2TestCases/Ucs2Test: FromUtf8/1 8-byte object <01-01 00-00 2E-D1 5C-56>' - PASSED gtests.sh: #6911: 'Ucs2TestCases/Ucs2Test: FromUtf8/2 8-byte object <02-01 00-00 31-D1 5C-56>' - PASSED gtests.sh: #6912: 'Ucs2TestCases/Ucs2Test: FromUtf8/3 8-byte object <04-01 00-00 34-D1 5C-56>' - PASSED gtests.sh: #6913: 'Ucs2TestCases/Ucs2Test: FromUtf8/4 8-byte object <08-01 00-00 37-D1 5C-56>' - PASSED gtests.sh: #6914: 'Ucs2TestCases/Ucs2Test: FromUtf8/5 8-byte object <10-01 00-00 3A-D1 5C-56>' - PASSED gtests.sh: #6915: 'Ucs2TestCases/Ucs2Test: FromUtf8/6 8-byte object <20-01 00-00 3D-D1 5C-56>' - PASSED gtests.sh: #6916: 'Ucs2TestCases/Ucs2Test: FromUtf8/7 8-byte object <40-01 00-00 40-D1 5C-56>' - PASSED gtests.sh: #6917: 'Ucs2TestCases/Ucs2Test: FromUtf8/8 8-byte object <80-01 00-00 43-D1 5C-56>' - PASSED gtests.sh: #6918: 'Ucs2TestCases/Ucs2Test: FromUtf8/9 8-byte object <FF-01 00-00 46-D1 5C-56>' - PASSED gtests.sh: #6919: 'Ucs2TestCases/Ucs2Test: FromUtf8/10 8-byte object <00-02 00-00 49-D1 5C-56>' - PASSED gtests.sh: #6920: 'Ucs2TestCases/Ucs2Test: FromUtf8/11 8-byte object <01-02 00-00 4C-D1 5C-56>' - PASSED gtests.sh: #6921: 'Ucs2TestCases/Ucs2Test: FromUtf8/12 8-byte object <02-02 00-00 4F-D1 5C-56>' - PASSED gtests.sh: #6922: 'Ucs2TestCases/Ucs2Test: FromUtf8/13 8-byte object <04-02 00-00 52-D1 5C-56>' - PASSED gtests.sh: #6923: 'Ucs2TestCases/Ucs2Test: FromUtf8/14 8-byte object <08-02 00-00 55-D1 5C-56>' - PASSED gtests.sh: #6924: 'Ucs2TestCases/Ucs2Test: FromUtf8/15 8-byte object <10-02 00-00 58-D1 5C-56>' - PASSED gtests.sh: #6925: 'Ucs2TestCases/Ucs2Test: FromUtf8/16 8-byte object <20-02 00-00 5B-D1 5C-56>' - PASSED gtests.sh: #6926: 'Ucs2TestCases/Ucs2Test: FromUtf8/17 8-byte object <40-02 00-00 5E-D1 5C-56>' - PASSED gtests.sh: #6927: 'Ucs2TestCases/Ucs2Test: FromUtf8/18 8-byte object <80-02 00-00 61-D1 5C-56>' - PASSED gtests.sh: #6928: 'Ucs2TestCases/Ucs2Test: FromUtf8/19 8-byte object <00-03 00-00 64-D1 5C-56>' - PASSED gtests.sh: #6929: 'Ucs2TestCases/Ucs2Test: FromUtf8/20 8-byte object <FF-03 00-00 67-D1 5C-56>' - PASSED gtests.sh: #6930: 'Ucs2TestCases/Ucs2Test: FromUtf8/21 8-byte object <00-04 00-00 6A-D1 5C-56>' - PASSED gtests.sh: #6931: 'Ucs2TestCases/Ucs2Test: FromUtf8/22 8-byte object <01-04 00-00 6D-D1 5C-56>' - PASSED gtests.sh: #6932: 'Ucs2TestCases/Ucs2Test: FromUtf8/23 8-byte object <02-04 00-00 70-D1 5C-56>' - PASSED gtests.sh: #6933: 'Ucs2TestCases/Ucs2Test: FromUtf8/24 8-byte object <04-04 00-00 73-D1 5C-56>' - PASSED gtests.sh: #6934: 'Ucs2TestCases/Ucs2Test: FromUtf8/25 8-byte object <08-04 00-00 76-D1 5C-56>' - PASSED gtests.sh: #6935: 'Ucs2TestCases/Ucs2Test: FromUtf8/26 8-byte object <10-04 00-00 79-D1 5C-56>' - PASSED gtests.sh: #6936: 'Ucs2TestCases/Ucs2Test: FromUtf8/27 8-byte object <20-04 00-00 7C-D1 5C-56>' - PASSED gtests.sh: #6937: 'Ucs2TestCases/Ucs2Test: FromUtf8/28 8-byte object <40-04 00-00 7F-D1 5C-56>' - PASSED gtests.sh: #6938: 'Ucs2TestCases/Ucs2Test: FromUtf8/29 8-byte object <80-04 00-00 82-D1 5C-56>' - PASSED gtests.sh: #6939: 'Ucs2TestCases/Ucs2Test: FromUtf8/30 8-byte object <00-05 00-00 85-D1 5C-56>' - PASSED gtests.sh: #6940: 'Ucs2TestCases/Ucs2Test: FromUtf8/31 8-byte object <00-06 00-00 88-D1 5C-56>' - PASSED gtests.sh: #6941: 'Ucs2TestCases/Ucs2Test: FromUtf8/32 8-byte object <FF-07 00-00 8B-D1 5C-56>' - PASSED gtests.sh: #6942: 'Ucs2TestCases/Ucs2Test: FromUtf8/33 8-byte object <00-08 00-00 8E-D1 5C-56>' - PASSED gtests.sh: #6943: 'Ucs2TestCases/Ucs2Test: FromUtf8/34 8-byte object <01-08 00-00 92-D1 5C-56>' - PASSED gtests.sh: #6944: 'Ucs2TestCases/Ucs2Test: FromUtf8/35 8-byte object <02-08 00-00 96-D1 5C-56>' - PASSED gtests.sh: #6945: 'Ucs2TestCases/Ucs2Test: FromUtf8/36 8-byte object <04-08 00-00 9A-D1 5C-56>' - PASSED gtests.sh: #6946: 'Ucs2TestCases/Ucs2Test: FromUtf8/37 8-byte object <08-08 00-00 9E-D1 5C-56>' - PASSED gtests.sh: #6947: 'Ucs2TestCases/Ucs2Test: FromUtf8/38 8-byte object <10-08 00-00 A2-D1 5C-56>' - PASSED gtests.sh: #6948: 'Ucs2TestCases/Ucs2Test: FromUtf8/39 8-byte object <20-08 00-00 A6-D1 5C-56>' - PASSED gtests.sh: #6949: 'Ucs2TestCases/Ucs2Test: FromUtf8/40 8-byte object <40-08 00-00 AA-D1 5C-56>' - PASSED gtests.sh: #6950: 'Ucs2TestCases/Ucs2Test: FromUtf8/41 8-byte object <80-08 00-00 AE-D1 5C-56>' - PASSED gtests.sh: #6951: 'Ucs2TestCases/Ucs2Test: FromUtf8/42 8-byte object <00-09 00-00 B2-D1 5C-56>' - PASSED gtests.sh: #6952: 'Ucs2TestCases/Ucs2Test: FromUtf8/43 8-byte object <00-0A 00-00 B6-D1 5C-56>' - PASSED gtests.sh: #6953: 'Ucs2TestCases/Ucs2Test: FromUtf8/44 8-byte object <00-0C 00-00 BA-D1 5C-56>' - PASSED gtests.sh: #6954: 'Ucs2TestCases/Ucs2Test: FromUtf8/45 8-byte object <FF-0F 00-00 27-D1 5C-56>' - PASSED gtests.sh: #6955: 'Ucs2TestCases/Ucs2Test: FromUtf8/46 8-byte object <00-10 00-00 BE-D1 5C-56>' - PASSED gtests.sh: #6956: 'Ucs2TestCases/Ucs2Test: FromUtf8/47 8-byte object <01-10 00-00 C2-D1 5C-56>' - PASSED gtests.sh: #6957: 'Ucs2TestCases/Ucs2Test: FromUtf8/48 8-byte object <02-10 00-00 C6-D1 5C-56>' - PASSED gtests.sh: #6958: 'Ucs2TestCases/Ucs2Test: FromUtf8/49 8-byte object <04-10 00-00 CA-D1 5C-56>' - PASSED gtests.sh: #6959: 'Ucs2TestCases/Ucs2Test: FromUtf8/50 8-byte object <08-10 00-00 CE-D1 5C-56>' - PASSED gtests.sh: #6960: 'Ucs2TestCases/Ucs2Test: FromUtf8/51 8-byte object <10-10 00-00 D2-D1 5C-56>' - PASSED gtests.sh: #6961: 'Ucs2TestCases/Ucs2Test: FromUtf8/52 8-byte object <20-10 00-00 D6-D1 5C-56>' - PASSED gtests.sh: #6962: 'Ucs2TestCases/Ucs2Test: FromUtf8/53 8-byte object <40-10 00-00 DA-D1 5C-56>' - PASSED gtests.sh: #6963: 'Ucs2TestCases/Ucs2Test: FromUtf8/54 8-byte object <80-10 00-00 DE-D1 5C-56>' - PASSED gtests.sh: #6964: 'Ucs2TestCases/Ucs2Test: FromUtf8/55 8-byte object <00-11 00-00 E2-D1 5C-56>' - PASSED gtests.sh: #6965: 'Ucs2TestCases/Ucs2Test: FromUtf8/56 8-byte object <00-12 00-00 E6-D1 5C-56>' - PASSED gtests.sh: #6966: 'Ucs2TestCases/Ucs2Test: FromUtf8/57 8-byte object <00-14 00-00 EA-D1 5C-56>' - PASSED gtests.sh: #6967: 'Ucs2TestCases/Ucs2Test: FromUtf8/58 8-byte object <00-18 00-00 EE-D1 5C-56>' - PASSED gtests.sh: #6968: 'Ucs2TestCases/Ucs2Test: FromUtf8/59 8-byte object <FF-1F 00-00 F2-D1 5C-56>' - PASSED gtests.sh: #6969: 'Ucs2TestCases/Ucs2Test: FromUtf8/60 8-byte object <00-20 00-00 F6-D1 5C-56>' - PASSED gtests.sh: #6970: 'Ucs2TestCases/Ucs2Test: FromUtf8/61 8-byte object <01-20 00-00 FA-D1 5C-56>' - PASSED gtests.sh: #6971: 'Ucs2TestCases/Ucs2Test: FromUtf8/62 8-byte object <02-20 00-00 FE-D1 5C-56>' - PASSED gtests.sh: #6972: 'Ucs2TestCases/Ucs2Test: FromUtf8/63 8-byte object <04-20 00-00 02-D2 5C-56>' - PASSED gtests.sh: #6973: 'Ucs2TestCases/Ucs2Test: FromUtf8/64 8-byte object <08-20 00-00 06-D2 5C-56>' - PASSED gtests.sh: #6974: 'Ucs2TestCases/Ucs2Test: FromUtf8/65 8-byte object <10-20 00-00 0A-D2 5C-56>' - PASSED gtests.sh: #6975: 'Ucs2TestCases/Ucs2Test: FromUtf8/66 8-byte object <20-20 00-00 0E-D2 5C-56>' - PASSED gtests.sh: #6976: 'Ucs2TestCases/Ucs2Test: FromUtf8/67 8-byte object <40-20 00-00 12-D2 5C-56>' - PASSED gtests.sh: #6977: 'Ucs2TestCases/Ucs2Test: FromUtf8/68 8-byte object <80-20 00-00 16-D2 5C-56>' - PASSED gtests.sh: #6978: 'Ucs2TestCases/Ucs2Test: FromUtf8/69 8-byte object <00-21 00-00 1A-D2 5C-56>' - PASSED gtests.sh: #6979: 'Ucs2TestCases/Ucs2Test: FromUtf8/70 8-byte object <00-22 00-00 1E-D2 5C-56>' - PASSED gtests.sh: #6980: 'Ucs2TestCases/Ucs2Test: FromUtf8/71 8-byte object <00-24 00-00 22-D2 5C-56>' - PASSED gtests.sh: #6981: 'Ucs2TestCases/Ucs2Test: FromUtf8/72 8-byte object <00-28 00-00 26-D2 5C-56>' - PASSED gtests.sh: #6982: 'Ucs2TestCases/Ucs2Test: FromUtf8/73 8-byte object <00-30 00-00 2A-D2 5C-56>' - PASSED gtests.sh: #6983: 'Ucs2TestCases/Ucs2Test: FromUtf8/74 8-byte object <FF-3F 00-00 2E-D2 5C-56>' - PASSED gtests.sh: #6984: 'Ucs2TestCases/Ucs2Test: FromUtf8/75 8-byte object <00-40 00-00 32-D2 5C-56>' - PASSED gtests.sh: #6985: 'Ucs2TestCases/Ucs2Test: FromUtf8/76 8-byte object <01-40 00-00 36-D2 5C-56>' - PASSED gtests.sh: #6986: 'Ucs2TestCases/Ucs2Test: FromUtf8/77 8-byte object <02-40 00-00 3A-D2 5C-56>' - PASSED gtests.sh: #6987: 'Ucs2TestCases/Ucs2Test: FromUtf8/78 8-byte object <04-40 00-00 3E-D2 5C-56>' - PASSED gtests.sh: #6988: 'Ucs2TestCases/Ucs2Test: FromUtf8/79 8-byte object <08-40 00-00 42-D2 5C-56>' - PASSED gtests.sh: #6989: 'Ucs2TestCases/Ucs2Test: FromUtf8/80 8-byte object <10-40 00-00 46-D2 5C-56>' - PASSED gtests.sh: #6990: 'Ucs2TestCases/Ucs2Test: FromUtf8/81 8-byte object <20-40 00-00 4A-D2 5C-56>' - PASSED gtests.sh: #6991: 'Ucs2TestCases/Ucs2Test: FromUtf8/82 8-byte object <40-40 00-00 4E-D2 5C-56>' - PASSED gtests.sh: #6992: 'Ucs2TestCases/Ucs2Test: FromUtf8/83 8-byte object <80-40 00-00 52-D2 5C-56>' - PASSED gtests.sh: #6993: 'Ucs2TestCases/Ucs2Test: FromUtf8/84 8-byte object <00-41 00-00 56-D2 5C-56>' - PASSED gtests.sh: #6994: 'Ucs2TestCases/Ucs2Test: FromUtf8/85 8-byte object <00-42 00-00 5A-D2 5C-56>' - PASSED gtests.sh: #6995: 'Ucs2TestCases/Ucs2Test: FromUtf8/86 8-byte object <00-44 00-00 5E-D2 5C-56>' - PASSED gtests.sh: #6996: 'Ucs2TestCases/Ucs2Test: FromUtf8/87 8-byte object <00-48 00-00 62-D2 5C-56>' - PASSED gtests.sh: #6997: 'Ucs2TestCases/Ucs2Test: FromUtf8/88 8-byte object <00-50 00-00 66-D2 5C-56>' - PASSED gtests.sh: #6998: 'Ucs2TestCases/Ucs2Test: FromUtf8/89 8-byte object <00-60 00-00 6A-D2 5C-56>' - PASSED gtests.sh: #6999: 'Ucs2TestCases/Ucs2Test: FromUtf8/90 8-byte object <FF-7F 00-00 6E-D2 5C-56>' - PASSED gtests.sh: #7000: 'Ucs2TestCases/Ucs2Test: FromUtf8/91 8-byte object <00-80 00-00 72-D2 5C-56>' - PASSED gtests.sh: #7001: 'Ucs2TestCases/Ucs2Test: FromUtf8/92 8-byte object <01-80 00-00 76-D2 5C-56>' - PASSED gtests.sh: #7002: 'Ucs2TestCases/Ucs2Test: FromUtf8/93 8-byte object <02-80 00-00 7A-D2 5C-56>' - PASSED gtests.sh: #7003: 'Ucs2TestCases/Ucs2Test: FromUtf8/94 8-byte object <04-80 00-00 7E-D2 5C-56>' - PASSED gtests.sh: #7004: 'Ucs2TestCases/Ucs2Test: FromUtf8/95 8-byte object <08-80 00-00 82-D2 5C-56>' - PASSED gtests.sh: #7005: 'Ucs2TestCases/Ucs2Test: FromUtf8/96 8-byte object <10-80 00-00 86-D2 5C-56>' - PASSED gtests.sh: #7006: 'Ucs2TestCases/Ucs2Test: FromUtf8/97 8-byte object <20-80 00-00 8A-D2 5C-56>' - PASSED gtests.sh: #7007: 'Ucs2TestCases/Ucs2Test: FromUtf8/98 8-byte object <40-80 00-00 8E-D2 5C-56>' - PASSED gtests.sh: #7008: 'Ucs2TestCases/Ucs2Test: FromUtf8/99 8-byte object <80-80 00-00 92-D2 5C-56>' - PASSED gtests.sh: #7009: 'Ucs2TestCases/Ucs2Test: FromUtf8/100 8-byte object <00-81 00-00 96-D2 5C-56>' - PASSED gtests.sh: #7010: 'Ucs2TestCases/Ucs2Test: FromUtf8/101 8-byte object <00-82 00-00 9A-D2 5C-56>' - PASSED gtests.sh: #7011: 'Ucs2TestCases/Ucs2Test: FromUtf8/102 8-byte object <00-84 00-00 9E-D2 5C-56>' - PASSED gtests.sh: #7012: 'Ucs2TestCases/Ucs2Test: FromUtf8/103 8-byte object <00-88 00-00 A2-D2 5C-56>' - PASSED gtests.sh: #7013: 'Ucs2TestCases/Ucs2Test: FromUtf8/104 8-byte object <00-90 00-00 A6-D2 5C-56>' - PASSED gtests.sh: #7014: 'Ucs2TestCases/Ucs2Test: FromUtf8/105 8-byte object <00-A0 00-00 AA-D2 5C-56>' - PASSED gtests.sh: #7015: 'Ucs2TestCases/Ucs2Test: FromUtf8/106 8-byte object <00-C0 00-00 AE-D2 5C-56>' - PASSED gtests.sh: #7016: 'Ucs2TestCases/Ucs2Test: FromUtf8/107 8-byte object <01-FB 00-00 B2-D2 5C-56>' - PASSED gtests.sh: #7017: 'Ucs2TestCases/Ucs2Test: FromUtf8/108 8-byte object <FF-FF 00-00 B6-D2 5C-56>' - PASSED gtests.sh: #7018: 'Ucs2TestCases/Ucs2Test: DestTooSmall/0 8-byte object <00-01 00-00 2B-D1 5C-56>' - PASSED gtests.sh: #7019: 'Ucs2TestCases/Ucs2Test: DestTooSmall/1 8-byte object <01-01 00-00 2E-D1 5C-56>' - PASSED gtests.sh: #7020: 'Ucs2TestCases/Ucs2Test: DestTooSmall/2 8-byte object <02-01 00-00 31-D1 5C-56>' - PASSED gtests.sh: #7021: 'Ucs2TestCases/Ucs2Test: DestTooSmall/3 8-byte object <04-01 00-00 34-D1 5C-56>' - PASSED gtests.sh: #7022: 'Ucs2TestCases/Ucs2Test: DestTooSmall/4 8-byte object <08-01 00-00 37-D1 5C-56>' - PASSED gtests.sh: #7023: 'Ucs2TestCases/Ucs2Test: DestTooSmall/5 8-byte object <10-01 00-00 3A-D1 5C-56>' - PASSED gtests.sh: #7024: 'Ucs2TestCases/Ucs2Test: DestTooSmall/6 8-byte object <20-01 00-00 3D-D1 5C-56>' - PASSED gtests.sh: #7025: 'Ucs2TestCases/Ucs2Test: DestTooSmall/7 8-byte object <40-01 00-00 40-D1 5C-56>' - PASSED gtests.sh: #7026: 'Ucs2TestCases/Ucs2Test: DestTooSmall/8 8-byte object <80-01 00-00 43-D1 5C-56>' - PASSED gtests.sh: #7027: 'Ucs2TestCases/Ucs2Test: DestTooSmall/9 8-byte object <FF-01 00-00 46-D1 5C-56>' - PASSED gtests.sh: #7028: 'Ucs2TestCases/Ucs2Test: DestTooSmall/10 8-byte object <00-02 00-00 49-D1 5C-56>' - PASSED gtests.sh: #7029: 'Ucs2TestCases/Ucs2Test: DestTooSmall/11 8-byte object <01-02 00-00 4C-D1 5C-56>' - PASSED gtests.sh: #7030: 'Ucs2TestCases/Ucs2Test: DestTooSmall/12 8-byte object <02-02 00-00 4F-D1 5C-56>' - PASSED gtests.sh: #7031: 'Ucs2TestCases/Ucs2Test: DestTooSmall/13 8-byte object <04-02 00-00 52-D1 5C-56>' - PASSED gtests.sh: #7032: 'Ucs2TestCases/Ucs2Test: DestTooSmall/14 8-byte object <08-02 00-00 55-D1 5C-56>' - PASSED gtests.sh: #7033: 'Ucs2TestCases/Ucs2Test: DestTooSmall/15 8-byte object <10-02 00-00 58-D1 5C-56>' - PASSED gtests.sh: #7034: 'Ucs2TestCases/Ucs2Test: DestTooSmall/16 8-byte object <20-02 00-00 5B-D1 5C-56>' - PASSED gtests.sh: #7035: 'Ucs2TestCases/Ucs2Test: DestTooSmall/17 8-byte object <40-02 00-00 5E-D1 5C-56>' - PASSED gtests.sh: #7036: 'Ucs2TestCases/Ucs2Test: DestTooSmall/18 8-byte object <80-02 00-00 61-D1 5C-56>' - PASSED gtests.sh: #7037: 'Ucs2TestCases/Ucs2Test: DestTooSmall/19 8-byte object <00-03 00-00 64-D1 5C-56>' - PASSED gtests.sh: #7038: 'Ucs2TestCases/Ucs2Test: DestTooSmall/20 8-byte object <FF-03 00-00 67-D1 5C-56>' - PASSED gtests.sh: #7039: 'Ucs2TestCases/Ucs2Test: DestTooSmall/21 8-byte object <00-04 00-00 6A-D1 5C-56>' - PASSED gtests.sh: #7040: 'Ucs2TestCases/Ucs2Test: DestTooSmall/22 8-byte object <01-04 00-00 6D-D1 5C-56>' - PASSED gtests.sh: #7041: 'Ucs2TestCases/Ucs2Test: DestTooSmall/23 8-byte object <02-04 00-00 70-D1 5C-56>' - PASSED gtests.sh: #7042: 'Ucs2TestCases/Ucs2Test: DestTooSmall/24 8-byte object <04-04 00-00 73-D1 5C-56>' - PASSED gtests.sh: #7043: 'Ucs2TestCases/Ucs2Test: DestTooSmall/25 8-byte object <08-04 00-00 76-D1 5C-56>' - PASSED gtests.sh: #7044: 'Ucs2TestCases/Ucs2Test: DestTooSmall/26 8-byte object <10-04 00-00 79-D1 5C-56>' - PASSED gtests.sh: #7045: 'Ucs2TestCases/Ucs2Test: DestTooSmall/27 8-byte object <20-04 00-00 7C-D1 5C-56>' - PASSED gtests.sh: #7046: 'Ucs2TestCases/Ucs2Test: DestTooSmall/28 8-byte object <40-04 00-00 7F-D1 5C-56>' - PASSED gtests.sh: #7047: 'Ucs2TestCases/Ucs2Test: DestTooSmall/29 8-byte object <80-04 00-00 82-D1 5C-56>' - PASSED gtests.sh: #7048: 'Ucs2TestCases/Ucs2Test: DestTooSmall/30 8-byte object <00-05 00-00 85-D1 5C-56>' - PASSED gtests.sh: #7049: 'Ucs2TestCases/Ucs2Test: DestTooSmall/31 8-byte object <00-06 00-00 88-D1 5C-56>' - PASSED gtests.sh: #7050: 'Ucs2TestCases/Ucs2Test: DestTooSmall/32 8-byte object <FF-07 00-00 8B-D1 5C-56>' - PASSED gtests.sh: #7051: 'Ucs2TestCases/Ucs2Test: DestTooSmall/33 8-byte object <00-08 00-00 8E-D1 5C-56>' - PASSED gtests.sh: #7052: 'Ucs2TestCases/Ucs2Test: DestTooSmall/34 8-byte object <01-08 00-00 92-D1 5C-56>' - PASSED gtests.sh: #7053: 'Ucs2TestCases/Ucs2Test: DestTooSmall/35 8-byte object <02-08 00-00 96-D1 5C-56>' - PASSED gtests.sh: #7054: 'Ucs2TestCases/Ucs2Test: DestTooSmall/36 8-byte object <04-08 00-00 9A-D1 5C-56>' - PASSED gtests.sh: #7055: 'Ucs2TestCases/Ucs2Test: DestTooSmall/37 8-byte object <08-08 00-00 9E-D1 5C-56>' - PASSED gtests.sh: #7056: 'Ucs2TestCases/Ucs2Test: DestTooSmall/38 8-byte object <10-08 00-00 A2-D1 5C-56>' - PASSED gtests.sh: #7057: 'Ucs2TestCases/Ucs2Test: DestTooSmall/39 8-byte object <20-08 00-00 A6-D1 5C-56>' - PASSED gtests.sh: #7058: 'Ucs2TestCases/Ucs2Test: DestTooSmall/40 8-byte object <40-08 00-00 AA-D1 5C-56>' - PASSED gtests.sh: #7059: 'Ucs2TestCases/Ucs2Test: DestTooSmall/41 8-byte object <80-08 00-00 AE-D1 5C-56>' - PASSED gtests.sh: #7060: 'Ucs2TestCases/Ucs2Test: DestTooSmall/42 8-byte object <00-09 00-00 B2-D1 5C-56>' - PASSED gtests.sh: #7061: 'Ucs2TestCases/Ucs2Test: DestTooSmall/43 8-byte object <00-0A 00-00 B6-D1 5C-56>' - PASSED gtests.sh: #7062: 'Ucs2TestCases/Ucs2Test: DestTooSmall/44 8-byte object <00-0C 00-00 BA-D1 5C-56>' - PASSED gtests.sh: #7063: 'Ucs2TestCases/Ucs2Test: DestTooSmall/45 8-byte object <FF-0F 00-00 27-D1 5C-56>' - PASSED gtests.sh: #7064: 'Ucs2TestCases/Ucs2Test: DestTooSmall/46 8-byte object <00-10 00-00 BE-D1 5C-56>' - PASSED gtests.sh: #7065: 'Ucs2TestCases/Ucs2Test: DestTooSmall/47 8-byte object <01-10 00-00 C2-D1 5C-56>' - PASSED gtests.sh: #7066: 'Ucs2TestCases/Ucs2Test: DestTooSmall/48 8-byte object <02-10 00-00 C6-D1 5C-56>' - PASSED gtests.sh: #7067: 'Ucs2TestCases/Ucs2Test: DestTooSmall/49 8-byte object <04-10 00-00 CA-D1 5C-56>' - PASSED gtests.sh: #7068: 'Ucs2TestCases/Ucs2Test: DestTooSmall/50 8-byte object <08-10 00-00 CE-D1 5C-56>' - PASSED gtests.sh: #7069: 'Ucs2TestCases/Ucs2Test: DestTooSmall/51 8-byte object <10-10 00-00 D2-D1 5C-56>' - PASSED gtests.sh: #7070: 'Ucs2TestCases/Ucs2Test: DestTooSmall/52 8-byte object <20-10 00-00 D6-D1 5C-56>' - PASSED gtests.sh: #7071: 'Ucs2TestCases/Ucs2Test: DestTooSmall/53 8-byte object <40-10 00-00 DA-D1 5C-56>' - PASSED gtests.sh: #7072: 'Ucs2TestCases/Ucs2Test: DestTooSmall/54 8-byte object <80-10 00-00 DE-D1 5C-56>' - PASSED gtests.sh: #7073: 'Ucs2TestCases/Ucs2Test: DestTooSmall/55 8-byte object <00-11 00-00 E2-D1 5C-56>' - PASSED gtests.sh: #7074: 'Ucs2TestCases/Ucs2Test: DestTooSmall/56 8-byte object <00-12 00-00 E6-D1 5C-56>' - PASSED gtests.sh: #7075: 'Ucs2TestCases/Ucs2Test: DestTooSmall/57 8-byte object <00-14 00-00 EA-D1 5C-56>' - PASSED gtests.sh: #7076: 'Ucs2TestCases/Ucs2Test: DestTooSmall/58 8-byte object <00-18 00-00 EE-D1 5C-56>' - PASSED gtests.sh: #7077: 'Ucs2TestCases/Ucs2Test: DestTooSmall/59 8-byte object <FF-1F 00-00 F2-D1 5C-56>' - PASSED gtests.sh: #7078: 'Ucs2TestCases/Ucs2Test: DestTooSmall/60 8-byte object <00-20 00-00 F6-D1 5C-56>' - PASSED gtests.sh: #7079: 'Ucs2TestCases/Ucs2Test: DestTooSmall/61 8-byte object <01-20 00-00 FA-D1 5C-56>' - PASSED gtests.sh: #7080: 'Ucs2TestCases/Ucs2Test: DestTooSmall/62 8-byte object <02-20 00-00 FE-D1 5C-56>' - PASSED gtests.sh: #7081: 'Ucs2TestCases/Ucs2Test: DestTooSmall/63 8-byte object <04-20 00-00 02-D2 5C-56>' - PASSED gtests.sh: #7082: 'Ucs2TestCases/Ucs2Test: DestTooSmall/64 8-byte object <08-20 00-00 06-D2 5C-56>' - PASSED gtests.sh: #7083: 'Ucs2TestCases/Ucs2Test: DestTooSmall/65 8-byte object <10-20 00-00 0A-D2 5C-56>' - PASSED gtests.sh: #7084: 'Ucs2TestCases/Ucs2Test: DestTooSmall/66 8-byte object <20-20 00-00 0E-D2 5C-56>' - PASSED gtests.sh: #7085: 'Ucs2TestCases/Ucs2Test: DestTooSmall/67 8-byte object <40-20 00-00 12-D2 5C-56>' - PASSED gtests.sh: #7086: 'Ucs2TestCases/Ucs2Test: DestTooSmall/68 8-byte object <80-20 00-00 16-D2 5C-56>' - PASSED gtests.sh: #7087: 'Ucs2TestCases/Ucs2Test: DestTooSmall/69 8-byte object <00-21 00-00 1A-D2 5C-56>' - PASSED gtests.sh: #7088: 'Ucs2TestCases/Ucs2Test: DestTooSmall/70 8-byte object <00-22 00-00 1E-D2 5C-56>' - PASSED gtests.sh: #7089: 'Ucs2TestCases/Ucs2Test: DestTooSmall/71 8-byte object <00-24 00-00 22-D2 5C-56>' - PASSED gtests.sh: #7090: 'Ucs2TestCases/Ucs2Test: DestTooSmall/72 8-byte object <00-28 00-00 26-D2 5C-56>' - PASSED gtests.sh: #7091: 'Ucs2TestCases/Ucs2Test: DestTooSmall/73 8-byte object <00-30 00-00 2A-D2 5C-56>' - PASSED gtests.sh: #7092: 'Ucs2TestCases/Ucs2Test: DestTooSmall/74 8-byte object <FF-3F 00-00 2E-D2 5C-56>' - PASSED gtests.sh: #7093: 'Ucs2TestCases/Ucs2Test: DestTooSmall/75 8-byte object <00-40 00-00 32-D2 5C-56>' - PASSED gtests.sh: #7094: 'Ucs2TestCases/Ucs2Test: DestTooSmall/76 8-byte object <01-40 00-00 36-D2 5C-56>' - PASSED gtests.sh: #7095: 'Ucs2TestCases/Ucs2Test: DestTooSmall/77 8-byte object <02-40 00-00 3A-D2 5C-56>' - PASSED gtests.sh: #7096: 'Ucs2TestCases/Ucs2Test: DestTooSmall/78 8-byte object <04-40 00-00 3E-D2 5C-56>' - PASSED gtests.sh: #7097: 'Ucs2TestCases/Ucs2Test: DestTooSmall/79 8-byte object <08-40 00-00 42-D2 5C-56>' - PASSED gtests.sh: #7098: 'Ucs2TestCases/Ucs2Test: DestTooSmall/80 8-byte object <10-40 00-00 46-D2 5C-56>' - PASSED gtests.sh: #7099: 'Ucs2TestCases/Ucs2Test: DestTooSmall/81 8-byte object <20-40 00-00 4A-D2 5C-56>' - PASSED gtests.sh: #7100: 'Ucs2TestCases/Ucs2Test: DestTooSmall/82 8-byte object <40-40 00-00 4E-D2 5C-56>' - PASSED gtests.sh: #7101: 'Ucs2TestCases/Ucs2Test: DestTooSmall/83 8-byte object <80-40 00-00 52-D2 5C-56>' - PASSED gtests.sh: #7102: 'Ucs2TestCases/Ucs2Test: DestTooSmall/84 8-byte object <00-41 00-00 56-D2 5C-56>' - PASSED gtests.sh: #7103: 'Ucs2TestCases/Ucs2Test: DestTooSmall/85 8-byte object <00-42 00-00 5A-D2 5C-56>' - PASSED gtests.sh: #7104: 'Ucs2TestCases/Ucs2Test: DestTooSmall/86 8-byte object <00-44 00-00 5E-D2 5C-56>' - PASSED gtests.sh: #7105: 'Ucs2TestCases/Ucs2Test: DestTooSmall/87 8-byte object <00-48 00-00 62-D2 5C-56>' - PASSED gtests.sh: #7106: 'Ucs2TestCases/Ucs2Test: DestTooSmall/88 8-byte object <00-50 00-00 66-D2 5C-56>' - PASSED gtests.sh: #7107: 'Ucs2TestCases/Ucs2Test: DestTooSmall/89 8-byte object <00-60 00-00 6A-D2 5C-56>' - PASSED gtests.sh: #7108: 'Ucs2TestCases/Ucs2Test: DestTooSmall/90 8-byte object <FF-7F 00-00 6E-D2 5C-56>' - PASSED gtests.sh: #7109: 'Ucs2TestCases/Ucs2Test: DestTooSmall/91 8-byte object <00-80 00-00 72-D2 5C-56>' - PASSED gtests.sh: #7110: 'Ucs2TestCases/Ucs2Test: DestTooSmall/92 8-byte object <01-80 00-00 76-D2 5C-56>' - PASSED gtests.sh: #7111: 'Ucs2TestCases/Ucs2Test: DestTooSmall/93 8-byte object <02-80 00-00 7A-D2 5C-56>' - PASSED gtests.sh: #7112: 'Ucs2TestCases/Ucs2Test: DestTooSmall/94 8-byte object <04-80 00-00 7E-D2 5C-56>' - PASSED gtests.sh: #7113: 'Ucs2TestCases/Ucs2Test: DestTooSmall/95 8-byte object <08-80 00-00 82-D2 5C-56>' - PASSED gtests.sh: #7114: 'Ucs2TestCases/Ucs2Test: DestTooSmall/96 8-byte object <10-80 00-00 86-D2 5C-56>' - PASSED gtests.sh: #7115: 'Ucs2TestCases/Ucs2Test: DestTooSmall/97 8-byte object <20-80 00-00 8A-D2 5C-56>' - PASSED gtests.sh: #7116: 'Ucs2TestCases/Ucs2Test: DestTooSmall/98 8-byte object <40-80 00-00 8E-D2 5C-56>' - PASSED gtests.sh: #7117: 'Ucs2TestCases/Ucs2Test: DestTooSmall/99 8-byte object <80-80 00-00 92-D2 5C-56>' - PASSED gtests.sh: #7118: 'Ucs2TestCases/Ucs2Test: DestTooSmall/100 8-byte object <00-81 00-00 96-D2 5C-56>' - PASSED gtests.sh: #7119: 'Ucs2TestCases/Ucs2Test: DestTooSmall/101 8-byte object <00-82 00-00 9A-D2 5C-56>' - PASSED gtests.sh: #7120: 'Ucs2TestCases/Ucs2Test: DestTooSmall/102 8-byte object <00-84 00-00 9E-D2 5C-56>' - PASSED gtests.sh: #7121: 'Ucs2TestCases/Ucs2Test: DestTooSmall/103 8-byte object <00-88 00-00 A2-D2 5C-56>' - PASSED gtests.sh: #7122: 'Ucs2TestCases/Ucs2Test: DestTooSmall/104 8-byte object <00-90 00-00 A6-D2 5C-56>' - PASSED gtests.sh: #7123: 'Ucs2TestCases/Ucs2Test: DestTooSmall/105 8-byte object <00-A0 00-00 AA-D2 5C-56>' - PASSED gtests.sh: #7124: 'Ucs2TestCases/Ucs2Test: DestTooSmall/106 8-byte object <00-C0 00-00 AE-D2 5C-56>' - PASSED gtests.sh: #7125: 'Ucs2TestCases/Ucs2Test: DestTooSmall/107 8-byte object <01-FB 00-00 B2-D2 5C-56>' - PASSED gtests.sh: #7126: 'Ucs2TestCases/Ucs2Test: DestTooSmall/108 8-byte object <FF-FF 00-00 B6-D2 5C-56>' - PASSED gtests.sh: #7127: 'Utf16TestCases/Utf16Test: From16To32/0 8-byte object <00-00 01-00 00-D8 00-DC>' - PASSED gtests.sh: #7128: 'Utf16TestCases/Utf16Test: From16To32/1 8-byte object <01-00 01-00 00-D8 01-DC>' - PASSED gtests.sh: #7129: 'Utf16TestCases/Utf16Test: From16To32/2 8-byte object <02-00 01-00 00-D8 02-DC>' - PASSED gtests.sh: #7130: 'Utf16TestCases/Utf16Test: From16To32/3 8-byte object <03-00 01-00 00-D8 03-DC>' - PASSED gtests.sh: #7131: 'Utf16TestCases/Utf16Test: From16To32/4 8-byte object <04-00 01-00 00-D8 04-DC>' - PASSED gtests.sh: #7132: 'Utf16TestCases/Utf16Test: From16To32/5 8-byte object <07-00 01-00 00-D8 07-DC>' - PASSED gtests.sh: #7133: 'Utf16TestCases/Utf16Test: From16To32/6 8-byte object <08-00 01-00 00-D8 08-DC>' - PASSED gtests.sh: #7134: 'Utf16TestCases/Utf16Test: From16To32/7 8-byte object <0F-00 01-00 00-D8 0F-DC>' - PASSED gtests.sh: #7135: 'Utf16TestCases/Utf16Test: From16To32/8 8-byte object <10-00 01-00 00-D8 10-DC>' - PASSED gtests.sh: #7136: 'Utf16TestCases/Utf16Test: From16To32/9 8-byte object <1F-00 01-00 00-D8 1F-DC>' - PASSED gtests.sh: #7137: 'Utf16TestCases/Utf16Test: From16To32/10 8-byte object <20-00 01-00 00-D8 20-DC>' - PASSED gtests.sh: #7138: 'Utf16TestCases/Utf16Test: From16To32/11 8-byte object <3F-00 01-00 00-D8 3F-DC>' - PASSED gtests.sh: #7139: 'Utf16TestCases/Utf16Test: From16To32/12 8-byte object <40-00 01-00 00-D8 40-DC>' - PASSED gtests.sh: #7140: 'Utf16TestCases/Utf16Test: From16To32/13 8-byte object <7F-00 01-00 00-D8 7F-DC>' - PASSED gtests.sh: #7141: 'Utf16TestCases/Utf16Test: From16To32/14 8-byte object <80-00 01-00 00-D8 80-DC>' - PASSED gtests.sh: #7142: 'Utf16TestCases/Utf16Test: From16To32/15 8-byte object <81-00 01-00 00-D8 81-DC>' - PASSED gtests.sh: #7143: 'Utf16TestCases/Utf16Test: From16To32/16 8-byte object <82-00 01-00 00-D8 82-DC>' - PASSED gtests.sh: #7144: 'Utf16TestCases/Utf16Test: From16To32/17 8-byte object <84-00 01-00 00-D8 84-DC>' - PASSED gtests.sh: #7145: 'Utf16TestCases/Utf16Test: From16To32/18 8-byte object <88-00 01-00 00-D8 88-DC>' - PASSED gtests.sh: #7146: 'Utf16TestCases/Utf16Test: From16To32/19 8-byte object <90-00 01-00 00-D8 90-DC>' - PASSED gtests.sh: #7147: 'Utf16TestCases/Utf16Test: From16To32/20 8-byte object <A0-00 01-00 00-D8 A0-DC>' - PASSED gtests.sh: #7148: 'Utf16TestCases/Utf16Test: From16To32/21 8-byte object <C0-00 01-00 00-D8 C0-DC>' - PASSED gtests.sh: #7149: 'Utf16TestCases/Utf16Test: From16To32/22 8-byte object <FF-00 01-00 00-D8 FF-DC>' - PASSED gtests.sh: #7150: 'Utf16TestCases/Utf16Test: From16To32/23 8-byte object <00-01 01-00 00-D8 00-DD>' - PASSED gtests.sh: #7151: 'Utf16TestCases/Utf16Test: From16To32/24 8-byte object <01-01 01-00 00-D8 01-DD>' - PASSED gtests.sh: #7152: 'Utf16TestCases/Utf16Test: From16To32/25 8-byte object <02-01 01-00 00-D8 02-DD>' - PASSED gtests.sh: #7153: 'Utf16TestCases/Utf16Test: From16To32/26 8-byte object <04-01 01-00 00-D8 04-DD>' - PASSED gtests.sh: #7154: 'Utf16TestCases/Utf16Test: From16To32/27 8-byte object <08-01 01-00 00-D8 08-DD>' - PASSED gtests.sh: #7155: 'Utf16TestCases/Utf16Test: From16To32/28 8-byte object <10-01 01-00 00-D8 10-DD>' - PASSED gtests.sh: #7156: 'Utf16TestCases/Utf16Test: From16To32/29 8-byte object <20-01 01-00 00-D8 20-DD>' - PASSED gtests.sh: #7157: 'Utf16TestCases/Utf16Test: From16To32/30 8-byte object <40-01 01-00 00-D8 40-DD>' - PASSED gtests.sh: #7158: 'Utf16TestCases/Utf16Test: From16To32/31 8-byte object <80-01 01-00 00-D8 80-DD>' - PASSED gtests.sh: #7159: 'Utf16TestCases/Utf16Test: From16To32/32 8-byte object <FF-01 01-00 00-D8 FF-DD>' - PASSED gtests.sh: #7160: 'Utf16TestCases/Utf16Test: From16To32/33 8-byte object <00-02 01-00 00-D8 00-DE>' - PASSED gtests.sh: #7161: 'Utf16TestCases/Utf16Test: From16To32/34 8-byte object <01-02 01-00 00-D8 01-DE>' - PASSED gtests.sh: #7162: 'Utf16TestCases/Utf16Test: From16To32/35 8-byte object <02-02 01-00 00-D8 02-DE>' - PASSED gtests.sh: #7163: 'Utf16TestCases/Utf16Test: From16To32/36 8-byte object <04-02 01-00 00-D8 04-DE>' - PASSED gtests.sh: #7164: 'Utf16TestCases/Utf16Test: From16To32/37 8-byte object <08-02 01-00 00-D8 08-DE>' - PASSED gtests.sh: #7165: 'Utf16TestCases/Utf16Test: From16To32/38 8-byte object <10-02 01-00 00-D8 10-DE>' - PASSED gtests.sh: #7166: 'Utf16TestCases/Utf16Test: From16To32/39 8-byte object <20-02 01-00 00-D8 20-DE>' - PASSED gtests.sh: #7167: 'Utf16TestCases/Utf16Test: From16To32/40 8-byte object <40-02 01-00 00-D8 40-DE>' - PASSED gtests.sh: #7168: 'Utf16TestCases/Utf16Test: From16To32/41 8-byte object <80-02 01-00 00-D8 80-DE>' - PASSED gtests.sh: #7169: 'Utf16TestCases/Utf16Test: From16To32/42 8-byte object <00-03 01-00 00-D8 00-DF>' - PASSED gtests.sh: #7170: 'Utf16TestCases/Utf16Test: From16To32/43 8-byte object <FF-03 01-00 00-D8 FF-DF>' - PASSED gtests.sh: #7171: 'Utf16TestCases/Utf16Test: From16To32/44 8-byte object <00-04 01-00 01-D8 00-DC>' - PASSED gtests.sh: #7172: 'Utf16TestCases/Utf16Test: From16To32/45 8-byte object <01-04 01-00 01-D8 01-DC>' - PASSED gtests.sh: #7173: 'Utf16TestCases/Utf16Test: From16To32/46 8-byte object <02-04 01-00 01-D8 02-DC>' - PASSED gtests.sh: #7174: 'Utf16TestCases/Utf16Test: From16To32/47 8-byte object <04-04 01-00 01-D8 04-DC>' - PASSED gtests.sh: #7175: 'Utf16TestCases/Utf16Test: From16To32/48 8-byte object <08-04 01-00 01-D8 08-DC>' - PASSED gtests.sh: #7176: 'Utf16TestCases/Utf16Test: From16To32/49 8-byte object <10-04 01-00 01-D8 10-DC>' - PASSED gtests.sh: #7177: 'Utf16TestCases/Utf16Test: From16To32/50 8-byte object <20-04 01-00 01-D8 20-DC>' - PASSED gtests.sh: #7178: 'Utf16TestCases/Utf16Test: From16To32/51 8-byte object <40-04 01-00 01-D8 40-DC>' - PASSED gtests.sh: #7179: 'Utf16TestCases/Utf16Test: From16To32/52 8-byte object <80-04 01-00 01-D8 80-DC>' - PASSED gtests.sh: #7180: 'Utf16TestCases/Utf16Test: From16To32/53 8-byte object <00-05 01-00 01-D8 00-DD>' - PASSED gtests.sh: #7181: 'Utf16TestCases/Utf16Test: From16To32/54 8-byte object <00-06 01-00 01-D8 00-DE>' - PASSED gtests.sh: #7182: 'Utf16TestCases/Utf16Test: From16To32/55 8-byte object <FF-07 01-00 01-D8 FF-DF>' - PASSED gtests.sh: #7183: 'Utf16TestCases/Utf16Test: From16To32/56 8-byte object <00-08 01-00 02-D8 00-DC>' - PASSED gtests.sh: #7184: 'Utf16TestCases/Utf16Test: From16To32/57 8-byte object <01-08 01-00 02-D8 01-DC>' - PASSED gtests.sh: #7185: 'Utf16TestCases/Utf16Test: From16To32/58 8-byte object <02-08 01-00 02-D8 02-DC>' - PASSED gtests.sh: #7186: 'Utf16TestCases/Utf16Test: From16To32/59 8-byte object <04-08 01-00 02-D8 04-DC>' - PASSED gtests.sh: #7187: 'Utf16TestCases/Utf16Test: From16To32/60 8-byte object <08-08 01-00 02-D8 08-DC>' - PASSED gtests.sh: #7188: 'Utf16TestCases/Utf16Test: From16To32/61 8-byte object <10-08 01-00 02-D8 10-DC>' - PASSED gtests.sh: #7189: 'Utf16TestCases/Utf16Test: From16To32/62 8-byte object <20-08 01-00 02-D8 20-DC>' - PASSED gtests.sh: #7190: 'Utf16TestCases/Utf16Test: From16To32/63 8-byte object <40-08 01-00 02-D8 40-DC>' - PASSED gtests.sh: #7191: 'Utf16TestCases/Utf16Test: From16To32/64 8-byte object <80-08 01-00 02-D8 80-DC>' - PASSED gtests.sh: #7192: 'Utf16TestCases/Utf16Test: From16To32/65 8-byte object <00-09 01-00 02-D8 00-DD>' - PASSED gtests.sh: #7193: 'Utf16TestCases/Utf16Test: From16To32/66 8-byte object <00-0A 01-00 02-D8 00-DE>' - PASSED gtests.sh: #7194: 'Utf16TestCases/Utf16Test: From16To32/67 8-byte object <00-0C 01-00 03-D8 00-DC>' - PASSED gtests.sh: #7195: 'Utf16TestCases/Utf16Test: From16To32/68 8-byte object <FF-0F 01-00 03-D8 FF-DF>' - PASSED gtests.sh: #7196: 'Utf16TestCases/Utf16Test: From16To32/69 8-byte object <00-10 01-00 04-D8 00-DC>' - PASSED gtests.sh: #7197: 'Utf16TestCases/Utf16Test: From16To32/70 8-byte object <01-10 01-00 04-D8 01-DC>' - PASSED gtests.sh: #7198: 'Utf16TestCases/Utf16Test: From16To32/71 8-byte object <02-10 01-00 04-D8 02-DC>' - PASSED gtests.sh: #7199: 'Utf16TestCases/Utf16Test: From16To32/72 8-byte object <04-10 01-00 04-D8 04-DC>' - PASSED gtests.sh: #7200: 'Utf16TestCases/Utf16Test: From16To32/73 8-byte object <08-10 01-00 04-D8 08-DC>' - PASSED gtests.sh: #7201: 'Utf16TestCases/Utf16Test: From16To32/74 8-byte object <10-10 01-00 04-D8 10-DC>' - PASSED gtests.sh: #7202: 'Utf16TestCases/Utf16Test: From16To32/75 8-byte object <20-10 01-00 04-D8 20-DC>' - PASSED gtests.sh: #7203: 'Utf16TestCases/Utf16Test: From16To32/76 8-byte object <40-10 01-00 04-D8 40-DC>' - PASSED gtests.sh: #7204: 'Utf16TestCases/Utf16Test: From16To32/77 8-byte object <80-10 01-00 04-D8 80-DC>' - PASSED gtests.sh: #7205: 'Utf16TestCases/Utf16Test: From16To32/78 8-byte object <00-11 01-00 04-D8 00-DD>' - PASSED gtests.sh: #7206: 'Utf16TestCases/Utf16Test: From16To32/79 8-byte object <00-12 01-00 04-D8 00-DE>' - PASSED gtests.sh: #7207: 'Utf16TestCases/Utf16Test: From16To32/80 8-byte object <00-14 01-00 05-D8 00-DC>' - PASSED gtests.sh: #7208: 'Utf16TestCases/Utf16Test: From16To32/81 8-byte object <00-18 01-00 06-D8 00-DC>' - PASSED gtests.sh: #7209: 'Utf16TestCases/Utf16Test: From16To32/82 8-byte object <FF-1F 01-00 07-D8 FF-DF>' - PASSED gtests.sh: #7210: 'Utf16TestCases/Utf16Test: From16To32/83 8-byte object <00-20 01-00 08-D8 00-DC>' - PASSED gtests.sh: #7211: 'Utf16TestCases/Utf16Test: From16To32/84 8-byte object <01-20 01-00 08-D8 01-DC>' - PASSED gtests.sh: #7212: 'Utf16TestCases/Utf16Test: From16To32/85 8-byte object <02-20 01-00 08-D8 02-DC>' - PASSED gtests.sh: #7213: 'Utf16TestCases/Utf16Test: From16To32/86 8-byte object <04-20 01-00 08-D8 04-DC>' - PASSED gtests.sh: #7214: 'Utf16TestCases/Utf16Test: From16To32/87 8-byte object <08-20 01-00 08-D8 08-DC>' - PASSED gtests.sh: #7215: 'Utf16TestCases/Utf16Test: From16To32/88 8-byte object <10-20 01-00 08-D8 10-DC>' - PASSED gtests.sh: #7216: 'Utf16TestCases/Utf16Test: From16To32/89 8-byte object <20-20 01-00 08-D8 20-DC>' - PASSED gtests.sh: #7217: 'Utf16TestCases/Utf16Test: From16To32/90 8-byte object <40-20 01-00 08-D8 40-DC>' - PASSED gtests.sh: #7218: 'Utf16TestCases/Utf16Test: From16To32/91 8-byte object <80-20 01-00 08-D8 80-DC>' - PASSED gtests.sh: #7219: 'Utf16TestCases/Utf16Test: From16To32/92 8-byte object <00-21 01-00 08-D8 00-DD>' - PASSED gtests.sh: #7220: 'Utf16TestCases/Utf16Test: From16To32/93 8-byte object <00-22 01-00 08-D8 00-DE>' - PASSED gtests.sh: #7221: 'Utf16TestCases/Utf16Test: From16To32/94 8-byte object <00-24 01-00 09-D8 00-DC>' - PASSED gtests.sh: #7222: 'Utf16TestCases/Utf16Test: From16To32/95 8-byte object <00-28 01-00 0A-D8 00-DC>' - PASSED gtests.sh: #7223: 'Utf16TestCases/Utf16Test: From16To32/96 8-byte object <00-30 01-00 0C-D8 00-DC>' - PASSED gtests.sh: #7224: 'Utf16TestCases/Utf16Test: From16To32/97 8-byte object <FF-3F 01-00 0F-D8 FF-DF>' - PASSED gtests.sh: #7225: 'Utf16TestCases/Utf16Test: From16To32/98 8-byte object <00-40 01-00 10-D8 00-DC>' - PASSED gtests.sh: #7226: 'Utf16TestCases/Utf16Test: From16To32/99 8-byte object <01-40 01-00 10-D8 01-DC>' - PASSED gtests.sh: #7227: 'Utf16TestCases/Utf16Test: From16To32/100 8-byte object <02-40 01-00 10-D8 02-DC>' - PASSED gtests.sh: #7228: 'Utf16TestCases/Utf16Test: From16To32/101 8-byte object <04-40 01-00 10-D8 04-DC>' - PASSED gtests.sh: #7229: 'Utf16TestCases/Utf16Test: From16To32/102 8-byte object <08-40 01-00 10-D8 08-DC>' - PASSED gtests.sh: #7230: 'Utf16TestCases/Utf16Test: From16To32/103 8-byte object <10-40 01-00 10-D8 10-DC>' - PASSED gtests.sh: #7231: 'Utf16TestCases/Utf16Test: From16To32/104 8-byte object <20-40 01-00 10-D8 20-DC>' - PASSED gtests.sh: #7232: 'Utf16TestCases/Utf16Test: From16To32/105 8-byte object <40-40 01-00 10-D8 40-DC>' - PASSED gtests.sh: #7233: 'Utf16TestCases/Utf16Test: From16To32/106 8-byte object <80-40 01-00 10-D8 80-DC>' - PASSED gtests.sh: #7234: 'Utf16TestCases/Utf16Test: From16To32/107 8-byte object <00-41 01-00 10-D8 00-DD>' - PASSED gtests.sh: #7235: 'Utf16TestCases/Utf16Test: From16To32/108 8-byte object <00-42 01-00 10-D8 00-DE>' - PASSED gtests.sh: #7236: 'Utf16TestCases/Utf16Test: From16To32/109 8-byte object <00-44 01-00 11-D8 00-DC>' - PASSED gtests.sh: #7237: 'Utf16TestCases/Utf16Test: From16To32/110 8-byte object <00-48 01-00 12-D8 00-DC>' - PASSED gtests.sh: #7238: 'Utf16TestCases/Utf16Test: From16To32/111 8-byte object <00-50 01-00 14-D8 00-DC>' - PASSED gtests.sh: #7239: 'Utf16TestCases/Utf16Test: From16To32/112 8-byte object <00-60 01-00 18-D8 00-DC>' - PASSED gtests.sh: #7240: 'Utf16TestCases/Utf16Test: From16To32/113 8-byte object <FF-7F 01-00 1F-D8 FF-DF>' - PASSED gtests.sh: #7241: 'Utf16TestCases/Utf16Test: From16To32/114 8-byte object <00-80 01-00 20-D8 00-DC>' - PASSED gtests.sh: #7242: 'Utf16TestCases/Utf16Test: From16To32/115 8-byte object <01-80 01-00 20-D8 01-DC>' - PASSED gtests.sh: #7243: 'Utf16TestCases/Utf16Test: From16To32/116 8-byte object <02-80 01-00 20-D8 02-DC>' - PASSED gtests.sh: #7244: 'Utf16TestCases/Utf16Test: From16To32/117 8-byte object <04-80 01-00 20-D8 04-DC>' - PASSED gtests.sh: #7245: 'Utf16TestCases/Utf16Test: From16To32/118 8-byte object <08-80 01-00 20-D8 08-DC>' - PASSED gtests.sh: #7246: 'Utf16TestCases/Utf16Test: From16To32/119 8-byte object <10-80 01-00 20-D8 10-DC>' - PASSED gtests.sh: #7247: 'Utf16TestCases/Utf16Test: From16To32/120 8-byte object <20-80 01-00 20-D8 20-DC>' - PASSED gtests.sh: #7248: 'Utf16TestCases/Utf16Test: From16To32/121 8-byte object <40-80 01-00 20-D8 40-DC>' - PASSED gtests.sh: #7249: 'Utf16TestCases/Utf16Test: From16To32/122 8-byte object <80-80 01-00 20-D8 80-DC>' - PASSED gtests.sh: #7250: 'Utf16TestCases/Utf16Test: From16To32/123 8-byte object <00-81 01-00 20-D8 00-DD>' - PASSED gtests.sh: #7251: 'Utf16TestCases/Utf16Test: From16To32/124 8-byte object <00-82 01-00 20-D8 00-DE>' - PASSED gtests.sh: #7252: 'Utf16TestCases/Utf16Test: From16To32/125 8-byte object <00-84 01-00 21-D8 00-DC>' - PASSED gtests.sh: #7253: 'Utf16TestCases/Utf16Test: From16To32/126 8-byte object <00-88 01-00 22-D8 00-DC>' - PASSED gtests.sh: #7254: 'Utf16TestCases/Utf16Test: From16To32/127 8-byte object <00-90 01-00 24-D8 00-DC>' - PASSED gtests.sh: #7255: 'Utf16TestCases/Utf16Test: From16To32/128 8-byte object <00-A0 01-00 28-D8 00-DC>' - PASSED gtests.sh: #7256: 'Utf16TestCases/Utf16Test: From16To32/129 8-byte object <00-C0 01-00 30-D8 00-DC>' - PASSED gtests.sh: #7257: 'Utf16TestCases/Utf16Test: From16To32/130 8-byte object <FF-FF 01-00 3F-D8 FF-DF>' - PASSED gtests.sh: #7258: 'Utf16TestCases/Utf16Test: From16To32/131 8-byte object <00-00 02-00 40-D8 00-DC>' - PASSED gtests.sh: #7259: 'Utf16TestCases/Utf16Test: From16To32/132 8-byte object <01-00 02-00 40-D8 01-DC>' - PASSED gtests.sh: #7260: 'Utf16TestCases/Utf16Test: From16To32/133 8-byte object <02-00 02-00 40-D8 02-DC>' - PASSED gtests.sh: #7261: 'Utf16TestCases/Utf16Test: From16To32/134 8-byte object <04-00 02-00 40-D8 04-DC>' - PASSED gtests.sh: #7262: 'Utf16TestCases/Utf16Test: From16To32/135 8-byte object <08-00 02-00 40-D8 08-DC>' - PASSED gtests.sh: #7263: 'Utf16TestCases/Utf16Test: From16To32/136 8-byte object <10-00 02-00 40-D8 10-DC>' - PASSED gtests.sh: #7264: 'Utf16TestCases/Utf16Test: From16To32/137 8-byte object <20-00 02-00 40-D8 20-DC>' - PASSED gtests.sh: #7265: 'Utf16TestCases/Utf16Test: From16To32/138 8-byte object <40-00 02-00 40-D8 40-DC>' - PASSED gtests.sh: #7266: 'Utf16TestCases/Utf16Test: From16To32/139 8-byte object <80-00 02-00 40-D8 80-DC>' - PASSED gtests.sh: #7267: 'Utf16TestCases/Utf16Test: From16To32/140 8-byte object <00-01 02-00 40-D8 00-DD>' - PASSED gtests.sh: #7268: 'Utf16TestCases/Utf16Test: From16To32/141 8-byte object <00-02 02-00 40-D8 00-DE>' - PASSED gtests.sh: #7269: 'Utf16TestCases/Utf16Test: From16To32/142 8-byte object <00-04 02-00 41-D8 00-DC>' - PASSED gtests.sh: #7270: 'Utf16TestCases/Utf16Test: From16To32/143 8-byte object <00-08 02-00 42-D8 00-DC>' - PASSED gtests.sh: #7271: 'Utf16TestCases/Utf16Test: From16To32/144 8-byte object <00-10 02-00 44-D8 00-DC>' - PASSED gtests.sh: #7272: 'Utf16TestCases/Utf16Test: From16To32/145 8-byte object <00-20 02-00 48-D8 00-DC>' - PASSED gtests.sh: #7273: 'Utf16TestCases/Utf16Test: From16To32/146 8-byte object <00-40 02-00 50-D8 00-DC>' - PASSED gtests.sh: #7274: 'Utf16TestCases/Utf16Test: From16To32/147 8-byte object <00-80 02-00 60-D8 00-DC>' - PASSED gtests.sh: #7275: 'Utf16TestCases/Utf16Test: From16To32/148 8-byte object <FF-FF 02-00 7F-D8 FF-DF>' - PASSED gtests.sh: #7276: 'Utf16TestCases/Utf16Test: From16To32/149 8-byte object <00-00 03-00 80-D8 00-DC>' - PASSED gtests.sh: #7277: 'Utf16TestCases/Utf16Test: From16To32/150 8-byte object <01-00 03-00 80-D8 01-DC>' - PASSED gtests.sh: #7278: 'Utf16TestCases/Utf16Test: From16To32/151 8-byte object <02-00 03-00 80-D8 02-DC>' - PASSED gtests.sh: #7279: 'Utf16TestCases/Utf16Test: From16To32/152 8-byte object <04-00 03-00 80-D8 04-DC>' - PASSED gtests.sh: #7280: 'Utf16TestCases/Utf16Test: From16To32/153 8-byte object <08-00 03-00 80-D8 08-DC>' - PASSED gtests.sh: #7281: 'Utf16TestCases/Utf16Test: From16To32/154 8-byte object <10-00 03-00 80-D8 10-DC>' - PASSED gtests.sh: #7282: 'Utf16TestCases/Utf16Test: From16To32/155 8-byte object <20-00 03-00 80-D8 20-DC>' - PASSED gtests.sh: #7283: 'Utf16TestCases/Utf16Test: From16To32/156 8-byte object <40-00 03-00 80-D8 40-DC>' - PASSED gtests.sh: #7284: 'Utf16TestCases/Utf16Test: From16To32/157 8-byte object <80-00 03-00 80-D8 80-DC>' - PASSED gtests.sh: #7285: 'Utf16TestCases/Utf16Test: From16To32/158 8-byte object <00-01 03-00 80-D8 00-DD>' - PASSED gtests.sh: #7286: 'Utf16TestCases/Utf16Test: From16To32/159 8-byte object <00-02 03-00 80-D8 00-DE>' - PASSED gtests.sh: #7287: 'Utf16TestCases/Utf16Test: From16To32/160 8-byte object <00-04 03-00 81-D8 00-DC>' - PASSED gtests.sh: #7288: 'Utf16TestCases/Utf16Test: From16To32/161 8-byte object <00-08 03-00 82-D8 00-DC>' - PASSED gtests.sh: #7289: 'Utf16TestCases/Utf16Test: From16To32/162 8-byte object <00-10 03-00 84-D8 00-DC>' - PASSED gtests.sh: #7290: 'Utf16TestCases/Utf16Test: From16To32/163 8-byte object <00-20 03-00 88-D8 00-DC>' - PASSED gtests.sh: #7291: 'Utf16TestCases/Utf16Test: From16To32/164 8-byte object <00-40 03-00 90-D8 00-DC>' - PASSED gtests.sh: #7292: 'Utf16TestCases/Utf16Test: From16To32/165 8-byte object <00-80 03-00 A0-D8 00-DC>' - PASSED gtests.sh: #7293: 'Utf16TestCases/Utf16Test: From16To32/166 8-byte object <FF-FF 03-00 BF-D8 FF-DF>' - PASSED gtests.sh: #7294: 'Utf16TestCases/Utf16Test: From16To32/167 8-byte object <00-00 04-00 C0-D8 00-DC>' - PASSED gtests.sh: #7295: 'Utf16TestCases/Utf16Test: From16To32/168 8-byte object <01-00 04-00 C0-D8 01-DC>' - PASSED gtests.sh: #7296: 'Utf16TestCases/Utf16Test: From16To32/169 8-byte object <02-00 04-00 C0-D8 02-DC>' - PASSED gtests.sh: #7297: 'Utf16TestCases/Utf16Test: From16To32/170 8-byte object <04-00 04-00 C0-D8 04-DC>' - PASSED gtests.sh: #7298: 'Utf16TestCases/Utf16Test: From16To32/171 8-byte object <08-00 04-00 C0-D8 08-DC>' - PASSED gtests.sh: #7299: 'Utf16TestCases/Utf16Test: From16To32/172 8-byte object <10-00 04-00 C0-D8 10-DC>' - PASSED gtests.sh: #7300: 'Utf16TestCases/Utf16Test: From16To32/173 8-byte object <20-00 04-00 C0-D8 20-DC>' - PASSED gtests.sh: #7301: 'Utf16TestCases/Utf16Test: From16To32/174 8-byte object <40-00 04-00 C0-D8 40-DC>' - PASSED gtests.sh: #7302: 'Utf16TestCases/Utf16Test: From16To32/175 8-byte object <80-00 04-00 C0-D8 80-DC>' - PASSED gtests.sh: #7303: 'Utf16TestCases/Utf16Test: From16To32/176 8-byte object <00-01 04-00 C0-D8 00-DD>' - PASSED gtests.sh: #7304: 'Utf16TestCases/Utf16Test: From16To32/177 8-byte object <00-02 04-00 C0-D8 00-DE>' - PASSED gtests.sh: #7305: 'Utf16TestCases/Utf16Test: From16To32/178 8-byte object <00-04 04-00 C1-D8 00-DC>' - PASSED gtests.sh: #7306: 'Utf16TestCases/Utf16Test: From16To32/179 8-byte object <00-08 04-00 C2-D8 00-DC>' - PASSED gtests.sh: #7307: 'Utf16TestCases/Utf16Test: From16To32/180 8-byte object <00-10 04-00 C4-D8 00-DC>' - PASSED gtests.sh: #7308: 'Utf16TestCases/Utf16Test: From16To32/181 8-byte object <00-20 04-00 C8-D8 00-DC>' - PASSED gtests.sh: #7309: 'Utf16TestCases/Utf16Test: From16To32/182 8-byte object <00-40 04-00 D0-D8 00-DC>' - PASSED gtests.sh: #7310: 'Utf16TestCases/Utf16Test: From16To32/183 8-byte object <00-80 04-00 E0-D8 00-DC>' - PASSED gtests.sh: #7311: 'Utf16TestCases/Utf16Test: From16To32/184 8-byte object <FF-FF 04-00 FF-D8 FF-DF>' - PASSED gtests.sh: #7312: 'Utf16TestCases/Utf16Test: From16To32/185 8-byte object <00-00 05-00 00-D9 00-DC>' - PASSED gtests.sh: #7313: 'Utf16TestCases/Utf16Test: From16To32/186 8-byte object <01-00 05-00 00-D9 01-DC>' - PASSED gtests.sh: #7314: 'Utf16TestCases/Utf16Test: From16To32/187 8-byte object <02-00 05-00 00-D9 02-DC>' - PASSED gtests.sh: #7315: 'Utf16TestCases/Utf16Test: From16To32/188 8-byte object <04-00 05-00 00-D9 04-DC>' - PASSED gtests.sh: #7316: 'Utf16TestCases/Utf16Test: From16To32/189 8-byte object <08-00 05-00 00-D9 08-DC>' - PASSED gtests.sh: #7317: 'Utf16TestCases/Utf16Test: From16To32/190 8-byte object <10-00 05-00 00-D9 10-DC>' - PASSED gtests.sh: #7318: 'Utf16TestCases/Utf16Test: From16To32/191 8-byte object <20-00 05-00 00-D9 20-DC>' - PASSED gtests.sh: #7319: 'Utf16TestCases/Utf16Test: From16To32/192 8-byte object <40-00 05-00 00-D9 40-DC>' - PASSED gtests.sh: #7320: 'Utf16TestCases/Utf16Test: From16To32/193 8-byte object <80-00 05-00 00-D9 80-DC>' - PASSED gtests.sh: #7321: 'Utf16TestCases/Utf16Test: From16To32/194 8-byte object <00-01 05-00 00-D9 00-DD>' - PASSED gtests.sh: #7322: 'Utf16TestCases/Utf16Test: From16To32/195 8-byte object <00-02 05-00 00-D9 00-DE>' - PASSED gtests.sh: #7323: 'Utf16TestCases/Utf16Test: From16To32/196 8-byte object <00-04 05-00 01-D9 00-DC>' - PASSED gtests.sh: #7324: 'Utf16TestCases/Utf16Test: From16To32/197 8-byte object <00-08 05-00 02-D9 00-DC>' - PASSED gtests.sh: #7325: 'Utf16TestCases/Utf16Test: From16To32/198 8-byte object <00-10 05-00 04-D9 00-DC>' - PASSED gtests.sh: #7326: 'Utf16TestCases/Utf16Test: From16To32/199 8-byte object <00-20 05-00 08-D9 00-DC>' - PASSED gtests.sh: #7327: 'Utf16TestCases/Utf16Test: From16To32/200 8-byte object <00-40 05-00 10-D9 00-DC>' - PASSED gtests.sh: #7328: 'Utf16TestCases/Utf16Test: From16To32/201 8-byte object <00-80 05-00 20-D9 00-DC>' - PASSED gtests.sh: #7329: 'Utf16TestCases/Utf16Test: From16To32/202 8-byte object <00-00 06-00 40-D9 00-DC>' - PASSED gtests.sh: #7330: 'Utf16TestCases/Utf16Test: From16To32/203 8-byte object <00-00 07-00 80-D9 00-DC>' - PASSED gtests.sh: #7331: 'Utf16TestCases/Utf16Test: From16To32/204 8-byte object <FF-FF 07-00 BF-D9 FF-DF>' - PASSED gtests.sh: #7332: 'Utf16TestCases/Utf16Test: From16To32/205 8-byte object <00-00 08-00 C0-D9 00-DC>' - PASSED gtests.sh: #7333: 'Utf16TestCases/Utf16Test: From16To32/206 8-byte object <01-00 08-00 C0-D9 01-DC>' - PASSED gtests.sh: #7334: 'Utf16TestCases/Utf16Test: From16To32/207 8-byte object <02-00 08-00 C0-D9 02-DC>' - PASSED gtests.sh: #7335: 'Utf16TestCases/Utf16Test: From16To32/208 8-byte object <04-00 08-00 C0-D9 04-DC>' - PASSED gtests.sh: #7336: 'Utf16TestCases/Utf16Test: From16To32/209 8-byte object <08-00 08-00 C0-D9 08-DC>' - PASSED gtests.sh: #7337: 'Utf16TestCases/Utf16Test: From16To32/210 8-byte object <10-00 08-00 C0-D9 10-DC>' - PASSED gtests.sh: #7338: 'Utf16TestCases/Utf16Test: From16To32/211 8-byte object <20-00 08-00 C0-D9 20-DC>' - PASSED gtests.sh: #7339: 'Utf16TestCases/Utf16Test: From16To32/212 8-byte object <40-00 08-00 C0-D9 40-DC>' - PASSED gtests.sh: #7340: 'Utf16TestCases/Utf16Test: From16To32/213 8-byte object <80-00 08-00 C0-D9 80-DC>' - PASSED gtests.sh: #7341: 'Utf16TestCases/Utf16Test: From16To32/214 8-byte object <00-01 08-00 C0-D9 00-DD>' - PASSED gtests.sh: #7342: 'Utf16TestCases/Utf16Test: From16To32/215 8-byte object <00-02 08-00 C0-D9 00-DE>' - PASSED gtests.sh: #7343: 'Utf16TestCases/Utf16Test: From16To32/216 8-byte object <00-04 08-00 C1-D9 00-DC>' - PASSED gtests.sh: #7344: 'Utf16TestCases/Utf16Test: From16To32/217 8-byte object <00-08 08-00 C2-D9 00-DC>' - PASSED gtests.sh: #7345: 'Utf16TestCases/Utf16Test: From16To32/218 8-byte object <00-10 08-00 C4-D9 00-DC>' - PASSED gtests.sh: #7346: 'Utf16TestCases/Utf16Test: From16To32/219 8-byte object <00-20 08-00 C8-D9 00-DC>' - PASSED gtests.sh: #7347: 'Utf16TestCases/Utf16Test: From16To32/220 8-byte object <00-40 08-00 D0-D9 00-DC>' - PASSED gtests.sh: #7348: 'Utf16TestCases/Utf16Test: From16To32/221 8-byte object <00-80 08-00 E0-D9 00-DC>' - PASSED gtests.sh: #7349: 'Utf16TestCases/Utf16Test: From16To32/222 8-byte object <FF-FF 08-00 FF-D9 FF-DF>' - PASSED gtests.sh: #7350: 'Utf16TestCases/Utf16Test: From16To32/223 8-byte object <00-00 09-00 00-DA 00-DC>' - PASSED gtests.sh: #7351: 'Utf16TestCases/Utf16Test: From16To32/224 8-byte object <01-00 09-00 00-DA 01-DC>' - PASSED gtests.sh: #7352: 'Utf16TestCases/Utf16Test: From16To32/225 8-byte object <02-00 09-00 00-DA 02-DC>' - PASSED gtests.sh: #7353: 'Utf16TestCases/Utf16Test: From16To32/226 8-byte object <04-00 09-00 00-DA 04-DC>' - PASSED gtests.sh: #7354: 'Utf16TestCases/Utf16Test: From16To32/227 8-byte object <08-00 09-00 00-DA 08-DC>' - PASSED gtests.sh: #7355: 'Utf16TestCases/Utf16Test: From16To32/228 8-byte object <10-00 09-00 00-DA 10-DC>' - PASSED gtests.sh: #7356: 'Utf16TestCases/Utf16Test: From16To32/229 8-byte object <20-00 09-00 00-DA 20-DC>' - PASSED gtests.sh: #7357: 'Utf16TestCases/Utf16Test: From16To32/230 8-byte object <40-00 09-00 00-DA 40-DC>' - PASSED gtests.sh: #7358: 'Utf16TestCases/Utf16Test: From16To32/231 8-byte object <80-00 09-00 00-DA 80-DC>' - PASSED gtests.sh: #7359: 'Utf16TestCases/Utf16Test: From16To32/232 8-byte object <00-01 09-00 00-DA 00-DD>' - PASSED gtests.sh: #7360: 'Utf16TestCases/Utf16Test: From16To32/233 8-byte object <00-02 09-00 00-DA 00-DE>' - PASSED gtests.sh: #7361: 'Utf16TestCases/Utf16Test: From16To32/234 8-byte object <00-04 09-00 01-DA 00-DC>' - PASSED gtests.sh: #7362: 'Utf16TestCases/Utf16Test: From16To32/235 8-byte object <00-08 09-00 02-DA 00-DC>' - PASSED gtests.sh: #7363: 'Utf16TestCases/Utf16Test: From16To32/236 8-byte object <00-10 09-00 04-DA 00-DC>' - PASSED gtests.sh: #7364: 'Utf16TestCases/Utf16Test: From16To32/237 8-byte object <00-20 09-00 08-DA 00-DC>' - PASSED gtests.sh: #7365: 'Utf16TestCases/Utf16Test: From16To32/238 8-byte object <00-40 09-00 10-DA 00-DC>' - PASSED gtests.sh: #7366: 'Utf16TestCases/Utf16Test: From16To32/239 8-byte object <00-80 09-00 20-DA 00-DC>' - PASSED gtests.sh: #7367: 'Utf16TestCases/Utf16Test: From16To32/240 8-byte object <00-00 0A-00 40-DA 00-DC>' - PASSED gtests.sh: #7368: 'Utf16TestCases/Utf16Test: From16To32/241 8-byte object <00-00 0B-00 80-DA 00-DC>' - PASSED gtests.sh: #7369: 'Utf16TestCases/Utf16Test: From16To32/242 8-byte object <00-00 0C-00 C0-DA 00-DC>' - PASSED gtests.sh: #7370: 'Utf16TestCases/Utf16Test: From16To32/243 8-byte object <00-00 0D-00 00-DB 00-DC>' - PASSED gtests.sh: #7371: 'Utf16TestCases/Utf16Test: From16To32/244 8-byte object <FF-FF 0F-00 BF-DB FF-DF>' - PASSED gtests.sh: #7372: 'Utf16TestCases/Utf16Test: From16To32/245 8-byte object <FF-FF 10-00 FF-DB FF-DF>' - PASSED gtests.sh: #7373: 'Utf16TestCases/Utf16Test: From32To16/0 8-byte object <00-00 01-00 00-D8 00-DC>' - PASSED gtests.sh: #7374: 'Utf16TestCases/Utf16Test: From32To16/1 8-byte object <01-00 01-00 00-D8 01-DC>' - PASSED gtests.sh: #7375: 'Utf16TestCases/Utf16Test: From32To16/2 8-byte object <02-00 01-00 00-D8 02-DC>' - PASSED gtests.sh: #7376: 'Utf16TestCases/Utf16Test: From32To16/3 8-byte object <03-00 01-00 00-D8 03-DC>' - PASSED gtests.sh: #7377: 'Utf16TestCases/Utf16Test: From32To16/4 8-byte object <04-00 01-00 00-D8 04-DC>' - PASSED gtests.sh: #7378: 'Utf16TestCases/Utf16Test: From32To16/5 8-byte object <07-00 01-00 00-D8 07-DC>' - PASSED gtests.sh: #7379: 'Utf16TestCases/Utf16Test: From32To16/6 8-byte object <08-00 01-00 00-D8 08-DC>' - PASSED gtests.sh: #7380: 'Utf16TestCases/Utf16Test: From32To16/7 8-byte object <0F-00 01-00 00-D8 0F-DC>' - PASSED gtests.sh: #7381: 'Utf16TestCases/Utf16Test: From32To16/8 8-byte object <10-00 01-00 00-D8 10-DC>' - PASSED gtests.sh: #7382: 'Utf16TestCases/Utf16Test: From32To16/9 8-byte object <1F-00 01-00 00-D8 1F-DC>' - PASSED gtests.sh: #7383: 'Utf16TestCases/Utf16Test: From32To16/10 8-byte object <20-00 01-00 00-D8 20-DC>' - PASSED gtests.sh: #7384: 'Utf16TestCases/Utf16Test: From32To16/11 8-byte object <3F-00 01-00 00-D8 3F-DC>' - PASSED gtests.sh: #7385: 'Utf16TestCases/Utf16Test: From32To16/12 8-byte object <40-00 01-00 00-D8 40-DC>' - PASSED gtests.sh: #7386: 'Utf16TestCases/Utf16Test: From32To16/13 8-byte object <7F-00 01-00 00-D8 7F-DC>' - PASSED gtests.sh: #7387: 'Utf16TestCases/Utf16Test: From32To16/14 8-byte object <80-00 01-00 00-D8 80-DC>' - PASSED gtests.sh: #7388: 'Utf16TestCases/Utf16Test: From32To16/15 8-byte object <81-00 01-00 00-D8 81-DC>' - PASSED gtests.sh: #7389: 'Utf16TestCases/Utf16Test: From32To16/16 8-byte object <82-00 01-00 00-D8 82-DC>' - PASSED gtests.sh: #7390: 'Utf16TestCases/Utf16Test: From32To16/17 8-byte object <84-00 01-00 00-D8 84-DC>' - PASSED gtests.sh: #7391: 'Utf16TestCases/Utf16Test: From32To16/18 8-byte object <88-00 01-00 00-D8 88-DC>' - PASSED gtests.sh: #7392: 'Utf16TestCases/Utf16Test: From32To16/19 8-byte object <90-00 01-00 00-D8 90-DC>' - PASSED gtests.sh: #7393: 'Utf16TestCases/Utf16Test: From32To16/20 8-byte object <A0-00 01-00 00-D8 A0-DC>' - PASSED gtests.sh: #7394: 'Utf16TestCases/Utf16Test: From32To16/21 8-byte object <C0-00 01-00 00-D8 C0-DC>' - PASSED gtests.sh: #7395: 'Utf16TestCases/Utf16Test: From32To16/22 8-byte object <FF-00 01-00 00-D8 FF-DC>' - PASSED gtests.sh: #7396: 'Utf16TestCases/Utf16Test: From32To16/23 8-byte object <00-01 01-00 00-D8 00-DD>' - PASSED gtests.sh: #7397: 'Utf16TestCases/Utf16Test: From32To16/24 8-byte object <01-01 01-00 00-D8 01-DD>' - PASSED gtests.sh: #7398: 'Utf16TestCases/Utf16Test: From32To16/25 8-byte object <02-01 01-00 00-D8 02-DD>' - PASSED gtests.sh: #7399: 'Utf16TestCases/Utf16Test: From32To16/26 8-byte object <04-01 01-00 00-D8 04-DD>' - PASSED gtests.sh: #7400: 'Utf16TestCases/Utf16Test: From32To16/27 8-byte object <08-01 01-00 00-D8 08-DD>' - PASSED gtests.sh: #7401: 'Utf16TestCases/Utf16Test: From32To16/28 8-byte object <10-01 01-00 00-D8 10-DD>' - PASSED gtests.sh: #7402: 'Utf16TestCases/Utf16Test: From32To16/29 8-byte object <20-01 01-00 00-D8 20-DD>' - PASSED gtests.sh: #7403: 'Utf16TestCases/Utf16Test: From32To16/30 8-byte object <40-01 01-00 00-D8 40-DD>' - PASSED gtests.sh: #7404: 'Utf16TestCases/Utf16Test: From32To16/31 8-byte object <80-01 01-00 00-D8 80-DD>' - PASSED gtests.sh: #7405: 'Utf16TestCases/Utf16Test: From32To16/32 8-byte object <FF-01 01-00 00-D8 FF-DD>' - PASSED gtests.sh: #7406: 'Utf16TestCases/Utf16Test: From32To16/33 8-byte object <00-02 01-00 00-D8 00-DE>' - PASSED gtests.sh: #7407: 'Utf16TestCases/Utf16Test: From32To16/34 8-byte object <01-02 01-00 00-D8 01-DE>' - PASSED gtests.sh: #7408: 'Utf16TestCases/Utf16Test: From32To16/35 8-byte object <02-02 01-00 00-D8 02-DE>' - PASSED gtests.sh: #7409: 'Utf16TestCases/Utf16Test: From32To16/36 8-byte object <04-02 01-00 00-D8 04-DE>' - PASSED gtests.sh: #7410: 'Utf16TestCases/Utf16Test: From32To16/37 8-byte object <08-02 01-00 00-D8 08-DE>' - PASSED gtests.sh: #7411: 'Utf16TestCases/Utf16Test: From32To16/38 8-byte object <10-02 01-00 00-D8 10-DE>' - PASSED gtests.sh: #7412: 'Utf16TestCases/Utf16Test: From32To16/39 8-byte object <20-02 01-00 00-D8 20-DE>' - PASSED gtests.sh: #7413: 'Utf16TestCases/Utf16Test: From32To16/40 8-byte object <40-02 01-00 00-D8 40-DE>' - PASSED gtests.sh: #7414: 'Utf16TestCases/Utf16Test: From32To16/41 8-byte object <80-02 01-00 00-D8 80-DE>' - PASSED gtests.sh: #7415: 'Utf16TestCases/Utf16Test: From32To16/42 8-byte object <00-03 01-00 00-D8 00-DF>' - PASSED gtests.sh: #7416: 'Utf16TestCases/Utf16Test: From32To16/43 8-byte object <FF-03 01-00 00-D8 FF-DF>' - PASSED gtests.sh: #7417: 'Utf16TestCases/Utf16Test: From32To16/44 8-byte object <00-04 01-00 01-D8 00-DC>' - PASSED gtests.sh: #7418: 'Utf16TestCases/Utf16Test: From32To16/45 8-byte object <01-04 01-00 01-D8 01-DC>' - PASSED gtests.sh: #7419: 'Utf16TestCases/Utf16Test: From32To16/46 8-byte object <02-04 01-00 01-D8 02-DC>' - PASSED gtests.sh: #7420: 'Utf16TestCases/Utf16Test: From32To16/47 8-byte object <04-04 01-00 01-D8 04-DC>' - PASSED gtests.sh: #7421: 'Utf16TestCases/Utf16Test: From32To16/48 8-byte object <08-04 01-00 01-D8 08-DC>' - PASSED gtests.sh: #7422: 'Utf16TestCases/Utf16Test: From32To16/49 8-byte object <10-04 01-00 01-D8 10-DC>' - PASSED gtests.sh: #7423: 'Utf16TestCases/Utf16Test: From32To16/50 8-byte object <20-04 01-00 01-D8 20-DC>' - PASSED gtests.sh: #7424: 'Utf16TestCases/Utf16Test: From32To16/51 8-byte object <40-04 01-00 01-D8 40-DC>' - PASSED gtests.sh: #7425: 'Utf16TestCases/Utf16Test: From32To16/52 8-byte object <80-04 01-00 01-D8 80-DC>' - PASSED gtests.sh: #7426: 'Utf16TestCases/Utf16Test: From32To16/53 8-byte object <00-05 01-00 01-D8 00-DD>' - PASSED gtests.sh: #7427: 'Utf16TestCases/Utf16Test: From32To16/54 8-byte object <00-06 01-00 01-D8 00-DE>' - PASSED gtests.sh: #7428: 'Utf16TestCases/Utf16Test: From32To16/55 8-byte object <FF-07 01-00 01-D8 FF-DF>' - PASSED gtests.sh: #7429: 'Utf16TestCases/Utf16Test: From32To16/56 8-byte object <00-08 01-00 02-D8 00-DC>' - PASSED gtests.sh: #7430: 'Utf16TestCases/Utf16Test: From32To16/57 8-byte object <01-08 01-00 02-D8 01-DC>' - PASSED gtests.sh: #7431: 'Utf16TestCases/Utf16Test: From32To16/58 8-byte object <02-08 01-00 02-D8 02-DC>' - PASSED gtests.sh: #7432: 'Utf16TestCases/Utf16Test: From32To16/59 8-byte object <04-08 01-00 02-D8 04-DC>' - PASSED gtests.sh: #7433: 'Utf16TestCases/Utf16Test: From32To16/60 8-byte object <08-08 01-00 02-D8 08-DC>' - PASSED gtests.sh: #7434: 'Utf16TestCases/Utf16Test: From32To16/61 8-byte object <10-08 01-00 02-D8 10-DC>' - PASSED gtests.sh: #7435: 'Utf16TestCases/Utf16Test: From32To16/62 8-byte object <20-08 01-00 02-D8 20-DC>' - PASSED gtests.sh: #7436: 'Utf16TestCases/Utf16Test: From32To16/63 8-byte object <40-08 01-00 02-D8 40-DC>' - PASSED gtests.sh: #7437: 'Utf16TestCases/Utf16Test: From32To16/64 8-byte object <80-08 01-00 02-D8 80-DC>' - PASSED gtests.sh: #7438: 'Utf16TestCases/Utf16Test: From32To16/65 8-byte object <00-09 01-00 02-D8 00-DD>' - PASSED gtests.sh: #7439: 'Utf16TestCases/Utf16Test: From32To16/66 8-byte object <00-0A 01-00 02-D8 00-DE>' - PASSED gtests.sh: #7440: 'Utf16TestCases/Utf16Test: From32To16/67 8-byte object <00-0C 01-00 03-D8 00-DC>' - PASSED gtests.sh: #7441: 'Utf16TestCases/Utf16Test: From32To16/68 8-byte object <FF-0F 01-00 03-D8 FF-DF>' - PASSED gtests.sh: #7442: 'Utf16TestCases/Utf16Test: From32To16/69 8-byte object <00-10 01-00 04-D8 00-DC>' - PASSED gtests.sh: #7443: 'Utf16TestCases/Utf16Test: From32To16/70 8-byte object <01-10 01-00 04-D8 01-DC>' - PASSED gtests.sh: #7444: 'Utf16TestCases/Utf16Test: From32To16/71 8-byte object <02-10 01-00 04-D8 02-DC>' - PASSED gtests.sh: #7445: 'Utf16TestCases/Utf16Test: From32To16/72 8-byte object <04-10 01-00 04-D8 04-DC>' - PASSED gtests.sh: #7446: 'Utf16TestCases/Utf16Test: From32To16/73 8-byte object <08-10 01-00 04-D8 08-DC>' - PASSED gtests.sh: #7447: 'Utf16TestCases/Utf16Test: From32To16/74 8-byte object <10-10 01-00 04-D8 10-DC>' - PASSED gtests.sh: #7448: 'Utf16TestCases/Utf16Test: From32To16/75 8-byte object <20-10 01-00 04-D8 20-DC>' - PASSED gtests.sh: #7449: 'Utf16TestCases/Utf16Test: From32To16/76 8-byte object <40-10 01-00 04-D8 40-DC>' - PASSED gtests.sh: #7450: 'Utf16TestCases/Utf16Test: From32To16/77 8-byte object <80-10 01-00 04-D8 80-DC>' - PASSED gtests.sh: #7451: 'Utf16TestCases/Utf16Test: From32To16/78 8-byte object <00-11 01-00 04-D8 00-DD>' - PASSED gtests.sh: #7452: 'Utf16TestCases/Utf16Test: From32To16/79 8-byte object <00-12 01-00 04-D8 00-DE>' - PASSED gtests.sh: #7453: 'Utf16TestCases/Utf16Test: From32To16/80 8-byte object <00-14 01-00 05-D8 00-DC>' - PASSED gtests.sh: #7454: 'Utf16TestCases/Utf16Test: From32To16/81 8-byte object <00-18 01-00 06-D8 00-DC>' - PASSED gtests.sh: #7455: 'Utf16TestCases/Utf16Test: From32To16/82 8-byte object <FF-1F 01-00 07-D8 FF-DF>' - PASSED gtests.sh: #7456: 'Utf16TestCases/Utf16Test: From32To16/83 8-byte object <00-20 01-00 08-D8 00-DC>' - PASSED gtests.sh: #7457: 'Utf16TestCases/Utf16Test: From32To16/84 8-byte object <01-20 01-00 08-D8 01-DC>' - PASSED gtests.sh: #7458: 'Utf16TestCases/Utf16Test: From32To16/85 8-byte object <02-20 01-00 08-D8 02-DC>' - PASSED gtests.sh: #7459: 'Utf16TestCases/Utf16Test: From32To16/86 8-byte object <04-20 01-00 08-D8 04-DC>' - PASSED gtests.sh: #7460: 'Utf16TestCases/Utf16Test: From32To16/87 8-byte object <08-20 01-00 08-D8 08-DC>' - PASSED gtests.sh: #7461: 'Utf16TestCases/Utf16Test: From32To16/88 8-byte object <10-20 01-00 08-D8 10-DC>' - PASSED gtests.sh: #7462: 'Utf16TestCases/Utf16Test: From32To16/89 8-byte object <20-20 01-00 08-D8 20-DC>' - PASSED gtests.sh: #7463: 'Utf16TestCases/Utf16Test: From32To16/90 8-byte object <40-20 01-00 08-D8 40-DC>' - PASSED gtests.sh: #7464: 'Utf16TestCases/Utf16Test: From32To16/91 8-byte object <80-20 01-00 08-D8 80-DC>' - PASSED gtests.sh: #7465: 'Utf16TestCases/Utf16Test: From32To16/92 8-byte object <00-21 01-00 08-D8 00-DD>' - PASSED gtests.sh: #7466: 'Utf16TestCases/Utf16Test: From32To16/93 8-byte object <00-22 01-00 08-D8 00-DE>' - PASSED gtests.sh: #7467: 'Utf16TestCases/Utf16Test: From32To16/94 8-byte object <00-24 01-00 09-D8 00-DC>' - PASSED gtests.sh: #7468: 'Utf16TestCases/Utf16Test: From32To16/95 8-byte object <00-28 01-00 0A-D8 00-DC>' - PASSED gtests.sh: #7469: 'Utf16TestCases/Utf16Test: From32To16/96 8-byte object <00-30 01-00 0C-D8 00-DC>' - PASSED gtests.sh: #7470: 'Utf16TestCases/Utf16Test: From32To16/97 8-byte object <FF-3F 01-00 0F-D8 FF-DF>' - PASSED gtests.sh: #7471: 'Utf16TestCases/Utf16Test: From32To16/98 8-byte object <00-40 01-00 10-D8 00-DC>' - PASSED gtests.sh: #7472: 'Utf16TestCases/Utf16Test: From32To16/99 8-byte object <01-40 01-00 10-D8 01-DC>' - PASSED gtests.sh: #7473: 'Utf16TestCases/Utf16Test: From32To16/100 8-byte object <02-40 01-00 10-D8 02-DC>' - PASSED gtests.sh: #7474: 'Utf16TestCases/Utf16Test: From32To16/101 8-byte object <04-40 01-00 10-D8 04-DC>' - PASSED gtests.sh: #7475: 'Utf16TestCases/Utf16Test: From32To16/102 8-byte object <08-40 01-00 10-D8 08-DC>' - PASSED gtests.sh: #7476: 'Utf16TestCases/Utf16Test: From32To16/103 8-byte object <10-40 01-00 10-D8 10-DC>' - PASSED gtests.sh: #7477: 'Utf16TestCases/Utf16Test: From32To16/104 8-byte object <20-40 01-00 10-D8 20-DC>' - PASSED gtests.sh: #7478: 'Utf16TestCases/Utf16Test: From32To16/105 8-byte object <40-40 01-00 10-D8 40-DC>' - PASSED gtests.sh: #7479: 'Utf16TestCases/Utf16Test: From32To16/106 8-byte object <80-40 01-00 10-D8 80-DC>' - PASSED gtests.sh: #7480: 'Utf16TestCases/Utf16Test: From32To16/107 8-byte object <00-41 01-00 10-D8 00-DD>' - PASSED gtests.sh: #7481: 'Utf16TestCases/Utf16Test: From32To16/108 8-byte object <00-42 01-00 10-D8 00-DE>' - PASSED gtests.sh: #7482: 'Utf16TestCases/Utf16Test: From32To16/109 8-byte object <00-44 01-00 11-D8 00-DC>' - PASSED gtests.sh: #7483: 'Utf16TestCases/Utf16Test: From32To16/110 8-byte object <00-48 01-00 12-D8 00-DC>' - PASSED gtests.sh: #7484: 'Utf16TestCases/Utf16Test: From32To16/111 8-byte object <00-50 01-00 14-D8 00-DC>' - PASSED gtests.sh: #7485: 'Utf16TestCases/Utf16Test: From32To16/112 8-byte object <00-60 01-00 18-D8 00-DC>' - PASSED gtests.sh: #7486: 'Utf16TestCases/Utf16Test: From32To16/113 8-byte object <FF-7F 01-00 1F-D8 FF-DF>' - PASSED gtests.sh: #7487: 'Utf16TestCases/Utf16Test: From32To16/114 8-byte object <00-80 01-00 20-D8 00-DC>' - PASSED gtests.sh: #7488: 'Utf16TestCases/Utf16Test: From32To16/115 8-byte object <01-80 01-00 20-D8 01-DC>' - PASSED gtests.sh: #7489: 'Utf16TestCases/Utf16Test: From32To16/116 8-byte object <02-80 01-00 20-D8 02-DC>' - PASSED gtests.sh: #7490: 'Utf16TestCases/Utf16Test: From32To16/117 8-byte object <04-80 01-00 20-D8 04-DC>' - PASSED gtests.sh: #7491: 'Utf16TestCases/Utf16Test: From32To16/118 8-byte object <08-80 01-00 20-D8 08-DC>' - PASSED gtests.sh: #7492: 'Utf16TestCases/Utf16Test: From32To16/119 8-byte object <10-80 01-00 20-D8 10-DC>' - PASSED gtests.sh: #7493: 'Utf16TestCases/Utf16Test: From32To16/120 8-byte object <20-80 01-00 20-D8 20-DC>' - PASSED gtests.sh: #7494: 'Utf16TestCases/Utf16Test: From32To16/121 8-byte object <40-80 01-00 20-D8 40-DC>' - PASSED gtests.sh: #7495: 'Utf16TestCases/Utf16Test: From32To16/122 8-byte object <80-80 01-00 20-D8 80-DC>' - PASSED gtests.sh: #7496: 'Utf16TestCases/Utf16Test: From32To16/123 8-byte object <00-81 01-00 20-D8 00-DD>' - PASSED gtests.sh: #7497: 'Utf16TestCases/Utf16Test: From32To16/124 8-byte object <00-82 01-00 20-D8 00-DE>' - PASSED gtests.sh: #7498: 'Utf16TestCases/Utf16Test: From32To16/125 8-byte object <00-84 01-00 21-D8 00-DC>' - PASSED gtests.sh: #7499: 'Utf16TestCases/Utf16Test: From32To16/126 8-byte object <00-88 01-00 22-D8 00-DC>' - PASSED gtests.sh: #7500: 'Utf16TestCases/Utf16Test: From32To16/127 8-byte object <00-90 01-00 24-D8 00-DC>' - PASSED gtests.sh: #7501: 'Utf16TestCases/Utf16Test: From32To16/128 8-byte object <00-A0 01-00 28-D8 00-DC>' - PASSED gtests.sh: #7502: 'Utf16TestCases/Utf16Test: From32To16/129 8-byte object <00-C0 01-00 30-D8 00-DC>' - PASSED gtests.sh: #7503: 'Utf16TestCases/Utf16Test: From32To16/130 8-byte object <FF-FF 01-00 3F-D8 FF-DF>' - PASSED gtests.sh: #7504: 'Utf16TestCases/Utf16Test: From32To16/131 8-byte object <00-00 02-00 40-D8 00-DC>' - PASSED gtests.sh: #7505: 'Utf16TestCases/Utf16Test: From32To16/132 8-byte object <01-00 02-00 40-D8 01-DC>' - PASSED gtests.sh: #7506: 'Utf16TestCases/Utf16Test: From32To16/133 8-byte object <02-00 02-00 40-D8 02-DC>' - PASSED gtests.sh: #7507: 'Utf16TestCases/Utf16Test: From32To16/134 8-byte object <04-00 02-00 40-D8 04-DC>' - PASSED gtests.sh: #7508: 'Utf16TestCases/Utf16Test: From32To16/135 8-byte object <08-00 02-00 40-D8 08-DC>' - PASSED gtests.sh: #7509: 'Utf16TestCases/Utf16Test: From32To16/136 8-byte object <10-00 02-00 40-D8 10-DC>' - PASSED gtests.sh: #7510: 'Utf16TestCases/Utf16Test: From32To16/137 8-byte object <20-00 02-00 40-D8 20-DC>' - PASSED gtests.sh: #7511: 'Utf16TestCases/Utf16Test: From32To16/138 8-byte object <40-00 02-00 40-D8 40-DC>' - PASSED gtests.sh: #7512: 'Utf16TestCases/Utf16Test: From32To16/139 8-byte object <80-00 02-00 40-D8 80-DC>' - PASSED gtests.sh: #7513: 'Utf16TestCases/Utf16Test: From32To16/140 8-byte object <00-01 02-00 40-D8 00-DD>' - PASSED gtests.sh: #7514: 'Utf16TestCases/Utf16Test: From32To16/141 8-byte object <00-02 02-00 40-D8 00-DE>' - PASSED gtests.sh: #7515: 'Utf16TestCases/Utf16Test: From32To16/142 8-byte object <00-04 02-00 41-D8 00-DC>' - PASSED gtests.sh: #7516: 'Utf16TestCases/Utf16Test: From32To16/143 8-byte object <00-08 02-00 42-D8 00-DC>' - PASSED gtests.sh: #7517: 'Utf16TestCases/Utf16Test: From32To16/144 8-byte object <00-10 02-00 44-D8 00-DC>' - PASSED gtests.sh: #7518: 'Utf16TestCases/Utf16Test: From32To16/145 8-byte object <00-20 02-00 48-D8 00-DC>' - PASSED gtests.sh: #7519: 'Utf16TestCases/Utf16Test: From32To16/146 8-byte object <00-40 02-00 50-D8 00-DC>' - PASSED gtests.sh: #7520: 'Utf16TestCases/Utf16Test: From32To16/147 8-byte object <00-80 02-00 60-D8 00-DC>' - PASSED gtests.sh: #7521: 'Utf16TestCases/Utf16Test: From32To16/148 8-byte object <FF-FF 02-00 7F-D8 FF-DF>' - PASSED gtests.sh: #7522: 'Utf16TestCases/Utf16Test: From32To16/149 8-byte object <00-00 03-00 80-D8 00-DC>' - PASSED gtests.sh: #7523: 'Utf16TestCases/Utf16Test: From32To16/150 8-byte object <01-00 03-00 80-D8 01-DC>' - PASSED gtests.sh: #7524: 'Utf16TestCases/Utf16Test: From32To16/151 8-byte object <02-00 03-00 80-D8 02-DC>' - PASSED gtests.sh: #7525: 'Utf16TestCases/Utf16Test: From32To16/152 8-byte object <04-00 03-00 80-D8 04-DC>' - PASSED gtests.sh: #7526: 'Utf16TestCases/Utf16Test: From32To16/153 8-byte object <08-00 03-00 80-D8 08-DC>' - PASSED gtests.sh: #7527: 'Utf16TestCases/Utf16Test: From32To16/154 8-byte object <10-00 03-00 80-D8 10-DC>' - PASSED gtests.sh: #7528: 'Utf16TestCases/Utf16Test: From32To16/155 8-byte object <20-00 03-00 80-D8 20-DC>' - PASSED gtests.sh: #7529: 'Utf16TestCases/Utf16Test: From32To16/156 8-byte object <40-00 03-00 80-D8 40-DC>' - PASSED gtests.sh: #7530: 'Utf16TestCases/Utf16Test: From32To16/157 8-byte object <80-00 03-00 80-D8 80-DC>' - PASSED gtests.sh: #7531: 'Utf16TestCases/Utf16Test: From32To16/158 8-byte object <00-01 03-00 80-D8 00-DD>' - PASSED gtests.sh: #7532: 'Utf16TestCases/Utf16Test: From32To16/159 8-byte object <00-02 03-00 80-D8 00-DE>' - PASSED gtests.sh: #7533: 'Utf16TestCases/Utf16Test: From32To16/160 8-byte object <00-04 03-00 81-D8 00-DC>' - PASSED gtests.sh: #7534: 'Utf16TestCases/Utf16Test: From32To16/161 8-byte object <00-08 03-00 82-D8 00-DC>' - PASSED gtests.sh: #7535: 'Utf16TestCases/Utf16Test: From32To16/162 8-byte object <00-10 03-00 84-D8 00-DC>' - PASSED gtests.sh: #7536: 'Utf16TestCases/Utf16Test: From32To16/163 8-byte object <00-20 03-00 88-D8 00-DC>' - PASSED gtests.sh: #7537: 'Utf16TestCases/Utf16Test: From32To16/164 8-byte object <00-40 03-00 90-D8 00-DC>' - PASSED gtests.sh: #7538: 'Utf16TestCases/Utf16Test: From32To16/165 8-byte object <00-80 03-00 A0-D8 00-DC>' - PASSED gtests.sh: #7539: 'Utf16TestCases/Utf16Test: From32To16/166 8-byte object <FF-FF 03-00 BF-D8 FF-DF>' - PASSED gtests.sh: #7540: 'Utf16TestCases/Utf16Test: From32To16/167 8-byte object <00-00 04-00 C0-D8 00-DC>' - PASSED gtests.sh: #7541: 'Utf16TestCases/Utf16Test: From32To16/168 8-byte object <01-00 04-00 C0-D8 01-DC>' - PASSED gtests.sh: #7542: 'Utf16TestCases/Utf16Test: From32To16/169 8-byte object <02-00 04-00 C0-D8 02-DC>' - PASSED gtests.sh: #7543: 'Utf16TestCases/Utf16Test: From32To16/170 8-byte object <04-00 04-00 C0-D8 04-DC>' - PASSED gtests.sh: #7544: 'Utf16TestCases/Utf16Test: From32To16/171 8-byte object <08-00 04-00 C0-D8 08-DC>' - PASSED gtests.sh: #7545: 'Utf16TestCases/Utf16Test: From32To16/172 8-byte object <10-00 04-00 C0-D8 10-DC>' - PASSED gtests.sh: #7546: 'Utf16TestCases/Utf16Test: From32To16/173 8-byte object <20-00 04-00 C0-D8 20-DC>' - PASSED gtests.sh: #7547: 'Utf16TestCases/Utf16Test: From32To16/174 8-byte object <40-00 04-00 C0-D8 40-DC>' - PASSED gtests.sh: #7548: 'Utf16TestCases/Utf16Test: From32To16/175 8-byte object <80-00 04-00 C0-D8 80-DC>' - PASSED gtests.sh: #7549: 'Utf16TestCases/Utf16Test: From32To16/176 8-byte object <00-01 04-00 C0-D8 00-DD>' - PASSED gtests.sh: #7550: 'Utf16TestCases/Utf16Test: From32To16/177 8-byte object <00-02 04-00 C0-D8 00-DE>' - PASSED gtests.sh: #7551: 'Utf16TestCases/Utf16Test: From32To16/178 8-byte object <00-04 04-00 C1-D8 00-DC>' - PASSED gtests.sh: #7552: 'Utf16TestCases/Utf16Test: From32To16/179 8-byte object <00-08 04-00 C2-D8 00-DC>' - PASSED gtests.sh: #7553: 'Utf16TestCases/Utf16Test: From32To16/180 8-byte object <00-10 04-00 C4-D8 00-DC>' - PASSED gtests.sh: #7554: 'Utf16TestCases/Utf16Test: From32To16/181 8-byte object <00-20 04-00 C8-D8 00-DC>' - PASSED gtests.sh: #7555: 'Utf16TestCases/Utf16Test: From32To16/182 8-byte object <00-40 04-00 D0-D8 00-DC>' - PASSED gtests.sh: #7556: 'Utf16TestCases/Utf16Test: From32To16/183 8-byte object <00-80 04-00 E0-D8 00-DC>' - PASSED gtests.sh: #7557: 'Utf16TestCases/Utf16Test: From32To16/184 8-byte object <FF-FF 04-00 FF-D8 FF-DF>' - PASSED gtests.sh: #7558: 'Utf16TestCases/Utf16Test: From32To16/185 8-byte object <00-00 05-00 00-D9 00-DC>' - PASSED gtests.sh: #7559: 'Utf16TestCases/Utf16Test: From32To16/186 8-byte object <01-00 05-00 00-D9 01-DC>' - PASSED gtests.sh: #7560: 'Utf16TestCases/Utf16Test: From32To16/187 8-byte object <02-00 05-00 00-D9 02-DC>' - PASSED gtests.sh: #7561: 'Utf16TestCases/Utf16Test: From32To16/188 8-byte object <04-00 05-00 00-D9 04-DC>' - PASSED gtests.sh: #7562: 'Utf16TestCases/Utf16Test: From32To16/189 8-byte object <08-00 05-00 00-D9 08-DC>' - PASSED gtests.sh: #7563: 'Utf16TestCases/Utf16Test: From32To16/190 8-byte object <10-00 05-00 00-D9 10-DC>' - PASSED gtests.sh: #7564: 'Utf16TestCases/Utf16Test: From32To16/191 8-byte object <20-00 05-00 00-D9 20-DC>' - PASSED gtests.sh: #7565: 'Utf16TestCases/Utf16Test: From32To16/192 8-byte object <40-00 05-00 00-D9 40-DC>' - PASSED gtests.sh: #7566: 'Utf16TestCases/Utf16Test: From32To16/193 8-byte object <80-00 05-00 00-D9 80-DC>' - PASSED gtests.sh: #7567: 'Utf16TestCases/Utf16Test: From32To16/194 8-byte object <00-01 05-00 00-D9 00-DD>' - PASSED gtests.sh: #7568: 'Utf16TestCases/Utf16Test: From32To16/195 8-byte object <00-02 05-00 00-D9 00-DE>' - PASSED gtests.sh: #7569: 'Utf16TestCases/Utf16Test: From32To16/196 8-byte object <00-04 05-00 01-D9 00-DC>' - PASSED gtests.sh: #7570: 'Utf16TestCases/Utf16Test: From32To16/197 8-byte object <00-08 05-00 02-D9 00-DC>' - PASSED gtests.sh: #7571: 'Utf16TestCases/Utf16Test: From32To16/198 8-byte object <00-10 05-00 04-D9 00-DC>' - PASSED gtests.sh: #7572: 'Utf16TestCases/Utf16Test: From32To16/199 8-byte object <00-20 05-00 08-D9 00-DC>' - PASSED gtests.sh: #7573: 'Utf16TestCases/Utf16Test: From32To16/200 8-byte object <00-40 05-00 10-D9 00-DC>' - PASSED gtests.sh: #7574: 'Utf16TestCases/Utf16Test: From32To16/201 8-byte object <00-80 05-00 20-D9 00-DC>' - PASSED gtests.sh: #7575: 'Utf16TestCases/Utf16Test: From32To16/202 8-byte object <00-00 06-00 40-D9 00-DC>' - PASSED gtests.sh: #7576: 'Utf16TestCases/Utf16Test: From32To16/203 8-byte object <00-00 07-00 80-D9 00-DC>' - PASSED gtests.sh: #7577: 'Utf16TestCases/Utf16Test: From32To16/204 8-byte object <FF-FF 07-00 BF-D9 FF-DF>' - PASSED gtests.sh: #7578: 'Utf16TestCases/Utf16Test: From32To16/205 8-byte object <00-00 08-00 C0-D9 00-DC>' - PASSED gtests.sh: #7579: 'Utf16TestCases/Utf16Test: From32To16/206 8-byte object <01-00 08-00 C0-D9 01-DC>' - PASSED gtests.sh: #7580: 'Utf16TestCases/Utf16Test: From32To16/207 8-byte object <02-00 08-00 C0-D9 02-DC>' - PASSED gtests.sh: #7581: 'Utf16TestCases/Utf16Test: From32To16/208 8-byte object <04-00 08-00 C0-D9 04-DC>' - PASSED gtests.sh: #7582: 'Utf16TestCases/Utf16Test: From32To16/209 8-byte object <08-00 08-00 C0-D9 08-DC>' - PASSED gtests.sh: #7583: 'Utf16TestCases/Utf16Test: From32To16/210 8-byte object <10-00 08-00 C0-D9 10-DC>' - PASSED gtests.sh: #7584: 'Utf16TestCases/Utf16Test: From32To16/211 8-byte object <20-00 08-00 C0-D9 20-DC>' - PASSED gtests.sh: #7585: 'Utf16TestCases/Utf16Test: From32To16/212 8-byte object <40-00 08-00 C0-D9 40-DC>' - PASSED gtests.sh: #7586: 'Utf16TestCases/Utf16Test: From32To16/213 8-byte object <80-00 08-00 C0-D9 80-DC>' - PASSED gtests.sh: #7587: 'Utf16TestCases/Utf16Test: From32To16/214 8-byte object <00-01 08-00 C0-D9 00-DD>' - PASSED gtests.sh: #7588: 'Utf16TestCases/Utf16Test: From32To16/215 8-byte object <00-02 08-00 C0-D9 00-DE>' - PASSED gtests.sh: #7589: 'Utf16TestCases/Utf16Test: From32To16/216 8-byte object <00-04 08-00 C1-D9 00-DC>' - PASSED gtests.sh: #7590: 'Utf16TestCases/Utf16Test: From32To16/217 8-byte object <00-08 08-00 C2-D9 00-DC>' - PASSED gtests.sh: #7591: 'Utf16TestCases/Utf16Test: From32To16/218 8-byte object <00-10 08-00 C4-D9 00-DC>' - PASSED gtests.sh: #7592: 'Utf16TestCases/Utf16Test: From32To16/219 8-byte object <00-20 08-00 C8-D9 00-DC>' - PASSED gtests.sh: #7593: 'Utf16TestCases/Utf16Test: From32To16/220 8-byte object <00-40 08-00 D0-D9 00-DC>' - PASSED gtests.sh: #7594: 'Utf16TestCases/Utf16Test: From32To16/221 8-byte object <00-80 08-00 E0-D9 00-DC>' - PASSED gtests.sh: #7595: 'Utf16TestCases/Utf16Test: From32To16/222 8-byte object <FF-FF 08-00 FF-D9 FF-DF>' - PASSED gtests.sh: #7596: 'Utf16TestCases/Utf16Test: From32To16/223 8-byte object <00-00 09-00 00-DA 00-DC>' - PASSED gtests.sh: #7597: 'Utf16TestCases/Utf16Test: From32To16/224 8-byte object <01-00 09-00 00-DA 01-DC>' - PASSED gtests.sh: #7598: 'Utf16TestCases/Utf16Test: From32To16/225 8-byte object <02-00 09-00 00-DA 02-DC>' - PASSED gtests.sh: #7599: 'Utf16TestCases/Utf16Test: From32To16/226 8-byte object <04-00 09-00 00-DA 04-DC>' - PASSED gtests.sh: #7600: 'Utf16TestCases/Utf16Test: From32To16/227 8-byte object <08-00 09-00 00-DA 08-DC>' - PASSED gtests.sh: #7601: 'Utf16TestCases/Utf16Test: From32To16/228 8-byte object <10-00 09-00 00-DA 10-DC>' - PASSED gtests.sh: #7602: 'Utf16TestCases/Utf16Test: From32To16/229 8-byte object <20-00 09-00 00-DA 20-DC>' - PASSED gtests.sh: #7603: 'Utf16TestCases/Utf16Test: From32To16/230 8-byte object <40-00 09-00 00-DA 40-DC>' - PASSED gtests.sh: #7604: 'Utf16TestCases/Utf16Test: From32To16/231 8-byte object <80-00 09-00 00-DA 80-DC>' - PASSED gtests.sh: #7605: 'Utf16TestCases/Utf16Test: From32To16/232 8-byte object <00-01 09-00 00-DA 00-DD>' - PASSED gtests.sh: #7606: 'Utf16TestCases/Utf16Test: From32To16/233 8-byte object <00-02 09-00 00-DA 00-DE>' - PASSED gtests.sh: #7607: 'Utf16TestCases/Utf16Test: From32To16/234 8-byte object <00-04 09-00 01-DA 00-DC>' - PASSED gtests.sh: #7608: 'Utf16TestCases/Utf16Test: From32To16/235 8-byte object <00-08 09-00 02-DA 00-DC>' - PASSED gtests.sh: #7609: 'Utf16TestCases/Utf16Test: From32To16/236 8-byte object <00-10 09-00 04-DA 00-DC>' - PASSED gtests.sh: #7610: 'Utf16TestCases/Utf16Test: From32To16/237 8-byte object <00-20 09-00 08-DA 00-DC>' - PASSED gtests.sh: #7611: 'Utf16TestCases/Utf16Test: From32To16/238 8-byte object <00-40 09-00 10-DA 00-DC>' - PASSED gtests.sh: #7612: 'Utf16TestCases/Utf16Test: From32To16/239 8-byte object <00-80 09-00 20-DA 00-DC>' - PASSED gtests.sh: #7613: 'Utf16TestCases/Utf16Test: From32To16/240 8-byte object <00-00 0A-00 40-DA 00-DC>' - PASSED gtests.sh: #7614: 'Utf16TestCases/Utf16Test: From32To16/241 8-byte object <00-00 0B-00 80-DA 00-DC>' - PASSED gtests.sh: #7615: 'Utf16TestCases/Utf16Test: From32To16/242 8-byte object <00-00 0C-00 C0-DA 00-DC>' - PASSED gtests.sh: #7616: 'Utf16TestCases/Utf16Test: From32To16/243 8-byte object <00-00 0D-00 00-DB 00-DC>' - PASSED gtests.sh: #7617: 'Utf16TestCases/Utf16Test: From32To16/244 8-byte object <FF-FF 0F-00 BF-DB FF-DF>' - PASSED gtests.sh: #7618: 'Utf16TestCases/Utf16Test: From32To16/245 8-byte object <FF-FF 10-00 FF-DB FF-DF>' - PASSED gtests.sh: #7619: 'Utf16TestCases/Utf16Test: SameUtf8/0 8-byte object <00-00 01-00 00-D8 00-DC>' - PASSED gtests.sh: #7620: 'Utf16TestCases/Utf16Test: SameUtf8/1 8-byte object <01-00 01-00 00-D8 01-DC>' - PASSED gtests.sh: #7621: 'Utf16TestCases/Utf16Test: SameUtf8/2 8-byte object <02-00 01-00 00-D8 02-DC>' - PASSED gtests.sh: #7622: 'Utf16TestCases/Utf16Test: SameUtf8/3 8-byte object <03-00 01-00 00-D8 03-DC>' - PASSED gtests.sh: #7623: 'Utf16TestCases/Utf16Test: SameUtf8/4 8-byte object <04-00 01-00 00-D8 04-DC>' - PASSED gtests.sh: #7624: 'Utf16TestCases/Utf16Test: SameUtf8/5 8-byte object <07-00 01-00 00-D8 07-DC>' - PASSED gtests.sh: #7625: 'Utf16TestCases/Utf16Test: SameUtf8/6 8-byte object <08-00 01-00 00-D8 08-DC>' - PASSED gtests.sh: #7626: 'Utf16TestCases/Utf16Test: SameUtf8/7 8-byte object <0F-00 01-00 00-D8 0F-DC>' - PASSED gtests.sh: #7627: 'Utf16TestCases/Utf16Test: SameUtf8/8 8-byte object <10-00 01-00 00-D8 10-DC>' - PASSED gtests.sh: #7628: 'Utf16TestCases/Utf16Test: SameUtf8/9 8-byte object <1F-00 01-00 00-D8 1F-DC>' - PASSED gtests.sh: #7629: 'Utf16TestCases/Utf16Test: SameUtf8/10 8-byte object <20-00 01-00 00-D8 20-DC>' - PASSED gtests.sh: #7630: 'Utf16TestCases/Utf16Test: SameUtf8/11 8-byte object <3F-00 01-00 00-D8 3F-DC>' - PASSED gtests.sh: #7631: 'Utf16TestCases/Utf16Test: SameUtf8/12 8-byte object <40-00 01-00 00-D8 40-DC>' - PASSED gtests.sh: #7632: 'Utf16TestCases/Utf16Test: SameUtf8/13 8-byte object <7F-00 01-00 00-D8 7F-DC>' - PASSED gtests.sh: #7633: 'Utf16TestCases/Utf16Test: SameUtf8/14 8-byte object <80-00 01-00 00-D8 80-DC>' - PASSED gtests.sh: #7634: 'Utf16TestCases/Utf16Test: SameUtf8/15 8-byte object <81-00 01-00 00-D8 81-DC>' - PASSED gtests.sh: #7635: 'Utf16TestCases/Utf16Test: SameUtf8/16 8-byte object <82-00 01-00 00-D8 82-DC>' - PASSED gtests.sh: #7636: 'Utf16TestCases/Utf16Test: SameUtf8/17 8-byte object <84-00 01-00 00-D8 84-DC>' - PASSED gtests.sh: #7637: 'Utf16TestCases/Utf16Test: SameUtf8/18 8-byte object <88-00 01-00 00-D8 88-DC>' - PASSED gtests.sh: #7638: 'Utf16TestCases/Utf16Test: SameUtf8/19 8-byte object <90-00 01-00 00-D8 90-DC>' - PASSED gtests.sh: #7639: 'Utf16TestCases/Utf16Test: SameUtf8/20 8-byte object <A0-00 01-00 00-D8 A0-DC>' - PASSED gtests.sh: #7640: 'Utf16TestCases/Utf16Test: SameUtf8/21 8-byte object <C0-00 01-00 00-D8 C0-DC>' - PASSED gtests.sh: #7641: 'Utf16TestCases/Utf16Test: SameUtf8/22 8-byte object <FF-00 01-00 00-D8 FF-DC>' - PASSED gtests.sh: #7642: 'Utf16TestCases/Utf16Test: SameUtf8/23 8-byte object <00-01 01-00 00-D8 00-DD>' - PASSED gtests.sh: #7643: 'Utf16TestCases/Utf16Test: SameUtf8/24 8-byte object <01-01 01-00 00-D8 01-DD>' - PASSED gtests.sh: #7644: 'Utf16TestCases/Utf16Test: SameUtf8/25 8-byte object <02-01 01-00 00-D8 02-DD>' - PASSED gtests.sh: #7645: 'Utf16TestCases/Utf16Test: SameUtf8/26 8-byte object <04-01 01-00 00-D8 04-DD>' - PASSED gtests.sh: #7646: 'Utf16TestCases/Utf16Test: SameUtf8/27 8-byte object <08-01 01-00 00-D8 08-DD>' - PASSED gtests.sh: #7647: 'Utf16TestCases/Utf16Test: SameUtf8/28 8-byte object <10-01 01-00 00-D8 10-DD>' - PASSED gtests.sh: #7648: 'Utf16TestCases/Utf16Test: SameUtf8/29 8-byte object <20-01 01-00 00-D8 20-DD>' - PASSED gtests.sh: #7649: 'Utf16TestCases/Utf16Test: SameUtf8/30 8-byte object <40-01 01-00 00-D8 40-DD>' - PASSED gtests.sh: #7650: 'Utf16TestCases/Utf16Test: SameUtf8/31 8-byte object <80-01 01-00 00-D8 80-DD>' - PASSED gtests.sh: #7651: 'Utf16TestCases/Utf16Test: SameUtf8/32 8-byte object <FF-01 01-00 00-D8 FF-DD>' - PASSED gtests.sh: #7652: 'Utf16TestCases/Utf16Test: SameUtf8/33 8-byte object <00-02 01-00 00-D8 00-DE>' - PASSED gtests.sh: #7653: 'Utf16TestCases/Utf16Test: SameUtf8/34 8-byte object <01-02 01-00 00-D8 01-DE>' - PASSED gtests.sh: #7654: 'Utf16TestCases/Utf16Test: SameUtf8/35 8-byte object <02-02 01-00 00-D8 02-DE>' - PASSED gtests.sh: #7655: 'Utf16TestCases/Utf16Test: SameUtf8/36 8-byte object <04-02 01-00 00-D8 04-DE>' - PASSED gtests.sh: #7656: 'Utf16TestCases/Utf16Test: SameUtf8/37 8-byte object <08-02 01-00 00-D8 08-DE>' - PASSED gtests.sh: #7657: 'Utf16TestCases/Utf16Test: SameUtf8/38 8-byte object <10-02 01-00 00-D8 10-DE>' - PASSED gtests.sh: #7658: 'Utf16TestCases/Utf16Test: SameUtf8/39 8-byte object <20-02 01-00 00-D8 20-DE>' - PASSED gtests.sh: #7659: 'Utf16TestCases/Utf16Test: SameUtf8/40 8-byte object <40-02 01-00 00-D8 40-DE>' - PASSED gtests.sh: #7660: 'Utf16TestCases/Utf16Test: SameUtf8/41 8-byte object <80-02 01-00 00-D8 80-DE>' - PASSED gtests.sh: #7661: 'Utf16TestCases/Utf16Test: SameUtf8/42 8-byte object <00-03 01-00 00-D8 00-DF>' - PASSED gtests.sh: #7662: 'Utf16TestCases/Utf16Test: SameUtf8/43 8-byte object <FF-03 01-00 00-D8 FF-DF>' - PASSED gtests.sh: #7663: 'Utf16TestCases/Utf16Test: SameUtf8/44 8-byte object <00-04 01-00 01-D8 00-DC>' - PASSED gtests.sh: #7664: 'Utf16TestCases/Utf16Test: SameUtf8/45 8-byte object <01-04 01-00 01-D8 01-DC>' - PASSED gtests.sh: #7665: 'Utf16TestCases/Utf16Test: SameUtf8/46 8-byte object <02-04 01-00 01-D8 02-DC>' - PASSED gtests.sh: #7666: 'Utf16TestCases/Utf16Test: SameUtf8/47 8-byte object <04-04 01-00 01-D8 04-DC>' - PASSED gtests.sh: #7667: 'Utf16TestCases/Utf16Test: SameUtf8/48 8-byte object <08-04 01-00 01-D8 08-DC>' - PASSED gtests.sh: #7668: 'Utf16TestCases/Utf16Test: SameUtf8/49 8-byte object <10-04 01-00 01-D8 10-DC>' - PASSED gtests.sh: #7669: 'Utf16TestCases/Utf16Test: SameUtf8/50 8-byte object <20-04 01-00 01-D8 20-DC>' - PASSED gtests.sh: #7670: 'Utf16TestCases/Utf16Test: SameUtf8/51 8-byte object <40-04 01-00 01-D8 40-DC>' - PASSED gtests.sh: #7671: 'Utf16TestCases/Utf16Test: SameUtf8/52 8-byte object <80-04 01-00 01-D8 80-DC>' - PASSED gtests.sh: #7672: 'Utf16TestCases/Utf16Test: SameUtf8/53 8-byte object <00-05 01-00 01-D8 00-DD>' - PASSED gtests.sh: #7673: 'Utf16TestCases/Utf16Test: SameUtf8/54 8-byte object <00-06 01-00 01-D8 00-DE>' - PASSED gtests.sh: #7674: 'Utf16TestCases/Utf16Test: SameUtf8/55 8-byte object <FF-07 01-00 01-D8 FF-DF>' - PASSED gtests.sh: #7675: 'Utf16TestCases/Utf16Test: SameUtf8/56 8-byte object <00-08 01-00 02-D8 00-DC>' - PASSED gtests.sh: #7676: 'Utf16TestCases/Utf16Test: SameUtf8/57 8-byte object <01-08 01-00 02-D8 01-DC>' - PASSED gtests.sh: #7677: 'Utf16TestCases/Utf16Test: SameUtf8/58 8-byte object <02-08 01-00 02-D8 02-DC>' - PASSED gtests.sh: #7678: 'Utf16TestCases/Utf16Test: SameUtf8/59 8-byte object <04-08 01-00 02-D8 04-DC>' - PASSED gtests.sh: #7679: 'Utf16TestCases/Utf16Test: SameUtf8/60 8-byte object <08-08 01-00 02-D8 08-DC>' - PASSED gtests.sh: #7680: 'Utf16TestCases/Utf16Test: SameUtf8/61 8-byte object <10-08 01-00 02-D8 10-DC>' - PASSED gtests.sh: #7681: 'Utf16TestCases/Utf16Test: SameUtf8/62 8-byte object <20-08 01-00 02-D8 20-DC>' - PASSED gtests.sh: #7682: 'Utf16TestCases/Utf16Test: SameUtf8/63 8-byte object <40-08 01-00 02-D8 40-DC>' - PASSED gtests.sh: #7683: 'Utf16TestCases/Utf16Test: SameUtf8/64 8-byte object <80-08 01-00 02-D8 80-DC>' - PASSED gtests.sh: #7684: 'Utf16TestCases/Utf16Test: SameUtf8/65 8-byte object <00-09 01-00 02-D8 00-DD>' - PASSED gtests.sh: #7685: 'Utf16TestCases/Utf16Test: SameUtf8/66 8-byte object <00-0A 01-00 02-D8 00-DE>' - PASSED gtests.sh: #7686: 'Utf16TestCases/Utf16Test: SameUtf8/67 8-byte object <00-0C 01-00 03-D8 00-DC>' - PASSED gtests.sh: #7687: 'Utf16TestCases/Utf16Test: SameUtf8/68 8-byte object <FF-0F 01-00 03-D8 FF-DF>' - PASSED gtests.sh: #7688: 'Utf16TestCases/Utf16Test: SameUtf8/69 8-byte object <00-10 01-00 04-D8 00-DC>' - PASSED gtests.sh: #7689: 'Utf16TestCases/Utf16Test: SameUtf8/70 8-byte object <01-10 01-00 04-D8 01-DC>' - PASSED gtests.sh: #7690: 'Utf16TestCases/Utf16Test: SameUtf8/71 8-byte object <02-10 01-00 04-D8 02-DC>' - PASSED gtests.sh: #7691: 'Utf16TestCases/Utf16Test: SameUtf8/72 8-byte object <04-10 01-00 04-D8 04-DC>' - PASSED gtests.sh: #7692: 'Utf16TestCases/Utf16Test: SameUtf8/73 8-byte object <08-10 01-00 04-D8 08-DC>' - PASSED gtests.sh: #7693: 'Utf16TestCases/Utf16Test: SameUtf8/74 8-byte object <10-10 01-00 04-D8 10-DC>' - PASSED gtests.sh: #7694: 'Utf16TestCases/Utf16Test: SameUtf8/75 8-byte object <20-10 01-00 04-D8 20-DC>' - PASSED gtests.sh: #7695: 'Utf16TestCases/Utf16Test: SameUtf8/76 8-byte object <40-10 01-00 04-D8 40-DC>' - PASSED gtests.sh: #7696: 'Utf16TestCases/Utf16Test: SameUtf8/77 8-byte object <80-10 01-00 04-D8 80-DC>' - PASSED gtests.sh: #7697: 'Utf16TestCases/Utf16Test: SameUtf8/78 8-byte object <00-11 01-00 04-D8 00-DD>' - PASSED gtests.sh: #7698: 'Utf16TestCases/Utf16Test: SameUtf8/79 8-byte object <00-12 01-00 04-D8 00-DE>' - PASSED gtests.sh: #7699: 'Utf16TestCases/Utf16Test: SameUtf8/80 8-byte object <00-14 01-00 05-D8 00-DC>' - PASSED gtests.sh: #7700: 'Utf16TestCases/Utf16Test: SameUtf8/81 8-byte object <00-18 01-00 06-D8 00-DC>' - PASSED gtests.sh: #7701: 'Utf16TestCases/Utf16Test: SameUtf8/82 8-byte object <FF-1F 01-00 07-D8 FF-DF>' - PASSED gtests.sh: #7702: 'Utf16TestCases/Utf16Test: SameUtf8/83 8-byte object <00-20 01-00 08-D8 00-DC>' - PASSED gtests.sh: #7703: 'Utf16TestCases/Utf16Test: SameUtf8/84 8-byte object <01-20 01-00 08-D8 01-DC>' - PASSED gtests.sh: #7704: 'Utf16TestCases/Utf16Test: SameUtf8/85 8-byte object <02-20 01-00 08-D8 02-DC>' - PASSED gtests.sh: #7705: 'Utf16TestCases/Utf16Test: SameUtf8/86 8-byte object <04-20 01-00 08-D8 04-DC>' - PASSED gtests.sh: #7706: 'Utf16TestCases/Utf16Test: SameUtf8/87 8-byte object <08-20 01-00 08-D8 08-DC>' - PASSED gtests.sh: #7707: 'Utf16TestCases/Utf16Test: SameUtf8/88 8-byte object <10-20 01-00 08-D8 10-DC>' - PASSED gtests.sh: #7708: 'Utf16TestCases/Utf16Test: SameUtf8/89 8-byte object <20-20 01-00 08-D8 20-DC>' - PASSED gtests.sh: #7709: 'Utf16TestCases/Utf16Test: SameUtf8/90 8-byte object <40-20 01-00 08-D8 40-DC>' - PASSED gtests.sh: #7710: 'Utf16TestCases/Utf16Test: SameUtf8/91 8-byte object <80-20 01-00 08-D8 80-DC>' - PASSED gtests.sh: #7711: 'Utf16TestCases/Utf16Test: SameUtf8/92 8-byte object <00-21 01-00 08-D8 00-DD>' - PASSED gtests.sh: #7712: 'Utf16TestCases/Utf16Test: SameUtf8/93 8-byte object <00-22 01-00 08-D8 00-DE>' - PASSED gtests.sh: #7713: 'Utf16TestCases/Utf16Test: SameUtf8/94 8-byte object <00-24 01-00 09-D8 00-DC>' - PASSED gtests.sh: #7714: 'Utf16TestCases/Utf16Test: SameUtf8/95 8-byte object <00-28 01-00 0A-D8 00-DC>' - PASSED gtests.sh: #7715: 'Utf16TestCases/Utf16Test: SameUtf8/96 8-byte object <00-30 01-00 0C-D8 00-DC>' - PASSED gtests.sh: #7716: 'Utf16TestCases/Utf16Test: SameUtf8/97 8-byte object <FF-3F 01-00 0F-D8 FF-DF>' - PASSED gtests.sh: #7717: 'Utf16TestCases/Utf16Test: SameUtf8/98 8-byte object <00-40 01-00 10-D8 00-DC>' - PASSED gtests.sh: #7718: 'Utf16TestCases/Utf16Test: SameUtf8/99 8-byte object <01-40 01-00 10-D8 01-DC>' - PASSED gtests.sh: #7719: 'Utf16TestCases/Utf16Test: SameUtf8/100 8-byte object <02-40 01-00 10-D8 02-DC>' - PASSED gtests.sh: #7720: 'Utf16TestCases/Utf16Test: SameUtf8/101 8-byte object <04-40 01-00 10-D8 04-DC>' - PASSED gtests.sh: #7721: 'Utf16TestCases/Utf16Test: SameUtf8/102 8-byte object <08-40 01-00 10-D8 08-DC>' - PASSED gtests.sh: #7722: 'Utf16TestCases/Utf16Test: SameUtf8/103 8-byte object <10-40 01-00 10-D8 10-DC>' - PASSED gtests.sh: #7723: 'Utf16TestCases/Utf16Test: SameUtf8/104 8-byte object <20-40 01-00 10-D8 20-DC>' - PASSED gtests.sh: #7724: 'Utf16TestCases/Utf16Test: SameUtf8/105 8-byte object <40-40 01-00 10-D8 40-DC>' - PASSED gtests.sh: #7725: 'Utf16TestCases/Utf16Test: SameUtf8/106 8-byte object <80-40 01-00 10-D8 80-DC>' - PASSED gtests.sh: #7726: 'Utf16TestCases/Utf16Test: SameUtf8/107 8-byte object <00-41 01-00 10-D8 00-DD>' - PASSED gtests.sh: #7727: 'Utf16TestCases/Utf16Test: SameUtf8/108 8-byte object <00-42 01-00 10-D8 00-DE>' - PASSED gtests.sh: #7728: 'Utf16TestCases/Utf16Test: SameUtf8/109 8-byte object <00-44 01-00 11-D8 00-DC>' - PASSED gtests.sh: #7729: 'Utf16TestCases/Utf16Test: SameUtf8/110 8-byte object <00-48 01-00 12-D8 00-DC>' - PASSED gtests.sh: #7730: 'Utf16TestCases/Utf16Test: SameUtf8/111 8-byte object <00-50 01-00 14-D8 00-DC>' - PASSED gtests.sh: #7731: 'Utf16TestCases/Utf16Test: SameUtf8/112 8-byte object <00-60 01-00 18-D8 00-DC>' - PASSED gtests.sh: #7732: 'Utf16TestCases/Utf16Test: SameUtf8/113 8-byte object <FF-7F 01-00 1F-D8 FF-DF>' - PASSED gtests.sh: #7733: 'Utf16TestCases/Utf16Test: SameUtf8/114 8-byte object <00-80 01-00 20-D8 00-DC>' - PASSED gtests.sh: #7734: 'Utf16TestCases/Utf16Test: SameUtf8/115 8-byte object <01-80 01-00 20-D8 01-DC>' - PASSED gtests.sh: #7735: 'Utf16TestCases/Utf16Test: SameUtf8/116 8-byte object <02-80 01-00 20-D8 02-DC>' - PASSED gtests.sh: #7736: 'Utf16TestCases/Utf16Test: SameUtf8/117 8-byte object <04-80 01-00 20-D8 04-DC>' - PASSED gtests.sh: #7737: 'Utf16TestCases/Utf16Test: SameUtf8/118 8-byte object <08-80 01-00 20-D8 08-DC>' - PASSED gtests.sh: #7738: 'Utf16TestCases/Utf16Test: SameUtf8/119 8-byte object <10-80 01-00 20-D8 10-DC>' - PASSED gtests.sh: #7739: 'Utf16TestCases/Utf16Test: SameUtf8/120 8-byte object <20-80 01-00 20-D8 20-DC>' - PASSED gtests.sh: #7740: 'Utf16TestCases/Utf16Test: SameUtf8/121 8-byte object <40-80 01-00 20-D8 40-DC>' - PASSED gtests.sh: #7741: 'Utf16TestCases/Utf16Test: SameUtf8/122 8-byte object <80-80 01-00 20-D8 80-DC>' - PASSED gtests.sh: #7742: 'Utf16TestCases/Utf16Test: SameUtf8/123 8-byte object <00-81 01-00 20-D8 00-DD>' - PASSED gtests.sh: #7743: 'Utf16TestCases/Utf16Test: SameUtf8/124 8-byte object <00-82 01-00 20-D8 00-DE>' - PASSED gtests.sh: #7744: 'Utf16TestCases/Utf16Test: SameUtf8/125 8-byte object <00-84 01-00 21-D8 00-DC>' - PASSED gtests.sh: #7745: 'Utf16TestCases/Utf16Test: SameUtf8/126 8-byte object <00-88 01-00 22-D8 00-DC>' - PASSED gtests.sh: #7746: 'Utf16TestCases/Utf16Test: SameUtf8/127 8-byte object <00-90 01-00 24-D8 00-DC>' - PASSED gtests.sh: #7747: 'Utf16TestCases/Utf16Test: SameUtf8/128 8-byte object <00-A0 01-00 28-D8 00-DC>' - PASSED gtests.sh: #7748: 'Utf16TestCases/Utf16Test: SameUtf8/129 8-byte object <00-C0 01-00 30-D8 00-DC>' - PASSED gtests.sh: #7749: 'Utf16TestCases/Utf16Test: SameUtf8/130 8-byte object <FF-FF 01-00 3F-D8 FF-DF>' - PASSED gtests.sh: #7750: 'Utf16TestCases/Utf16Test: SameUtf8/131 8-byte object <00-00 02-00 40-D8 00-DC>' - PASSED gtests.sh: #7751: 'Utf16TestCases/Utf16Test: SameUtf8/132 8-byte object <01-00 02-00 40-D8 01-DC>' - PASSED gtests.sh: #7752: 'Utf16TestCases/Utf16Test: SameUtf8/133 8-byte object <02-00 02-00 40-D8 02-DC>' - PASSED gtests.sh: #7753: 'Utf16TestCases/Utf16Test: SameUtf8/134 8-byte object <04-00 02-00 40-D8 04-DC>' - PASSED gtests.sh: #7754: 'Utf16TestCases/Utf16Test: SameUtf8/135 8-byte object <08-00 02-00 40-D8 08-DC>' - PASSED gtests.sh: #7755: 'Utf16TestCases/Utf16Test: SameUtf8/136 8-byte object <10-00 02-00 40-D8 10-DC>' - PASSED gtests.sh: #7756: 'Utf16TestCases/Utf16Test: SameUtf8/137 8-byte object <20-00 02-00 40-D8 20-DC>' - PASSED gtests.sh: #7757: 'Utf16TestCases/Utf16Test: SameUtf8/138 8-byte object <40-00 02-00 40-D8 40-DC>' - PASSED gtests.sh: #7758: 'Utf16TestCases/Utf16Test: SameUtf8/139 8-byte object <80-00 02-00 40-D8 80-DC>' - PASSED gtests.sh: #7759: 'Utf16TestCases/Utf16Test: SameUtf8/140 8-byte object <00-01 02-00 40-D8 00-DD>' - PASSED gtests.sh: #7760: 'Utf16TestCases/Utf16Test: SameUtf8/141 8-byte object <00-02 02-00 40-D8 00-DE>' - PASSED gtests.sh: #7761: 'Utf16TestCases/Utf16Test: SameUtf8/142 8-byte object <00-04 02-00 41-D8 00-DC>' - PASSED gtests.sh: #7762: 'Utf16TestCases/Utf16Test: SameUtf8/143 8-byte object <00-08 02-00 42-D8 00-DC>' - PASSED gtests.sh: #7763: 'Utf16TestCases/Utf16Test: SameUtf8/144 8-byte object <00-10 02-00 44-D8 00-DC>' - PASSED gtests.sh: #7764: 'Utf16TestCases/Utf16Test: SameUtf8/145 8-byte object <00-20 02-00 48-D8 00-DC>' - PASSED gtests.sh: #7765: 'Utf16TestCases/Utf16Test: SameUtf8/146 8-byte object <00-40 02-00 50-D8 00-DC>' - PASSED gtests.sh: #7766: 'Utf16TestCases/Utf16Test: SameUtf8/147 8-byte object <00-80 02-00 60-D8 00-DC>' - PASSED gtests.sh: #7767: 'Utf16TestCases/Utf16Test: SameUtf8/148 8-byte object <FF-FF 02-00 7F-D8 FF-DF>' - PASSED gtests.sh: #7768: 'Utf16TestCases/Utf16Test: SameUtf8/149 8-byte object <00-00 03-00 80-D8 00-DC>' - PASSED gtests.sh: #7769: 'Utf16TestCases/Utf16Test: SameUtf8/150 8-byte object <01-00 03-00 80-D8 01-DC>' - PASSED gtests.sh: #7770: 'Utf16TestCases/Utf16Test: SameUtf8/151 8-byte object <02-00 03-00 80-D8 02-DC>' - PASSED gtests.sh: #7771: 'Utf16TestCases/Utf16Test: SameUtf8/152 8-byte object <04-00 03-00 80-D8 04-DC>' - PASSED gtests.sh: #7772: 'Utf16TestCases/Utf16Test: SameUtf8/153 8-byte object <08-00 03-00 80-D8 08-DC>' - PASSED gtests.sh: #7773: 'Utf16TestCases/Utf16Test: SameUtf8/154 8-byte object <10-00 03-00 80-D8 10-DC>' - PASSED gtests.sh: #7774: 'Utf16TestCases/Utf16Test: SameUtf8/155 8-byte object <20-00 03-00 80-D8 20-DC>' - PASSED gtests.sh: #7775: 'Utf16TestCases/Utf16Test: SameUtf8/156 8-byte object <40-00 03-00 80-D8 40-DC>' - PASSED gtests.sh: #7776: 'Utf16TestCases/Utf16Test: SameUtf8/157 8-byte object <80-00 03-00 80-D8 80-DC>' - PASSED gtests.sh: #7777: 'Utf16TestCases/Utf16Test: SameUtf8/158 8-byte object <00-01 03-00 80-D8 00-DD>' - PASSED gtests.sh: #7778: 'Utf16TestCases/Utf16Test: SameUtf8/159 8-byte object <00-02 03-00 80-D8 00-DE>' - PASSED gtests.sh: #7779: 'Utf16TestCases/Utf16Test: SameUtf8/160 8-byte object <00-04 03-00 81-D8 00-DC>' - PASSED gtests.sh: #7780: 'Utf16TestCases/Utf16Test: SameUtf8/161 8-byte object <00-08 03-00 82-D8 00-DC>' - PASSED gtests.sh: #7781: 'Utf16TestCases/Utf16Test: SameUtf8/162 8-byte object <00-10 03-00 84-D8 00-DC>' - PASSED gtests.sh: #7782: 'Utf16TestCases/Utf16Test: SameUtf8/163 8-byte object <00-20 03-00 88-D8 00-DC>' - PASSED gtests.sh: #7783: 'Utf16TestCases/Utf16Test: SameUtf8/164 8-byte object <00-40 03-00 90-D8 00-DC>' - PASSED gtests.sh: #7784: 'Utf16TestCases/Utf16Test: SameUtf8/165 8-byte object <00-80 03-00 A0-D8 00-DC>' - PASSED gtests.sh: #7785: 'Utf16TestCases/Utf16Test: SameUtf8/166 8-byte object <FF-FF 03-00 BF-D8 FF-DF>' - PASSED gtests.sh: #7786: 'Utf16TestCases/Utf16Test: SameUtf8/167 8-byte object <00-00 04-00 C0-D8 00-DC>' - PASSED gtests.sh: #7787: 'Utf16TestCases/Utf16Test: SameUtf8/168 8-byte object <01-00 04-00 C0-D8 01-DC>' - PASSED gtests.sh: #7788: 'Utf16TestCases/Utf16Test: SameUtf8/169 8-byte object <02-00 04-00 C0-D8 02-DC>' - PASSED gtests.sh: #7789: 'Utf16TestCases/Utf16Test: SameUtf8/170 8-byte object <04-00 04-00 C0-D8 04-DC>' - PASSED gtests.sh: #7790: 'Utf16TestCases/Utf16Test: SameUtf8/171 8-byte object <08-00 04-00 C0-D8 08-DC>' - PASSED gtests.sh: #7791: 'Utf16TestCases/Utf16Test: SameUtf8/172 8-byte object <10-00 04-00 C0-D8 10-DC>' - PASSED gtests.sh: #7792: 'Utf16TestCases/Utf16Test: SameUtf8/173 8-byte object <20-00 04-00 C0-D8 20-DC>' - PASSED gtests.sh: #7793: 'Utf16TestCases/Utf16Test: SameUtf8/174 8-byte object <40-00 04-00 C0-D8 40-DC>' - PASSED gtests.sh: #7794: 'Utf16TestCases/Utf16Test: SameUtf8/175 8-byte object <80-00 04-00 C0-D8 80-DC>' - PASSED gtests.sh: #7795: 'Utf16TestCases/Utf16Test: SameUtf8/176 8-byte object <00-01 04-00 C0-D8 00-DD>' - PASSED gtests.sh: #7796: 'Utf16TestCases/Utf16Test: SameUtf8/177 8-byte object <00-02 04-00 C0-D8 00-DE>' - PASSED gtests.sh: #7797: 'Utf16TestCases/Utf16Test: SameUtf8/178 8-byte object <00-04 04-00 C1-D8 00-DC>' - PASSED gtests.sh: #7798: 'Utf16TestCases/Utf16Test: SameUtf8/179 8-byte object <00-08 04-00 C2-D8 00-DC>' - PASSED gtests.sh: #7799: 'Utf16TestCases/Utf16Test: SameUtf8/180 8-byte object <00-10 04-00 C4-D8 00-DC>' - PASSED gtests.sh: #7800: 'Utf16TestCases/Utf16Test: SameUtf8/181 8-byte object <00-20 04-00 C8-D8 00-DC>' - PASSED gtests.sh: #7801: 'Utf16TestCases/Utf16Test: SameUtf8/182 8-byte object <00-40 04-00 D0-D8 00-DC>' - PASSED gtests.sh: #7802: 'Utf16TestCases/Utf16Test: SameUtf8/183 8-byte object <00-80 04-00 E0-D8 00-DC>' - PASSED gtests.sh: #7803: 'Utf16TestCases/Utf16Test: SameUtf8/184 8-byte object <FF-FF 04-00 FF-D8 FF-DF>' - PASSED gtests.sh: #7804: 'Utf16TestCases/Utf16Test: SameUtf8/185 8-byte object <00-00 05-00 00-D9 00-DC>' - PASSED gtests.sh: #7805: 'Utf16TestCases/Utf16Test: SameUtf8/186 8-byte object <01-00 05-00 00-D9 01-DC>' - PASSED gtests.sh: #7806: 'Utf16TestCases/Utf16Test: SameUtf8/187 8-byte object <02-00 05-00 00-D9 02-DC>' - PASSED gtests.sh: #7807: 'Utf16TestCases/Utf16Test: SameUtf8/188 8-byte object <04-00 05-00 00-D9 04-DC>' - PASSED gtests.sh: #7808: 'Utf16TestCases/Utf16Test: SameUtf8/189 8-byte object <08-00 05-00 00-D9 08-DC>' - PASSED gtests.sh: #7809: 'Utf16TestCases/Utf16Test: SameUtf8/190 8-byte object <10-00 05-00 00-D9 10-DC>' - PASSED gtests.sh: #7810: 'Utf16TestCases/Utf16Test: SameUtf8/191 8-byte object <20-00 05-00 00-D9 20-DC>' - PASSED gtests.sh: #7811: 'Utf16TestCases/Utf16Test: SameUtf8/192 8-byte object <40-00 05-00 00-D9 40-DC>' - PASSED gtests.sh: #7812: 'Utf16TestCases/Utf16Test: SameUtf8/193 8-byte object <80-00 05-00 00-D9 80-DC>' - PASSED gtests.sh: #7813: 'Utf16TestCases/Utf16Test: SameUtf8/194 8-byte object <00-01 05-00 00-D9 00-DD>' - PASSED gtests.sh: #7814: 'Utf16TestCases/Utf16Test: SameUtf8/195 8-byte object <00-02 05-00 00-D9 00-DE>' - PASSED gtests.sh: #7815: 'Utf16TestCases/Utf16Test: SameUtf8/196 8-byte object <00-04 05-00 01-D9 00-DC>' - PASSED gtests.sh: #7816: 'Utf16TestCases/Utf16Test: SameUtf8/197 8-byte object <00-08 05-00 02-D9 00-DC>' - PASSED gtests.sh: #7817: 'Utf16TestCases/Utf16Test: SameUtf8/198 8-byte object <00-10 05-00 04-D9 00-DC>' - PASSED gtests.sh: #7818: 'Utf16TestCases/Utf16Test: SameUtf8/199 8-byte object <00-20 05-00 08-D9 00-DC>' - PASSED gtests.sh: #7819: 'Utf16TestCases/Utf16Test: SameUtf8/200 8-byte object <00-40 05-00 10-D9 00-DC>' - PASSED gtests.sh: #7820: 'Utf16TestCases/Utf16Test: SameUtf8/201 8-byte object <00-80 05-00 20-D9 00-DC>' - PASSED gtests.sh: #7821: 'Utf16TestCases/Utf16Test: SameUtf8/202 8-byte object <00-00 06-00 40-D9 00-DC>' - PASSED gtests.sh: #7822: 'Utf16TestCases/Utf16Test: SameUtf8/203 8-byte object <00-00 07-00 80-D9 00-DC>' - PASSED gtests.sh: #7823: 'Utf16TestCases/Utf16Test: SameUtf8/204 8-byte object <FF-FF 07-00 BF-D9 FF-DF>' - PASSED gtests.sh: #7824: 'Utf16TestCases/Utf16Test: SameUtf8/205 8-byte object <00-00 08-00 C0-D9 00-DC>' - PASSED gtests.sh: #7825: 'Utf16TestCases/Utf16Test: SameUtf8/206 8-byte object <01-00 08-00 C0-D9 01-DC>' - PASSED gtests.sh: #7826: 'Utf16TestCases/Utf16Test: SameUtf8/207 8-byte object <02-00 08-00 C0-D9 02-DC>' - PASSED gtests.sh: #7827: 'Utf16TestCases/Utf16Test: SameUtf8/208 8-byte object <04-00 08-00 C0-D9 04-DC>' - PASSED gtests.sh: #7828: 'Utf16TestCases/Utf16Test: SameUtf8/209 8-byte object <08-00 08-00 C0-D9 08-DC>' - PASSED gtests.sh: #7829: 'Utf16TestCases/Utf16Test: SameUtf8/210 8-byte object <10-00 08-00 C0-D9 10-DC>' - PASSED gtests.sh: #7830: 'Utf16TestCases/Utf16Test: SameUtf8/211 8-byte object <20-00 08-00 C0-D9 20-DC>' - PASSED gtests.sh: #7831: 'Utf16TestCases/Utf16Test: SameUtf8/212 8-byte object <40-00 08-00 C0-D9 40-DC>' - PASSED gtests.sh: #7832: 'Utf16TestCases/Utf16Test: SameUtf8/213 8-byte object <80-00 08-00 C0-D9 80-DC>' - PASSED gtests.sh: #7833: 'Utf16TestCases/Utf16Test: SameUtf8/214 8-byte object <00-01 08-00 C0-D9 00-DD>' - PASSED gtests.sh: #7834: 'Utf16TestCases/Utf16Test: SameUtf8/215 8-byte object <00-02 08-00 C0-D9 00-DE>' - PASSED gtests.sh: #7835: 'Utf16TestCases/Utf16Test: SameUtf8/216 8-byte object <00-04 08-00 C1-D9 00-DC>' - PASSED gtests.sh: #7836: 'Utf16TestCases/Utf16Test: SameUtf8/217 8-byte object <00-08 08-00 C2-D9 00-DC>' - PASSED gtests.sh: #7837: 'Utf16TestCases/Utf16Test: SameUtf8/218 8-byte object <00-10 08-00 C4-D9 00-DC>' - PASSED gtests.sh: #7838: 'Utf16TestCases/Utf16Test: SameUtf8/219 8-byte object <00-20 08-00 C8-D9 00-DC>' - PASSED gtests.sh: #7839: 'Utf16TestCases/Utf16Test: SameUtf8/220 8-byte object <00-40 08-00 D0-D9 00-DC>' - PASSED gtests.sh: #7840: 'Utf16TestCases/Utf16Test: SameUtf8/221 8-byte object <00-80 08-00 E0-D9 00-DC>' - PASSED gtests.sh: #7841: 'Utf16TestCases/Utf16Test: SameUtf8/222 8-byte object <FF-FF 08-00 FF-D9 FF-DF>' - PASSED gtests.sh: #7842: 'Utf16TestCases/Utf16Test: SameUtf8/223 8-byte object <00-00 09-00 00-DA 00-DC>' - PASSED gtests.sh: #7843: 'Utf16TestCases/Utf16Test: SameUtf8/224 8-byte object <01-00 09-00 00-DA 01-DC>' - PASSED gtests.sh: #7844: 'Utf16TestCases/Utf16Test: SameUtf8/225 8-byte object <02-00 09-00 00-DA 02-DC>' - PASSED gtests.sh: #7845: 'Utf16TestCases/Utf16Test: SameUtf8/226 8-byte object <04-00 09-00 00-DA 04-DC>' - PASSED gtests.sh: #7846: 'Utf16TestCases/Utf16Test: SameUtf8/227 8-byte object <08-00 09-00 00-DA 08-DC>' - PASSED gtests.sh: #7847: 'Utf16TestCases/Utf16Test: SameUtf8/228 8-byte object <10-00 09-00 00-DA 10-DC>' - PASSED gtests.sh: #7848: 'Utf16TestCases/Utf16Test: SameUtf8/229 8-byte object <20-00 09-00 00-DA 20-DC>' - PASSED gtests.sh: #7849: 'Utf16TestCases/Utf16Test: SameUtf8/230 8-byte object <40-00 09-00 00-DA 40-DC>' - PASSED gtests.sh: #7850: 'Utf16TestCases/Utf16Test: SameUtf8/231 8-byte object <80-00 09-00 00-DA 80-DC>' - PASSED gtests.sh: #7851: 'Utf16TestCases/Utf16Test: SameUtf8/232 8-byte object <00-01 09-00 00-DA 00-DD>' - PASSED gtests.sh: #7852: 'Utf16TestCases/Utf16Test: SameUtf8/233 8-byte object <00-02 09-00 00-DA 00-DE>' - PASSED gtests.sh: #7853: 'Utf16TestCases/Utf16Test: SameUtf8/234 8-byte object <00-04 09-00 01-DA 00-DC>' - PASSED gtests.sh: #7854: 'Utf16TestCases/Utf16Test: SameUtf8/235 8-byte object <00-08 09-00 02-DA 00-DC>' - PASSED gtests.sh: #7855: 'Utf16TestCases/Utf16Test: SameUtf8/236 8-byte object <00-10 09-00 04-DA 00-DC>' - PASSED gtests.sh: #7856: 'Utf16TestCases/Utf16Test: SameUtf8/237 8-byte object <00-20 09-00 08-DA 00-DC>' - PASSED gtests.sh: #7857: 'Utf16TestCases/Utf16Test: SameUtf8/238 8-byte object <00-40 09-00 10-DA 00-DC>' - PASSED gtests.sh: #7858: 'Utf16TestCases/Utf16Test: SameUtf8/239 8-byte object <00-80 09-00 20-DA 00-DC>' - PASSED gtests.sh: #7859: 'Utf16TestCases/Utf16Test: SameUtf8/240 8-byte object <00-00 0A-00 40-DA 00-DC>' - PASSED gtests.sh: #7860: 'Utf16TestCases/Utf16Test: SameUtf8/241 8-byte object <00-00 0B-00 80-DA 00-DC>' - PASSED gtests.sh: #7861: 'Utf16TestCases/Utf16Test: SameUtf8/242 8-byte object <00-00 0C-00 C0-DA 00-DC>' - PASSED gtests.sh: #7862: 'Utf16TestCases/Utf16Test: SameUtf8/243 8-byte object <00-00 0D-00 00-DB 00-DC>' - PASSED gtests.sh: #7863: 'Utf16TestCases/Utf16Test: SameUtf8/244 8-byte object <FF-FF 0F-00 BF-DB FF-DF>' - PASSED gtests.sh: #7864: 'Utf16TestCases/Utf16Test: SameUtf8/245 8-byte object <FF-FF 10-00 FF-DB FF-DF>' - PASSED gtests.sh: #7865: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/0 "xC0x80"' - PASSED gtests.sh: #7866: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/1 "xC1xBF"' - PASSED gtests.sh: #7867: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/2 "xE0x80x80"' - PASSED gtests.sh: #7868: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/3 "xE0x9FxBF"' - PASSED gtests.sh: #7869: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/4 "xF0x80x80x80"' - PASSED gtests.sh: #7870: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/5 "xF0x8FxBFxBF"' - PASSED gtests.sh: #7871: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/6 "xF4x90x80x80"' - PASSED gtests.sh: #7872: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/7 "xF7xBFxBFxBF"' - PASSED gtests.sh: #7873: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/8 "xF8x80x80x80x80"' - PASSED gtests.sh: #7874: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/9 "xF8x88x80x80x80"' - PASSED gtests.sh: #7875: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/10 "xF8x92x80x80x80"' - PASSED gtests.sh: #7876: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/11 "xF8x9FxBFxBFxBF"' - PASSED gtests.sh: #7877: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/12 "xF8xA0x80x80x80"' - PASSED gtests.sh: #7878: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/13 "xF8xA8x80x80x80"' - PASSED gtests.sh: #7879: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/14 "xF8xB0x80x80x80"' - PASSED gtests.sh: #7880: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/15 "xF8xBFxBFxBFxBF"' - PASSED gtests.sh: #7881: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/16 "xF9x80x80x80x88"' - PASSED gtests.sh: #7882: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/17 "xF9x84x80x80x80"' - PASSED gtests.sh: #7883: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/18 "xF9xBFxBFxBFxBF"' - PASSED gtests.sh: #7884: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/19 "xFAx80x80x80x80"' - PASSED gtests.sh: #7885: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/20 "xFAx90x80x80x80"' - PASSED gtests.sh: #7886: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/21 "xFBxBFxBFxBFxBF"' - PASSED gtests.sh: #7887: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/22 "xFCx84x80x80x80x81"' - PASSED gtests.sh: #7888: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/23 "xFCx85x80x80x80x80"' - PASSED gtests.sh: #7889: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/24 "xFCx86x80x80x80x80"' - PASSED gtests.sh: #7890: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/25 "xFCx87xBFxBFxBFxBF"' - PASSED gtests.sh: #7891: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/26 "xFCx88xA0x80x80x80"' - PASSED gtests.sh: #7892: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/27 "xFCx89x80x80x80x80"' - PASSED gtests.sh: #7893: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/28 "xFCx8Ax80x80x80x80"' - PASSED gtests.sh: #7894: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/29 "xFCx90x80x80x80x82"' - PASSED gtests.sh: #7895: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/30 "xFDx80x80x80x80x80"' - PASSED gtests.sh: #7896: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/31 "xFDxBFxBFxBFxBFxBF"' - PASSED gtests.sh: #7897: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/32 "x80"' - PASSED gtests.sh: #7898: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/33 "xC3"' - PASSED gtests.sh: #7899: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/34 "xC3xC3x80"' - PASSED gtests.sh: #7900: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/35 "xEDxA0x80"' - PASSED gtests.sh: #7901: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/36 "xEDxBFx80"' - PASSED gtests.sh: #7902: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/37 "xEDxBFxBF"' - PASSED gtests.sh: #7903: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs2/38 "xEDxA0x80xE0xBFxBF"' - PASSED gtests.sh: #7904: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/0 "xC0x80"' - PASSED gtests.sh: #7905: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/1 "xC1xBF"' - PASSED gtests.sh: #7906: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/2 "xE0x80x80"' - PASSED gtests.sh: #7907: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/3 "xE0x9FxBF"' - PASSED gtests.sh: #7908: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/4 "xF0x80x80x80"' - PASSED gtests.sh: #7909: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/5 "xF0x8FxBFxBF"' - PASSED gtests.sh: #7910: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/6 "xF4x90x80x80"' - PASSED gtests.sh: #7911: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/7 "xF7xBFxBFxBF"' - PASSED gtests.sh: #7912: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/8 "xF8x80x80x80x80"' - PASSED gtests.sh: #7913: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/9 "xF8x88x80x80x80"' - PASSED gtests.sh: #7914: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/10 "xF8x92x80x80x80"' - PASSED gtests.sh: #7915: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/11 "xF8x9FxBFxBFxBF"' - PASSED gtests.sh: #7916: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/12 "xF8xA0x80x80x80"' - PASSED gtests.sh: #7917: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/13 "xF8xA8x80x80x80"' - PASSED gtests.sh: #7918: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/14 "xF8xB0x80x80x80"' - PASSED gtests.sh: #7919: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/15 "xF8xBFxBFxBFxBF"' - PASSED gtests.sh: #7920: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/16 "xF9x80x80x80x88"' - PASSED gtests.sh: #7921: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/17 "xF9x84x80x80x80"' - PASSED gtests.sh: #7922: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/18 "xF9xBFxBFxBFxBF"' - PASSED gtests.sh: #7923: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/19 "xFAx80x80x80x80"' - PASSED gtests.sh: #7924: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/20 "xFAx90x80x80x80"' - PASSED gtests.sh: #7925: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/21 "xFBxBFxBFxBFxBF"' - PASSED gtests.sh: #7926: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/22 "xFCx84x80x80x80x81"' - PASSED gtests.sh: #7927: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/23 "xFCx85x80x80x80x80"' - PASSED gtests.sh: #7928: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/24 "xFCx86x80x80x80x80"' - PASSED gtests.sh: #7929: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/25 "xFCx87xBFxBFxBFxBF"' - PASSED gtests.sh: #7930: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/26 "xFCx88xA0x80x80x80"' - PASSED gtests.sh: #7931: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/27 "xFCx89x80x80x80x80"' - PASSED gtests.sh: #7932: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/28 "xFCx8Ax80x80x80x80"' - PASSED gtests.sh: #7933: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/29 "xFCx90x80x80x80x82"' - PASSED gtests.sh: #7934: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/30 "xFDx80x80x80x80x80"' - PASSED gtests.sh: #7935: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/31 "xFDxBFxBFxBFxBFxBF"' - PASSED gtests.sh: #7936: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/32 "x80"' - PASSED gtests.sh: #7937: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/33 "xC3"' - PASSED gtests.sh: #7938: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/34 "xC3xC3x80"' - PASSED gtests.sh: #7939: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/35 "xEDxA0x80"' - PASSED gtests.sh: #7940: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/36 "xEDxBFx80"' - PASSED gtests.sh: #7941: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/37 "xEDxBFxBF"' - PASSED gtests.sh: #7942: 'BadUtf8TestCases/BadUtf8Test: HasNoUcs4/38 "xEDxA0x80xE0xBFxBF"' - PASSED gtests.sh: #7943: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/0 6-byte object <00-D8 00-00 00-00>' - PASSED gtests.sh: #7944: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/1 6-byte object <00-D8 41-00 00-00>' - PASSED gtests.sh: #7945: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/2 6-byte object <00-D8 FE-00 00-00>' - PASSED gtests.sh: #7946: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/3 6-byte object <00-D8 BB-03 00-00>' - PASSED gtests.sh: #7947: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/4 6-byte object <00-D8 00-D8 00-00>' - PASSED gtests.sh: #7948: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/5 6-byte object <00-D8 FF-FE 00-00>' - PASSED gtests.sh: #7949: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/6 6-byte object <00-D8 FD-FF 00-00>' - PASSED gtests.sh: #7950: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/7 6-byte object <00-DC 00-00 00-00>' - PASSED gtests.sh: #7951: 'BadUtf16TestCases/BadUtf16Test: HasNoUtf8/8 6-byte object <6D-DE 34-D8 00-00>' - PASSED gtests.sh: #7952: 'Iso88591TestCases/Iso88591Test: ToUtf8/0 8-byte object <01-00 00-00 BA-D2 5C-56>' - PASSED gtests.sh: #7953: 'Iso88591TestCases/Iso88591Test: ToUtf8/1 8-byte object <02-00 00-00 BC-D2 5C-56>' - PASSED gtests.sh: #7954: 'Iso88591TestCases/Iso88591Test: ToUtf8/2 8-byte object <03-00 00-00 BE-D2 5C-56>' - PASSED gtests.sh: #7955: 'Iso88591TestCases/Iso88591Test: ToUtf8/3 8-byte object <04-00 00-00 C0-D2 5C-56>' - PASSED gtests.sh: #7956: 'Iso88591TestCases/Iso88591Test: ToUtf8/4 8-byte object <07-00 00-00 C2-D2 5C-56>' - PASSED gtests.sh: #7957: 'Iso88591TestCases/Iso88591Test: ToUtf8/5 8-byte object <08-00 00-00 C4-D2 5C-56>' - PASSED gtests.sh: #7958: 'Iso88591TestCases/Iso88591Test: ToUtf8/6 8-byte object <0F-00 00-00 C6-D2 5C-56>' - PASSED gtests.sh: #7959: 'Iso88591TestCases/Iso88591Test: ToUtf8/7 8-byte object <10-00 00-00 C8-D2 5C-56>' - PASSED gtests.sh: #7960: 'Iso88591TestCases/Iso88591Test: ToUtf8/8 8-byte object <1F-00 00-00 CA-D2 5C-56>' - PASSED gtests.sh: #7961: 'Iso88591TestCases/Iso88591Test: ToUtf8/9 8-byte object <20-00 00-00 DB-47 5D-56>' - PASSED gtests.sh: #7962: 'Iso88591TestCases/Iso88591Test: ToUtf8/10 8-byte object <3F-00 00-00 E7-97 5C-56>' - PASSED gtests.sh: #7963: 'Iso88591TestCases/Iso88591Test: ToUtf8/11 8-byte object <40-00 00-00 0A-98 5C-56>' - PASSED gtests.sh: #7964: 'Iso88591TestCases/Iso88591Test: ToUtf8/12 8-byte object <7F-00 00-00 CC-D2 5C-56>' - PASSED gtests.sh: #7965: 'Iso88591TestCases/Iso88591Test: ToUtf8/13 8-byte object <80-00 00-00 CE-D2 5C-56>' - PASSED gtests.sh: #7966: 'Iso88591TestCases/Iso88591Test: ToUtf8/14 8-byte object <81-00 00-00 D1-D2 5C-56>' - PASSED gtests.sh: #7967: 'Iso88591TestCases/Iso88591Test: ToUtf8/15 8-byte object <82-00 00-00 D4-D2 5C-56>' - PASSED gtests.sh: #7968: 'Iso88591TestCases/Iso88591Test: ToUtf8/16 8-byte object <84-00 00-00 D7-D2 5C-56>' - PASSED gtests.sh: #7969: 'Iso88591TestCases/Iso88591Test: ToUtf8/17 8-byte object <88-00 00-00 DA-D2 5C-56>' - PASSED gtests.sh: #7970: 'Iso88591TestCases/Iso88591Test: ToUtf8/18 8-byte object <90-00 00-00 DD-D2 5C-56>' - PASSED gtests.sh: #7971: 'Iso88591TestCases/Iso88591Test: ToUtf8/19 8-byte object <A0-00 00-00 E0-D2 5C-56>' - PASSED gtests.sh: #7972: 'Iso88591TestCases/Iso88591Test: ToUtf8/20 8-byte object <C0-00 00-00 15-D1 5C-56>' - PASSED gtests.sh: #7973: 'Iso88591TestCases/Iso88591Test: ToUtf8/21 8-byte object <FF-00 00-00 E3-D2 5C-56>' - PASSED gtests.sh: #7974: 'AllAligned/AlignedMallocTest: TestNew/0 1' - PASSED gtests.sh: #7975: 'AllAligned/AlignedMallocTest: TestNew/1 2' - PASSED gtests.sh: #7976: 'AllAligned/AlignedMallocTest: TestNew/2 4' - PASSED gtests.sh: #7977: 'AllAligned/AlignedMallocTest: TestNew/3 8' - PASSED gtests.sh: #7978: 'AllAligned/AlignedMallocTest: TestNew/4 16' - PASSED gtests.sh: #7979: 'AllAligned/AlignedMallocTest: TestNew/5 32' - PASSED gtests.sh: #7980: 'AllAligned/AlignedMallocTest: TestNew/6 64' - PASSED gtests.sh: #7981: 'AllAligned/AlignedMallocTest: TestAlloc/0 1' - PASSED gtests.sh: #7982: 'AllAligned/AlignedMallocTest: TestAlloc/1 2' - PASSED gtests.sh: #7983: 'AllAligned/AlignedMallocTest: TestAlloc/2 4' - PASSED gtests.sh: #7984: 'AllAligned/AlignedMallocTest: TestAlloc/3 8' - PASSED gtests.sh: #7985: 'AllAligned/AlignedMallocTest: TestAlloc/4 16' - PASSED gtests.sh: #7986: 'AllAligned/AlignedMallocTest: TestAlloc/5 32' - PASSED gtests.sh: #7987: 'AllAligned/AlignedMallocTest: TestAlloc/6 64' - PASSED gtests.sh: #7988: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestNew/0 0' - PASSED gtests.sh: #7989: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestNew/1 7' - PASSED gtests.sh: #7990: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestNew/2 17' - PASSED gtests.sh: #7991: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestNew/3 24' - PASSED gtests.sh: #7992: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestNew/4 56' - PASSED gtests.sh: #7993: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestAlloc/0 0' - PASSED gtests.sh: #7994: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestAlloc/1 7' - PASSED gtests.sh: #7995: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestAlloc/2 17' - PASSED gtests.sh: #7996: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestAlloc/3 24' - PASSED gtests.sh: #7997: 'AllAlignedBadSize/AlignedMallocTestBadSize: TestAlloc/4 56' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: freebl_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/freebl_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/freebl_gtest -n dummy -s CN=dummy -t ,, -x -m 7 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #7998: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/freebl_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing freebl_gtest [==========] Running 16 tests from 4 test suites. [----------] Global test environment set-up. [----------] 5 tests from CmacAesTest [ RUN ] CmacAesTest.CreateInvalidSize [ OK ] CmacAesTest.CreateInvalidSize (0 ms) [ RUN ] CmacAesTest.CreateRightSize [ OK ] CmacAesTest.CreateRightSize (0 ms) [ RUN ] CmacAesTest.AesNistAligned [ OK ] CmacAesTest.AesNistAligned (0 ms) [ RUN ] CmacAesTest.AesNistUnaligned [ OK ] CmacAesTest.AesNistUnaligned (0 ms) [ RUN ] CmacAesTest.AesNistTruncated [ OK ] CmacAesTest.AesNistTruncated (0 ms) [----------] 5 tests from CmacAesTest (0 ms total) [----------] 6 tests from RSATest [ RUN ] RSATest.expOneTest [ OK ] RSATest.expOneTest (0 ms) [ RUN ] RSATest.expTwoTest [ OK ] RSATest.expTwoTest (0 ms) [ RUN ] RSATest.expFourTest [ OK ] RSATest.expFourTest (0 ms) [ RUN ] RSATest.WrongKeysizeTest [ OK ] RSATest.WrongKeysizeTest (0 ms) [ RUN ] RSATest.expThreeTest [ OK ] RSATest.expThreeTest (0 ms) [ RUN ] RSATest.DecryptBlockTestErrors [ OK ] RSATest.DecryptBlockTestErrors (440 ms) [----------] 6 tests from RSATest (440 ms total) [----------] 2 tests from ECLTest [ RUN ] ECLTest.TestECDH_DeriveP256 [ OK ] ECLTest.TestECDH_DeriveP256 (0 ms) [ RUN ] ECLTest.TestECDH_DeriveP521 derived secret: 01BC33425E72A12779EACB2EDCC5B63D1281F7E86DBC7BF99A7ABD0CFE367DE4666D6EDBB8525BFFE5222F0702C3096DEC0884CE572F5A15C423FDF44D01DD99C61D [ OK ] ECLTest.TestECDH_DeriveP521 (16 ms) [----------] 2 tests from ECLTest (16 ms total) [----------] 3 tests from DHTest [ RUN ] DHTest.DhGenParamSuccessTest16 [ OK ] DHTest.DhGenParamSuccessTest16 (39 ms) [ RUN ] DHTest.DhGenParamSuccessTest224 [ OK ] DHTest.DhGenParamSuccessTest224 (7537 ms) [ RUN ] DHTest.DhGenParamSuccessTest256 [ OK ] DHTest.DhGenParamSuccessTest256 (18102 ms) [----------] 3 tests from DHTest (25679 ms total) [----------] Global test environment tear-down [==========] 16 tests from 4 test suites ran. (26136 ms total) [ PASSED ] 16 tests. gtests.sh: #7999: freebl_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/freebl_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #8000: 'CmacAesTest: CreateInvalidSize' - PASSED gtests.sh: #8001: 'CmacAesTest: CreateRightSize' - PASSED gtests.sh: #8002: 'CmacAesTest: AesNistAligned' - PASSED gtests.sh: #8003: 'CmacAesTest: AesNistUnaligned' - PASSED gtests.sh: #8004: 'CmacAesTest: AesNistTruncated' - PASSED gtests.sh: #8005: 'RSATest: expOneTest' - PASSED gtests.sh: #8006: 'RSATest: expTwoTest' - PASSED gtests.sh: #8007: 'RSATest: expFourTest' - PASSED gtests.sh: #8008: 'RSATest: WrongKeysizeTest' - PASSED gtests.sh: #8009: 'RSATest: expThreeTest' - PASSED gtests.sh: #8010: 'RSATest: DecryptBlockTestErrors' - PASSED gtests.sh: #8011: 'ECLTest: TestECDH_DeriveP256' - PASSED gtests.sh: #8012: 'ECLTest: TestECDH_DeriveP521' - PASSED gtests.sh: #8013: 'DHTest: DhGenParamSuccessTest16' - PASSED gtests.sh: #8014: 'DHTest: DhGenParamSuccessTest224' - PASSED gtests.sh: #8015: 'DHTest: DhGenParamSuccessTest256' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: softoken_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/softoken_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/softoken_gtest -n dummy -s CN=dummy -t ,, -x -m 8 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #8016: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/softoken_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing softoken_gtest [==========] Running 139 tests from 9 test suites. [----------] Global test environment set-up. [----------] 3 tests from SoftokenBuiltinsTest [ RUN ] SoftokenBuiltinsTest.CheckNoDistrustFields [ OK ] SoftokenBuiltinsTest.CheckNoDistrustFields (68 ms) [ RUN ] SoftokenBuiltinsTest.CheckOkDistrustFields [ OK ] SoftokenBuiltinsTest.CheckOkDistrustFields (74 ms) [ RUN ] SoftokenBuiltinsTest.CheckInvalidDistrustFields [ OK ] SoftokenBuiltinsTest.CheckInvalidDistrustFields (69 ms) [----------] 3 tests from SoftokenBuiltinsTest (211 ms total) [----------] 14 tests from SoftokenTest [ RUN ] SoftokenTest.CheckDefaultPbkdf2Iterations [ OK ] SoftokenTest.CheckDefaultPbkdf2Iterations (71 ms) [ RUN ] SoftokenTest.ResetSoftokenEmptyPassword [ OK ] SoftokenTest.ResetSoftokenEmptyPassword (73 ms) [ RUN ] SoftokenTest.ResetSoftokenNonEmptyPassword [ OK ] SoftokenTest.ResetSoftokenNonEmptyPassword (77 ms) [ RUN ] SoftokenTest.GetInvalidAttribute [ OK ] SoftokenTest.GetInvalidAttribute (98 ms) [ RUN ] SoftokenTest.GetValidAttributes [ OK ] SoftokenTest.GetValidAttributes (99 ms) [ RUN ] SoftokenTest.GetOnlyInvalidAttributes [ OK ] SoftokenTest.GetOnlyInvalidAttributes (102 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed1 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed1 (106 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed2 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed2 (103 ms) [ RUN ] SoftokenTest.GetAttributesInvalidInterspersed3 [ OK ] SoftokenTest.GetAttributesInvalidInterspersed3 (101 ms) [ RUN ] SoftokenTest.CreateObjectNonEmptyPassword [ OK ] SoftokenTest.CreateObjectNonEmptyPassword (70 ms) [ RUN ] SoftokenTest.CreateObjectChangePassword [ OK ] SoftokenTest.CreateObjectChangePassword (74 ms) [ RUN ] SoftokenTest.CreateObjectChangeToBigPassword [ OK ] SoftokenTest.CreateObjectChangeToBigPassword (77 ms) [ RUN ] SoftokenTest.CreateObjectChangeToEmptyPassword [ OK ] SoftokenTest.CreateObjectChangeToEmptyPassword (80 ms) [ RUN ] SoftokenTest.CreateObjectReadBreakLine [ OK ] SoftokenTest.CreateObjectReadBreakLine (231 ms) [----------] 14 tests from SoftokenTest (1370 ms total) [----------] 1 test from SoftokenNonAsciiTest [ RUN ] SoftokenNonAsciiTest.NonAsciiPathWorking [ OK ] SoftokenNonAsciiTest.NonAsciiPathWorking (73 ms) [----------] 1 test from SoftokenNonAsciiTest (73 ms total) [----------] 1 test from SoftokenNoDBTest [ RUN ] SoftokenNoDBTest.NeedUserInitNoDB [ OK ] SoftokenNoDBTest.NeedUserInitNoDB (54 ms) [----------] 1 test from SoftokenNoDBTest (54 ms total) [----------] 3 tests from SoftokenPasswordChangeTests/SoftokenPasswordChangeTest [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/0 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/0 (109 ms) [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/1 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/1 (107 ms) [ RUN ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/2 [ OK ] SoftokenPasswordChangeTests/SoftokenPasswordChangeTest.KeepTrustAfterPasswordChange/2 (141 ms) [----------] 3 tests from SoftokenPasswordChangeTests/SoftokenPasswordChangeTest (358 ms total) [----------] 54 tests from DhValidateCases/SoftokenDhValidate [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/0 Test: IKE 1536 param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/0 (64 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/1 Test: IKE 2048 param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/1 (70 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/2 Test: TLS 3048 param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/2 (72 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/3 Test: IKE 3072 param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/3 (84 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/4 Test: TLS 3072 param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/4 (82 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/5 Test: IKE 4096 param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/5 (97 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/6 Test: TLS 4096 param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/6 (106 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/7 Test: IKE 6144 param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/7 (145 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/8 Test: TLS 6144 param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/8 (145 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/9 Test: IKE 8192 param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/9 (281 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/10 Test: TLS 8192 param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/10 (290 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/11 Test: IKE 1536 with subprime param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [192] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/11 (67 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/12 Test: IKE 2048 with subprime param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [256] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/12 (71 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/13 Test: TLS 2048 with subprime param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [256] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/13 (70 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/14 Test: IKE 3072 with subprime param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [384] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/14 (88 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/15 Test: TLS 3072 with subprime param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [384] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/15 (86 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/16 Test: IKE 4096 with subprime param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [512] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/16 (101 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/17 Test: TLS 4096 with subprime param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [512] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/17 (99 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/18 Test: IKE 6144 with subprime param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [768] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/18 (146 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/19 Test: TLS 6144 with subprime param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/19 (149 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/20 Test: IKE 8192 with subprime param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [1024] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/20 (289 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/21 Test: TLS 8192 with subprime param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [1024] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/21 (294 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/22 Test: Safe Prime 1536 param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/22 (77 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/23 Test: Safe Prime 2048 param_type: SAFE_PRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/23 (72 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/24 Test: Safe Prime 3072 param_type: SAFE_PRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/24 (84 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/25 Test: Safe Prime 4096 param_type: SAFE_PRIME, key_class: CLASS_4096 p: [512] 8bdfc1a3e4bd1cb1f4b151d38ace3d335880a31c7c0dbd8ebdb3e79ed4de06fc... g: [1] 02 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/25 (101 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/26 Test: Safe Prime 6144 param_type: SAFE_PRIME, key_class: CLASS_6144 p: [768] b90fc1414ade1a1c80a0d6398110f309cac0608c5e8c1721a01850d66013fc38... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/26 (149 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/27 Test: Safe Prime 8192 param_type: SAFE_PRIME, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 03 q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/27 (286 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/28 Test: Safe Prime 1536 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [192] 7bb398e422b56cf5298590e3a57d40b33b2e755bfa889936e9a63d561c8b8d43... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/28 (1098 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/29 Test: Safe Prime 2048 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/29 (2408 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/30 Test: Safe Prime 3072 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [384] 43b36ffbf624b54d3e4b1457339c55fd7f2e233df7f48c533b5972875f5c7940... pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/30 (7846 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/31 Test: Weak Prime 1024 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/31 (65 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/32 Test: Weak Prime 2048 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/32 (72 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/33 Test: Weak Prime 3072 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/33 (86 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/34 Test: Weak Prime 4096 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/34 (101 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/35 Test: Weak Prime 6144 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_6144 p: [768] a22496b62168d57e2c604dc881599c1c70ec2428b652360987aac15be5a63e88... g: [768] 34c2b21fd94eb6fd6c0147b950f1be071cdd67a2f17c0de59b7c9e0ed9f881a1... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/35 (161 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/36 Test: Weak Prime 8192 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_8192 p: [1024] 93df6d37dc2aa4ab5ddc734212188f394773f53ebc6e0d2a685d534f228ca8a8... g: [1024] 784d5da1ce9d68ae473181088c24386ac8c7f41ca1cb5d65046e0dbe551d25c2... q: [0] pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/36 (283 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/37 Test: Weak Prime 1024 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/37 (246 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/38 Test: Weak Prime 2048 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/38 (1286 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/39 Test: Weak Prime 3072 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [0] [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/39 (4032 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/40 Test: Weak Prime 1024 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [128] 724104a535df4da888d03a12ffa80e056b685e699244baba59eb35fa63afb576... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/40 (243 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/41 Test: Weak Prime 2048 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [256] 5a8441b5111cef817f39b5fd86a756a587fed913f3e91aea41f95e14ffa87bb5... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/41 (1246 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/42 Test: Weak Prime 3072 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [384] 4a1963a3a8d181cdf928ae34d7829e3b3151762d666fc07996e752d2cf16d5af... pub_key: [0] PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/42 (3975 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/43 Test: Pubkey = 0 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [1] 00 PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/43 (67 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/44 Test: PubKey = 1 TLS 2048 param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [1] 01 PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/44 (68 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/45 Test: Pubkey == -1 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/45 (65 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/46 Test: Pubkey = -1 SAFE 2048 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/46 (2457 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/47 Test: Pubkey = -1 WEAK 3072 KNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/47 (3977 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/48 Test: Pubkey = -1 WEAK 4096 UNKNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/48 (90 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/49 Test: Pubkey = -1 TLS 6144 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/49 (121 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/50 Test: Pubkey = -1 SAFE 8192 param_type: BAD_PUB_KEY, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 02 q: [0] pub_key: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/50 (215 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/51 Test: Pubkey small subgroup Weak 1024 prime param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/51 (251 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/52 Test: Pubkey small subgroup Weak 2048 prime param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/52 (1287 ms) [ RUN ] DhValidateCases/SoftokenDhValidate.DhVectors/53 Test: Pubkey small subgroup Weak 3072 prime param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [1] 03 PK11_PubDerive failed: security library: invalid arguments. [ OK ] DhValidateCases/SoftokenDhValidate.DhVectors/53 (4007 ms) [----------] 54 tests from DhValidateCases/SoftokenDhValidate (39447 ms total) [----------] 3 tests from FipsPasswordCases/SoftokenFipsPasswordTest [ RUN ] FipsPasswordCases/SoftokenFipsPasswordTest.SetPassword/0 [ OK ] FipsPasswordCases/SoftokenFipsPasswordTest.SetPassword/0 (74 ms) [ RUN ] FipsPasswordCases/SoftokenFipsPasswordTest.SetPassword/1 [ OK ] FipsPasswordCases/SoftokenFipsPasswordTest.SetPassword/1 (76 ms) [ RUN ] FipsPasswordCases/SoftokenFipsPasswordTest.SetPassword/2 [ OK ] FipsPasswordCases/SoftokenFipsPasswordTest.SetPassword/2 (85 ms) [----------] 3 tests from FipsPasswordCases/SoftokenFipsPasswordTest (235 ms total) [----------] 6 tests from BadFipsPasswordCases/SoftokenFipsBadPasswordTest [ RUN ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/0 [ OK ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/0 (75 ms) [ RUN ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/1 [ OK ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/1 (72 ms) [ RUN ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/2 [ OK ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/2 (79 ms) [ RUN ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/3 [ OK ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/3 (64 ms) [ RUN ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/4 [ OK ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/4 (66 ms) [ RUN ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/5 [ OK ] BadFipsPasswordCases/SoftokenFipsBadPasswordTest.SetBadPassword/5 (71 ms) [----------] 6 tests from BadFipsPasswordCases/SoftokenFipsBadPasswordTest (430 ms total) [----------] 54 tests from FipsDhCases/SoftokenFipsDhValidate [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/0 Test:IKE 1536 param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/0 (68 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/1 Test:IKE 2048 param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/1 (100 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/2 Test:TLS 3048 param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/2 (101 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/3 Test:IKE 3072 param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/3 (174 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/4 Test:TLS 3072 param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/4 (171 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/5 Test:IKE 4096 param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/5 (290 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/6 Test:TLS 4096 param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/6 (292 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/7 Test:IKE 6144 param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/7 (763 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/8 Test:TLS 6144 param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/8 (758 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/9 Test:IKE 8192 param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/9 (1793 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/10 Test:TLS 8192 param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/10 (1775 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/11 Test:IKE 1536 with subprime param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [192] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/11 (71 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/12 Test:IKE 2048 with subprime param_type: IKE_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [256] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/12 (104 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/13 Test:TLS 2048 with subprime param_type: TLS_APPROVED, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [256] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/13 (103 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/14 Test:IKE 3072 with subprime param_type: IKE_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [384] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/14 (169 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/15 Test:TLS 3072 with subprime param_type: TLS_APPROVED, key_class: CLASS_3072 p: [384] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [384] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/15 (168 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/16 Test:IKE 4096 with subprime param_type: IKE_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [512] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/16 (292 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/17 Test:TLS 4096 with subprime param_type: TLS_APPROVED, key_class: CLASS_4096 p: [512] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [512] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/17 (301 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/18 Test:IKE 6144 with subprime param_type: IKE_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [768] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/18 (756 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/19 Test:TLS 6144 with subprime param_type: TLS_APPROVED, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/19 (770 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/20 Test:IKE 8192 with subprime param_type: IKE_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [1024] 7fffffffffffffffe487ed5110b4611a62633145c06e0e68948127044533e63a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/20 (1771 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/21 Test:TLS 8192 with subprime param_type: TLS_APPROVED, key_class: CLASS_8192 p: [1024] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [1024] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/21 (1754 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/22 Test:Safe Prime 1536 param_type: SAFE_PRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/22 (71 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/23 Test:Safe Prime 2048 param_type: SAFE_PRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 03 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/23 (72 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/24 Test:Safe Prime 3072 param_type: SAFE_PRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/24 (85 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/25 Test:Safe Prime 4096 param_type: SAFE_PRIME, key_class: CLASS_4096 p: [512] 8bdfc1a3e4bd1cb1f4b151d38ace3d335880a31c7c0dbd8ebdb3e79ed4de06fc... g: [1] 02 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/25 (94 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/26 Test:Safe Prime 6144 param_type: SAFE_PRIME, key_class: CLASS_6144 p: [768] b90fc1414ade1a1c80a0d6398110f309cac0608c5e8c1721a01850d66013fc38... g: [1] 03 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/26 (125 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/27 Test:Safe Prime 8192 param_type: SAFE_PRIME, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 03 q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/27 (220 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/28 Test:Safe Prime 1536 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_1536 p: [192] f76731c8456ad9ea530b21c74afa8166765ceab7f511326dd34c7aac39171a87... g: [1] 02 q: [192] 7bb398e422b56cf5298590e3a57d40b33b2e755bfa889936e9a63d561c8b8d43... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/28 (69 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/29 Test:Safe Prime 2048 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/29 (73 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/30 Test:Safe Prime 3072 with Subprime param_type: SAFE_PRIME_WITH_SUBPRIME, key_class: CLASS_3072 p: [384] 8766dff7ec496a9a7c9628ae6738abfafe5c467befe918a676b2e50ebeb8f280... g: [1] 02 q: [384] 43b36ffbf624b54d3e4b1457339c55fd7f2e233df7f48c533b5972875f5c7940... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/30 (83 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/31 Test:Weak Prime 1024 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/31 (72 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/32 Test:Weak Prime 2048 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/32 (75 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/33 Test:Weak Prime 3072 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/33 (82 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/34 Test:Weak Prime 4096 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/34 (92 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/35 Test:Weak Prime 6144 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_6144 p: [768] a22496b62168d57e2c604dc881599c1c70ec2428b652360987aac15be5a63e88... g: [768] 34c2b21fd94eb6fd6c0147b950f1be071cdd67a2f17c0de59b7c9e0ed9f881a1... q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/35 (123 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/36 Test:Weak Prime 8192 Unknown Subprime param_type: UNKNOWN_SUBPRIME, key_class: CLASS_8192 p: [1024] 93df6d37dc2aa4ab5ddc734212188f394773f53ebc6e0d2a685d534f228ca8a8... g: [1024] 784d5da1ce9d68ae473181088c24386ac8c7f41ca1cb5d65046e0dbe551d25c2... q: [0] pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/36 (217 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/37 Test:Weak Prime 1024 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/37 (70 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/38 Test:Weak Prime 2048 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/38 (75 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/39 Test:Weak Prime 3072 Known Subprime param_type: KNOWN_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/39 (81 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/40 Test:Weak Prime 1024 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [128] 724104a535df4da888d03a12ffa80e056b685e699244baba59eb35fa63afb576... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/40 (69 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/41 Test:Weak Prime 2048 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [256] 5a8441b5111cef817f39b5fd86a756a587fed913f3e91aea41f95e14ffa87bb5... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/41 (74 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/42 Test:Weak Prime 3072 Wrong Subprime param_type: WRONG_SUBPRIME, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [384] 4a1963a3a8d181cdf928ae34d7829e3b3151762d666fc07996e752d2cf16d5af... pub_key: [0] [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/42 (92 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/43 Test:Pubkey = 0 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [1] 00 [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/43 (72 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/44 Test:PubKey = 1 TLS 2048 param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [0] pub_key: [1] 01 PK11_PubDerive failed: security library: memory allocation failure. [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/44 (99 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/45 Test:Pubkey == -1 IKE 1536 param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... g: [1] 02 q: [0] pub_key: [192] ffffffffffffffffc90fdaa22168c234c4c6628b80dc1cd129024e088a67cc74... [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/45 (70 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/46 Test:Pubkey = -1 SAFE 2048 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... g: [1] 02 q: [256] 70d1b724b4838e2fda0a9aa34ca968277fa72658f0acf69738f9c00a2a687e41... pub_key: [256] e1a36e4969071c5fb41535469952d04eff4e4cb1e159ed2e71f3801454d0fc83... [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/46 (73 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/47 Test:Pubkey = -1 WEAK 3072 KNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/47 (82 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/48 Test:Pubkey = -1 WEAK 4096 UNKNOWN SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_4096 p: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... g: [512] 55a19d92163d9cfad77c71ea29539bdc8ea6bb06d5005d6c8e5d44b9134b2092... q: [0] pub_key: [512] ff50d3cc89175eb6f8a3b0e2f99f17a192561513129f18dc0700c249c9d9d40a... [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/48 (97 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/49 Test:Pubkey = -1 TLS 6144 WITH SUBPRIME param_type: BAD_PUB_KEY, key_class: CLASS_6144 p: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... g: [1] 02 q: [768] 7fffffffffffffffd6fc2a2c515da54d57ee2b10139e9e78ec5ce2c1e7169b4a... pub_key: [768] ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d3695... PK11_PubDerive failed: security library: memory allocation failure. [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/49 (730 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/50 Test:Pubkey = -1 SAFE 8192 param_type: BAD_PUB_KEY, key_class: CLASS_8192 p: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... g: [1] 02 q: [0] pub_key: [1024] 9ba79ba28654e799115b3581d57a8a6e4d4d615dd3cf0c657edad8ce28aca038... [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/50 (215 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/51 Test:Pubkey small subgroup Weak 1024 prime param_type: BAD_PUB_KEY, key_class: CLASS_1536 p: [128] e482094a6bbe9b5111a07425ff501c0ad6d0bcd324897574b3d66bf4c75f6aec... g: [128] 5a708be11ded6904d0dcda849e79561144dcf7b884887567ba805b7e50c15c80... q: [20] ef0c1760d1918fea4dbe0ab237cc6bba97982d4b pub_key: [1] 03 [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/51 (68 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/52 Test:Pubkey small subgroup Weak 2048 prime param_type: BAD_PUB_KEY, key_class: CLASS_2048 p: [256] b508836a2239df02fe736bfb0d4ead4b0ffdb227e7d235d483f2bc29ff50f76b... g: [256] 36c66e3ee844a0571d8e71b66c24f61db6a5fde3d6c56be8945a8c5adf4151e6... q: [32] cd9dbf88e5c00316ec9cb46e54d2bfdc0592cd0587c99c911954b6d71ee10a93 pub_key: [1] 03 [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/52 (74 ms) [ RUN ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/53 Test:Pubkey small subgroup Weak 3072 prime param_type: BAD_PUB_KEY, key_class: CLASS_3072 p: [384] 9432c74751a3039bf2515c69af053c7662a2ec5accdf80f32dcea5a59e2dab5f... g: [384] 6e65cdd8bf8a5aa10562a264884a491b57a80e2e284ae3aaa74ec706e2f89cd7... q: [32] d6f6eb1e6544e11a37698c6045cbcb52e488cbadb22718fa3acfc6f9c303a8b9 pub_key: [1] 03 [ OK ] FipsDhCases/SoftokenFipsDhValidate.DhVectors/53 (85 ms) [----------] 54 tests from FipsDhCases/SoftokenFipsDhValidate (16251 ms total) [----------] Global test environment tear-down [==========] 139 tests from 9 test suites ran. (58433 ms total) [ PASSED ] 139 tests. gtests.sh: #8017: softoken_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/softoken_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #8018: 'SoftokenBuiltinsTest: CheckNoDistrustFields' - PASSED gtests.sh: #8019: 'SoftokenBuiltinsTest: CheckOkDistrustFields' - PASSED gtests.sh: #8020: 'SoftokenBuiltinsTest: CheckInvalidDistrustFields' - PASSED gtests.sh: #8021: 'SoftokenTest: CheckDefaultPbkdf2Iterations' - PASSED gtests.sh: #8022: 'SoftokenTest: ResetSoftokenEmptyPassword' - PASSED gtests.sh: #8023: 'SoftokenTest: ResetSoftokenNonEmptyPassword' - PASSED gtests.sh: #8024: 'SoftokenTest: GetInvalidAttribute' - PASSED gtests.sh: #8025: 'SoftokenTest: GetValidAttributes' - PASSED gtests.sh: #8026: 'SoftokenTest: GetOnlyInvalidAttributes' - PASSED gtests.sh: #8027: 'SoftokenTest: GetAttributesInvalidInterspersed1' - PASSED gtests.sh: #8028: 'SoftokenTest: GetAttributesInvalidInterspersed2' - PASSED gtests.sh: #8029: 'SoftokenTest: GetAttributesInvalidInterspersed3' - PASSED gtests.sh: #8030: 'SoftokenTest: CreateObjectNonEmptyPassword' - PASSED gtests.sh: #8031: 'SoftokenTest: CreateObjectChangePassword' - PASSED gtests.sh: #8032: 'SoftokenTest: CreateObjectChangeToBigPassword' - PASSED gtests.sh: #8033: 'SoftokenTest: CreateObjectChangeToEmptyPassword' - PASSED gtests.sh: #8034: 'SoftokenTest: CreateObjectReadBreakLine' - PASSED gtests.sh: #8035: 'SoftokenNonAsciiTest: NonAsciiPathWorking' - PASSED gtests.sh: #8036: 'SoftokenNoDBTest: NeedUserInitNoDB' - PASSED gtests.sh: #8037: 'SoftokenPasswordChangeTests/SoftokenPasswordChangeTest: KeepTrustAfterPasswordChange/0 8-byte object <D1-A1 63-56 C7-5F 64-56>' - PASSED gtests.sh: #8038: 'SoftokenPasswordChangeTests/SoftokenPasswordChangeTest: KeepTrustAfterPasswordChange/1 8-byte object <C7-5F 64-56 D1-A1 63-56>' - PASSED gtests.sh: #8039: 'SoftokenPasswordChangeTests/SoftokenPasswordChangeTest: KeepTrustAfterPasswordChange/2 8-byte object <D1-A1 63-56 DA-A1 63-56>' - PASSED gtests.sh: #8040: 'DhValidateCases/SoftokenDhValidate: DhVectors/0 60-byte object <1D-2D 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8041: 'DhValidateCases/SoftokenDhValidate: DhVectors/1 60-byte object <01-2B 64-56 00-00 00-00 C0-1C 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8042: 'DhValidateCases/SoftokenDhValidate: DhVectors/2 60-byte object <0A-2B 64-56 00-00 00-00 C0-1B 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8043: 'DhValidateCases/SoftokenDhValidate: DhVectors/3 60-byte object <13-2B 64-56 00-00 00-00 40-1A 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8044: 'DhValidateCases/SoftokenDhValidate: DhVectors/4 60-byte object <1C-2B 64-56 00-00 00-00 C0-18 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8045: 'DhValidateCases/SoftokenDhValidate: DhVectors/5 60-byte object <25-2B 64-56 00-00 00-00 C0-16 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8046: 'DhValidateCases/SoftokenDhValidate: DhVectors/6 60-byte object <2E-2B 64-56 00-00 00-00 C0-14 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8047: 'DhValidateCases/SoftokenDhValidate: DhVectors/7 60-byte object <37-2B 64-56 00-00 00-00 C0-11 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8048: 'DhValidateCases/SoftokenDhValidate: DhVectors/8 60-byte object <40-2B 64-56 00-00 00-00 C0-0E 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8049: 'DhValidateCases/SoftokenDhValidate: DhVectors/9 60-byte object <49-2B 64-56 00-00 00-00 C0-0A 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8050: 'DhValidateCases/SoftokenDhValidate: DhVectors/10 60-byte object <52-2B 64-56 00-00 00-00 C0-06 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8051: 'DhValidateCases/SoftokenDhValidate: DhVectors/11 60-byte object <5B-2B 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-06 64-56 C0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8052: 'DhValidateCases/SoftokenDhValidate: DhVectors/12 60-byte object <72-2B 64-56 00-00 00-00 C0-1C 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-05 64-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8053: 'DhValidateCases/SoftokenDhValidate: DhVectors/13 60-byte object <89-2B 64-56 00-00 00-00 C0-1B 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-04 64-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8054: 'DhValidateCases/SoftokenDhValidate: DhVectors/14 60-byte object <A0-2B 64-56 00-00 00-00 40-1A 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 80-02 64-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8055: 'DhValidateCases/SoftokenDhValidate: DhVectors/15 60-byte object <B7-2B 64-56 00-00 00-00 C0-18 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-01 64-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8056: 'DhValidateCases/SoftokenDhValidate: DhVectors/16 60-byte object <CE-2B 64-56 00-00 00-00 C0-16 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-FF 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8057: 'DhValidateCases/SoftokenDhValidate: DhVectors/17 60-byte object <E5-2B 64-56 00-00 00-00 C0-14 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-FD 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8058: 'DhValidateCases/SoftokenDhValidate: DhVectors/18 60-byte object <FC-2B 64-56 00-00 00-00 C0-11 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-FA 63-56 00-03 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8059: 'DhValidateCases/SoftokenDhValidate: DhVectors/19 60-byte object <13-2C 64-56 00-00 00-00 C0-0E 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-F7 63-56 00-03 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8060: 'DhValidateCases/SoftokenDhValidate: DhVectors/20 60-byte object <2A-2C 64-56 00-00 00-00 C0-0A 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-F3 63-56 00-04 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8061: 'DhValidateCases/SoftokenDhValidate: DhVectors/21 60-byte object <41-2C 64-56 00-00 00-00 C0-06 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-EF 63-56 00-04 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8062: 'DhValidateCases/SoftokenDhValidate: DhVectors/22 60-byte object <58-2C 64-56 00-00 00-00 40-EE 63-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8063: 'DhValidateCases/SoftokenDhValidate: DhVectors/23 60-byte object <68-2C 64-56 00-00 00-00 40-ED 63-56 00-01 00-00 00-00 00-00 20-ED 63-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8064: 'DhValidateCases/SoftokenDhValidate: DhVectors/24 60-byte object <78-2C 64-56 00-00 00-00 A0-EB 63-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8065: 'DhValidateCases/SoftokenDhValidate: DhVectors/25 60-byte object <88-2C 64-56 00-00 00-00 A0-E9 63-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8066: 'DhValidateCases/SoftokenDhValidate: DhVectors/26 60-byte object <98-2C 64-56 00-00 00-00 A0-E6 63-56 00-03 00-00 00-00 00-00 20-ED 63-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8067: 'DhValidateCases/SoftokenDhValidate: DhVectors/27 60-byte object <A8-2C 64-56 00-00 00-00 A0-E2 63-56 00-04 00-00 00-00 00-00 20-ED 63-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8068: 'DhValidateCases/SoftokenDhValidate: DhVectors/28 60-byte object <B8-2C 64-56 00-00 00-00 40-EE 63-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 E0-E1 63-56 C0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8069: 'DhValidateCases/SoftokenDhValidate: DhVectors/29 60-byte object <D6-2C 64-56 00-00 00-00 40-ED 63-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 E0-E0 63-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8070: 'DhValidateCases/SoftokenDhValidate: DhVectors/30 60-byte object <F4-2C 64-56 00-00 00-00 A0-EB 63-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 60-DF 63-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8071: 'DhValidateCases/SoftokenDhValidate: DhVectors/31 60-byte object <68-2D 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8072: 'DhValidateCases/SoftokenDhValidate: DhVectors/32 60-byte object <8C-2D 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8073: 'DhValidateCases/SoftokenDhValidate: DhVectors/33 60-byte object <B0-2D 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8074: 'DhValidateCases/SoftokenDhValidate: DhVectors/34 60-byte object <D4-2D 64-56 00-00 00-00 60-D7 63-56 00-02 00-00 00-00 00-00 60-D5 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8075: 'DhValidateCases/SoftokenDhValidate: DhVectors/35 60-byte object <F8-2D 64-56 00-00 00-00 60-D2 63-56 00-03 00-00 00-00 00-00 60-CF 63-56 00-03 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8076: 'DhValidateCases/SoftokenDhValidate: DhVectors/36 60-byte object <1C-2E 64-56 00-00 00-00 60-CB 63-56 00-04 00-00 00-00 00-00 60-C7 63-56 00-04 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8077: 'DhValidateCases/SoftokenDhValidate: DhVectors/37 60-byte object <40-2E 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 40-C7 63-56 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8078: 'DhValidateCases/SoftokenDhValidate: DhVectors/38 60-byte object <60-2E 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 20-C7 63-56 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8079: 'DhValidateCases/SoftokenDhValidate: DhVectors/39 60-byte object <80-2E 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C7 63-56 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8080: 'DhValidateCases/SoftokenDhValidate: DhVectors/40 60-byte object <A0-2E 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 80-C6 63-56 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8081: 'DhValidateCases/SoftokenDhValidate: DhVectors/41 60-byte object <C0-2E 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 80-C5 63-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8082: 'DhValidateCases/SoftokenDhValidate: DhVectors/42 60-byte object <E0-2E 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C4 63-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8083: 'DhValidateCases/SoftokenDhValidate: DhVectors/43 60-byte object <12-2D 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E1-C3 63-56 01-00 00-00 07-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8084: 'DhValidateCases/SoftokenDhValidate: DhVectors/44 60-byte object <26-2D 64-56 00-00 00-00 C0-1B 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-C3 63-56 01-00 00-00 07-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8085: 'DhValidateCases/SoftokenDhValidate: DhVectors/45 60-byte object <3A-2D 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-C3 63-56 C0-00 00-00 07-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8086: 'DhValidateCases/SoftokenDhValidate: DhVectors/46 60-byte object <00-2F 64-56 00-00 00-00 40-ED 63-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 E0-E0 63-56 00-01 00-00 00-00 00-00 20-C2 63-56 00-01 00-00 07-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8087: 'DhValidateCases/SoftokenDhValidate: DhVectors/47 60-byte object <24-2F 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C7 63-56 20-00 00-00 00-00 00-00 A0-C0 63-56 80-01 00-00 07-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8088: 'DhValidateCases/SoftokenDhValidate: DhVectors/48 60-byte object <4C-2F 64-56 00-00 00-00 60-D7 63-56 00-02 00-00 00-00 00-00 60-D5 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-BE 63-56 00-02 00-00 07-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8089: 'DhValidateCases/SoftokenDhValidate: DhVectors/49 60-byte object <74-2F 64-56 00-00 00-00 C0-0E 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-F7 63-56 00-03 00-00 00-00 00-00 A0-BB 63-56 00-03 00-00 07-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8090: 'DhValidateCases/SoftokenDhValidate: DhVectors/50 60-byte object <50-2D 64-56 00-00 00-00 A0-E2 63-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B7 63-56 00-04 00-00 07-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8091: 'DhValidateCases/SoftokenDhValidate: DhVectors/51 60-byte object <98-2F 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 40-C7 63-56 14-00 00-00 00-00 00-00 91-B7 63-56 01-00 00-00 07-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8092: 'DhValidateCases/SoftokenDhValidate: DhVectors/52 60-byte object <C0-2F 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 20-C7 63-56 20-00 00-00 00-00 00-00 90-B7 63-56 01-00 00-00 07-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8093: 'DhValidateCases/SoftokenDhValidate: DhVectors/53 60-byte object <E8-2F 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C7 63-56 20-00 00-00 00-00 00-00 8F-B7 63-56 01-00 00-00 07-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8094: 'FipsPasswordCases/SoftokenFipsPasswordTest: SetPassword/0 { "", "", "" }' - PASSED gtests.sh: #8095: 'FipsPasswordCases/SoftokenFipsPasswordTest: SetPassword/1 { "", "", "strong-_123" }' - PASSED gtests.sh: #8096: 'FipsPasswordCases/SoftokenFipsPasswordTest: SetPassword/2 { "strong-_123", "strong-_456", "strong-_123" }' - PASSED gtests.sh: #8097: 'BadFipsPasswordCases/SoftokenFipsBadPasswordTest: SetBadPassword/0 { "", "strong-_123", "" }' - PASSED gtests.sh: #8098: 'BadFipsPasswordCases/SoftokenFipsBadPasswordTest: SetBadPassword/1 { "strong-_123", "" }' - PASSED gtests.sh: #8099: 'BadFipsPasswordCases/SoftokenFipsBadPasswordTest: SetBadPassword/2 { "strong-_123", "strong-_456", "" }' - PASSED gtests.sh: #8100: 'BadFipsPasswordCases/SoftokenFipsBadPasswordTest: SetBadPassword/3 { "weak" }' - PASSED gtests.sh: #8101: 'BadFipsPasswordCases/SoftokenFipsBadPasswordTest: SetBadPassword/4 { "", "weak" }' - PASSED gtests.sh: #8102: 'BadFipsPasswordCases/SoftokenFipsBadPasswordTest: SetBadPassword/5 { "strong-_123", "weak" }' - PASSED gtests.sh: #8103: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/0 60-byte object <1D-2D 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8104: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/1 60-byte object <01-2B 64-56 00-00 00-00 C0-1C 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8105: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/2 60-byte object <0A-2B 64-56 00-00 00-00 C0-1B 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8106: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/3 60-byte object <13-2B 64-56 00-00 00-00 40-1A 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8107: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/4 60-byte object <1C-2B 64-56 00-00 00-00 C0-18 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8108: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/5 60-byte object <25-2B 64-56 00-00 00-00 C0-16 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8109: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/6 60-byte object <2E-2B 64-56 00-00 00-00 C0-14 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8110: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/7 60-byte object <37-2B 64-56 00-00 00-00 C0-11 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8111: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/8 60-byte object <40-2B 64-56 00-00 00-00 C0-0E 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8112: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/9 60-byte object <49-2B 64-56 00-00 00-00 C0-0A 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8113: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/10 60-byte object <52-2B 64-56 00-00 00-00 C0-06 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8114: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/11 60-byte object <5B-2B 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-06 64-56 C0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8115: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/12 60-byte object <72-2B 64-56 00-00 00-00 C0-1C 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-05 64-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8116: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/13 60-byte object <89-2B 64-56 00-00 00-00 C0-1B 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-04 64-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8117: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/14 60-byte object <A0-2B 64-56 00-00 00-00 40-1A 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 80-02 64-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8118: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/15 60-byte object <B7-2B 64-56 00-00 00-00 C0-18 64-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-01 64-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8119: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/16 60-byte object <CE-2B 64-56 00-00 00-00 C0-16 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-FF 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8120: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/17 60-byte object <E5-2B 64-56 00-00 00-00 C0-14 64-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-FD 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8121: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/18 60-byte object <FC-2B 64-56 00-00 00-00 C0-11 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-FA 63-56 00-03 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8122: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/19 60-byte object <13-2C 64-56 00-00 00-00 C0-0E 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-F7 63-56 00-03 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8123: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/20 60-byte object <2A-2C 64-56 00-00 00-00 C0-0A 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-F3 63-56 00-04 00-00 00-00 00-00 00-00 00-00 00-00 00-00 01-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8124: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/21 60-byte object <41-2C 64-56 00-00 00-00 C0-06 64-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-EF 63-56 00-04 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8125: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/22 60-byte object <58-2C 64-56 00-00 00-00 40-EE 63-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8126: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/23 60-byte object <68-2C 64-56 00-00 00-00 40-ED 63-56 00-01 00-00 00-00 00-00 20-ED 63-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8127: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/24 60-byte object <78-2C 64-56 00-00 00-00 A0-EB 63-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8128: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/25 60-byte object <88-2C 64-56 00-00 00-00 A0-E9 63-56 00-02 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8129: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/26 60-byte object <98-2C 64-56 00-00 00-00 A0-E6 63-56 00-03 00-00 00-00 00-00 20-ED 63-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8130: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/27 60-byte object <A8-2C 64-56 00-00 00-00 A0-E2 63-56 00-04 00-00 00-00 00-00 20-ED 63-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 02-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8131: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/28 60-byte object <B8-2C 64-56 00-00 00-00 40-EE 63-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 E0-E1 63-56 C0-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8132: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/29 60-byte object <D6-2C 64-56 00-00 00-00 40-ED 63-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 E0-E0 63-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8133: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/30 60-byte object <F4-2C 64-56 00-00 00-00 A0-EB 63-56 80-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 60-DF 63-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 03-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8134: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/31 60-byte object <68-2D 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8135: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/32 60-byte object <8C-2D 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8136: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/33 60-byte object <B0-2D 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8137: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/34 60-byte object <D4-2D 64-56 00-00 00-00 60-D7 63-56 00-02 00-00 00-00 00-00 60-D5 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8138: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/35 60-byte object <F8-2D 64-56 00-00 00-00 60-D2 63-56 00-03 00-00 00-00 00-00 60-CF 63-56 00-03 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8139: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/36 60-byte object <1C-2E 64-56 00-00 00-00 60-CB 63-56 00-04 00-00 00-00 00-00 60-C7 63-56 00-04 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 06-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8140: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/37 60-byte object <40-2E 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 40-C7 63-56 14-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8141: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/38 60-byte object <60-2E 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 20-C7 63-56 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8142: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/39 60-byte object <80-2E 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C7 63-56 20-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 04-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8143: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/40 60-byte object <A0-2E 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 80-C6 63-56 80-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8144: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/41 60-byte object <C0-2E 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 80-C5 63-56 00-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8145: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/42 60-byte object <E0-2E 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C4 63-56 80-01 00-00 00-00 00-00 00-00 00-00 00-00 00-00 05-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8146: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/43 60-byte object <12-2D 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E1-C3 63-56 01-00 00-00 07-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8147: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/44 60-byte object <26-2D 64-56 00-00 00-00 C0-1B 64-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 E0-C3 63-56 01-00 00-00 07-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8148: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/45 60-byte object <3A-2D 64-56 00-00 00-00 E0-1D 64-56 C0-00 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 20-C3 63-56 C0-00 00-00 07-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8149: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/46 60-byte object <00-2F 64-56 00-00 00-00 40-ED 63-56 00-01 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 E0-E0 63-56 00-01 00-00 00-00 00-00 20-C2 63-56 00-01 00-00 07-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8150: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/47 60-byte object <24-2F 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C7 63-56 20-00 00-00 00-00 00-00 A0-C0 63-56 80-01 00-00 07-00 00-00 02-00 00-00>' - PASSED gtests.sh: #8151: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/48 60-byte object <4C-2F 64-56 00-00 00-00 60-D7 63-56 00-02 00-00 00-00 00-00 60-D5 63-56 00-02 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-BE 63-56 00-02 00-00 07-00 00-00 03-00 00-00>' - PASSED gtests.sh: #8152: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/49 60-byte object <74-2F 64-56 00-00 00-00 C0-0E 64-56 00-03 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-F7 63-56 00-03 00-00 00-00 00-00 A0-BB 63-56 00-03 00-00 07-00 00-00 04-00 00-00>' - PASSED gtests.sh: #8153: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/50 60-byte object <50-2D 64-56 00-00 00-00 A0-E2 63-56 00-04 00-00 00-00 00-00 C0-1D 64-56 01-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 00-00 A0-B7 63-56 00-04 00-00 07-00 00-00 05-00 00-00>' - PASSED gtests.sh: #8154: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/51 60-byte object <98-2F 64-56 00-00 00-00 E0-DE 63-56 80-00 00-00 00-00 00-00 60-DE 63-56 80-00 00-00 00-00 00-00 40-C7 63-56 14-00 00-00 00-00 00-00 91-B7 63-56 01-00 00-00 07-00 00-00 00-00 00-00>' - PASSED gtests.sh: #8155: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/52 60-byte object <C0-2F 64-56 00-00 00-00 60-DD 63-56 00-01 00-00 00-00 00-00 60-DC 63-56 00-01 00-00 00-00 00-00 20-C7 63-56 20-00 00-00 00-00 00-00 90-B7 63-56 01-00 00-00 07-00 00-00 01-00 00-00>' - PASSED gtests.sh: #8156: 'FipsDhCases/SoftokenFipsDhValidate: DhVectors/53 60-byte object <E8-2F 64-56 00-00 00-00 E0-DA 63-56 80-01 00-00 00-00 00-00 60-D9 63-56 80-01 00-00 00-00 00-00 00-C7 63-56 20-00 00-00 00-00 00-00 8F-B7 63-56 01-00 00-00 07-00 00-00 02-00 00-00>' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: sysinit_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/sysinit_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/sysinit_gtest -n dummy -s CN=dummy -t ,, -x -m 9 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #8157: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/sysinit_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing sysinit_gtest [==========] Running 4 tests from 3 test suites. [----------] Global test environment set-up. [----------] 2 tests from Sysinit [ RUN ] Sysinit.LegacyPath [ OK ] Sysinit.LegacyPath (0 ms) [ RUN ] Sysinit.XdgDefaultPath [ OK ] Sysinit.XdgDefaultPath (0 ms) [----------] 2 tests from Sysinit (0 ms total) [----------] 1 test from SysinitSetXdgUserDataHome [ RUN ] SysinitSetXdgUserDataHome.XdgSetPath [ OK ] SysinitSetXdgUserDataHome.XdgSetPath (0 ms) [----------] 1 test from SysinitSetXdgUserDataHome (0 ms total) [----------] 1 test from SysinitSetTrashXdgUserDataHome [ RUN ] SysinitSetTrashXdgUserDataHome.XdgSetToTrashPath [ OK ] SysinitSetTrashXdgUserDataHome.XdgSetToTrashPath (0 ms) [----------] 1 test from SysinitSetTrashXdgUserDataHome (0 ms total) [----------] Global test environment tear-down [==========] 4 tests from 3 test suites ran. (0 ms total) [ PASSED ] 4 tests. gtests.sh: #8158: sysinit_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/sysinit_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #8159: 'Sysinit: LegacyPath' - PASSED gtests.sh: #8160: 'Sysinit: XdgDefaultPath' - PASSED gtests.sh: #8161: 'SysinitSetXdgUserDataHome: XdgSetPath' - PASSED gtests.sh: #8162: 'SysinitSetTrashXdgUserDataHome: XdgSetToTrashPath' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: smime_gtest =============================== /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/smime_gtest --empty-password /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/smime_gtest -n dummy -s CN=dummy -t ,, -x -m 10 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? gtests.sh: #8163: create certificate: dummy p256 sign - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/smime_gtest ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests executing smime_gtest [==========] Running 5 tests from 1 test suite. [----------] Global test environment set-up. [----------] 5 tests from SMimeTest [ RUN ] SMimeTest.InvalidDER [ OK ] SMimeTest.InvalidDER (0 ms) [ RUN ] SMimeTest.IsSignedValid [ OK ] SMimeTest.IsSignedValid (0 ms) [ RUN ] SMimeTest.TruncatedCmsSignature [ OK ] SMimeTest.TruncatedCmsSignature (0 ms) [ RUN ] SMimeTest.SlightlyTruncatedCmsSignature [ OK ] SMimeTest.SlightlyTruncatedCmsSignature (0 ms) [ RUN ] SMimeTest.IsSignedNull [ OK ] SMimeTest.IsSignedNull (0 ms) [----------] 5 tests from SMimeTest (0 ms total) [----------] Global test environment tear-down [==========] 5 tests from 1 test suite ran. (0 ms total) [ PASSED ] 5 tests. gtests.sh: #8164: smime_gtest run successfully - PASSED test output dir: /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests/smime_gtest/report.xml processing the parsed report DEBUG: Using xmllint to parse GTest XML report(s) gtests.sh: #8165: 'SMimeTest: InvalidDER' - PASSED gtests.sh: #8166: 'SMimeTest: IsSignedValid' - PASSED gtests.sh: #8167: 'SMimeTest: TruncatedCmsSignature' - PASSED gtests.sh: #8168: 'SMimeTest: SlightlyTruncatedCmsSignature' - PASSED gtests.sh: #8169: 'SMimeTest: IsSignedNull' - PASSED ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/gtests gtests.sh: #8170: Skipping mozpkix_gtest (not built) - UNKNOWN TIMESTAMP gtests END: Thu Dec 26 15:06:44 UTC 2024 Running tests for ssl_gtests TIMESTAMP ssl_gtests BEGIN: Thu Dec 26 15:06:44 UTC 2024 ssl_gtest.sh: SSL Gtests =============================== ssl_gtest.sh: #1: create ssl_gtest database - PASSED ~/build/BUILD/nss-3.101/nss/tests ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests ~/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n client -s CN=client -t ,, -x -m 1 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #2: create certificate: client rsa sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa -s CN=rsa -t ,, -x -m 2 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #3: create certificate: rsa rsa sign kex - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa2048 -s CN=rsa2048 -t ,, -x -m 3 -w -2 -v 120 -k rsa -g 2048 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #4: create certificate: rsa2048 rsa2048 sign kex - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa8192 -s CN=rsa8192 -t ,, -x -m 4 -w -2 -v 120 -k rsa -g 8192 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #5: create certificate: rsa8192 rsa8192 sign kex - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_sign -s CN=rsa_sign -t ,, -x -m 5 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #6: create certificate: rsa_sign rsa sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_pss -s CN=rsa_pss -t ,, -x -m 6 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #7: create certificate: rsa_pss rsapss sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_pss384 -s CN=rsa_pss384 -t ,, -x -m 7 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA384 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #8: create certificate: rsa_pss384 rsapss384 sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_pss512 -s CN=rsa_pss512 -t ,, -x -m 8 -w -2 -v 120 -k rsa -g 2048 --pss -Z SHA512 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #9: create certificate: rsa_pss512 rsapss512 sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_pss_noparam -s CN=rsa_pss_noparam -t ,, -x -m 9 -w -2 -v 120 -k rsa -g 2048 --pss -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #10: create certificate: rsa_pss_noparam rsapss_noparam sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_decrypt -s CN=rsa_decrypt -t ,, -x -m 10 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #11: create certificate: rsa_decrypt rsa kex - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n ecdsa256 -s CN=ecdsa256 -t ,, -x -m 11 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #12: create certificate: ecdsa256 p256 sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n ecdsa384 -s CN=ecdsa384 -t ,, -x -m 12 -w -2 -v 120 -k ec -q secp384r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #13: create certificate: ecdsa384 p384 sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n ecdsa521 -s CN=ecdsa521 -t ,, -x -m 13 -w -2 -v 120 -k ec -q secp521r1 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #14: create certificate: ecdsa521 p521 sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n ecdh_ecdsa -s CN=ecdh_ecdsa -t ,, -x -m 14 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #15: create certificate: ecdh_ecdsa p256 kex - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_ca -s CN=rsa_ca -t CT,CT,CT -x -m 15 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #16: create certificate: rsa_ca rsa_ca ca - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_chain -s CN=rsa_chain -t ,, -c rsa_ca -m 16 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #17: create certificate: rsa_chain rsa_chain sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_pss_ca -s CN=rsa_pss_ca -t CT,CT,CT -x -m 17 -w -2 -v 120 -k rsa -g 1024 --pss -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #18: create certificate: rsa_pss_ca rsapss_ca ca - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_pss_chain -s CN=rsa_pss_chain -t ,, -c rsa_pss_ca -m 18 -w -2 -v 120 -k rsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #19: create certificate: rsa_pss_chain rsapss_chain sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n rsa_ca_rsa_pss_chain -s CN=rsa_ca_rsa_pss_chain -t ,, -c rsa_ca -m 19 -w -2 -v 120 -k rsa -g 1024 --pss-sign -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #20: create certificate: rsa_ca_rsa_pss_chain rsa_ca_rsapss_chain sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n ecdh_rsa -s CN=ecdh_rsa -t ,, -c rsa_ca -m 20 -w -2 -v 120 -k ec -q nistp256 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #21: create certificate: ecdh_rsa ecdh_rsa kex - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n dsa -s CN=dsa -t ,, -x -m 21 -w -2 -v 120 -k dsa -g 1024 -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #22: create certificate: dsa dsa sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n delegator_ecdsa256 -s CN=delegator_ecdsa256 -t ,, -x -m 22 -w -2 -v 120 -k ec -q nistp256 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #23: create certificate: delegator_ecdsa256 delegator_p256 sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n delegator_rsae2048 -s CN=delegator_rsae2048 -t ,, -x -m 23 -w -2 -v 120 -k rsa -g 2048 --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #24: create certificate: delegator_rsae2048 delegator_rsae2048 sign - PASSED /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/bin/certutil -S -z ../tests_noise -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/ssl_gtests -n delegator_rsa_pss2048 -s CN=delegator_rsa_pss2048 -t ,, -x -m 24 -w -2 -v 120 -k rsa -g 2048 --pss --extGeneric 1.3.6.1.4.1.44363.44:not-critical:empty.txt -Z SHA256 -1 -2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? ssl_gtest.sh: #25: create certificate: delegator_rsa_pss2048 delegator_rsa_pss2048 sign - PASSED DEBUG: ssl_gtests will be divided into 1 chunk(s) [==========] Running 14173 tests from 118 test suites. [----------] Global test environment set-up. [----------] 1 test from DCDelegation [ RUN ] DCDelegation.DCDelegations [ OK ] DCDelegation.DCDelegations (5 ms) [----------] 1 test from DCDelegation (5 ms total) [----------] 105 tests from TlsConnectStreamTls13 [ RUN ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [201] 16030300600200005c0303c5ea68520407330384108a0099ac5f1aeb3e267437... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ClientRejectHandshakeCertReq (4 ms) [ RUN ] TlsConnectStreamTls13.RejectPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [201] 16030300600200005c0303bfce9cc5a5b88f6e1595ac60861262c060ee16adac... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [27] 1703030016aad38e252a52a8be6650b3fc09489bbaf33517168b45 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_REQUEST: SSL received an unexpected Certificate Request handshake message. client: Changing state from CONNECTED to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.RejectPha (4 ms) [ RUN ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [182] 030385632470c76651542bb96951af4de9b559dd603bcb14ccade9ba73566559... handshake new: [182] 030585632470c76651542bb96951af4de9b559dd603bcb14ccade9ba73566559... record old: [186] 010000b6030385632470c76651542bb96951af4de9b559dd603bcb14ccade9ba... record new: [186] 010000b6030585632470c76651542bb96951af4de9b559dd603bcb14ccade9ba... client: Filtered packet: [191] 16030100ba010000b6030585632470c76651542bb96951af4de9b559dd603bcb... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls14ClientHelloWithSupportedVersions (7 ms) [ RUN ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [182] 03032bf928f869da2214e7fc84843e2c0ba9fdcd91ccad4daf6b216f6461f9f4... handshake new: [182] 03002bf928f869da2214e7fc84843e2c0ba9fdcd91ccad4daf6b216f6461f9f4... record old: [186] 010000b603032bf928f869da2214e7fc84843e2c0ba9fdcd91ccad4daf6b216f... record new: [186] 010000b603002bf928f869da2214e7fc84843e2c0ba9fdcd91ccad4daf6b216f... client: Filtered packet: [191] 16030100ba010000b603002bf928f869da2214e7fc84843e2c0ba9fdcd91ccad... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Ssl30ClientHelloWithSupportedVersions (3 ms) [ RUN ] TlsConnectStreamTls13.Ssl30ServerHelloWithSupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 030335db24f2950947b1591359a00f4d7518c214c041ae7395970038e42b844c... handshake new: [86] 030035db24f2950947b1591359a00f4d7518c214c041ae7395970038e42b844c... record old: [90] 02000056030335db24f2950947b1591359a00f4d7518c214c041ae7395970038... record new: [90] 02000056030035db24f2950947b1591359a00f4d7518c214c041ae7395970038... server: Filtered packet: [776] 160303005a02000056030035db24f2950947b1591359a00f4d7518c214c041ae... client: Fatal alert sent: 70 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Ssl30ServerHelloWithSupportedVersions (5 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello13 (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice Version: TLS 1.3 client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHelloTwice (3 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterClientHelloEmptySid (6 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] 49e36a9a9364970dc3d5d12653087751a59d69aeb0d262f00af533ee85391166 record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [623] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [740] 160303005a020000560303e3f113c1d138c2ac9bb48461f4193b832fef8a77d4... server: Send Direct [6] 140303000101 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterServerHelloEmptySid (6 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 Version: TLS 1.3 client: Send Direct [6] 140303000101 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ChangeCipherSpecBeforeClientHello12 (2 ms) [ RUN ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ChangeCipherSpecAfterFinished13 (6 ms) [ RUN ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalResumptionUseSecondTicket (11 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenAfterHrr Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenAfterHrr (45 ms) [ RUN ] TlsConnectStreamTls13.ExternalTokenWithPeerId Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: setting external resumption token server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ExternalTokenWithPeerId (11 ms) [ RUN ] TlsConnectStreamTls13.RecordSizePlaintextExceed Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [63] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... record new: [64] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... server: Filtered packet: [86] 17030300510619187001c4e702135cdbece60f03dc503d71debd77a87f6122cd... record old: [37] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... record new: [38] 3f404142434445464748494a4b4c4d4e4f505152535455565758595a5b5c5d5e... server: Filtered packet: [60] 170303003794fc70d46b0a05c290bae0a863c3695a7efb80cced303cdb4c0d38... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. client: Changing state from CONNECTED to ERROR server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.RecordSizePlaintextExceed (5 ms) [ RUN ] TlsConnectStreamTls13.RecordSizeCiphertextExceed Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [80] 0def4117be47a65548c597d74e02d101c9ba96066e69027f9ee523851930de74... record new: [416] 0def4117be47a65548c597d74e02d101c9ba96066e69027f9ee523851930de74... server: Filtered packet: [421] 17030301a00def4117be47a65548c597d74e02d101c9ba96066e69027f9ee523... record old: [54] 09d8fe25ffe828143adbb15c806dc25566616ef9f14406b83be5a113e58f4ff8... record new: [390] 09d8fe25ffe828143adbb15c806dc25566616ef9f14406b83be5a113e58f4ff8... server: Filtered packet: [395] 170303018609d8fe25ffe828143adbb15c806dc25566616ef9f14406b83be5a1... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. client: Changing state from CONNECTED to ERROR server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.RecordSizeCiphertextExceed (5 ms) [ RUN ] TlsConnectStreamTls13.ClientHelloF5Padding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] TlsConnectStreamTls13.ClientHelloF5Padding (3 ms) [ RUN ] TlsConnectStreamTls13.RecordSizeExceedPad Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 0200005603037ca6da26c449567dc83874ac38336ab26c357c82f40369bfee3b... max: [80] 6299bc8a949a48157a7fd7ca9b2dafe452a774247bb9ddd8ee40c5457127fd24... max: [80] 33ad6aedf83c228484b94f65be3f33bd07e8b5b458531bf94de801936ffd805c... max: [80] 65e7b087120b3e7e689c1ebcfc98d4ee4b9dbedae1752bdaf53d94367bc1fae2... max: [80] c8ce9efab157b4e27b8ae205ae534df83e7ae37eb206f09b675bfd817240b9df... max: [80] 4292cbc54fe7cf3fc9659bc84f9a8867853dac45295410ed7f6ae1a7f82dcc8c... max: [80] 133c156607cb875d3165439829907bfe4ac5addc0d5eab2548cc003f1f898f93... max: [80] 88bbbe2219caaa750412e8e67b45b7be6898bfb31cafe446cd57836e763261f0... max: [80] dbea5e022dbe1cd435e8ad1ca7d43dce08ba41953e6447b9f2d7dc02a30a3a00... max: [80] d4f4eb9375420c6be49745792020d6e8101b838c661d23dafe85ceec57c37071... max: [80] d8c8138c0008cb4f707c1ced4e1eccbfc6396bf7352884c93fabd64278252549... max: [46] c7baf2b1f7fab8649633028bdf007c8ed6b4f9c47b03df0181c183e1d8ee290b... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 8d03fbd1259bdcd3e76d747c031292ecabf29f40bcf156013eec71bca512ffbc... server: Filtered packet: [86] 17030300518d03fbd1259bdcd3e76d747c031292ecabf29f40bcf156013eec71... max: [54] fe3d1932dd665037bad768a7b853ce103168e0c34bc94595270959bdb279ce77... server: Filtered packet: [60] 1703030037fe3d1932dd665037bad768a7b853ce103168e0c34bc94595270959... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. client: Changing state from CONNECTED to ERROR server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] TlsConnectStreamTls13.RecordSizeExceedPad (6 ms) [ RUN ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [182] 03030d1cf67b6fb05f6882d2d255ef21a7489668c2bf606405d630d6f88f8d69... handshake new: [182] 03030d1cf67b6fb05f6882d2d255ef21a7489668c2bf606405d630d6f88f8d69... record old: [186] 010000b603030d1cf67b6fb05f6882d2d255ef21a7489668c2bf606405d630d6... record new: [186] 010000b603030d1cf67b6fb05f6882d2d255ef21a7489668c2bf606405d630d6... client: Filtered packet: [191] 16030100ba010000b603030d1cf67b6fb05f6882d2d255ef21a7489668c2bf60... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RecordSizeClientExtensionInvalid (5 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerZeroRtt (9 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncPostHandshake (5 ms) [ RUN ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ReplaceRecordLayerAsyncEarlyAuth (5 ms) [ RUN ] TlsConnectStreamTls13.ForwardInvalidData Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.ForwardInvalidData (2 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyData Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyData (9 ms) [ RUN ] TlsConnectStreamTls13.LargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16384] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16406] 1703034011b0aea31b3a8d8d658375d519ff8b71c7d82dfa1450289fb18a5009... client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.LargeRecord (5 ms) [ RUN ] TlsConnectStreamTls13.TooLargeRecord Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [10] 00010203040506070809 record new: [16385] 000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f... client: Filtered packet: [16407] 170303401264a9b4fc8659f486f71c8dd5568d094fe31ab28c710c3285cfef70... server: Fatal alert sent: 22 client: Fatal alert received: 22 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TooLargeRecord (5 ms) [ RUN ] TlsConnectStreamTls13.UnencryptedFinishedMessage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [41] 160303002414000020dc10d0edb19d8dc3e60422aea9f2e0317a86069407539e... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.UnencryptedFinishedMessage (5 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordClient (5 ms) [ RUN ] TlsConnectStreamTls13.DecryptRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DecryptRecordServer (5 ms) [ RUN ] TlsConnectStreamTls13.DropRecordServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[40] 881994e31246093d7f98d78af987a90dd49fccf64c41ff55691959a4d6f61160... server: Drop packet server: Filtered packet: [72] 1703030043881994e31246093d7f98d78af987a90dd49fccf64c41ff55aa375c... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordServer (5 ms) [ RUN ] TlsConnectStreamTls13.DropRecordClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record drop: TLS 1.2 Data 3000000000000:[43] 073722f7bde621065588808d903d5b403bbe9f536848f98c9ca4093f10732d33... client: Drop packet client: Filtered packet: [72] 1703030043073722f7bde621065588808d903d5b403bbe9f536848f98c9ca404... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.DropRecordClient (6 ms) [ RUN ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SOCKET_WRITE_FAILURE: Attempt to write encrypted data to underlying socket failed. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.Tls13FailedWriteSecondFlight (6 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [776] 160303005a0200005603035881247f9451da4e546fd0a0e44e8b48c72d48ffbd... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Client (6 ms) [ RUN ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [58] 17030300354004244e3d411fd069e660b3de18056ebc3d0f8f8d78b1a2a1e4b5... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.KeyUpdateTooEarly_Server (6 ms) [ RUN ] TlsConnectStreamTls13.TLSKeyUpdateWrongValueForUpdateRequested Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [27] 1703030016a624b0ab52562ce1362017deb0af29659e1d53652b44 server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_KEY_UPDATE: SSL received a malformed key update message. server: Changing state from CONNECTED to ERROR client: Fatal alert received: 50 client: Read error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TLSKeyUpdateWrongValueForUpdateRequested (6 ms) [ RUN ] TlsConnectStreamTls13.TLSKeyUpdateWrongValueForLength_MessageTooLong Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [27] 17030300163ea104110423083f0352fe4bb9fc7610b37b4beaaf68 server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. server: Changing state from CONNECTED to ERROR client: Fatal alert received: 50 client: Read error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TLSKeyUpdateWrongValueForLength_MessageTooLong (6 ms) [ RUN ] TlsConnectStreamTls13.TLSKeyUpdateWrongValueForLength_MessageTooShort Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [27] 17030300166d680d14905deb22ed2a1dd9fa5b05b1bc188079a38c server: Fatal alert sent: 50 server: Read error SSL_ERROR_BAD_CLIENT: The server has encountered bad data from the client. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TLSKeyUpdateWrongValueForLength_MessageTooShort (5 ms) [ RUN ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.RetryCallbackWithSessionTicketToken (10 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [182] 030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b16bca0196... handshake new: [186] 030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b16bca0196... record old: [186] 010000b6030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b1... record new: [190] 010000ba030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b1... client: Filtered packet: [195] 16030100be010000ba030333e207e63510ed6ad6835cbef90979fa7190e942b2... server: Changing state from INIT to CONNECTING handshake old: [508] 030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b16bca0196... handshake new: [512] 030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b16bca0196... record old: [512] 010001fc030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b1... record new: [516] 01000200030333e207e63510ed6ad6835cbef90979fa7190e942b2c55043e6b1... client: Filtered packet: [521] 160303020401000200030333e207e63510ed6ad6835cbef90979fa7190e942b2... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageFirstClientHello (8 ms) [ RUN ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING handshake old: [508] 0303b9ead0ce01c284fd02e7f639a737a443130ca55143e2a1f0c39a551cbd25... handshake new: [512] 0303b9ead0ce01c284fd02e7f639a737a443130ca55143e2a1f0c39a551cbd25... record old: [512] 010001fc0303b9ead0ce01c284fd02e7f639a737a443130ca55143e2a1f0c39a... record new: [516] 010002000303b9ead0ce01c284fd02e7f639a737a443130ca55143e2a1f0c39a... client: Filtered packet: [521] 1603030204010002000303b9ead0ce01c284fd02e7f639a737a443130ca55143... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryStatelessDamageSecondClientHello (7 ms) [ RUN ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Warning alert sent: 0 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SecondClientHelloSendSameTicket (11 ms) [ RUN ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [151] 0303ec6f702d1df8dfed3bde39870fc01a72834cbde7da8792fafec4eeb9b68a... handshake new: [151] 0303ec6f702d1df8dfed3bde39870fc01a72834cbde7da8792fafec4eeb9b68a... record old: [155] 020000970303ec6f702d1df8dfed3bde39870fc01a72834cbde7da8792fafec4... record new: [155] 020000970303ec6f702d1df8dfed3bde39870fc01a72834cbde7da8792fafec4... server: Filtered packet: [823] 160303009b020000970303ec6f702d1df8dfed3bde39870fc01a72834cbde7da... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.RetryWithDifferentCipherSuite (34 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12 (3 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. [ OK ] TlsConnectStreamTls13.ZeroRttHrrThenTls12 (9 ms) [ RUN ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03039f4b7004824af108dccb8509aea537b2cd58629b6307771bbe0de22a0f85... handshake new: [194] 03039f4b7004824af108dccb8509aea537b2cd58629b6307771bbe0de22a0f85... record old: [191] 010000bb03039f4b7004824af108dccb8509aea537b2cd58629b6307771bbe0d... record new: [198] 010000c203039f4b7004824af108dccb8509aea537b2cd58629b6307771bbe0d... client: Filtered packet: [203] 16030100c6010000c203039f4b7004824af108dccb8509aea537b2cd58629b63... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.HrrThenTls12SupportedVersions (9 ms) [ RUN ] TlsConnectStreamTls13.ClientHelloExtensionPermutationWithPSK Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ClientHelloExtensionPermutationWithPSK (4 ms) [ RUN ] TlsConnectStreamTls13.ClientHelloExtensionPermutationProbabilisticTest Version: TLS 1.3 client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client client: Changing state from INIT to CONNECTING Reset server:rsa, client:client [ OK ] TlsConnectStreamTls13.ClientHelloExtensionPermutationProbabilisticTest (5 ms) [ RUN ] TlsConnectStreamTls13.ClientHelloCertAuthXtnToleration Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [182] 03037cb731e84bee307705ca5ab2814180beda8f259bf7fd6a3329a4e8394372... handshake new: [189] 03037cb731e84bee307705ca5ab2814180beda8f259bf7fd6a3329a4e8394372... record old: [186] 010000b603037cb731e84bee307705ca5ab2814180beda8f259bf7fd6a3329a4... record new: [193] 010000bd03037cb731e84bee307705ca5ab2814180beda8f259bf7fd6a3329a4... client: Filtered packet: [198] 16030100c1010000bd03037cb731e84bee307705ca5ab2814180beda8f259bf7... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.ClientHelloCertAuthXtnToleration (6 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopClient (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionAllNoopServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionAllNoopServer (6 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterClient (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionEmptyWriterServer (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionWriterDisable Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionWriterDisable (6 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverride Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverride (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientToServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionClientToServer (6 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientSH Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientSH (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerToClientEE Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CustomExtensionServerToClientEE (6 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionUnsolicitedServer (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerReject (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientReject Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientReject (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 246 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 246 client: Handshake failed with error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionServerRejectAlert (3 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 246 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionClientRejectAlert (5 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyWriter Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyWriter (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOnlyHandler Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CustomExtensionOnlyHandler (2 ms) [ RUN ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SEC_ERROR_APPLICATION_CALLBACK_ERROR: The certificate was rejected by extra checks in the application. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CustomExtensionOverrunBuffer (2 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_CannotAddAlgorithmEmptyEncodingAndDecoding Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CertificateCompression_CannotAddAlgorithmEmptyEncodingAndDecoding (2 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_CannotAddAlgorithmWithReservedID Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CertificateCompression_CannotAddAlgorithmWithReservedID (2 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_AddingAlreadyExistingAlg Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CertificateCompression_AddingAlreadyExistingAlg (2 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_LengthIsOdd Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 02ff01 extension new: [3] 01ff01 handshake old: [189] 030340261bd79560688f245f705c9eca2377f4ad04e040f94b5eb7ddc38f89ee... handshake new: [189] 030340261bd79560688f245f705c9eca2377f4ad04e040f94b5eb7ddc38f89ee... record old: [193] 010000bd030340261bd79560688f245f705c9eca2377f4ad04e040f94b5eb7dd... record new: [193] 010000bd030340261bd79560688f245f705c9eca2377f4ad04e040f94b5eb7dd... client: Filtered packet: [198] 16030100c1010000bd030340261bd79560688f245f705c9eca2377f4ad04e040... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_LengthIsOdd (3 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_LengthIsBiggerThanExpected Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 02ff01 extension new: [3] 04ff01 handshake old: [189] 0303f548285b9e2becfd518f6f47dfe3f95529b5c094383dcb4e2edf49a74486... handshake new: [189] 0303f548285b9e2becfd518f6f47dfe3f95529b5c094383dcb4e2edf49a74486... record old: [193] 010000bd0303f548285b9e2becfd518f6f47dfe3f95529b5c094383dcb4e2edf... record new: [193] 010000bd0303f548285b9e2becfd518f6f47dfe3f95529b5c094383dcb4e2edf... client: Filtered packet: [198] 16030100c1010000bd0303f548285b9e2becfd518f6f47dfe3f95529b5c09438... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_LengthIsBiggerThanExpected (3 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_LengthIsSmallerThanExpected Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 04ff01ff02 extension new: [5] 02ff01ff02 handshake old: [191] 030329301d79f19521a16327ea4a79e880ea2f05e111efdb62d4ddc3f28e839b... handshake new: [191] 030329301d79f19521a16327ea4a79e880ea2f05e111efdb62d4ddc3f28e839b... record old: [195] 010000bf030329301d79f19521a16327ea4a79e880ea2f05e111efdb62d4ddc3... record new: [195] 010000bf030329301d79f19521a16327ea4a79e880ea2f05e111efdb62d4ddc3... client: Filtered packet: [200] 16030100c3010000bf030329301d79f19521a16327ea4a79e880ea2f05e111ef... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_LengthIsSmallerThanExpected (3 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ClientHelloUsedCompressedCertificate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ClientHelloUsedCompressedCertificate (6 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ClientAuthUsesTheServerPreferredAlg Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ClientAuthUsesTheServerPreferredAlg (10 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ServerReceivedUnexpectedEncodedCertificate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [650] 170303028568ada353fee666dc4b0bc6a763a31b1af384104368e59939bd2e04... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 50 server: Handshake failed with error SEC_ERROR_UNEXPECTED_COMPRESSED_CERTIFICATE: Received unexpected compressed certificate. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Read error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ServerReceivedUnexpectedEncodedCertificate (10 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_UnknownAlgorithmNoExtensionNegotiated Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_UnknownAlgorithmNoExtensionNegotiated (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ServerReceivedUnexpectedEncodedCertificate_PostAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [480] 17030301dbebcf0385ba7ec7617f8b0c66b9fbd6d5e13708e24d80385fe6768f... server: Fatal alert sent: 50 server: Read error SEC_ERROR_UNEXPECTED_COMPRESSED_CERTIFICATE: Received unexpected compressed certificate. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ServerReceivedUnexpectedEncodedCertificate_PostAuth (6 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ServerReceivedUnexpectedEncodedCertificateAfterRequesting Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [480] 17030301db9e69bf060bb4b7c9b5a3280a95ee2598175e91ca61f6ebdf8b042e... server: Fatal alert sent: 50 server: Read error SEC_ERROR_UNEXPECTED_COMPRESSED_CERTIFICATE: Received unexpected compressed certificate. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ServerReceivedUnexpectedEncodedCertificateAfterRequesting (8 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_OneCommonAlg Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_OneCommonAlg (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_Preference Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_Preference (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_SameIDDifferentAlgs Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_BAD_SERVER: The client has encountered bad data from the server. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_SameIDDifferentAlgs (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_NoCommonAlgs Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_NoCommonAlgs (6 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_TooManyAlgorithms Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.CertificateCompression_TooManyAlgorithms (2 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_SameEncodingAsInCertificateExt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_SameEncodingAsInCertificateExt (6 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ServerChecksEncodingNoneInstalled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ServerChecksEncodingNoneInstalled (6 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_CompressionFunctionCreatesABufferOfSize0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SEC_ERROR_LIBRARY_FAILURE: security library failure. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_CompressionFunctionCreatesABufferOfSize0 (4 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ReceivedWrongAlgorithm Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [784] 160303005a020000560303f4ec103b26da513748b0e2ed014534987b3bd339aa... client: Fatal alert sent: 47 client: Handshake failed with error SEC_ERROR_CERTIFICATE_COMPRESSION_ALGORITHM_NOT_SUPPORTED: The certificate was encoded using an unsupported certificate compression algorithm. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_ReceivedWrongAlgorithm (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ReceivedZeroCompressedMessage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [784] 160303005a020000560303bdfed61067fd74a83ee045939ebc6cdcc653000df9... client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_ReceivedZeroCompressedMessage (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ReceivedLongerCompressedMessage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [784] 160303005a0200005603037007f077371aa0faceacc3e4838b816552f6243998... client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_ReceivedLongerCompressedMessage (6 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ReceivedCertificateTooLong Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [788] 160303005a02000056030363b25cb8c61bd1c7a3113035883bae9066258b1fd1... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTED to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] TlsConnectStreamTls13.CertificateCompression_ReceivedCertificateTooLong (6 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_CertificateCannotEncode Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SEC_ERROR_NO_MEMORY: security library: memory allocation failure. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_CertificateCannotEncode (4 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_CertificateCannotDecode Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_CertificateCannotDecode (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_WrongDecodedCertificateLength Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_WrongDecodedCertificateLength (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_PostAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_PostAuth (9 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ClientOnlyDecodes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ClientOnlyDecodes (5 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ClientOnlyDecodes_NoEncoding Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_ClientOnlyDecodes_NoEncoding (8 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_TwoEncodedCertificateRequests Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.CertificateCompression_TwoEncodedCertificateRequests (11 ms) [ RUN ] TlsConnectStreamTls13.CertificateCompression_ServerDecodingIsNULL Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SEC_ERROR_LIBRARY_FAILURE: security library failure. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectStreamTls13.CertificateCompression_ServerDecodingIsNULL (6 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicket Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicket (10 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketPha (12 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttUsingLateTicketClientAuth (12 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttLateReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttLateReadTls (10 ms) [ RUN ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.ZeroRttCoalesceReadTls (10 ms) [ RUN ] TlsConnectStreamTls13.TimePassesByDefault Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.TimePassesByDefault (1017 ms) [ RUN ] TlsConnectStreamTls13.BadAntiReplayArgs Version: TLS 1.3 [ OK ] TlsConnectStreamTls13.BadAntiReplayArgs (0 ms) [ RUN ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectStreamTls13.SuppressEndOfEarlyDataClientOnly (10 ms) [----------] 105 tests from TlsConnectStreamTls13 (1727 ms total) [----------] 8 tests from SelfEncryptTest128 [ RUN ] SelfEncryptTest128.ShortKeyName Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortKeyName (0 ms) [ RUN ] SelfEncryptTest128.ShortIv Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortIv (0 ms) [ RUN ] SelfEncryptTest128.ShortCiphertextLen Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertextLen (0 ms) [ RUN ] SelfEncryptTest128.ShortCiphertext Error: SEC_ERROR_BAD_DATA [ OK ] SelfEncryptTest128.ShortCiphertext (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyEncrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyEncrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyEncrypt (0 ms) [ RUN ] SelfEncryptTest128.MacWithAESKeyDecrypt Error: SEC_ERROR_LIBRARY_FAILURE [ OK ] SelfEncryptTest128.MacWithAESKeyDecrypt (0 ms) [ RUN ] SelfEncryptTest128.AESWithMacKeyDecrypt Error: SEC_ERROR_INVALID_KEY [ OK ] SelfEncryptTest128.AESWithMacKeyDecrypt (0 ms) [----------] 8 tests from SelfEncryptTest128 (0 ms total) [----------] 43 tests from TlsConnectTest [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls11 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303f979afccd7419f95e2e79efb00c1b72cae0b5ef1ad7078bee39f0d7d494f... handshake new: [187] 0302f979afccd7419f95e2e79efb00c1b72cae0b5ef1ad7078bee39f0d7d494f... record old: [191] 010000bb0303f979afccd7419f95e2e79efb00c1b72cae0b5ef1ad7078bee39f... record new: [191] 010000bb0302f979afccd7419f95e2e79efb00c1b72cae0b5ef1ad7078bee39f... client: Filtered packet: [196] 16030100bf010000bb0302f979afccd7419f95e2e79efb00c1b72cae0b5ef1ad... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls11 (4 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 03038aed701440ccf3fa2803aa424c5ca2b403661504c832e7b79e4e44acc1e3... handshake new: [499] 03038aed701440ccf3fa2803aa424c5ca2b403661504c832e7b79e4e44acc1e3... record old: [512] 010001fc03038aed701440ccf3fa2803aa424c5ca2b403661504c832e7b79e4e... record new: [503] 010001f303038aed701440ccf3fa2803aa424c5ca2b403661504c832e7b79e4e... client: Filtered packet: [508] 16030101f7010001f303038aed701440ccf3fa2803aa424c5ca2b403661504c8... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls12 (5 ms) [ RUN ] TlsConnectTest.TestDisableDowngradeDetection Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [5] 0403040303 handshake old: [508] 03032bab3ba62d4af397b57b7cae134556efb08aaee6e58594e07faa3b4085a1... handshake new: [499] 03032bab3ba62d4af397b57b7cae134556efb08aaee6e58594e07faa3b4085a1... record old: [512] 010001fc03032bab3ba62d4af397b57b7cae134556efb08aaee6e58594e07faa... record new: [503] 010001f303032bab3ba62d4af397b57b7cae134556efb08aaee6e58594e07faa... client: Filtered packet: [508] 16030101f7010001f303032bab3ba62d4af397b57b7cae134556efb08aaee6e5... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDisableDowngradeDetection (6 ms) [ RUN ] TlsConnectTest.TestDowngradeDetectionToTls10 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302cd1007602b58d866f5f49d0fa5982c702fdaa08924ee806e8594169c529d... handshake new: [117] 0301cd1007602b58d866f5f49d0fa5982c702fdaa08924ee806e8594169c529d... record old: [121] 010000750302cd1007602b58d866f5f49d0fa5982c702fdaa08924ee806e8594... record new: [121] 010000750301cd1007602b58d866f5f49d0fa5982c702fdaa08924ee806e8594... client: Filtered packet: [126] 1603010079010000750301cd1007602b58d866f5f49d0fa5982c702fdaa08924... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestDowngradeDetectionToTls10 (6 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls12 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls12 (4 ms) [ RUN ] TlsConnectTest.DisableFalseStartOnFallback Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.DisableFalseStartOnFallback (6 ms) [ RUN ] TlsConnectTest.TestFallbackFromTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestFallbackFromTls13 (4 ms) [ RUN ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled Version: TLS (no version) [ OK ] TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled (2 ms) [ RUN ] TlsConnectTest.TlsSupportedVersionsEncoding Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.TlsSupportedVersionsEncoding (6 ms) [ RUN ] TlsConnectTest.EchoTLS13CompatibilitySessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303be58dec8dd381e1fa1c5233ec969fdbe4592544fc7810d95638552c1521b... handshake new: [93] 0303be58dec8dd381e1fa1c5233ec969fdbe4592544fc7810d95638552c1521b... record old: [715] 0200005d0303be58dec8dd381e1fa1c5233ec969fdbe4592544fc7810d956385... record new: [715] 0200005d0303be58dec8dd381e1fa1c5233ec969fdbe4592544fc7810d956385... server: Filtered packet: [720] 16030302cb0200005d0303be58dec8dd381e1fa1c5233ec969fdbe4592544fc7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.EchoTLS13CompatibilitySessionID (5 ms) [ RUN ] TlsConnectTest.TLS13NonCompatModeSessionID Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 030395c9c642ff49385f5de378f5134cf02e87ba4bb5ad6e16e74fe153b10052... handshake new: [118] 030395c9c642ff49385f5de378f5134cf02e87ba4bb5ad6e16e74fe153b10052... record old: [90] 02000056030395c9c642ff49385f5de378f5134cf02e87ba4bb5ad6e16e74fe1... record new: [122] 02000076030395c9c642ff49385f5de378f5134cf02e87ba4bb5ad6e16e74fe1... server: Filtered packet: [808] 160303007a02000076030395c9c642ff49385f5de378f5134cf02e87ba4bb5ad... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TLS13NonCompatModeSessionID (5 ms) [ RUN ] TlsConnectTest.RenegotiationConfigTls13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.RenegotiationConfigTls13 (6 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeClient (5 ms) [ RUN ] TlsConnectTest.Tls13RejectsRehandshakeServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.Tls13RejectsRehandshakeServer (6 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionTwice Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionTwice (14 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNST Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNST (11 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDuplicateNSTWithToken (11 ms) [ RUN ] TlsConnectTest.SendSessionTicketWithTicketsDisabled Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketWithTicketsDisabled (10 ms) [ RUN ] TlsConnectTest.SendTicketAfterResumption Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendTicketAfterResumption (15 ms) [ RUN ] TlsConnectTest.SendSessionTicketInappropriate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketInappropriate (6 ms) [ RUN ] TlsConnectTest.SendSessionTicketMassiveToken Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectTest.SendSessionTicketMassiveToken (7 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.TestTls13ResumptionDowngrade (15 ms) [ RUN ] TlsConnectTest.TestTls13ResumptionForcedDowngrade Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... handshake new: [92] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... record old: [96] 0200005c030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... record new: [96] 0200005c030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... handshake old: [92] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... handshake new: [92] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... record old: [96] 0200005c030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... record new: [96] 0200005c030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... extension drop: [2] 0304 handshake old: [92] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... handshake new: [86] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... record old: [96] 0200005c030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... record new: [90] 02000056030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... extension drop: [36] 001d00200ddbc77c47fc13df3be765418f210520e6d62031de6ae0f39cf1b6a6... handshake old: [86] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... handshake new: [46] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... record old: [90] 02000056030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... record new: [50] 0200002e030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... extension drop: [2] 0000 handshake old: [46] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... handshake new: [40] 030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25778b9870... record old: [50] 0200002e030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... record new: [44] 02000028030381a35d22cd7cdce9f637ca262f454fc46f703ff302deebd06e25... server: Filtered packet: [149] 160303002c02000028030381a35d22cd7cdce9f637ca262f454fc46f703ff302... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.TestTls13ResumptionForcedDowngrade (12 ms) [ RUN ] TlsConnectTest.HandshakeSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.HandshakeSecrets (5 ms) [ RUN ] TlsConnectTest.ZeroRttSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.ZeroRttSecrets (9 ms) [ RUN ] TlsConnectTest.KeyUpdateSecrets Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateSecrets (6 ms) [ RUN ] TlsConnectTest.ConnectSSLv3 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3 (4 ms) [ RUN ] TlsConnectTest.ConnectSSLv3ClientAuth Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsConnectTest.ConnectSSLv3ClientAuth (7 ms) [ RUN ] TlsConnectTest.OneNRecordSplitting Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.OneNRecordSplitting (4 ms) [ RUN ] TlsConnectTest.KeyUpdateClient Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClient (6 ms) [ RUN ] TlsConnectTest.KeyUpdateClientRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateClientRequestUpdate (6 ms) [ RUN ] TlsConnectTest.KeyUpdateServer Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServer (6 ms) [ RUN ] TlsConnectTest.KeyUpdateServerRequestUpdate Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateServerRequestUpdate (6 ms) [ RUN ] TlsConnectTest.KeyUpdateConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateConsecutiveRequests (6 ms) [ RUN ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateLocalUpdateThenConsecutiveRequests (6 ms) [ RUN ] TlsConnectTest.KeyUpdateMultiple Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateMultiple (6 ms) [ RUN ] TlsConnectTest.KeyUpdateBothRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateBothRequest (6 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnWrite Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnWrite (6 ms) [ RUN ] TlsConnectTest.KeyUpdateAutomaticOnRead Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectTest.KeyUpdateAutomaticOnRead (6 ms) [ RUN ] TlsConnectTest.Select12AfterHelloRetryRequest Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.Select12AfterHelloRetryRequest (43 ms) [ RUN ] TlsConnectTest.GatherExcessiveV3Record Version: TLS (no version) client: Send Direct [5] 1603014801 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 22 server: Handshake failed with error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.GatherExcessiveV3Record (2 ms) [ RUN ] TlsConnectTest.DamageSecretHandleClientFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Damaging HS secret client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectTest.DamageSecretHandleClientFinished (5 ms) [ RUN ] TlsConnectTest.DamageSecretHandleServerFinished Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [95] 160303005a02000056030360e705161648d32bcf77d6e7281b7337e23fed63a7... record drop: TLS 1.2 Handshake 2000000000000:[90] 02000056030360e705161648d32bcf77d6e7281b7337e23fed63a7d724d3ba98... server: Filtered packet: [681] 17030302a48448c5a4647a0ffd39df3276f469da327b13687ad5f01ddd762099... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectTest.DamageSecretHandleServerFinished (6 ms) [----------] 43 tests from TlsConnectTest (344 ms total) [----------] 3 tests from DtlsConnectTest [ RUN ] DtlsConnectTest.TestDtlsVersion11 Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefdf3cff0b96f790412270775f1207a5ec257d89d04ae83eacaabe75f952c13... handshake new: [184] fefef3cff0b96f790412270775f1207a5ec257d89d04ae83eacaabe75f952c13... record old: [196] 010000b800000000000000b8fefdf3cff0b96f790412270775f1207a5ec257d8... record new: [196] 010000b800000000000000b8fefef3cff0b96f790412270775f1207a5ec257d8... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefef3cff0b96f... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] DtlsConnectTest.TestDtlsVersion11 (2 ms) [ RUN ] DtlsConnectTest.DtlsSupportedVersionsEncoding Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.DtlsSupportedVersionsEncoding (6 ms) [ RUN ] DtlsConnectTest.Dtls13VersionWorkaround Version: DTLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DtlsConnectTest.Dtls13VersionWorkaround (6 ms) [----------] 3 tests from DtlsConnectTest (15 ms total) [----------] 3 tests from Tls13NoSupportedVersions [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03036453ce62d9eea82aa40e50da4cfbfdfa757bd21a8a3f0f1ff751e2dad3d9... handshake new: [187] 03046453ce62d9eea82aa40e50da4cfbfdfa757bd21a8a3f0f1ff751e2dad3d9... record old: [191] 010000bb03036453ce62d9eea82aa40e50da4cfbfdfa757bd21a8a3f0f1ff751... record new: [191] 010000bb03046453ce62d9eea82aa40e50da4cfbfdfa757bd21a8a3f0f1ff751... client: Filtered packet: [196] 16030100bf010000bb03046453ce62d9eea82aa40e50da4cfbfdfa757bd21a8a... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer12 (5 ms) [ RUN ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 03032f96817be1ba10e6508f8560d4490ac92287fa866e51fd080d9b8fd3990c... handshake new: [187] 03042f96817be1ba10e6508f8560d4490ac92287fa866e51fd080d9b8fd3990c... record old: [191] 010000bb03032f96817be1ba10e6508f8560d4490ac92287fa866e51fd080d9b... record new: [191] 010000bb03042f96817be1ba10e6508f8560d4490ac92287fa866e51fd080d9b... client: Filtered packet: [196] 16030100bf010000bb03042f96817be1ba10e6508f8560d4490ac92287fa866e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls13ClientHelloWithoutSupportedVersionsServer13 (5 ms) [ RUN ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 030308fa6da959c1aa2d1a0f62eb3afa2f71e95b1117ac364b44cb4f90a8b6bf... handshake new: [187] 030508fa6da959c1aa2d1a0f62eb3afa2f71e95b1117ac364b44cb4f90a8b6bf... record old: [191] 010000bb030308fa6da959c1aa2d1a0f62eb3afa2f71e95b1117ac364b44cb4f... record new: [191] 010000bb030508fa6da959c1aa2d1a0f62eb3afa2f71e95b1117ac364b44cb4f... client: Filtered packet: [196] 16030100bf010000bb030508fa6da959c1aa2d1a0f62eb3afa2f71e95b1117ac... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Tls13NoSupportedVersions.Tls14ClientHelloWithoutSupportedVersionsServer13 (5 ms) [----------] 3 tests from Tls13NoSupportedVersions (17 ms total) [----------] 3 tests from SSLv2ClientHelloTestF [ RUN ] SSLv2ClientHelloTestF.Connect13 Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030400030000001000c02f199dac59668b6a92cea55bd3fecc0ee2 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.Connect13 (3 ms) [ RUN ] SSLv2ClientHelloTestF.FallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f010302000600000010000033005600ee5dc8af2700cabb30303f58c0fab2... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] SSLv2ClientHelloTestF.FallbackSCSV (22 ms) [ RUN ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f010302000600000010000033005600fbd967bdedc95c55e903efc43eb85a... server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] SSLv2ClientHelloTestF.InappropriateFallbackSCSV (2 ms) [----------] 3 tests from SSLv2ClientHelloTestF (27 ms total) [----------] 11 tests from Tls13CompatTest [ RUN ] Tls13CompatTest.Disabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Disabled (6 ms) [ RUN ] Tls13CompatTest.Enabled Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.Enabled (6 ms) [ RUN ] Tls13CompatTest.EnabledZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledZeroRtt (10 ms) [ RUN ] Tls13CompatTest.EnabledHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrr (41 ms) [ RUN ] Tls13CompatTest.EnabledStatelessHrr Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledStatelessHrr (43 ms) [ RUN ] Tls13CompatTest.EnabledHrrZeroRtt Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledHrrZeroRtt (48 ms) [ RUN ] Tls13CompatTest.EnabledAcceptedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.EnabledAcceptedEch (7 ms) [ RUN ] Tls13CompatTest.EnabledRejectedEch Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 121 client: Handshake failed with error SSL_ERROR_ECH_RETRY_WITHOUT_ECH: TLS ECH was rejected, but verification succeeded and no compatible retry_configs were found. client: Changing state from CONNECTING to ERROR server: Handshake success server: Changing state from CONNECTING to CONNECTED [ OK ] Tls13CompatTest.EnabledRejectedEch (7 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [6] 140303000101 client: Send Direct [6] 140303000101 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. server: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterClientHelloTwice (5 ms) [ RUN ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [32] bd4fc0d0c91bc74c0b3673c795f86012f44888ecb08d2a6f737204dee4291fa9 record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [623] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [778] 160303007a020000760303cf4ecd69f1ed350b3b9a3fbba856c3b63568eda464... server: Send Direct [6] 140303000101 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. client: Changing state from CONNECTING to ERROR [ OK ] Tls13CompatTest.ChangeCipherSpecAfterServerHelloTwice (6 ms) [ RUN ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13CompatTest.ConnectWith12ThenAttemptToResume13CompatMode (10 ms) [----------] 11 tests from Tls13CompatTest (193 ms total) [----------] 57 tests from TlsConnectDatagram13 [ RUN ] TlsConnectDatagram13.CompatModeDtlsClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.CompatModeDtlsClient (6 ms) [ RUN ] TlsConnectDatagram13.CompatModeDtlsServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [183] fefd61e19f1b6043a14aceeb45020289b1266be0471c818d80d5a64d3f1a612e... handshake new: [215] fefd61e19f1b6043a14aceeb45020289b1266be0471c818d80d5a64d3f1a612e... record old: [195] 010000b700000000000000b7fefd61e19f1b6043a14aceeb45020289b1266be0... record new: [227] 010000d700000000000000d7fefd61e19f1b6043a14aceeb45020289b1266be0... client: Filtered packet: [240] 16feff000000000000000000e3010000d700000000000000d7fefd61e19f1b60... [ OK ] TlsConnectDatagram13.CompatModeDtlsServer (5 ms) [ RUN ] TlsConnectDatagram13.SendSessionTicketDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendSessionTicketDtls (6 ms) [ RUN ] TlsConnectDatagram13.ForwardDataDtls Version: DTLS 1.3 [ OK ] TlsConnectDatagram13.ForwardDataDtls (2 ms) [ RUN ] TlsConnectDatagram13.AeadLimit Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] 8137c315831718fc985712a0e453cb33527215eae0726777a4f8ca record new: [27] 8137c315831718fc985712a0e453cb33527215eae0726777a4f8cb client: Filtered packet: [32] 2f0000001b8137c315831718fc985712a0e453cb33527215eae0726777a4f8cb server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked record old: [27] 4b649e6a1f89fc314bf2d239a964a5739cb838984267d0332233a5 record new: [27] 4b649e6a1f89fc314bf2d239a964a5739cb838984267d0332233a6 client: Filtered packet: [32] 2f0000001b4b649e6a1f89fc314bf2d239a964a5739cb838984267d0332233a6 server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AeadLimit (6 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersClient Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersClient (6 ms) [ RUN ] TlsConnectDatagram13.ShortHeadersServer Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ShortHeadersServer (6 ms) [ RUN ] TlsConnectDatagram13.DtlsAlternateShortHeader Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [23] 2ba9d39b7ba1781927a76c20f3a3434ed96674caa350d2 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DtlsAlternateShortHeader (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientKUSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientKUSucceed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientKUTwiceOnceIgnored Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientKUTwiceOnceIgnored (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ServerKUSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ServerKUSucceed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_PreviousKUNotYetACKed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_PreviousKUNotYetACKed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_TwiceReceivedOnceIgnored Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Drop packet client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Send Direct [35] 2f3009001e9cfad7d4dee5455a61d2407531b9b904bf94b8cfc71f960e064f8d... server: Send Direct [35] 2f3009001e9cfad7d4dee5455a61d2407531b9b904bf94b8cfc71f960e064f8d... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_TwiceReceivedOnceIgnored (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_UpdateRequestedSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_UpdateRequestedSucceed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_UpdateRequestedTwiceSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_UpdateRequestedTwiceSucceed (7 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ServerUpdateRequestedSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ServerUpdateRequestedSucceed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ServerUpdateRequestedTwiceSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ServerUpdateRequestedTwiceSucceed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientServerConseqSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientServerConseqSucceed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientServerUpdateRequestedBothSucceed Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientServerUpdateRequestedBothSucceed (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_KUInTheMiddleIsRejected Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_KUInTheMiddleIsRejected (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientImmediateSend Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientImmediateSend (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ServerImmediateSend Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ServerImmediateSend (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientImmediateSendAfterServerRead Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientImmediateSendAfterServerRead (5 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientImmediateSendAfterServerReadAndACK Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientImmediateSendAfterServerReadAndACK (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientWritingEpochUpdatedAfterReceivedACK Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientWritingEpochUpdatedAfterReceivedACK (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientMaxEpochReached Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientMaxEpochReached (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ClientMaxEpochReachedUpdateRequested Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ClientMaxEpochReachedUpdateRequested (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_AutomaticOnWrite Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_AutomaticOnWrite (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_AutomaticOnRead Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet client: Send Direct [35] 2f23d6001ef17d34eb259814be6681c8f0ff46cd91412b07494439dbcfdd4789... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_AutomaticOnRead (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_CanSendBeforeThreshold Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] TlsConnectDatagram13.DTLSKU_CanSendBeforeThreshold (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_DiscardAfterThreshold Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet client: Send Direct [35] 2f9530001ec110dec43bc6092110f6fd17c525f3a8c30f18d82ccd41330b6be3... client: Send Direct [35] 2f9530001ec110dec43bc6092110f6fd17c525f3a8c30f18d82ccd41330b6be3... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_DiscardAfterThreshold (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_PreviousEpochIsAcceptedBeforeNew Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [32] 2f0235001b7562ec9e6785437d89730e9e15a97bcee426bc87b9618220cfdc68 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_PreviousEpochIsAcceptedBeforeNew (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_2EpochsAgoIsRejected Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [32] 2fe734001b23bd01146db542ece88dba789fcaaca518487b0945508bfbd02c17 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_2EpochsAgoIsRejected (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_PreviousEpochIsAcceptedAfterNew Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [52] 2f35a3002f1de3b34ea3f7bec8b7dcf23a6e629a3317b70eb1379afbfc73d25c... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_PreviousEpochIsAcceptedAfterNew (6 ms) [ RUN ] TlsConnectDatagram13.DTLS_EpochReconstruction Version: DTLS 1.3 [ OK ] TlsConnectDatagram13.DTLS_EpochReconstruction (0 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_WrongValueForUpdateRequested Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [35] 2fa896001e09a7b62a0fcaf060e20572691a55ff0d389a53fd6adc602116cafd... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_KEY_UPDATE: SSL received a malformed key update message. server: Changing state from CONNECTED to ERROR client: Fatal alert received: 50 client: Read error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_WrongValueForUpdateRequested (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_DamagedLength Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [35] 2ff1f5001e027fff5aea52f758404138dcca0c70d5f6ebd744d50bb051a7ede5... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_DamagedLength (57 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_DamagedLengthTooLong Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [35] 2f1875001ef3499ed1a2727ef9ac43cba6cf771f2db5a29410018edde2fee69b... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_DamagedLengthTooLong (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_DamagedFragmentLength Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [35] 2fb91a001e8b5bd4897d32c164f3d97db9dfabb17901d5c499b72513ace72228... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_DamagedFragmentLength (57 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ModifACKEpoch Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Filtered packet: [56] 2f721500333e6abcd9218edeea3bec266e7cfefb49fdace0d65de81d3c185c56... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ModifACKEpoch (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_ModifACKSeqNum Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Filtered packet: [56] 2ffd770033620e571c1957e43d41454159edad4c5bdd5abbf1df8c832db0d0c7... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_ModifACKSeqNum (6 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_TooEarly_ClientCannotSendKeyUpdate Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet [ OK ] TlsConnectDatagram13.DTLSKU_TooEarly_ClientCannotSendKeyUpdate (5 ms) [ RUN ] TlsConnectDatagram13.DTLSKeyUpdateTooEarly_ServerCannotSendKeyUpdate Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet [ OK ] TlsConnectDatagram13.DTLSKeyUpdateTooEarly_ServerCannotSendKeyUpdate (5 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_TooEarly_Client Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [890] 16fefd00000000000000000062020000560000000000000056fefd1e21167723... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.DTLSKU_TooEarly_Client (5 ms) [ RUN ] TlsConnectDatagram13.DTLSKU_TooEarly_Server Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd5e0d6ac6c4... client: Filtered packet: [66] 2e9bd9003d0f7c69d75b45588b0290a684f741068f8921986e5e93a0411662c2... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_KEY_UPDATE: SSL received an unexpected key update message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DTLSKU_TooEarly_Server (5 ms) [ RUN ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.DropClientSecondFlightWithHelloRetry (40 ms) [ RUN ] TlsConnectDatagram13.MessageSeq1ClientHello Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record old: [195] 010000b700000000000000b7fefd2bbdb2337c9e4635efa63bb9795dd19f06e7... record new: [195] 010000b700010000000000b7fefd2bbdb2337c9e4635efa63bb9795dd19f06e7... client: Filtered packet: [208] 16feff000000000000000000c3010000b700010000000000b7fefd2bbdb2337c... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.MessageSeq1ClientHello (3 ms) [ RUN ] TlsConnectDatagram13.TlsVersionInDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 02fefc extension new: [3] 020304 handshake old: [183] fefd58366e28e9aaf8d4c37ea57e07ae5c72cbdd8096e3a5508cd900c9c168cc... handshake new: [183] fefd58366e28e9aaf8d4c37ea57e07ae5c72cbdd8096e3a5508cd900c9c168cc... record old: [195] 010000b700000000000000b7fefd58366e28e9aaf8d4c37ea57e07ae5c72cbdd... record new: [195] 010000b700000000000000b7fefd58366e28e9aaf8d4c37ea57e07ae5c72cbdd... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd58366e28e9... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.TlsVersionInDtls (3 ms) [ RUN ] TlsConnectDatagram13.Dtls13RejectLegacyCookie Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [183] fefd51fb444903d25f9826d3caf896e3c5598464c109e42783a2ef8f2fe94443... handshake new: [186] fefd51fb444903d25f9826d3caf896e3c5598464c109e42783a2ef8f2fe94443... record old: [195] 010000b700000000000000b7fefd51fb444903d25f9826d3caf896e3c5598464... record new: [198] 010000ba00000000000000bafefd51fb444903d25f9826d3caf896e3c5598464... client: Filtered packet: [211] 16feff000000000000000000c6010000ba00000000000000bafefd51fb444903... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsConnectDatagram13.Dtls13RejectLegacyCookie (2 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e362100140a4b82b127dffba0b3b79249488a8ac0fc6c0bb4 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderAppWithHandshakeKey (6 ms) [ RUN ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Send Direct [25] 2e91ff0014552d03428fc0a4d5ce41c7d0faa67997a5a9e872 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.SendOutOfOrderHsNonsenseWithHandshakeKey (6 ms) [ RUN ] TlsConnectDatagram13.UnderflowSequenceNumber Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.UnderflowSequenceNumber (6 ms) [ RUN ] TlsConnectDatagram13.AuthCompleteBeforeFinished Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.AuthCompleteBeforeFinished (55 ms) [ RUN ] TlsConnectDatagram13.ZeroRttLateReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateReadDtls (24 ms) [ RUN ] TlsConnectDatagram13.ZeroRttLateArrivalDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Send Direct [25] 2de06a001406191deb16cf83be75832452c8601c25ccbcc79d client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttLateArrivalDtls (10 ms) [ RUN ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttNoCoalesceReadDtls (10 ms) [ RUN ] TlsConnectDatagram13.ZeroRttShortReadDtls Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsConnectDatagram13.ZeroRttShortReadDtls (10 ms) [----------] 57 tests from TlsConnectDatagram13 (556 ms total) [----------] 2 tests from RecordSizeDefaultsTest [ RUN ] RecordSizeDefaultsTest.RecordSizeBadValues [ OK ] RecordSizeDefaultsTest.RecordSizeBadValues (0 ms) [ RUN ] RecordSizeDefaultsTest.RecordSizeGetValue [ OK ] RecordSizeDefaultsTest.RecordSizeGetValue (0 ms) [----------] 2 tests from RecordSizeDefaultsTest (0 ms total) [----------] 1 test from MiscTest [ RUN ] MiscTest.NonExistentExperimentalAPI [ OK ] MiscTest.NonExistentExperimentalAPI (0 ms) [----------] 1 test from MiscTest (0 ms total) [----------] 7 tests from GatherV2ClientHelloTest [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 Version: TLS (no version) client: Send Direct [5] 0001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordLongHeader2 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader Version: TLS (no version) client: Send Direct [5] 0000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordLongHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8003000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherV2RecordShortHeader (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 Version: TLS (no version) client: Send Direct [5] 8002000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader2 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 Version: TLS (no version) client: Send Direct [5] 8001000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader3 (2 ms) [ RUN ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader Version: TLS (no version) client: Send Direct [5] 8000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GatherV2ClientHelloTest.GatherEmptyV2RecordShortHeader (2 ms) [----------] 7 tests from GatherV2ClientHelloTest (17 ms total) [----------] 15 tests from TlsExtensionTest13Stream [ RUN ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [66] 0040ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... handshake old: [182] 030380ee20b7347855ab1a74355f829b445f18953084d2a65f30f89098d197c6... handshake new: [224] 030380ee20b7347855ab1a74355f829b445f18953084d2a65f30f89098d197c6... record old: [186] 010000b6030380ee20b7347855ab1a74355f829b445f18953084d2a65f30f890... record new: [228] 010000e0030380ee20b7347855ab1a74355f829b445f18953084d2a65f30f890... client: Filtered packet: [233] 16030100e4010000e0030380ee20b7347855ab1a74355f829b445f18953084d2... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.SignatureAlgorithmsPrecedingGarbage (6 ms) [ RUN ] TlsExtensionTest13Stream.DropServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d0020b8f03ff1d487f5d00390229249e4b50d78760611293d6b0b3c2ce78e... handshake old: [86] 0303fb912652f54f2d702de1e8754bcf429812d221fb2276fdf375318b9cda81... handshake new: [46] 0303fb912652f54f2d702de1e8754bcf429812d221fb2276fdf375318b9cda81... record old: [90] 020000560303fb912652f54f2d702de1e8754bcf429812d221fb2276fdf37531... record new: [50] 0200002e0303fb912652f54f2d702de1e8754bcf429812d221fb2276fdf37531... server: Filtered packet: [736] 16030300320200002e0303fb912652f54f2d702de1e8754bcf429812d221fb22... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.DropServerKeyShare (5 ms) [ RUN ] TlsExtensionTest13Stream.WrongServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d00208233a35c8970d2b9afd9b104ed3f6a0ed87bea14906cdbfaf8a47858... extension new: [6] 001800020102 handshake old: [86] 0303faacf74d2251fd30415e88e7a4a02a1e0105b4e6645b05d4485972f9b234... handshake new: [56] 0303faacf74d2251fd30415e88e7a4a02a1e0105b4e6645b05d4485972f9b234... record old: [90] 020000560303faacf74d2251fd30415e88e7a4a02a1e0105b4e6645b05d44859... record new: [60] 020000380303faacf74d2251fd30415e88e7a4a02a1e0105b4e6645b05d44859... server: Filtered packet: [746] 160303003c020000380303faacf74d2251fd30415e88e7a4a02a1e0105b4e664... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.WrongServerKeyShare (5 ms) [ RUN ] TlsExtensionTest13Stream.UnknownServerKeyShare Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [36] 001d002087ddc645974fac2bc4aa4dab5f7def62c639ebaf6e6cdd4d3479cb2c... extension new: [6] ffff00020102 handshake old: [86] 030368ac1d642c7b00a00c59a84fcff695fc1377338de6e352fbf6dad3e88411... handshake new: [56] 030368ac1d642c7b00a00c59a84fcff695fc1377338de6e352fbf6dad3e88411... record old: [90] 02000056030368ac1d642c7b00a00c59a84fcff695fc1377338de6e352fbf6da... record new: [60] 02000038030368ac1d642c7b00a00c59a84fcff695fc1377338de6e352fbf6da... server: Filtered packet: [746] 160303003c02000038030368ac1d642c7b00a00c59a84fcff695fc1377338de6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_KEY_SHARE: SSL received a malformed Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.UnknownServerKeyShare (5 ms) [ RUN ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 0303fa500a4fcbd929159ba242b4c4d270266363fa5e5c9a4671e8f0b4ceb7ee... handshake new: [96] 0303fa500a4fcbd929159ba242b4c4d270266363fa5e5c9a4671e8f0b4ceb7ee... record old: [96] 0200005c0303fa500a4fcbd929159ba242b4c4d270266363fa5e5c9a4671e8f0... record new: [100] 020000600303fa500a4fcbd929159ba242b4c4d270266363fa5e5c9a4671e8f0... server: Filtered packet: [205] 1603030064020000600303fa500a4fcbd929159ba242b4c4d270266363fa5e5c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.AddServerSignatureAlgorithmsOnResumption (9 ms) [ RUN ] TlsExtensionTest13Stream.ResumeEmptyPskLabel Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b229f143874e2b1e14409d5c77000000002922b9698406d09af9548cc1... extension new: [43] 00060000fd0123a4002120a4c6add16e909333a07044a6cd98be112b544fb3c1... handshake old: [508] 03036238d9129a675d7f2e5efc8ceb7cc459845b19851da25b7a1125e7ef02b2... handshake new: [330] 03036238d9129a675d7f2e5efc8ceb7cc459845b19851da25b7a1125e7ef02b2... record old: [512] 010001fc03036238d9129a675d7f2e5efc8ceb7cc459845b19851da25b7a1125... record new: [334] 0100014a03036238d9129a675d7f2e5efc8ceb7cc459845b19851da25b7a1125... client: Filtered packet: [339] 160301014e0100014a03036238d9129a675d7f2e5efc8ceb7cc459845b19851d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeEmptyPskLabel (8 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b26c7057663ce11921d554ebff00000000e81f0bd70275bad35a1b13ec... extension new: [221] 00b800b26c7057663ce11921d554ebff00000000e81f0bd70275bad35a1b13ec... handshake old: [508] 03036ea78ae312c9d74b59648af579ea6fdb1f82de351cb89fbd8c94c04d5003... handshake new: [508] 03036ea78ae312c9d74b59648af579ea6fdb1f82de351cb89fbd8c94c04d5003... record old: [512] 010001fc03036ea78ae312c9d74b59648af579ea6fdb1f82de351cb89fbd8c94... record new: [512] 010001fc03036ea78ae312c9d74b59648af579ea6fdb1f82de351cb89fbd8c94... client: Filtered packet: [517] 1603010200010001fc03036ea78ae312c9d74b59648af579ea6fdb1f82de351c... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderValue (8 ms) [ RUN ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2ead8cced2a8ff694f026df3600000000d829cd5500c50238da0a1a87... extension new: [222] 00b800b2ead8cced2a8ff694f026df3600000000d829cd5500c50238da0a1a87... handshake old: [508] 03036838593138ee2b4bf216806dae8154d34a531575b3b46320c95dc962fe6e... handshake new: [509] 03036838593138ee2b4bf216806dae8154d34a531575b3b46320c95dc962fe6e... record old: [512] 010001fc03036838593138ee2b4bf216806dae8154d34a531575b3b46320c95d... record new: [513] 010001fd03036838593138ee2b4bf216806dae8154d34a531575b3b46320c95d... client: Filtered packet: [518] 1603010201010001fd03036838593138ee2b4bf216806dae8154d34a531575b3... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeIncorrectBinderLength (9 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBinderTooShort Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2aeb7dfbf5fd533ea12aa025800000000548f3901a22029daf19fc9b3... extension new: [220] 00b800b2aeb7dfbf5fd533ea12aa025800000000548f3901a22029daf19fc9b3... handshake old: [508] 0303371c4882ac2eb8b40f3e41580d5c51303e24edfe12296d10e36702fc641d... handshake new: [507] 0303371c4882ac2eb8b40f3e41580d5c51303e24edfe12296d10e36702fc641d... record old: [512] 010001fc0303371c4882ac2eb8b40f3e41580d5c51303e24edfe12296d10e367... record new: [511] 010001fb0303371c4882ac2eb8b40f3e41580d5c51303e24edfe12296d10e367... client: Filtered packet: [516] 16030101ff010001fb0303371c4882ac2eb8b40f3e41580d5c51303e24edfe12... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBinderTooShort (8 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoPsks Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b2e3744da1ae0fe2e7a9d66143000000008ea91fb8b291ca2e1f3773b1... extension new: [438] 017000b2e3744da1ae0fe2e7a9d66143000000008ea91fb8b291ca2e1f3773b1... handshake old: [508] 03032c6714fa9cde8ace5b78b96d3f19e282a1dee59e1e1700e0cab238ca0bbc... handshake new: [725] 03032c6714fa9cde8ace5b78b96d3f19e282a1dee59e1e1700e0cab238ca0bbc... record old: [512] 010001fc03032c6714fa9cde8ace5b78b96d3f19e282a1dee59e1e1700e0cab2... record new: [729] 010002d503032c6714fa9cde8ace5b78b96d3f19e282a1dee59e1e1700e0cab2... client: Filtered packet: [734] 16030102d9010002d503032c6714fa9cde8ace5b78b96d3f19e282a1dee59e1e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoPsks (9 ms) [ RUN ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b240ea10486f96a4566e5b822e000000004082c3edf6eef07c0154c786... extension new: [405] 017000b240ea10486f96a4566e5b822e000000004082c3edf6eef07c0154c786... handshake old: [508] 030391ef62797aebd78afb942b0a349b15069b763cb5b16ed5266b58c6cfb25a... handshake new: [692] 030391ef62797aebd78afb942b0a349b15069b763cb5b16ed5266b58c6cfb25a... record old: [512] 010001fc030391ef62797aebd78afb942b0a349b15069b763cb5b16ed5266b58... record new: [696] 010002b4030391ef62797aebd78afb942b0a349b15069b763cb5b16ed5266b58... client: Filtered packet: [701] 16030102b8010002b4030391ef62797aebd78afb942b0a349b15069b763cb5b1... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeTwoIdentitiesOneBinder (8 ms) [ RUN ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [221] 00b800b27968ba2fa2e2b54f183093090000000038acdf5d69aed2e0ba21b888... extension new: [254] 00b800b27968ba2fa2e2b54f183093090000000038acdf5d69aed2e0ba21b888... handshake old: [508] 03037063fa7473686cdc5fa07dd1199feb5d9c9ee60e49fad7a36a14404c8a0f... handshake new: [541] 03037063fa7473686cdc5fa07dd1199feb5d9c9ee60e49fad7a36a14404c8a0f... record old: [512] 010001fc03037063fa7473686cdc5fa07dd1199feb5d9c9ee60e49fad7a36a14... record new: [545] 0100021d03037063fa7473686cdc5fa07dd1199feb5d9c9ee60e49fad7a36a14... client: Filtered packet: [550] 16030102210100021d03037063fa7473686cdc5fa07dd1199feb5d9c9ee60e49... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeOneIdentityTwoBinders (8 ms) [ RUN ] TlsExtensionTest13Stream.ResumePskExtensionNotLast Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [508] 03033b4553dedb024ab62c6a994c84865a8fcb88ac23116ccf39b0ae6d8a4326... handshake new: [512] 03033b4553dedb024ab62c6a994c84865a8fcb88ac23116ccf39b0ae6d8a4326... record old: [512] 010001fc03033b4553dedb024ab62c6a994c84865a8fcb88ac23116ccf39b0ae... record new: [516] 0100020003033b4553dedb024ab62c6a994c84865a8fcb88ac23116ccf39b0ae... client: Filtered packet: [521] 16030102040100020003033b4553dedb024ab62c6a994c84865a8fcb88ac2311... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumePskExtensionNotLast (10 ms) [ RUN ] TlsExtensionTest13Stream.ResumeNoKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 0303dd6fa365d5cefb90a650771ae7b7e2b77658c07ac29f12ed430fe71817ed... handshake new: [502] 0303dd6fa365d5cefb90a650771ae7b7e2b77658c07ac29f12ed430fe71817ed... record old: [512] 010001fc0303dd6fa365d5cefb90a650771ae7b7e2b77658c07ac29f12ed430f... record new: [506] 010001f60303dd6fa365d5cefb90a650771ae7b7e2b77658c07ac29f12ed430f... client: Filtered packet: [511] 16030101fa010001f60303dd6fa365d5cefb90a650771ae7b7e2b77658c07ac2... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeNoKeModes (9 ms) [ RUN ] TlsExtensionTest13Stream.ResumeBogusKeModes Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0101 extension new: [2] 0100 handshake old: [508] 03030c189c2f19f4bebd89409aaa242f332fd1b74d52694623df2dc70e0376e5... handshake new: [508] 03030c189c2f19f4bebd89409aaa242f332fd1b74d52694623df2dc70e0376e5... record old: [512] 010001fc03030c189c2f19f4bebd89409aaa242f332fd1b74d52694623df2dc7... record new: [512] 010001fc03030c189c2f19f4bebd89409aaa242f332fd1b74d52694623df2dc7... client: Filtered packet: [517] 1603010200010001fc03030c189c2f19f4bebd89409aaa242f332fd1b74d5269... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsExtensionTest13Stream.ResumeBogusKeModes (11 ms) [----------] 15 tests from TlsExtensionTest13Stream (125 ms total) [----------] 5 tests from TlsCipherOrderTest [ RUN ] TlsCipherOrderTest.CipherOrderGet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderGet (6 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSet Version: TLS (no version) server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] TlsCipherOrderTest.CipherOrderSet (6 ms) [ RUN ] TlsCipherOrderTest.CipherOrderCopySocket Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderCopySocket (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetLower Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetLower (2 ms) [ RUN ] TlsCipherOrderTest.CipherOrderSetControls Version: TLS (no version) [ OK ] TlsCipherOrderTest.CipherOrderSetControls (2 ms) [----------] 5 tests from TlsCipherOrderTest (19 ms total) [----------] 5 tests from TlsAgentStreamTestServer [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1SignAndKEX (4 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1Sign (3 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPkcs1KEX (4 ms) [ RUN ] TlsAgentStreamTestServer.ConfigureCertRsaPss server: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestServer.ConfigureCertRsaPss (3 ms) [ RUN ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead server: Changing state from INIT to CONNECTING Process message: [216] 16030400d3010000cf03036cb34681c81af9d20597487ca831031c06a862b190... Process message: [216] 17030400064142434445466cb34681c81af9d20597487ca831031c06a862b190... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestServer.Set0RttOptionClientHelloThenRead (8 ms) [----------] 5 tests from TlsAgentStreamTestServer (25 ms total) [----------] 3 tests from TlsAgentStreamTestClient [ RUN ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [25] 16030400140200005603039cbc149b0e2efa0df3f05c707ae0 Process message: [79] 160304004ad19b3e5a446bdfe5c22864f700c19c08760800130100002e003300... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.EncryptedExtensionsInClearTwoPieces (1 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenWrite client: Changing state from INIT to CONNECTING [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenWrite (1 ms) [ RUN ] TlsAgentStreamTestClient.Set0RttOptionThenRead client: Changing state from INIT to CONNECTING Process message: [11] 1703040006414243444546 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentStreamTestClient.Set0RttOptionThenRead (1 ms) [----------] 3 tests from TlsAgentStreamTestClient (4 ms total) [----------] 3 tests from TlsAgentDgramTestClient [ RUN ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces client: Changing state from INIT to CONNECTING Process message: [45] 16030400000000000000000020020000560000000000000014fefd9cbc149b0e... Process message: [103] 1603040000000000000001005a020000560000000014000042446bdfe5c22864... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.EncryptedExtensionsInClearTwoPieces (1 ms) [ RUN ] TlsAgentDgramTestClient.AckWithBogusLengthField client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000800 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DTLS_ACK: SSL received a malformed DTLS ACK client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithBogusLengthField (1 ms) [ RUN ] TlsAgentDgramTestClient.AckWithNonEvenLength client: Changing state from INIT to CONNECTING Process message: [16] 1afefd00000000000000000003000100 client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DTLS_ACK: SSL received a malformed DTLS ACK client: Changing state from CONNECTING to ERROR [ OK ] TlsAgentDgramTestClient.AckWithNonEvenLength (1 ms) [----------] 3 tests from TlsAgentDgramTestClient (4 ms total) [----------] 9 tests from AeadTest [ RUN ] AeadTest.AeadBadVersion [ OK ] AeadTest.AeadBadVersion (0 ms) [ RUN ] AeadTest.AeadUnsupportedCipher [ OK ] AeadTest.AeadUnsupportedCipher (0 ms) [ RUN ] AeadTest.AeadOlderCipher [ OK ] AeadTest.AeadOlderCipher (0 ms) [ RUN ] AeadTest.AeadNoLabel [ OK ] AeadTest.AeadNoLabel (0 ms) [ RUN ] AeadTest.AeadLongLabel [ OK ] AeadTest.AeadLongLabel (0 ms) [ RUN ] AeadTest.AeadNoPointer [ OK ] AeadTest.AeadNoPointer (0 ms) [ RUN ] AeadTest.AeadAes128Gcm [ OK ] AeadTest.AeadAes128Gcm (0 ms) [ RUN ] AeadTest.AeadAes256Gcm [ OK ] AeadTest.AeadAes256Gcm (0 ms) [ RUN ] AeadTest.AeadChaCha20Poly1305 [ OK ] AeadTest.AeadChaCha20Poly1305 (0 ms) [----------] 9 tests from AeadTest (0 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/0 (154 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileTest.KeyLogFile/1 (153 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileTest (308 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/0 (152 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/1 (152 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileTest.KeyLogFile/2 (150 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileTest (455 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest [ RUN ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileTest.KeyLogFile/0 (157 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileTest (157 ms total) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: DTLS 1.0 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (150 ms) [ RUN ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: DTLS 1.2 [ OK ] KeyLogFileDTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (149 ms) [----------] 2 tests from KeyLogFileDTLS12/KeyLogFileUnsetTest (299 ms total) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.0 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/0 (152 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 Version: TLS 1.1 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/1 (152 ms) [ RUN ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 Version: TLS 1.2 [ OK ] KeyLogFileTLS12/KeyLogFileUnsetTest.KeyLogFile/2 (153 ms) [----------] 3 tests from KeyLogFileTLS12/KeyLogFileUnsetTest (458 ms total) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest [ RUN ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 Version: TLS 1.3 [ OK ] KeyLogFileTLS13/KeyLogFileUnsetTest.KeyLogFile/0 (155 ms) [----------] 1 test from KeyLogFileTLS13/KeyLogFileUnsetTest (155 ms total) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest13 [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00Supported/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00Supported/0 (7 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00Supported/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00Supported/1 (7 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Tls12ServerXyber768d00NotSupported/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Tls12ServerXyber768d00NotSupported/0 (7 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Tls12ServerXyber768d00NotSupported/1 Version: DTLS 1.3 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Tls12ServerXyber768d00NotSupported/1 (0 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ClientDisabledByPolicy/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ClientDisabledByPolicy/0 (11 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ClientDisabledByPolicy/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ClientDisabledByPolicy/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ServerDisabledByPolicy/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ServerDisabledByPolicy/0 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ServerDisabledByPolicy/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Xyber768d00ServerDisabledByPolicy/1 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/0 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityClient13/1 (11 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/0 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.Curve25519P256EqualPriorityServer13/1 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/0 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriorityTestRetryECServer13/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/0 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithIntermediateGroup13/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 (13 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/0 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.EqualPriority13/1 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/0 (12 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest13.MultipleClientShares/1 (12 ms) [----------] 24 tests from KeyExchangeTest/TlsKeyExchangeTest13 (249 ms total) [----------] 30 tests from KeyExchangeTest/TlsKeyExchangeTest [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/0 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/1 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/2 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/3 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/4 (5 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Tls12ClientXyber768d00NotSupported/5 (5 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/0 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/1 (41 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/2 (41 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/3 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/4 (41 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384Priority/5 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/0 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/1 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/2 (41 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/3 (41 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/4 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.DuplicateGroupConfig/5 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/0 (39 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/1 (39 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/2 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/3 (42 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/4 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.P384PriorityDHEnabled/5 (40 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/0 (7 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/1 (10 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/2 (10 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/3 (6 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/4 (10 ms) [ RUN ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] KeyExchangeTest/TlsKeyExchangeTest.Curve25519/5 (10 ms) [----------] 30 tests from KeyExchangeTest/TlsKeyExchangeTest (826 ms total) [----------] 12 tests from TlsXyberDamageTest/TlsXyberDamageTest [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1258] 04e8001d0020465adea2a2a6d7ef27373130c4fc3a3693c17541ac150d532df7... extension new: [74] 0048001d0020465adea2a2a6d7ef27373130c4fc3a3693c17541ac150d532df7... handshake old: [1386] 0303fccb226e0d5e037d723f188cd4e30d7a06cff4aa963e70b73f29f27b2a49... handshake new: [202] 0303fccb226e0d5e037d723f188cd4e30d7a06cff4aa963e70b73f29f27b2a49... record old: [1390] 0100056a0303fccb226e0d5e037d723f188cd4e30d7a06cff4aa963e70b73f29... record new: [206] 010000ca0303fccb226e0d5e037d723f188cd4e30d7a06cff4aa963e70b73f29... client: Filtered packet: [211] 16030100ce010000ca0303fccb226e0d5e037d723f188cd4e30d7a06cff4aa96... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/0 (6 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1258] 04e8001d00201d1a373583b4102905683af3dd341f977d9995de7c0328d64355... extension new: [1262] 04ec001d00201d1a373583b4102905683af3dd341f977d9995de7c0328d64355... handshake old: [1386] 03039b8f91448eb5eaadba40bee8f80aa762c5e501e4930a18d985ee4b9e893a... handshake new: [1390] 03039b8f91448eb5eaadba40bee8f80aa762c5e501e4930a18d985ee4b9e893a... record old: [1390] 0100056a03039b8f91448eb5eaadba40bee8f80aa762c5e501e4930a18d985ee... record new: [1394] 0100056e03039b8f91448eb5eaadba40bee8f80aa762c5e501e4930a18d985ee... client: Filtered packet: [1399] 16030105720100056e03039b8f91448eb5eaadba40bee8f80aa762c5e501e493... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_HYBRID_KEY_SHARE: SSL received a malformed hybrid key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/1 (4 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1258] 04e8001d0020369292ed2e51de9fbba3e192970f9b10681d158ed8664530ea17... extension new: [74] 0048001d0020369292ed2e51de9fbba3e192970f9b10681d158ed8664530ea17... handshake old: [1386] 03031d1c27a438946a58c6430c15db07c90028c61ba4223c887f6e66dbb3f915... handshake new: [202] 03031d1c27a438946a58c6430c15db07c90028c61ba4223c887f6e66dbb3f915... record old: [1390] 0100056a03031d1c27a438946a58c6430c15db07c90028c61ba4223c887f6e66... record new: [206] 010000ca03031d1c27a438946a58c6430c15db07c90028c61ba4223c887f6e66... client: Filtered packet: [211] 16030100ce010000ca03031d1c27a438946a58c6430c15db07c90028c61ba422... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_HYBRID_KEY_SHARE: SSL received a malformed hybrid key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/2 (4 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/3 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1258] 04e8001d0020494e081edfa3e1fdacb1e97f015bcbae33e0d7891d8ca19253b8... extension new: [1258] 04e8001d0020494e081edfa3e1fdacb1e97f015bcbae33e0d7891d8ca19253b8... handshake old: [1386] 0303143c9402dd62fd2b98d2b2df9945639b562838e13322c8a8092d358ef7e2... handshake new: [1386] 0303143c9402dd62fd2b98d2b2df9945639b562838e13322c8a8092d358ef7e2... record old: [1390] 0100056a0303143c9402dd62fd2b98d2b2df9945639b562838e13322c8a8092d... record new: [1390] 0100056a0303143c9402dd62fd2b98d2b2df9945639b562838e13322c8a8092d... client: Filtered packet: [1395] 160301056e0100056a0303143c9402dd62fd2b98d2b2df9945639b562838e133... server: Fatal alert sent: 47 server: Handshake failed with error SEC_ERROR_INVALID_KEY: The key does not support the requested operation. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/3 (4 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/4 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1258] 04e8001d0020aca6fe47f97eadd39d966a2b27e4b6446c8bd2cf91176165a4cb... extension new: [1258] 04e8001d0020aca6fe47f97eadd39d966a2b27e4b6446c8bd2cf91176165a4cb... handshake old: [1386] 0303439e30a62e538ab21a3b36c466cba3df61802c5df03e2ee4ef7aa3b0de16... handshake new: [1386] 0303439e30a62e538ab21a3b36c466cba3df61802c5df03e2ee4ef7aa3b0de16... record old: [1390] 0100056a0303439e30a62e538ab21a3b36c466cba3df61802c5df03e2ee4ef7a... record new: [1390] 0100056a0303439e30a62e538ab21a3b36c466cba3df61802c5df03e2ee4ef7a... client: Filtered packet: [1395] 160301056e0100056a0303439e30a62e538ab21a3b36c466cba3df61802c5df0... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/4 (6 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/5 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1258] 04e8001d0020e50372f51a7fd0c36b9a80c48a1fe6f9bcb4a24eeb393d1e3e65... extension new: [1258] 04e8001d0020e50372f51a7fd0c36b9a80c48a1fe6f9bcb4a24eeb393d1e3e65... handshake old: [1386] 0303a063f42a080162b40c70252f14b38aaf2bdf8d194308405e285ab6966c90... handshake new: [1386] 0303a063f42a080162b40c70252f14b38aaf2bdf8d194308405e285ab6966c90... record old: [1390] 0100056a0303a063f42a080162b40c70252f14b38aaf2bdf8d194308405e285a... record new: [1390] 0100056a0303a063f42a080162b40c70252f14b38aaf2bdf8d194308405e285a... client: Filtered packet: [1395] 160301056e0100056a0303a063f42a080162b40c70252f14b38aaf2bdf8d1943... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageClientShare/5 (6 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1124] 639904607f6a9a4702d2963770408a358c4b7910d23883733ef3acaa64ac46bb... extension new: [36] 001d00207f6a9a4702d2963770408a358c4b7910d23883733ef3acaa64ac46bb... handshake old: [1174] 0303e987b3f0a8bf0d229d40fb80d9317cb47a424a237daade7d9fd35b53282a... handshake new: [86] 0303e987b3f0a8bf0d229d40fb80d9317cb47a424a237daade7d9fd35b53282a... record old: [1178] 020004960303e987b3f0a8bf0d229d40fb80d9317cb47a424a237daade7d9fd3... record new: [90] 020000560303e987b3f0a8bf0d229d40fb80d9317cb47a424a237daade7d9fd3... server: Filtered packet: [760] 160303005a020000560303e987b3f0a8bf0d229d40fb80d9317cb47a424a237d... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/0 (6 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1124] 63990460cd30cb3f821636007f4f4934c9d177f188cbd48687c40546eaf7a5c3... extension new: [1128] 63990464cd30cb3f821636007f4f4934c9d177f188cbd48687c40546eaf7a5c3... handshake old: [1174] 0303c9481ea941bd621765edbc38986e24f6b624ba0e9fb4a5915fbdff31d7e1... handshake new: [1178] 0303c9481ea941bd621765edbc38986e24f6b624ba0e9fb4a5915fbdff31d7e1... record old: [1178] 020004960303c9481ea941bd621765edbc38986e24f6b624ba0e9fb4a5915fbd... record new: [1182] 0200049a0303c9481ea941bd621765edbc38986e24f6b624ba0e9fb4a5915fbd... server: Filtered packet: [1852] 160303049e0200049a0303c9481ea941bd621765edbc38986e24f6b624ba0e9f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HYBRID_KEY_SHARE: SSL received a malformed hybrid key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/1 (6 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1124] 6399046053e8f3ec412f0c8dea46b97e7f9b86b687b2726f054068dd03f7ee2e... extension new: [36] 6399002053e8f3ec412f0c8dea46b97e7f9b86b687b2726f054068dd03f7ee2e... handshake old: [1174] 03030e38f37635701d54585e9464e7746ea0a008db86d072b50ee1491571e12e... handshake new: [86] 03030e38f37635701d54585e9464e7746ea0a008db86d072b50ee1491571e12e... record old: [1178] 0200049603030e38f37635701d54585e9464e7746ea0a008db86d072b50ee149... record new: [90] 0200005603030e38f37635701d54585e9464e7746ea0a008db86d072b50ee149... server: Filtered packet: [760] 160303005a0200005603030e38f37635701d54585e9464e7746ea0a008db86d0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HYBRID_KEY_SHARE: SSL received a malformed hybrid key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/2 (6 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/3 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1124] 639904604491ebebb9e6d037fb7ce90fb4c6a7a9e5194a5b24b7adbb7cd798f7... extension new: [1124] 6399046000000000000000000000000000000000000000000000000000000000... handshake old: [1174] 03033ff04ce3cb6b9286cc6c8842b68758127fc76b370b06bd79a7c8510bfa85... handshake new: [1174] 03033ff04ce3cb6b9286cc6c8842b68758127fc76b370b06bd79a7c8510bfa85... record old: [1178] 0200049603033ff04ce3cb6b9286cc6c8842b68758127fc76b370b06bd79a7c8... record new: [1178] 0200049603033ff04ce3cb6b9286cc6c8842b68758127fc76b370b06bd79a7c8... server: Filtered packet: [1848] 160303049a0200049603033ff04ce3cb6b9286cc6c8842b68758127fc76b370b... client: Fatal alert sent: 47 client: Handshake failed with error SEC_ERROR_INVALID_KEY: The key does not support the requested operation. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/3 (6 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/4 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1124] 63990460681224d9cc8099306471e08326f21c6b54c9ebbf5425f9edcb9144ab... extension new: [1124] 63990460691224d9cc8099306471e08326f21c6b54c9ebbf5425f9edcb9144ab... handshake old: [1174] 03039f564415c68a5b8bcd0387026781113901fd08c3163ad50907a3c3553fd1... handshake new: [1174] 03039f564415c68a5b8bcd0387026781113901fd08c3163ad50907a3c3553fd1... record old: [1178] 0200049603039f564415c68a5b8bcd0387026781113901fd08c3163ad50907a3... record new: [1178] 0200049603039f564415c68a5b8bcd0387026781113901fd08c3163ad50907a3... server: Filtered packet: [1848] 160303049a0200049603039f564415c68a5b8bcd0387026781113901fd08c316... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/4 (7 ms) [ RUN ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/5 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1124] 63990460798e835d7a79568aa9f480213bdce5763330e6ae65943aff31a62261... extension new: [1124] 63990460798e835d7a79568aa9f480213bdce5763330e6ae65943aff31a62261... handshake old: [1174] 0303375149ae2b0a0e146861e43e4ae996a4866c6bec289f39f888a2b6465b23... handshake new: [1174] 0303375149ae2b0a0e146861e43e4ae996a4866c6bec289f39f888a2b6465b23... record old: [1178] 020004960303375149ae2b0a0e146861e43e4ae996a4866c6bec289f39f888a2... record new: [1178] 020004960303375149ae2b0a0e146861e43e4ae996a4866c6bec289f39f888a2... server: Filtered packet: [1848] 160303049a020004960303375149ae2b0a0e146861e43e4ae996a4866c6bec28... client: Fatal alert sent: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] TlsXyberDamageTest/TlsXyberDamageTest.DamageServerShare/5 (6 ms) [----------] 12 tests from TlsXyberDamageTest/TlsXyberDamageTest (74 ms total) [----------] 234 tests from Version13Only/TlsConnectTls13 [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/0 Version: TLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCNotConfigured/1 Version: DTLS 1.3 [ OK ] Version13Only/TlsConnectTls13.DCNotConfigured/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/0 (27 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP483/1 (28 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/0 (62 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP521/1 (65 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssEcdsa/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/0 (22 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaPssRsaPss/1 (19 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/0 (20 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectEcdsaP256RsaPss/1 (19 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCReceiveUnadvertisedScheme/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/0 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerRsaeOnly/1 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/0 (18 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDelegator/1 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/0 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientRsaeOnly/1 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 Version: TLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/0 (23 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 Version: DTLS 1.3 Reset server:delegator_rsae2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectRsaeDcSpki/1 (25 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/0 Version: TLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/0 (32 ms) [ RUN ] Version13Only/TlsConnectTls13.DCWeakKey/1 Version: DTLS 1.3 Reset server:delegator_rsa_pss2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 71 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 71 server: Handshake failed with error SSL_ERROR_INSUFFICIENT_SECURITY_ALERT: Server requires ciphers more secure than those supported by client. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCWeakKey/1 (33 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [74] 04030046304402200735564855f1856c1c7685e8bc53a1d945fea18d323a477b... handshake new: [74] 05030046304402200735564855f1856c1c7685e8bc53a1d945fea18d323a477b... record old: [689] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [689] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [806] 160303005a0200005603034a29b5ae15f29606e4db9720136242cb7008500a2c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [74] 040300463044022071c79189625adac5ab619b6136227f1bcd7a6fb7b7c68ab6... handshake new: [74] 050300463044022071c79189625adac5ab619b6136227f1bcd7a6fb7b7c68ab6... record old: [86] 0f00004a000300000000004a040300463044022071c79189625adac5ab619b61... record new: [86] 0f00004a000300000000004a050300463044022071c79189625adac5ab619b61... server: Filtered packet: [921] 16fefd00000000000000000062020000560000000000000056fefdeb5d7fa317... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadExpectedCertVerifyAlg/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_BAD_SIGNATURE: SSL received a delegated credential with an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadSignature/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExpired/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_EXPIRED: SSL received a delegated credential that expired. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExpired/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INAPPROPRIATE_VALIDITY_PERIOD: SSL received a delegated credential with excessive TTL. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortExcessiveTTL/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_INVALID_KEY_USAGE: SSL received a delegated credential from a certificate with invalid key usage. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCAbortBadKeyUsage/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoClientSupport/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectNoServerSupport/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectClientNoTls13/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/0 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectServerNoTls13/1 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.DCConnectExpectedCertVerifyAlgNotSupported/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [75] 040300473045022100e652de92ba22d68ed6ba2185fb553a57ce2d338b51cd2c... handshake drop: [32] 6ade4f6e1f55aed88160ff3aed7723a483bda48aa68bbeb2b408be8d22edea11 record old: [689] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [574] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [691] 160303005a02000056030347d4ecec73926577bc3e5cd0484b67f59ff6b0673c... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 040300463044022076a79869909555d642f51629afcd858b9fef7070f1cec6a5... record drop: DTLS 1.3 <46> 2000000000002:[103] 5d658ec93c16b8550145f17aad9eae21886b3f3279375e1434eae10c1ecb1b10... handshake drop: [32] f2d07f689e087639145152964d6ef561da10431b455b39c4bc36dddc33f85300 record drop: DTLS 1.3 <46> 2000000000003:[61] 7ebb4929e0469abdf5aa78792f7bbe1c6c84c6270b153169b7e5811b98843105... server: Filtered packet: [746] 16fefd00000000000000000062020000560000000000000056fefda65a7f9a33... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfo/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [75] 04030047304502201da8648c1e8f7863255913656deb6737e696e7b020f46462... handshake drop: [32] 849093c9d90245b4bb2f8bec5ff5bc1f3ab2d9fd20244d5e2e84529b6b2da04c record old: [511] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [396] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [513] 160303005a0200005603037e3351b6e4458b36e78c3008f0be818e75f7a85a3b... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake drop: [74] 040300463044022043b124d2115652a8b9dbaf3138a3c0b5981ff15a9dd6ec0e... record drop: DTLS 1.3 <46> 2000000000002:[103] aa9f630c7f39eb867d9e2e9a27d925c9e56ee40dcb9984a242084995cf043f34... handshake drop: [32] 6ddabbb4d8899d1c5799d0abf3d085bd46d3eca7fe2c4cc15a02295186f8f658 record drop: DTLS 1.3 <46> 2000000000003:[61] 6d4f7d4831aad757dc503f06d847793e70f0f6dc93eda7ad89a5826b640a91c2... server: Filtered packet: [567] 16fefd00000000000000000062020000560000000000000056fefd6c91e462ce... [ OK ] Version13Only/TlsConnectTls13.DCCheckPreliminaryInfoNoDC/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/0 (25 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCScheme/1 (24 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 Version: TLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/0 (61 ms) [ RUN ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 Version: DTLS 1.3 Reset server:delegator_ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DC_CERT_VERIFY_ALG_MISMATCH: SSL received a delegated credential with unexpected certificate verification algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DCRejectModifiedDCAuthKeyBits/1 (64 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/0 (27 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeDifferentGroup/1 (27 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/0 (14 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ResumeNoCertificateRequest/1 (14 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/0 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeHandshakeCompleteOnResumption/1 (14 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeClientCompatibleCipher/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeServerCompatibleCipher/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.UndefinedOuterContentType13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [72] ff03030043308d3eeaf7cf0acbab64f95dd1b3637b667a0cbcdbf95f0dae5569... server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UndefinedOuterContentType13/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UndefinedOuterContentType13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [80] ff030400030000000039650043a4a01132031d484bdb4383945be46570616c60... server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UndefinedOuterContentType13/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UndefinedInnerContentType13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [72] 1703030043f3bcddc9f180d15ff8dba36a8d62fb7d5f463d0d66bc1cacb2bd51... server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UndefinedInnerContentType13/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UndefinedInnerContentType13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [72] 2f94a800434bc027059688bc863e9b33d6365c37b1788eb4e0946856c3123111... server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UndefinedInnerContentType13/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 0303ac6e98b72f88f323eddd9fbd4d473249a1b499934f18103abfd86ead3a4c... handshake new: [85] 0303ac6e98b72f88f323eddd9fbd4d473249a1b499934f18103abfd86ead3a4c... record old: [90] 020000560303ac6e98b72f88f323eddd9fbd4d473249a1b499934f18103abfd8... record new: [89] 020000550303ac6e98b72f88f323eddd9fbd4d473249a1b499934f18103abfd8... server: Filtered packet: [775] 1603030059020000550303ac6e98b72f88f323eddd9fbd4d473249a1b499934f... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefdac500eaf5e009392a8287b0dbcef091732336a6412f00b4e31dff862c675... handshake new: [85] fefdac500eaf5e009392a8287b0dbcef091732336a6412f00b4e31dff862c675... record old: [98] 020000560000000000000056fefdac500eaf5e009392a8287b0dbcef09173233... record new: [97] 020000550000000000000055fefdac500eaf5e009392a8287b0dbcef09173233... server: Filtered packet: [889] 16fefd00000000000000000061020000550000000000000055fefdac500eaf5e... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.CaptureAlertClient/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinished/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuth/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.WriteBeforeClientFinishedClientAuthRequired/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 255 client: Warning alert received: 255 client: Read error SSL_ERROR_RX_UNKNOWN_ALERT: SSL received an alert record with an unknown alert description. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownAlert/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Warning alert sent: 10 client: Warning alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AlertWrongLevel/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UnknownRecord/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Send Direct [5] ff03030000 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.UnknownRecord/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/0 (47 ms) [ RUN ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.HelloRetryRequestAbortsZeroRtt/1 (47 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/0 (21 ms) [ RUN ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [486] 16feff000000000000000101d9010001cd00010000000001cdfefda95a900dcd... server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SecondClientHelloRejectEarlyDataXtn/1 (22 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 006500180061040acad8fe4c25cb1a243abf1e2adad22834a9d58a2f267ef660... extension new: [38] 0024001d002009ef8f0b8ddfebfe50dcf1745b4d5e9767a49154ead635d1a4ad... handshake old: [508] 03034b88687a7d2eee1776de6597ee89d5cbe0368e4067ad78a47b84b7465eb0... handshake new: [443] 03034b88687a7d2eee1776de6597ee89d5cbe0368e4067ad78a47b84b7465eb0... record old: [512] 010001fc03034b88687a7d2eee1776de6597ee89d5cbe0368e4067ad78a47b84... record new: [447] 010001bb03034b88687a7d2eee1776de6597ee89d5cbe0368e4067ad78a47b84... client: Filtered packet: [452] 16030301bf010001bb03034b88687a7d2eee1776de6597ee89d5cbe0368e4067... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/0 (16 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104e29f5d9924e703dfbecb2da3213749f775f0fd3de36317d35c... extension new: [38] 0024001d0020b554b3525ed7f7b85ec3027f92ca4081f3f6972f8e5dc81a89d6... handshake old: [368] fefd9ee632bd680db0b8b52714c481a7c0738a6684afdc1f5b0dd1d3fff6858e... handshake new: [303] fefd9ee632bd680db0b8b52714c481a7c0738a6684afdc1f5b0dd1d3fff6858e... record old: [380] 010001700001000000000170fefd9ee632bd680db0b8b52714c481a7c0738a66... record new: [315] 0100012f000100000000012ffefd9ee632bd680db0b8b52714c481a7c0738a66... client: Filtered packet: [328] 16fefd0000000000000001013b0100012f000100000000012ffefd9ee632bd68... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithSameKeyShare/1 (15 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104a6c030ee8112a2b82cff7bf9bc4d8b264a64d2ff252bc368a4... extension new: [107] 0069001d002092fde4c93a513160c3d96072be86a9b1c7aa80c3c72cd78a75c8... handshake old: [508] 0303d35646f5c02a5e3ebb58797a3cecf4f4c4356e41d28fe9f81779857e93d4... handshake new: [512] 0303d35646f5c02a5e3ebb58797a3cecf4f4c4356e41d28fe9f81779857e93d4... record old: [512] 010001fc0303d35646f5c02a5e3ebb58797a3cecf4f4c4356e41d28fe9f81779... record new: [516] 010002000303d35646f5c02a5e3ebb58797a3cecf4f4c4356e41d28fe9f81779... client: Filtered packet: [521] 1603030204010002000303d35646f5c02a5e3ebb58797a3cecf4f4c4356e41d2... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/0 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [103] 00650018006104e8b6cd74d66d1e6a1a1de1a68f75ab42674c993f282de3a43f... extension new: [107] 0069001d00206dedcc3b894ba94923a29ae880d2279177637fda41e7cfaaba60... handshake old: [368] fefd859c3c9d3ded64af0e8e3dc8b493bcf9473f6638aa047c7700e12423988f... handshake new: [372] fefd859c3c9d3ded64af0e8e3dc8b493bcf9473f6638aa047c7700e12423988f... record old: [380] 010001700001000000000170fefd859c3c9d3ded64af0e8e3dc8b493bcf9473f... record new: [384] 010001740001000000000174fefd859c3c9d3ded64af0e8e3dc8b493bcf9473f... client: Filtered packet: [397] 16fefd00000000000000010180010001740001000000000174fefd859c3c9d3d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryWithTwoShares/1 (17 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAccept/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/0 (42 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptGroupMismatch/1 (42 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_APPLICATION_ABORT: SSL handshake aborted by the application. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackFail/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRequestHrrTwice/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackAcceptAndSetToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRejectAndSetToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 80 server: Handshake failed with error SSL_ERROR_APP_CALLBACK_ERROR: An application callback produced an invalid response. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 80 client: Handshake failed with error SSL_ERROR_INTERNAL_ERROR_ALERT: Peer reports it experienced an internal error. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCallbackSetTooLargeToken/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetry/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithAdditionalShares/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/0 (41 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithGroupMismatch/1 (42 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithToken/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/0 (41 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryCallbackRetryWithTokenAndGroupMismatch/1 (41 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.VersionNumbersAfterRetry/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/0 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStateless/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.RetryStateless/1 (8 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 00722fedd806b6f034897f35bed1000000005859bf8e03b15ef2228088789a86... handshake old: [508] 030322d5290b4007497fb72f0858c136cc3ac308ea2dd8cb909e488202adef47... handshake new: [388] 030322d5290b4007497fb72f0858c136cc3ac308ea2dd8cb909e488202adef47... record old: [512] 010001fc030322d5290b4007497fb72f0858c136cc3ac308ea2dd8cb909e4882... record new: [392] 01000184030322d5290b4007497fb72f0858c136cc3ac308ea2dd8cb909e4882... client: Filtered packet: [397] 160303018801000184030322d5290b4007497fb72f0858c136cc3ac308ea2dd8... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension drop: [116] 007243691c1521e1b2408efcc20900000000f807c6fef53769e0cf9c5e304b67... handshake old: [303] fefdb9b9a0aa95aafb8962cab8a22c8f25592d919f0632bd851a091b870dde56... handshake new: [183] fefdb9b9a0aa95aafb8962cab8a22c8f25592d919f0632bd851a091b870dde56... record old: [315] 0100012f000100000000012ffefdb9b9a0aa95aafb8962cab8a22c8f25592d91... record new: [195] 010000b700010000000000b7fefdb9b9a0aa95aafb8962cab8a22c8f25592d91... client: Filtered packet: [208] 16fefd000000000000000000c3010000b700010000000000b7fefdb9b9a0aa95... extension drop: [116] 007243691c1521e1b2408efcc20900000000f807c6fef53769e0cf9c5e304b67... handshake old: [303] fefdb9b9a0aa95aafb8962cab8a22c8f25592d919f0632bd851a091b870dde56... handshake new: [183] fefdb9b9a0aa95aafb8962cab8a22c8f25592d919f0632bd851a091b870dde56... record old: [315] 0100012f000100000000012ffefdb9b9a0aa95aafb8962cab8a22c8f25592d91... record new: [195] 010000b700010000000000b7fefdb9b9a0aa95aafb8962cab8a22c8f25592d91... client: Filtered packet: [208] 16fefd000000000000000200c3010000b700010000000000b7fefdb9b9a0aa95... extension drop: [116] 007243691c1521e1b2408efcc20900000000f807c6fef53769e0cf9c5e304b67... handshake old: [303] fefdb9b9a0aa95aafb8962cab8a22c8f25592d919f0632bd851a091b870dde56... handshake new: [183] fefdb9b9a0aa95aafb8962cab8a22c8f25592d919f0632bd851a091b870dde56... record old: [315] 0100012f000100000000012ffefdb9b9a0aa95aafb8962cab8a22c8f25592d91... record new: [195] 010000b700010000000000b7fefdb9b9a0aa95aafb8962cab8a22c8f25592d91... client: Filtered packet: [208] 16fefd000000000000000300c3010000b700010000000000b7fefdb9b9a0aa95... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_COOKIE_EXTENSION: A second ClientHello was received without a cookie extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatefulDropCookie/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 007298ab53aa149e66bcc58c2b61000000000f758d224e9b8e6e6595b804719f... extension new: [2] 0000 handshake old: [508] 03039a557ad8ac9674888c8c0f42c1e31a328cbcafe24e37816ff8267e72d403... handshake new: [394] 03039a557ad8ac9674888c8c0f42c1e31a328cbcafe24e37816ff8267e72d403... record old: [512] 010001fc03039a557ad8ac9674888c8c0f42c1e31a328cbcafe24e37816ff826... record new: [398] 0100018a03039a557ad8ac9674888c8c0f42c1e31a328cbcafe24e37816ff826... client: Filtered packet: [403] 160303018e0100018a03039a557ad8ac9674888c8c0f42c1e31a328cbcafe24e... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 00720e969c4dff4d570112a433d40000000055e2320bcb2beeb2c36e5b4136db... extension new: [2] 0000 handshake old: [303] fefd77e4ef927f668d86f34399651905325c4c8d310c4f392efbbf208fbe5e85... handshake new: [189] fefd77e4ef927f668d86f34399651905325c4c8d310c4f392efbbf208fbe5e85... record old: [315] 0100012f000100000000012ffefd77e4ef927f668d86f34399651905325c4c8d... record new: [201] 010000bd00010000000000bdfefd77e4ef927f668d86f34399651905325c4c8d... client: Filtered packet: [214] 16fefd000000000000000000c9010000bd00010000000000bdfefd77e4ef927f... extension old: [116] 00720e969c4dff4d570112a433d40000000055e2320bcb2beeb2c36e5b4136db... extension new: [2] 0000 handshake old: [303] fefd77e4ef927f668d86f34399651905325c4c8d310c4f392efbbf208fbe5e85... handshake new: [189] fefd77e4ef927f668d86f34399651905325c4c8d310c4f392efbbf208fbe5e85... record old: [315] 0100012f000100000000012ffefd77e4ef927f668d86f34399651905325c4c8d... record new: [201] 010000bd00010000000000bdfefd77e4ef927f668d86f34399651905325c4c8d... client: Filtered packet: [214] 16fefd000000000000000200c9010000bd00010000000000bdfefd77e4ef927f... extension old: [116] 00720e969c4dff4d570112a433d40000000055e2320bcb2beeb2c36e5b4136db... extension new: [2] 0000 handshake old: [303] fefd77e4ef927f668d86f34399651905325c4c8d310c4f392efbbf208fbe5e85... handshake new: [189] fefd77e4ef927f668d86f34399651905325c4c8d310c4f392efbbf208fbe5e85... record old: [315] 0100012f000100000000012ffefd77e4ef927f668d86f34399651905325c4c8d... record new: [201] 010000bd00010000000000bdfefd77e4ef927f668d86f34399651905325c4c8d... client: Filtered packet: [214] 16fefd000000000000000300c9010000bd00010000000000bdfefd77e4ef927f... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieEmpty/1 (156 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 00722a2b71b19d9b97b0c95edfbb0000000095619ed1123df73cad5fe22fff59... extension new: [118] 00722a2b71b19d9b97b0c95edfbb0000000095619ed1123df73cad5fe22fff59... handshake old: [508] 0303f4ad91d4bd819e7fe59a0996bc33ede54d8339f96a8f8ac968abebb90b6f... handshake new: [510] 0303f4ad91d4bd819e7fe59a0996bc33ede54d8339f96a8f8ac968abebb90b6f... record old: [512] 010001fc0303f4ad91d4bd819e7fe59a0996bc33ede54d8339f96a8f8ac968ab... record new: [514] 010001fe0303f4ad91d4bd819e7fe59a0996bc33ede54d8339f96a8f8ac968ab... client: Filtered packet: [519] 1603030202010001fe0303f4ad91d4bd819e7fe59a0996bc33ede54d8339f96a... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING extension old: [116] 007289c2461b19c8896ded6c393d00000000a8cb84385c7faa4032b27938223e... extension new: [118] 007289c2461b19c8896ded6c393d00000000a8cb84385c7faa4032b27938223e... handshake old: [303] fefda8644ec135dfd603594ec138a02a94f0249a2bce4add1e251965da4299b1... handshake new: [305] fefda8644ec135dfd603594ec138a02a94f0249a2bce4add1e251965da4299b1... record old: [315] 0100012f000100000000012ffefda8644ec135dfd603594ec138a02a94f0249a... record new: [317] 010001310001000000000131fefda8644ec135dfd603594ec138a02a94f0249a... client: Filtered packet: [330] 16fefd0000000000000000013d010001310001000000000131fefda8644ec135... extension old: [116] 007289c2461b19c8896ded6c393d00000000a8cb84385c7faa4032b27938223e... extension new: [118] 007289c2461b19c8896ded6c393d00000000a8cb84385c7faa4032b27938223e... handshake old: [303] fefda8644ec135dfd603594ec138a02a94f0249a2bce4add1e251965da4299b1... handshake new: [305] fefda8644ec135dfd603594ec138a02a94f0249a2bce4add1e251965da4299b1... record old: [315] 0100012f000100000000012ffefda8644ec135dfd603594ec138a02a94f0249a... record new: [317] 010001310001000000000131fefda8644ec135dfd603594ec138a02a94f0249a... client: Filtered packet: [330] 16fefd0000000000000002013d010001310001000000000131fefda8644ec135... extension old: [116] 007289c2461b19c8896ded6c393d00000000a8cb84385c7faa4032b27938223e... extension new: [118] 007289c2461b19c8896ded6c393d00000000a8cb84385c7faa4032b27938223e... handshake old: [303] fefda8644ec135dfd603594ec138a02a94f0249a2bce4add1e251965da4299b1... handshake new: [305] fefda8644ec135dfd603594ec138a02a94f0249a2bce4add1e251965da4299b1... record old: [315] 0100012f000100000000012ffefda8644ec135dfd603594ec138a02a94f0249a... record new: [317] 010001310001000000000131fefda8644ec135dfd603594ec138a02a94f0249a... client: Filtered packet: [330] 16fefd0000000000000003013d010001310001000000000131fefda8644ec135... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryCookieWithExtras/1 (157 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteClient/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableSuiteServer/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupClient/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessDisableGroupServer/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.RetryStatelessBadCookie/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f000000000021209568b72bf5c69aa9c5d17ac81bc7932dd766... extension new: [46] 00090003666f6f000000000021206a68b72bf5c69aa9c5d17ac81bc7932dd766... handshake old: [232] 03037e92503df1b2bfa5635218116399cc9331604fb87e8ccadb86b9166fde84... handshake new: [232] 03037e92503df1b2bfa5635218116399cc9331604fb87e8ccadb86b9166fde84... record old: [236] 010000e803037e92503df1b2bfa5635218116399cc9331604fb87e8ccadb86b9... record new: [236] 010000e803037e92503df1b2bfa5635218116399cc9331604fb87e8ccadb86b9... client: Filtered packet: [241] 16030100ec010000e803037e92503df1b2bfa5635218116399cc9331604fb87e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [46] 00090003666f6f00000000002120b49bd7b2e782ec886f93a8924706fc13ed2d... extension new: [46] 00090003666f6f000000000021204b9bd7b2e782ec886f93a8924706fc13ed2d... handshake old: [233] fefdb7966f4fabbea15c138cac9c21d470e55984b71c84054977248e3c2d6597... handshake new: [233] fefdb7966f4fabbea15c138cac9c21d470e55984b71c84054977248e3c2d6597... record old: [245] 010000e900000000000000e9fefdb7966f4fabbea15c138cac9c21d470e55984... record new: [245] 010000e900000000000000e9fefdb7966f4fabbea15c138cac9c21d470e55984... client: Filtered packet: [258] 16feff000000000000000000f5010000e900000000000000e9fefdb7966f4fab... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13PskInvalidBinderValue/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterSha384/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterSha384/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ExporterContextEmptyIsSameAsNone/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporter/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporter/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.EarlyExporterExternalPsk/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [22] 0014001d001700180019639901000101010201030104 handshake old: [182] 030314ca847cb40fedc435b82f30a51b0941f0603e82c5dada08f72fb4a75213... handshake new: [156] 030314ca847cb40fedc435b82f30a51b0941f0603e82c5dada08f72fb4a75213... record old: [186] 010000b6030314ca847cb40fedc435b82f30a51b0941f0603e82c5dada08f72f... record new: [160] 0100009c030314ca847cb40fedc435b82f30a51b0941f0603e82c5dada08f72f... client: Filtered packet: [165] 16030100a00100009c030314ca847cb40fedc435b82f30a51b0941f0603e82c5... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [22] 0014001d001700180019639901000101010201030104 handshake old: [183] fefd06c9d8f3069d1f06ad3477c698113cc9a18f821563fbb8ff10d4834551e9... handshake new: [157] fefd06c9d8f3069d1f06ad3477c698113cc9a18f821563fbb8ff10d4834551e9... record old: [195] 010000b700000000000000b7fefd06c9d8f3069d1f06ad3477c698113cc9a18f... record new: [169] 0100009d000000000000009dfefd06c9d8f3069d1f06ad3477c698113cc9a18f... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd06c9d8f306... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DropSupportedGroupExtension/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.UseLameGroup/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UseLameGroup/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SharesForBothEcdheAndDhe/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/0 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.NamedGroupMismatch13/1 (4 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/0 (42 ms) [ RUN ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ResumeFfdhe/1 (43 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400803ecd8c93b64b55c6c7f650a8ad7706e600aaae5d1039549fab4ac403... handshake new: [132] 080400803ecd8c93b64b55c6c7f650a8ad7706e600aaae5d1039549fab4ac403... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [659] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [776] 160303005a020000560303b8fc546048902c8be1b436700864f95fb99b0740a9... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.DamageServerSignature/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008060e3fd51a17d0cc6e86134064be71f5548bb52a98bc04dbac7671d85... handshake new: [132] 0804008060e3fd51a17d0cc6e86134064be71f5548bb52a98bc04dbac7671d85... record old: [144] 0f00008400030000000000840804008060e3fd51a17d0cc6e86134064be71f55... record new: [144] 0f00008400030000000000840804008060e3fd51a17d0cc6e86134064be71f55... server: Filtered packet: [890] 16fefd00000000000000000062020000560000000000000056fefdf89a1fb86e... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.DamageServerSignature/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete SEC_ERROR_REVOKED_CERTIFICATE client: Fatal alert sent: 44 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 44 server: Handshake failed with error SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.ServerAuthRejectAsync/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeCurveMismatch/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureSchemeBadConfig/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [182] 0303370f06016749d8fe1306f44f308bde68ad0168d9b74ffbad4791d1a5cbb6... handshake new: [154] 0303370f06016749d8fe1306f44f308bde68ad0168d9b74ffbad4791d1a5cbb6... record old: [186] 010000b60303370f06016749d8fe1306f44f308bde68ad0168d9b74ffbad4791... record new: [158] 0100009a0303370f06016749d8fe1306f44f308bde68ad0168d9b74ffbad4791... client: Filtered packet: [163] 160301009e0100009a0303370f06016749d8fe1306f44f308bde68ad0168d9b7... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/0 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [183] fefd36528a817fe1a3600fd79221b138ad803a5ba6d9eea4aced2384aefe6247... handshake new: [155] fefd36528a817fe1a3600fd79221b138ad803a5ba6d9eea4aced2384aefe6247... record old: [195] 010000b700000000000000b7fefd36528a817fe1a3600fd79221b138ad803a5b... record new: [167] 0100009b000000000000009bfefd36528a817fe1a3600fd79221b138ad803a5b... client: Filtered packet: [180] 16feff000000000000000000a70100009b000000000000009bfefd36528a817f... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.SignatureAlgorithmDrop/1 (3 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400801c7ce6d54619130df34e36ca4f2595b514a2bcb1a4f3c8390e2b3ed9... handshake new: [132] 000000801c7ce6d54619130df34e36ca4f2595b514a2bcb1a4f3c8390e2b3ed9... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [659] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [776] 160303005a0200005603039c8734a73d88292fa9a7e3f6f007f3666d469b4ae5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08040080225f1a160d44ed688786c82939041526e653bdc53faa257ac2f6c764... handshake new: [132] 00000080225f1a160d44ed688786c82939041526e653bdc53faa257ac2f6c764... record old: [144] 0f000084000300000000008408040080225f1a160d44ed688786c82939041526... record new: [144] 0f000084000300000000008400000080225f1a160d44ed688786c82939041526... server: Filtered packet: [890] 16fefd00000000000000000062020000560000000000000056fefd3835d601ab... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.UnsupportedSignatureSchemeAlert/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400803480d264e6a96cca8b2f66199a21e672702bd5046209e86ebb18eb79... handshake new: [132] 040300803480d264e6a96cca8b2f66199a21e672702bd5046209e86ebb18eb79... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [659] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [776] 160303005a0200005603033a443b3de14020423509bc73bf63d095bb323d3e0a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008052719d41b9c5e0fe7428028753da26cfdbf2e08f5a308ff19ac1f9e9... handshake new: [132] 0403008052719d41b9c5e0fe7428028753da26cfdbf2e08f5a308ff19ac1f9e9... record old: [144] 0f00008400030000000000840804008052719d41b9c5e0fe7428028753da26cf... record new: [144] 0f00008400030000000000840403008052719d41b9c5e0fe7428028753da26cf... server: Filtered packet: [890] 16fefd00000000000000000062020000560000000000000056fefd2bc4188987... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.InconsistentSignatureSchemeAlert/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: call SSL_AuthCertificateComplete no error client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteAfterFinished/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.AuthCompleteDelayed/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.AuthCompleteFailDelayed/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/0 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13CertDisabledGroup/1 (7 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13DsaOnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/0 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 Version: DTLS 1.3 client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyClient/1 (0 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/0 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.Tls13Pkcs1OnlyServer/1 (2 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedClient/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13DsaIsNotAdvertisedServer/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedClient/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/0 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.Tls13RsaPkcs1IsAdvertisedServer/1 (5 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRtt/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerRejectByOption/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/0 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApplicationReject/1 (9 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttApparentReplayAfterRestart/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOptionsSetLate/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/0 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerForgetTicket/1 (13 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/0 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttServerOnly/1 (6 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectOldTicket/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttRejectPrematureTicket/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpn/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeServer/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnServer/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttNoAlpnClient/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttAlpnChangeBoth/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngrade/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/0 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DOWNGRADE_WITH_EARLY_DATA: SSL got a pre-TLS 1.3 version even though we sent early data. client: Changing state from CONNECTING to ERROR [ OK ] Version13Only/TlsConnectTls13.TestTls13ZeroRttDowngradeEarlyData/1 (11 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.SendTooMuchEarlyData/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_TOO_MUCH_EARLY_DATA: SSL received more early data than permitted. server: Changing state from CONNECTING to ERROR client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ReceiveTooMuchEarlyData/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [135] 170303001414e2ea21d450fe0e583a1c4d0231366ed6a42ea51703030015a843... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Drop packet client: Send Direct [151] 2d78ff0014890dc516e3135a91e3f07b7af256cfe3102079c62d77ce001d65a1... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Drop packet client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttOrdering/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/0 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentCompatibleCipher/1 (10 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/0 (12 ms) [ RUN ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version13Only/TlsConnectTls13.ZeroRttDifferentIncompatibleCipher/1 (12 ms) [----------] 234 tests from Version13Only/TlsConnectTls13 (3154 ms total) [----------] 34 tests from Tls13PskTest/Tls13PskTest [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.NormalExternal/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.NormalExternal/1 (5 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.KeyTooLarge/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 0303c6d6a66c6573684afb21311aaebe4269f9d388aeed13307b4931b5060580... handshake new: [92] 0303c6d6a66c6573684afb21311aaebe4269f9d388aeed13307b4931b5060580... record old: [96] 0200005c0303c6d6a66c6573684afb21311aaebe4269f9d388aeed13307b4931... record new: [96] 0200005c0303c6d6a66c6573684afb21311aaebe4269f9d388aeed13307b4931... server: Filtered packet: [217] 16030300600200005c0303c6d6a66c6573684afb21311aaebe4269f9d388aeed... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] fefd4167b953d2b0509e20b30ec4a97a0a1e076cb5a5949fa9c847a5279c4fba... handshake new: [92] fefd4167b953d2b0509e20b30ec4a97a0a1e076cb5a5949fa9c847a5279c4fba... record old: [104] 0200005c000000000000005cfefd4167b953d2b0509e20b30ec4a97a0a1e076c... record new: [104] 0200005c000000000000005cfefd4167b953d2b0509e20b30ec4a97a0a1e076c... server: Filtered packet: [271] 16fefd000000000000000000680200005c000000000000005cfefd4167b953d2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ClientVerifyHashType/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/0 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.LabelMismatch/1 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/0 (11 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ResPskRetryStateless/1 (10 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/0 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ExtPskRetryStateless/1 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/0 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ClientOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.ClientOnly/1 (6 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [508] 0303fc6edcd4c629b25baff3b546ea76341b038c520cfe42cdaa2258cc2e8f13... handshake new: [502] 0303fc6edcd4c629b25baff3b546ea76341b038c520cfe42cdaa2258cc2e8f13... record old: [512] 010001fc0303fc6edcd4c629b25baff3b546ea76341b038c520cfe42cdaa2258... record new: [506] 010001f60303fc6edcd4c629b25baff3b546ea76341b038c520cfe42cdaa2258... client: Filtered packet: [511] 16030101fa010001f60303fc6edcd4c629b25baff3b546ea76341b038c520cfe... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropKexModes/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [2] 0101 handshake old: [265] fefd67ec86199d747c4e9e8c7ba3a1cf0d45d1416b612353b89025f243451be6... handshake new: [259] fefd67ec86199d747c4e9e8c7ba3a1cf0d45d1416b612353b89025f243451be6... record old: [277] 010001090000000000000109fefd67ec86199d747c4e9e8c7ba3a1cf0d45d141... record new: [271] 010001030000000000000103fefd67ec86199d747c4e9e8c7ba3a1cf0d45d141... client: Filtered packet: [284] 16feff0000000000000000010f010001030000000000000103fefd67ec86199d... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_PSK_KEY_EXCHANGE_MODES: SSL expected a PSK key exchange modes extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropKexModes/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d0020729fec74a6b7590cb8a3c17defe0021fd43fc7728df1b11d00d86ad1... handshake old: [92] 03036ec2b37e786dd5592e842543cb3a9f6183d0f70439c5f4547f7a4bbd5a22... handshake new: [52] 03036ec2b37e786dd5592e842543cb3a9f6183d0f70439c5f4547f7a4bbd5a22... record old: [96] 0200005c03036ec2b37e786dd5592e842543cb3a9f6183d0f70439c5f4547f7a... record new: [56] 0200003403036ec2b37e786dd5592e842543cb3a9f6183d0f70439c5f4547f7a... server: Filtered packet: [177] 16030300380200003403036ec2b37e786dd5592e842543cb3a9f6183d0f70439... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [36] 001d0020b39881092d0543aa899489521b959fa4b6095688868a22cb55f3d74f... handshake old: [92] fefd5cc318f0329697a4174b65ed8a1d9f6a4d50e71d1031e28971098a4a5623... handshake new: [52] fefd5cc318f0329697a4174b65ed8a1d9f6a4d50e71d1031e28971098a4a5623... record old: [104] 0200005c000000000000005cfefd5cc318f0329697a4174b65ed8a1d9f6a4d50... record new: [64] 020000340000000000000034fefd5cc318f0329697a4174b65ed8a1d9f6a4d50... server: Filtered packet: [231] 16fefd00000000000000000040020000340000000000000034fefd5cc318f032... client: Fatal alert sent: 109 client: Handshake failed with error SSL_ERROR_MISSING_KEY_SHARE: SSL expected a Key Share extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DropRequiredKeyShare/1 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] 030383a3e84713672b4be3d35a48c5e4ae1c7c504b9f633f962b0f88296ecaa3... handshake new: [92] 030383a3e84713672b4be3d35a48c5e4ae1c7c504b9f633f962b0f88296ecaa3... record old: [96] 0200005c030383a3e84713672b4be3d35a48c5e4ae1c7c504b9f633f962b0f88... record new: [96] 0200005c030383a3e84713672b4be3d35a48c5e4ae1c7c504b9f633f962b0f88... server: Filtered packet: [217] 16030300600200005c030383a3e84713672b4be3d35a48c5e4ae1c7c504b9f63... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0000 extension new: [2] 0001 handshake old: [92] fefd3f25decc476c0ecb08412d34e6573037ebbc926f98c8126f46b9fc82be95... handshake new: [92] fefd3f25decc476c0ecb08412d34e6573037ebbc926f98c8126f46b9fc82be95... record old: [104] 0200005c000000000000005cfefd3f25decc476c0ecb08412d34e6573037ebbc... record new: [104] 0200005c000000000000005cfefd3f25decc476c0ecb08412d34e6573037ebbc... server: Filtered packet: [271] 16fefd000000000000000000680200005c000000000000005cfefd3f25decc47... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_PRE_SHARED_KEY: SSL received an invalid PreSharedKey extension. client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.InvalidSelectedIdentity/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/0 (10 ms) [ RUN ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.PreferEpsk/1 (10 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/0 (9 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressNewSessionTicket/1 (10 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 Version: TLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/0 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 Version: DTLS 1.3 [ OK ] Tls13PskTest/Tls13PskTest.BadConfigValues/1 (0 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/0 (5 ms) [ RUN ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.FallbackUnsupportedCiphersuite/1 (7 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.ExplicitSuiteNoOverlap/1 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/0 (4 ms) [ RUN ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTest/Tls13PskTest.SuppressHandshakeCertReq/1 (5 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/0 (3 ms) [ RUN ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Tls13PskTest/Tls13PskTest.DisallowClientConfigWithoutServerCert/1 (2 ms) [----------] 34 tests from Tls13PskTest/Tls13PskTest (190 ms total) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/0 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/1 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/2 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/3 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/4 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttCiphers/5 (5 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/0 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/1 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/2 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/3 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/4 (4 ms) [ RUN ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Tls13PskTestWithCiphers/Tls13PskTestWithCiphers.0RttMaxEarlyData/5 (4 ms) [----------] 12 tests from Tls13PskTestWithCiphers/Tls13PskTestWithCiphers (54 ms total) [----------] 16 tests from AllHashFuncs/TlsHkdfTest [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 Hash = SHA-256 Output: [32] 33ad0a1c607ec03b09e6cd9893680ce210adf300aa1f2660e1b22e10f170f92a [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 Hash = SHA-384 Output: [48] 7ee8206f5570023e6dc7519eb1073bc4e791ad37b5c382aa10ba18e2357e7169... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfNullNull/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 Hash = SHA-256 Output: [32] 416c5392b9f36df188e90eb14d17bf0da190bfdb7f1f4956e6e566a569c8b15c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 Hash = SHA-384 Output: [48] 51b1d5b4597979084a15b2db84d3d6bcfc9345d9dc74da1a57c2769f3f83452f... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 Hash = SHA-256 Output: [32] 16af00543a56c826a2a7fcb634668afd36dc8ecec4d26c7adce370363d60fa0b [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 Hash = SHA-384 Output: [48] 7b40f9ef91ffc9d129245cbff8827668ae4b63e803dd39a8d46af6e5eceaf87d... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey2Only/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 Hash = SHA-256 Output: [32] a568025a95c97f5538bcf797cc0fd5f6a88d15bc0e8574703ca365bd76cf9fd3 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 Hash = SHA-384 Output: [48] 0193c0073f6a830e2e4fb258e400085c689c37320037ffc31c5b980b02923ffd... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfKey1Key2/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 Hash = SHA-256 Output: [32] 3e4e6ed0bcc4f4fff0f569d06c1e0e1032aad7a3eff6a8658ebeeec71f016d3c [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 Hash = SHA-384 Output: [48] 41ea77098c900410ecbc37d85b54cd7b08151320ed1e3f5474f78b0638280637... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabel/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 Hash = SHA-256 Output: [32] b70800e38e486891b10f5e6f22536b846975aaa32ae7deaac3d1b405225c68f5 [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 Hash = SHA-384 Output: [48] 13d3369f3c78a03240ee16e9111266c751add83ca1a39774d745ffa7889e5217... [ OK ] AllHashFuncs/TlsHkdfTest.HkdfExpandLabelNoHash/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExtractWrapperInput/1 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/0 (0 ms) [ RUN ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 [ OK ] AllHashFuncs/TlsHkdfTest.BadExpandLabelWrapperInput/1 (0 ms) [----------] 16 tests from AllHashFuncs/TlsHkdfTest (0 ms total) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 [ OK ] VariousSizes/SelfEncryptTestVariable.SuccessCase/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.WrongMacKey/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 Error: SEC_ERROR_NOT_A_RECIPIENT [ OK ] VariousSizes/SelfEncryptTestVariable.WrongKeyName/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.AddAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.SubtractAByte/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusIv/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BogusCiphertext/6 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/0 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/0 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/1 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/1 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/2 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/2 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/3 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/3 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/4 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/4 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/5 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/5 (0 ms) [ RUN ] VariousSizes/SelfEncryptTestVariable.BadMac/6 Error: SEC_ERROR_BAD_DATA [ OK ] VariousSizes/SelfEncryptTestVariable.BadMac/6 (0 ms) [----------] 56 tests from VariousSizes/SelfEncryptTestVariable (1 ms total) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/0 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/5 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/6 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/7 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/8 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/9 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/10 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/11 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/12 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/13 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/14 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/15 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/16 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/17 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/18 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/19 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/20 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/21 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/22 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/23 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/24 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/25 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/26 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/27 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/28 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/29 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/30 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/31 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/32 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/33 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/34 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/35 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/36 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/37 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/38 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/39 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/40 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/41 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/42 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/43 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/44 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/45 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/46 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/47 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/48 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/49 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/50 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/51 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/52 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/53 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/54 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/55 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/56 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/57 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/58 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/59 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/60 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/61 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/62 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/63 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/64 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/65 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/66 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/67 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/68 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/69 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/70 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/71 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/72 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/73 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/74 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/75 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/76 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/77 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/78 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/79 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/80 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/81 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/82 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/83 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/84 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/85 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/86 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/87 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/88 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/89 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/90 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/91 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/92 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/93 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/94 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/95 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/96 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 Version: TLS (no version) testing: TLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/97 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/98 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/99 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/100 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/106 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/107 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/108 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/109 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/110 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/111 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/113 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/114 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/115 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/116 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/117 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/118 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/119 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/120 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/121 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/122 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/123 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/124 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/125 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/126 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/127 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/128 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/129 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/130 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/131 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/132 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/133 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/134 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/135 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/136 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/137 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/138 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/139 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/140 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/141 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/142 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/143 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/144 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/145 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/146 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/147 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/148 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/149 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/150 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/151 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/152 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/153 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/154 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/155 (21 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/156 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/157 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/158 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/159 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/160 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/161 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/162 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/163 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/164 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/165 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/166 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/167 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/168 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/169 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/170 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/171 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/172 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/173 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/174 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/175 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/176 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/178 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/179 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/180 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/186 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/187 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/188 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/190 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/192 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/193 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/194 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/195 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/197 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/199 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/200 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/201 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/202 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/204 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/205 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/206 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/207 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/208 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/212 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/213 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/214 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/215 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/217 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/220 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/221 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/222 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/226 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/228 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/229 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/232 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/235 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/251 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/253 (21 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/254 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/255 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/256 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/257 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/258 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/261 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/262 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/263 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/264 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/269 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/270 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/271 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/277 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/278 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/284 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/285 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/291 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/292 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 Version: TLS (no version) testing: TLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/300 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/302 (23 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/303 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/304 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/305 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/306 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/307 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/308 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/310 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/311 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/312 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/313 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/314 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/318 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/319 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/320 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/326 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/327 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/333 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/334 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/340 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 Version: TLS (no version) testing: TLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/342 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/345 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/360 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/362 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/363 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/364 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/365 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/366 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/367 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/369 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/370 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/371 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/374 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/378 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/385 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/394 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/400 (21 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/401 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/402 (21 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/403 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/406 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/413 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/414 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/430 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/432 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/436 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/437 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/438 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 Version: TLS (no version) testing: TLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,ssl3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/442 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/443 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/444 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/445 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/446 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/449 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/450 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/451 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/452 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/455 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/457 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/458 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/459 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/460 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/461 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/462 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/463 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/464 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/465 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/466 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/467 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/468 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/469 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/470 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/471 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/472 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/473 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/474 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/475 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/476 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/477 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/478 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/479 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/480 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/481 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/482 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/483 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/484 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/485 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/486 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/487 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/488 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 Version: TLS (no version) testing: TLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/489 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/490 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/491 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/492 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/493 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/494 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/495 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/496 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/497 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/498 (21 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/499 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/500 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/501 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/502 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/503 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/504 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/505 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/506 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/507 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/508 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/509 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/510 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/511 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/512 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/513 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/514 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/515 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/516 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/517 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/518 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/519 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/520 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/521 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/522 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/523 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/524 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/525 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/526 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/527 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/528 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/529 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/530 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/531 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/532 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/533 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/534 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/535 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/536 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/537 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 Version: TLS (no version) testing: TLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/538 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/539 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/540 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/541 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/542 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/543 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/544 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/545 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/546 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/547 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/548 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/549 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/550 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/551 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/552 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/554 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/555 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/556 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/557 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/558 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/561 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/563 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/564 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/565 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/567 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/571 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/572 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 Version: TLS (no version) testing: TLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: ssl3,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/596 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/597 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/598 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/599 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/601 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/604 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/605 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/606 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/607 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/612 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/613 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/614 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/620 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/621 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/628 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 Version: TLS (no version) testing: TLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 768 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/645 (22 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/646 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/647 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/648 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/650 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/653 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/654 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/655 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/656 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/661 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/662 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/663 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/669 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/670 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/677 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 Version: TLS (no version) testing: TLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/686 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/687 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/688 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/689 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/691 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/692 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/693 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/694 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/695 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/697 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/698 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/699 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/701 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/702 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/704 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/705 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/706 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/708 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/709 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/711 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/712 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/713 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/714 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/736 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/740 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/754 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 Version: TLS (no version) testing: TLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/784 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/785 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/786 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/787 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/788 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/789 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/790 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/791 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/792 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/793 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/794 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/795 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/796 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/797 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/798 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/799 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/800 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/801 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/802 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/803 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/804 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/805 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/806 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/807 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/808 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/809 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/810 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/811 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/812 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/813 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/814 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/815 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/816 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/817 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/818 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/819 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/820 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/821 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/822 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/823 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/824 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/825 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/826 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/827 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/828 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/829 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/830 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/831 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/832 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/833 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/834 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/835 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/836 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/837 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/838 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/839 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/840 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/841 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/842 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/843 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/844 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/845 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/846 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/847 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/848 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/849 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/850 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/851 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/852 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/853 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/854 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/855 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/856 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/857 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/858 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/859 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/860 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/861 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/862 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/863 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/864 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/865 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/866 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/867 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/868 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/869 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/870 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/871 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/872 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/873 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/874 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/875 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/876 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/877 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/878 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/879 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/880 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/881 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/882 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/883 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/884 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/885 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/886 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/887 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/888 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/889 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/890 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/891 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/892 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/893 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/898 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/899 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/900 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/901 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/902 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/906 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/907 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/908 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/910 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/911 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/912 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/914 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/915 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/916 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/917 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/918 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/919 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/925 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/926 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/929 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/931 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/933 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/937 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/938 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/940 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/941 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/942 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/944 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/946 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/947 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/948 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/949 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/950 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/953 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/954 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/955 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/956 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/957 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/959 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/963 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/964 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/971 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 Version: TLS (no version) testing: TLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/989 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/990 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/991 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/996 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/997 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/998 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/999 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1004 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1005 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1006 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1012 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1013 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1020 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 Version: TLS (no version) testing: TLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.0,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1029 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1030 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1031 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1032 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1033 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1034 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1035 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1036 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1037 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1038 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1039 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1040 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1041 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1042 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1043 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1044 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1045 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1046 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1047 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1048 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1049 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1050 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1051 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1052 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1053 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1054 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1055 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1056 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1057 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1058 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1059 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1060 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1061 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1063 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1064 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1066 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1067 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1068 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1069 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1070 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1071 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1072 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1074 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1075 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1076 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1077 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1078 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1079 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1081 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1082 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1083 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1084 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1085 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1086 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1093 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1112 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1115 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 Version: TLS (no version) testing: TLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1176 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1177 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1178 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1179 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1180 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1181 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1182 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1183 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1184 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1185 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1186 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1187 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1188 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1189 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1190 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1191 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1192 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1193 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1194 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1195 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1196 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1197 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1198 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1199 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1200 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1201 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1202 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1203 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1204 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1205 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1206 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1207 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1208 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1209 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1210 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1211 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1212 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1213 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1214 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1215 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1216 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1217 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1218 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1219 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1220 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1221 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1222 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1223 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1224 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1225 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1226 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1227 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1228 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1229 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1230 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1231 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1232 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1233 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1235 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1236 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1242 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1243 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1244 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1249 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1250 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1251 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1257 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1258 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1259 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1260 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1261 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1264 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1284 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1285 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1291 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1292 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1293 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1298 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1299 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1300 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1303 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1306 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1307 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1308 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1309 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1311 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1312 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1314 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1315 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1316 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1318 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 Version: TLS (no version) testing: TLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1326 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1333 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1334 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1340 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1341 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1342 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1343 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1347 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1348 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1349 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1354 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1355 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1356 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1357 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1358 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1363 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 Version: TLS (no version) testing: TLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1374 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1378 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1385 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1392 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1393 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1394 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1395 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1397 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1398 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1399 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1400 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1401 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1402 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1403 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1404 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1405 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1406 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1408 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1409 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1410 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1411 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1412 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1413 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1414 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1415 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1416 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1417 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1418 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1419 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1420 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1421 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1422 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1423 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1424 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1425 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1426 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1427 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1428 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1429 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1440 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 Version: TLS (no version) testing: TLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1552 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1556 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1559 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1563 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1567 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1572 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1573 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1574 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1579 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1586 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1587 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1593 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1594 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1600 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1601 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1628 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1635 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1636 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1642 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1643 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1649 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1650 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1657 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 Version: TLS (no version) testing: TLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1670 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1677 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1684 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1685 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1686 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1691 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1692 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1698 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1699 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1700 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1701 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1706 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1708 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 Version: TLS (no version) testing: TLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1736 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1740 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1754 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 Version: TLS (no version) testing: TLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1821 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1825 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1829 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1832 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1836 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1839 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1843 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1860 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1891 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1892 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1893 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1895 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1896 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1897 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1899 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1900 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1903 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1904 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1907 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1908 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1910 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1911 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1912 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1914 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1915 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1916 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1917 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1918 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1919 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1920 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1921 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1922 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1923 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1924 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1926 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1927 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1928 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1929 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1930 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1931 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1932 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1933 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1934 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1935 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1937 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1938 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1939 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1941 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1942 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1943 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1945 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1947 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1948 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1949 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1951 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1952 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1954 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1955 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1956 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1958 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1959 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1964 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1965 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1966 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1979 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1986 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1993 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/1999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2000 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 Version: TLS (no version) testing: TLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2013 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2028 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2029 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2035 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2042 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2049 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 Version: TLS (no version) testing: TLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2058 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2059 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2060 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2061 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2062 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2063 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2064 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2065 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2066 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2067 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2068 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2069 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2070 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2071 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2072 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2073 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2074 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2075 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2076 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2077 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2078 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2079 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2080 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2081 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2082 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2083 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2084 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2085 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2086 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2093 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2112 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2115 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 Version: TLS (no version) testing: TLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2219 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2223 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2234 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2235 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2236 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2238 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2239 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2242 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2243 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2245 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2246 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2249 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2250 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2252 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2253 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2254 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2256 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2257 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2258 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2259 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2260 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2261 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2262 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2263 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2264 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2265 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2266 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2267 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2269 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2270 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2271 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2273 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2274 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2275 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2276 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2277 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2278 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2279 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2280 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2281 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2282 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2283 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2284 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2286 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2287 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2288 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2290 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2291 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2292 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2293 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2294 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2295 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2297 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2298 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2299 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2300 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2301 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2302 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2303 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2304 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2305 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2306 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2307 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2308 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2310 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2312 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2314 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2315 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2317 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2318 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2319 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2320 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2321 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2322 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2323 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2324 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2325 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2326 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2327 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2329 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2330 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2333 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2334 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2337 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2338 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2340 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2341 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2345 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 Version: TLS (no version) testing: TLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2360 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2361 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2362 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2363 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2364 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2365 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2366 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2367 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2368 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2369 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2370 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2371 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2372 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2373 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2374 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2375 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2376 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2377 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2378 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2379 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2380 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2381 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2382 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2383 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2384 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2385 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2386 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2387 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2388 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2389 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2390 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2391 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2392 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2393 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2394 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2395 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2396 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2397 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2398 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2399 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 Version: TLS (no version) testing: TLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: ssl3,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2400 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2401 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2402 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2403 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2404 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2405 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2406 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2407 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2408 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2409 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2410 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2411 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2412 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2413 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2414 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2415 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2416 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2417 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2418 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2419 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2420 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2421 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2422 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2423 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2424 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2425 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2426 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2427 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2428 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2429 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2440 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2548 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2549 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2550 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2551 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2552 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2553 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2554 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2555 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2556 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2557 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2558 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2559 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2560 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2561 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2562 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2563 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2564 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2565 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2566 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2567 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2568 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2569 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2570 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2571 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2572 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2573 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2574 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2575 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2576 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2601 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2602 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2603 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2621 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2622 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2623 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2629 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2630 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2650 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2651 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2652 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2658 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2659 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2670 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2671 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2672 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2678 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2679 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2686 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2698 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2699 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2700 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2701 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2707 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2708 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2715 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2719 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2720 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2721 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2722 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2723 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2724 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2726 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2727 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2728 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2729 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2730 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2731 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2733 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2735 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2736 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2738 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 Version: DTLS (no version) testing: DTLS policy: undefined-too-low,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2743 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2754 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2821 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2825 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2829 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2832 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2836 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2839 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 Version: DTLS (no version) testing: DTLS policy: ssl3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2843 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2860 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2891 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2892 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2893 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2894 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2895 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2896 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2897 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2898 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2899 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2900 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2901 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2902 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2903 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2904 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2905 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2906 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2907 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2908 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2909 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2910 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2911 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2912 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2913 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2914 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2915 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2916 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2917 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2918 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2919 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2920 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2921 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2922 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2923 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2924 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2925 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2926 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2927 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2928 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2929 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2930 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2931 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2932 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2933 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2934 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2935 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2936 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2937 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2938 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2939 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2940 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2941 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2942 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2943 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2944 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2945 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2946 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2947 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2948 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2949 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2950 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2951 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2952 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2953 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2954 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2955 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2956 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2957 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2958 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2959 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2960 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2961 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2962 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2963 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2964 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2965 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2966 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2967 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2968 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2972 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2973 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2994 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2995 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/2999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3001 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3002 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3013 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3014 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3015 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3021 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3022 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3029 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 Version: DTLS (no version) testing: DTLS policy: ssl3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3043 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3044 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3050 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3051 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3058 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3060 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3062 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3063 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3064 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3065 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3067 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3069 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3070 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3071 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3072 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3074 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3078 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3079 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3080 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3081 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3083 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3084 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 Version: DTLS (no version) testing: DTLS policy: ssl3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3086 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3087 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3088 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3089 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3090 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3091 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3092 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3093 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3094 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3095 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3096 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3097 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3098 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3099 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3100 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3101 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3102 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3103 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3104 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3105 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3106 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3107 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3108 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3109 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3110 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3111 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3112 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3113 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3114 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3115 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 Version: DTLS (no version) testing: DTLS policy: tls1.0,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3219 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3223 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3234 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3235 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3236 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3237 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3238 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3239 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3240 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3241 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3242 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3243 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3244 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3245 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3246 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3247 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3248 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3249 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3250 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3251 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3252 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3253 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3254 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3255 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3256 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3257 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3258 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3259 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3260 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3261 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3262 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3263 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3264 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3265 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3266 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3267 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3268 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3269 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3270 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3271 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3272 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3273 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3274 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3275 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3276 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3277 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3278 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3279 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3280 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3281 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3282 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3283 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3284 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3285 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3286 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3287 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3288 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3289 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3290 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3291 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3292 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3293 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3294 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3295 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3296 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3297 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3298 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3299 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3300 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3301 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3302 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3303 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3304 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3305 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3306 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3307 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3308 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3309 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3310 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3311 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3312 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3313 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3314 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3315 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3316 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3317 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3318 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3319 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3320 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3321 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3322 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3323 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3324 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3325 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3326 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3327 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3328 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3329 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3330 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3331 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3332 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3333 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3334 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3335 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3336 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3337 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3338 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3339 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3340 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3341 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3342 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3343 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3344 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3345 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3346 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3347 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3348 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3349 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3350 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3351 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3352 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3353 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3354 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3355 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3356 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3357 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3358 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3359 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3360 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3363 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3364 (7 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3365 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3372 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3373 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3374 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3375 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 Version: DTLS (no version) testing: DTLS policy: tls1.0,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3381 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3382 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3384 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3385 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3386 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3387 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3390 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3394 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3401 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3405 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3406 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3407 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3413 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3414 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3421 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 Version: DTLS (no version) testing: DTLS policy: tls1.0,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3430 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3431 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3432 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3433 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3434 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3435 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3436 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3437 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3438 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3439 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3440 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3441 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3442 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3443 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3444 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3445 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3446 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3447 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3448 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3449 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3450 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3451 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3452 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3453 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3454 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3455 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3456 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3457 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3458 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 Version: DTLS (no version) testing: DTLS policy: tls1.1,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3552 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3556 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3559 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3563 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3567 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3569 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3570 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3571 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3572 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3573 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3575 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3576 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3577 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3578 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3579 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3580 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3581 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3582 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3583 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3584 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3585 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3586 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3587 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3588 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3589 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3590 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3591 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3592 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3593 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3594 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3595 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3596 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3597 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3598 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3599 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3600 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3601 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3602 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3603 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3604 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3605 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3606 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3607 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3608 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3609 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3610 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3611 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3612 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3613 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3614 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3615 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3616 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3617 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3618 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3619 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3620 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3621 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3622 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3623 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3624 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.1 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3625 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3626 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3627 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3628 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3629 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3630 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3631 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3632 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3633 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3634 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3635 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3636 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3637 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3638 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3639 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3640 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3641 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3642 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3643 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3644 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3645 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3646 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3647 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3648 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3649 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3650 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3651 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3652 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3653 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3654 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3655 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3656 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3657 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3658 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3659 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3660 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3661 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3662 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3663 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3664 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3665 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3666 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3667 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3668 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3669 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3670 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3671 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3672 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3673 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3674 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3675 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3676 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3677 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3678 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3679 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3680 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3681 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3682 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3683 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3684 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3685 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3686 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3687 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3688 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3689 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3690 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3691 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3692 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3693 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3694 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3695 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3696 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3697 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3698 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3699 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3700 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3701 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3702 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3703 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3704 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3705 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3706 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3707 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3708 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3709 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3710 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3711 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3712 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3713 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3714 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3715 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3716 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3717 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3718 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3719 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3720 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3721 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3722 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 Version: DTLS (no version) testing: DTLS policy: tls1.1,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3723 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3724 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3725 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3726 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3727 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3728 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3729 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3730 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3731 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3732 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3733 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3734 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3735 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3736 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3737 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3738 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3739 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3740 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3741 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3742 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3743 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3744 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3745 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3746 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3747 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3748 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3749 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3750 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3751 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3752 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3753 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3754 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3755 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3756 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3757 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3758 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3759 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3760 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3761 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3762 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3763 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3764 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3765 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3766 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3767 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3768 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3769 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3770 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3771 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 Version: DTLS (no version) testing: DTLS policy: tls1.1,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.1,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3772 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3801 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3802 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3803 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3804 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3805 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3806 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3807 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3808 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3809 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3810 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3811 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3812 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3813 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3814 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3815 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3816 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3817 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3818 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3819 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3820 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3821 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3822 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3823 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3824 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3825 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3826 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3827 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3828 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3829 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3830 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3831 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3832 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3833 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3834 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3835 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3836 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3837 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3838 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3839 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3840 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3841 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3842 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3843 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3844 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3845 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3846 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3847 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3848 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3849 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3850 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3851 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3852 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3853 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3854 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3855 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3856 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3857 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3858 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3859 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3860 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3861 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3862 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3863 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3864 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3865 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3866 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3867 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3868 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3869 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 Version: DTLS (no version) testing: DTLS policy: tls1.2,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3870 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3871 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3872 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3873 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3874 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3875 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3876 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3877 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3878 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3879 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3880 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3881 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3882 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3883 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3884 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3885 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3886 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3887 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3888 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3889 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3890 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3891 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3892 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3893 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3894 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3895 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3896 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3897 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3898 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3899 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3900 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3901 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3902 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3903 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3904 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3905 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3906 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3907 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3908 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3909 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3910 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3911 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3912 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3913 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3914 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3915 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3916 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3917 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3918 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3919 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3920 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3921 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3922 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3923 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3924 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3925 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3926 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3927 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3928 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3929 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3930 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3931 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3932 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3933 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3934 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3935 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3936 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3937 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3938 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3939 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3940 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3941 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3942 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3943 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3944 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3945 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3946 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3947 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3948 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3949 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3950 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3951 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3952 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3953 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3954 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3955 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3956 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3957 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3958 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3959 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3960 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3961 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3962 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3963 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3964 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3965 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3966 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3967 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3968 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3969 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3970 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3971 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3972 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3973 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3974 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3975 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3976 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3977 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3978 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3979 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3980 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3981 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3982 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3983 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3984 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3985 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3986 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3987 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3988 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3989 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3990 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3991 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3992 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3993 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3994 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3995 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3996 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3997 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3998 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/3999 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4000 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4001 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4002 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4003 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4004 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4005 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4006 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4007 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4008 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4009 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4010 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4011 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4012 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4013 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4014 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4015 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4016 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.2 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4017 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4018 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4019 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4020 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4021 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4022 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4023 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4024 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4025 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4026 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4027 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4028 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4029 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4030 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4031 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4032 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4033 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4034 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4035 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4036 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4037 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4038 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4039 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4040 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4041 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4042 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4043 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4044 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4045 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4046 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4047 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4048 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4049 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4050 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4051 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4052 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4053 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4054 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4055 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4056 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4057 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4058 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4059 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4060 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4061 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4062 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4063 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4064 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4065 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 Version: DTLS (no version) testing: DTLS policy: tls1.2,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4066 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4067 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4068 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4069 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4070 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4071 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4072 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4073 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4074 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4075 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4076 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4077 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4078 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4079 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4080 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4081 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4082 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4083 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4084 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4085 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4086 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4087 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4088 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4089 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4090 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4091 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4092 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4093 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4094 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4095 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4096 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4097 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4098 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4099 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4100 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4101 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4102 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4103 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4104 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4105 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4106 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4107 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4108 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4109 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4110 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4111 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4112 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4113 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4114 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 Version: DTLS (no version) testing: DTLS policy: tls1.2,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.2,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4115 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4116 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4117 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4118 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4119 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4120 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4121 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4122 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4123 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4124 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4125 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4126 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4127 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4128 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4129 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4130 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4131 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4132 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4133 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4134 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4135 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4136 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4137 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4138 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4139 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4140 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4141 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4142 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4143 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4144 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4145 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4146 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4147 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4148 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4149 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4150 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4151 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4152 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4153 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4154 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4155 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4156 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4157 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4158 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4159 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4160 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4161 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4162 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4163 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4164 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4165 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4166 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4167 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4168 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4169 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4170 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4171 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4172 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4173 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4174 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4175 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4176 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4177 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4178 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4179 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4180 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4181 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4182 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4183 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4184 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4185 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4186 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4187 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4188 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4189 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4190 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4191 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4192 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4193 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4194 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4195 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4196 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4197 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4198 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4199 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4200 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4201 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4202 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4203 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4204 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4205 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4206 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4207 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4208 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4209 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4210 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4211 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4212 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 Version: DTLS (no version) testing: DTLS policy: tls1.3,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4213 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4214 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4215 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4216 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4217 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4218 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4219 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4220 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4221 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4222 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4223 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4224 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4225 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4226 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4227 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4228 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4229 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4230 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4231 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4232 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4233 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4234 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4235 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4236 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4237 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4238 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4239 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4240 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4241 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4242 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4243 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4244 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4245 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4246 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4247 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4248 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4249 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4250 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4251 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4252 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4253 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4254 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4255 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4256 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4257 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4258 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4259 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4260 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4261 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4262 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4263 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4264 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4265 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4266 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4267 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4268 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4269 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4270 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4271 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4272 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4273 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4274 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4275 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4276 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4277 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4278 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4279 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4280 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4281 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4282 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4283 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4284 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4285 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4286 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4287 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4288 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4289 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4290 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4291 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4292 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4293 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4294 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4295 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4296 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4297 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4298 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4299 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4300 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4301 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4302 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4303 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4304 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4305 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4306 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4307 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4308 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4309 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4310 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4311 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4312 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4313 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4314 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4315 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4316 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4317 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4318 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4319 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4320 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4321 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4322 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4323 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4324 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4325 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4326 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4327 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4328 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4329 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4330 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4331 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4332 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4333 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4334 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4335 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4336 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4337 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4338 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4339 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4340 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4341 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4342 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4343 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4344 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4345 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4346 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4347 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4348 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4349 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4350 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4351 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4352 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4353 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4354 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4355 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4356 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4357 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4358 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4359 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4360 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4361 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4362 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4363 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4364 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4365 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4366 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4367 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4368 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4369 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4370 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4371 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4372 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4373 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4374 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4375 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4376 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4377 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4378 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4379 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4380 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4381 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4382 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4383 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4384 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4385 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4386 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4387 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4388 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4389 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4390 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4391 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4392 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4393 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4394 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4395 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4396 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4397 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4398 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4399 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4400 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4401 (5 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4402 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4403 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4404 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4405 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4406 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4407 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4408 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 Version: DTLS (no version) testing: DTLS policy: tls1.3,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4409 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4410 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4411 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4412 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4413 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4414 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4415 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4416 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4417 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4418 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4419 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4420 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4421 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4422 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4423 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4424 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4425 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4426 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4427 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4428 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4429 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4430 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4431 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4432 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4433 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4434 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4435 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4436 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4437 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4438 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4439 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4440 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4441 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4442 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4443 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4444 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4445 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4446 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4447 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4448 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4449 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4450 (6 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4451 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4452 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4453 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4454 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4455 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4456 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4457 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 Version: DTLS (no version) testing: DTLS policy: tls1.3,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: tls1.3,tls1.3 [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4458 (0 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4459 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4460 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4461 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4462 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4463 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4464 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4465 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4466 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4467 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4468 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4469 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4470 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4471 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4472 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4473 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4474 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4475 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4476 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4477 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4478 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4479 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4480 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4481 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4482 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4483 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4484 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4485 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4486 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4487 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4488 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4489 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4490 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4491 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4492 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4493 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4494 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4495 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4496 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4497 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4498 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4499 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4500 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4501 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4502 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4503 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4504 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4505 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4506 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-low input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4507 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4508 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4509 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4510 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4511 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4512 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4513 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4514 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4515 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4516 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4517 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4518 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4519 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4520 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4521 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4522 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4523 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4524 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4525 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4526 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4527 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4528 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4529 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4530 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4531 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4532 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4533 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4534 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4535 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4536 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4537 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4538 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4539 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4540 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4541 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4542 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4543 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4544 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4545 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4546 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4547 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4548 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4549 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4550 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4551 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4552 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4553 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4554 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4555 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,ssl3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4556 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4557 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4558 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4559 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4560 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4561 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4562 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4563 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4564 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4565 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4566 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4567 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4568 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4569 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4570 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4571 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4572 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4573 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4574 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4575 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4576 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4577 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4578 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4579 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4580 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4581 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4582 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4583 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4584 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4585 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4586 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4587 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4588 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4589 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4590 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4591 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4592 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4593 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4594 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4595 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4596 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4597 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4598 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4599 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4600 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4601 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4602 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4603 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4604 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.0 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4605 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4606 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4607 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4608 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4609 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4610 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4611 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4612 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4613 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4614 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4615 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4616 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4617 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4618 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4619 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4620 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4621 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4622 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4623 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4624 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4625 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4626 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4627 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4628 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4629 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4630 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4631 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4632 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4633 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4634 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4635 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4636 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4637 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4638 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4639 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4640 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4641 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4642 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4643 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4644 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4645 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4646 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4647 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4648 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4649 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4650 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4651 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4652 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4653 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.1 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4654 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4655 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4656 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4657 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4658 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4659 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4660 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4661 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4662 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4663 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4664 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4665 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4666 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4667 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4668 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4669 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4670 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4671 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4672 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4673 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4674 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4675 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4676 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4677 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4678 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4679 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4680 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4681 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4682 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4683 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4684 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4685 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4686 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4687 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4688 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4689 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4690 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4691 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4692 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4693 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4694 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4695 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4696 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4697 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4698 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4699 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4700 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4701 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4702 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.2 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4703 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4704 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4705 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4706 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4707 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4708 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4709 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4710 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4711 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4712 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4713 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4714 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4715 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4716 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4717 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4718 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4719 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4720 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4721 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4722 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4723 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4724 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4725 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4726 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4727 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4728 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4729 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4730 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4731 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4732 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4733 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4734 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4735 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4736 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4737 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4738 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4739 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4740 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4741 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4742 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4743 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4744 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4745 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4746 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4747 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4748 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4749 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4750 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4751 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,tls1.3 input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4752 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4753 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4754 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4755 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4756 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4757 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4758 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-low,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4759 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4760 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4761 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4762 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4763 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4764 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4765 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: ssl3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4766 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4767 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4768 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4769 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4770 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4771 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4772 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.0,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4773 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4774 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4775 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4776 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4777 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4778 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4779 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.1,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4780 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4781 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4782 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4783 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4784 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4785 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4786 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.2,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4787 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4788 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4789 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4790 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4791 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4792 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4793 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: tls1.3,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4794 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-low supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4795 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,ssl3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4796 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.0 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4797 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.1 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4798 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.2 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4799 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,tls1.3 supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4800 (2 ms) [ RUN ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 Version: DTLS (no version) testing: DTLS policy: undefined-too-high,undefined-too-high input: undefined-too-high,undefined-too-high supported-by-library: tls1.1,tls1.3 SSL_VersionRangeGetSupported: NONE,NONE server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. client: Changing state from CONNECTING to ERROR server: Handshake failed with error SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. server: Changing state from CONNECTING to ERROR [ OK ] TLSVersionRanges/TestPolicyVersionRange.TestAllTLSVersionsAndPolicyCombinations/4801 (2 ms) [----------] 4802 tests from TLSVersionRanges/TestPolicyVersionRange (10102 ms total) [----------] 56 tests from StreamOnly/TlsConnectStream [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/2 (7 ms) [ RUN ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ServerNegotiateTls10/3 (5 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 Version: TLS 1.0 ssl_renegotiation_unittest.cc:73: Skipped [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RENEGOTIATION_NOT_ALLOWED: Renegotiation is not allowed on this SSL socket. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 Version: TLS 1.0 ssl_renegotiation_unittest.cc:113: Skipped [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 Version: TLS 1.0 ssl_renegotiation_unittest.cc:151: Skipped [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 Version: TLS 1.0 ssl_renegotiation_unittest.cc:184: Skipped [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 Version: TLS 1.0 ssl_renegotiation_unittest.cc:203: Skipped [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [92] 03030570f9bd6400fbe0855e05734f3fb756f7962c4c7fee01f6f8e2d3b05b40... handshake new: [92] 03030570f9bd6400fbe0855e05734f3fb756f7962c4c7fee01f6f8e2d3b05b40... record old: [96] 0200005c03030570f9bd6400fbe0855e05734f3fb756f7962c4c7fee01f6f8e2... record new: [96] 0200005c03030570f9bd6400fbe0855e05734f3fb756f7962c4c7fee01f6f8e2... server: Filtered packet: [201] 16030300600200005c03030570f9bd6400fbe0855e05734f3fb756f7962c4c7f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/0 (10 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 0303ceccdec80f1ed7bb06b6a1cd42516f01369b3722f294a471e27fc7175a84... handshake new: [89] 0303ceccdec80f1ed7bb06b6a1cd42516f01369b3722f294a471e27fc7175a84... record old: [93] 020000590303ceccdec80f1ed7bb06b6a1cd42516f01369b3722f294a471e27f... record new: [93] 020000590303ceccdec80f1ed7bb06b6a1cd42516f01369b3722f294a471e27f... server: Filtered packet: [173] 160303005d020000590303ceccdec80f1ed7bb06b6a1cd42516f01369b3722f2... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/1 (8 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03025f412ebcb8b8ed6f847c74937095f092717b809d09128f8c2f03024cdd14... handshake new: [89] 03025f412ebcb8b8ed6f847c74937095f092717b809d09128f8c2f03024cdd14... record old: [93] 0200005903025f412ebcb8b8ed6f847c74937095f092717b809d09128f8c2f03... record new: [93] 0200005903025f412ebcb8b8ed6f847c74937095f092717b809d09128f8c2f03... server: Filtered packet: [173] 160302005d0200005903025f412ebcb8b8ed6f847c74937095f092717b809d09... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/2 (8 ms) [ RUN ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03012643340e7a5af9e529b55e3f919c0ba5e97c17d60268b3350d64ce13feb1... handshake new: [89] 03012643340e7a5af9e529b55e3f919c0ba5e97c17d60268b3350d64ce13feb1... record old: [93] 0200005903012643340e7a5af9e529b55e3f919c0ba5e97c17d60268b3350d64... record new: [93] 0200005903012643340e7a5af9e529b55e3f919c0ba5e97c17d60268b3350d64... server: Filtered packet: [157] 160301005d0200005903012643340e7a5af9e529b55e3f919c0ba5e97c17d602... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] StreamOnly/TlsConnectStream.ResumptionOverrideCipher/3 (9 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayer/3 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ReplaceRecordLayerAsyncLateAuth/3 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ForwardDataFromWrongEpoch/3 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [27] ef5b4a315bd70d83c36397c032109f03f72600760edb29d4bb7c41 record new: [27] ef5b4a315bd70d83c36397c032109f03f72600760edb29d4bb7c42 client: Filtered packet: [32] 170303001bef5b4a315bd70d83c36397c032109f03f72600760edb29d4bb7c42 server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [34] 0000000000000001da8a21c729b2106d86318316ebfb9a71a8f6e352a8824120... record new: [34] 0000000000000001da8a21c729b2106d86318316ebfb9a71a8f6e352a8824120... client: Filtered packet: [39] 17030300220000000000000001da8a21c729b2106d86318316ebfb9a71a8f6e3... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [48] 3f059b360ce5c10b9c309edd8dd9c2220fe45676039340dd956287ffb96e88ae... record new: [48] 3f059b360ce5c10b9c309edd8dd9c2220fe45676039340dd956287ffb96e88ae... client: Filtered packet: [53] 17030200303f059b360ce5c10b9c309edd8dd9c2220fe45676039340dd956287... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.BadRecordMac/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] e5d099dd71f3630c65d17a3a4d203354949b51ea0f4c11a4885c922de94714e7 record new: [32] e5d099dd71f3630c65d17a3a4d203354949b51ea0f4c11a4885c922de94714e8 client: Filtered packet: [37] 1703010020e5d099dd71f3630c65d17a3a4d203354949b51ea0f4c11a4885c92... record old: [32] 399ee2c535da043e673c9e2cf9bc8f1233735ba18f0541f5fce97b2d642b5ae1 record new: [32] 399ee2c535da043e673c9e2cf9bc8f1233735ba18f0541f5fce97b2d642b5ae2 client: Filtered packet: [37] 1703010020399ee2c535da043e673c9e2cf9bc8f1233735ba18f0541f5fce97b... server: Fatal alert sent: 20 client: Fatal alert received: 20 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.BadRecordMac/3 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.ShortRead/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.ShortRead/3 Version: TLS 1.0 ssl_loopback_unittest.cc:393: Skipped [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 (0 ms) [ RUN ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/0 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/1 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/2 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] StreamOnly/TlsConnectStream.GatherBufferPartialReadTest/3 (6 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/0 Version: TLS 1.3 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/0 (3 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/1 Version: TLS 1.2 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/1 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/2 Version: TLS 1.1 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/2 (2 ms) [ RUN ] StreamOnly/TlsConnectStream.IncludePadding/3 Version: TLS 1.0 client: Changing state from INIT to CONNECTING [ OK ] StreamOnly/TlsConnectStream.IncludePadding/3 (2 ms) [----------] 56 tests from StreamOnly/TlsConnectStream (315 ms total) [----------] 308 tests from GenericStream/TlsConnectGeneric [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 Version: TLS 1.0 ssl_version_unittest.cc:31: Skipped [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 Version: TLS 1.1 ssl_version_unittest.cc:42: Skipped [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 Version: TLS 1.0 ssl_version_unittest.cc:42: Skipped [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.TestFallbackSCSVVersionMatch/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlertBeforeServerHello/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: TLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/0 (465 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: TLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/1 (402 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: TLS 1.1 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/2 (403 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 Version: TLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBiggestRsa/3 (408 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (14 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/3 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/3 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ConnectResumeCorruptTicket/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/0 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/1 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/2 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertSwitch/3 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (14 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (17 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (18 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerSNICertTypeSwitch/3 (17 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [186] 010000b60303f8b79900187fd41c47246885250329868f15dbb19c004879ead5... max: [90] 020000560303d7bfa2e14a9de25f2e73a28b6763e857c73c0090caf54fa58563... max: [676] 3c315603ea5c9b2c2b7b88efb6c1fc8c9ed410006e47db780c62e3ef6d9305ea... max: [53] d2c7cfba8467e9f4314efd54b1ae2775efb0bf61867354835c3084c1c9343024... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] 94ef06ebf4211a846b70e7eae63bedb10dc15c50b62b55c43c4d0a22fa23af8f... max: [18] 3dbd6cb5070f2238d37ce5c57482cdf5963e max: [16401] 4499082ef122d281a1b304ead81680c50f5e327300ddc7cf67583afe3a5b7c5e... max: [18] bdcad3009687f6677df04d44730f034d6b20 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb0303121dbc783a3ce859adcdb381d249180555ca1a02ec3d1d5ab0a5... max: [715] 0200005d03034fa61c7d0438fe1b08b318601c219f35e683552c45b4063ec9db... max: [37] 10000021204feee9a871f355c0024009b07ac98def67d6ac73ede2cee5369fc5... max: [1] 01 max: [40] 000000000000000031f5b92d1b12a329e6b0182d9bdd1f82773ea9d6cfc50595... max: [1] 01 max: [40] 000000000000000028b9f23d2232de55ef17a1b21ca6d04830894c6785455058... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 00000000000000014faf10284f7d85fc438776f94e9dd0526fc45181298a94f4... max: [25] 0000000000000002cfa49c1a1554c4a98bc95767e209c23669 max: [16408] 000000000000000179a97c9f1c201e1d98d62aa16a57c19905a6116911014690... max: [25] 0000000000000002a0d38953b7a5bf3d3ed984dd33cf25b0c7 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750302bd9031f4d11b14325a48834b28010e7df86c52c5f4182c1210f0... max: [713] 0200005d0302fbe8eb26091f500590842c4e8a172bca2b71c9eb8b5274b1e892... max: [37] 1000002120c77b10359b8fcdd191006bca276e866a273106583c096f67ff4965... max: [1] 01 max: [64] bca2009c27a4302062ea11a215a445e6751f92e00054a08e193a2dabc2f63216... max: [1] 01 max: [64] 78bcd16f44d62c85ff0c3ffe56722e68105b7a54f41fd74909169fc7fbdb2d31... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] 64eba7d4fd8dd7ceebf6d0ce47ca453e2b9882e114ed72e32f7c107aca626f1a... max: [48] fe9d2b2554ae3ccc2cc6f887fa2ea6e5847206bc020e8403c17129fea44082fd... max: [16432] d97f75b766535cc61282b4c243e06cddbad6ca96d0404568d255ef4b855c553e... max: [48] 69bd1d7c2eb90916957ae9f4fe708d29f356b0e93e3cff31beeb8eab43c30eda... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 01000075030136901c4a3ef4c314c9cc9acd21fd5f393fd9539b481c110c368b... max: [713] 0200005d0301445cae23326d2c70e610790aea379682c945676fee856e8cb38d... max: [37] 1000002120939b16e236c265976cc3e773757b1b5b152381230630cd23f0873f... max: [1] 01 max: [48] cef6c25d0060fd5e52c7ccb9c0b0db304695e3618aef197507eed0e7061a19c7... max: [1] 01 max: [48] 9d9b98575d607850e2d964c63752484f34277f210bfbf079aaf5d8cd658add26... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] a2bc0cf7fa468ccdeb618eacf2e1473750c91a81465e08c7bb8d9fccc9c96114 max: [16416] cf7fbc11779d330bf780b91c3e79a2de1c0343ff6287dca323dc9c7b292b1e6c... max: [32] 0f9af682de7d73ba1ca3bd368ee58ecec4bb530fac9d92e3d7545f4db6ac4039 max: [16416] 615d6ff1cd4679497ad86a3bea3970d310fc653e49ac60ebe61f857ee70aa9d6... client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMaximum/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [90] 0200005603035ffe639393bff1947205a935ea8e3b7e407298edcba3ac734bff... max: [80] 8daf0de2990df1c777447970f459bd1f637e380d8df50f439813ced6ef14128e... max: [80] 7e620e625ba4d459830c8c8578794dfb89e7d68b8bac50ed0ebfd4ecf43569d1... max: [80] 3b4f2a5fbbe6ca4e7660fc1ac08c9a824a7a5157919b0c4f86cd9cb01f26fae0... max: [80] 57e674aeea25c37a01161e13bbd41a9f8df02c69049bf2df987e2376cbbaf506... max: [80] f4db98d4094f7f111a6bf79d98a8c2dbbb2aa9f8e550067fe6882f7c27bcccff... max: [80] 50206c4f51b7d9aecf53cd85018edd344c8ae314ce0263bceb4552c101fff4d7... max: [80] 2fe72170a3e450441bfc13a2c000828cc5d7ee1091c3921058d9ed5d4f33f26b... max: [80] 5a35d7056ba6d452a65ef8fda1ee495829f79f6aec844496fb23223a1bc911aa... max: [80] 73df1b5010c25824dd0e37194258e6042ad1206c0cc466d762ced954653330d0... max: [80] cb63dc6ef574b942f7aaecf35ba82519736ccee7318ebc39d8efd6d1066d7cdc... max: [46] 0d93fa6efef127300bc798e4393066a2dd895ff6f44acdc8b94fecd758974901... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] a2e3b33b37f77b2a389cdc1542b750e7a5c824811d3015363f17cc5f969f379c... max: [80] c1c6ed273ade6a61bb55ddacd54f44973e0b12b6bbbfaf3f136901c49330c43c... max: [18] 6036a115b1dacdc5e00d553168b6f1f271a3 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [715] 0200005d0303fad9578b82b8c5fe0787c1610f6835d4aebe5de6433e9b512c83... max: [1] 01 max: [40] 0000000000000000ae432646f04e8fbbc6ced8b959edfa33b946ff462a4b29ae... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 000000000000000110ab430c4b753683d2ce0b75e1a5bb36df6f1fa10c72cdfe... max: [87] 0000000000000002aca67b8de96e1f1be6d80e5d80bd0f7e11918883871c2642... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d03027d5b2bc356f7160862ab54957ed078365f17beb7a438b4c5f1bb... max: [1] 01 max: [64] 31677c5dade716f7ffa55b4180943864bc54fabf12c4bf886c8983b57183d72a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 671aaaadf93b09ecba281349fd78d335a1c50b41098d29c441a7f557d16c9465... max: [112] 972e5a373a066feebe63a3197ac233318e963d62f5edefdb2131b116a1ee92b7... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [713] 0200005d0301f44152af24ef447c7960a62f46cd63dcd489518509b186d69404... max: [1] 01 max: [48] 305e4352a092b254fa9f06366f43c1a4bbdd2f25d55b8c0fd0cb00f66fe08944... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 9a98ccd3524ee50e5a0b67e51bf5e2bb36244f3ba5e341cb0d8a0f5768835bc0 max: [96] edd593b3de6fbaa51104b36760da7d79f961d5f4a1a85d185990dfe585c7c394... max: [96] cae410a7d4e9d276de32acb4ebd2b2aacf24bb815236d384a1933f5cd6c3bf9a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumClient/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [186] 010000b60303aab7243a111586935f25e6277a8a82352a0efc0c9d4bd4dec71d... max: [53] 3594ff4abaa38aeaa456c47475f8aa77d5924ddc80fbb6b89d6d42bdc66b9311... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] 3032e25dc9e52b65a47c11240aca0974ee2b915025e9e3087eb6e62a4f6e0987... max: [80] 98a1c7ca16105f033dadc322e54d4fa3fd1473069fcd16aebb75604ef6f45437... max: [18] 1bbd6137b9e4e006c9768e8462bc7fd50eb3 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb0303c2ca72478b86503affe9f875dcefde89e11d8fba0392a0c7041c... max: [37] 100000212000c2e2b29047800af83dae5a1fa84f630c9d710035721ced0a0928... max: [1] 01 max: [40] 0000000000000000524be5843736371030c3a9f30aa44423801ba2cf5c5f0e9a... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0000000000000001aebfba006140480ff26298a7af9c8d98e3a2c67d5129c94f... max: [87] 00000000000000028733d290a035aa0a2581457ef8653bc01f3961acc409655a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750302dfe1b0a374a6d17088f12b0fece1a0986b4c03d1b07c03e0432e... max: [37] 1000002120f2116251e24b672cce47157c96bc27cae16794ae07ed781a4482de... max: [1] 01 max: [64] d9bed03cfb7efa903d0506aeef0c4b9e8c8d2ae2bd34de8e3342c7c7b9a50f1f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 672fade845af13cf31da1b874241ab45c65cf8b1dbb6e15a4b9f87517c8c43f9... max: [112] b149024cf6adbc574406b3ce56ec6b9ea0861454a9d4c1e063db2045b11ba3cd... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 01000075030143dfda4a13463ea56cb1b027464dac71a2c4a6f3d5fd1a8328d9... max: [37] 1000002120f53d4527a3b117f9a924a745f268de9093e3c5682468f50e588fbf... max: [1] 01 max: [48] 0b99735fed1068dd009590f807a8b5072ab63b0586df2b361bafa3be5c7bbb82... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 6612b126cc2ef00f55fef14fd1839d4de61ad93350ada772b27beb8faf092212 max: [96] b7e911da57fc39d01082b1fd6e80087a7ba5d1aae0b24ccb1f637ee11c9e31c4... max: [96] 249ea7594523933410ce5aee8c3ad3eec5554756d3ccde31f3e8fa8a248a768f... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeMinimumServer/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [186] 010000b6030339c791e96ae2046e47d6f7c1e00f2958b0dc65575b2dabd1728e... max: [90] 020000560303d55880cb14016a1c5ce97feea866b5f62db68f6ed4080bc66867... max: [80] b5a7e989105b9bad44f1cb3fa2961e8ed8629665c926d92bf399ad136de62e0e... max: [80] 3f59964223266c947df8206e360aecc33085752a56b1d74ba1d10f87920eb962... max: [80] 701e922e6954cb57d59786b2cbd7f1bf97d13a2fb34696a932dbffe0d918452a... max: [80] 21f737e853e96db749f4b4157210763edb9ab7b41eb4694928b02d48fac9d0bd... max: [80] b515e170b8a13c504f5d77b20fbd398f744e593cb4170f6b575492c4d36683c8... max: [80] 03f56dd4f318ded748c2b18d69f740e38175a2aa45501c2584a87ac34cb4d581... max: [80] 6030d11fd10f52b969a829893c645a3e18b8789289beeffdb83f1b2e615304dc... max: [80] fc3aa232d32954a0ee5421cddffe7dcf373a4a2d56404b6648452e4ac2fc31bf... max: [80] b9d15e94e705426815e3444ea540baeb1d65dfb011dedc17bc9017681b45560d... max: [80] f96199f356bcaca321ebf50d7d9ee999853747c76d44e29f0f2b3d50d3850bcb... max: [46] 0f62ce1fe45cfab0980799b9b408315a0fe15b614c616f2b5e12d814bdd540b4... max: [53] 969278e8f3ab5882127ad109b73fc5e568ad7c60027d2b7b9ddeaa352708e6cf... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] e8ffcdee3838b8e211bdcb7b48887da34bd000f4b518a9b435f9a7e94504550f... max: [45] cb23dc74c2eec130c591c6fb1564d549bfc996b79b135b506649d8ee6120f9b4... max: [80] 5ce188b535ee813d18cb485a427a11c89e59b73123f476b7e2845e32eb6ca198... max: [80] daff2d52338365aaf6d3033f043b78f1b4232f7cab597a213bc4e18fd919c594... max: [18] 20ae57d3c8bf0dfe2060708f46b3ba9eafbe server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [191] 010000bb0303ba9536310bc77a29f0f574ebc702dc069bc825bf7b5c9f70e85c... max: [715] 0200005d03030750e68c2ab2e7e5aa579d75fbf4e43058bcb329b701cc09871d... max: [37] 1000002120f687e897231d944a0a72d88526000d106d0f2b6ad2d859d17d0ac0... max: [1] 01 max: [40] 000000000000000064765b373e1009744c7bde8884ad67d65db9d87e9ab4200b... max: [1] 01 max: [40] 000000000000000001b73b63d2b38644f1de77a7d129cae4a6f9d58e24ff3857... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 0000000000000001f33c30dda14c015614b7f6627b9cd49d83c37305d6524a87... max: [51] 00000000000000023fe49867649b14fe9d02157831bf9064c362102fea79636a... max: [88] 0000000000000001a5fbaa91907047ce825a7635ddd4a6a5639598efbd153489... max: [87] 00000000000000024180a6bbb7734764c64a71de48efeb87b4ef796d62d3b36a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 010000750302b584a511e5d1a39cacac3354511fd83c55e5b1c3c862e329072b... max: [713] 0200005d0302d2ee0ff38406df847918d9268086d29690c62372ff4afed31edc... max: [37] 100000212096ca6bc28987a6376fb6cdee3eb0fd732c10edf205302505a390d4... max: [1] 01 max: [64] 464aa1ff8edf6deebacf14e922398b11e6cdb376a60b8c2062e99cb68dbbe69d... max: [1] 01 max: [64] 7e185b4e3447d92b745cefdaf8525a2098de7333a6f29a6667948d2323d93943... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] fb7a65ee3737ace644fb05f496878e5d3a5f2d5430d9de8408d5a9640c344754... max: [64] 25a8198065435da6b961581994c7c72e7c50691960cfb284d92a1b76c8ea2736... max: [112] a649fafeb6d9541cef5fc013f0182ff9148f24e291956a3c04aea8627165266f... max: [112] c6913dcd3f0309073a31bfccec8cc1eb68b3f39c19ba94043e638879e0dab753... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [121] 01000075030193219444f4a3d02c1da2f6bd871f1e5292d272063a114a4384b7... max: [713] 0200005d0301e176e397e2012de0bb6b26ca62507ffd1616106340e4b276b582... max: [37] 1000002120d2501ce94493da2647ad25795c918128ec386af7e49592f615736c... max: [1] 01 max: [48] e8f3145d4d6939178ad6f8cec6430169467103b5c5511d563ae5d77bd1ddea59... max: [1] 01 max: [48] a34b5398c1434c0d30b2261cd13d9287d1d2760837616513d2e9eef915d240ba... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [32] 9f15c42708a23497293f114dca28fbc9d625a5d278724f9eeb46adec6804ad17 max: [128] 8d69e1946694ac3681ac3a5c2f9b8b2c0cae85ef0a079e90446566414bb496b5... max: [48] 58261f8d25ce404123757e2f29106e335fe589e532d1783721bab4310c473df7... max: [32] 9daac2312ce11e766f29eb73625e2d6a8b455e899d073e5ab4048f2ea9af7267 max: [96] 6f3af8bec5b4dee157c3195c5ebca57890e4cf493f55a760799beb7359866fb9... max: [96] 3b86694d4c24938f6ce44c3bf3931c38cf2a39c9d0cb269ecb3275581b1777f0... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeAsymmetric/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeBadValues/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeGetValues/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionClient/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeCapExtensionServer/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [659] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [776] 160303005a020000560303eb8d5a9b1df2289a7467b40d19ae99d9627479a205... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 03032f5ea0b45c11812a7924bf7aa9453185e4ed15e98fe38e486dc336d62191... handshake new: [93] 03032f5ea0b45c11812a7924bf7aa9453185e4ed15e98fe38e486dc336d62191... record old: [715] 0200005d03032f5ea0b45c11812a7924bf7aa9453185e4ed15e98fe38e486dc3... record new: [715] 0200005d03032f5ea0b45c11812a7924bf7aa9453185e4ed15e98fe38e486dc3... server: Filtered packet: [720] 16030302cb0200005d03032f5ea0b45c11812a7924bf7aa9453185e4ed15e98f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 0302335bacc55515fbd0dcf00e5b9c3c7f86d62f7719a6eb14f0f7ef80b58bab... handshake new: [93] 0302335bacc55515fbd0dcf00e5b9c3c7f86d62f7719a6eb14f0f7ef80b58bab... record old: [713] 0200005d0302335bacc55515fbd0dcf00e5b9c3c7f86d62f7719a6eb14f0f7ef... record new: [713] 0200005d0302335bacc55515fbd0dcf00e5b9c3c7f86d62f7719a6eb14f0f7ef... server: Filtered packet: [718] 16030202c90200005d0302335bacc55515fbd0dcf00e5b9c3c7f86d62f7719a6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] 03018c9a42b0ee83f087be52a603baedde073b1b3e9be122cf8905644eba8476... handshake new: [93] 03018c9a42b0ee83f087be52a603baedde073b1b3e9be122cf8905644eba8476... record old: [713] 0200005d03018c9a42b0ee83f087be52a603baedde073b1b3e9be122cf890564... record new: [713] 0200005d03018c9a42b0ee83f087be52a603baedde073b1b3e9be122cf890564... server: Filtered packet: [718] 16030102c90200005d03018c9a42b0ee83f087be52a603baedde073b1b3e9be1... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionInvalid/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [39] 0025000a00160014001d001700180019639901000101010201030104001c0003... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [660] 080000270025000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [777] 160303005a0200005603033feda6689572d95e3f960401c55f04e9193fd9bcb6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 0303507c57ae959dd8de4a7eda070c1efd7b377d07bcb8159b47b99851506c0f... handshake new: [94] 0303507c57ae959dd8de4a7eda070c1efd7b377d07bcb8159b47b99851506c0f... record old: [715] 0200005d0303507c57ae959dd8de4a7eda070c1efd7b377d07bcb8159b47b998... record new: [716] 0200005e0303507c57ae959dd8de4a7eda070c1efd7b377d07bcb8159b47b998... server: Filtered packet: [721] 16030302cc0200005e0303507c57ae959dd8de4a7eda070c1efd7b377d07bcb8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 03026f1d2019a3a572597cc16a097f0021e14441c4771d8d1069b51c569b29ce... handshake new: [94] 03026f1d2019a3a572597cc16a097f0021e14441c4771d8d1069b51c569b29ce... record old: [713] 0200005d03026f1d2019a3a572597cc16a097f0021e14441c4771d8d1069b51c... record new: [714] 0200005e03026f1d2019a3a572597cc16a097f0021e14441c4771d8d1069b51c... server: Filtered packet: [719] 16030202ca0200005e03026f1d2019a3a572597cc16a097f0021e14441c4771d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] 0301bcecb9db627b02a5ee6e2dda8d0670ae9648d5afeea0dc05c7119dc3471a... handshake new: [94] 0301bcecb9db627b02a5ee6e2dda8d0670ae9648d5afeea0dc05c7119dc3471a... record old: [713] 0200005d0301bcecb9db627b02a5ee6e2dda8d0670ae9648d5afeea0dc05c711... record new: [714] 0200005e0301bcecb9db627b02a5ee6e2dda8d0670ae9648d5afeea0dc05c711... server: Filtered packet: [719] 16030102ca0200005e0301bcecb9db627b02a5ee6e2dda8d0670ae9648d5afee... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeServerExtensionExtra/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [257] 47c955a56ea2c25869fac55406fcd7aaf82fec5ec17c5aba3c61c3953f6f3ab0... record new: [16641] 47c955a56ea2c25869fac55406fcd7aaf82fec5ec17c5aba3c61c3953f6f3ab0... server: Filtered packet: [16646] 170303410147c955a56ea2c25869fac55406fcd7aaf82fec5ec17c5aba3c61c3... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [264] 000000000000000149d059fa49a45821c133f4178b5c39665a7e3a8130367799... record new: [18433] 000000000000000149d059fa49a45821c133f4178b5c39665a7e3a8130367799... server: Filtered packet: [18438] 1703034801000000000000000149d059fa49a45821c133f4178b5c39665a7e3a... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [288] d5e9bc348b85d01a37dcdaf078855316bc817dcf8e6638d5d32e64ebe036603a... record new: [18433] d5e9bc348b85d01a37dcdaf078855316bc817dcf8e6638d5d32e64ebe036603a... server: Filtered packet: [18438] 1703024801d5e9bc348b85d01a37dcdaf078855316bc817dcf8e6638d5d32e64... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] 00f56b32c4f6a80413ef2414a0ad486a3e10beda94f240f1f6e25997cd043e7e record new: [18433] 00f56b32c4f6a80413ef2414a0ad486a3e10beda94f240f1f6e25997cd043e7e... server: Filtered packet: [18438] 170301480100f56b32c4f6a80413ef2414a0ad486a3e10beda94f240f1f6e259... record old: [272] 5c04a514115ba3faea4fb23dcc1f3eb6deeb5f5e2c13634fdc8c3788bb806d54... record new: [18433] 5c04a514115ba3faea4fb23dcc1f3eb6deeb5f5e2c13634fdc8c3788bb806d54... server: Filtered packet: [18438] 17030148015c04a514115ba3faea4fb23dcc1f3eb6deeb5f5e2c13634fdc8c37... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordGatherOverlong/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [32] c61cb6142ed599d8496a4c0c872496716e0edca05cc817487f522b4585ea8c98 record new: [1256] c61cb6142ed599d8496a4c0c872496716e0edca05cc817487f522b4585ea8c98... server: Filtered packet: [1261] 17030304e8c61cb6142ed599d8496a4c0c872496716e0edca05cc817487f522b... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [39] 0000000000000001693a4b7bbf5414a23f8e3cf6e9fd73f844b458c0d7204d36... record new: [3049] 0000000000000001693a4b7bbf5414a23f8e3cf6e9fd73f844b458c0d7204d36... server: Filtered packet: [3054] 1703030be90000000000000001693a4b7bbf5414a23f8e3cf6e9fd73f844b458... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [64] 07fef93314dff2856e5de5cbe5526195f5763b4fef020244cfd1ce87099029de... record new: [3049] 07fef93314dff2856e5de5cbe5526195f5763b4fef020244cfd1ce87099029de... server: Filtered packet: [3054] 1703020be907fef93314dff2856e5de5cbe5526195f5763b4fef020244cfd1ce... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] 3600c55588b730f8c29e8bb47e05cfd9ac20b38c1ef79ba1b4fe262838afa856 record new: [3049] 3600c55588b730f8c29e8bb47e05cfd9ac20b38c1ef79ba1b4fe262838afa856... server: Filtered packet: [3054] 1703010be93600c55588b730f8c29e8bb47e05cfd9ac20b38c1ef79ba1b4fe26... record old: [48] d0a46cc0ab8c8f98c77a2070e9a8facd29f0f05b810a1ef95b5bc5d4487f7e83... record new: [3049] d0a46cc0ab8c8f98c77a2070e9a8facd29f0f05b810a1ef95b5bc5d4487f7e83... server: Filtered packet: [3054] 1703010be9d0a46cc0ab8c8f98c77a2070e9a8facd29f0f05b810a1ef95b5bc5... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeExtensionOverlong/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [32] 8f314ce38c65b59e4577b1d783ea8779315ffdb9f0772afad143c0fb56648e22 record new: [1017] 8f314ce38c65b59e4577b1d783ea8779315ffdb9f0772afad143c0fb56648e22... server: Filtered packet: [1022] 17030303f98f314ce38c65b59e4577b1d783ea8779315ffdb9f0772afad143c0... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [39] 0000000000000001d24f5500a64ed3029896e6276226afb018eca4cc2306e83e... record new: [1321] 0000000000000001d24f5500a64ed3029896e6276226afb018eca4cc2306e83e... server: Filtered packet: [1326] 17030305290000000000000001d24f5500a64ed3029896e6276226afb018eca4... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [64] 801dc553c2eda7c7bf2b9da58e8592b575281e05316223c950cd43da189daebf... record new: [1321] 801dc553c2eda7c7bf2b9da58e8592b575281e05316223c950cd43da189daebf... server: Filtered packet: [1326] 1703020529801dc553c2eda7c7bf2b9da58e8592b575281e05316223c950cd43... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] 1f3156f3866362bd77192c478f4ee40d602f9522dee89c13e58580e9b9d406f9 record new: [1321] 1f3156f3866362bd77192c478f4ee40d602f9522dee89c13e58580e9b9d406f9... server: Filtered packet: [1326] 17030105291f3156f3866362bd77192c478f4ee40d602f9522dee89c13e58580... record old: [48] 7d50f71104112191dfe3ef492ec6308482c851190f3ee4251853f983616f1b0f... record new: [1321] 7d50f71104112191dfe3ef492ec6308482c851190f3ee4251853f983616f1b0f... server: Filtered packet: [1326] 17030105297d50f71104112191dfe3ef492ec6308482c851190f3ee4251853f9... client: Fatal alert sent: 22 client: Read error SSL_ERROR_RX_RECORD_TOO_LONG: SSL received a record that exceeded the maximum permissible length. server: Fatal alert received: 22 server: Handshake failed with error SSL_ERROR_RECORD_OVERFLOW_ALERT: Peer received an SSL record that was longer than is permitted. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordExpansionOverlong/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] 0943bb234cf8f8fa835f8f3bbd02b293c173a4d972d79afd071ba1a8885e7e4d record new: [16704] 0943bb234cf8f8fa835f8f3bbd02b293c173a4d972d79afd071ba1a8885e7e4d... server: Filtered packet: [16709] 17030141400943bb234cf8f8fa835f8f3bbd02b293c173a4d972d79afd071ba1... record old: [48] d5c7c7746cdcccd9a8af64cf129f3dcfce4d20e18b86a68fea31153eb6bbb58c... record new: [16704] d5c7c7746cdcccd9a8af64cf129f3dcfce4d20e18b86a68fea31153eb6bbb58c... server: Filtered packet: [16709] 1703014140d5c7c7746cdcccd9a8af64cf129f3dcfce4d20e18b86a68fea3115... client: Fatal alert sent: 20 client: Read error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Fatal alert received: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeDefaultLong/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [32] a334027f0e053e44ad65002c7793f423bbf917a95a1f9c4385c03b627e6a1b07 record new: [1320] a334027f0e053e44ad65002c7793f423bbf917a95a1f9c4385c03b627e6a1b07... server: Filtered packet: [1325] 1703010528a334027f0e053e44ad65002c7793f423bbf917a95a1f9c4385c03b... record old: [48] d85e0d0ddba3e5d6620d7531674b1bd4a02008bda369e0a4242931704d44fe94... record new: [1320] d85e0d0ddba3e5d6620d7531674b1bd4a02008bda369e0a4242931704d44fe94... server: Filtered packet: [1325] 1703010528d85e0d0ddba3e5d6620d7531674b1bd4a02008bda369e0a4242931... client: Fatal alert sent: 20 client: Read error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Fatal alert received: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. server: Changing state from CONNECTED to ERROR [ OK ] GenericStream/TlsConnectGeneric.RecordSizeLimitLong/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/0 Version: TLS 1.3 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/0 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/1 Version: TLS 1.2 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/2 Version: TLS 1.1 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/2 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SetupOnly/3 Version: TLS 1.0 [ OK ] GenericStream/TlsConnectGeneric.SetupOnly/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.Connect/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Connect/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/1 (10 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/2 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdsa/3 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CipherSuiteMismatch/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [182] 0303d7b2f3b1a0cef375befafb3ec5774e45fa99c4641c8b87c1cdb9c164691e... handshake new: [181] 0303d7b2f3b1a0cef375befafb3ec5774e45fa99c4641c8b87c1cdb9c164691e... record old: [186] 010000b60303d7b2f3b1a0cef375befafb3ec5774e45fa99c4641c8b87c1cdb9... record new: [185] 010000b50303d7b2f3b1a0cef375befafb3ec5774e45fa99c4641c8b87c1cdb9... client: Filtered packet: [190] 16030100b9010000b50303d7b2f3b1a0cef375befafb3ec5774e45fa99c4641c... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/0 (3 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303fee6f4f19dd09f6c12eff8c42297f34cc67d57d851f42177fe6d096b9132... handshake new: [186] 0303fee6f4f19dd09f6c12eff8c42297f34cc67d57d851f42177fe6d096b9132... record old: [191] 010000bb0303fee6f4f19dd09f6c12eff8c42297f34cc67d57d851f42177fe6d... record new: [190] 010000ba0303fee6f4f19dd09f6c12eff8c42297f34cc67d57d851f42177fe6d... client: Filtered packet: [195] 16030100be010000ba0303fee6f4f19dd09f6c12eff8c42297f34cc67d57d851... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0302dc052bfb35d4d0c55219bfef9388768019bad1d16d9e41c6026224c3a4d4... handshake new: [116] 0302dc052bfb35d4d0c55219bfef9388768019bad1d16d9e41c6026224c3a4d4... record old: [121] 010000750302dc052bfb35d4d0c55219bfef9388768019bad1d16d9e41c60262... record new: [120] 010000740302dc052bfb35d4d0c55219bfef9388768019bad1d16d9e41c60262... client: Filtered packet: [125] 1603010078010000740302dc052bfb35d4d0c55219bfef9388768019bad1d16d... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 03017cb872f2be379dbec08d235707a6c3edf6707a590c8ccff91135a91cf7e4... handshake new: [116] 03017cb872f2be379dbec08d235707a6c3edf6707a590c8ccff91135a91cf7e4... record old: [121] 0100007503017cb872f2be379dbec08d235707a6c3edf6707a590c8ccff91135... record new: [120] 0100007403017cb872f2be379dbec08d235707a6c3edf6707a590c8ccff91135... client: Filtered packet: [125] 16030100780100007403017cb872f2be379dbec08d235707a6c3edf6707a590c... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CaptureAlertServer/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpn/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityA/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnPriorityB/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnClone/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectSendReceive/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectWithCompressionEnabled/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/0 (12 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/1 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/2 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.CheckRandoms/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.CheckRandoms/3 (11 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSide/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericStream/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlpnDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlpnDisabled/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlpnDisabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlpnDisabled/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlpnDisabled/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlpnDisabled/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.AlpnDisabled/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.AlpnDisabled/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientHelloExtensionPermutation/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterBasic/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterBasic/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ExporterContext/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ExporterContext/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdhe/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/0 (42 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/1 (40 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/2 (40 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Client/3 (40 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/0 (41 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/1 (41 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/2 (40 ms) [ RUN ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/3 (40 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/0 (41 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/1 (41 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/2 (42 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheP384Server/3 (40 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (23 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectEcdheGroupMismatch/3 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.P256ClientAndCurve25519Server/3 (2 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/0 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/1 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/2 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectDhe/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectDhe/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/0 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/1 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/2 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ConnectFfdheClient/3 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/0 (47 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/1 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/2 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.Ffdhe3072/3 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400801c371a08feec6546d2fdf09e0c474bcd3ce102ef3beee48c73ffad9c... handshake new: [132] 080400801c371a08feec6546d2fdf09e0c474bcd3ce102ef3beee48c73ffad9c... record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [645] 170303028039d7bb62e90797007186f9c7a8ae9b02d48965db22a1d96adc2928... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/0 (9 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 02010080aa72640285c0d4971e8f49a142ffe68dd089e165738c43acaf3a85c3... handshake new: [132] 02010080aa72640285c0d4971e8f49a142ffe68dd089e165738c43acaf3a85c3... record old: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [621] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [677] 160303026d0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/1 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080880cb8810eaac33e31d7e9b184d139867f8793ed5e57e6ba35972892db81... handshake new: [130] 0080880cb8810eaac33e31d7e9b184d139867f8793ed5e57e6ba35972892db81... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [699] 160302026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/2 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00805b0d1e6974b929721a98b8529b41612e714b8518e5f12273edac0dd7b6e1... handshake new: [130] 00805b0d1e6974b929721a98b8529b41612e714b8518e5f12273edac0dd7b6e1... record old: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... record new: [619] 0b0001bc0001b90001b6308201b23082011ba003020102020101300d06092a86... client: Filtered packet: [683] 160301026b0b0001bc0001b90001b6308201b23082011ba00302010202010130... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.DamageClientSignature/3 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/0 Version: TLS 1.3 ssl_certificate_compression_unittest.cc:929: Skipped [ SKIPPED ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/0 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303ff7adab6af58d3e77bacf024d823c0e5079e6b872ae28344ad012ab84ec1... handshake new: [194] 0303ff7adab6af58d3e77bacf024d823c0e5079e6b872ae28344ad012ab84ec1... record old: [191] 010000bb0303ff7adab6af58d3e77bacf024d823c0e5079e6b872ae28344ad01... record new: [198] 010000c20303ff7adab6af58d3e77bacf024d823c0e5079e6b872ae28344ad01... client: Filtered packet: [203] 16030100c6010000c20303ff7adab6af58d3e77bacf024d823c0e5079e6b872a... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 03025bdfb03a4beb72e2a00dde87a07cf34ad450655384b42d7c52afd035bc8c... handshake new: [124] 03025bdfb03a4beb72e2a00dde87a07cf34ad450655384b42d7c52afd035bc8c... record old: [121] 0100007503025bdfb03a4beb72e2a00dde87a07cf34ad450655384b42d7c52af... record new: [128] 0100007c03025bdfb03a4beb72e2a00dde87a07cf34ad450655384b42d7c52af... client: Filtered packet: [133] 16030100800100007c03025bdfb03a4beb72e2a00dde87a07cf34ad450655384... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/3 Version: TLS 1.0 ssl_certificate_compression_unittest.cc:930: Skipped [ SKIPPED ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/3 (0 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsSuccess/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.NoOcsp/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.NoOcsp/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotRequested/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/1 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspNotProvided/3 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspSuccess/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/0 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.OcspHugeSuccess/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/0 (17 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/1 (13 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 Version: TLS 1.1 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/2 (14 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 Version: TLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthBigRsa/3 (14 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 Version: TLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 Version: TLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 Version: TLS 1.1 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 Version: TLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaChain/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: TLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: TLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: TLS 1.1 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 Version: TLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaPssChain/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: TLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (8 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: TLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: TLS 1.1 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 Version: TLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/3 (7 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/2 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.ServerAuthRejected/3 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (23 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (41 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (77 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerAuth/3 (74 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (21 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (39 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (73 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmClientOnly/3 (73 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (22 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (39 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: TLS 1.1 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (73 ms) [ RUN ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 Version: TLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SignatureAlgorithmServerOnly/3 (73 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/1 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/2 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGeneric.AuthFailImmediate/3 (4 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (5 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (6 ms) [ RUN ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/3 (6 ms) [----------] 308 tests from GenericStream/TlsConnectGeneric (5002 ms total) [----------] 231 tests from GenericDatagram/TlsConnectGeneric [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls11/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 Version: DTLS 1.0 ssl_version_unittest.cc:42: Skipped [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.TestFallbackSCSVVersionMatch/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/0 (57 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/1 (54 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Warning alert received: 112 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlertBeforeServerHello/2 (56 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 Version: DTLS 1.3 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/0 (414 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 Version: DTLS 1.2 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/1 (414 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 Version: DTLS 1.0 Reset server:rsa8192, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBiggestRsa/2 (405 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/0 (14 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeClientBothTicketServerTicketForget/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithExpiredTicketAtServer/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/1 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ConnectResumeCorruptTicket/2 (8 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertSwitch/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/0 (15 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/1 (18 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerSNICertTypeSwitch/2 (19 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [195] 010000b700000000000000b7fefd8e4cfd9070fbceb90f04bad33d4043521f33... max: [98] 020000560000000000000056fefde4086139f806bb1b0c7b635aade8c19a728e... max: [67] 23c9dd3e8f17efb2768a6347d5093c61f220e88b69bfd21b6097a7234f64ac6c... max: [470] 40432df66b6c3466ee7397b168cbc0ba4abd46cd682dfcfde725c2d3ebc8ef37... max: [161] 64849eabc541f11ed0883bdcf4de4dcd54d2651e3902d77c1af354b569509c3b... max: [61] 99d41fc154581361d168db58c22a27f7e03a630c8559950d2e51ff744a155fbc... max: [61] 2b41d67a29aca66af859d7bd26f4333c307699d5e2ce1b5b438a98d8c2258dfc... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [35] 790920a691d0a29c77ec49fecb2d85997f48e616da3b72521fca16f3078a6c7f... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [16401] 60507a415f9a0f8066a6ce43061178957636c5b11c738e55d6e773445998ecf5... max: [18] 092a73a90be2009a204e0a29bf3328549a8f max: [16401] dba175e3cdb5ae28d3694c90b1fe8796e2c5fa84235bf410a8b7f0e8a6324b9e... max: [18] 70e376646c70ecce19ec0fa035fd744b951f client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefdf2ff49bcbc3a682bc95fdcbeb2611f631f81... max: [105] 0200005d000000000000005dfefdc497a3092a9e1afaea81a7af8ec5a4b89551... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20c835719b76571d32aa6707c3137a1a86... max: [12] 0e0000000003000000000000 max: [45] 10000021000100000000002120c0e6ea194c62c3322ae1c6d47bc5933c75a5f0... max: [1] 01 max: [48] 0001000000000000958499068dca0d3175f13f98272db772473b13fce3420754... max: [1] 01 max: [48] 0001000000000000f6df710296f5a8c637d2cfdf56513d58c6a4c25da39bec8f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [16408] 000100000000000112a7502acc621b19e81a830fbcd31ba97b9e7faa152e46e8... max: [25] 00010000000000022a5d549301565b73d796b6d3d0a1ea3093 max: [16408] 00010000000000012be0e01f545f1b6f139cf9a391c4b10bc9c4c30e8971e5f5... max: [25] 0001000000000002a00003d088d183c64c62a8a05e8b9bf1f3 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff04df01dc1c256321235d611286f88e8e5e4e... max: [105] 0200005d000000000000005dfeff1ec904fa169eed17ca3d9d8c2fabf48c7dfc... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20c96011f4f3c76558c00dac2957da4f71... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021207894d54d9fe54ab704394eca36a3610d3828d0... max: [1] 01 max: [64] 7bc521588535dd00a3b3a08dc450c11d0aa985ec98d9f00600f0b9ff9591e489... max: [1] 01 max: [64] f18e22410f9274d9c58b9d741dc6731de25787367e1cdcc629f3ec1084cc6d13... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [16432] 65343ced190c496c632a77d6f08041110612ee6a903347bab5e6d8ff3034a758... max: [48] 458016c8ef7c745a219e2dad647a7b375c46d2155085ccd218dfdbc5a4cac347... max: [16432] d177f4a639a4e8f329e89ca1b5b33223fad530b45bc01dfc8ce48133a8e8d0e4... max: [48] 012a6a1f8c5dafc2b212185f0d6722ce4f9cec513e7825205a002d2e41cf31e9... client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMaximum/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [98] 020000560000000000000056fefd21ce5c64e1291958cc8f49a418f3100669d8... max: [67] 6244ca3dbfecfbaf44dbddd4cec058468ee4a38c87f3494c960734837ea357f8... max: [80] 3f32e6dff01e0b6831f34b47dbdaf7c953d530e122413bca35de94cc10a7cbcd... max: [80] 95da3c96e2f974c5e589679c6231ba7bd1225122ec9f30e1bb67d160788726a7... max: [80] a9f5fc48a0b870070e05247caf1d372aa163e8e875ababa70e99ccffef883e21... max: [80] af057827c096b39c52a169f8974a2beb336c3fdec3c005a0dcd1dd41b2373175... max: [80] 66163ab7caf96d51c6ae1b2005c2d177d1a0812e277d12ff110f3951ed6e99fb... max: [80] 8efdb1125ca0eb5b9e0288aa6a5d255f3931ee56dc784346d519782fbcef59b9... max: [80] adcd99a62d8bd5c9609ca5fb80c37dd61d850a9f06e1f1bf4477d8687ee9fe3c... max: [80] 921f408e760e8dcf690c828fb11576630b8b26e91db66adb888f8edba2346a53... max: [62] ed1837cc1775e7be91ad535f106dec1abceac4b63e5d1dce36f1785c6af9b6c7... max: [80] 1380e91e917c64b4e797b671865e7ce9dd312712ed87d887d367ddf50b6aad46... max: [80] b0ce7bd6ea69aea7f6c22c18ddcf07c7c7a09076b76627fabe8ab5ef64314ae0... max: [59] 35b471fd87fd9bdff91edd0c70bde8b5b47252174fb7fa7754488f3e9f48db63... max: [61] 1d23ed4b5d633a5f4cddcb099fdf9d90d26008bad58cfbaf0c1d74bbdefd9bf1... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [35] 601646f0df87a888d8d1258fda917079a9dba388249d54eaf1539845ebc8ac7c... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] a3a5ebaa64ea580ae015f33a3819c74cb62325c8921a13413058c27e0d2a0a30... max: [80] 3da7181594f78f1c991ab86a06e6e7222ea6a0be444a5f01bd40ee3922efbfee... max: [18] 563c55b014d45cb7e5721ba62fea0e7648bb client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfefdc5572cd76e4466b04417662bf0da5408e5c5... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20fb38cb253fa9bd0cdbc1fc5c28d35461... max: [12] 0e0000000003000000000000 max: [1] 01 max: [48] 0001000000000000a3143220e3dea43e099e2765e23df637f67b78bd913ed39f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0001000000000001be2a1d607c2f1aef10aeb55027a76e171fb79022fbd50530... max: [87] 0001000000000002579b2e5c35b2326725e9cd217c3860e021e24473a9f4db62... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [105] 0200005d000000000000005dfeff35624da73cc72eb201153dfcc5d8a2d47c93... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d20e855b7ad395d9afe3b56cb0e29ca99f9... max: [12] 0e0000000003000000000000 max: [1] 01 max: [64] d242ee9b5b77221f6cd202d58897ce7d016bad8a1f20f78d10beb60d5dac898b... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] b7284511eea7674d912ed58cd7478708f987618e3ac62e3153b2a2ca379a6bfc... max: [112] 6e108323bbc2a77f2d2e156aa5a3fc6e59dd0ed125c516d0703a3b97b58bff57... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumClient/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [195] 010000b700000000000000b7fefd514df1463033025f45df4eb0b35a1e32fd21... max: [61] 47700f10dabab693f698ad452a5b25581ce716eb432df2605d252381a086d446... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [80] b1c72690075d461ca3577a423eb2578e15ebf29824b07073267b3599909f71f2... max: [80] ada4438b8dfffe7c679de3042b919d3ed2597bf7d7c2e4cc2618e79d8c81a970... max: [18] 6428925682cc797ec1b6e7304a02f5338503 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd4392006f421b2b8b8863b3ce223ae00a3aa1... max: [45] 10000021000100000000002120efefa0380b72e12b821e8d6bb36fcf9996b223... max: [1] 01 max: [48] 00010000000000001faf32874cb9244d89213739109e705cb57aa2ed0b9f83d6... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [88] 0001000000000001a9fad2c4e5df3bd0be1ec2c5077ad8c589dc36f29b4a973a... max: [87] 000100000000000235939bec0e1fbcd6ae487f7fb48ace0059b275e471892dba... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff745936eac53a6d2ee411b76af02f26bd3856... max: [45] 10000021000100000000002120998d59ad95b4babf541e07183200ea26100caf... max: [1] 01 max: [64] 1221db7496dd8521dce9940509f2ddcf4e4418fbd6e345bd7c8647dcf77577ae... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [112] 45f0d8e8e2515daa3fb28b522cd89dbbe83578e3a23750b4e0433e1df6c04a19... max: [112] 0f390b48986fdcfd79e6c9652143a46ad3053024fa478465fd009b4501b6c4c8... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeMinimumServer/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [195] 010000b700000000000000b7fefd1cbd87347c0ad4280b7c31f75b1ae75cd22f... max: [98] 020000560000000000000056fefd72f328081c07c354e35f5169a62a2f6e61e3... max: [67] ff043dc5ee9f6c57bf068ee6dd8a4d442ce790ba2e7ab99c010172941466b413... max: [80] c72aaad77ff5e7c9c71b486009364893964766408849fd0cba37d9fdba8788a0... max: [80] 10a2056cd650c3a9434b5dcc6609be39173bff2ef9e5cf8082354c9e93efa50f... max: [80] 4e2c2bbba5f0352f16968b57d0b689f12e680f368e92e26d6004ce17cde9011e... max: [80] 04713801443c902278a11accf2aea1e85fe9dc0215c0c3199a234e4ba2d0d68d... max: [80] 9dd4c5f1b1ecfc3fac2d79056674208565f02ab2cb6e568dda2d3480e6fc2aac... max: [80] ebcce45a723c067d3f47dd863f7a5a09c4897f7e2e12de6ae3d28e9b25482a2e... max: [80] 5068bae18df6878b15155024c7784622598ad00cb0ef2ca88791906e81ddc9c1... max: [80] 2a494651056d6167c8c3220c2b5ceed671ee7afbb31d52524dcb7533e629fee9... max: [62] 940a08bd907c434739f4f492204d98a1f768929ee019326b98359c04fa4d3c10... max: [80] 2be43f9e591107e05964bc9b80b62e228e1da91542b62e0b339f4fedbd3710f2... max: [80] 0a68c82409ef9f5922c2e956b1afbeccfd71a4644b4e1422d1743ad757ba828a... max: [59] 8b62863b3c7fabd56c23991f7d190dcfe4b8636de086220986f50d64b1bffa49... max: [61] a9fb6a359047788cf3e77b3449c5738b0e8a95be79f0eab4756163c1c432d75f... max: [61] cd6c01a31597c7a5a8297ab630fe96d19d1aaaa5a3c94cc40730357ae7a02a60... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED max: [35] 5c8d6e17405b900c737815721e5918dc61e24e63465c8f83859c7108a838f3b7... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 max: [116] d7059dcfb85beb8536313cc3760f2384081270679f928b538327c59895e33b3a... max: [45] 795395ee67248429a86cb6144c90ae43e2d33e518fdb3d95bc3ae70f0fc2ba04... max: [80] c5605dbfcd88380b62b606d2bea4d9a05f50c1fdd64eb128a041028f16f9066c... max: [80] b7731daeb7a21507e47cc66f992be883b0869b159fb1d84d86224798f59d778e... max: [18] 7492c12ed33660310191e7b927629bf63d70 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [196] 010000b800000000000000b8fefd6af9a6004e9b6e895def4fed96a6fa9b4a71... max: [105] 0200005d000000000000005dfefd4b61dbdc49639e45c7655e42fcd2e8476fe2... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [180] 0c0000a800020000000000a803001d20070ec463f7f18b36e259b2031a3667c2... max: [12] 0e0000000003000000000000 max: [45] 1000002100010000000000212068d819f8f9455972ae7b868dedd03d080fa0d8... max: [1] 01 max: [48] 00010000000000006f9d51dedf4fedc6493b80575ca612516e5afdbdfb5cba03... max: [1] 01 max: [48] 00010000000000009cd7a9cd38c7f3e4d63a74cbfb9da6d2b38b434773cf75cc... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 max: [124] 0001000000000001c3467c8b9927f5228b1c905ccff06c287ad79b56debb1bac... max: [51] 0001000000000002009b2113db070f83286ab7f6d5aed95f688edf5cf401fb22... max: [88] 0001000000000001523864a08736dd37dcf4055fa1fc8f78804b9070076d16df... max: [87] 0001000000000002297ebfb030a14816e6662bd40c448152c54fe6355baa577b... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING max: [126] 010000720000000000000072feff0d047b2207b068e028eba1000d54407c1d0e... max: [105] 0200005d000000000000005dfeffe12d05f90d7399a4c2316699e5b6ee987566... max: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... max: [178] 0c0000a600020000000000a603001d202098547cdfcbf51ee9e05da26d942a6d... max: [12] 0e0000000003000000000000 max: [45] 100000210001000000000021205d1d616b76314bacebc997d5b43fd5ca46b13f... max: [1] 01 max: [64] 707711f4355ff7cd167344862322790e15abc8eedce4b42564fd3a49a80de0c9... max: [1] 01 max: [64] 50b848398b5ea7049c24733a4253a03d9936ddb7964a0fa8e3e8fa13d85a4e25... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA max: [144] d87bfd141a2c14205e3fb11b47d23cf901f383f0824446a32184fe38f36bb598... max: [64] b50d5a09cd03fc9d783eabedb9a077263b602384f975395cff29da3dddd4d1d8... max: [112] c5a10a23641670db4f673c969228674cf64c2212132e62aa59bf5dea88696385... max: [112] eed3e817e628b843e74776bf1c9e4f1494a38c6c93d8906a1489d91b6bf3ee50... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeAsymmetric/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeBadValues/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeGetValues/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionClient/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeCapExtensionServer/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... record old: [50] 0800002600010000000000260024000a00160014001d00170018001963990100... record new: [50] 0800002600010000000000260024000a00160014001d00170018001963990100... server: Filtered packet: [890] 16fefd00000000000000000062020000560000000000000056fefde621fbc0d4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] fefda26f91a8a5ca1d7a91e665951ff5b5706bdd02172f072db00ee31abb6743... handshake new: [93] fefda26f91a8a5ca1d7a91e665951ff5b5706bdd02172f072db00ee31abb6743... record old: [105] 0200005d000000000000005dfefda26f91a8a5ca1d7a91e665951ff5b5706bdd... record new: [105] 0200005d000000000000005dfefda26f91a8a5ca1d7a91e665951ff5b5706bdd... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefda26f91a8a5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [93] feffec14f4fae2c3b823f792951b41e30176a091b0591a576c3c491934e0f3bf... handshake new: [93] feffec14f4fae2c3b823f792951b41e30176a091b0591a576c3c491934e0f3bf... record old: [105] 0200005d000000000000005dfeffec14f4fae2c3b823f792951b41e30176a091... record new: [105] 0200005d000000000000005dfeffec14f4fae2c3b823f792951b41e30176a091... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfeffec14f4fae2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionInvalid/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [39] 0025000a00160014001d001700180019639901000101010201030104001c0003... record old: [50] 0800002600010000000000260024000a00160014001d00170018001963990100... record new: [51] 0800002700010000000000270025000a00160014001d00170018001963990100... server: Filtered packet: [891] 16fefd00000000000000000062020000560000000000000056fefdfa307a65ee... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] fefd2a840234d62304e80e7f8a0d430645783fece22e84828108aa1260ad2b54... handshake new: [94] fefd2a840234d62304e80e7f8a0d430645783fece22e84828108aa1260ad2b54... record old: [105] 0200005d000000000000005dfefd2a840234d62304e80e7f8a0d430645783fec... record new: [106] 0200005e000000000000005efefd2a840234d62304e80e7f8a0d430645783fec... server: Filtered packet: [800] 16fefd0000000000000000006a0200005e000000000000005efefd2a840234d6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [3] 010000 handshake old: [93] feff0aa801ead8c97fbf78fd566bce5575ae05858cc5c94dd9f3d91e9e810194... handshake new: [94] feff0aa801ead8c97fbf78fd566bce5575ae05858cc5c94dd9f3d91e9e810194... record old: [105] 0200005d000000000000005dfeff0aa801ead8c97fbf78fd566bce5575ae0585... record new: [106] 0200005e000000000000005efeff0aa801ead8c97fbf78fd566bce5575ae0585... server: Filtered packet: [798] 16feff0000000000000000006a0200005e000000000000005efeff0aa801ead8... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeServerExtensionExtra/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordGatherOverlong/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [257] 64f0b3037900fbf14410c7285996fdd173ab3c751276e41655b871f50a163ca4... record new: [16641] 64f0b3037900fbf14410c7285996fdd173ab3c751276e41655b871f50a163ca4... server: Filtered packet: [16646] 2f0000410164f0b3037900fbf14410c7285996fdd173ab3c751276e41655b871... client: Read error PR_BUFFER_OVERFLOW_ERROR: The value requested is too large to be stored in the data buffer provided client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordGatherOverlong/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordGatherOverlong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [264] 000100000000000115ed37bdfde4fb0f3d75ebcbf46bf487b2d51d079541112f... record new: [18433] 000100000000000115ed37bdfde4fb0f3d75ebcbf46bf487b2d51d079541112f... server: Filtered packet: [18446] 17fefd00010000000000004801000100000000000115ed37bdfde4fb0f3d75eb... client: Read error PR_BUFFER_OVERFLOW_ERROR: The value requested is too large to be stored in the data buffer provided client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordGatherOverlong/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordGatherOverlong/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [288] 78df6179b8e2a905f7382388dff0d78e9cc55ae06d6e1d3664bef6cb532a38c2... record new: [18433] 78df6179b8e2a905f7382388dff0d78e9cc55ae06d6e1d3664bef6cb532a38c2... server: Filtered packet: [18446] 17feff0001000000000000480178df6179b8e2a905f7382388dff0d78e9cc55a... client: Read error PR_BUFFER_OVERFLOW_ERROR: The value requested is too large to be stored in the data buffer provided client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordGatherOverlong/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeExtensionOverlong/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [32] 05881745da465ee60f738bebc9110e18ecbf4ed1ce122436a7308922f378b9bb record new: [1256] 05881745da465ee60f738bebc9110e18ecbf4ed1ce122436a7308922f378b9bb... server: Filtered packet: [1261] 2f000004e805881745da465ee60f738bebc9110e18ecbf4ed1ce122436a73089... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeExtensionOverlong/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeExtensionOverlong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [39] 00010000000000017a0fa7a5c29b7358c5f79f9992dc92ad747e61af66148806... record new: [3049] 00010000000000017a0fa7a5c29b7358c5f79f9992dc92ad747e61af66148806... server: Filtered packet: [3062] 17fefd00010000000000000be900010000000000017a0fa7a5c29b7358c5f79f... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeExtensionOverlong/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeExtensionOverlong/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [64] 7eeacae4ae939bcd41a4110df974d57e4e0e6223b3e327987bd1b216428ec872... record new: [3049] 7eeacae4ae939bcd41a4110df974d57e4e0e6223b3e327987bd1b216428ec872... server: Filtered packet: [3062] 17feff00010000000000000be97eeacae4ae939bcd41a4110df974d57e4e0e62... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeExtensionOverlong/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordExpansionOverlong/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 record old: [32] 82c2340a5c3aa7ba97325e517d6728917dcd3045fe770998428a0132c8134732 record new: [1017] 82c2340a5c3aa7ba97325e517d6728917dcd3045fe770998428a0132c8134732... server: Filtered packet: [1022] 2f000003f982c2340a5c3aa7ba97325e517d6728917dcd3045fe770998428a01... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordExpansionOverlong/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordExpansionOverlong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 record old: [39] 00010000000000014fb8564ec23d218f8641d531d1f7c92377ba4bc4cedf8738... record new: [1321] 00010000000000014fb8564ec23d218f8641d531d1f7c92377ba4bc4cedf8738... server: Filtered packet: [1334] 17fefd0001000000000000052900010000000000014fb8564ec23d218f8641d5... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordExpansionOverlong/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordExpansionOverlong/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA record old: [64] 323366243fe22ff1858f37c09c814a27e3f75a637a008f643c6e09675ceda03a... record new: [1321] 323366243fe22ff1858f37c09c814a27e3f75a637a008f643c6e09675ceda03a... server: Filtered packet: [1334] 17feff00010000000000000529323366243fe22ff1858f37c09c814a27e3f75a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordExpansionOverlong/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeDefaultLong/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeDefaultLong/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeDefaultLong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeDefaultLong/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeDefaultLong/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeDefaultLong/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeLimitLong/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeLimitLong/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeLimitLong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeLimitLong/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.RecordSizeLimitLong/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.RecordSizeLimitLong/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 Version: DTLS 1.3 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/0 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 Version: DTLS 1.2 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/1 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 Version: DTLS 1.0 [ OK ] GenericDatagram/TlsConnectGeneric.SetupOnly/2 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Connect/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Connect/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/1 (10 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdsa/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CipherSuiteMismatch/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [183] fefdb41531e42fc9ca536479fe31f09d10f568bfa01a27acbdf73b0b2032a4c7... handshake new: [182] fefdb41531e42fc9ca536479fe31f09d10f568bfa01a27acbdf73b0b2032a4c7... record old: [195] 010000b700000000000000b7fefdb41531e42fc9ca536479fe31f09d10f568bf... record new: [194] 010000b600000000000000b6fefdb41531e42fc9ca536479fe31f09d10f568bf... client: Filtered packet: [207] 16feff000000000000000000c2010000b600000000000000b6fefdb41531e42f... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/0 (3 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd467d7bc8b0fb22ad05926dd4fb096b5f01b7b0d05eb82c2847079000ea24... handshake new: [183] fefd467d7bc8b0fb22ad05926dd4fb096b5f01b7b0d05eb82c2847079000ea24... record old: [196] 010000b800000000000000b8fefd467d7bc8b0fb22ad05926dd4fb096b5f01b7... record new: [195] 010000b700000000000000b7fefd467d7bc8b0fb22ad05926dd4fb096b5f01b7... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd467d7bc8b0... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feffe3bcf3e91b92a67381f2816386edd110e888c7937cf13dcc4d9e83e6c20f... handshake new: [113] feffe3bcf3e91b92a67381f2816386edd110e888c7937cf13dcc4d9e83e6c20f... record old: [126] 010000720000000000000072feffe3bcf3e91b92a67381f2816386edd110e888... record new: [125] 010000710000000000000071feffe3bcf3e91b92a67381f2816386edd110e888... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feffe3bcf3e91b... Alert: [2] 0232 server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CaptureAlertServer/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpn/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityA/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnPriorityB/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnClone/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackA/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackB/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectAlpnWithCustomCallbackC/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectSendReceive/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectWithCompressionEnabled/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/0 (11 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.CheckRandoms/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSide/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA [ OK ] GenericDatagram/TlsConnectGeneric.ShutdownOneSideThenCloseTcp/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlpnDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlpnDisabled/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlpnDisabled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlpnDisabled/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AlpnDisabled/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.AlpnDisabled/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientHelloExtensionPermutation/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientHelloExtensionPermutation/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientHelloExtensionPermutation/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientHelloExtensionPermutation/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientHelloExtensionPermutation/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientHelloExtensionPermutation/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterBasic/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ExporterContext/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdhe/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/0 (42 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/1 (41 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Client/2 (40 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/0 (42 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/1 (41 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/2 (43 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/0 (42 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/1 (41 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheP384Server/2 (42 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/0 (25 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/1 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectEcdheGroupMismatch/2 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/0 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/1 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.P256ClientAndCurve25519Server/2 (2 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/0 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/1 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectDhe/2 (21 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/0 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/1 (21 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ConnectFfdheClient/2 (21 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/0 (48 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/1 (21 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.Ffdhe3072/2 (23 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400807c6164b9455a00eb26b8cc9db2efab6867ab608c2e3b8374685700fb... handshake new: [132] 080400807c6164b9455a00eb26b8cc9db2efab6867ab608c2e3b8374685700fb... record old: [144] 0f0000840002000000000084080400807c6164b9455a00eb26b8cc9db2efab68... record new: [144] 0f0000840002000000000084080400807c6164b9455a00eb26b8cc9db2efab68... client: Filtered packet: [713] 2e34c001dc86ed9f02e4ba2de0cd30b35766ab09f341c950b57b03063b2b9a49... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 020100807b0ca0a9e2c0caf78853671fca10704e003ec795a0ba2704337369a6... handshake new: [132] 020100807b0ca0a9e2c0caf78853671fca10704e003ec795a0ba2704337369a6... record old: [144] 0f0000840003000000000084020100807b0ca0a9e2c0caf78853671fca10704e... record new: [144] 0f0000840003000000000084020100807b0ca0a9e2c0caf78853671fca10704e... client: Filtered packet: [759] 16fefd000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080358f60ed2a7cdd22801afdd4594188c4b97cb2d5d82b239f27304572b8a2... handshake new: [130] 0080358f60ed2a7cdd22801afdd4594188c4b97cb2d5d82b239f27304572b8a2... record old: [142] 0f00008200030000000000820080358f60ed2a7cdd22801afdd4594188c4b97c... record new: [142] 0f00008200030000000000820080358f60ed2a7cdd22801afdd4594188c4b97c... client: Filtered packet: [773] 16feff000000000000000101c80b0001bc00010000000001bc0001b90001b630... server: Fatal alert sent: 51 server: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.DamageClientSignature/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/0 Version: DTLS 1.3 ssl_certificate_compression_unittest.cc:929: Skipped [ SKIPPED ] GenericDatagram/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/0 (0 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd29d3aaa6dd7298f69d80ed54446a6e7cb5c123d525e89b6adcb2a6f94ee5... handshake new: [191] fefd29d3aaa6dd7298f69d80ed54446a6e7cb5c123d525e89b6adcb2a6f94ee5... record old: [196] 010000b800000000000000b8fefd29d3aaa6dd7298f69d80ed54446a6e7cb5c1... record new: [203] 010000bf00000000000000bffefd29d3aaa6dd7298f69d80ed54446a6e7cb5c1... client: Filtered packet: [216] 16feff000000000000000000cb010000bf00000000000000bffefd29d3aaa6dd... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feffa70a7ac675d00046993e85e98ed152640522c5846b7f021f10d7b4377925... handshake new: [121] feffa70a7ac675d00046993e85e98ed152640522c5846b7f021f10d7b4377925... record old: [126] 010000720000000000000072feffa70a7ac675d00046993e85e98ed152640522... record new: [133] 010000790000000000000079feffa70a7ac675d00046993e85e98ed152640522... client: Filtered packet: [146] 16feff00000000000000000085010000790000000000000079feffa70a7ac675... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsSuccess/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveClient/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveServer/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignedCertificateTimestampsInactiveBoth/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.NoOcsp/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotRequested/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspNotProvided/2 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspSuccess/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/1 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.OcspHugeSuccess/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 Version: DTLS 1.0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthBigRsa/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 Version: DTLS 1.3 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 Version: DTLS 1.2 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 Version: DTLS 1.0 Reset server:rsa_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaChain/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_pss_chain CN=rsa_pss_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaPssChain/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 Version: DTLS 1.3 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/0 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 Version: DTLS 1.2 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/1 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 Version: DTLS 1.0 Reset server:rsa_ca_rsa_pss_chain, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA CN=rsa_ca_rsa_pss_chain CN=rsa_ca client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRsaCARsaPssChain/2 (7 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.ServerAuthRejected/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/0 (23 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/1 (40 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerAuth/2 (76 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/0 (23 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/1 (40 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmClientOnly/2 (75 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/0 (22 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/1 (40 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 Version: DTLS 1.0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SignatureAlgorithmServerOnly/2 (74 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/1 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_BAD_CERTIFICATE: Unable to communicate securely with peer: peers's certificate was rejected. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 42 server: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. server: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGeneric.AuthFailImmediate/2 (4 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/0 (6 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/1 (5 ms) [ RUN ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGeneric.SuppressEndOfEarlyDataNoZeroRtt/2 (5 ms) [----------] 231 tests from GenericDatagram/TlsConnectGeneric (3846 ms total) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/0 (5 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 Version: TLS 1.3 ssl_version_unittest.cc:145: Skipped [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 (0 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/2 (5 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/3 (5 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/4 (6 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/5 (6 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/6 (6 ms) [ RUN ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/7 (5 ms) [----------] 8 tests from TlsDowngradeSentinelTest/TlsDowngradeTest (42 ms total) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Read error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Read error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Read error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSA/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 0200005703011ae744c7ddf77c41b7eee162a48a23c1ed4e1bd52df25312db90... record new: [2510] 0200005703011ae744c7ddf77c41b7eee162a48a23c1ed4e1bd52df25312db90... server: Filtered packet: [2515] 16030109ce0200005703011ae744c7ddf77c41b7eee162a48a23c1ed4e1bd52d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 0200005703029ad46a85bcea308f360bb46a52e1327bc4bbfe6772ce37115e69... record new: [2510] 0200005703029ad46a85bcea308f360bb46a52e1327bc4bbfe6772ce37115e69... server: Filtered packet: [2515] 16030209ce0200005703029ad46a85bcea308f360bb46a52e1327bc4bbfe6772... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [537] 020000570303af798865874a3ccfcb0edb5bda675948faba2c863bfd27ff9eb8... record new: [2510] 020000570303af798865874a3ccfcb0edb5bda675948faba2c863bfd27ff9eb8... server: Filtered packet: [2515] 16030309ce020000570303af798865874a3ccfcb0edb5bda675948faba2c863b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooLargeRSAKeyInCert/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectResumed/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/2 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/2 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/2 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/2 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/2 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: TLS 1.0 ssl_resumption_unittest.cc:739: Skipped [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 03029def59552288216eabe30a2f50b1519017611db3b1ed1aa37b758f8e53a7... handshake new: [89] 03019def59552288216eabe30a2f50b1519017611db3b1ed1aa37b758f8e53a7... record old: [93] 0200005903029def59552288216eabe30a2f50b1519017611db3b1ed1aa37b75... record new: [93] 0200005903019def59552288216eabe30a2f50b1519017611db3b1ed1aa37b75... server: Filtered packet: [173] 160302005d0200005903019def59552288216eabe30a2f50b1519017611db3b1... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] 0303592249769cbd18f028b192ebb918a3be4b45d4683309ddd67b47d72a1d82... handshake new: [89] 0302592249769cbd18f028b192ebb918a3be4b45d4683309ddd67b47d72a1d82... record old: [93] 020000590303592249769cbd18f028b192ebb918a3be4b45d4683309ddd67b47... record new: [93] 020000590302592249769cbd18f028b192ebb918a3be4b45d4683309ddd67b47... server: Filtered packet: [173] 160303005d020000590302592249769cbd18f028b192ebb918a3be4b45d46833... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ReConnectCache/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 03018973a746d181b89d9e78c94e5bab28d784eb1d8135f820b23708f43b8d8e... handshake new: [117] 03018973a746d181b89d9e78c94e5bab28d784eb1d8135f820b23708f43b8d8e... record old: [121] 0100007503018973a746d181b89d9e78c94e5bab28d784eb1d8135f820b23708... record new: [121] 0100007503018973a746d181b89d9e78c94e5bab28d784eb1d8135f820b23708... client: Filtered packet: [126] 16030100790100007503018973a746d181b89d9e78c94e5bab28d784eb1d8135... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [117] 03020242f59c9c87747b121325530831dbbb13f60df7622107b3d9b2a206a78e... handshake new: [117] 03020242f59c9c87747b121325530831dbbb13f60df7622107b3d9b2a206a78e... record old: [121] 0100007503020242f59c9c87747b121325530831dbbb13f60df7622107b3d9b2... record new: [121] 0100007503020242f59c9c87747b121325530831dbbb13f60df7622107b3d9b2... client: Filtered packet: [126] 16030100790100007503020242f59c9c87747b121325530831dbbb13f60df762... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [187] 03036c4ea95b11549ff75fd07624ea45e4053898a75f761768dc1524f3df2c2a... handshake new: [187] 03036c4ea95b11549ff75fd07624ea45e4053898a75f761768dc1524f3df2c2a... record old: [191] 010000bb03036c4ea95b11549ff75fd07624ea45e4053898a75f761768dc1524... record new: [191] 010000bb03036c4ea95b11549ff75fd07624ea45e4053898a75f761768dc1524... client: Filtered packet: [196] 16030100bf010000bb03036c4ea95b11549ff75fd07624ea45e4053898a75f76... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030148c7bb58a7dc08d402c37cacb9b4d5dda19e873c56b1e4a752c433e568da... handshake new: [92] 030148c7bb58a7dc08d402c37cacb9b4d5dda19e873c56b1e4a752c433e568da... record old: [713] 0200005d030148c7bb58a7dc08d402c37cacb9b4d5dda19e873c56b1e4a752c4... record new: [712] 0200005c030148c7bb58a7dc08d402c37cacb9b4d5dda19e873c56b1e4a752c4... server: Filtered packet: [717] 16030102c80200005c030148c7bb58a7dc08d402c37cacb9b4d5dda19e873c56... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0302e14057cc239de0bbafaca550dbe44ae78e6484f3318ce97ac21d0d390757... handshake new: [92] 0302e14057cc239de0bbafaca550dbe44ae78e6484f3318ce97ac21d0d390757... record old: [713] 0200005d0302e14057cc239de0bbafaca550dbe44ae78e6484f3318ce97ac21d... record new: [712] 0200005c0302e14057cc239de0bbafaca550dbe44ae78e6484f3318ce97ac21d... server: Filtered packet: [717] 16030202c80200005c0302e14057cc239de0bbafaca550dbe44ae78e6484f331... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03032a2363e96baa02af6c3840265b42e5d5b853b149784e02ff6082a732e8c7... handshake new: [92] 03032a2363e96baa02af6c3840265b42e5d5b853b149784e02ff6082a732e8c7... record old: [715] 0200005d03032a2363e96baa02af6c3840265b42e5d5b853b149784e02ff6082... record new: [714] 0200005c03032a2363e96baa02af6c3840265b42e5d5b853b149784e02ff6082... server: Filtered packet: [719] 16030302ca0200005c03032a2363e96baa02af6c3840265b42e5d5b853b14978... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.CaptureAlertClient/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFalseStart/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ExporterContextLengthTooLong/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecret/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/2 (8 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/2 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/0 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/1 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdh/2 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: TLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: TLS 1.1 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 Version: TLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/2 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/0 (43 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/1 (42 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityOnServer/2 (41 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (42 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (42 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.P384PriorityFromModelSocket/2 (43 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0301d3df5abc38af3570f60dc30dac8ac901ea783c3ca7516a0ef977beaba0d6... handshake new: [103] 0301d3df5abc38af3570f60dc30dac8ac901ea783c3ca7516a0ef977beaba0d6... record old: [121] 010000750301d3df5abc38af3570f60dc30dac8ac901ea783c3ca7516a0ef977... record new: [107] 010000670301d3df5abc38af3570f60dc30dac8ac901ea783c3ca7516a0ef977... client: Filtered packet: [112] 160301006b010000670301d3df5abc38af3570f60dc30dac8ac901ea783c3ca7... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 03024f88bd3f7d97502289075784e8eca0054b6013a0da06e177263619d5127f... handshake new: [103] 03024f88bd3f7d97502289075784e8eca0054b6013a0da06e177263619d5127f... record old: [121] 0100007503024f88bd3f7d97502289075784e8eca0054b6013a0da06e1772636... record new: [107] 0100006703024f88bd3f7d97502289075784e8eca0054b6013a0da06e1772636... client: Filtered packet: [112] 160301006b0100006703024f88bd3f7d97502289075784e8eca0054b6013a0da... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 030381b731aa68414be5605128f48b96f47f7e433a3e605014c82fa3e4259254... handshake new: [173] 030381b731aa68414be5605128f48b96f47f7e433a3e605014c82fa3e4259254... record old: [191] 010000bb030381b731aa68414be5605128f48b96f47f7e433a3e605014c82fa3... record new: [177] 010000ad030381b731aa68414be5605128f48b96f47f7e433a3e605014c82fa3... client: Filtered packet: [182] 16030100b1010000ad030381b731aa68414be5605128f48b96f47f7e433a3e60... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/2 (12 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.UseLameGroup/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.GroupPreferenceServerPriority/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20ec0ff27e1d573d4ae2f53c2a3e789a3168d336182a62e929173c89bf... handshake new: [4] 03001d00 record old: [713] 0200005d0301ca06e7534356af9428ca37ecbb07ffbbfd4497980320db99c7e0... record new: [551] 0200005d0301ca06e7534356af9428ca37ecbb07ffbbfd4497980320db99c7e0... server: Filtered packet: [556] 16030102270200005d0301ca06e7534356af9428ca37ecbb07ffbbfd44979803... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d207e2c4d74ee776cf08489741549700818ea1226e27e38e7f5b23e99ae... handshake new: [4] 03001d00 record old: [713] 0200005d0302fba828d3e4ca41b3b30fbcb0322fc639142b8f539783b8f7b80c... record new: [551] 0200005d0302fba828d3e4ca41b3b30fbcb0322fc639142b8f539783b8f7b80c... server: Filtered packet: [556] 16030202270200005d0302fba828d3e4ca41b3b30fbcb0322fc639142b8f5397... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20a8006ddefd813489fcdb4bd17d1bfd34a5214136687fce83e080f557... handshake new: [4] 03001d00 record old: [715] 0200005d03032a4684fc851ba382f46e359c2cca77bbd8af77b345aa9afd26ec... record new: [551] 0200005d03032a4684fc851ba382f46e359c2cca77bbd8af77b345aa9afd26ec... server: Filtered packet: [556] 16030302270200005d03032a4684fc851ba382f46e359c2cca77bbd8af77b345... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20053b2fda6a9df5793684245a67239638296d7eda42a98b902dd7e365ab5604... handshake new: [1] 00 record old: [37] 1000002120053b2fda6a9df5793684245a67239638296d7eda42a98b902dd7e3... record new: [5] 1000000100 client: Filtered packet: [69] 1603010005100000010014030100010116030100300579b67577a2c199cdda47... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 20f5718fbad4abbf428cc5289c0a4358dce7251fd3f2cf67f0c36fb0de753f55... handshake new: [1] 00 record old: [37] 1000002120f5718fbad4abbf428cc5289c0a4358dce7251fd3f2cf67f0c36fb0... record new: [5] 1000000100 client: Filtered packet: [85] 160302000510000001001403020001011603020040bbf1f58bf38b629a48d0a8... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 2021b07e0b0bc075abeb72538eac9e18a879a6164de9cf89d3e9c5c7959d6ecf... handshake new: [1] 00 record old: [37] 100000212021b07e0b0bc075abeb72538eac9e18a879a6164de9cf89d3e9c5c7... record new: [5] 1000000100 client: Filtered packet: [61] 1603030005100000010014030300010116030300280000000000000000a71a3c... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20aa18ac0577a3dc6cd56f88825d130a665b560c541c0a3d1830635431... handshake new: [5] 0100010102 record old: [713] 0200005d0301273d590d4e7aea013f1762c53d00c413de8d4c3fedabe8988259... record new: [552] 0200005d0301273d590d4e7aea013f1762c53d00c413de8d4c3fedabe8988259... server: Filtered packet: [557] 16030102280200005d0301273d590d4e7aea013f1762c53d00c413de8d4c3fed... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20b9cf465d056b4a61c83d526e56eea2960db1327e0c8fc5f21ecd690d... handshake new: [5] 0100010102 record old: [713] 0200005d0302adb1084e1f52b1135bcd91df039c01e1ce723074a36018a2015c... record new: [552] 0200005d0302adb1084e1f52b1135bcd91df039c01e1ce723074a36018a2015c... server: Filtered packet: [557] 16030202280200005d0302adb1084e1f52b1135bcd91df039c01e1ce723074a3... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d209774c53f7638702901fd0c83268ed1abe6818e4fb4f5285d354ef95e... handshake new: [5] 0100010102 record old: [715] 0200005d0303b4e717309681e302992ec30ea374683e23f8847d75a8064ef33e... record new: [552] 0200005d0303b4e717309681e302992ec30ea374683e23f8847d75a8064ef33e... server: Filtered packet: [557] 16030302280200005d0303b4e717309681e302992ec30ea374683e23f8847d75... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurveType/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d2077c1c472ac1739ff1ee7fa32ce4d4b84666154220530f439fcefc8e5... handshake new: [5] 0301000102 record old: [713] 0200005d0301fcb5290d365e6cadc04001687b89d905fc4ed66d7cb858730bb8... record new: [552] 0200005d0301fcb5290d365e6cadc04001687b89d905fc4ed66d7cb858730bb8... server: Filtered packet: [557] 16030102280200005d0301fcb5290d365e6cadc04001687b89d905fc4ed66d7c... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d2057cf02287a9e5e511b498632ca2b72c71a7c795bb84cb8ac71640a55... handshake new: [5] 0301000102 record old: [713] 0200005d030293b256aefd244f12e7c5b3357081b819bfbe54ca1215c2ce76ec... record new: [552] 0200005d030293b256aefd244f12e7c5b3357081b819bfbe54ca1215c2ce76ec... server: Filtered packet: [557] 16030202280200005d030293b256aefd244f12e7c5b3357081b819bfbe54ca12... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20dff1e7230c6140aadf06df50d2b2654016409335393f6f7aefd66e82... handshake new: [5] 0301000102 record old: [715] 0200005d03037b4de0033198bf3ee3105cd2effc0fbda6b02ddd13948983f74f... record new: [552] 0200005d03037b4de0033198bf3ee3105cd2effc0fbda6b02ddd13948983f74f... server: Filtered packet: [557] 16030302280200005d03037b4de0033198bf3ee3105cd2effc0fbda6b02ddd13... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedCurve/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d2020c7db595e5c03d358d11aabdd56fa7a11ce0960e47f5dc3b1e620ab... handshake new: [5] 0300170102 record old: [713] 0200005d03010b1036d2cfee2cb6e7995acc743694aa3a2e2f24f7b67f603f38... record new: [552] 0200005d03010b1036d2cfee2cb6e7995acc743694aa3a2e2f24f7b67f603f38... server: Filtered packet: [557] 16030102280200005d03010b1036d2cfee2cb6e7995acc743694aa3a2e2f24f7... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f0207e92dca6cc5694a09e2768bbe9901b7c5b0801fe7012c484bb19... handshake new: [5] 0300170102 record old: [713] 0200005d0302ddc69d41ce0a5632f7abec0943a8921b8418f4354ee29033fbd4... record new: [552] 0200005d0302ddc69d41ce0a5632f7abec0943a8921b8418f4354ee29033fbd4... server: Filtered packet: [557] 16030202280200005d0302ddc69d41ce0a5632f7abec0943a8921b8418f4354e... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d202feac0ae9e13f5c969ef32c6363ed227dd33c2631c3e06e5d56d877b... handshake new: [5] 0300170102 record old: [715] 0200005d03030e161578ebd19bd05fe8c59e50b5751736fc0014c8793117d955... record new: [552] 0200005d03030e161578ebd19bd05fe8c59e50b5751736fc0014c8793117d955... server: Filtered packet: [557] 16030302280200005d03030e161578ebd19bd05fe8c59e50b5751736fc0014c8... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ConnectFfdheServer/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301021d336ac222a451b9191d18cb73754c9cea599d292b06fdde24... record new: [1190] 020000570301021d336ac222a451b9191d18cb73754c9cea599d292b06fdde24... server: Filtered packet: [1195] 16030104a6020000570301021d336ac222a451b9191d18cb73754c9cea599d29... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/0 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030231b85a504ce187f9324fbe1aea6609460be7833b496beeadcee7... record new: [1190] 02000057030231b85a504ce187f9324fbe1aea6609460be7833b496beeadcee7... server: Filtered packet: [1195] 16030204a602000057030231b85a504ce187f9324fbe1aea6609460be7833b49... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/1 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703039f39d4403a3fe333fe8fbc6d608d841c1db29df016406f71393c... record new: [1192] 0200005703039f39d4403a3fe333fe8fbc6d608d841c1db29df016406f71393c... server: Filtered packet: [1197] 16030304a80200005703039f39d4403a3fe333fe8fbc6d608d841c1db29df016... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerKeyShare/2 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301aec422d4e37de1d029da8a992acac916433bc6e1f53e933cc9c7... record new: [1190] 020000570301aec422d4e37de1d029da8a992acac916433bc6e1f53e933cc9c7... server: Filtered packet: [1195] 16030104a6020000570301aec422d4e37de1d029da8a992acac916433bc6e1f5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/0 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302c4d32fd14a2ed79bc679e3078bccdde214ebbe4495eb450e7a33... record new: [1190] 020000570302c4d32fd14a2ed79bc679e3078bccdde214ebbe4495eb450e7a33... server: Filtered packet: [1195] 16030204a6020000570302c4d32fd14a2ed79bc679e3078bccdde214ebbe4495... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/1 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303da33fb20ce8f8352447ac6b52057d4d523551b8d3cf13facf25a... record new: [1192] 020000570303da33fb20ce8f8352447ac6b52057d4d523551b8d3cf13facf25a... server: Filtered packet: [1197] 16030304a8020000570303da33fb20ce8f8352447ac6b52057d4d523551b8d3c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MakeDhePEven/2 (9 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 0200005703016ac25cc3ebf5fb58cb3e516474a8e335e7f72920e630cbba3a3d... record new: [1191] 0200005703016ac25cc3ebf5fb58cb3e516474a8e335e7f72920e630cbba3a3d... server: Filtered packet: [1196] 16030104a70200005703016ac25cc3ebf5fb58cb3e516474a8e335e7f72920e6... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/0 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1190] 020000570302a03552cb45e8562c39199cbb1adf5fb43780ca43b4bc440ea6c2... record new: [1191] 020000570302a03552cb45e8562c39199cbb1adf5fb43780ca43b4bc440ea6c2... server: Filtered packet: [1196] 16030204a7020000570302a03552cb45e8562c39199cbb1adf5fb43780ca43b4... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/1 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [1192] 0200005703033b65b882bc98475d2aaa994a9ba30382f9b158d14a490223f7ce... record new: [1193] 0200005703033b65b882bc98475d2aaa994a9ba30382f9b158d14a490223f7ce... server: Filtered packet: [1198] 16030304a90200005703033b65b882bc98475d2aaa994a9ba30382f9b158d14a... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.PadDheP/2 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/0 (4219 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/1 (22 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.WeakDHGroup/2 (21 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (48 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (50 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.NamedGroupMismatchPre13/2 (50 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 0200005703015cfcf75baeea14dfbb99bc0baa6824a31a50f6167cf1e595d8a6... record new: [3622] 0200005703015cfcf75baeea14dfbb99bc0baa6824a31a50f6167cf1e595d8a6... server: Filtered packet: [3627] 1603010e260200005703015cfcf75baeea14dfbb99bc0baa6824a31a50f6167c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/0 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1190] 02000057030296a3dcccfef7f4c3635a008f8f38d41cd8065bbb81388eefb19b... record new: [3622] 02000057030296a3dcccfef7f4c3635a008f8f38d41cd8065bbb81388eefb19b... server: Filtered packet: [3627] 1603020e2602000057030296a3dcccfef7f4c3635a008f8f38d41cd8065bbb81... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/1 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [1192] 020000570303aa4d3cffc7217c83cfd189999b6af052fba54e8e523e06e3c63a... record new: [3622] 020000570303aa4d3cffc7217c83cfd189999b6af052fba54e8e523e06e3c63a... server: Filtered packet: [3627] 1603030e26020000570303aa4d3cffc7217c83cfd189999b6af052fba54e8e52... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.TooBigDHGroup/2 (10 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/0 (50 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/1 (49 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.PreferredFfdhe/2 (47 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/0 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.MismatchDHE/2 (2 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: TLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [584] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1738] 0200005d030150f18759e1db0647f01c00f2e471d4879e1809c30e1b1dc66880... record new: [1737] 0200005d030150f18759e1db0647f01c00f2e471d4879e1809c30e1b1dc66880... server: Filtered packet: [1742] 16030106c90200005d030150f18759e1db0647f01c00f2e471d4879e1809c30e... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: TLS 1.1 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [584] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1738] 0200005d0302a1ecd5f83ee681113c86486cd91fb1ea6539df169832821184a3... record new: [1737] 0200005d0302a1ecd5f83ee681113c86486cd91fb1ea6539df169832821184a3... server: Filtered packet: [1742] 16030206c90200005d0302a1ecd5f83ee681113c86486cd91fb1ea6539df1698... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1739] 0200005d03036f51b280c17bc2cb8977993541804f91bff27782592adbf4efeb... record new: [1739] 0200005d03036f51b280c17bc2cb8977993541804f91bff27782592adbf4efeb... server: Filtered packet: [1744] 16030306cb0200005d03036f51b280c17bc2cb8977993541804f91bff2778259... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/2 (11 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d201464786e2a924a411e5a0a812d328756d64a15ac56255ff95f3d09a9... handshake new: [166] 03001d201464786e2a924a411e5a0a812d328756d64a15ac56255ff95f3d09a9... record old: [713] 0200005d0301c0e30f76c0041b152fad1d9e748a891bc23a066cbf423792603d... record new: [713] 0200005d0301c0e30f76c0041b152fad1d9e748a891bc23a066cbf423792603d... server: Filtered packet: [718] 16030102c90200005d0301c0e30f76c0041b152fad1d9e748a891bc23a066cbf... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/0 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20dc72949853378a87401362e7c97610d6d430a05c8f2ca82c7059a35a... handshake new: [166] 03001d20dc72949853378a87401362e7c97610d6d430a05c8f2ca82c7059a35a... record old: [713] 0200005d0302c7c49135d446fc7d18a091cdb6577537e590d436bc7c587db171... record new: [713] 0200005d0302c7c49135d446fc7d18a091cdb6577537e590d436bc7c587db171... server: Filtered packet: [718] 16030202c90200005d0302c7c49135d446fc7d18a091cdb6577537e590d436bc... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/1 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20f1c1fba5652281abf168f60fec3f7a2d4e96c7bc3e007bd527e3be84... handshake new: [168] 03001d20f1c1fba5652281abf168f60fec3f7a2d4e96c7bc3e007bd527e3be84... record old: [715] 0200005d0303cbf8bbbc7c5c1d112b895229b658705d5d868bdbc71f5158aa51... record new: [715] 0200005d0303cbf8bbbc7c5c1d112b895229b658705d5d868bdbc71f5158aa51... server: Filtered packet: [720] 16030302cb0200005d0303cbf8bbbc7c5c1d112b895229b658705d5d868bdbc7... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.DamageServerSignature/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/2 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 0301c26cb1d7f2e39c14531ccefea27f4513e403289f9e362994c9d93efdbf4b... handshake new: [98] 0301c26cb1d7f2e39c14531ccefea27f4513e403289f9e362994c9d93efdbf4b... record old: [731] 020000610301c26cb1d7f2e39c14531ccefea27f4513e403289f9e362994c9d9... record new: [732] 020000620301c26cb1d7f2e39c14531ccefea27f4513e403289f9e362994c9d9... server: Filtered packet: [737] 16030102dc020000620301c26cb1d7f2e39c14531ccefea27f4513e403289f9e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 030208c17c959fcd0bae68c22903f9a31c60177299b4ac52635088236f24db29... handshake new: [98] 030208c17c959fcd0bae68c22903f9a31c60177299b4ac52635088236f24db29... record old: [731] 02000061030208c17c959fcd0bae68c22903f9a31c60177299b4ac5263508823... record new: [732] 02000062030208c17c959fcd0bae68c22903f9a31c60177299b4ac5263508823... server: Filtered packet: [737] 16030202dc02000062030208c17c959fcd0bae68c22903f9a31c60177299b4ac... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] 03031429d07efc5656dee1dad158255918622d68731f02a23803219b95241669... handshake new: [98] 03031429d07efc5656dee1dad158255918622d68731f02a23803219b95241669... record old: [733] 0200006103031429d07efc5656dee1dad158255918622d68731f02a23803219b... record new: [734] 0200006203031429d07efc5656dee1dad158255918622d68731f02a23803219b... server: Filtered packet: [739] 16030302de0200006203031429d07efc5656dee1dad158255918622d68731f02... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.OcspMangled/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.ServerAuthRejectAsync/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/2 (4 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 1603010030840a1fc3fbcc7a6ff254e432a0f61dbf3f7a3a0891a8f8bd7296c9... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 170301002062621c38a1c874f1dbaa62fa1976c12bddf01699be4e9fb6547feb... server: Filtered packet: [37] 1703010020c47d38c4987d1c76feb511b585ef24339ddb11c540984b9bf9b243... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 16030200409d20dd598423e33baf9333819ff35db71878271a9dec0168c3cfeb... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 1703020030be5973d64650796d3c27e9482523c52c4e37b3843ed207b59d8437... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 160303002800000000000000005b8ab90b4d0792ab5ff0eedf301a91202af071... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 1703030022000000000000000198ecdf46f034febe677e9c997f903b742b3a6a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/2 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140301000101 record drop: TLS 1.0 CCS 1000000000000:[1] 01 server: Filtered packet: [53] 160301003046af71f029e1ef71fba0aa83e87970c49a4ca2e004a2dc89075d05... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [37] 170301002006cc982c4a478c232b1862c4e9cd2bf222259e71f9a959bf18b46a... server: Filtered packet: [37] 17030100204b2ef7473100a7ecde1e1fd9be77b6b2478dfd59c2d688ce687458... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140302000101 record drop: TLS 1.1 CCS 1000000000000:[1] 01 server: Filtered packet: [69] 1603020040d6115a8b5c86ce66b450988b7794e757fb844c10a3771a9d52732b... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [53] 1703020030e50ba12f1be5cddb34e9a047c4bdbe97e19295b64cf71cfbf6d555... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [6] 140303000101 record drop: TLS 1.2 CCS 1000000000000:[1] 01 server: Filtered packet: [45] 16030300280000000000000000ff9be0e5d140c5e29b02a7fe934398c15ed814... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [39] 170303002200000000000000015aa27214ab3379be0ccedf8b73bf4236e0fc38... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/0 (7 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteDelayed/2 (5 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (6 ms) [ RUN ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Stream/TlsConnectGenericPre13.AuthCompleteFailDelayed/2 (5 ms) [----------] 171 tests from Pre13Stream/TlsConnectGenericPre13 (5914 ms total) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 86 server: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 86 client: Handshake failed with error SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT: The server rejected the handshake because the client downgraded to a lower TLS version than the server supports. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestFallbackSCSVVersionMismatch/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Read error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Read error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientHelloUnsupportedTlsVersion/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSA/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectStaticRSABogusPMSVersionIgnore/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16feff00000000000000000063020000570000000000000057feff2a1f0b92b7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [438] 0001b30001b0308201ac30820115a003020102020102300d06092a864886f70d... handshake new: [2411] 0009680009653082096130820548a003020102020900afff37913e44ae57300d... record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [2423] 0b00096b000100000000096b0009680009653082096130820548a00302010202... server: Filtered packet: [2573] 16fefd00000000000000000063020000570000000000000057fefd821fd82c14... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_CLIENT_KEY_EXCHANGE_FAILURE: Unspecified failure while processing SSL Client Key Exchange handshake. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooLargeRSAKeyInCert/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectResumed/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/0 (12 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13/1 (12 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/0 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithHigherVersionTls13SessionId/1 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/0 (12 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ResumeWithLowerVersionFromTls13/1 (12 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/0 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceReuseKey/1 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/0 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdheTwiceNewKey/1 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 Version: DTLS 1.0 ssl_resumption_unittest.cc:754: Skipped [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 (0 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [89] fefd12fd6a6e8999421f97cb7defef4054661da4a2e3fdbabb950e8382df6ef0... handshake new: [89] feff12fd6a6e8999421f97cb7defef4054661da4a2e3fdbabb950e8382df6ef0... record old: [101] 020000590000000000000059fefd12fd6a6e8999421f97cb7defef4054661da4... record new: [101] 020000590000000000000059feff12fd6a6e8999421f97cb7defef4054661da4... server: Filtered packet: [205] 16fefd00000000000000000065020000590000000000000059feff12fd6a6e89... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ReConnectCache/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [114] feff6d46f91e246dcf3d10cec6b32876a350d7e305824ac36f70313679b381f1... handshake new: [114] feff6d46f91e246dcf3d10cec6b32876a350d7e305824ac36f70313679b381f1... record old: [126] 010000720000000000000072feff6d46f91e246dcf3d10cec6b32876a350d7e3... record new: [126] 010000720000000000000072feff6d46f91e246dcf3d10cec6b32876a350d7e3... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff6d46f91e24... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 03e8 extension new: [2] f41f handshake old: [184] fefdedb54a74f1f5b846b053a3fea652991b4d2876dc5988f88bd53e39f5ab9d... handshake new: [184] fefdedb54a74f1f5b846b053a3fea652991b4d2876dc5988f88bd53e39f5ab9d... record old: [196] 010000b800000000000000b8fefdedb54a74f1f5b846b053a3fea652991b4d28... record new: [196] 010000b800000000000000b8fefdedb54a74f1f5b846b053a3fea652991b4d28... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdedb54a74f1... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RecordSizeClientExtensionInvalid/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feff8e0b1f1bf8306e0b77a1dddf097a11bf70dc61a9a3c6ea1f7446ad3b8f0c... handshake new: [92] feff8e0b1f1bf8306e0b77a1dddf097a11bf70dc61a9a3c6ea1f7446ad3b8f0c... record old: [105] 0200005d000000000000005dfeff8e0b1f1bf8306e0b77a1dddf097a11bf70dc... record new: [104] 0200005c000000000000005cfeff8e0b1f1bf8306e0b77a1dddf097a11bf70dc... server: Filtered packet: [796] 16feff000000000000000000680200005c000000000000005cfeff8e0b1f1bf8... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefdb7b02b7e2abecb4b4ad9e724d28faf4758f4a2f9217b60ee6bd1da1a27c0... handshake new: [92] fefdb7b02b7e2abecb4b4ad9e724d28faf4758f4a2f9217b60ee6bd1da1a27c0... record old: [105] 0200005d000000000000005dfefdb7b02b7e2abecb4b4ad9e724d28faf4758f4... record new: [104] 0200005c000000000000005cfefdb7b02b7e2abecb4b4ad9e724d28faf4758f4... server: Filtered packet: [798] 16fefd000000000000000000680200005c000000000000005cfefdb7b02b7e2a... Alert: [2] 0232 client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.CaptureAlertClient/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFalseStart/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ExporterContextLengthTooLong/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecret/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretStaticRSA/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretECDHE/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/0 (9 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretTicket/1 (8 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretClientOnly/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretServerOnly/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_MISSING_EXTENDED_MASTER_SECRET: The peer tried to resume without a correct extended_master_secret extension server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectExtendedMasterSecretResumeWithout/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/0 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectNormalResumeWithExtendedMasterSecret/1 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/0 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdh/1 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 Version: DTLS 1.0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/0 (12 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 Version: DTLS 1.2 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectEcdhWithoutDisablingSuites/1 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/0 (42 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityOnServer/1 (41 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/0 (42 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.P384PriorityFromModelSocket/1 (44 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] feffd375d8f37e46e5dc747fe89c591def970934617bec18d6fb837c5f4fcfe4... handshake new: [100] feffd375d8f37e46e5dc747fe89c591def970934617bec18d6fb837c5f4fcfe4... record old: [126] 010000720000000000000072feffd375d8f37e46e5dc747fe89c591def970934... record new: [112] 010000640000000000000064feffd375d8f37e46e5dc747fe89c591def970934... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064feffd375d8f37e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/0 (13 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefd755b17daf6e38094952d1b73a276af9582a4a23b8c6ad0bf8c45d97a9f6a... handshake new: [170] fefd755b17daf6e38094952d1b73a276af9582a4a23b8c6ad0bf8c45d97a9f6a... record old: [196] 010000b800000000000000b8fefd755b17daf6e38094952d1b73a276af9582a4... record new: [182] 010000aa00000000000000aafefd755b17daf6e38094952d1b73a276af9582a4... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefd755b17daf6... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DropSupportedGroupExtensionP256/1 (12 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.UseLameGroup/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.GroupPreferenceServerPriority/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d208df2968b244c64d189d10be3c6e6dd812c1e0e492742be089057d341... handshake new: [4] 03001d00 record old: [178] 0c0000a600020000000000a603001d208df2968b244c64d189d10be3c6e6dd81... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16feff000000000000000000690200005d000000000000005dfeff134ebca28a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20669b46fe9369f28afe7b9f99ab8bc5f5f438beb8aae1ceb8196f85cc... handshake new: [4] 03001d00 record old: [180] 0c0000a800020000000000a803001d20669b46fe9369f28afe7b9f99ab8bc5f5... record new: [16] 0c000004000200000000000403001d00 server: Filtered packet: [635] 16fefd000000000000000000690200005d000000000000005dfefd10ec2b4806... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_KEY_EXCH: SSL received a malformed Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyServerPoint/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 2014d76fa45275e08fe143fea64f432f5a8f00464cf2998f4cfe065b8f814d58... handshake new: [1] 00 record old: [45] 1000002100010000000000212014d76fa45275e08fe143fea64f432f5a8f0046... record new: [13] 10000001000100000000000100 client: Filtered packet: [117] 16feff0000000000000001000d1000000100010000000000010014feff000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [33] 204b03cbb4e3053f72f276cfcc6df9df54b8efd992ed8e8e6de52035751a6c6c... handshake new: [1] 00 record old: [45] 100000210001000000000021204b03cbb4e3053f72f276cfcc6df9df54b8efd9... record new: [13] 10000001000100000000000100 client: Filtered packet: [101] 16fefd0000000000000001000d1000000100010000000000010014fefd000000... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_KEY_EXCH: SSL received a malformed Client Key Exchange handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectECDHEmptyClientPoint/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d206044bc6e3fba5dac6d601583cf8f099a3b793ecbbc9414d4f1e4dfe5... handshake new: [5] 0100010102 record old: [178] 0c0000a600020000000000a603001d206044bc6e3fba5dac6d601583cf8f099a... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff62467250d5... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d206fb55d00ee6ac2eb0cc8a01fcfec834a8b59faf2ab652058ef545b14... handshake new: [5] 0100010102 record old: [180] 0c0000a800020000000000a803001d206fb55d00ee6ac2eb0cc8a01fcfec834a... record new: [17] 0c00000500020000000000050100010102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefd3377ba50be... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurveType/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20f78868e91657c4deb42759c0af287cca0b21b99bfdfdea09a5366dc9... handshake new: [5] 0301000102 record old: [178] 0c0000a600020000000000a603001d20f78868e91657c4deb42759c0af287cca... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeffe3d652e5d1... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20cef3c9d48108be5771b99e68b9800c5c036f17a97618ade8a0d3e1d3... handshake new: [5] 0301000102 record old: [180] 0c0000a800020000000000a803001d20cef3c9d48108be5771b99e68b9800c5c... record new: [17] 0c00000500020000000000050301000102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefd633ccc4bf9... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE: Unsupported elliptic curve. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedCurve/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d20149a82e144948c56007dddde414f8bd9b2077320a519ea1d9b2c9e17... handshake new: [5] 0300170102 record old: [178] 0c0000a600020000000000a603001d20149a82e144948c56007dddde414f8bd9... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16feff000000000000000000690200005d000000000000005dfeff6dabf98b76... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d208cab25c8200222a80736d0030900aa4e362776470a5460625df55ee0... handshake new: [5] 0300170102 record old: [180] 0c0000a800020000000000a803001d208cab25c8200222a80736d0030900aa4e... record new: [17] 0c00000500020000000000050300170102 server: Filtered packet: [636] 16fefd000000000000000000690200005d000000000000005dfefd391c846e9a... client: Fatal alert sent: 40 client: Handshake failed with error SEC_ERROR_UNSUPPORTED_EC_POINT_FORM: Unsupported elliptic curve point form. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectUnsupportedPointFormat/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ConnectFfdheServer/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff58a4b156e3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/0 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffb6ffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffb6ffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd6bb1b3b1ae... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_WEAK_SERVER_EPHEMERAL_DH_KEY: SSL received a weak ephemeral Diffie-Hellman key in Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerKeyShare/1 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff6991dac881... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/0 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefde2e3657d5f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MakeDhePEven/1 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffa023db5dc6... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/0 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 010100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c010100ffffffffffffffffadf85458a2bb4a9aaf... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefdbbe18c88ae... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.PadDheP/1 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/0 (23 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.WeakDHGroup/1 (22 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/0 (50 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.NamedGroupMismatchPre13/1 (49 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16feff00000000000000000063020000570000000000000057feff856b7e2cb9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/0 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [3081] 0401800000000000000000000000000000000000000000000000000000000000... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [3093] 0c000c090002000000000c090401800000000000000000000000000000000000... server: Filtered packet: [3706] 16fefd00000000000000000063020000570000000000000057fefddca17c2758... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_DH_KEY_TOO_LONG: SSL received a DH key share that's too long (>8192 bit). client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.TooBigDHGroup/1 (10 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.RequireNamedGroupsMismatchPre13/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/0 (50 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.PreferredFfdhe/1 (48 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/0 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.MismatchDHE/1 (2 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 Version: DTLS 1.0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 2:[207] 0c00024900020000000000c30100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1188] 16feff000000000000000000690200005d000000000000005dfeff5e96ee9a80... handshake old: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [583] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [402] 0c00024900020000c300018672fe9ce98583ff8e4f1232eef28183c3fe3b1b4c... record new: [595] 0c00024700020000000002470100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [633] 16feff000000000000000202530c00024700020000000002470100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/0 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 2:[207] 0c00024a00020000000000c30100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1188] 16fefd000000000000000000690200005d000000000000005dfefd3407c47537... handshake old: [586] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [585] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [403] 0c00024a00020000c300018772fe9ce98583ff8e4f1232eef28183c3fe3b1b4c... record new: [597] 0c00024900020000000002490100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [635] 16fefd000000000000000202550c00024900020000000002490100ffffffffff... client: Fatal alert sent: 51 client: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.InvalidDERSignatureFfdhe/1 (11 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [166] 03001d205e8fe3cf9d4315d64333f809ee172af17d07d12985576ae8904ad79b... handshake new: [166] 03001d205e8fe3cf9d4315d64333f809ee172af17d07d12985576ae8904ad79b... record old: [178] 0c0000a600020000000000a603001d205e8fe3cf9d4315d64333f809ee172af1... record new: [178] 0c0000a600020000000000a603001d205e8fe3cf9d4315d64333f809ee172af1... server: Filtered packet: [797] 16feff000000000000000000690200005d000000000000005dfefffcd13a2ff9... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/0 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d200b65d813d9caec613b48e4668b3a1fb7a697f591c72a098c9b9af693... handshake new: [168] 03001d200b65d813d9caec613b48e4668b3a1fb7a697f591c72a098c9b9af693... record old: [180] 0c0000a800020000000000a803001d200b65d813d9caec613b48e4668b3a1fb7... record new: [180] 0c0000a800020000000000a803001d200b65d813d9caec613b48e4668b3a1fb7... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd1cb4bb6086... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.DamageServerSignature/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/0 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignedCertificateTimestampsLegacy/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] feffeca67adce445eabe99e925734ab9ca6df1d8151c4bc84fc472c54a5076fe... handshake new: [98] feffeca67adce445eabe99e925734ab9ca6df1d8151c4bc84fc472c54a5076fe... record old: [109] 020000610000000000000061feffeca67adce445eabe99e925734ab9ca6df1d8... record new: [110] 020000620000000000000062feffeca67adce445eabe99e925734ab9ca6df1d8... server: Filtered packet: [837] 16feff0000000000000000006e020000620000000000000062feffeca67adce4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [0] extension new: [1] 01 handshake old: [97] fefda2bc771aa996e658cf5843821ec6e01209979d585d1ef8c993b9aee39e52... handshake new: [98] fefda2bc771aa996e658cf5843821ec6e01209979d585d1ef8c993b9aee39e52... record old: [109] 020000610000000000000061fefda2bc771aa996e658cf5843821ec6e0120997... record new: [110] 020000620000000000000062fefda2bc771aa996e658cf5843821ec6e0120997... server: Filtered packet: [839] 16fefd0000000000000000006e020000620000000000000062fefda2bc771aa9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.OcspMangled/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: call SSL_AuthCertificateComplete SEC_ERROR_EXPIRED_CERTIFICATE client: Fatal alert sent: 45 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.ServerAuthRejectAsync/1 (7 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/0 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.SignatureAlgorithmNoOverlapStaticRsa/1 (4 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff0001000000000000004021fb98b4d80295c948d9f8788664f642fd82a9... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd000100000000000000300001000000000000f827378376a4e853f82482... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14feff0000000000000004000101 record drop: DTLS 1.0 CCS 4:[1] 01 server: Filtered packet: [77] 16feff000100000000000000403add9f3aef1b82732ac21b7d0c873e67132aa3... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [14] 14fefd0000000000000004000101 record drop: DTLS 1.2 CCS 4:[1] 01 server: Filtered packet: [61] 16fefd000100000000000000300001000000000000b826a1df7353b2decdab81... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteBeforeFinishedWithFalseStart/1 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteDelayed/1 (5 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/0 (6 ms) [ RUN ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 42 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILED: SSL handshake has already failed. No more operations possible. client: Changing state from CONNECTING to ERROR [ OK ] Pre13Datagram/TlsConnectGenericPre13.AuthCompleteFailDelayed/1 (5 ms) [----------] 114 tests from Pre13Datagram/TlsConnectGenericPre13 (1152 ms total) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030100030000001000003380080d6e109b39e09b4516020f5f2d37 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.Connect/0 (22 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033cc8d139ec0dda0c018c9f1380c5cf227 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectDisabled/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.0 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff0103010003000000100000335d57e92efa4ed297381b7cf281e4589900... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030100030000001000c0130bcb2bc8a6241de34512fe360876cd99 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (12 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff0103010003000000100000335916a927a8b15ab3b7109f2a62dc09a500... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddPadding/0 (21 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff0103010003000000100000338bc7630e0292fe51436e5e09f61c2c7400... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002104010301000300000010000033a58eb103d9cb20800cd6a9f519217be300... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002106010301000300000010000033a27bbf538ad4568ef08f92f357ad4fba00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030100030000000f000033b04457c3a0e63ea1aae839b020c112 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.SmallClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c0103010003000000200000330c3f6fdd22b3d7fccce1e3cadff4a794201f... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.MaxClientRandom/0 (22 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d010301000300000021000033968a1b5fab5d6cd0269a499e181c06d98049... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.BigClientRandom/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033b7e724383f16d4e98a9966cd628ad6ae server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (2 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103010006000000100000330000ff564799e9f514a82f4ab37596ed4819... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (22 ms) [ RUN ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010301000300000010000033659d3573837f2abd8af5aa98ae2fc580 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStream10Pre13/SSLv2ClientHelloTest.CheckServerRandom/0 (27 ms) [----------] 14 tests from VersionsStream10Pre13/SSLv2ClientHelloTest (149 ms total) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010302000300000010000033407b54ce885c67d9bab996d9f99ec380 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/0 (22 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103030003000000100000332c52c1059cd635c025523e22c49eb118 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.Connect/1 (22 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010302000300000010000033abde7b509e9f70de48cda50d17afac56 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033135627fc67c69f4b7014b99223c11dd3 client: Send Direct [771] 0000000000000000000000000000000000000000000000000000000000000000... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectDisabled/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 Version: TLS 1.1 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030200030000001000003312bc8536c76ce04676848a9381ea850d00... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 Version: TLS 1.2 client: Send Direct [5] 1603010000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030300030000001000003338c9eec4c7bb173f9bf40668be5c0a0200... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.ConnectAfterEmptyV3Record/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030200030000001000c013719d181a5fc99ea16d03614340c1e3dd server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/0 (12 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030300030000001000c01330116a02844e81e0e5fb4c8ffcf4aee5 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.NegotiateECSuite/1 (12 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff010302000300000010000033294dca8e0a718ab33b0ebff45637237700... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/0 (22 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 011bff01030300030000001000003342a35f868a65b6f6d8172834bd1715a600... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddPadding/1 (22 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010302000300000010000033b06a9a0ea5147751e7def70cff417ddf00... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [286] 411bff010303000300000010000033df71a837528fc1192276e5d182f2c68a00... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SendSecurityEscape/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 00210401030200030000001000003356e54990efd6f04f3c12f50a71195b3200... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 00210401030300030000001000003357839dc24e1b376f2faaece849145d6200... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 002106010302000300000010000033ce8d94c640d00b8b47070b88674aef9500... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [36] 0021060103030003000000100000337e1ef4ba81d16281801d20e2447116fb00... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.AddErroneousPadding2/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030200030000000f000033db86a04bea4fc938f1f61d98def267 server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [29] 801b01030300030000000f00003319e194cf3436b5a2d1a34497afff2d server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.SmallClientRandom/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c010302000300000020000033e5af068f25df22f6dd55ca1b489998d6f611... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/0 (22 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [46] 802c010303000300000020000033b4b274d8f5b87d3e0ffd8e0b88699804647b... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.MaxClientRandom/1 (22 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d010302000300000021000033ba04f0ab68e1aef9a947956efca94651943b... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [47] 802d0103030003000000210000338531341c67225d1bbe06ffa91a9ea0afdaa7... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.BigClientRandom/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010302000300000010000033a70cbaec331762ed1d9aa6bd813ddee4 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/0 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c01030300030000001000003389aaeb5fec50ead5cc8811f04f25f813 server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSAFE_NEGOTIATION: Peer attempted old style (potentially vulnerable) handshake. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiation/1 (2 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103020006000000100000330000ffa3fadb34b612162147594ad2d4cf17... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/0 (22 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [33] 801f0103030006000000100000330000fffd977517d66aa3e806c1c6ff621ff5... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.RequireSafeRenegotiationWithSCSV/1 (21 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c0103020003000000100000331fe1d6cfeaf60bbbff0e200cacae7ea1 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/0 (28 ms) [ RUN ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [30] 801c010303000300000010000033068b56637a3f00aba5a9b2629bf0a391 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] VersionsStreamPre13/SSLv2ClientHelloTest.CheckServerRandom/1 (28 ms) [----------] 28 tests from VersionsStreamPre13/SSLv2ClientHelloTest (301 ms total) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008035adee0b9366a7f64e3b4a597f34812c92d60173961fb211617e3e1ea602... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008035adee0b9366a7f64e3b4a597f34812c92d60173961fb211617e... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/0 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080143552a4fc2e8cff18c2590aee1b6059df7c04fdc24ed7ad065e46229e84... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080143552a4fc2e8cff18c2590aee1b6059df7c04fdc24ed7ad065e... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/1 (3 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008033cf7abf1e30a57c34b26a3fba43b7f57f3d41270bd587cc905590727077... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008033cf7abf1e30a57c34b26a3fba43b7f57f3d41270bd587cc9055... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusCKE/2 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectStaticRSABogusPMSVersionDetect/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 008000d8f80d0b20e0c07a2af9555b6f844d3f42cd24267c419b6f56bd5649db... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 10000082008000d8f80d0b20e0c07a2af9555b6f844d3f42cd24267c419b6f56... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [198] 1603010086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/0 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 00803a1965b6fb3589b29530a2e7789eb51ac94495c3a5e31ec3eefc822202f8... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 1000008200803a1965b6fb3589b29530a2e7789eb51ac94495c3a5e31ec3eefc... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [214] 1603020086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/1 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [130] 0080a4ecb24f4aad026082f965e86f94e96f3a6de968aaae9799ea5416ec2134... handshake new: [130] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [134] 100000820080a4ecb24f4aad026082f965e86f94e96f3a6de968aaae9799ea54... record new: [134] 100000820100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [190] 1603030086100000820100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusCKE/2 (2 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 20 server: Handshake failed with error SSL_ERROR_BAD_MAC_READ: SSL received a record with an incorrect Message Authentication Code. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 20 client: Handshake failed with error SSL_ERROR_BAD_MAC_ALERT: SSL peer reports incorrect Message Authentication Code. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 (4 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/0 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/1 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateClient/2 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/0 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/1 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateServer/2 (10 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/0 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/1 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Changing state from CONNECTED to CONNECTING server: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.RenegotiateRandoms/2 (9 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [110] 16030100251000002120d381000956e4e477819cdc13349d6e8553244cf48305... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/0 (6 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [126] 160302002510000021207b46d6b6833b637772a07e3b2bb188fe45c8535f369a... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/1 (6 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS client: Filtered packet: [102] 16030300251000002120577a30374445a3083bc485caf877c4d3de49e9865370... server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ClientFinishedHeaderBeforeCCS/2 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [68] 16030100041400000c1403010001011603010030ae84c65fe2901fe1288c1d05... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTED to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/0 (6 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [84] 16030200041400000c14030200010116030200409b9435b8632ce738c352b67b... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/1 (6 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Injecting Finished header before CCS server: Filtered packet: [60] 16030300041400000c14030300010116030300280000000000000000a1888ad1... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CHANGE_CIPHER: SSL received an unexpected Change Cipher Spec record. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ServerFinishedHeaderBeforeCCS/2 (6 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 03010e807f07907048c74cb9e3ed7ce060c8dd1b5aa9939b697e036a727933b4... handshake new: [93] 0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d03010e807f07907048c74cb9e3ed7ce060c8dd1b5aa9939b697e036a... record new: [713] 0200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030102c90200005d0301cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/0 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0302c5d899f566bec5e7c40d5ffe0eff1cd8c0718d87db7be52a13aed965bcc0... handshake new: [93] 0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [713] 0200005d0302c5d899f566bec5e7c40d5ffe0eff1cd8c0718d87db7be52a13ae... record new: [713] 0200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [718] 16030202c90200005d0302cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/1 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0303090863d968aa273c678e633b22f61420b76af13f12dc54325a854a882c71... handshake new: [93] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [715] 0200005d0303090863d968aa273c678e633b22f61420b76af13f12dc54325a85... record new: [715] 0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [720] 16030302cb0200005d0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.HrrRandomOnTls10/2 (5 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/0 (22 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/1 (22 ms) [ RUN ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Changing state from CONNECTED to CONNECTING client: Changing state from CONNECTED to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Pre13StreamOnly/TlsConnectStreamPre13.ConfiguredGroupsRenegotiate/2 (22 ms) [----------] 36 tests from Pre13StreamOnly/TlsConnectStreamPre13 (267 ms total) [----------] 8 tests from SkipTls10/TlsSkipTest [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570301fdb89a8f2ad7df38352bf015dddea6f0ffb95cf1eb08e9d33282... record new: [95] 020000570301fdb89a8f2ad7df38352bf015dddea6f0ffb95cf1eb08e9d33282... server: Filtered packet: [100] 160301005f020000570301fdb89a8f2ad7df38352bf015dddea6f0ffb95cf1eb... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateRsa/0 (2 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0301ec27a7ca7073bfa02d6b76ac7ac020e98a0f70a27b1cc64b4013... record new: [271] 0200005d0301ec27a7ca7073bfa02d6b76ac7ac020e98a0f70a27b1cc64b4013... server: Filtered packet: [276] 160301010f0200005d0301ec27a7ca7073bfa02d6b76ac7ac020e98a0f70a27b... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateDhe/0 (5 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d030111862dfbb64bfc8d2367502c07fa24a4c35141ea5dc18c6705e9... record new: [271] 0200005d030111862dfbb64bfc8d2367502c07fa24a4c35141ea5dc18c6705e9... server: Filtered packet: [276] 160301010f0200005d030111862dfbb64bfc8d2367502c07fa24a4c35141ea5d... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdhe/0 (5 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [529] 0200005d0301cf8aad40b4b105b1733c7aade2ad2ab4dd3f220b9527d0c88fd7... record new: [214] 0200005d0301cf8aad40b4b105b1733c7aade2ad2ab4dd3f220b9527d0c88fd7... server: Filtered packet: [219] 16030100d60200005d0301cf8aad40b4b105b1733c7aade2ad2ab4dd3f220b95... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertificateEcdsa/0 (5 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d0301ee521e7e2cef187137ff24f7c12dfc47325ba0221f118b58d427... record new: [543] 0200005d0301ee521e7e2cef187137ff24f7c12dfc47325ba0221f118b58d427... server: Filtered packet: [548] 160301021f0200005d0301ee521e7e2cef187137ff24f7c12dfc47325ba0221f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchange/0 (4 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [529] 0200005d03012b78f555a95ed0e8d91fe08572cceb08b475ccc1d02c41d9adf8... record new: [416] 0200005d03012b78f555a95ed0e8d91fe08572cceb08b475ccc1d02c41d9adf8... server: Filtered packet: [421] 16030101a00200005d03012b78f555a95ed0e8d91fe08572cceb08b475ccc1d0... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (5 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d03017a935d7a6dc2e24466aa0491e3fac3f8b03ffdabc6117b72534a... record new: [271] 0200005d03017a935d7a6dc2e24466aa0491e3fac3f8b03ffdabc6117b72534a... Dropping handshake: 12 record old: [271] 0200005d03017a935d7a6dc2e24466aa0491e3fac3f8b03ffdabc6117b72534a... record new: [101] 0200005d03017a935d7a6dc2e24466aa0491e3fac3f8b03ffdabc6117b72534a... server: Filtered packet: [106] 16030100650200005d03017a935d7a6dc2e24466aa0491e3fac3f8b03ffdabc6... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExch/0 (5 ms) [ RUN ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [529] 0200005d0301825a0a1384c8ad79c0cde66f39f9f5ed038b9547650df8fe5416... record new: [214] 0200005d0301825a0a1384c8ad79c0cde66f39f9f5ed038b9547650df8fe5416... Dropping handshake: 12 record old: [214] 0200005d0301825a0a1384c8ad79c0cde66f39f9f5ed038b9547650df8fe5416... record new: [101] 0200005d0301825a0a1384c8ad79c0cde66f39f9f5ed038b9547650df8fe5416... server: Filtered packet: [106] 16030100650200005d0301825a0a1384c8ad79c0cde66f39f9f5ed038b954765... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipTls10/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (5 ms) [----------] 8 tests from SkipTls10/TlsSkipTest (39 ms total) [----------] 32 tests from SkipVariants/TlsSkipTest [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 020000570302c3cfb08659d25fbbb6a9f9a19579f7b4aeda4b120ab2192d5076... record new: [95] 020000570302c3cfb08659d25fbbb6a9f9a19579f7b4aeda4b120ab2192d5076... server: Filtered packet: [100] 160302005f020000570302c3cfb08659d25fbbb6a9f9a19579f7b4aeda4b120a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/0 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [537] 0200005703033a2cadbc195d219a037af5bd43cb334b1a9c891edac678429940... record new: [95] 0200005703033a2cadbc195d219a037af5bd43cb334b1a9c891edac678429940... server: Filtered packet: [100] 160303005f0200005703033a2cadbc195d219a037af5bd43cb334b1a9c891eda... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/1 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16feff00000000000000000063020000570000000000000057feffdb6b70d2d6... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/2 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [150] 16fefd00000000000000000063020000570000000000000057fefd44eb156e2f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateRsa/3 (2 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0302539218a3d6283d6e0dcb93ce7ed813c394c4c9f306dc2fa4b2fb... record new: [271] 0200005d0302539218a3d6283d6e0dcb93ce7ed813c394c4c9f306dc2fa4b2fb... server: Filtered packet: [276] 160302010f0200005d0302539218a3d6283d6e0dcb93ce7ed813c394c4c9f306... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d030395ed790b7ad5d52219a73540b2b2b1707890981fcb2ec14a087d... record new: [273] 0200005d030395ed790b7ad5d52219a73540b2b2b1707890981fcb2ec14a087d... server: Filtered packet: [278] 16030301110200005d030395ed790b7ad5d52219a73540b2b2b1707890981fcb... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/1 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d206b3422264f943054e17c64739ad5a8ed... record new: [178] 0c0000a600010000000000a603001d206b3422264f943054e17c64739ad5a8ed... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfeff699e4f60b4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20a5c95acea57639a1553085a7b390895b... record new: [180] 0c0000a800010000000000a803001d20a5c95acea57639a1553085a7b390895b... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefd58a226a988... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateDhe/3 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0302d85c40c3ac88615c013529a02b64143fdcd2f97f3fbcc46999ad... record new: [271] 0200005d0302d85c40c3ac88615c013529a02b64143fdcd2f97f3fbcc46999ad... server: Filtered packet: [276] 160302010f0200005d0302d85c40c3ac88615c013529a02b64143fdcd2f97f3f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d03039c2e10b1aa1dbdeb355594296bf0b5962b38ec0061ead99fac7d... record new: [273] 0200005d03039c2e10b1aa1dbdeb355594296bf0b5962b38ec0061ead99fac7d... server: Filtered packet: [278] 16030301110200005d03039c2e10b1aa1dbdeb355594296bf0b5962b38ec0061... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/1 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d208a86f7ebc28b6fa0984fd38400b65d5a... record new: [178] 0c0000a600010000000000a603001d208a86f7ebc28b6fa0984fd38400b65d5a... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [347] 16feff000000000000000000690200005d000000000000005dfeffa74ce9496a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d205a7433a79e2d4095c4f1688cc6c2bbe2... record new: [180] 0c0000a800010000000000a803001d205a7433a79e2d4095c4f1688cc6c2bbe2... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [349] 16fefd000000000000000000690200005d000000000000005dfefd34ea318304... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdhe/3 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [530] 0200005d030284daccfd989be7551dd19ef82cd17874490472fb25541b518e9e... record new: [215] 0200005d030284daccfd989be7551dd19ef82cd17874490472fb25541b518e9e... server: Filtered packet: [220] 16030200d70200005d030284daccfd989be7551dd19ef82cd17874490472fb25... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/0 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [531] 0200005d03036f6a26f0e958583c3814ec45bafbddc14e991afac108badcdd67... record new: [216] 0200005d03036f6a26f0e958583c3814ec45bafbddc14e991afac108badcdd67... server: Filtered packet: [221] 16030300d80200005d03036f6a26f0e958583c3814ec45bafbddc14e991afac1... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/1 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [122] 0c00006e000200000000006e03001d201e6f7060f0a69794a23ff58fe3eeefaa... record new: [122] 0c00006e000100000000006e03001d201e6f7060f0a69794a23ff58fe3eeefaa... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [291] 16feff000000000000000000690200005d000000000000005dfeffda0d109837... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [122] 0c00006e000200000000006e03001d20f652e1013037de12be8d3cf6272cde5d... record new: [122] 0c00006e000100000000006e03001d20f652e1013037de12be8d3cf6272cde5d... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [291] 16fefd000000000000000000690200005d000000000000005dfefd9104837263... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_SERVER_KEY_EXCH: SSL received an unexpected Server Key Exchange handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertificateEcdsa/3 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [713] 0200005d03028ae59fc24eed0d52358bae6043d7707fc62def94548f524cbb63... record new: [543] 0200005d03028ae59fc24eed0d52358bae6043d7707fc62def94548f524cbb63... server: Filtered packet: [548] 160302021f0200005d03028ae59fc24eed0d52358bae6043d7707fc62def9454... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/0 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [715] 0200005d03031bb61aaf5c6adf22d1cc649400049831ed6b27762b33ff4f3be3... record new: [543] 0200005d03031bb61aaf5c6adf22d1cc649400049831ed6b27762b33ff4f3be3... server: Filtered packet: [548] 160303021f0200005d03031bb61aaf5c6adf22d1cc649400049831ed6b27762b... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/1 (4 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [178] 0c0000a600020000000000a603001d20c1a1f0bc236b4dd285a7b4af8afdf5b0... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16feff000000000000000000690200005d000000000000005dfeff948c29ce71... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [180] 0c0000a800020000000000a803001d20dca313208a0de48177dd485d9f1b3a82... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [619] 16fefd000000000000000000690200005d000000000000005dfefdc4b484bec0... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchange/3 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [530] 0200005d030256a5cf4482de9bf128d21301cf976cdd88eb26e435a9bc991fa4... record new: [416] 0200005d030256a5cf4482de9bf128d21301cf976cdd88eb26e435a9bc991fa4... server: Filtered packet: [421] 16030201a00200005d030256a5cf4482de9bf128d21301cf976cdd88eb26e435... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/0 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [531] 0200005d0303a33a3ce380fd3a0fb530192a2d5304d99dd6f8839efa991efd7c... record new: [416] 0200005d0303a33a3ce380fd3a0fb530192a2d5304d99dd6f8839efa991efd7c... server: Filtered packet: [421] 16030301a00200005d0303a33a3ce380fd3a0fb530192a2d5304d99dd6f8839e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/1 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [120] 0c00006c000200000000006c03001d2062ff654cafe11508721e039a44094418... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [492] 16feff000000000000000000690200005d000000000000005dfeff524ee0c239... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 12 record old: [123] 0c00006f000200000000006f03001d20805a768119906751719a7f5c572ecced... record new: [0] record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 server: Filtered packet: [492] 16fefd000000000000000000690200005d000000000000005dfefde94405672a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipServerKeyExchangeEcdsa/3 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [713] 0200005d0302fa2188c9fb174d3d1edd860bea9c5a3d5b100431f72cedaaa776... record new: [271] 0200005d0302fa2188c9fb174d3d1edd860bea9c5a3d5b100431f72cedaaa776... Dropping handshake: 12 record old: [271] 0200005d0302fa2188c9fb174d3d1edd860bea9c5a3d5b100431f72cedaaa776... record new: [101] 0200005d0302fa2188c9fb174d3d1edd860bea9c5a3d5b100431f72cedaaa776... server: Filtered packet: [106] 16030200650200005d0302fa2188c9fb174d3d1edd860bea9c5a3d5b100431f7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/0 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [715] 0200005d03031eb1bb0d3e87975a923a5821c1552bf556ecff680fc2e03ceb20... record new: [273] 0200005d03031eb1bb0d3e87975a923a5821c1552bf556ecff680fc2e03ceb20... Dropping handshake: 12 record old: [273] 0200005d03031eb1bb0d3e87975a923a5821c1552bf556ecff680fc2e03ceb20... record new: [101] 0200005d03031eb1bb0d3e87975a923a5821c1552bf556ecff680fc2e03ceb20... server: Filtered packet: [106] 16030300650200005d03031eb1bb0d3e87975a923a5821c1552bf556ecff680f... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/1 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [178] 0c0000a600020000000000a603001d20887a5951e8068d2d4e588fca64eca050... record new: [178] 0c0000a600010000000000a603001d20887a5951e8068d2d4e588fca64eca050... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [178] 0c0000a600010000000000a603001d20887a5951e8068d2d4e588fca64eca050... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfeff92b455c726... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [450] 0b0001b600010000000001b60001b30001b0308201ac30820115a00302010202... record new: [0] record old: [180] 0c0000a800020000000000a803001d20c7cd522ecebf39815cf2b3c73920f080... record new: [180] 0c0000a800010000000000a803001d20c7cd522ecebf39815cf2b3c73920f080... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [180] 0c0000a800010000000000a803001d20c7cd522ecebf39815cf2b3c73920f080... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefd21c17685c4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExch/3 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [530] 0200005d0302b6b6f4bf617f814a2255cb745a20e827c9aa2102a4948f27eb12... record new: [215] 0200005d0302b6b6f4bf617f814a2255cb745a20e827c9aa2102a4948f27eb12... Dropping handshake: 12 record old: [215] 0200005d0302b6b6f4bf617f814a2255cb745a20e827c9aa2102a4948f27eb12... record new: [101] 0200005d0302b6b6f4bf617f814a2255cb745a20e827c9aa2102a4948f27eb12... server: Filtered packet: [106] 16030200650200005d0302b6b6f4bf617f814a2255cb745a20e827c9aa2102a4... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/0 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [532] 0200005d0303be20f0ebecd3a66f8bc924b30879d797f385cfaa299c95808522... record new: [217] 0200005d0303be20f0ebecd3a66f8bc924b30879d797f385cfaa299c95808522... Dropping handshake: 12 record old: [217] 0200005d0303be20f0ebecd3a66f8bc924b30879d797f385cfaa299c95808522... record new: [101] 0200005d0303be20f0ebecd3a66f8bc924b30879d797f385cfaa299c95808522... server: Filtered packet: [106] 16030300650200005d0303be20f0ebecd3a66f8bc924b30879d797f385cfaa29... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/1 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [122] 0c00006e000200000000006e03001d20fcb7dd29858be21af9760734bc7a06ae... record new: [122] 0c00006e000100000000006e03001d20fcb7dd29858be21af9760734bc7a06ae... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [122] 0c00006e000100000000006e03001d20fcb7dd29858be21af9760734bc7a06ae... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16feff000000000000000000690200005d000000000000005dfeff1e45cce063... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/2 (5 ms) [ RUN ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [323] 0b00013700010000000001370001340001313082012d3081d5a0030201020201... record new: [0] record old: [124] 0c000070000200000000007003001d20d66558944baf1cc104969b86f8d0e4da... record new: [124] 0c000070000100000000007003001d20d66558944baf1cc104969b86f8d0e4da... record old: [12] 0e0000000003000000000000 record new: [12] 0e0000000002000000000000 Dropping handshake: 12 record old: [124] 0c000070000100000000007003001d20d66558944baf1cc104969b86f8d0e4da... record new: [0] record old: [12] 0e0000000002000000000000 record new: [12] 0e0000000001000000000000 server: Filtered packet: [169] 16fefd000000000000000000690200005d000000000000005dfefd0ef4a5183b... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_DONE: SSL received an unexpected Server Hello Done handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] SkipVariants/TlsSkipTest.SkipCertAndKeyExchEcdsa/3 (5 ms) [----------] 32 tests from SkipVariants/TlsSkipTest (156 ms total) [----------] 10 tests from Skip13Variants/Tls13SkipTest [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [617] 0b0001b9000001b50001b0308201ac30820115a003020102020102300d06092a... server: Filtered packet: [734] 160303005a020000560303c2b579a37f285f9876df10cf32861ab8043562d94b... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 8 record old: [50] 0800002600010000000000260024000a00160014001d00170018001963990100... record new: [0] record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [453] 0b0001b900010000000001b9000001b50001b0308201ac30820115a003020102... record old: [144] 0f00008400030000000000840804008036e3d37197cf1c5bae70d16e47b5f8d0... record new: [144] 0f00008400020000000000840804008036e3d37197cf1c5bae70d16e47b5f8d0... record old: [44] 140000200004000000000020d943ee56f4fa54283ebfb5f9b27649470275bc64... record new: [44] 140000200003000000000020d943ee56f4fa54283ebfb5f9b27649470275bc64... server: Filtered packet: [840] 16fefd00000000000000000062020000560000000000000056fefd58870c1006... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERTIFICATE: SSL received an unexpected Certificate handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipEncryptedExtensions/1 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [214] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [331] 160303005a02000056030300b8c579188d025580b79c33a040e2c8e3f65fe2d0... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [0] record old: [144] 0f000084000300000000008408040080a4087a62b2acb0558a645e9dc5e9de66... record new: [144] 0f000084000200000000008408040080a4087a62b2acb0558a645e9dc5e9de66... record old: [44] 14000020000400000000002058f61da16b4ce4ca8bd4bb901ca651ce49273748... record new: [44] 14000020000300000000002058f61da16b4ce4ca8bd4bb901ca651ce49273748... server: Filtered packet: [437] 16fefd00000000000000000062020000560000000000000056fefdc46b2f07d9... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificate/1 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [523] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [640] 160303005a020000560303d0daba36fd2d4946ead58ae469a26a7740a906596d... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/0 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f00008400030000000000840804008087f87ed2cfdf6ed1d35ef26c6997573b... record new: [0] record old: [44] 14000020000400000000002026bfc0ef03bd1795ad8a78c2fc856aee6243da49... record new: [44] 14000020000300000000002026bfc0ef03bd1795ad8a78c2fc856aee6243da49... server: Filtered packet: [746] 16fefd00000000000000000062020000560000000000000056fefdd3cb898da7... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 10 server: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. server: Changing state from CONNECTING to ERROR [ OK ] Skip13Variants/Tls13SkipTest.SkipServerCertificateVerify/1 (6 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [172] 0f00008408040080a151eebc126bec83aa6df971b0d7d6ab7a3a7ff8f44f83b0... client: Filtered packet: [194] 17030300bdded35b0cf9eb611bf0713dc3fe67ba8cea94953884e89745b122f5... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/0 (9 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 11 record old: [459] 0b0001bf00010000000001bf000001bb0001b6308201b23082011ba003020102... record new: [0] record old: [144] 0f000084000200000000008408040080df6282e2ec628c0e32d61ae778e9cb36... record new: [144] 0f000084000100000000008408040080df6282e2ec628c0e32d61ae778e9cb36... record old: [44] 140000200003000000000020678b7f6b227f200b6cf9ce2a74e878f18f586132... record new: [44] 140000200002000000000020678b7f6b227f200b6cf9ce2a74e878f18f586132... client: Filtered packet: [254] 2e4631001150e0852c5c1cf5972e49f368bd583f91a62ea2e800a1a209992cc5... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificate/1 (9 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [623] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... record new: [487] 0b0001bf000001bb0001b6308201b23082011ba003020102020101300d06092a... client: Filtered packet: [509] 17030301f865d94f32d7335baf682e9a838e5ad3afe14b5f68564a8a2db91d7c... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/0 (10 ms) [ RUN ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Dropping handshake: 15 record old: [144] 0f000084000200000000008408040080ac34ef19fe40f19fa257776848db9d42... record new: [0] record old: [44] 14000020000300000000002012717ce54fcb1f33f5ec44619ff0ca3a478f8b60... record new: [44] 14000020000200000000002012717ce54fcb1f33f5ec44619ff0ca3a478f8b60... client: Filtered packet: [569] 2e39d001dc8cd10b075e34784ffcd6ff99ed34139d272dcbbe0a6d795c0552ad... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] Skip13Variants/Tls13SkipTest.SkipClientCertificateVerify/1 (9 ms) [----------] 10 tests from Skip13Variants/Tls13SkipTest (78 ms total) [----------] 136 tests from GenericStream/TlsConnectGenericResumption [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/6 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectClientCacheDisabled/7 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/6 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectServerCacheDisabled/7 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectSessionCacheDisabled/7 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeSupportBoth/7 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/7 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/6 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/6 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/7 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/6 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/7 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/7 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/6 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/7 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (14 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/6 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/7 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (14 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/7 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/1 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/3 (8 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/4 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/5 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/6 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectTicket/7 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/0 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/1 (15 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/2 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/3 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/4 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/5 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/6 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ReConnectAgainTicket/7 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (14 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/6 (17 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ConnectResumeClientAuth/7 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (15 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (15 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/6 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/7 (16 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/6 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericStream/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/7 (12 ms) [----------] 136 tests from GenericStream/TlsConnectGenericResumption (1702 ms total) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/3 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/4 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectClientCacheDisabled/5 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/3 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/4 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectServerCacheDisabled/5 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/3 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/4 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectSessionCacheDisabled/5 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/4 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeSupportBoth/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/3 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/4 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientTicketServerBoth/5 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothTicketServerTicket/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/3 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/4 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientServerTicketOnly/5 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/3 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/4 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientBothServerNone/5 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/3 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/4 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientNoneServerBoth/5 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/3 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/4 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectWithExpiredTicketAtClient/5 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/0 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/1 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/3 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/4 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeClientIncompatibleCipher/5 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/0 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/1 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/3 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/4 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ResumeServerIncompatibleCipher/5 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/1 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/3 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/4 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectTicket/5 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/0 (17 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/1 (15 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/3 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/4 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ReConnectAgainTicket/5 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/0 (16 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/1 (14 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/2 (15 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/3 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/4 (16 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ConnectResumeClientAuth/5 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/0 (17 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/1 (15 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/2 (15 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/3 (15 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/4 (16 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumption/5 (15 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/2 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/3 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/4 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] GenericDatagram/TlsConnectGenericResumption.ClientAuthRequiredOnResumptionNoCert/5 (12 ms) [----------] 102 tests from GenericDatagram/TlsConnectGenericResumption (1296 ms total) [----------] 14 tests from Pre12Stream/TlsConnectPre12 [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (12 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithHigherVersionTls12/1 (12 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (12 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ResumeWithLowerVersionFromTls12/1 (12 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/0 (50 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/1 (50 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/0 (22 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/1 (22 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (8 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/1 (8 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: TLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/0 (2 ms) [ RUN ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 Version: TLS 1.1 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Stream/TlsConnectPre12.ServerAuthRsaPssFails/1 (2 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (10 ms) [ RUN ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Stream/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/1 (10 ms) [----------] 14 tests from Pre12Stream/TlsConnectPre12 (243 ms total) [----------] 7 tests from Pre12Datagram/TlsConnectPre12 [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithHigherVersionTls12/0 (11 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ResumeWithLowerVersionFromTls12/0 (11 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/0 (49 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/0 (23 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_HASH_ALGORITHM: Unsupported hash algorithm used by TLS peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ConnectSigAlgDisabledByPolicyDhePre12/0 (8 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 Version: DTLS 1.0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Pre12Datagram/TlsConnectPre12.ServerAuthRsaPssFails/0 (2 ms) [ RUN ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] Pre12Datagram/TlsConnectPre12.SignatureAlgorithmNoOverlapEcdsa/0 (10 ms) [----------] 7 tests from Pre12Datagram/TlsConnectPre12 (119 ms total) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.CheckSessionId/3 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/3 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (13 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/3 (12 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (11 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (9 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (10 ms) [ RUN ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericStream/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/3 (10 ms) [----------] 20 tests from GenericStream/TlsConnectGenericResumptionToken (213 ms total) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/0 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.CheckSessionId/2 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/0 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfo/2 (10 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/0 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketClient/2 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/0 (13 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/1 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.RefuseExpiredTicketServer/2 (12 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/0 (11 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/1 (9 ms) [ RUN ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectGenericResumptionToken.ConnectResumeGetInfoAlpn/2 (9 ms) [----------] 15 tests from GenericDatagram/TlsConnectGenericResumptionToken (163 ms total) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/0 (11 ms) [ RUN ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: setting external resumption token 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] GenericDatagram/TlsConnectTls13ResumptionToken.ConnectResumeGetInfoZeroRtt/1 (11 ms) [----------] 2 tests from GenericDatagram/TlsConnectTls13ResumptionToken (23 ms total) [----------] 88 tests from TlsPadding/TlsPaddingTest [ RUN ] TlsPadding/TlsPaddingTest.Correct/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.Correct/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.Correct/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.Correct/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.Correct/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.Correct/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.Correct/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.Correct/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410101 [ OK ] TlsPadding/TlsPaddingTest.Correct/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.Correct/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414100 [ OK ] TlsPadding/TlsPaddingTest.Correct/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/19 Content length=287 padding length=0 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.Correct/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.Correct/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/0 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0e10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/2 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0c20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/4 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0b20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/6 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/8 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/9 Content length=31 padding length=0 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141414120 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/10 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/12 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/14 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/15 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/16 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/17 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/18 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/19 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/20 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.PadTooLong/21 [ OK ] TlsPadding/TlsPaddingTest.PadTooLong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fffefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410f0e0e0e0e0e0e0e0e0e0e0e0e0e0e [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fdfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410d0c0c0c0c0c0c0c0c0c0c0c0c [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fcfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410c0b0b0b0b0b0b0b0b0b0b0b [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f2f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f1... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.FirstByteOfPadWrong/21 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 Content length=1 padding length=254 total length=256 Plaintext: [256] 41fefefefefefefefefefefefefefefefefefefefefefefefefefefefefefefe... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/0 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 Content length=1 padding length=14 total length=16 Plaintext: [16] 410e0e0e0e0e0e0e0e0e0e0e0e0e0f0e [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/1 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 Content length=19 padding length=252 total length=272 Plaintext: [272] 41414141414141414141414141414141414141fcfcfcfcfcfcfcfcfcfcfcfcfc... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/2 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 Content length=19 padding length=12 total length=32 Plaintext: [32] 414141414141414141414141414141414141410c0c0c0c0c0c0c0c0c0c0c0d0c [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/3 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 Content length=20 padding length=251 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141fbfbfbfbfbfbfbfbfbfbfbfb... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/4 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 Content length=20 padding length=11 total length=32 Plaintext: [32] 41414141414141414141414141414141414141410b0b0b0b0b0b0b0b0b0b0c0b [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/5 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 Content length=30 padding length=241 total length=272 Plaintext: [272] 414141414141414141414141414141414141414141414141414141414141f1f1... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/6 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 Content length=30 padding length=1 total length=32 Plaintext: [32] 4141414141414141414141414141414141414141414141414141414141410201 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/7 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 Content length=31 padding length=240 total length=272 Plaintext: [272] 41414141414141414141414141414141414141414141414141414141414141f0... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/8 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/9 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 Content length=32 padding length=255 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/10 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 Content length=32 padding length=15 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/11 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 Content length=36 padding length=251 total length=288 Plaintext: [288] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/12 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 Content length=36 padding length=11 total length=48 Plaintext: [48] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/13 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 Content length=256 padding length=255 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/14 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 Content length=256 padding length=15 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/15 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 Content length=257 padding length=254 total length=512 Plaintext: [512] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/16 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 Content length=257 padding length=14 total length=272 Plaintext: [272] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/17 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 Content length=287 padding length=240 total length=528 Plaintext: [528] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/18 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/19 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 Content length=288 padding length=255 total length=544 Plaintext: [544] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/20 (0 ms) [ RUN ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 Content length=288 padding length=15 total length=304 Plaintext: [304] 4141414141414141414141414141414141414141414141414141414141414141... [ OK ] TlsPadding/TlsPaddingTest.LastByteOfPadWrong/21 (0 ms) [----------] 88 tests from TlsPadding/TlsPaddingTest (3 ms total) [----------] 12 tests from ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13 [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakeTest Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [22] 1703030011c870dd9d573f118302eb1d90587b0aa037 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakeTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakePadding1BTest Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [23] 170303001278f116938b969de7100afd1d958a8588749c server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakePadding1BTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakePadding100BTest Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [122] 17030300757750b86e5780cb727bb7fffacba2a73231a3f073642a0e3a9cdd51... server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_MALFORMED_HANDSHAKE: SSL received a malformed Handshake record. client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakePadding100BTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertTest Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [22] 17030300116bebf3781787aac9b9b378bb702ff150b0 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertPadding1BTest Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [23] 17030300120d10b1c9fd9a8e7113096ccf8d9741163157 server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertPadding1BTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertPadding100BTest Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [122] 17030300759d1535165c91b472cbc3ab34e9d45865ae3630f753e75ac07d35f8... server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertPadding100BTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakeTest Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [22] 2f9e4d001101f0ae40ccc3ddd3a5029296a406a30f39 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakeTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakePadding1BTest Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [23] 2fc71e001240aa2d3f4d4dc10ad77c1315100b76198de6 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakePadding1BTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakePadding100BTest Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [122] 2f75010075f765a713df3aff45a38210da6a9bc5cc75ac9f9db093e12bf22834... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakePadding100BTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertTest Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [22] 2f6875001139bc7dcd8b38a1d956b82796fcd9209db2 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertPadding1BTest Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [23] 2f3e3c00128c4641095abef66dd4a3d9940014e39b07d1 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertPadding1BTest (6 ms) [ RUN ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertPadding100BTest Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [122] 2f20ed007598e5720b624f2fb949af8e6580b584a758a4243cf84b2199a94e25... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13.ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertPadding100BTest (6 ms) [----------] 12 tests from ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13 (75 ms total) [----------] 30 tests from ZeroLengthRecordTest/ZeroLengthRecordSetup [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthHandshakeTest Version: TLS 1.3 client: Send Direct [5] 16dead0000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthHandshakeTest (6 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthAlertTest Version: TLS 1.3 client: Send Direct [5] 15dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthAlertTest (3 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthChangeCipherSpecTest Version: TLS 1.3 client: Send Direct [5] 14dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthChangeCipherSpecTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthApplicationDataTest Version: TLS 1.3 client: Send Direct [5] 17dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthApplicationDataTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthAckTest Version: TLS 1.3 client: Send Direct [5] 1adead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_3ZeroLengthAckTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthHandshakeTest Version: TLS 1.2 client: Send Direct [5] 16dead0000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthHandshakeTest (5 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthAlertTest Version: TLS 1.2 client: Send Direct [5] 15dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthAlertTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthChangeCipherSpecTest Version: TLS 1.2 client: Send Direct [5] 14dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthChangeCipherSpecTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthApplicationDataTest Version: TLS 1.2 client: Send Direct [5] 17dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthApplicationDataTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthAckTest Version: TLS 1.2 client: Send Direct [5] 1adead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_2ZeroLengthAckTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthHandshakeTest Version: TLS 1.1 client: Send Direct [5] 16dead0000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthHandshakeTest (6 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthAlertTest Version: TLS 1.1 client: Send Direct [5] 15dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthAlertTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthChangeCipherSpecTest Version: TLS 1.1 client: Send Direct [5] 14dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CHANGE_CIPHER: SSL received a malformed Change Cipher Spec record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthChangeCipherSpecTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthApplicationDataTest Version: TLS 1.1 client: Send Direct [5] 17dead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_APPLICATION_DATA: SSL received an unexpected Application Data record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthApplicationDataTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthAckTest Version: TLS 1.1 client: Send Direct [5] 1adead0000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 10 client: Handshake failed with error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Tls1_1ZeroLengthAckTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthHandshakeTest Version: DTLS 1.3 client: Send Direct [13] 16dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthHandshakeTest (57 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthAlertTest Version: DTLS 1.3 client: Send Direct [13] 15dead00000000000000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthAlertTest (3 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthChangeCipherSpecTest Version: DTLS 1.3 client: Send Direct [13] 14dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthChangeCipherSpecTest (58 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthApplicationDataTest Version: DTLS 1.3 client: Send Direct [13] 17dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthApplicationDataTest (6 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthAckTest Version: DTLS 1.3 client: Send Direct [13] 1adead00000000000000000000 server: Changing state from INIT to CONNECTING ssl_record_unittest.cc:551: Skipped [ SKIPPED ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthAckTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthHandshakeTest Version: DTLS 1.2 client: Send Direct [13] 16dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthHandshakeTest (57 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthAlertTest Version: DTLS 1.2 client: Send Direct [13] 15dead00000000000000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthAlertTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthChangeCipherSpecTest Version: DTLS 1.2 client: Send Direct [13] 14dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthChangeCipherSpecTest (57 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthApplicationDataTest Version: DTLS 1.2 client: Send Direct [13] 17dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthApplicationDataTest (6 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthAckTest Version: DTLS 1.2 client: Send Direct [13] 1adead00000000000000000000 server: Changing state from INIT to CONNECTING server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR server: Changing state from ERROR to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_2ZeroLengthAckTest (57 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthHandshakeTest Version: DTLS 1.0 client: Send Direct [13] 16dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthHandshakeTest (58 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthAlertTest Version: DTLS 1.0 client: Send Direct [13] 15dead00000000000000000000 server: Changing state from INIT to CONNECTING server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_ALERT: SSL received a malformed Alert record. server: Changing state from CONNECTING to ERROR client: Changing state from INIT to CONNECTING client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthAlertTest (2 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthChangeCipherSpecTest Version: DTLS 1.0 client: Send Direct [13] 14dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthChangeCipherSpecTest (57 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthApplicationDataTest Version: DTLS 1.0 client: Send Direct [13] 17dead00000000000000000000 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthApplicationDataTest (6 ms) [ RUN ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthAckTest Version: DTLS 1.0 client: Send Direct [13] 1adead00000000000000000000 server: Changing state from INIT to CONNECTING server: Handshake failed with error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Changing state from CONNECTING to ERROR server: Changing state from ERROR to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_1ZeroLengthAckTest (57 ms) [----------] 30 tests from ZeroLengthRecordTest/ZeroLengthRecordSetup (544 ms total) [----------] 16 tests from UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/0 (3 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/1 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/2 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/3 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. client: Warning alert sent: 0 [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/0 (6 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/1 (5 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/2 (5 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [10] ffdead0005aabbccddee server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. client: Fatal alert received: 10 client: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/3 (5 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/0 (5 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/1 (4 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/2 (4 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/3 (5 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert sent: 10 server: Read error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/0 (5 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/1 (4 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/2 (4 ms) [ RUN ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [10] ffdead0005aabbccddee client: Fatal alert sent: 10 client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. server: Fatal alert received: 10 server: Read error SSL_ERROR_HANDSHAKE_UNEXPECTED_ALERT: SSL peer was not expecting a handshake message it received. [ OK ] UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/3 (4 ms) [----------] 16 tests from UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup (74 ms total) [----------] 12 tests from UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [18] ffdead00000000000000000005aabbccddee server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/0 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [18] ffdead00000000000000000005aabbccddee server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/1 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [18] ffdead00000000000000000005aabbccddee server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePreClientHello/2 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [18] ffdead00000000000000010005aabbccddee server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/0 (5 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [18] ffdead00000000000000010005aabbccddee server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/1 (4 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Send Direct [18] ffdead00000000000000010005aabbccddee server: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ServerReceiveUndefinedContentTypePostClientHello/2 (4 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [18] ffdead00000000000000000005aabbccddee client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/0 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [18] ffdead00000000000000000005aabbccddee client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/1 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [18] ffdead00000000000000000005aabbccddee client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePreClientHello/2 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [18] ffdead00000000000000010005aabbccddee client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/0 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [18] ffdead00000000000000010005aabbccddee client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/1 (2 ms) [ RUN ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Send Direct [18] ffdead00000000000000010005aabbccddee client: Read error SSL_ERROR_RX_UNKNOWN_RECORD_TYPE: SSL received a record with an unknown content type. [ OK ] UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup.ClientReceiveUndefinedContentTypePostClientHello/2 (2 ms) [----------] 12 tests from UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup (38 ms total) [----------] 60 tests from GenericMasking/VariantSuiteTest [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextNoLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskNoSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskNoSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskShortSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskShortSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedMech/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 [ OK ] GenericMasking/VariantSuiteTest.MaskContextUnsupportedVersion/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMaxLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/0 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/1 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/2 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/3 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/4 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskMinLength/5 [ OK ] GenericMasking/VariantSuiteTest.MaskMinLength/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateLabel/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRotateSample/5 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/0 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/0 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/1 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/1 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/2 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/2 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/3 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/3 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/4 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/4 (0 ms) [ RUN ] GenericMasking/VariantSuiteTest.MaskRederive/5 [ OK ] GenericMasking/VariantSuiteTest.MaskRederive/5 (0 ms) [----------] 60 tests from GenericMasking/VariantSuiteTest (1 ms total) [----------] 3 tests from GenericMasking/SuiteTest [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/0 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/1 (0 ms) [ RUN ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 [ OK ] GenericMasking/SuiteTest.MaskTlsVariantKeySeparation/2 (0 ms) [----------] 3 tests from GenericMasking/SuiteTest (0 ms total) [----------] 2 tests from GenericMasking/VariantTest [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/0 (0 ms) [ RUN ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 [ OK ] GenericMasking/VariantTest.MaskChaChaRederiveOddSizes/1 (0 ms) [----------] 2 tests from GenericMasking/VariantTest (0 ms total) [----------] 24 tests from DatagramOnly/TlsConnectDatagram [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/0 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/1 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ConnectSrtp/2 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/0 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/1 (5 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ShortRead/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error SSL_ERROR_RX_SHORT_DTLS_READ: Not enough room in buffer for DTLS record. client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ShortRead/2 (5 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/0 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/1 (5 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.BlockedWrite/2 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [233] 16feff00000000000000000067010000b7000000000000005bfefdc89ae448d2... client: Filtered packet: [66] 2e9cec003d10ab18662cb977346ae731a0b3239039b0a2f439c3066d2bc96915... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Filtered packet: [72] 2f16d900431cd4043b80a0829c3a0d6dc9ee59c54f9c60f177f2c0de8757bdf5... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [24] 2ff35300139ae674dfbb41e4bdd7bdfd06f2fe36f9a3d80b client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/0 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [234] 16feff00000000000000000068010000b8000000000000005cfefdc6f35c53d3... client: Filtered packet: [158] 16fefd0000000000000002001c1000002100010000000000102049aff02f7b18... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Filtered packet: [87] 17fefd0001000000000001004a00010000000000018683b5404597253f1c50de... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [39] 15fefd0001000000000002001a0001000000000002c7f4fe0198b0e77f771afe... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/1 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [164] 16feff00000000000000000045010000720000000000000039feffbb6352d682... client: Filtered packet: [174] 16feff0000000000000002001c10000021000100000000001020516b83278237... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Filtered packet: [109] 17feff0001000000000001006084e64a09c74e6d43351b07ceeb678f5d2bcbe4... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Filtered packet: [61] 15feff0001000000000002003039414b4b9cfde47484d02079b9d45b33dcb4aa... client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentClientPackets/2 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [915] 16fefd0000000000000000003702000056000000000000002bfefd687e78703f... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Filtered packet: [40] 2fe6db0023ca57ebfab09b45996a8ecd406289a8be988d98258bc0201717fa6c... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Filtered packet: [72] 2f34fb0043ea7956553898332d573d01825d6c4fad561e85d073cb86f2c2347d... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/0 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [874] 16fefd0000000000000000003a0200005d000000000000002efefd41697906a9... server: Filtered packet: [75] 14fefd000000000000000700010116fefd000100000000000000300001000000... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Filtered packet: [87] 17fefd0001000000000001004a0001000000000001b801261e2986f19ffa5e1d... server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/1 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [872] 16feff0000000000000000003a0200005d000000000000002efeff7d3d18b3c4... server: Filtered packet: [91] 14feff000000000000000700010116feff0001000000000000004025617ed900... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Filtered packet: [109] 17feff000100000000000100607123db74961abd94220ef02989cadda1ea4177... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.FragmentServerPackets/2 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/0 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/1 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.MissLotsOfPackets/2 (6 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [796] 2cfefd00000000000000000004010203042e80e100438bd2b51ee0f0b53a5342... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/0 (57 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [698] 17fefd000000000000000000040102030416fefd000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/1 (54 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Filtered packet: [696] 17feff000000000000000000040102030416feff000000000000000101c20b00... server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstServerRecordWithApplicationData/2 (54 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/0 (58 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/1 (57 ms) [ RUN ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Filtered packet: [17] 17feff0000000000000000000401020304 server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramOnly/TlsConnectDatagram.ReplaceFirstClientRecordWithApplicationData/2 (58 ms) [----------] 24 tests from DatagramOnly/TlsConnectDatagram (452 ms total) [----------] 6 tests from DatagramHolddown/TlsHolddownTest [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Expiring holddown timer server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/0 (6 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Expiring holddown timer client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/1 (6 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Expiring holddown timer client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiry/2 (6 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/0 (11 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/1 (8 ms) [ RUN ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramHolddown/TlsHolddownTest.TestDtlsHolddownExpiryResumption/2 (9 ms) [----------] 6 tests from DatagramHolddown/TlsHolddownTest (48 ms total) [----------] 40 tests from Version12Only/TlsConnectTls12 [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectExtendedMasterSecretSha384/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/0 (76 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectEcdheP384/1 (76 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d205c1fb353000bf6693852bc1d3c7986c1f9fc379e39dcef58a63e860f... handshake new: [168] 03001d205c1fb353000bf6693852bc1d3c7986c1f9fc379e39dcef58a63e860f... record old: [715] 0200005d0303a87fd30ee89263d0cc0da7c6759d11c05c929213e698e60908d3... record new: [715] 0200005d0303a87fd30ee89263d0cc0da7c6759d11c05c929213e698e60908d3... server: Filtered packet: [720] 16030302cb0200005d0303a87fd30ee89263d0cc0da7c6759d11c05c929213e6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/0 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20c08ff559030b043b69a01e3e45ebfe90ccbe7b0a472b1118266c4cf3... handshake new: [168] 03001d20c08ff559030b043b69a01e3e45ebfe90ccbe7b0a472b1118266c4cf3... record old: [180] 0c0000a800020000000000a803001d20c08ff559030b043b69a01e3e45ebfe90... record new: [180] 0c0000a800020000000000a803001d20c08ff559030b043b69a01e3e45ebfe90... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefd3701e593fd... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectUnsupportedSigAlg/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20d01a935f78e7ecbdeaaecebb30075c9b5bded07b527e931ce9a049de... handshake new: [168] 03001d20d01a935f78e7ecbdeaaecebb30075c9b5bded07b527e931ce9a049de... record old: [715] 0200005d0303264fefc44a60ef3fb00443afa7dc61250dbf91ea75baf6a037f9... record new: [715] 0200005d0303264fefc44a60ef3fb00443afa7dc61250dbf91ea75baf6a037f9... server: Filtered packet: [720] 16030302cb0200005d0303264fefc44a60ef3fb00443afa7dc61250dbf91ea75... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/0 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [168] 03001d20d7b0655c592287c2c031e0a17994dfdd4bf0b11c167a19a820ccba56... handshake new: [168] 03001d20d7b0655c592287c2c031e0a17994dfdd4bf0b11c167a19a820ccba56... record old: [180] 0c0000a800020000000000a803001d20d7b0655c592287c2c031e0a17994dfdd... record new: [180] 0c0000a800020000000000a803001d20d7b0655c592287c2c031e0a17994dfdd... server: Filtered packet: [799] 16fefd000000000000000000690200005d000000000000005dfefdfc79a44b4d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectIncorrectSigAlg/1 (4 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/0 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicy/1 (5 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicy/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303e669af65b8f69662d4828c55de88124730082fb3db100fa72153... record new: [1192] 020000570303e669af65b8f69662d4828c55de88124730082fb3db100fa72153... server: Filtered packet: [1197] 16030304a8020000570303e669af65b8f69662d4828c55de88124730082fb3db... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/0 (10 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd399efaef22... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.ConnectInconsistentSigAlgDHE/1 (10 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/0 (21 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgEnabledByPolicyDhe/1 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/0 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisabledByPolicyDhe/1 (22 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisablePreferredGroupByOption3072Dhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisablePreferredGroupByOption3072Dhe/0 (48 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisablePreferredGroupByOption3072Dhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisablePreferredGroupByOption3072Dhe/1 (48 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisableGroupByOption3072Dhe/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisableGroupByOption3072Dhe/0 (49 ms) [ RUN ] Version12Only/TlsConnectTls12.ConnectSigAlgDisableGroupByOption3072Dhe/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ConnectSigAlgDisableGroupByOption3072Dhe/1 (48 ms) [ RUN ] Version12Only/TlsConnectTls12.AutoClientSelectRsaPss/0 Version: TLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Match name="rsa2048" expected="rsa2048" Match name="client" expected="client" Match name="delegator_rsa_pss2048" expected="delegator_rsa_pss2048" server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.AutoClientSelectRsaPss/0 (89 ms) [ RUN ] Version12Only/TlsConnectTls12.AutoClientSelectRsaPss/1 Version: DTLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Match name="rsa2048" expected="rsa2048" Match name="client" expected="client" Match name="delegator_rsa_pss2048" expected="delegator_rsa_pss2048" server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.AutoClientSelectRsaPss/1 (85 ms) [ RUN ] Version12Only/TlsConnectTls12.AutoClientSelectEcc/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Match name="delegator_ecdsa256" expected="delegator_ecdsa256" server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.AutoClientSelectEcc/0 (70 ms) [ RUN ] Version12Only/TlsConnectTls12.AutoClientSelectEcc/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Match name="delegator_ecdsa256" expected="delegator_ecdsa256" server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.AutoClientSelectEcc/1 (70 ms) [ RUN ] Version12Only/TlsConnectTls12.AutoClientSelectDsa/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Match name="dsa" expected="dsa" server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.AutoClientSelectDsa/0 (74 ms) [ RUN ] Version12Only/TlsConnectTls12.AutoClientSelectDsa/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Match name="dsa" expected="dsa" server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.AutoClientSelectDsa/1 (75 ms) [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.ServerAuthCheckSigAlg/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/0 (10 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeCurveMismatch/1 (10 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/0 (10 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.SignatureSchemeBadConfig/1 (10 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [187] 0303923de9e6066d8135803a77a193e5ee46b3e5b3b4e4694ac95949dacff2f7... handshake new: [151] 0303923de9e6066d8135803a77a193e5ee46b3e5b3b4e4694ac95949dacff2f7... record old: [191] 010000bb0303923de9e6066d8135803a77a193e5ee46b3e5b3b4e4694ac95949... record new: [155] 010000970303923de9e6066d8135803a77a193e5ee46b3e5b3b4e4694ac95949... client: Filtered packet: [160] 160301009b010000970303923de9e6066d8135803a77a193e5ee46b3e5b3b4e4... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [32] 001e040305030603020308040805080604010501060102010402050206020202 handshake old: [184] fefd5676ac76a92902dd7665d1b46ed0ac449ec15dc2ee4330ef6ec15533391d... handshake new: [148] fefd5676ac76a92902dd7665d1b46ed0ac449ec15dc2ee4330ef6ec15533391d... record old: [196] 010000b800000000000000b8fefd5676ac76a92902dd7665d1b46ed0ac449ec1... record new: [160] 010000940000000000000094fefd5676ac76a92902dd7665d1b46ed0ac449ec1... client: Filtered packet: [173] 16feff000000000000000000a0010000940000000000000094fefd5676ac76a9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.SignatureAlgorithmDrop/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/0 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Only/TlsConnectTls12.RequestClientAuthWithSha384/1 (6 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/0 (1 ms) [ RUN ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Only/TlsConnectTls12.Tls12CertDisabledGroup/1 (1 ms) [----------] 40 tests from Version12Only/TlsConnectTls12 (1064 ms total) [----------] 16 tests from Version12Plus/TlsConnectTls12Plus [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 Version: TLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/0 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 Version: TLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/1 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 Version: DTLS 1.3 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/2 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 Version: DTLS 1.2 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPss/3 (6 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 Version: TLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/0 (13 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 Version: TLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/1 (13 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 Version: DTLS 1.3 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/2 (14 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 Version: DTLS 1.2 Reset server:rsa_pss_noparam, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] Version12Plus/TlsConnectTls12Plus.ServerAuthRsaPssNoParameters/3 (15 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/1 (1 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.SignatureAlgorithmNoOverlapEcdsa/3 (1 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 Version: TLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/0 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/1 (1 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 Version: DTLS 1.3 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/2 (2 ms) [ RUN ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] Version12Plus/TlsConnectTls12Plus.MisconfiguredCertScheme/3 (1 ms) [----------] 16 tests from Version12Plus/TlsConnectTls12Plus (99 ms total) [----------] 8 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/0 (19 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrr/1 (19 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.SecondClientHelloPreambleMatches/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.SecondClientHelloPreambleMatches/0 (21 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.SecondClientHelloPreambleMatches/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.SecondClientHelloPreambleMatches/1 (21 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/0 (19 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.ConnectEcdhePreferenceMismatchHrrExtraShares/1 (19 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 (20 ms) [ RUN ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] HelloRetryRequestKeyExchangeTests/TlsKeyExchange13.RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 (20 ms) [----------] 8 tests from HelloRetryRequestKeyExchangeTests/TlsKeyExchange13 (162 ms total) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/0 (14 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... Process message: [77] 16030400000000000000010040020000340001000000000034fefdcf21ad74e5... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HELLO_RETRY_REQUEST: SSL received an unexpected Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.SendSecondHelloRetryRequest/1 (14 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [61] 1603040038020000340303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/0 (1 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [77] 16030400000000000000000040020000340000000000000034fefdcf21ad74e5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleBogusHelloRetryRequest/1 (1 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 client: Changing state from INIT to CONNECTING Process message: [55] 16030400320200002e0303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/0 (1 ms) [ RUN ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 client: Changing state from INIT to CONNECTING Process message: [71] 1603040000000000000000003a0200002e000000000000002efefdcf21ad74e5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_HELLO_RETRY_REQUEST: SSL received a malformed Hello Retry Request handshake message. client: Changing state from CONNECTING to ERROR [ OK ] HelloRetryRequestAgentTests/HelloRetryRequestAgentTest.HandleNoopHelloRetryRequest/1 (1 ms) [----------] 6 tests from HelloRetryRequestAgentTests/HelloRetryRequestAgentTest (33 ms total) [----------] 72 tests from ExtensionStream/TlsExtensionTestGeneric [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [182] 0303781b8845402f004adb8c14b841a831be58a12921237a737ac051dffb7317... handshake new: [182] 0303781b8845402f004adb8c14b841a831be58a12921237a737ac051dffb7317... record old: [186] 010000b60303781b8845402f004adb8c14b841a831be58a12921237a737ac051... record new: [186] 010000b60303781b8845402f004adb8c14b841a831be58a12921237a737ac051... client: Filtered packet: [191] 16030100ba010000b60303781b8845402f004adb8c14b841a831be58a1292123... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [187] 0303cadb22387a6175c6477439cbc55aa5d68a783ebc6d392eaff7ee51457d2f... handshake new: [187] 0303cadb22387a6175c6477439cbc55aa5d68a783ebc6d392eaff7ee51457d2f... record old: [191] 010000bb0303cadb22387a6175c6477439cbc55aa5d68a783ebc6d392eaff7ee... record new: [191] 010000bb0303cadb22387a6175c6477439cbc55aa5d68a783ebc6d392eaff7ee... client: Filtered packet: [196] 16030100bf010000bb0303cadb22387a6175c6477439cbc55aa5d68a783ebc6d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 0302c24875044a60cf2b95a860d183dca191da4b65585893292cb9d1ca955c64... handshake new: [117] 0302c24875044a60cf2b95a860d183dca191da4b65585893292cb9d1ca955c64... record old: [121] 010000750302c24875044a60cf2b95a860d183dca191da4b65585893292cb9d1... record new: [121] 010000750302c24875044a60cf2b95a860d183dca191da4b65585893292cb9d1... client: Filtered packet: [126] 1603010079010000750302c24875044a60cf2b95a860d183dca191da4b655858... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [117] 03018c7031b4a4a424716a5e98bec02233de68a9a9d142fcd5675f9611ce0184... handshake new: [117] 03018c7031b4a4a424716a5e98bec02233de68a9a9d142fcd5675f9611ce0184... record old: [121] 0100007503018c7031b4a4a424716a5e98bec02233de68a9a9d142fcd5675f96... record new: [121] 0100007503018c7031b4a4a424716a5e98bec02233de68a9a9d142fcd5675f96... client: Filtered packet: [126] 16030100790100007503018c7031b4a4a424716a5e98bec02233de68a9a9d142... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [182] 03039c187f59e7bc670171f6030b1fec1f5e869a3213c677b75b707c2ab2e7d8... handshake new: [182] 03039c187f59e7bc670171f6030b1fec1f5e869a3213c677b75b707c2ab2e7d8... record old: [186] 010000b603039c187f59e7bc670171f6030b1fec1f5e869a3213c677b75b707c... record new: [186] 010000b603039c187f59e7bc670171f6030b1fec1f5e869a3213c677b75b707c... client: Filtered packet: [191] 16030100ba010000b603039c187f59e7bc670171f6030b1fec1f5e869a3213c6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [187] 030344b16cd7c8828e67aec1c471812ab55ec3609834595735c4556f0582a361... handshake new: [187] 030344b16cd7c8828e67aec1c471812ab55ec3609834595735c4556f0582a361... record old: [191] 010000bb030344b16cd7c8828e67aec1c471812ab55ec3609834595735c4556f... record new: [191] 010000bb030344b16cd7c8828e67aec1c471812ab55ec3609834595735c4556f... client: Filtered packet: [196] 16030100bf010000bb030344b16cd7c8828e67aec1c471812ab55ec360983459... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 0302b22ae2e7ed17e5b4a091f9c30467b883a21521f6a701a2848cc99ca99d4d... handshake new: [117] 0302b22ae2e7ed17e5b4a091f9c30467b883a21521f6a701a2848cc99ca99d4d... record old: [121] 010000750302b22ae2e7ed17e5b4a091f9c30467b883a21521f6a701a2848cc9... record new: [121] 010000750302b22ae2e7ed17e5b4a091f9c30467b883a21521f6a701a2848cc9... client: Filtered packet: [126] 1603010079010000750302b22ae2e7ed17e5b4a091f9c30467b883a21521f6a7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [117] 0301695779d400211c0a8b02fbde2a51c16fc1436752f2ec04e49d5e221d6884... handshake new: [117] 0301695779d400211c0a8b02fbde2a51c16fc1436752f2ec04e49d5e221d6884... record old: [121] 010000750301695779d400211c0a8b02fbde2a51c16fc1436752f2ec04e49d5e... record new: [121] 010000750301695779d400211c0a8b02fbde2a51c16fc1436752f2ec04e49d5e... client: Filtered packet: [126] 1603010079010000750301695779d400211c0a8b02fbde2a51c16fc1436752f2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.DamageSniHostLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [182] 0303155878668c6edb5ded6067232d2b93c14e67b50618f333505a7823072ebf... handshake new: [178] 0303155878668c6edb5ded6067232d2b93c14e67b50618f333505a7823072ebf... record old: [186] 010000b60303155878668c6edb5ded6067232d2b93c14e67b50618f333505a78... record new: [182] 010000b20303155878668c6edb5ded6067232d2b93c14e67b50618f333505a78... client: Filtered packet: [187] 16030100b6010000b20303155878668c6edb5ded6067232d2b93c14e67b50618... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [187] 0303baa7c00c0a3af550e69fc0b61414b684956972343f0af08ddcbad1d7c038... handshake new: [183] 0303baa7c00c0a3af550e69fc0b61414b684956972343f0af08ddcbad1d7c038... record old: [191] 010000bb0303baa7c00c0a3af550e69fc0b61414b684956972343f0af08ddcba... record new: [187] 010000b70303baa7c00c0a3af550e69fc0b61414b684956972343f0af08ddcba... client: Filtered packet: [192] 16030100bb010000b70303baa7c00c0a3af550e69fc0b61414b684956972343f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 0302c99c6d3c017977791843a3e281b8e603a083d63f0bf61ca07742d5f40e21... handshake new: [113] 0302c99c6d3c017977791843a3e281b8e603a083d63f0bf61ca07742d5f40e21... record old: [121] 010000750302c99c6d3c017977791843a3e281b8e603a083d63f0bf61ca07742... record new: [117] 010000710302c99c6d3c017977791843a3e281b8e603a083d63f0bf61ca07742... client: Filtered packet: [122] 1603010075010000710302c99c6d3c017977791843a3e281b8e603a083d63f0b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [117] 03016aa638b00e13e9510a71e198f4cc42b42126efcbfa91ffa7981f71de302a... handshake new: [113] 03016aa638b00e13e9510a71e198f4cc42b42126efcbfa91ffa7981f71de302a... record old: [121] 0100007503016aa638b00e13e9510a71e198f4cc42b42126efcbfa91ffa7981f... record new: [117] 0100007103016aa638b00e13e9510a71e198f4cc42b42126efcbfa91ffa7981f... client: Filtered packet: [122] 16030100750100007103016aa638b00e13e9510a71e198f4cc42b42126efcbfa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.TruncateSni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [182] 0303ddd28a2829802865de0961047af1856979790c0e4e72335823b82ab39a2d... handshake new: [200] 0303ddd28a2829802865de0961047af1856979790c0e4e72335823b82ab39a2d... record old: [186] 010000b60303ddd28a2829802865de0961047af1856979790c0e4e72335823b8... record new: [204] 010000c80303ddd28a2829802865de0961047af1856979790c0e4e72335823b8... client: Filtered packet: [209] 16030100cc010000c80303ddd28a2829802865de0961047af1856979790c0e4e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [187] 0303bfa1c479326e9ae7896c70f0c0d5611f257bbbc6392f45b545c4779ea47d... handshake new: [205] 0303bfa1c479326e9ae7896c70f0c0d5611f257bbbc6392f45b545c4779ea47d... record old: [191] 010000bb0303bfa1c479326e9ae7896c70f0c0d5611f257bbbc6392f45b545c4... record new: [209] 010000cd0303bfa1c479326e9ae7896c70f0c0d5611f257bbbc6392f45b545c4... client: Filtered packet: [214] 16030100d1010000cd0303bfa1c479326e9ae7896c70f0c0d5611f257bbbc639... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 03025628acbed86dc682463af1794e1637a7eb4a05bb7457086303242a864942... handshake new: [135] 03025628acbed86dc682463af1794e1637a7eb4a05bb7457086303242a864942... record old: [121] 0100007503025628acbed86dc682463af1794e1637a7eb4a05bb745708630324... record new: [139] 0100008703025628acbed86dc682463af1794e1637a7eb4a05bb745708630324... client: Filtered packet: [144] 160301008b0100008703025628acbed86dc682463af1794e1637a7eb4a05bb74... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [117] 0301d33e3b48847c1b3541f5844bc52f7d2a3019f4f901947a082feec456694f... handshake new: [135] 0301d33e3b48847c1b3541f5844bc52f7d2a3019f4f901947a082feec456694f... record old: [121] 010000750301d33e3b48847c1b3541f5844bc52f7d2a3019f4f901947a082fee... record new: [139] 010000870301d33e3b48847c1b3541f5844bc52f7d2a3019f4f901947a082fee... client: Filtered packet: [144] 160301008b010000870301d33e3b48847c1b3541f5844bc52f7d2a3019f4f901... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.RepeatSni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [182] 03030a221904165be85962b451f08e3134afc86652e0230fd4654cefbfd22392... handshake new: [188] 03030a221904165be85962b451f08e3134afc86652e0230fd4654cefbfd22392... record old: [186] 010000b603030a221904165be85962b451f08e3134afc86652e0230fd4654cef... record new: [192] 010000bc03030a221904165be85962b451f08e3134afc86652e0230fd4654cef... client: Filtered packet: [197] 16030100c0010000bc03030a221904165be85962b451f08e3134afc86652e023... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [187] 03035587f6427dcddd8ea38c98f6dbdfe6e8e50a2a0051dcb6bf1283f0d85260... handshake new: [193] 03035587f6427dcddd8ea38c98f6dbdfe6e8e50a2a0051dcb6bf1283f0d85260... record old: [191] 010000bb03035587f6427dcddd8ea38c98f6dbdfe6e8e50a2a0051dcb6bf1283... record new: [197] 010000c103035587f6427dcddd8ea38c98f6dbdfe6e8e50a2a0051dcb6bf1283... client: Filtered packet: [202] 16030100c5010000c103035587f6427dcddd8ea38c98f6dbdfe6e8e50a2a0051... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 030213ff7648aa19f08444e8b72ee1ef090b748340e39377159357de4d94fca9... handshake new: [123] 030213ff7648aa19f08444e8b72ee1ef090b748340e39377159357de4d94fca9... record old: [121] 01000075030213ff7648aa19f08444e8b72ee1ef090b748340e39377159357de... record new: [127] 0100007b030213ff7648aa19f08444e8b72ee1ef090b748340e39377159357de... client: Filtered packet: [132] 160301007f0100007b030213ff7648aa19f08444e8b72ee1ef090b748340e393... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [117] 0301a5ebca023ddc0d1274b2e60f3c607d2e1cc2cc1cb619a3b5866f3124b66e... handshake new: [123] 0301a5ebca023ddc0d1274b2e60f3c607d2e1cc2cc1cb619a3b5866f3124b66e... record old: [121] 010000750301a5ebca023ddc0d1274b2e60f3c607d2e1cc2cc1cb619a3b5866f... record new: [127] 0100007b0301a5ebca023ddc0d1274b2e60f3c607d2e1cc2cc1cb619a3b5866f... client: Filtered packet: [132] 160301007f0100007b0301a5ebca023ddc0d1274b2e60f3c607d2e1cc2cc1cb6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.BadSni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [182] 03034668ef6e7a167476c755a8840fba9ebf29c31ed70db2db19b818e681fce2... handshake new: [173] 03034668ef6e7a167476c755a8840fba9ebf29c31ed70db2db19b818e681fce2... record old: [186] 010000b603034668ef6e7a167476c755a8840fba9ebf29c31ed70db2db19b818... record new: [177] 010000ad03034668ef6e7a167476c755a8840fba9ebf29c31ed70db2db19b818... client: Filtered packet: [182] 16030100b1010000ad03034668ef6e7a167476c755a8840fba9ebf29c31ed70d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [187] 0303127f7abbdb8bda95a0c7f01c67922295b91591e4f5124ee1784fcef5d97a... handshake new: [178] 0303127f7abbdb8bda95a0c7f01c67922295b91591e4f5124ee1784fcef5d97a... record old: [191] 010000bb0303127f7abbdb8bda95a0c7f01c67922295b91591e4f5124ee1784f... record new: [182] 010000b20303127f7abbdb8bda95a0c7f01c67922295b91591e4f5124ee1784f... client: Filtered packet: [187] 16030100b6010000b20303127f7abbdb8bda95a0c7f01c67922295b91591e4f5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 0302775d15a84a2b4d470288ace89ead9d0f41ee3ec2ffe70655f40372d42d40... handshake new: [108] 0302775d15a84a2b4d470288ace89ead9d0f41ee3ec2ffe70655f40372d42d40... record old: [121] 010000750302775d15a84a2b4d470288ace89ead9d0f41ee3ec2ffe70655f403... record new: [112] 0100006c0302775d15a84a2b4d470288ace89ead9d0f41ee3ec2ffe70655f403... client: Filtered packet: [117] 16030100700100006c0302775d15a84a2b4d470288ace89ead9d0f41ee3ec2ff... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [117] 03012f262cc3c0cf70ad9c19d99db390aac08f11e18e626946bc78f21eaefddf... handshake new: [108] 03012f262cc3c0cf70ad9c19d99db390aac08f11e18e626946bc78f21eaefddf... record old: [121] 0100007503012f262cc3c0cf70ad9c19d99db390aac08f11e18e626946bc78f2... record new: [112] 0100006c03012f262cc3c0cf70ad9c19d99db390aac08f11e18e626946bc78f2... client: Filtered packet: [117] 16030100700100006c03012f262cc3c0cf70ad9c19d99db390aac08f11e18e62... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptySni/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [192] 0303461f91aef4f609c1bf60e89e68fd3a53eee4087717a5aba5ee266be97d61... handshake new: [186] 0303461f91aef4f609c1bf60e89e68fd3a53eee4087717a5aba5ee266be97d61... record old: [196] 010000c00303461f91aef4f609c1bf60e89e68fd3a53eee4087717a5aba5ee26... record new: [190] 010000ba0303461f91aef4f609c1bf60e89e68fd3a53eee4087717a5aba5ee26... client: Filtered packet: [195] 16030100be010000ba0303461f91aef4f609c1bf60e89e68fd3a53eee4087717... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [197] 0303cb8bd4b499918d9b857c20b164747ac2e43b74a5000cc68fc72900be9590... handshake new: [191] 0303cb8bd4b499918d9b857c20b164747ac2e43b74a5000cc68fc72900be9590... record old: [201] 010000c50303cb8bd4b499918d9b857c20b164747ac2e43b74a5000cc68fc729... record new: [195] 010000bf0303cb8bd4b499918d9b857c20b164747ac2e43b74a5000cc68fc729... client: Filtered packet: [200] 16030100c3010000bf0303cb8bd4b499918d9b857c20b164747ac2e43b74a500... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 030209fe86f8e9f2f454b7ed84973ffad7e512ca8ac24202dfb024b45acb28f5... handshake new: [121] 030209fe86f8e9f2f454b7ed84973ffad7e512ca8ac24202dfb024b45acb28f5... record old: [131] 0100007f030209fe86f8e9f2f454b7ed84973ffad7e512ca8ac24202dfb024b4... record new: [125] 01000079030209fe86f8e9f2f454b7ed84973ffad7e512ca8ac24202dfb024b4... client: Filtered packet: [130] 160301007d01000079030209fe86f8e9f2f454b7ed84973ffad7e512ca8ac242... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [127] 03012a542ae4054c3746640a3a577cb3e77fb18ac0fa26c30da297ae93f4e991... handshake new: [121] 03012a542ae4054c3746640a3a577cb3e77fb18ac0fa26c30da297ae93f4e991... record old: [131] 0100007f03012a542ae4054c3746640a3a577cb3e77fb18ac0fa26c30da297ae... record new: [125] 0100007903012a542ae4054c3746640a3a577cb3e77fb18ac0fa26c30da297ae... client: Filtered packet: [130] 160301007d0100007903012a542ae4054c3746640a3a577cb3e77fb18ac0fa26... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnExtension/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [192] 03033a08b01cbc86ff23cf16422c38f30bf2a24dd0de75b479e737fe53ef7c00... handshake new: [188] 03033a08b01cbc86ff23cf16422c38f30bf2a24dd0de75b479e737fe53ef7c00... record old: [196] 010000c003033a08b01cbc86ff23cf16422c38f30bf2a24dd0de75b479e737fe... record new: [192] 010000bc03033a08b01cbc86ff23cf16422c38f30bf2a24dd0de75b479e737fe... client: Filtered packet: [197] 16030100c0010000bc03033a08b01cbc86ff23cf16422c38f30bf2a24dd0de75... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [197] 0303e2f1b478cf9de5338f37f54213a9a829454a9f37e01293a93a430f2b88a9... handshake new: [193] 0303e2f1b478cf9de5338f37f54213a9a829454a9f37e01293a93a430f2b88a9... record old: [201] 010000c50303e2f1b478cf9de5338f37f54213a9a829454a9f37e01293a93a43... record new: [197] 010000c10303e2f1b478cf9de5338f37f54213a9a829454a9f37e01293a93a43... client: Filtered packet: [202] 16030100c5010000c10303e2f1b478cf9de5338f37f54213a9a829454a9f37e0... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 0302aa7b6a93b397dfde2d1aa9fb36ddb83b2749dd2e6c17743d79b2be231cd1... handshake new: [123] 0302aa7b6a93b397dfde2d1aa9fb36ddb83b2749dd2e6c17743d79b2be231cd1... record old: [131] 0100007f0302aa7b6a93b397dfde2d1aa9fb36ddb83b2749dd2e6c17743d79b2... record new: [127] 0100007b0302aa7b6a93b397dfde2d1aa9fb36ddb83b2749dd2e6c17743d79b2... client: Filtered packet: [132] 160301007f0100007b0302aa7b6a93b397dfde2d1aa9fb36ddb83b2749dd2e6c... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [127] 03019dcc8d95bbef2b11cf1208a2f6180b4c5d49dcf0bade9e3f651a8a27a3ba... handshake new: [123] 03019dcc8d95bbef2b11cf1208a2f6180b4c5d49dcf0bade9e3f651a8a27a3ba... record old: [131] 0100007f03019dcc8d95bbef2b11cf1208a2f6180b4c5d49dcf0bade9e3f651a... record new: [127] 0100007b03019dcc8d95bbef2b11cf1208a2f6180b4c5d49dcf0bade9e3f651a... client: Filtered packet: [132] 160301007f0100007b03019dcc8d95bbef2b11cf1208a2f6180b4c5d49dcf0ba... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.EmptyAlpnList/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [192] 030303ec8b0753beaa9d3d066c93734c1429f7bb8dcbea1024104d7c6ea8ba24... handshake new: [187] 030303ec8b0753beaa9d3d066c93734c1429f7bb8dcbea1024104d7c6ea8ba24... record old: [196] 010000c0030303ec8b0753beaa9d3d066c93734c1429f7bb8dcbea1024104d7c... record new: [191] 010000bb030303ec8b0753beaa9d3d066c93734c1429f7bb8dcbea1024104d7c... client: Filtered packet: [196] 16030100bf010000bb030303ec8b0753beaa9d3d066c93734c1429f7bb8dcbea... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [197] 03035ebd66943356d18735160b491614ac2f4846eb6bd08fd5cf34971e26e1f3... handshake new: [192] 03035ebd66943356d18735160b491614ac2f4846eb6bd08fd5cf34971e26e1f3... record old: [201] 010000c503035ebd66943356d18735160b491614ac2f4846eb6bd08fd5cf3497... record new: [196] 010000c003035ebd66943356d18735160b491614ac2f4846eb6bd08fd5cf3497... client: Filtered packet: [201] 16030100c4010000c003035ebd66943356d18735160b491614ac2f4846eb6bd0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 0302f1f9264eb9035b70e6d6fa366a8b01d419e28e96e2c5d502b82db33ba066... handshake new: [122] 0302f1f9264eb9035b70e6d6fa366a8b01d419e28e96e2c5d502b82db33ba066... record old: [131] 0100007f0302f1f9264eb9035b70e6d6fa366a8b01d419e28e96e2c5d502b82d... record new: [126] 0100007a0302f1f9264eb9035b70e6d6fa366a8b01d419e28e96e2c5d502b82d... client: Filtered packet: [131] 160301007e0100007a0302f1f9264eb9035b70e6d6fa366a8b01d419e28e96e2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [127] 0301d3592eda152826a257d344572df572e4b375be7b6c4f45133e8fb4dd649f... handshake new: [122] 0301d3592eda152826a257d344572df572e4b375be7b6c4f45133e8fb4dd649f... record old: [131] 0100007f0301d3592eda152826a257d344572df572e4b375be7b6c4f45133e8f... record new: [126] 0100007a0301d3592eda152826a257d344572df572e4b375be7b6c4f45133e8f... client: Filtered packet: [131] 160301007e0100007a0301d3592eda152826a257d344572df572e4b375be7b6c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.OneByteAlpn/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [192] 03032c09418166bd7a062bbb1f073e239b52faea71545dbfaac251c7300e700b... handshake new: [191] 03032c09418166bd7a062bbb1f073e239b52faea71545dbfaac251c7300e700b... record old: [196] 010000c003032c09418166bd7a062bbb1f073e239b52faea71545dbfaac251c7... record new: [195] 010000bf03032c09418166bd7a062bbb1f073e239b52faea71545dbfaac251c7... client: Filtered packet: [200] 16030100c3010000bf03032c09418166bd7a062bbb1f073e239b52faea71545d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [197] 03039401ae4d85f73bc10260adbaedf01a3090f997e787570c28eb39f4637a90... handshake new: [196] 03039401ae4d85f73bc10260adbaedf01a3090f997e787570c28eb39f4637a90... record old: [201] 010000c503039401ae4d85f73bc10260adbaedf01a3090f997e787570c28eb39... record new: [200] 010000c403039401ae4d85f73bc10260adbaedf01a3090f997e787570c28eb39... client: Filtered packet: [205] 16030100c8010000c403039401ae4d85f73bc10260adbaedf01a3090f997e787... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 0302883f996988ce3a307f51a12f958be062108a916512e4bbc6ad4bec308727... handshake new: [126] 0302883f996988ce3a307f51a12f958be062108a916512e4bbc6ad4bec308727... record old: [131] 0100007f0302883f996988ce3a307f51a12f958be062108a916512e4bbc6ad4b... record new: [130] 0100007e0302883f996988ce3a307f51a12f958be062108a916512e4bbc6ad4b... client: Filtered packet: [135] 16030100820100007e0302883f996988ce3a307f51a12f958be062108a916512... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [127] 030163143b4f2aa11a6c8a1e85bbefaadf712e12258e707d225be225809d6d5f... handshake new: [126] 030163143b4f2aa11a6c8a1e85bbefaadf712e12258e707d225be225809d6d5f... record old: [131] 0100007f030163143b4f2aa11a6c8a1e85bbefaadf712e12258e707d225be225... record new: [130] 0100007e030163143b4f2aa11a6c8a1e85bbefaadf712e12258e707d225be225... client: Filtered packet: [135] 16030100820100007e030163143b4f2aa11a6c8a1e85bbefaadf712e12258e70... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMissingValue/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [192] 030300cf41a80e461546c80b8c4106af8d0fed53f3855665f03c228e7ac2442c... handshake new: [191] 030300cf41a80e461546c80b8c4106af8d0fed53f3855665f03c228e7ac2442c... record old: [196] 010000c0030300cf41a80e461546c80b8c4106af8d0fed53f3855665f03c228e... record new: [195] 010000bf030300cf41a80e461546c80b8c4106af8d0fed53f3855665f03c228e... client: Filtered packet: [200] 16030100c3010000bf030300cf41a80e461546c80b8c4106af8d0fed53f38556... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [197] 030388ef6d5d91ff082007904d1abf79542041104bd8ed775cbb5daed982f2a7... handshake new: [196] 030388ef6d5d91ff082007904d1abf79542041104bd8ed775cbb5daed982f2a7... record old: [201] 010000c5030388ef6d5d91ff082007904d1abf79542041104bd8ed775cbb5dae... record new: [200] 010000c4030388ef6d5d91ff082007904d1abf79542041104bd8ed775cbb5dae... client: Filtered packet: [205] 16030100c8010000c4030388ef6d5d91ff082007904d1abf79542041104bd8ed... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 03026bfc12c16e2b45d2a3d6420ada13aacf7c480a05e4c65ae2ac15c608314a... handshake new: [126] 03026bfc12c16e2b45d2a3d6420ada13aacf7c480a05e4c65ae2ac15c608314a... record old: [131] 0100007f03026bfc12c16e2b45d2a3d6420ada13aacf7c480a05e4c65ae2ac15... record new: [130] 0100007e03026bfc12c16e2b45d2a3d6420ada13aacf7c480a05e4c65ae2ac15... client: Filtered packet: [135] 16030100820100007e03026bfc12c16e2b45d2a3d6420ada13aacf7c480a05e4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [127] 0301b46d9a7f264b6480ac7deb700dc41268ec160db7d2683a451cf69012cff5... handshake new: [126] 0301b46d9a7f264b6480ac7deb700dc41268ec160db7d2683a451cf69012cff5... record old: [131] 0100007f0301b46d9a7f264b6480ac7deb700dc41268ec160db7d2683a451cf6... record new: [130] 0100007e0301b46d9a7f264b6480ac7deb700dc41268ec160db7d2683a451cf6... client: Filtered packet: [135] 16030100820100007e0301b46d9a7f264b6480ac7deb700dc41268ec160db7d2... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnZeroLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [192] 0303885210db670bc47a25d7aa6dae9e79a746610b9080e34f2739dc8bce833d... handshake new: [191] 0303885210db670bc47a25d7aa6dae9e79a746610b9080e34f2739dc8bce833d... record old: [196] 010000c00303885210db670bc47a25d7aa6dae9e79a746610b9080e34f2739dc... record new: [195] 010000bf0303885210db670bc47a25d7aa6dae9e79a746610b9080e34f2739dc... client: Filtered packet: [200] 16030100c3010000bf0303885210db670bc47a25d7aa6dae9e79a746610b9080... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [197] 03031e14fab09ff488fb052c3148ccb33b32b2e7d07eb15f1fbd3d202001f8bb... handshake new: [196] 03031e14fab09ff488fb052c3148ccb33b32b2e7d07eb15f1fbd3d202001f8bb... record old: [201] 010000c503031e14fab09ff488fb052c3148ccb33b32b2e7d07eb15f1fbd3d20... record new: [200] 010000c403031e14fab09ff488fb052c3148ccb33b32b2e7d07eb15f1fbd3d20... client: Filtered packet: [205] 16030100c8010000c403031e14fab09ff488fb052c3148ccb33b32b2e7d07eb1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 0302ed1909a17a34b46b9034579348b29067a1a3d6a302c684faec5a5d44fc62... handshake new: [126] 0302ed1909a17a34b46b9034579348b29067a1a3d6a302c684faec5a5d44fc62... record old: [131] 0100007f0302ed1909a17a34b46b9034579348b29067a1a3d6a302c684faec5a... record new: [130] 0100007e0302ed1909a17a34b46b9034579348b29067a1a3d6a302c684faec5a... client: Filtered packet: [135] 16030100820100007e0302ed1909a17a34b46b9034579348b29067a1a3d6a302... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [127] 0301ea1bc1d6cde577f051e537345b5ae3975c76f805cb8edbcbf0d5f15df134... handshake new: [126] 0301ea1bc1d6cde577f051e537345b5ae3975c76f805cb8edbcbf0d5f15df134... record old: [131] 0100007f0301ea1bc1d6cde577f051e537345b5ae3975c76f805cb8edbcbf0d5... record new: [130] 0100007e0301ea1bc1d6cde577f051e537345b5ae3975c76f805cb8edbcbf0d5... client: Filtered packet: [135] 16030100820100007e0301ea1bc1d6cde577f051e537345b5ae3975c76f805cb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnLengthOverflow/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnMismatch/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/0 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.AlpnDisabledServer/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [22] 0014001d001700180019639901000101010201030104 handshake old: [182] 0303ef312ad3d6646633c5547742236187a6e2b2792617e741cdb6f9e58bb39c... handshake new: [156] 0303ef312ad3d6646633c5547742236187a6e2b2792617e741cdb6f9e58bb39c... record old: [186] 010000b60303ef312ad3d6646633c5547742236187a6e2b2792617e741cdb6f9... record new: [160] 0100009c0303ef312ad3d6646633c5547742236187a6e2b2792617e741cdb6f9... client: Filtered packet: [165] 16030100a00100009c0303ef312ad3d6646633c5547742236187a6e2b2792617... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [187] 0303b721a73e584d2d26d4e3f04c6bcb87ff4b5f3d753769b1c4810dc88b7452... handshake new: [173] 0303b721a73e584d2d26d4e3f04c6bcb87ff4b5f3d753769b1c4810dc88b7452... record old: [191] 010000bb0303b721a73e584d2d26d4e3f04c6bcb87ff4b5f3d753769b1c4810d... record new: [177] 010000ad0303b721a73e584d2d26d4e3f04c6bcb87ff4b5f3d753769b1c4810d... client: Filtered packet: [182] 16030100b1010000ad0303b721a73e584d2d26d4e3f04c6bcb87ff4b5f3d7537... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/1 (12 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 03020ed68b0207af4687ae9aa63f02bc167441918244ebd6f6fd61ddf63a4ec0... handshake new: [103] 03020ed68b0207af4687ae9aa63f02bc167441918244ebd6f6fd61ddf63a4ec0... record old: [121] 0100007503020ed68b0207af4687ae9aa63f02bc167441918244ebd6f6fd61dd... record new: [107] 0100006703020ed68b0207af4687ae9aa63f02bc167441918244ebd6f6fd61dd... client: Filtered packet: [112] 160301006b0100006703020ed68b0207af4687ae9aa63f02bc167441918244eb... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/2 (11 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [117] 0301995d8336af36994676fc01190aad790b10a9ee6177a5564e736d2ce90250... handshake new: [103] 0301995d8336af36994676fc01190aad790b10a9ee6177a5564e736d2ce90250... record old: [121] 010000750301995d8336af36994676fc01190aad790b10a9ee6177a5564e736d... record new: [107] 010000670301995d8336af36994676fc01190aad790b10a9ee6177a5564e736d... client: Filtered packet: [112] 160301006b010000670301995d8336af36994676fc01190aad790b10a9ee6177... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.NoSupportedGroups/3 (12 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [22] 0014001d001700180019639901000101010201030104 extension new: [3] 000100 handshake old: [182] 0303d78675d223ff251829898c831ded52da0b746e2caf9237a0642ea4ea32f5... handshake new: [163] 0303d78675d223ff251829898c831ded52da0b746e2caf9237a0642ea4ea32f5... record old: [186] 010000b60303d78675d223ff251829898c831ded52da0b746e2caf9237a0642e... record new: [167] 010000a30303d78675d223ff251829898c831ded52da0b746e2caf9237a0642e... client: Filtered packet: [172] 16030100a7010000a30303d78675d223ff251829898c831ded52da0b746e2caf... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [187] 030373671cb5e8c798172c9c44fbb53f5c18f9c623b6ebe0bf44e74045690ddf... handshake new: [180] 030373671cb5e8c798172c9c44fbb53f5c18f9c623b6ebe0bf44e74045690ddf... record old: [191] 010000bb030373671cb5e8c798172c9c44fbb53f5c18f9c623b6ebe0bf44e740... record new: [184] 010000b4030373671cb5e8c798172c9c44fbb53f5c18f9c623b6ebe0bf44e740... client: Filtered packet: [189] 16030100b8010000b4030373671cb5e8c798172c9c44fbb53f5c18f9c623b6eb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 03023529fcb895b6b079db1355c166a43171ecc3ddd588913a4ef0e02d40fab2... handshake new: [110] 03023529fcb895b6b079db1355c166a43171ecc3ddd588913a4ef0e02d40fab2... record old: [121] 0100007503023529fcb895b6b079db1355c166a43171ecc3ddd588913a4ef0e0... record new: [114] 0100006e03023529fcb895b6b079db1355c166a43171ecc3ddd588913a4ef0e0... client: Filtered packet: [119] 16030100720100006e03023529fcb895b6b079db1355c166a43171ecc3ddd588... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [117] 0301bddba80acdf534b4d5850a0706cb2ac8f8b9c2f92e7f9aedcd206a832320... handshake new: [110] 0301bddba80acdf534b4d5850a0706cb2ac8f8b9c2f92e7f9aedcd206a832320... record old: [121] 010000750301bddba80acdf534b4d5850a0706cb2ac8f8b9c2f92e7f9aedcd20... record new: [114] 0100006e0301bddba80acdf534b4d5850a0706cb2ac8f8b9c2f92e7f9aedcd20... client: Filtered packet: [119] 16030100720100006e0301bddba80acdf534b4d5850a0706cb2ac8f8b9c2f92e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesShort/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [22] 0014001d001700180019639901000101010201030104 extension new: [4] 09990000 handshake old: [182] 0303140304bcd2e777a0738e3da1eb453bf0a2a1efe686ecf61b532aee36b18d... handshake new: [164] 0303140304bcd2e777a0738e3da1eb453bf0a2a1efe686ecf61b532aee36b18d... record old: [186] 010000b60303140304bcd2e777a0738e3da1eb453bf0a2a1efe686ecf61b532a... record new: [168] 010000a40303140304bcd2e777a0738e3da1eb453bf0a2a1efe686ecf61b532a... client: Filtered packet: [173] 16030100a8010000a40303140304bcd2e777a0738e3da1eb453bf0a2a1efe686... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [187] 03030c9b58f092c92e75bd9852da6dab9757ed47fbffd72fb6ffd4e4d3bcee4f... handshake new: [181] 03030c9b58f092c92e75bd9852da6dab9757ed47fbffd72fb6ffd4e4d3bcee4f... record old: [191] 010000bb03030c9b58f092c92e75bd9852da6dab9757ed47fbffd72fb6ffd4e4... record new: [185] 010000b503030c9b58f092c92e75bd9852da6dab9757ed47fbffd72fb6ffd4e4... client: Filtered packet: [190] 16030100b9010000b503030c9b58f092c92e75bd9852da6dab9757ed47fbffd7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 03025fca9a906c5e911fd937e58c56ecaa78ac105832c87f454eeca4cd8f7f85... handshake new: [111] 03025fca9a906c5e911fd937e58c56ecaa78ac105832c87f454eeca4cd8f7f85... record old: [121] 0100007503025fca9a906c5e911fd937e58c56ecaa78ac105832c87f454eeca4... record new: [115] 0100006f03025fca9a906c5e911fd937e58c56ecaa78ac105832c87f454eeca4... client: Filtered packet: [120] 16030100730100006f03025fca9a906c5e911fd937e58c56ecaa78ac105832c8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [117] 03013f3ee4ac4423930ff84a7286431ff42bd816cb4f05e89cf645e4ead3d36b... handshake new: [111] 03013f3ee4ac4423930ff84a7286431ff42bd816cb4f05e89cf645e4ead3d36b... record old: [121] 0100007503013f3ee4ac4423930ff84a7286431ff42bd816cb4f05e89cf645e4... record new: [115] 0100006f03013f3ee4ac4423930ff84a7286431ff42bd816cb4f05e89cf645e4... client: Filtered packet: [120] 16030100730100006f03013f3ee4ac4423930ff84a7286431ff42bd816cb4f05... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesBadLength/3 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [22] 0014001d001700180019639901000101010201030104 extension new: [5] 0002000000 handshake old: [182] 0303d13e93a84570ee5c22945f576e9a19a480e323dc915bc6fc3029cc0ed71a... handshake new: [165] 0303d13e93a84570ee5c22945f576e9a19a480e323dc915bc6fc3029cc0ed71a... record old: [186] 010000b60303d13e93a84570ee5c22945f576e9a19a480e323dc915bc6fc3029... record new: [169] 010000a50303d13e93a84570ee5c22945f576e9a19a480e323dc915bc6fc3029... client: Filtered packet: [174] 16030100a9010000a50303d13e93a84570ee5c22945f576e9a19a480e323dc91... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (3 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [187] 0303ec6e89e125e2a2084aad6e1e1fa7373d70957605f823ac5e78ae1d6cc3b6... handshake new: [182] 0303ec6e89e125e2a2084aad6e1e1fa7373d70957605f823ac5e78ae1d6cc3b6... record old: [191] 010000bb0303ec6e89e125e2a2084aad6e1e1fa7373d70957605f823ac5e78ae... record new: [186] 010000b60303ec6e89e125e2a2084aad6e1e1fa7373d70957605f823ac5e78ae... client: Filtered packet: [191] 16030100ba010000b60303ec6e89e125e2a2084aad6e1e1fa7373d70957605f8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 03026a0db6b7c9a47d88ee8c8298aad717ef627a99cd0dd684a4fc04a8909096... handshake new: [112] 03026a0db6b7c9a47d88ee8c8298aad717ef627a99cd0dd684a4fc04a8909096... record old: [121] 0100007503026a0db6b7c9a47d88ee8c8298aad717ef627a99cd0dd684a4fc04... record new: [116] 0100007003026a0db6b7c9a47d88ee8c8298aad717ef627a99cd0dd684a4fc04... client: Filtered packet: [121] 16030100740100007003026a0db6b7c9a47d88ee8c8298aad717ef627a99cd0d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (2 ms) [ RUN ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [117] 0301e1abef1c6ea2177c602d10f8886dc6d6dd0c0c43f8d9abc63b0522078ea3... handshake new: [112] 0301e1abef1c6ea2177c602d10f8886dc6d6dd0c0c43f8d9abc63b0522078ea3... record old: [121] 010000750301e1abef1c6ea2177c602d10f8886dc6d6dd0c0c43f8d9abc63b05... record new: [116] 010000700301e1abef1c6ea2177c602d10f8886dc6d6dd0c0c43f8d9abc63b05... client: Filtered packet: [121] 1603010074010000700301e1abef1c6ea2177c602d10f8886dc6d6dd0c0c43f8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionStream/TlsExtensionTestGeneric.SupportedCurvesTrailingData/3 (2 ms) [----------] 72 tests from ExtensionStream/TlsExtensionTestGeneric (226 ms total) [----------] 54 tests from ExtensionDatagram/TlsExtensionTestGeneric [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [183] fefda853e42cfdb7cb75ad0e557954ea88d4ed77e5f611c4d62a137b17b5748d... handshake new: [183] fefda853e42cfdb7cb75ad0e557954ea88d4ed77e5f611c4d62a137b17b5748d... record old: [195] 010000b700000000000000b7fefda853e42cfdb7cb75ad0e557954ea88d4ed77... record new: [195] 010000b700000000000000b7fefda853e42cfdb7cb75ad0e557954ea88d4ed77... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefda853e42cfd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [184] fefdbf89a0e5ad5af32c29e5960e884f5c2b8004431a0427ff8c76f8fb077693... handshake new: [184] fefdbf89a0e5ad5af32c29e5960e884f5c2b8004431a0427ff8c76f8fb077693... record old: [196] 010000b800000000000000b8fefdbf89a0e5ad5af32c29e5960e884f5c2b8004... record new: [196] 010000b800000000000000b8fefdbf89a0e5ad5af32c29e5960e884f5c2b8004... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdbf89a0e5ad... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 0052000006736572766572 handshake old: [114] feff3b65254fe77a03c8b045d6b937192d20f4f3c147a388290191de9181f266... handshake new: [114] feff3b65254fe77a03c8b045d6b937192d20f4f3c147a388290191de9181f266... record old: [126] 010000720000000000000072feff3b65254fe77a03c8b045d6b937192d20f4f3... record new: [126] 010000720000000000000072feff3b65254fe77a03c8b045d6b937192d20f4f3... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff3b65254fe7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [183] fefd9a9bca57299041775527a3c5c5c81caf5d98a90e77b4a7e9e53ffe70adb6... handshake new: [183] fefd9a9bca57299041775527a3c5c5c81caf5d98a90e77b4a7e9e53ffe70adb6... record old: [195] 010000b700000000000000b7fefd9a9bca57299041775527a3c5c5c81caf5d98... record new: [195] 010000b700000000000000b7fefd9a9bca57299041775527a3c5c5c81caf5d98... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd9a9bca5729... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [184] fefd1fb61ad6692892f45c8e08f57d26eed5d7902fef00ca33f2723313d7c7b4... handshake new: [184] fefd1fb61ad6692892f45c8e08f57d26eed5d7902fef00ca33f2723313d7c7b4... record old: [196] 010000b800000000000000b8fefd1fb61ad6692892f45c8e08f57d26eed5d790... record new: [196] 010000b800000000000000b8fefd1fb61ad6692892f45c8e08f57d26eed5d790... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd1fb61ad669... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [11] 000900004f736572766572 handshake old: [114] feffe1e168ef6f932a0c9313834c2f11546e97b498be2b3d1c1da14cf92e2b46... handshake new: [114] feffe1e168ef6f932a0c9313834c2f11546e97b498be2b3d1c1da14cf92e2b46... record old: [126] 010000720000000000000072feffe1e168ef6f932a0c9313834c2f11546e97b4... record new: [126] 010000720000000000000072feffe1e168ef6f932a0c9313834c2f11546e97b4... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feffe1e168ef6f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.DamageSniHostLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [183] fefd3acb5dd8a15983be0d084bea153b261dea5a246dbf1dc3306548135174de... handshake new: [179] fefd3acb5dd8a15983be0d084bea153b261dea5a246dbf1dc3306548135174de... record old: [195] 010000b700000000000000b7fefd3acb5dd8a15983be0d084bea153b261dea5a... record new: [191] 010000b300000000000000b3fefd3acb5dd8a15983be0d084bea153b261dea5a... client: Filtered packet: [204] 16feff000000000000000000bf010000b300000000000000b3fefd3acb5dd8a1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [184] fefda936f1a888b39c24e50d39adc55da322494e8b32bd7d25d7904d18ceb72b... handshake new: [180] fefda936f1a888b39c24e50d39adc55da322494e8b32bd7d25d7904d18ceb72b... record old: [196] 010000b800000000000000b8fefda936f1a888b39c24e50d39adc55da322494e... record new: [192] 010000b400000000000000b4fefda936f1a888b39c24e50d39adc55da322494e... client: Filtered packet: [205] 16feff000000000000000000c0010000b400000000000000b4fefda936f1a888... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [7] 00090000067365 handshake old: [114] feff72f9586157e27377d9a8b0c2ba4644027d7979d8052833a2d416fa6731c0... handshake new: [110] feff72f9586157e27377d9a8b0c2ba4644027d7979d8052833a2d416fa6731c0... record old: [126] 010000720000000000000072feff72f9586157e27377d9a8b0c2ba4644027d79... record new: [122] 0100006e000000000000006efeff72f9586157e27377d9a8b0c2ba4644027d79... client: Filtered packet: [135] 16feff0000000000000000007a0100006e000000000000006efeff72f9586157... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.TruncateSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [183] fefdd3ba3fcd31c9bf8b1080de02bb546700d6227b591b72c69b880765192c96... handshake new: [201] fefdd3ba3fcd31c9bf8b1080de02bb546700d6227b591b72c69b880765192c96... record old: [195] 010000b700000000000000b7fefdd3ba3fcd31c9bf8b1080de02bb546700d622... record new: [213] 010000c900000000000000c9fefdd3ba3fcd31c9bf8b1080de02bb546700d622... client: Filtered packet: [226] 16feff000000000000000000d5010000c900000000000000c9fefdd3ba3fcd31... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [184] fefd00bd1cbcd980b33d1783adadebd78d5501a9de5ee9a1145d9466847ede80... handshake new: [202] fefd00bd1cbcd980b33d1783adadebd78d5501a9de5ee9a1145d9466847ede80... record old: [196] 010000b800000000000000b8fefd00bd1cbcd980b33d1783adadebd78d5501a9... record new: [214] 010000ca00000000000000cafefd00bd1cbcd980b33d1783adadebd78d5501a9... client: Filtered packet: [227] 16feff000000000000000000d6010000ca00000000000000cafefd00bd1cbcd9... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [114] feffa46c2b48f54dbe31ffbf6223ba5fae1f87f0b215ead37811686bd4c5eba5... handshake new: [132] feffa46c2b48f54dbe31ffbf6223ba5fae1f87f0b215ead37811686bd4c5eba5... record old: [126] 010000720000000000000072feffa46c2b48f54dbe31ffbf6223ba5fae1f87f0... record new: [144] 010000840000000000000084feffa46c2b48f54dbe31ffbf6223ba5fae1f87f0... client: Filtered packet: [157] 16feff00000000000000000090010000840000000000000084feffa46c2b48f5... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.RepeatSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [183] fefdb4b72a49a396b8cdd74a6a3976e0995ff1858e525dd6b3438b40cc08b89c... handshake new: [189] fefdb4b72a49a396b8cdd74a6a3976e0995ff1858e525dd6b3438b40cc08b89c... record old: [195] 010000b700000000000000b7fefdb4b72a49a396b8cdd74a6a3976e0995ff185... record new: [201] 010000bd00000000000000bdfefdb4b72a49a396b8cdd74a6a3976e0995ff185... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefdb4b72a49a3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [184] fefdd3a6d33e16fd8d45e2e60a874173729fb9e6fe278cac3c1a005984d39faf... handshake new: [190] fefdd3a6d33e16fd8d45e2e60a874173729fb9e6fe278cac3c1a005984d39faf... record old: [196] 010000b800000000000000b8fefdd3a6d33e16fd8d45e2e60a874173729fb9e6... record new: [202] 010000be00000000000000befefdd3a6d33e16fd8d45e2e60a874173729fb9e6... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdd3a6d33e16... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [17] 000000000c000009686f73742e6e616d65 handshake old: [114] feff5763e1406b304a36d35838e60585361cef334b441fb7ec51558547020343... handshake new: [120] feff5763e1406b304a36d35838e60585361cef334b441fb7ec51558547020343... record old: [126] 010000720000000000000072feff5763e1406b304a36d35838e60585361cef33... record new: [132] 010000780000000000000078feff5763e1406b304a36d35838e60585361cef33... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feff5763e1406b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.BadSni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [183] fefd5a8085ea01c3cc8e93a52d7f05eafe3b8a15e0d0b8facda2ab100e0479ca... handshake new: [174] fefd5a8085ea01c3cc8e93a52d7f05eafe3b8a15e0d0b8facda2ab100e0479ca... record old: [195] 010000b700000000000000b7fefd5a8085ea01c3cc8e93a52d7f05eafe3b8a15... record new: [186] 010000ae00000000000000aefefd5a8085ea01c3cc8e93a52d7f05eafe3b8a15... client: Filtered packet: [199] 16feff000000000000000000ba010000ae00000000000000aefefd5a8085ea01... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [184] fefd2809988d86c1fc635e8e2b7f9ef25bca83b8914efae922fa808910677c37... handshake new: [175] fefd2809988d86c1fc635e8e2b7f9ef25bca83b8914efae922fa808910677c37... record old: [196] 010000b800000000000000b8fefd2809988d86c1fc635e8e2b7f9ef25bca83b8... record new: [187] 010000af00000000000000affefd2809988d86c1fc635e8e2b7f9ef25bca83b8... client: Filtered packet: [200] 16feff000000000000000000bb010000af00000000000000affefd2809988d86... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [11] 0009000006736572766572 extension new: [2] 0000 handshake old: [114] feff4a5f3faac8d8762c520079db54dfb0d33ef58fa4cf68a5986cdc58fd1e6d... handshake new: [105] feff4a5f3faac8d8762c520079db54dfb0d33ef58fa4cf68a5986cdc58fd1e6d... record old: [126] 010000720000000000000072feff4a5f3faac8d8762c520079db54dfb0d33ef5... record new: [117] 010000690000000000000069feff4a5f3faac8d8762c520079db54dfb0d33ef5... client: Filtered packet: [130] 16feff00000000000000000075010000690000000000000069feff4a5f3faac8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptySni/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [193] fefd29055eb4f39b42866e7ca65b3f1e4fc8a732a5e13b585e7a0d9b4dfa5899... handshake new: [187] fefd29055eb4f39b42866e7ca65b3f1e4fc8a732a5e13b585e7a0d9b4dfa5899... record old: [205] 010000c100000000000000c1fefd29055eb4f39b42866e7ca65b3f1e4fc8a732... record new: [199] 010000bb00000000000000bbfefd29055eb4f39b42866e7ca65b3f1e4fc8a732... client: Filtered packet: [212] 16feff000000000000000000c7010000bb00000000000000bbfefd29055eb4f3... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [194] fefdb4cc6740676c858e740651ff1f77f6eaac4cb9a8fd51ae40e79f6d3ddb09... handshake new: [188] fefdb4cc6740676c858e740651ff1f77f6eaac4cb9a8fd51ae40e79f6d3ddb09... record old: [206] 010000c200000000000000c2fefdb4cc6740676c858e740651ff1f77f6eaac4c... record new: [200] 010000bc00000000000000bcfefdb4cc6740676c858e740651ff1f77f6eaac4c... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefdb4cc674067... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [0] handshake old: [124] feffb32483b049d1ca24d1ed6c9f10482db52a1e73bf4f770ff38d5affd70c3e... handshake new: [118] feffb32483b049d1ca24d1ed6c9f10482db52a1e73bf4f770ff38d5affd70c3e... record old: [136] 0100007c000000000000007cfeffb32483b049d1ca24d1ed6c9f10482db52a1e... record new: [130] 010000760000000000000076feffb32483b049d1ca24d1ed6c9f10482db52a1e... client: Filtered packet: [143] 16feff00000000000000000082010000760000000000000076feffb32483b049... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnExtension/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [193] fefd3ec7dbe6ebdedae085ed39b61afdccbabee3766a3f408c676419e92e4699... handshake new: [189] fefd3ec7dbe6ebdedae085ed39b61afdccbabee3766a3f408c676419e92e4699... record old: [205] 010000c100000000000000c1fefd3ec7dbe6ebdedae085ed39b61afdccbabee3... record new: [201] 010000bd00000000000000bdfefd3ec7dbe6ebdedae085ed39b61afdccbabee3... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefd3ec7dbe6eb... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [194] fefdbcdd8b0868849ffaf28d09338180d9454d26b430cf115c2d50aa21ed88bd... handshake new: [190] fefdbcdd8b0868849ffaf28d09338180d9454d26b430cf115c2d50aa21ed88bd... record old: [206] 010000c200000000000000c2fefdbcdd8b0868849ffaf28d09338180d9454d26... record new: [202] 010000be00000000000000befefdbcdd8b0868849ffaf28d09338180d9454d26... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefdbcdd8b0868... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [2] 0000 handshake old: [124] feff4102d07013a5f24cfb72d578ff9b1a0c8a064e4bde387a11454e3f80a210... handshake new: [120] feff4102d07013a5f24cfb72d578ff9b1a0c8a064e4bde387a11454e3f80a210... record old: [136] 0100007c000000000000007cfeff4102d07013a5f24cfb72d578ff9b1a0c8a06... record new: [132] 010000780000000000000078feff4102d07013a5f24cfb72d578ff9b1a0c8a06... client: Filtered packet: [145] 16feff00000000000000000084010000780000000000000078feff4102d07013... server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.EmptyAlpnList/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [193] fefd6166fcce95047d83b5cfd265759dd4ec6b6a83dd74439acdbf602baeb3c1... handshake new: [188] fefd6166fcce95047d83b5cfd265759dd4ec6b6a83dd74439acdbf602baeb3c1... record old: [205] 010000c100000000000000c1fefd6166fcce95047d83b5cfd265759dd4ec6b6a... record new: [200] 010000bc00000000000000bcfefd6166fcce95047d83b5cfd265759dd4ec6b6a... client: Filtered packet: [213] 16feff000000000000000000c8010000bc00000000000000bcfefd6166fcce95... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [194] fefd41775769d46582db2bc7580aba698e220f52e1d4110963df965720cff66b... handshake new: [189] fefd41775769d46582db2bc7580aba698e220f52e1d4110963df965720cff66b... record old: [206] 010000c200000000000000c2fefd41775769d46582db2bc7580aba698e220f52... record new: [201] 010000bd00000000000000bdfefd41775769d46582db2bc7580aba698e220f52... client: Filtered packet: [214] 16feff000000000000000000c9010000bd00000000000000bdfefd41775769d4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [1] 00 handshake old: [124] fefff36c0577b585927bcbb31f8e3fab4f60275bb82b33ebbc89ee26c5470fab... handshake new: [119] fefff36c0577b585927bcbb31f8e3fab4f60275bb82b33ebbc89ee26c5470fab... record old: [136] 0100007c000000000000007cfefff36c0577b585927bcbb31f8e3fab4f60275b... record new: [131] 010000770000000000000077fefff36c0577b585927bcbb31f8e3fab4f60275b... client: Filtered packet: [144] 16feff00000000000000000083010000770000000000000077fefff36c0577b5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.OneByteAlpn/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [193] fefdfd35d1a7835fcc79e418733d496215e44d5a6565906be27341c0882c7f70... handshake new: [192] fefdfd35d1a7835fcc79e418733d496215e44d5a6565906be27341c0882c7f70... record old: [205] 010000c100000000000000c1fefdfd35d1a7835fcc79e418733d496215e44d5a... record new: [204] 010000c000000000000000c0fefdfd35d1a7835fcc79e418733d496215e44d5a... client: Filtered packet: [217] 16feff000000000000000000cc010000c000000000000000c0fefdfd35d1a783... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [194] fefdf96179ffbd1a677682453d633238a22875fe76bf8778a55b09e690eb1d07... handshake new: [193] fefdf96179ffbd1a677682453d633238a22875fe76bf8778a55b09e690eb1d07... record old: [206] 010000c200000000000000c2fefdf96179ffbd1a677682453d633238a22875fe... record new: [205] 010000c100000000000000c1fefdf96179ffbd1a677682453d633238a22875fe... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefdf96179ffbd... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0004016101 handshake old: [124] feffd4acb94c9e324ca559a50f0ee4f9483e2b10237474af607217c153ff13b5... handshake new: [123] feffd4acb94c9e324ca559a50f0ee4f9483e2b10237474af607217c153ff13b5... record old: [136] 0100007c000000000000007cfeffd4acb94c9e324ca559a50f0ee4f9483e2b10... record new: [135] 0100007b000000000000007bfeffd4acb94c9e324ca559a50f0ee4f9483e2b10... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeffd4acb94c9e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMissingValue/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [193] fefd48ddf85744b7bd58627002ba1fa992ea9392e104cdab471b75b821b74155... handshake new: [192] fefd48ddf85744b7bd58627002ba1fa992ea9392e104cdab471b75b821b74155... record old: [205] 010000c100000000000000c1fefd48ddf85744b7bd58627002ba1fa992ea9392... record new: [204] 010000c000000000000000c0fefd48ddf85744b7bd58627002ba1fa992ea9392... client: Filtered packet: [217] 16feff000000000000000000cc010000c000000000000000c0fefd48ddf85744... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [194] fefd96bf95fccafe107cc151060acb911d8ca312c94e46dd31a93efc007865ec... handshake new: [193] fefd96bf95fccafe107cc151060acb911d8ca312c94e46dd31a93efc007865ec... record old: [206] 010000c200000000000000c2fefd96bf95fccafe107cc151060acb911d8ca312... record new: [205] 010000c100000000000000c1fefd96bf95fccafe107cc151060acb911d8ca312... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefd96bf95fcca... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016100 handshake old: [124] feff63b723f73c14cb9cc857da71cf0d4aea3b97f0abbaf8e681328a00f9db2f... handshake new: [123] feff63b723f73c14cb9cc857da71cf0d4aea3b97f0abbaf8e681328a00f9db2f... record old: [136] 0100007c000000000000007cfeff63b723f73c14cb9cc857da71cf0d4aea3b97... record new: [135] 0100007b000000000000007bfeff63b723f73c14cb9cc857da71cf0d4aea3b97... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff63b723f73c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnZeroLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [193] fefddaed2fc0f9d1bf4e55cb1b82ea1867cab65ac94926163ae0c4f56b2adea2... handshake new: [192] fefddaed2fc0f9d1bf4e55cb1b82ea1867cab65ac94926163ae0c4f56b2adea2... record old: [205] 010000c100000000000000c1fefddaed2fc0f9d1bf4e55cb1b82ea1867cab65a... record new: [204] 010000c000000000000000c0fefddaed2fc0f9d1bf4e55cb1b82ea1867cab65a... client: Filtered packet: [217] 16feff000000000000000000cc010000c000000000000000c0fefddaed2fc0f9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [194] fefddc97d9a85968c4729edf8d2fa57e9b33e1830d8cbab9805756519b785f24... handshake new: [193] fefddc97d9a85968c4729edf8d2fa57e9b33e1830d8cbab9805756519b785f24... record old: [206] 010000c200000000000000c2fefddc97d9a85968c4729edf8d2fa57e9b33e183... record new: [205] 010000c100000000000000c1fefddc97d9a85968c4729edf8d2fa57e9b33e183... client: Filtered packet: [218] 16feff000000000000000000cd010000c100000000000000c1fefddc97d9a859... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [6] 000401610162 extension new: [5] 0003016101 handshake old: [124] feff662b2b6f5e4383d23a9a0001703586a6eee9df0979aa28f66553733891a4... handshake new: [123] feff662b2b6f5e4383d23a9a0001703586a6eee9df0979aa28f66553733891a4... record old: [136] 0100007c000000000000007cfeff662b2b6f5e4383d23a9a0001703586a6eee9... record new: [135] 0100007b000000000000007bfeff662b2b6f5e4383d23a9a0001703586a6eee9... client: Filtered packet: [148] 16feff000000000000000000870100007b000000000000007bfeff662b2b6f5e... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnLengthOverflow/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 120 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 120 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_NO_PROTOCOL: The server supports no protocols that the client advertises in the ALPN extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnMismatch/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnDisabledServer/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnDisabledServer/0 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnDisabledServer/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnDisabledServer/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnDisabledServer/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 110 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 110 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.AlpnDisabledServer/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [22] 0014001d001700180019639901000101010201030104 handshake old: [183] fefdac38ecad3c4a87fe7a2347bb941c32230e2ff784390d98f80f32f9ef9fae... handshake new: [157] fefdac38ecad3c4a87fe7a2347bb941c32230e2ff784390d98f80f32f9ef9fae... record old: [195] 010000b700000000000000b7fefdac38ecad3c4a87fe7a2347bb941c32230e2f... record new: [169] 0100009d000000000000009dfefdac38ecad3c4a87fe7a2347bb941c32230e2f... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefdac38ecad3c... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [184] fefd94e516d1de2341ab5d15c723849ab28fc060dd24af9cd8702500cfd61341... handshake new: [170] fefd94e516d1de2341ab5d15c723849ab28fc060dd24af9cd8702500cfd61341... record old: [196] 010000b800000000000000b8fefd94e516d1de2341ab5d15c723849ab28fc060... record new: [182] 010000aa00000000000000aafefd94e516d1de2341ab5d15c723849ab28fc060... client: Filtered packet: [195] 16feff000000000000000000b6010000aa00000000000000aafefd94e516d1de... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/1 (12 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [10] 0008001d001700180019 handshake old: [114] feff6c15975026380678f9c920589258786f3bbb2ae78ccabcb452b1dfe26349... handshake new: [100] feff6c15975026380678f9c920589258786f3bbb2ae78ccabcb452b1dfe26349... record old: [126] 010000720000000000000072feff6c15975026380678f9c920589258786f3bbb... record new: [112] 010000640000000000000064feff6c15975026380678f9c920589258786f3bbb... client: Filtered packet: [125] 16feff00000000000000000070010000640000000000000064feff6c15975026... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.NoSupportedGroups/2 (12 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [22] 0014001d001700180019639901000101010201030104 extension new: [3] 000100 handshake old: [183] fefdee2f613f234259bf440e4069f9f354a3e5b510cf55dafe53d250c5e98767... handshake new: [164] fefdee2f613f234259bf440e4069f9f354a3e5b510cf55dafe53d250c5e98767... record old: [195] 010000b700000000000000b7fefdee2f613f234259bf440e4069f9f354a3e5b5... record new: [176] 010000a400000000000000a4fefdee2f613f234259bf440e4069f9f354a3e5b5... client: Filtered packet: [189] 16feff000000000000000000b0010000a400000000000000a4fefdee2f613f23... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [184] fefdfd381fe08a55d852e3a146f7022dafb6ac888f8fa7e2346272e9d8d4ae02... handshake new: [177] fefdfd381fe08a55d852e3a146f7022dafb6ac888f8fa7e2346272e9d8d4ae02... record old: [196] 010000b800000000000000b8fefdfd381fe08a55d852e3a146f7022dafb6ac88... record new: [189] 010000b100000000000000b1fefdfd381fe08a55d852e3a146f7022dafb6ac88... client: Filtered packet: [202] 16feff000000000000000000bd010000b100000000000000b1fefdfd381fe08a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [3] 000100 handshake old: [114] feffcd25ba293bf89a30a1a6dc1ce76b56ed67efab9862bcd6886ddc14cb6754... handshake new: [107] feffcd25ba293bf89a30a1a6dc1ce76b56ed67efab9862bcd6886ddc14cb6754... record old: [126] 010000720000000000000072feffcd25ba293bf89a30a1a6dc1ce76b56ed67ef... record new: [119] 0100006b000000000000006bfeffcd25ba293bf89a30a1a6dc1ce76b56ed67ef... client: Filtered packet: [132] 16feff000000000000000000770100006b000000000000006bfeffcd25ba293b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesShort/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [22] 0014001d001700180019639901000101010201030104 extension new: [4] 09990000 handshake old: [183] fefdf98b9011457c0ec7463e7bf1b1448942db0c08951a9d7d087d1f474f128b... handshake new: [165] fefdf98b9011457c0ec7463e7bf1b1448942db0c08951a9d7d087d1f474f128b... record old: [195] 010000b700000000000000b7fefdf98b9011457c0ec7463e7bf1b1448942db0c... record new: [177] 010000a500000000000000a5fefdf98b9011457c0ec7463e7bf1b1448942db0c... client: Filtered packet: [190] 16feff000000000000000000b1010000a500000000000000a5fefdf98b901145... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [184] fefd773f4abdf60a2c5e1f82d93f9af52db68e79dea5f1d8baaa29b2679b2c83... handshake new: [178] fefd773f4abdf60a2c5e1f82d93f9af52db68e79dea5f1d8baaa29b2679b2c83... record old: [196] 010000b800000000000000b8fefd773f4abdf60a2c5e1f82d93f9af52db68e79... record new: [190] 010000b200000000000000b2fefd773f4abdf60a2c5e1f82d93f9af52db68e79... client: Filtered packet: [203] 16feff000000000000000000be010000b200000000000000b2fefd773f4abdf6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [4] 09990000 handshake old: [114] feff050e24a51c4ccd29a225852a56a4b6a3feed6707b961d0903b974cd2868f... handshake new: [108] feff050e24a51c4ccd29a225852a56a4b6a3feed6707b961d0903b974cd2868f... record old: [126] 010000720000000000000072feff050e24a51c4ccd29a225852a56a4b6a3feed... record new: [120] 0100006c000000000000006cfeff050e24a51c4ccd29a225852a56a4b6a3feed... client: Filtered packet: [133] 16feff000000000000000000780100006c000000000000006cfeff050e24a51c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesBadLength/2 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [22] 0014001d001700180019639901000101010201030104 extension new: [5] 0002000000 handshake old: [183] fefd159bf4eea196cecf4f76ba643e8a6c115bad1b89916d2354c4877513b24b... handshake new: [166] fefd159bf4eea196cecf4f76ba643e8a6c115bad1b89916d2354c4877513b24b... record old: [195] 010000b700000000000000b7fefd159bf4eea196cecf4f76ba643e8a6c115bad... record new: [178] 010000a600000000000000a6fefd159bf4eea196cecf4f76ba643e8a6c115bad... client: Filtered packet: [191] 16feff000000000000000000b2010000a600000000000000a6fefd159bf4eea1... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/0 (3 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [184] fefdf17edce84822ba70fc69e93d6dd618c1240c86baacc10de5844195a39054... handshake new: [179] fefdf17edce84822ba70fc69e93d6dd618c1240c86baacc10de5844195a39054... record old: [196] 010000b800000000000000b8fefdf17edce84822ba70fc69e93d6dd618c1240c... record new: [191] 010000b300000000000000b3fefdf17edce84822ba70fc69e93d6dd618c1240c... client: Filtered packet: [204] 16feff000000000000000000bf010000b300000000000000b3fefdf17edce848... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/1 (2 ms) [ RUN ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [10] 0008001d001700180019 extension new: [5] 0002000000 handshake old: [114] feff6fc00d69d537bcec95bb6eaf291772e2192d78126c849bf7e23efc619b1e... handshake new: [109] feff6fc00d69d537bcec95bb6eaf291772e2192d78126c849bf7e23efc619b1e... record old: [126] 010000720000000000000072feff6fc00d69d537bcec95bb6eaf291772e2192d... record new: [121] 0100006d000000000000006dfeff6fc00d69d537bcec95bb6eaf291772e2192d... client: Filtered packet: [134] 16feff000000000000000000790100006d000000000000006dfeff6fc00d69d5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagram/TlsExtensionTestGeneric.SupportedCurvesTrailingData/2 (2 ms) [----------] 54 tests from ExtensionDatagram/TlsExtensionTestGeneric (170 ms total) [----------] 45 tests from ExtensionPre13Stream/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0301a401fbe7359ad5ab80ea39254dfe9f1153cb1635d71e5b5f6e27347b5094... handshake new: [99] 0301a401fbe7359ad5ab80ea39254dfe9f1153cb1635d71e5b5f6e27347b5094... record old: [721] 020000650301a401fbe7359ad5ab80ea39254dfe9f1153cb1635d71e5b5f6e27... record new: [719] 020000630301a401fbe7359ad5ab80ea39254dfe9f1153cb1635d71e5b5f6e27... server: Filtered packet: [724] 16030102cf020000630301a401fbe7359ad5ab80ea39254dfe9f1153cb1635d7... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 03021e925451b74b6ba9c11faef686403fdc19783edb9b7d364022013e8b4210... handshake new: [99] 03021e925451b74b6ba9c11faef686403fdc19783edb9b7d364022013e8b4210... record old: [721] 0200006503021e925451b74b6ba9c11faef686403fdc19783edb9b7d36402201... record new: [719] 0200006303021e925451b74b6ba9c11faef686403fdc19783edb9b7d36402201... server: Filtered packet: [724] 16030202cf0200006303021e925451b74b6ba9c11faef686403fdc19783edb9b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 03039a12dd969966a54d7834905a2ba7ad0c222e0d71b6c49edd94bca1b8f148... handshake new: [99] 03039a12dd969966a54d7834905a2ba7ad0c222e0d71b6c49edd94bca1b8f148... record old: [723] 0200006503039a12dd969966a54d7834905a2ba7ad0c222e0d71b6c49edd94bc... record new: [721] 0200006303039a12dd969966a54d7834905a2ba7ad0c222e0d71b6c49edd94bc... server: Filtered packet: [726] 16030302d10200006303039a12dd969966a54d7834905a2ba7ad0c222e0d71b6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0301cfdc909ca421ca7e31e67cfe32b5fa4c1fe8395211eb2a04f9e2f00a793f... handshake new: [100] 0301cfdc909ca421ca7e31e67cfe32b5fa4c1fe8395211eb2a04f9e2f00a793f... record old: [721] 020000650301cfdc909ca421ca7e31e67cfe32b5fa4c1fe8395211eb2a04f9e2... record new: [720] 020000640301cfdc909ca421ca7e31e67cfe32b5fa4c1fe8395211eb2a04f9e2... server: Filtered packet: [725] 16030102d0020000640301cfdc909ca421ca7e31e67cfe32b5fa4c1fe8395211... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0302854b6b335ffaf8aca132a8336abfb78c7fc423985516f015ad4ea2407e0d... handshake new: [100] 0302854b6b335ffaf8aca132a8336abfb78c7fc423985516f015ad4ea2407e0d... record old: [721] 020000650302854b6b335ffaf8aca132a8336abfb78c7fc423985516f015ad4e... record new: [720] 020000640302854b6b335ffaf8aca132a8336abfb78c7fc423985516f015ad4e... server: Filtered packet: [725] 16030202d0020000640302854b6b335ffaf8aca132a8336abfb78c7fc4239855... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03033775566cd0c43790b6e8ad45b7702071302af26b313d5b6526b5af90495f... handshake new: [100] 03033775566cd0c43790b6e8ad45b7702071302af26b313d5b6526b5af90495f... record old: [723] 0200006503033775566cd0c43790b6e8ad45b7702071302af26b313d5b6526b5... record new: [722] 0200006403033775566cd0c43790b6e8ad45b7702071302af26b313d5b6526b5... server: Filtered packet: [727] 16030302d20200006403033775566cd0c43790b6e8ad45b7702071302af26b31... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0301615475f7332bf82c71cfcef69fd002ad49869d38bc98162885f8aab917c7... handshake new: [102] 0301615475f7332bf82c71cfcef69fd002ad49869d38bc98162885f8aab917c7... record old: [721] 020000650301615475f7332bf82c71cfcef69fd002ad49869d38bc98162885f8... record new: [722] 020000660301615475f7332bf82c71cfcef69fd002ad49869d38bc98162885f8... server: Filtered packet: [727] 16030102d2020000660301615475f7332bf82c71cfcef69fd002ad49869d38bc... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 030254ecc4d201c0f96c526103b429cfb223e8eb1afc9174023111c3f4a5eecb... handshake new: [102] 030254ecc4d201c0f96c526103b429cfb223e8eb1afc9174023111c3f4a5eecb... record old: [721] 02000065030254ecc4d201c0f96c526103b429cfb223e8eb1afc9174023111c3... record new: [722] 02000066030254ecc4d201c0f96c526103b429cfb223e8eb1afc9174023111c3... server: Filtered packet: [727] 16030202d202000066030254ecc4d201c0f96c526103b429cfb223e8eb1afc91... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0303c595b3afd0b6ce3884da1e98192e17d3aae9be3d1b9a44da89ff2aea2460... handshake new: [102] 0303c595b3afd0b6ce3884da1e98192e17d3aae9be3d1b9a44da89ff2aea2460... record old: [723] 020000650303c595b3afd0b6ce3884da1e98192e17d3aae9be3d1b9a44da89ff... record new: [724] 020000660303c595b3afd0b6ce3884da1e98192e17d3aae9be3d1b9a44da89ff... server: Filtered packet: [729] 16030302d4020000660303c595b3afd0b6ce3884da1e98192e17d3aae9be3d1b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0301404b1adfe6cc3f5febb5f117ea2d8c38b641f4acab1eef9831d6c27072f3... handshake new: [103] 0301404b1adfe6cc3f5febb5f117ea2d8c38b641f4acab1eef9831d6c27072f3... record old: [721] 020000650301404b1adfe6cc3f5febb5f117ea2d8c38b641f4acab1eef9831d6... record new: [723] 020000670301404b1adfe6cc3f5febb5f117ea2d8c38b641f4acab1eef9831d6... server: Filtered packet: [728] 16030102d3020000670301404b1adfe6cc3f5febb5f117ea2d8c38b641f4acab... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0302cda129c2341702ad0c2a2a5428444f2417243e611712deffb5c3597f3a23... handshake new: [103] 0302cda129c2341702ad0c2a2a5428444f2417243e611712deffb5c3597f3a23... record old: [721] 020000650302cda129c2341702ad0c2a2a5428444f2417243e611712deffb5c3... record new: [723] 020000670302cda129c2341702ad0c2a2a5428444f2417243e611712deffb5c3... server: Filtered packet: [728] 16030202d3020000670302cda129c2341702ad0c2a2a5428444f2417243e6117... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0303252c3aab1105fc7bc6f0fb98022aa1ff98fa2ab9c60eeb917ca7b6f6092e... handshake new: [103] 0303252c3aab1105fc7bc6f0fb98022aa1ff98fa2ab9c60eeb917ca7b6f6092e... record old: [723] 020000650303252c3aab1105fc7bc6f0fb98022aa1ff98fa2ab9c60eeb917ca7... record new: [725] 020000670303252c3aab1105fc7bc6f0fb98022aa1ff98fa2ab9c60eeb917ca7... server: Filtered packet: [730] 16030302d5020000670303252c3aab1105fc7bc6f0fb98022aa1ff98fa2ab9c6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0301c4c0704148c4a29cbc413ae01cc6793a8812a14e8bc47c51f083a0e3c605... handshake new: [102] 0301c4c0704148c4a29cbc413ae01cc6793a8812a14e8bc47c51f083a0e3c605... record old: [721] 020000650301c4c0704148c4a29cbc413ae01cc6793a8812a14e8bc47c51f083... record new: [722] 020000660301c4c0704148c4a29cbc413ae01cc6793a8812a14e8bc47c51f083... server: Filtered packet: [727] 16030102d2020000660301c4c0704148c4a29cbc413ae01cc6793a8812a14e8b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0302e25b800fa1822ce01d526063c255eb5146ef3660b4e132f74e1b71490fed... handshake new: [102] 0302e25b800fa1822ce01d526063c255eb5146ef3660b4e132f74e1b71490fed... record old: [721] 020000650302e25b800fa1822ce01d526063c255eb5146ef3660b4e132f74e1b... record new: [722] 020000660302e25b800fa1822ce01d526063c255eb5146ef3660b4e132f74e1b... server: Filtered packet: [727] 16030202d2020000660302e25b800fa1822ce01d526063c255eb5146ef3660b4... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 030368e9c40ca96ff25a84be4e9e49865aeda2b2c5fcf6663f5eb14b4a462dc5... handshake new: [102] 030368e9c40ca96ff25a84be4e9e49865aeda2b2c5fcf6663f5eb14b4a462dc5... record old: [723] 02000065030368e9c40ca96ff25a84be4e9e49865aeda2b2c5fcf6663f5eb14b... record new: [724] 02000066030368e9c40ca96ff25a84be4e9e49865aeda2b2c5fcf6663f5eb14b... server: Filtered packet: [729] 16030302d402000066030368e9c40ca96ff25a84be4e9e49865aeda2b2c5fcf6... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0301b442f9142ebc41a1f6ce1bb8089fe8684932cb4ffaef6bdaf2809a514231... handshake new: [101] 0301b442f9142ebc41a1f6ce1bb8089fe8684932cb4ffaef6bdaf2809a514231... record old: [721] 020000650301b442f9142ebc41a1f6ce1bb8089fe8684932cb4ffaef6bdaf280... record new: [721] 020000650301b442f9142ebc41a1f6ce1bb8089fe8684932cb4ffaef6bdaf280... server: Filtered packet: [726] 16030102d1020000650301b442f9142ebc41a1f6ce1bb8089fe8684932cb4ffa... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03022daf185406187ec3195eb433f0077cf516c51287f52303d7885c2e7e983f... handshake new: [101] 03022daf185406187ec3195eb433f0077cf516c51287f52303d7885c2e7e983f... record old: [721] 0200006503022daf185406187ec3195eb433f0077cf516c51287f52303d7885c... record new: [721] 0200006503022daf185406187ec3195eb433f0077cf516c51287f52303d7885c... server: Filtered packet: [726] 16030202d10200006503022daf185406187ec3195eb433f0077cf516c51287f5... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 03033b442e92f185fb362a10ecc714e05100bd25491410a5b03d195ca62fec8b... handshake new: [101] 03033b442e92f185fb362a10ecc714e05100bd25491410a5b03d195ca62fec8b... record old: [723] 0200006503033b442e92f185fb362a10ecc714e05100bd25491410a5b03d195c... record new: [723] 0200006503033b442e92f185fb362a10ecc714e05100bd25491410a5b03d195c... server: Filtered packet: [728] 16030302d30200006503033b442e92f185fb362a10ecc714e05100bd25491410... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03011d378e4b623dfb08be2ea26784ac003dac8386edba935ca6bff8743241cf... handshake new: [101] 03011d378e4b623dfb08be2ea26784ac003dac8386edba935ca6bff8743241cf... record old: [721] 0200006503011d378e4b623dfb08be2ea26784ac003dac8386edba935ca6bff8... record new: [721] 0200006503011d378e4b623dfb08be2ea26784ac003dac8386edba935ca6bff8... server: Filtered packet: [726] 16030102d10200006503011d378e4b623dfb08be2ea26784ac003dac8386edba... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 030256fb27dd71cded6384f947c0a42a89b41c5ec76677c28206f5ed7fd26f15... handshake new: [101] 030256fb27dd71cded6384f947c0a42a89b41c5ec76677c28206f5ed7fd26f15... record old: [721] 02000065030256fb27dd71cded6384f947c0a42a89b41c5ec76677c28206f5ed... record new: [721] 02000065030256fb27dd71cded6384f947c0a42a89b41c5ec76677c28206f5ed... server: Filtered packet: [726] 16030202d102000065030256fb27dd71cded6384f947c0a42a89b41c5ec76677... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03039bd32c0a8a96a6ccac99bd2ad605b2fbcad1859941ad7ce04ecd38d090cb... handshake new: [101] 03039bd32c0a8a96a6ccac99bd2ad605b2fbcad1859941ad7ce04ecd38d090cb... record old: [723] 0200006503039bd32c0a8a96a6ccac99bd2ad605b2fbcad1859941ad7ce04ecd... record new: [723] 0200006503039bd32c0a8a96a6ccac99bd2ad605b2fbcad1859941ad7ce04ecd... server: Filtered packet: [728] 16030302d30200006503039bd32c0a8a96a6ccac99bd2ad605b2fbcad1859941... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (4 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 0301dccdea4cec5527a300acc1d6f53d25fd8b86f0e35811b867e5e72d7cd028... handshake new: [116] 0301dccdea4cec5527a300acc1d6f53d25fd8b86f0e35811b867e5e72d7cd028... record old: [121] 010000750301dccdea4cec5527a300acc1d6f53d25fd8b86f0e35811b867e5e7... record new: [120] 010000740301dccdea4cec5527a300acc1d6f53d25fd8b86f0e35811b867e5e7... client: Filtered packet: [125] 1603010078010000740301dccdea4cec5527a300acc1d6f53d25fd8b86f0e358... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 03027bb612a3ce65c96be553d1f4a874170d3108b542e02fb88b078ec8b7748b... handshake new: [116] 03027bb612a3ce65c96be553d1f4a874170d3108b542e02fb88b078ec8b7748b... record old: [121] 0100007503027bb612a3ce65c96be553d1f4a874170d3108b542e02fb88b078e... record new: [120] 0100007403027bb612a3ce65c96be553d1f4a874170d3108b542e02fb88b078e... client: Filtered packet: [125] 16030100780100007403027bb612a3ce65c96be553d1f4a874170d3108b542e0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 03033162a1e1dedc960f74f216ee3bf015bc83c0f37032c72ca8e460f4489d6c... handshake new: [186] 03033162a1e1dedc960f74f216ee3bf015bc83c0f37032c72ca8e460f4489d6c... record old: [191] 010000bb03033162a1e1dedc960f74f216ee3bf015bc83c0f37032c72ca8e460... record new: [190] 010000ba03033162a1e1dedc960f74f216ee3bf015bc83c0f37032c72ca8e460... client: Filtered packet: [195] 16030100be010000ba03033162a1e1dedc960f74f216ee3bf015bc83c0f37032... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsEmpty/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 030199f0e0bb77d6d582302257a50f50ecd4468742a2ccce686eabbcf59a5697... handshake new: [118] 030199f0e0bb77d6d582302257a50f50ecd4468742a2ccce686eabbcf59a5697... record old: [121] 01000075030199f0e0bb77d6d582302257a50f50ecd4468742a2ccce686eabbc... record new: [122] 01000076030199f0e0bb77d6d582302257a50f50ecd4468742a2ccce686eabbc... client: Filtered packet: [127] 160301007a01000076030199f0e0bb77d6d582302257a50f50ecd4468742a2cc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 030258c1fc43ec467c8290023b71c0a47bcfbb2abdde9aafea6d6baabe56b1e2... handshake new: [118] 030258c1fc43ec467c8290023b71c0a47bcfbb2abdde9aafea6d6baabe56b1e2... record old: [121] 01000075030258c1fc43ec467c8290023b71c0a47bcfbb2abdde9aafea6d6baa... record new: [122] 01000076030258c1fc43ec467c8290023b71c0a47bcfbb2abdde9aafea6d6baa... client: Filtered packet: [127] 160301007a01000076030258c1fc43ec467c8290023b71c0a47bcfbb2abdde9a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 0303c5b9895d7bf1dc404511394559f6a398af0ced1cfa9f0e60794341bb8288... handshake new: [188] 0303c5b9895d7bf1dc404511394559f6a398af0ced1cfa9f0e60794341bb8288... record old: [191] 010000bb0303c5b9895d7bf1dc404511394559f6a398af0ced1cfa9f0e607943... record new: [192] 010000bc0303c5b9895d7bf1dc404511394559f6a398af0ced1cfa9f0e607943... client: Filtered packet: [197] 16030100c0010000bc0303c5b9895d7bf1dc404511394559f6a398af0ced1cfa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 030181ca6847bb1bac5b7be69f98f273733e2007be3406efedff6bfae66fbb57... handshake new: [118] 030181ca6847bb1bac5b7be69f98f273733e2007be3406efedff6bfae66fbb57... record old: [121] 01000075030181ca6847bb1bac5b7be69f98f273733e2007be3406efedff6bfa... record new: [122] 01000076030181ca6847bb1bac5b7be69f98f273733e2007be3406efedff6bfa... client: Filtered packet: [127] 160301007a01000076030181ca6847bb1bac5b7be69f98f273733e2007be3406... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 03023ff33bdaa0e808c998519e528fc7d219cd1e749e0c489941efdbdf91d388... handshake new: [118] 03023ff33bdaa0e808c998519e528fc7d219cd1e749e0c489941efdbdf91d388... record old: [121] 0100007503023ff33bdaa0e808c998519e528fc7d219cd1e749e0c489941efdb... record new: [122] 0100007603023ff33bdaa0e808c998519e528fc7d219cd1e749e0c489941efdb... client: Filtered packet: [127] 160301007a0100007603023ff33bdaa0e808c998519e528fc7d219cd1e749e0c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 0303f9d5ae9ecf4b1b671b45b0ef9a1f74cca83171bf7f3c083eb62467c385f5... handshake new: [188] 0303f9d5ae9ecf4b1b671b45b0ef9a1f74cca83171bf7f3c083eb62467c385f5... record old: [191] 010000bb0303f9d5ae9ecf4b1b671b45b0ef9a1f74cca83171bf7f3c083eb624... record new: [192] 010000bc0303f9d5ae9ecf4b1b671b45b0ef9a1f74cca83171bf7f3c083eb624... client: Filtered packet: [197] 16030100c0010000bc0303f9d5ae9ecf4b1b671b45b0ef9a1f74cca83171bf7f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsCompressed/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 0102 handshake old: [117] 0301b33355df459ce5bac2bafed380d4be953ce4f4f66e3ff6e3f3fad4634110... handshake new: [117] 0301b33355df459ce5bac2bafed380d4be953ce4f4f66e3ff6e3f3fad4634110... record old: [121] 010000750301b33355df459ce5bac2bafed380d4be953ce4f4f66e3ff6e3f3fa... record new: [121] 010000750301b33355df459ce5bac2bafed380d4be953ce4f4f66e3ff6e3f3fa... client: Filtered packet: [126] 1603010079010000750301b33355df459ce5bac2bafed380d4be953ce4f4f66e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsCompressed/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsCompressed/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 0102 handshake old: [117] 030297fa9c0877c433fc244b1f5f086300aa6a981e253a9e1a299711c27533d2... handshake new: [117] 030297fa9c0877c433fc244b1f5f086300aa6a981e253a9e1a299711c27533d2... record old: [121] 01000075030297fa9c0877c433fc244b1f5f086300aa6a981e253a9e1a299711... record new: [121] 01000075030297fa9c0877c433fc244b1f5f086300aa6a981e253a9e1a299711... client: Filtered packet: [126] 160301007901000075030297fa9c0877c433fc244b1f5f086300aa6a981e253a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsCompressed/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsCompressed/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 0102 handshake old: [187] 03032974dccb77596a8b837d05f5fb19fe07e124cdc4b4f419fb273963741c3e... handshake new: [187] 03032974dccb77596a8b837d05f5fb19fe07e124cdc4b4f419fb273963741c3e... record old: [191] 010000bb03032974dccb77596a8b837d05f5fb19fe07e124cdc4b4f419fb2739... record new: [191] 010000bb03032974dccb77596a8b837d05f5fb19fe07e124cdc4b4f419fb2739... client: Filtered packet: [196] 16030100bf010000bb03032974dccb77596a8b837d05f5fb19fe07e124cdc4b4... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsCompressed/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsUndefined/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 01aa handshake old: [117] 03017dd17f67133d7ce2849ca1081351a898643863f1361df6ad1388aba0d354... handshake new: [117] 03017dd17f67133d7ce2849ca1081351a898643863f1361df6ad1388aba0d354... record old: [121] 0100007503017dd17f67133d7ce2849ca1081351a898643863f1361df6ad1388... record new: [121] 0100007503017dd17f67133d7ce2849ca1081351a898643863f1361df6ad1388... client: Filtered packet: [126] 16030100790100007503017dd17f67133d7ce2849ca1081351a898643863f136... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsUndefined/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsUndefined/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 01aa handshake old: [117] 0302b67417a6f186618cc29d877f01c9f1a9db947b50d327890421392081c03e... handshake new: [117] 0302b67417a6f186618cc29d877f01c9f1a9db947b50d327890421392081c03e... record old: [121] 010000750302b67417a6f186618cc29d877f01c9f1a9db947b50d32789042139... record new: [121] 010000750302b67417a6f186618cc29d877f01c9f1a9db947b50d32789042139... client: Filtered packet: [126] 1603010079010000750302b67417a6f186618cc29d877f01c9f1a9db947b50d3... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsUndefined/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsUndefined/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 01aa handshake old: [187] 0303d10bf7247bf46ad7741b58594da7e8d36d80f134fa4729598a125f883409... handshake new: [187] 0303d10bf7247bf46ad7741b58594da7e8d36d80f134fa4729598a125f883409... record old: [191] 010000bb0303d10bf7247bf46ad7741b58594da7e8d36d80f134fa4729598a12... record new: [191] 010000bb0303d10bf7247bf46ad7741b58594da7e8d36d80f134fa4729598a12... client: Filtered packet: [196] 16030100bf010000bb0303d10bf7247bf46ad7741b58594da7e8d36d80f134fa... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.SupportedPointsUndefined/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0301383cab79dabf08c185713fe89228194a93ceb2385302b8b94e5520167cb2... handshake new: [117] 0301383cab79dabf08c185713fe89228194a93ceb2385302b8b94e5520167cb2... record old: [121] 010000750301383cab79dabf08c185713fe89228194a93ceb2385302b8b94e55... record new: [121] 010000750301383cab79dabf08c185713fe89228194a93ceb2385302b8b94e55... client: Filtered packet: [126] 1603010079010000750301383cab79dabf08c185713fe89228194a93ceb23853... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0302992f0c53bd75011f2775ddc55ce3981ab9c9ea65890f18fbaa27ea1691d3... handshake new: [117] 0302992f0c53bd75011f2775ddc55ce3981ab9c9ea65890f18fbaa27ea1691d3... record old: [121] 010000750302992f0c53bd75011f2775ddc55ce3981ab9c9ea65890f18fbaa27... record new: [121] 010000750302992f0c53bd75011f2775ddc55ce3981ab9c9ea65890f18fbaa27... client: Filtered packet: [126] 1603010079010000750302992f0c53bd75011f2775ddc55ce3981ab9c9ea6589... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 0303a9592f545cd89ef225df5c32afe1e27aee0ccec6acb4bed8a773abb16026... handshake new: [187] 0303a9592f545cd89ef225df5c32afe1e27aee0ccec6acb4bed8a773abb16026... record old: [191] 010000bb0303a9592f545cd89ef225df5c32afe1e27aee0ccec6acb4bed8a773... record new: [191] 010000bb0303a9592f545cd89ef225df5c32afe1e27aee0ccec6acb4bed8a773... client: Filtered packet: [196] 16030100bf010000bb0303a9592f545cd89ef225df5c32afe1e27aee0ccec6ac... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0301e4d9bc0f51887f8f6e1471a68a98a4a0804d92c4e4658eca34b3308a9e2b... handshake new: [118] 0301e4d9bc0f51887f8f6e1471a68a98a4a0804d92c4e4658eca34b3308a9e2b... record old: [121] 010000750301e4d9bc0f51887f8f6e1471a68a98a4a0804d92c4e4658eca34b3... record new: [122] 010000760301e4d9bc0f51887f8f6e1471a68a98a4a0804d92c4e4658eca34b3... client: Filtered packet: [127] 160301007a010000760301e4d9bc0f51887f8f6e1471a68a98a4a0804d92c4e4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 0302535ac8e1634cbc6913cd3a97fea9313e46a7aa24fce2c95f86b0bd22b5f3... handshake new: [118] 0302535ac8e1634cbc6913cd3a97fea9313e46a7aa24fce2c95f86b0bd22b5f3... record old: [121] 010000750302535ac8e1634cbc6913cd3a97fea9313e46a7aa24fce2c95f86b0... record new: [122] 010000760302535ac8e1634cbc6913cd3a97fea9313e46a7aa24fce2c95f86b0... client: Filtered packet: [127] 160301007a010000760302535ac8e1634cbc6913cd3a97fea9313e46a7aa24fc... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 0303ad34f1f6c0cce48aab247df51c43269a5f12c76a80b3a62da711b42790cd... handshake new: [188] 0303ad34f1f6c0cce48aab247df51c43269a5f12c76a80b3a62da711b42790cd... record old: [191] 010000bb0303ad34f1f6c0cce48aab247df51c43269a5f12c76a80b3a62da711... record new: [192] 010000bc0303ad34f1f6c0cce48aab247df51c43269a5f12c76a80b3a62da711... client: Filtered packet: [197] 16030100c0010000bc0303ad34f1f6c0cce48aab247df51c43269a5f12c76a80... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 030115fba310089b0bd292817e8e56e9a85e7e61229295548cb9f8e0e7315540... handshake new: [116] 030115fba310089b0bd292817e8e56e9a85e7e61229295548cb9f8e0e7315540... record old: [121] 01000075030115fba310089b0bd292817e8e56e9a85e7e61229295548cb9f8e0... record new: [120] 01000074030115fba310089b0bd292817e8e56e9a85e7e61229295548cb9f8e0... client: Filtered packet: [125] 160301007801000074030115fba310089b0bd292817e8e56e9a85e7e61229295... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 03026496c92cfa54c0d6555be1d2ec6e4470791e585aa4846a50eba63ae1b14f... handshake new: [116] 03026496c92cfa54c0d6555be1d2ec6e4470791e585aa4846a50eba63ae1b14f... record old: [121] 0100007503026496c92cfa54c0d6555be1d2ec6e4470791e585aa4846a50eba6... record new: [120] 0100007403026496c92cfa54c0d6555be1d2ec6e4470791e585aa4846a50eba6... client: Filtered packet: [125] 16030100780100007403026496c92cfa54c0d6555be1d2ec6e4470791e585aa4... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (2 ms) [ RUN ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 03039b3daf4fd91d1e49af03ad6d1e33dfd4f3f8014d220d146a9615b56b6e42... handshake new: [186] 03039b3daf4fd91d1e49af03ad6d1e33dfd4f3f8014d220d146a9615b56b6e42... record old: [191] 010000bb03039b3daf4fd91d1e49af03ad6d1e33dfd4f3f8014d220d146a9615... record new: [190] 010000ba03039b3daf4fd91d1e49af03ad6d1e33dfd4f3f8014d220d146a9615... client: Filtered packet: [195] 16030100be010000ba03039b3daf4fd91d1e49af03ad6d1e33dfd4f3f8014d22... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Stream/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (2 ms) [----------] 45 tests from ExtensionPre13Stream/TlsExtensionTestPre13 (164 ms total) [----------] 60 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0302e832fe8fa31628eb7589e7a973f68cb16d6feee07da443d87b5a028b4b00... handshake new: [99] 0302e832fe8fa31628eb7589e7a973f68cb16d6feee07da443d87b5a028b4b00... record old: [721] 020000650302e832fe8fa31628eb7589e7a973f68cb16d6feee07da443d87b5a... record new: [719] 020000630302e832fe8fa31628eb7589e7a973f68cb16d6feee07da443d87b5a... server: Filtered packet: [724] 16030202cf020000630302e832fe8fa31628eb7589e7a973f68cb16d6feee07d... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/0 (6 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] 0303f4a6a1a43e446e348f93566e9b2cabbb4f124cf4733909f39682a3cb708c... handshake new: [99] 0303f4a6a1a43e446e348f93566e9b2cabbb4f124cf4733909f39682a3cb708c... record old: [723] 020000650303f4a6a1a43e446e348f93566e9b2cabbb4f124cf4733909f39682... record new: [721] 020000630303f4a6a1a43e446e348f93566e9b2cabbb4f124cf4733909f39682... server: Filtered packet: [726] 16030302d1020000630303f4a6a1a43e446e348f93566e9b2cabbb4f124cf473... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/1 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] feffb117b76b8fa3a2ae2f2a0a15b4fcde5909922c6db5fe59a23ff48d32b590... handshake new: [99] feffb117b76b8fa3a2ae2f2a0a15b4fcde5909922c6db5fe59a23ff48d32b590... record old: [113] 020000650000000000000065feffb117b76b8fa3a2ae2f2a0a15b4fcde590992... record new: [111] 020000630000000000000063feffb117b76b8fa3a2ae2f2a0a15b4fcde590992... server: Filtered packet: [803] 16feff0000000000000000006f020000630000000000000063feffb117b76b8f... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/2 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [2] 0000 handshake old: [101] fefd4fd3df303b94d71ea6ccc2aeade4e85b82a48c39b5e3e91448219d5f8caf... handshake new: [99] fefd4fd3df303b94d71ea6ccc2aeade4e85b82a48c39b5e3e91448219d5f8caf... record old: [113] 020000650000000000000065fefd4fd3df303b94d71ea6ccc2aeade4e85b82a4... record new: [111] 020000630000000000000063fefd4fd3df303b94d71ea6ccc2aeade4e85b82a4... server: Filtered packet: [805] 16fefd0000000000000000006f020000630000000000000063fefd4fd3df303b... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyList/3 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 0302b0c4336764f8dca60b55b829b6d2cc3064e10c81828de6fa2d0fe01ccbf0... handshake new: [100] 0302b0c4336764f8dca60b55b829b6d2cc3064e10c81828de6fa2d0fe01ccbf0... record old: [721] 020000650302b0c4336764f8dca60b55b829b6d2cc3064e10c81828de6fa2d0f... record new: [720] 020000640302b0c4336764f8dca60b55b829b6d2cc3064e10c81828de6fa2d0f... server: Filtered packet: [725] 16030202d0020000640302b0c4336764f8dca60b55b829b6d2cc3064e10c8182... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/0 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] 03039d2990ec0546479c02054d54b58f12c78d96f9b5bc1619d968bceb323aaf... handshake new: [100] 03039d2990ec0546479c02054d54b58f12c78d96f9b5bc1619d968bceb323aaf... record old: [723] 0200006503039d2990ec0546479c02054d54b58f12c78d96f9b5bc1619d968bc... record new: [722] 0200006403039d2990ec0546479c02054d54b58f12c78d96f9b5bc1619d968bc... server: Filtered packet: [727] 16030302d20200006403039d2990ec0546479c02054d54b58f12c78d96f9b5bc... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/1 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] feffa7b53757ce5a729c0c652277a2de5ddc5352e81462d86684bf5b6e440c74... handshake new: [100] feffa7b53757ce5a729c0c652277a2de5ddc5352e81462d86684bf5b6e440c74... record old: [113] 020000650000000000000065feffa7b53757ce5a729c0c652277a2de5ddc5352... record new: [112] 020000640000000000000064feffa7b53757ce5a729c0c652277a2de5ddc5352... server: Filtered packet: [804] 16feff00000000000000000070020000640000000000000064feffa7b53757ce... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/2 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [3] 000100 handshake old: [101] fefd4fe1ca827fb494e5670c7152cd94ad183df21e17e4729c7fac19893fb60d... handshake new: [100] fefd4fe1ca827fb494e5670c7152cd94ad183df21e17e4729c7fac19893fb60d... record old: [113] 020000650000000000000065fefd4fe1ca827fb494e5670c7152cd94ad183df2... record new: [112] 020000640000000000000064fefd4fe1ca827fb494e5670c7152cd94ad183df2... server: Filtered packet: [806] 16fefd00000000000000000070020000640000000000000064fefd4fe1ca827f... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedEmptyName/3 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 0302835f88355aa321bb8a3c87fdfb997cd4241858b033f0754a3fc846caa3ab... handshake new: [102] 0302835f88355aa321bb8a3c87fdfb997cd4241858b033f0754a3fc846caa3ab... record old: [721] 020000650302835f88355aa321bb8a3c87fdfb997cd4241858b033f0754a3fc8... record new: [722] 020000660302835f88355aa321bb8a3c87fdfb997cd4241858b033f0754a3fc8... server: Filtered packet: [727] 16030202d2020000660302835f88355aa321bb8a3c87fdfb997cd4241858b033... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/0 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] 03038fdb0448fa6d8dd11b54499ad06a22aa62305d3bade9e0c988014930c64b... handshake new: [102] 03038fdb0448fa6d8dd11b54499ad06a22aa62305d3bade9e0c988014930c64b... record old: [723] 0200006503038fdb0448fa6d8dd11b54499ad06a22aa62305d3bade9e0c98801... record new: [724] 0200006603038fdb0448fa6d8dd11b54499ad06a22aa62305d3bade9e0c98801... server: Filtered packet: [729] 16030302d40200006603038fdb0448fa6d8dd11b54499ad06a22aa62305d3bad... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/1 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] feffadfdb08ba22f4baad5a9a9133cebefa78ddd0c5af4f0dee99ae1003e36b6... handshake new: [102] feffadfdb08ba22f4baad5a9a9133cebefa78ddd0c5af4f0dee99ae1003e36b6... record old: [113] 020000650000000000000065feffadfdb08ba22f4baad5a9a9133cebefa78ddd... record new: [114] 020000660000000000000066feffadfdb08ba22f4baad5a9a9133cebefa78ddd... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feffadfdb08ba2... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/2 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0002016100 handshake old: [101] fefd15e4f48e11351dd25add1b512af6c7177f3ed8ab191d29c624e40766c6c3... handshake new: [102] fefd15e4f48e11351dd25add1b512af6c7177f3ed8ab191d29c624e40766c6c3... record old: [113] 020000650000000000000065fefd15e4f48e11351dd25add1b512af6c7177f3e... record new: [114] 020000660000000000000066fefd15e4f48e11351dd25add1b512af6c7177f3e... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefd15e4f48e11... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedListTrailingData/3 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 03025df4494428f9d3b3e56b7b2081a767b39b155fe533d7d5b7e112382cb43a... handshake new: [103] 03025df4494428f9d3b3e56b7b2081a767b39b155fe533d7d5b7e112382cb43a... record old: [721] 0200006503025df4494428f9d3b3e56b7b2081a767b39b155fe533d7d5b7e112... record new: [723] 0200006703025df4494428f9d3b3e56b7b2081a767b39b155fe533d7d5b7e112... server: Filtered packet: [728] 16030202d30200006703025df4494428f9d3b3e56b7b2081a767b39b155fe533... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/0 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] 0303f68d4bd774f15e8a901a1344431e5f2ff03911ae39dd5de9a5690b26e4e0... handshake new: [103] 0303f68d4bd774f15e8a901a1344431e5f2ff03911ae39dd5de9a5690b26e4e0... record old: [723] 020000650303f68d4bd774f15e8a901a1344431e5f2ff03911ae39dd5de9a569... record new: [725] 020000670303f68d4bd774f15e8a901a1344431e5f2ff03911ae39dd5de9a569... server: Filtered packet: [730] 16030302d5020000670303f68d4bd774f15e8a901a1344431e5f2ff03911ae39... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/1 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] fefff91efab6dfafdd629917843756557de89039b878002d88aacc0bd556eeb0... handshake new: [103] fefff91efab6dfafdd629917843756557de89039b878002d88aacc0bd556eeb0... record old: [113] 020000650000000000000065fefff91efab6dfafdd629917843756557de89039... record new: [115] 020000670000000000000067fefff91efab6dfafdd629917843756557de89039... server: Filtered packet: [807] 16feff00000000000000000073020000670000000000000067fefff91efab6df... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/2 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [6] 000401610162 handshake old: [101] fefdd15cea06847eee6924b9b0074b75b00b21866ba083a00ea132643cef72fd... handshake new: [103] fefdd15cea06847eee6924b9b0074b75b00b21866ba083a00ea132643cef72fd... record old: [113] 020000650000000000000065fefdd15cea06847eee6924b9b0074b75b00b2186... record new: [115] 020000670000000000000067fefdd15cea06847eee6924b9b0074b75b00b2186... server: Filtered packet: [809] 16fefd00000000000000000073020000670000000000000067fefdd15cea0684... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedExtraEntry/3 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0302dc87b3223cc7d7a4594d46501b50751f14a3b5c97a714dbb16c0bd8b979a... handshake new: [102] 0302dc87b3223cc7d7a4594d46501b50751f14a3b5c97a714dbb16c0bd8b979a... record old: [721] 020000650302dc87b3223cc7d7a4594d46501b50751f14a3b5c97a714dbb16c0... record new: [722] 020000660302dc87b3223cc7d7a4594d46501b50751f14a3b5c97a714dbb16c0... server: Filtered packet: [727] 16030202d2020000660302dc87b3223cc7d7a4594d46501b50751f14a3b5c97a... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/0 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] 0303c236bc77a832ecaba7abc309f5e370b8c3f40819954f81a1210dadbd6022... handshake new: [102] 0303c236bc77a832ecaba7abc309f5e370b8c3f40819954f81a1210dadbd6022... record old: [723] 020000650303c236bc77a832ecaba7abc309f5e370b8c3f40819954f81a1210d... record new: [724] 020000660303c236bc77a832ecaba7abc309f5e370b8c3f40819954f81a1210d... server: Filtered packet: [729] 16030302d4020000660303c236bc77a832ecaba7abc309f5e370b8c3f4081995... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/1 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] feffe9900f3ede199cac23d412382653c307f232f6a1e4fa3ba810476033abbc... handshake new: [102] feffe9900f3ede199cac23d412382653c307f232f6a1e4fa3ba810476033abbc... record old: [113] 020000650000000000000065feffe9900f3ede199cac23d412382653c307f232... record new: [114] 020000660000000000000066feffe9900f3ede199cac23d412382653c307f232... server: Filtered packet: [806] 16feff00000000000000000072020000660000000000000066feffe9900f3ede... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/2 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [5] 0099016100 handshake old: [101] fefd60b42c6ce168e364ba92849b8c91857e63d7b2a3ee0f1a0b4a75f7d2c845... handshake new: [102] fefd60b42c6ce168e364ba92849b8c91857e63d7b2a3ee0f1a0b4a75f7d2c845... record old: [113] 020000650000000000000065fefd60b42c6ce168e364ba92849b8c91857e63d7... record new: [114] 020000660000000000000066fefd60b42c6ce168e364ba92849b8c91857e63d7... server: Filtered packet: [808] 16fefd00000000000000000072020000660000000000000066fefd60b42c6ce1... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadListLength/3 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 0302e2483cb7dd8622c7c3abd189c31118210a0d3bc978e799e902dd292acbe8... handshake new: [101] 0302e2483cb7dd8622c7c3abd189c31118210a0d3bc978e799e902dd292acbe8... record old: [721] 020000650302e2483cb7dd8622c7c3abd189c31118210a0d3bc978e799e902dd... record new: [721] 020000650302e2483cb7dd8622c7c3abd189c31118210a0d3bc978e799e902dd... server: Filtered packet: [726] 16030202d1020000650302e2483cb7dd8622c7c3abd189c31118210a0d3bc978... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/0 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] 030301d3a9982bda641059ea50f1e8df87d4e03e2c36ff3c9381bc589d7397c3... handshake new: [101] 030301d3a9982bda641059ea50f1e8df87d4e03e2c36ff3c9381bc589d7397c3... record old: [723] 02000065030301d3a9982bda641059ea50f1e8df87d4e03e2c36ff3c9381bc58... record new: [723] 02000065030301d3a9982bda641059ea50f1e8df87d4e03e2c36ff3c9381bc58... server: Filtered packet: [728] 16030302d302000065030301d3a9982bda641059ea50f1e8df87d4e03e2c36ff... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/1 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] feffe77eb54d00a71a7a17838f38e01e3344be68e574c3f03b6bdad4c8653fed... handshake new: [101] feffe77eb54d00a71a7a17838f38e01e3344be68e574c3f03b6bdad4c8653fed... record old: [113] 020000650000000000000065feffe77eb54d00a71a7a17838f38e01e3344be68... record new: [113] 020000650000000000000065feffe77eb54d00a71a7a17838f38e01e3344be68... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065feffe77eb54d00... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/2 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00029961 handshake old: [101] fefd5bbc4948c9fa3afada4c51114fd515b6b5be3aa776489779675bef41cdaa... handshake new: [101] fefd5bbc4948c9fa3afada4c51114fd515b6b5be3aa776489779675bef41cdaa... record old: [113] 020000650000000000000065fefd5bbc4948c9fa3afada4c51114fd515b6b5be... record new: [113] 020000650000000000000065fefd5bbc4948c9fa3afada4c51114fd515b6b5be... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefd5bbc4948c9... client: Fatal alert sent: 50 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 50 server: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedBadNameLength/3 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 03023915574708a6577c3179f8fb1376ada4075ec3bcba6656da0d28400d7ed3... handshake new: [101] 03023915574708a6577c3179f8fb1376ada4075ec3bcba6656da0d28400d7ed3... record old: [721] 0200006503023915574708a6577c3179f8fb1376ada4075ec3bcba6656da0d28... record new: [721] 0200006503023915574708a6577c3179f8fb1376ada4075ec3bcba6656da0d28... server: Filtered packet: [726] 16030202d10200006503023915574708a6577c3179f8fb1376ada4075ec3bcba... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/0 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] 030327b5d8dbb3c31fe018407eaa707fe95f6c16db4495b6bb0f7db5ce68e5ae... handshake new: [101] 030327b5d8dbb3c31fe018407eaa707fe95f6c16db4495b6bb0f7db5ce68e5ae... record old: [723] 02000065030327b5d8dbb3c31fe018407eaa707fe95f6c16db4495b6bb0f7db5... record new: [723] 02000065030327b5d8dbb3c31fe018407eaa707fe95f6c16db4495b6bb0f7db5... server: Filtered packet: [728] 16030302d302000065030327b5d8dbb3c31fe018407eaa707fe95f6c16db4495... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/1 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] feff0a8afabf59e71aed9676b9c5d6dc3d08b5b3c68d123d19db11182a376240... handshake new: [101] feff0a8afabf59e71aed9676b9c5d6dc3d08b5b3c68d123d19db11182a376240... record old: [113] 020000650000000000000065feff0a8afabf59e71aed9676b9c5d6dc3d08b5b3... record new: [113] 020000650000000000000065feff0a8afabf59e71aed9676b9c5d6dc3d08b5b3... server: Filtered packet: [805] 16feff00000000000000000071020000650000000000000065feff0a8afabf59... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/2 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [4] 00020161 extension new: [4] 00020167 handshake old: [101] fefd6a91e95616f025c3b5fb0e8da0b14facc09b0b88c24d6928a9422b8b606c... handshake new: [101] fefd6a91e95616f025c3b5fb0e8da0b14facc09b0b88c24d6928a9422b8b606c... record old: [113] 020000650000000000000065fefd6a91e95616f025c3b5fb0e8da0b14facc09b... record new: [113] 020000650000000000000065fefd6a91e95616f025c3b5fb0e8da0b14facc09b... server: Filtered packet: [807] 16fefd00000000000000000071020000650000000000000065fefd6a91e95616... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_NEXT_PROTOCOL_DATA_INVALID: SSL received invalid ALPN extension data. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.AlpnReturnedUnknownName/3 (4 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [117] 03023e24e49f5c0ba831c8de01a8a15bdf3a13e4218dfa1bd319922fa4621e1f... handshake new: [116] 03023e24e49f5c0ba831c8de01a8a15bdf3a13e4218dfa1bd319922fa4621e1f... record old: [121] 0100007503023e24e49f5c0ba831c8de01a8a15bdf3a13e4218dfa1bd319922f... record new: [120] 0100007403023e24e49f5c0ba831c8de01a8a15bdf3a13e4218dfa1bd319922f... client: Filtered packet: [125] 16030100780100007403023e24e49f5c0ba831c8de01a8a15bdf3a13e4218dfa... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [187] 0303051356b6792abf276d4951fb9ee74c5023a4c735dfa390b8482c46e2f34d... handshake new: [186] 0303051356b6792abf276d4951fb9ee74c5023a4c735dfa390b8482c46e2f34d... record old: [191] 010000bb0303051356b6792abf276d4951fb9ee74c5023a4c735dfa390b8482c... record new: [190] 010000ba0303051356b6792abf276d4951fb9ee74c5023a4c735dfa390b8482c... client: Filtered packet: [195] 16030100be010000ba0303051356b6792abf276d4951fb9ee74c5023a4c735df... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [114] feffc1e09dce343dea65856a1796bda315c4329567e8de57a0263290ed81ab53... handshake new: [113] feffc1e09dce343dea65856a1796bda315c4329567e8de57a0263290ed81ab53... record old: [126] 010000720000000000000072feffc1e09dce343dea65856a1796bda315c43295... record new: [125] 010000710000000000000071feffc1e09dce343dea65856a1796bda315c43295... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071feffc1e09dce34... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [1] 00 handshake old: [184] fefd9d4d1771b9d54dc5cad2458132271dfb5da108816232b0759a0b575f05ae... handshake new: [183] fefd9d4d1771b9d54dc5cad2458132271dfb5da108816232b0759a0b575f05ae... record old: [196] 010000b800000000000000b8fefd9d4d1771b9d54dc5cad2458132271dfb5da1... record new: [195] 010000b700000000000000b7fefd9d4d1771b9d54dc5cad2458132271dfb5da1... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd9d4d1771b9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsEmpty/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [117] 03023df1a2f7a6544e404c5daa43e5949cdeb2527a2737d96dc902ae6e2a8ab6... handshake new: [118] 03023df1a2f7a6544e404c5daa43e5949cdeb2527a2737d96dc902ae6e2a8ab6... record old: [121] 0100007503023df1a2f7a6544e404c5daa43e5949cdeb2527a2737d96dc902ae... record new: [122] 0100007603023df1a2f7a6544e404c5daa43e5949cdeb2527a2737d96dc902ae... client: Filtered packet: [127] 160301007a0100007603023df1a2f7a6544e404c5daa43e5949cdeb2527a2737... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [187] 03030ce9027b9c29e7d409ba440136e6b0beb1a289fb15b8bf3809b9ea77f79c... handshake new: [188] 03030ce9027b9c29e7d409ba440136e6b0beb1a289fb15b8bf3809b9ea77f79c... record old: [191] 010000bb03030ce9027b9c29e7d409ba440136e6b0beb1a289fb15b8bf3809b9... record new: [192] 010000bc03030ce9027b9c29e7d409ba440136e6b0beb1a289fb15b8bf3809b9... client: Filtered packet: [197] 16030100c0010000bc03030ce9027b9c29e7d409ba440136e6b0beb1a289fb15... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [114] feffb380eecd05e06d348fca6ec22122d0e3f98518e0eed82dbd8935f39991ec... handshake new: [115] feffb380eecd05e06d348fca6ec22122d0e3f98518e0eed82dbd8935f39991ec... record old: [126] 010000720000000000000072feffb380eecd05e06d348fca6ec22122d0e3f985... record new: [127] 010000730000000000000073feffb380eecd05e06d348fca6ec22122d0e3f985... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feffb380eecd05... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 990000 handshake old: [184] fefdceb10f5b51fe4a7e620255829cd2aefbfa0f45d12c070f622962e87bffcb... handshake new: [185] fefdceb10f5b51fe4a7e620255829cd2aefbfa0f45d12c070f622962e87bffcb... record old: [196] 010000b800000000000000b8fefdceb10f5b51fe4a7e620255829cd2aefbfa0f... record new: [197] 010000b900000000000000b9fefdceb10f5b51fe4a7e620255829cd2aefbfa0f... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdceb10f5b51... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsBadLength/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [117] 03020da471ccf34f98ad5e12a5335b78376b14e9707dbeec3d250e0f7c7faf64... handshake new: [118] 03020da471ccf34f98ad5e12a5335b78376b14e9707dbeec3d250e0f7c7faf64... record old: [121] 0100007503020da471ccf34f98ad5e12a5335b78376b14e9707dbeec3d250e0f... record new: [122] 0100007603020da471ccf34f98ad5e12a5335b78376b14e9707dbeec3d250e0f... client: Filtered packet: [127] 160301007a0100007603020da471ccf34f98ad5e12a5335b78376b14e9707dbe... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [187] 0303cf54f3a34dd4cc89f422994eccf28ff1b0d19567a978eaf1c6740d02b32e... handshake new: [188] 0303cf54f3a34dd4cc89f422994eccf28ff1b0d19567a978eaf1c6740d02b32e... record old: [191] 010000bb0303cf54f3a34dd4cc89f422994eccf28ff1b0d19567a978eaf1c674... record new: [192] 010000bc0303cf54f3a34dd4cc89f422994eccf28ff1b0d19567a978eaf1c674... client: Filtered packet: [197] 16030100c0010000bc0303cf54f3a34dd4cc89f422994eccf28ff1b0d19567a9... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [114] feff3cd40940abf8be06a5969463c52efef3e000c8158ba61c2f1a47460479ef... handshake new: [115] feff3cd40940abf8be06a5969463c52efef3e000c8158ba61c2f1a47460479ef... record old: [126] 010000720000000000000072feff3cd40940abf8be06a5969463c52efef3e000... record new: [127] 010000730000000000000073feff3cd40940abf8be06a5969463c52efef3e000... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feff3cd40940ab... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [3] 010000 handshake old: [184] fefdaa91143eb880e6a13a0ca9d902ec34178d3a3e442a206d31dea29836f1da... handshake new: [185] fefdaa91143eb880e6a13a0ca9d902ec34178d3a3e442a206d31dea29836f1da... record old: [196] 010000b800000000000000b8fefdaa91143eb880e6a13a0ca9d902ec34178d3a... record new: [197] 010000b900000000000000b9fefdaa91143eb880e6a13a0ca9d902ec34178d3a... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefdaa91143eb8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsTrailingData/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 0102 handshake old: [117] 030214a7103648d698049dfd12a6a5b3cf56b9659659e122c4c9e927315a39b9... handshake new: [117] 030214a7103648d698049dfd12a6a5b3cf56b9659659e122c4c9e927315a39b9... record old: [121] 01000075030214a7103648d698049dfd12a6a5b3cf56b9659659e122c4c9e927... record new: [121] 01000075030214a7103648d698049dfd12a6a5b3cf56b9659659e122c4c9e927... client: Filtered packet: [126] 160301007901000075030214a7103648d698049dfd12a6a5b3cf56b9659659e1... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 0102 handshake old: [187] 0303936bb8d2543ebd26b38fed83da2da4a88c46cb15bf38f4dc67c001e6f6fd... handshake new: [187] 0303936bb8d2543ebd26b38fed83da2da4a88c46cb15bf38f4dc67c001e6f6fd... record old: [191] 010000bb0303936bb8d2543ebd26b38fed83da2da4a88c46cb15bf38f4dc67c0... record new: [191] 010000bb0303936bb8d2543ebd26b38fed83da2da4a88c46cb15bf38f4dc67c0... client: Filtered packet: [196] 16030100bf010000bb0303936bb8d2543ebd26b38fed83da2da4a88c46cb15bf... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 0102 handshake old: [114] feff8318b2474d36e67e3f1a5dab9a9bb841965a81788e7678ae73785188664f... handshake new: [114] feff8318b2474d36e67e3f1a5dab9a9bb841965a81788e7678ae73785188664f... record old: [126] 010000720000000000000072feff8318b2474d36e67e3f1a5dab9a9bb841965a... record new: [126] 010000720000000000000072feff8318b2474d36e67e3f1a5dab9a9bb841965a... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff8318b2474d... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 0102 handshake old: [184] fefdcc72e7ed7e0d9703658ae36b3ff10b917b48f88e01ca2b97ee6ed3d5839f... handshake new: [184] fefdcc72e7ed7e0d9703658ae36b3ff10b917b48f88e01ca2b97ee6ed3d5839f... record old: [196] 010000b800000000000000b8fefdcc72e7ed7e0d9703658ae36b3ff10b917b48... record new: [196] 010000b800000000000000b8fefdcc72e7ed7e0d9703658ae36b3ff10b917b48... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefdcc72e7ed7e... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsCompressed/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 01aa handshake old: [117] 0302b453257c3d88cb93e30b0b8f2f8da4ebebe317e024def32e825ae2cd1420... handshake new: [117] 0302b453257c3d88cb93e30b0b8f2f8da4ebebe317e024def32e825ae2cd1420... record old: [121] 010000750302b453257c3d88cb93e30b0b8f2f8da4ebebe317e024def32e825a... record new: [121] 010000750302b453257c3d88cb93e30b0b8f2f8da4ebebe317e024def32e825a... client: Filtered packet: [126] 1603010079010000750302b453257c3d88cb93e30b0b8f2f8da4ebebe317e024... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 01aa handshake old: [187] 030306bf16d044a871b1390c6403234fb5bcaeb438589aa16c579fd53357a9a3... handshake new: [187] 030306bf16d044a871b1390c6403234fb5bcaeb438589aa16c579fd53357a9a3... record old: [191] 010000bb030306bf16d044a871b1390c6403234fb5bcaeb438589aa16c579fd5... record new: [191] 010000bb030306bf16d044a871b1390c6403234fb5bcaeb438589aa16c579fd5... client: Filtered packet: [196] 16030100bf010000bb030306bf16d044a871b1390c6403234fb5bcaeb438589a... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 01aa handshake old: [114] feff03d1a8e7e18922d172e6df12752ef6298f789206e2347818c5c7741da3d9... handshake new: [114] feff03d1a8e7e18922d172e6df12752ef6298f789206e2347818c5c7741da3d9... record old: [126] 010000720000000000000072feff03d1a8e7e18922d172e6df12752ef6298f78... record new: [126] 010000720000000000000072feff03d1a8e7e18922d172e6df12752ef6298f78... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff03d1a8e7e1... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [2] 0100 extension new: [2] 01aa handshake old: [184] fefd81bd1f01e529b4e95b9fb7101e6be7975a9c0edbf1d5d1d5b5802bdb0bb6... handshake new: [184] fefd81bd1f01e529b4e95b9fb7101e6be7975a9c0edbf1d5d1d5b5802bdb0bb6... record old: [196] 010000b800000000000000b8fefd81bd1f01e529b4e95b9fb7101e6be7975a9c... record new: [196] 010000b800000000000000b8fefd81bd1f01e529b4e95b9fb7101e6be7975a9c... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd81bd1f01e5... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.SupportedPointsUndefined/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [117] 0302b3710c491fa6a3b4ec30d41a0a52775348bb00d9c8e50997834857af0da2... handshake new: [117] 0302b3710c491fa6a3b4ec30d41a0a52775348bb00d9c8e50997834857af0da2... record old: [121] 010000750302b3710c491fa6a3b4ec30d41a0a52775348bb00d9c8e509978348... record new: [121] 010000750302b3710c491fa6a3b4ec30d41a0a52775348bb00d9c8e509978348... client: Filtered packet: [126] 1603010079010000750302b3710c491fa6a3b4ec30d41a0a52775348bb00d9c8... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [187] 0303b3cd0d65d67c9eb0aa745c41e9f98deedc0c0e949cfd43b6a6bee5119d39... handshake new: [187] 0303b3cd0d65d67c9eb0aa745c41e9f98deedc0c0e949cfd43b6a6bee5119d39... record old: [191] 010000bb0303b3cd0d65d67c9eb0aa745c41e9f98deedc0c0e949cfd43b6a6be... record new: [191] 010000bb0303b3cd0d65d67c9eb0aa745c41e9f98deedc0c0e949cfd43b6a6be... client: Filtered packet: [196] 16030100bf010000bb0303b3cd0d65d67c9eb0aa745c41e9f98deedc0c0e949c... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [114] feff72a149eb1d52c89420a4909d1c220a77a54014dcecfa97b21e4cbee1c31b... handshake new: [114] feff72a149eb1d52c89420a4909d1c220a77a54014dcecfa97b21e4cbee1c31b... record old: [126] 010000720000000000000072feff72a149eb1d52c89420a4909d1c220a77a540... record new: [126] 010000720000000000000072feff72a149eb1d52c89420a4909d1c220a77a540... client: Filtered packet: [139] 16feff0000000000000000007e010000720000000000000072feff72a149eb1d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [1] 99 handshake old: [184] fefd99ede75f64d50229fe490d74e040af36dd5826a1ea31153545b655e93476... handshake new: [184] fefd99ede75f64d50229fe490d74e040af36dd5826a1ea31153545b655e93476... record old: [196] 010000b800000000000000b8fefd99ede75f64d50229fe490d74e040af36dd58... record new: [196] 010000b800000000000000b8fefd99ede75f64d50229fe490d74e040af36dd58... client: Filtered packet: [209] 16feff000000000000000000c4010000b800000000000000b8fefd99ede75f64... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoBadLength/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [117] 030291e59a02477ad8947a6c1f2d8d8d3352b25f8d20098d34a84ea6324c11a4... handshake new: [118] 030291e59a02477ad8947a6c1f2d8d8d3352b25f8d20098d34a84ea6324c11a4... record old: [121] 01000075030291e59a02477ad8947a6c1f2d8d8d3352b25f8d20098d34a84ea6... record new: [122] 01000076030291e59a02477ad8947a6c1f2d8d8d3352b25f8d20098d34a84ea6... client: Filtered packet: [127] 160301007a01000076030291e59a02477ad8947a6c1f2d8d8d3352b25f8d2009... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [187] 03037a302232dac8812e63f2a4983478f4c4446ac14ded95ab89f742b6d3bb93... handshake new: [188] 03037a302232dac8812e63f2a4983478f4c4446ac14ded95ab89f742b6d3bb93... record old: [191] 010000bb03037a302232dac8812e63f2a4983478f4c4446ac14ded95ab89f742... record new: [192] 010000bc03037a302232dac8812e63f2a4983478f4c4446ac14ded95ab89f742... client: Filtered packet: [197] 16030100c0010000bc03037a302232dac8812e63f2a4983478f4c4446ac14ded... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [114] feff19713670dac47154708b57f06fe96b87ba999a55daac4a97817ce6512273... handshake new: [115] feff19713670dac47154708b57f06fe96b87ba999a55daac4a97817ce6512273... record old: [126] 010000720000000000000072feff19713670dac47154708b57f06fe96b87ba99... record new: [127] 010000730000000000000073feff19713670dac47154708b57f06fe96b87ba99... client: Filtered packet: [140] 16feff0000000000000000007f010000730000000000000073feff19713670da... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [2] 0100 handshake old: [184] fefd4f87d2eeac98e2c58c9d11ca974f1e14ad8a0a31ce4aaafcceeee7b795f5... handshake new: [185] fefd4f87d2eeac98e2c58c9d11ca974f1e14ad8a0a31ce4aaafcceeee7b795f5... record old: [196] 010000b800000000000000b8fefd4f87d2eeac98e2c58c9d11ca974f1e14ad8a... record new: [197] 010000b900000000000000b9fefd4f87d2eeac98e2c58c9d11ca974f1e14ad8a... client: Filtered packet: [210] 16feff000000000000000000c5010000b900000000000000b9fefd4f87d2eeac... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoMismatch/3 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [117] 030206b9c64baa598a4dc0cf2c480eba6b36aa0c134cf5278914b9be66090dd2... handshake new: [116] 030206b9c64baa598a4dc0cf2c480eba6b36aa0c134cf5278914b9be66090dd2... record old: [121] 01000075030206b9c64baa598a4dc0cf2c480eba6b36aa0c134cf5278914b9be... record new: [120] 01000074030206b9c64baa598a4dc0cf2c480eba6b36aa0c134cf5278914b9be... client: Filtered packet: [125] 160301007801000074030206b9c64baa598a4dc0cf2c480eba6b36aa0c134cf5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/0 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [187] 030306f7324ee8bd0706ac3c0e08545f3036e26f0a5c1ff85a5beb7d8ef1983a... handshake new: [186] 030306f7324ee8bd0706ac3c0e08545f3036e26f0a5c1ff85a5beb7d8ef1983a... record old: [191] 010000bb030306f7324ee8bd0706ac3c0e08545f3036e26f0a5c1ff85a5beb7d... record new: [190] 010000ba030306f7324ee8bd0706ac3c0e08545f3036e26f0a5c1ff85a5beb7d... client: Filtered packet: [195] 16030100be010000ba030306f7324ee8bd0706ac3c0e08545f3036e26f0a5c1f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/1 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [114] fefff4aef2d1f3cd6145acb2b87e93553adda7805f823c19787ad2d41f9ef27e... handshake new: [113] fefff4aef2d1f3cd6145acb2b87e93553adda7805f823c19787ad2d41f9ef27e... record old: [126] 010000720000000000000072fefff4aef2d1f3cd6145acb2b87e93553adda780... record new: [125] 010000710000000000000071fefff4aef2d1f3cd6145acb2b87e93553adda780... client: Filtered packet: [138] 16feff0000000000000000007d010000710000000000000071fefff4aef2d1f3... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/2 (2 ms) [ RUN ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [1] 00 extension new: [0] handshake old: [184] fefdb05834b54fad1dd52a774324854dfa05bcbe972f289ed559b3667bdd1ff7... handshake new: [183] fefdb05834b54fad1dd52a774324854dfa05bcbe972f289ed559b3667bdd1ff7... record old: [196] 010000b800000000000000b8fefdb05834b54fad1dd52a774324854dfa05bcbe... record new: [195] 010000b700000000000000b7fefdb05834b54fad1dd52a774324854dfa05bcbe... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefdb05834b54f... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionPre13Datagram/TlsExtensionTestPre13.RenegotiationInfoExtensionEmpty/3 (2 ms) [----------] 60 tests from ExtensionPre13Datagram/TlsExtensionTestPre13 (221 ms total) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [194] fefd80aa9a7c22a7913cd2ef25416cbb70a225262e0023d56542d79b053329d4... handshake new: [190] fefd80aa9a7c22a7913cd2ef25416cbb70a225262e0023d56542d79b053329d4... record old: [206] 010000c200000000000000c2fefd80aa9a7c22a7913cd2ef25416cbb70a22526... record new: [202] 010000be00000000000000befefd80aa9a7c22a7913cd2ef25416cbb70a22526... client: Filtered packet: [215] 16feff000000000000000000ca010000be00000000000000befefd80aa9a7c22... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/0 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [195] fefdcd0902824798693d63358e81e266b6d02596685f879c0f620647e637c209... handshake new: [191] fefdcd0902824798693d63358e81e266b6d02596685f879c0f620647e637c209... record old: [207] 010000c300000000000000c3fefdcd0902824798693d63358e81e266b6d02596... record new: [203] 010000bf00000000000000bffefdcd0902824798693d63358e81e266b6d02596... client: Filtered packet: [216] 16feff000000000000000000cb010000bf00000000000000bffefdcd09028247... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/1 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [3] 000400 handshake old: [125] feff0d99d01c510b105ecc4fcae6cec9c5577e451915c4c1fb73a9e22bc2aaea... handshake new: [121] feff0d99d01c510b105ecc4fcae6cec9c5577e451915c4c1fb73a9e22bc2aaea... record old: [137] 0100007d000000000000007dfeff0d99d01c510b105ecc4fcae6cec9c5577e45... record new: [133] 010000790000000000000079feff0d99d01c510b105ecc4fcae6cec9c5577e45... client: Filtered packet: [146] 16feff00000000000000000085010000790000000000000079feff0d99d01c51... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpShort/2 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [194] fefd4ed0525b03fdb12d157b45ef4741778813e4a10c062755473acf05b9a920... handshake new: [191] fefd4ed0525b03fdb12d157b45ef4741778813e4a10c062755473acf05b9a920... record old: [206] 010000c200000000000000c2fefd4ed0525b03fdb12d157b45ef4741778813e4... record new: [203] 010000bf00000000000000bffefd4ed0525b03fdb12d157b45ef4741778813e4... client: Filtered packet: [216] 16feff000000000000000000cb010000bf00000000000000bffefd4ed0525b03... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/0 (3 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [195] fefd53be0cf5b6decdbb32f7c5f39ee2028221b73166fce30320e146ce6bf6be... handshake new: [192] fefd53be0cf5b6decdbb32f7c5f39ee2028221b73166fce30320e146ce6bf6be... record old: [207] 010000c300000000000000c3fefd53be0cf5b6decdbb32f7c5f39ee2028221b7... record new: [204] 010000c000000000000000c0fefd53be0cf5b6decdbb32f7c5f39ee2028221b7... client: Filtered packet: [217] 16feff000000000000000000cc010000c000000000000000c0fefd53be0cf5b6... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/1 (2 ms) [ RUN ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [7] 00040001000200 extension new: [4] 0001ff00 handshake old: [125] feff63938d21f721cccf88b3e3720b26f8d12b7fb27b4138a695b9502445687e... handshake new: [122] feff63938d21f721cccf88b3e3720b26f8d12b7fb27b4138a695b9502445687e... record old: [137] 0100007d000000000000007dfeff63938d21f721cccf88b3e3720b26f8d12b7f... record new: [134] 0100007a000000000000007afeff63938d21f721cccf88b3e3720b26f8d12b7f... client: Filtered packet: [147] 16feff000000000000000000860100007a000000000000007afeff63938d21f7... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionDatagramOnly/TlsExtensionTestDtls.SrtpOdd/2 (2 ms) [----------] 6 tests from ExtensionDatagramOnly/TlsExtensionTestDtls (16 ms total) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [182] 03038c8b98b03e2c125d935a7da566c8ff0100d768d42b99eff75fca48dcd313... handshake new: [159] 03038c8b98b03e2c125d935a7da566c8ff0100d768d42b99eff75fca48dcd313... record old: [186] 010000b603038c8b98b03e2c125d935a7da566c8ff0100d768d42b99eff75fca... record new: [163] 0100009f03038c8b98b03e2c125d935a7da566c8ff0100d768d42b99eff75fca... client: Filtered packet: [168] 16030100a30100009f03038c8b98b03e2c125d935a7da566c8ff0100d768d42b... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [187] 0303312a302bc69c81fd239887be08bf10eacd4f6f4bc5e3e19da6bd09a8ad0e... handshake new: [156] 0303312a302bc69c81fd239887be08bf10eacd4f6f4bc5e3e19da6bd09a8ad0e... record old: [191] 010000bb0303312a302bc69c81fd239887be08bf10eacd4f6f4bc5e3e19da6bd... record new: [160] 0100009c0303312a302bc69c81fd239887be08bf10eacd4f6f4bc5e3e19da6bd... client: Filtered packet: [165] 16030100a00100009c0303312a302bc69c81fd239887be08bf10eacd4f6f4bc5... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [1] 00 handshake old: [183] fefd7398c60389e7dd6e6f459f80b0c4965e3fe8f8c26c3a248f68ff7aa17e7d... handshake new: [160] fefd7398c60389e7dd6e6f459f80b0c4965e3fe8f8c26c3a248f68ff7aa17e7d... record old: [195] 010000b700000000000000b7fefd7398c60389e7dd6e6f459f80b0c4965e3fe8... record new: [172] 010000a000000000000000a0fefd7398c60389e7dd6e6f459f80b0c4965e3fe8... client: Filtered packet: [185] 16feff000000000000000000ac010000a000000000000000a0fefd7398c60389... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [1] 00 handshake old: [184] fefd53f66d254aedbc8fb2223b0986132b4a2cde207c1914fe6b175ca0e587cd... handshake new: [153] fefd53f66d254aedbc8fb2223b0986132b4a2cde207c1914fe6b175ca0e587cd... record old: [196] 010000b800000000000000b8fefd53f66d254aedbc8fb2223b0986132b4a2cde... record new: [165] 010000990000000000000099fefd53f66d254aedbc8fb2223b0986132b4a2cde... client: Filtered packet: [178] 16feff000000000000000000a5010000990000000000000099fefd53f66d254a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsBadLength/3 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002080900 handshake old: [182] 030341d42de4071899f7f70cb4e2be191b4021cb29578d9424bf1afd77a94c84... handshake new: [163] 030341d42de4071899f7f70cb4e2be191b4021cb29578d9424bf1afd77a94c84... record old: [186] 010000b6030341d42de4071899f7f70cb4e2be191b4021cb29578d9424bf1afd... record new: [167] 010000a3030341d42de4071899f7f70cb4e2be191b4021cb29578d9424bf1afd... client: Filtered packet: [172] 16030100a7010000a3030341d42de4071899f7f70cb4e2be191b4021cb29578d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002080900 handshake old: [187] 030338cf5e0b1327f40b1208d28939f7523ebbfcbc4a463168f1c852eba1832e... handshake new: [160] 030338cf5e0b1327f40b1208d28939f7523ebbfcbc4a463168f1c852eba1832e... record old: [191] 010000bb030338cf5e0b1327f40b1208d28939f7523ebbfcbc4a463168f1c852... record new: [164] 010000a0030338cf5e0b1327f40b1208d28939f7523ebbfcbc4a463168f1c852... client: Filtered packet: [169] 16030100a4010000a0030338cf5e0b1327f40b1208d28939f7523ebbfcbc4a46... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [5] 0002080900 handshake old: [183] fefd489afed2357ae40a4b12b4d24894476d332ce17e0a68fa61f15d97076d67... handshake new: [164] fefd489afed2357ae40a4b12b4d24894476d332ce17e0a68fa61f15d97076d67... record old: [195] 010000b700000000000000b7fefd489afed2357ae40a4b12b4d24894476d332c... record new: [176] 010000a400000000000000a4fefd489afed2357ae40a4b12b4d24894476d332c... client: Filtered packet: [189] 16feff000000000000000000b0010000a400000000000000a4fefd489afed235... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [5] 0002080900 handshake old: [184] fefd9b5454b6bb928df4aeccf92df33c4daeb15c3d179dc2d7d8573eeff49414... handshake new: [157] fefd9b5454b6bb928df4aeccf92df33c4daeb15c3d179dc2d7d8573eeff49414... record old: [196] 010000b800000000000000b8fefd9b5454b6bb928df4aeccf92df33c4daeb15c... record new: [169] 0100009d000000000000009dfefd9b5454b6bb928df4aeccf92df33c4daeb15c... client: Filtered packet: [182] 16feff000000000000000000a90100009d000000000000009dfefd9b5454b6bb... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsTrailingData/3 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [182] 03034d029120ae402cdbff132f3813c36fd96b5434d8b1a0e61c9b650b99f1d8... handshake new: [160] 03034d029120ae402cdbff132f3813c36fd96b5434d8b1a0e61c9b650b99f1d8... record old: [186] 010000b603034d029120ae402cdbff132f3813c36fd96b5434d8b1a0e61c9b65... record new: [164] 010000a003034d029120ae402cdbff132f3813c36fd96b5434d8b1a0e61c9b65... client: Filtered packet: [169] 16030100a4010000a003034d029120ae402cdbff132f3813c36fd96b5434d8b1... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [187] 0303babe2eaa94652a7476f71a778bf23452cf4e39e9296a317e3b0866c8299c... handshake new: [157] 0303babe2eaa94652a7476f71a778bf23452cf4e39e9296a317e3b0866c8299c... record old: [191] 010000bb0303babe2eaa94652a7476f71a778bf23452cf4e39e9296a317e3b08... record new: [161] 0100009d0303babe2eaa94652a7476f71a778bf23452cf4e39e9296a317e3b08... client: Filtered packet: [166] 16030100a10100009d0303babe2eaa94652a7476f71a778bf23452cf4e39e929... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [2] 0000 handshake old: [183] fefd0be4cc7e5e7cc65fb12825e6453a2adda859f7b841517960b62ea85998a3... handshake new: [161] fefd0be4cc7e5e7cc65fb12825e6453a2adda859f7b841517960b62ea85998a3... record old: [195] 010000b700000000000000b7fefd0be4cc7e5e7cc65fb12825e6453a2adda859... record new: [173] 010000a100000000000000a1fefd0be4cc7e5e7cc65fb12825e6453a2adda859... client: Filtered packet: [186] 16feff000000000000000000ad010000a100000000000000a1fefd0be4cc7e5e... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [2] 0000 handshake old: [184] fefd8b68b8769dc1e05a3e5eece2ea6097d932bc6d9773d055ca07798f8c8b4a... handshake new: [154] fefd8b68b8769dc1e05a3e5eece2ea6097d932bc6d9773d055ca07798f8c8b4a... record old: [196] 010000b800000000000000b8fefd8b68b8769dc1e05a3e5eece2ea6097d932bc... record new: [166] 0100009a000000000000009afefd8b68b8769dc1e05a3e5eece2ea6097d932bc... client: Filtered packet: [179] 16feff000000000000000000a60100009a000000000000009afefd8b68b8769d... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsEmpty/3 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [182] 03030c3f249fd565071fa5a51967e300118b0605ac6306237ac41540f8e74954... handshake new: [162] 03030c3f249fd565071fa5a51967e300118b0605ac6306237ac41540f8e74954... record old: [186] 010000b603030c3f249fd565071fa5a51967e300118b0605ac6306237ac41540... record new: [166] 010000a203030c3f249fd565071fa5a51967e300118b0605ac6306237ac41540... client: Filtered packet: [171] 16030100a6010000a203030c3f249fd565071fa5a51967e300118b0605ac6306... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [187] 0303ee963fdbbe06f0a21b9d216eae131704cdc46a80df16b4ebb4120087d247... handshake new: [159] 0303ee963fdbbe06f0a21b9d216eae131704cdc46a80df16b4ebb4120087d247... record old: [191] 010000bb0303ee963fdbbe06f0a21b9d216eae131704cdc46a80df16b4ebb412... record new: [163] 0100009f0303ee963fdbbe06f0a21b9d216eae131704cdc46a80df16b4ebb412... client: Filtered packet: [168] 16030100a30100009f0303ee963fdbbe06f0a21b9d216eae131704cdc46a80df... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 0002ffff handshake old: [183] fefdb6045d07a1a606dae70e4db59cd2225ce20c8e7a910975431eff84bea4bb... handshake new: [163] fefdb6045d07a1a606dae70e4db59cd2225ce20c8e7a910975431eff84bea4bb... record old: [195] 010000b700000000000000b7fefdb6045d07a1a606dae70e4db59cd2225ce20c... record new: [175] 010000a300000000000000a3fefdb6045d07a1a606dae70e4db59cd2225ce20c... client: Filtered packet: [188] 16feff000000000000000000af010000a300000000000000a3fefdb6045d07a1... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [4] 0002ffff handshake old: [184] fefd110924b240a45b0f7b3f7cd76aec43766c102106a7baefb22fe587fe9942... handshake new: [156] fefd110924b240a45b0f7b3f7cd76aec43766c102106a7baefb22fe587fe9942... record old: [196] 010000b800000000000000b8fefd110924b240a45b0f7b3f7cd76aec43766c10... record new: [168] 0100009c000000000000009cfefd110924b240a45b0f7b3f7cd76aec43766c10... client: Filtered packet: [181] 16feff000000000000000000a80100009c000000000000009cfefd110924b240... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsNoOverlap/3 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [182] 03030b4f9386c2408ddf5089bb650d18de9a75af248a6d8273c4fb77c9a9ee6a... handshake new: [161] 03030b4f9386c2408ddf5089bb650d18de9a75af248a6d8273c4fb77c9a9ee6a... record old: [186] 010000b603030b4f9386c2408ddf5089bb650d18de9a75af248a6d8273c4fb77... record new: [165] 010000a103030b4f9386c2408ddf5089bb650d18de9a75af248a6d8273c4fb77... client: Filtered packet: [170] 16030100a5010000a103030b4f9386c2408ddf5089bb650d18de9a75af248a6d... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/0 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [187] 03035ae9da3432bfe039cda7cd5cd1e4637eae0dd774e046be5d2756265e6467... handshake new: [158] 03035ae9da3432bfe039cda7cd5cd1e4637eae0dd774e046be5d2756265e6467... record old: [191] 010000bb03035ae9da3432bfe039cda7cd5cd1e4637eae0dd774e046be5d2756... record new: [162] 0100009e03035ae9da3432bfe039cda7cd5cd1e4637eae0dd774e046be5d2756... client: Filtered packet: [167] 16030100a20100009e03035ae9da3432bfe039cda7cd5cd1e4637eae0dd774e0... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/1 (2 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [3] 000104 handshake old: [183] fefdf6f964fd82707fbaac8fa4b2dc9ca74ee4be3b4d2a6b9e628ce4b02e8778... handshake new: [162] fefdf6f964fd82707fbaac8fa4b2dc9ca74ee4be3b4d2a6b9e628ce4b02e8778... record old: [195] 010000b700000000000000b7fefdf6f964fd82707fbaac8fa4b2dc9ca74ee4be... record new: [174] 010000a200000000000000a2fefdf6f964fd82707fbaac8fa4b2dc9ca74ee4be... client: Filtered packet: [187] 16feff000000000000000000ae010000a200000000000000a2fefdf6f964fd82... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/2 (3 ms) [ RUN ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [32] 001e040305030603020308040805080604010501060102010402050206020202 extension new: [3] 000104 handshake old: [184] fefd04c9446c7a5209f3b95e3c1d995bcd936374dbf21561b44e9e1176661298... handshake new: [155] fefd04c9446c7a5209f3b95e3c1d995bcd936374dbf21561b44e9e1176661298... record old: [196] 010000b800000000000000b8fefd04c9446c7a5209f3b95e3c1d995bcd936374... record new: [167] 0100009b000000000000009bfefd04c9446c7a5209f3b95e3c1d995bcd936374... client: Filtered packet: [180] 16feff000000000000000000a70100009b000000000000009bfefd04c9446c7a... server: Fatal alert sent: 50 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 50 client: Handshake failed with error SSL_ERROR_DECODE_ERROR_ALERT: Peer could not decode an SSL handshake message. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12Plus/TlsExtensionTest12Plus.SignatureAlgorithmsOddLength/3 (2 ms) [----------] 20 tests from ExtensionTls12Plus/TlsExtensionTest12Plus (57 ms total) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/0 (17 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SupportedCurvesDisableX25519/1 (18 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/0 (4 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmConfiguration/1 (4 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 Version: TLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/0 (31 ms) [ RUN ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 Version: DTLS 1.2 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls12/TlsExtensionTest12.SignatureAlgorithmDisableDSA/1 (30 ms) [----------] 6 tests from ExtensionTls12/TlsExtensionTest12 (107 ms total) [----------] 22 tests from ExtensionTls13/TlsExtensionTest13 [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d00207866121d0182d0102b5790aedfd444dd3890e8610f7efb48af96... extension new: [2] 0024 handshake old: [182] 03031422af4d6d1c7228bae009fcd2cfd46b958cb94fe8df0494cc96fe7c947a... handshake new: [146] 03031422af4d6d1c7228bae009fcd2cfd46b958cb94fe8df0494cc96fe7c947a... record old: [186] 010000b603031422af4d6d1c7228bae009fcd2cfd46b958cb94fe8df0494cc96... record new: [150] 0100009203031422af4d6d1c7228bae009fcd2cfd46b958cb94fe8df0494cc96... client: Filtered packet: [155] 16030100960100009203031422af4d6d1c7228bae009fcd2cfd46b958cb94fe8... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [38] 0024001d002083cf6b34bddffb92e7864d4cbe5c4caa5bfc4cdf3eba06ce89f9... extension new: [2] 0024 handshake old: [183] fefd0f0873543de1750a0a336ddb27a9cddc37d72a50ce99835d12f4ba5d68e5... handshake new: [147] fefd0f0873543de1750a0a336ddb27a9cddc37d72a50ce99835d12f4ba5d68e5... record old: [195] 010000b700000000000000b7fefd0f0873543de1750a0a336ddb27a9cddc37d7... record new: [159] 010000930000000000000093fefd0f0873543de1750a0a336ddb27a9cddc37d7... client: Filtered packet: [172] 16feff0000000000000000009f010000930000000000000093fefd0f0873543d... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyClientKeyShare/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/0 (6 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ExtensionTls13/TlsExtensionTest13.NoKeModesIfResumptionOff/1 (6 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [182] 030339b25b6436b95d3bf38217ef2d3a198690e53752e0a2f2285ba1de9c9d92... handshake new: [182] 030339b25b6436b95d3bf38217ef2d3a198690e53752e0a2f2285ba1de9c9d92... record old: [186] 010000b6030339b25b6436b95d3bf38217ef2d3a198690e53752e0a2f2285ba1... record new: [186] 010000b6030339b25b6436b95d3bf38217ef2d3a198690e53752e0a2f2285ba1... client: Filtered packet: [191] 16030100ba010000b6030339b25b6436b95d3bf38217ef2d3a198690e53752e0... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 02fefc extension new: [3] 02fefd handshake old: [183] fefd68642a1af0e5ef9e9f31cccefec24f3dbcf143b2b288c758b5f818f65e41... handshake new: [183] fefd68642a1af0e5ef9e9f31cccefec24f3dbcf143b2b288c758b5f818f65e41... record old: [195] 010000b700000000000000b7fefd68642a1af0e5ef9e9f31cccefec24f3dbcf1... record new: [195] 010000b700000000000000b7fefd68642a1af0e5ef9e9f31cccefec24f3dbcf1... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd68642a1af0... server: Fatal alert sent: 70 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_VERSION: Peer using unsupported version of security protocol. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 70 client: Handshake failed with error SSL_ERROR_PROTOCOL_VERSION_ALERT: Peer reports incompatible or unsupported protocol version. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionList/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 020303 handshake old: [182] 030350a1a35580d08953e100c5d520eb61b16078585ffdab7a7ed65cc1330439... handshake new: [182] 030350a1a35580d08953e100c5d520eb61b16078585ffdab7a7ed65cc1330439... record old: [186] 010000b6030350a1a35580d08953e100c5d520eb61b16078585ffdab7a7ed65c... record new: [186] 010000b6030350a1a35580d08953e100c5d520eb61b16078585ffdab7a7ed65c... client: Filtered packet: [191] 16030100ba010000b6030350a1a35580d08953e100c5d520eb61b16078585ffd... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 02fefc extension new: [3] 02fefd handshake old: [183] fefd0e7ce9a606820ed259f301bb7ea5c4124e3cb682b4a85fa46d7c1d98093f... handshake new: [183] fefd0e7ce9a606820ed259f301bb7ea5c4124e3cb682b4a85fa46d7c1d98093f... record old: [195] 010000b700000000000000b7fefd0e7ce9a606820ed259f301bb7ea5c4124e3c... record new: [195] 010000b700000000000000b7fefd0e7ce9a606820ed259f301bb7ea5c4124e3c... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd0e7ce9a606... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListServerV12/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 0403040303 extension new: [3] 020303 handshake old: [508] 030351269f21211ed70279ed1a36ac378fe5ef64799271a0df0a5dcd3eefdce0... handshake new: [506] 030351269f21211ed70279ed1a36ac378fe5ef64799271a0df0a5dcd3eefdce0... record old: [512] 010001fc030351269f21211ed70279ed1a36ac378fe5ef64799271a0df0a5dcd... record new: [510] 010001fa030351269f21211ed70279ed1a36ac378fe5ef64799271a0df0a5dcd... client: Filtered packet: [515] 16030101fe010001fa030351269f21211ed70279ed1a36ac378fe5ef64799271... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/0 (5 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [5] 04fefcfefd extension new: [3] 02fefd handshake old: [259] fefd66dabd72d00968b9f237399ceabd15c164936806926d6707c6f5e7e3b1dc... handshake new: [257] fefd66dabd72d00968b9f237399ceabd15c164936806926d6707c6f5e7e3b1dc... record old: [271] 010001030000000000000103fefd66dabd72d00968b9f237399ceabd15c16493... record new: [269] 010001010000000000000101fefd66dabd72d00968b9f237399ceabd15c16493... client: Filtered packet: [282] 16feff0000000000000000010d010001010000000000000101fefd66dabd72d0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_SERVER_HELLO: SSL received a malformed Server Hello handshake message. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.RemoveTls13FromVersionListBothV12/1 (5 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [508] 03035e0f3a5f69b5d347f06fd9f9ea2c0740f822a80314ecd27f864e15945d57... handshake new: [480] 03035e0f3a5f69b5d347f06fd9f9ea2c0740f822a80314ecd27f864e15945d57... record old: [512] 010001fc03035e0f3a5f69b5d347f06fd9f9ea2c0740f822a80314ecd27f864e... record new: [484] 010001e003035e0f3a5f69b5d347f06fd9f9ea2c0740f822a80314ecd27f864e... client: Filtered packet: [489] 16030301e4010001e003035e0f3a5f69b5d347f06fd9f9ea2c0740f822a80314... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/0 (15 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefd4551a5a58d432285222edd89702fb8a1abbf70a7ca921b2294d14d43973b... handshake new: [259] fefd4551a5a58d432285222edd89702fb8a1abbf70a7ca921b2294d14d43973b... record old: [299] 0100011f000100000000011ffefd4551a5a58d432285222edd89702fb8a1abbf... record new: [271] 010001030001000000000103fefd4551a5a58d432285222edd89702fb8a1abbf... client: Filtered packet: [284] 16fefd0000000000000000010f010001030001000000000103fefd4551a5a58d... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefd4551a5a58d432285222edd89702fb8a1abbf70a7ca921b2294d14d43973b... handshake new: [259] fefd4551a5a58d432285222edd89702fb8a1abbf70a7ca921b2294d14d43973b... record old: [299] 0100011f000100000000011ffefd4551a5a58d432285222edd89702fb8a1abbf... record new: [271] 010001030001000000000103fefd4551a5a58d432285222edd89702fb8a1abbf... client: Filtered packet: [284] 16fefd0000000000000002010f010001030001000000000103fefd4551a5a58d... extension drop: [24] 001604030503060302030804080508060401050106010201 handshake old: [287] fefd4551a5a58d432285222edd89702fb8a1abbf70a7ca921b2294d14d43973b... handshake new: [259] fefd4551a5a58d432285222edd89702fb8a1abbf70a7ca921b2294d14d43973b... record old: [299] 0100011f000100000000011ffefd4551a5a58d432285222edd89702fb8a1abbf... record new: [271] 010001030001000000000103fefd4551a5a58d432285222edd89702fb8a1abbf... client: Filtered packet: [284] 16fefd0000000000000003010f010001030001000000000103fefd4551a5a58d... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SIGNATURE_ALGORITHMS_EXTENSION: SSL expected a signature algorithms extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSignatureAlgorithms/1 (168 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d0020dc370bf9c282580e8a1dd448ff98c1843a74619377808d636ad2... handshake old: [508] 030342243986a25d1da98926121b040beff12f84a94cf113ffad8a128b1c391f... handshake new: [466] 030342243986a25d1da98926121b040beff12f84a94cf113ffad8a128b1c391f... record old: [512] 010001fc030342243986a25d1da98926121b040beff12f84a94cf113ffad8a12... record new: [470] 010001d2030342243986a25d1da98926121b040beff12f84a94cf113ffad8a12... client: Filtered packet: [475] 16030301d6010001d2030342243986a25d1da98926121b040beff12f84a94cf1... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/0 (16 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [38] 0024001d00207f2057d0f199060e798678619dc7dc4c0bfb25b2a429dc1b7196... handshake old: [287] fefd437726693186b8adfda01a5ccd0c077d9441e965a034d162f3abf38833fe... handshake new: [245] fefd437726693186b8adfda01a5ccd0c077d9441e965a034d162f3abf38833fe... record old: [299] 0100011f000100000000011ffefd437726693186b8adfda01a5ccd0c077d9441... record new: [257] 010000f500010000000000f5fefd437726693186b8adfda01a5ccd0c077d9441... client: Filtered packet: [270] 16fefd00000000000000000101010000f500010000000000f5fefd4377266931... extension drop: [38] 0024001d00207f2057d0f199060e798678619dc7dc4c0bfb25b2a429dc1b7196... handshake old: [287] fefd437726693186b8adfda01a5ccd0c077d9441e965a034d162f3abf38833fe... handshake new: [245] fefd437726693186b8adfda01a5ccd0c077d9441e965a034d162f3abf38833fe... record old: [299] 0100011f000100000000011ffefd437726693186b8adfda01a5ccd0c077d9441... record new: [257] 010000f500010000000000f5fefd437726693186b8adfda01a5ccd0c077d9441... client: Filtered packet: [270] 16fefd00000000000000020101010000f500010000000000f5fefd4377266931... extension drop: [38] 0024001d00207f2057d0f199060e798678619dc7dc4c0bfb25b2a429dc1b7196... handshake old: [287] fefd437726693186b8adfda01a5ccd0c077d9441e965a034d162f3abf38833fe... handshake new: [245] fefd437726693186b8adfda01a5ccd0c077d9441e965a034d162f3abf38833fe... record old: [299] 0100011f000100000000011ffefd437726693186b8adfda01a5ccd0c077d9441... record new: [257] 010000f500010000000000f5fefd437726693186b8adfda01a5ccd0c077d9441... client: Filtered packet: [270] 16fefd00000000000000030101010000f500010000000000f5fefd4377266931... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_BAD_2ND_CLIENT_HELLO: SSL received a second Client Hello message without a usable key share. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveKeyShare/1 (169 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [508] 0303aecb10ae444fc39a7c41e37056cd4a4a0713c1d9ba766bc3bb091e79c64a... handshake new: [498] 0303aecb10ae444fc39a7c41e37056cd4a4a0713c1d9ba766bc3bb091e79c64a... record old: [512] 010001fc0303aecb10ae444fc39a7c41e37056cd4a4a0713c1d9ba766bc3bb09... record new: [502] 010001f20303aecb10ae444fc39a7c41e37056cd4a4a0713c1d9ba766bc3bb09... client: Filtered packet: [507] 16030301f6010001f20303aecb10ae444fc39a7c41e37056cd4a4a0713c1d9ba... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/0 (16 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension drop: [6] 00040018001d handshake old: [287] fefd4b8b32437bc5a85bd38194e99a90f54517bb0db0bb7c9ffae79a3f848650... handshake new: [277] fefd4b8b32437bc5a85bd38194e99a90f54517bb0db0bb7c9ffae79a3f848650... record old: [299] 0100011f000100000000011ffefd4b8b32437bc5a85bd38194e99a90f54517bb... record new: [289] 010001150001000000000115fefd4b8b32437bc5a85bd38194e99a90f54517bb... client: Filtered packet: [302] 16fefd00000000000000000121010001150001000000000115fefd4b8b32437b... extension drop: [6] 00040018001d handshake old: [287] fefd4b8b32437bc5a85bd38194e99a90f54517bb0db0bb7c9ffae79a3f848650... handshake new: [277] fefd4b8b32437bc5a85bd38194e99a90f54517bb0db0bb7c9ffae79a3f848650... record old: [299] 0100011f000100000000011ffefd4b8b32437bc5a85bd38194e99a90f54517bb... record new: [289] 010001150001000000000115fefd4b8b32437bc5a85bd38194e99a90f54517bb... client: Filtered packet: [302] 16fefd00000000000000020121010001150001000000000115fefd4b8b32437b... extension drop: [6] 00040018001d handshake old: [287] fefd4b8b32437bc5a85bd38194e99a90f54517bb0db0bb7c9ffae79a3f848650... handshake new: [277] fefd4b8b32437bc5a85bd38194e99a90f54517bb0db0bb7c9ffae79a3f848650... record old: [299] 0100011f000100000000011ffefd4b8b32437bc5a85bd38194e99a90f54517bb... record new: [289] 010001150001000000000115fefd4b8b32437bc5a85bd38194e99a90f54517bb... client: Filtered packet: [302] 16fefd00000000000000030121010001150001000000000115fefd4b8b32437b... server: Fatal alert sent: 109 server: Handshake failed with error SSL_ERROR_MISSING_SUPPORTED_GROUPS: SSL expected a supported groups extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 109 client: Handshake failed with error SSL_ERROR_MISSING_EXTENSION_ALERT: SSL received a missing_extension alert. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.HrrThenRemoveSupportedGroups/1 (169 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [2] 0000 handshake old: [182] 0303d2376834853857d556014f5bd99e66a1512813e6bbe1c469ae60a2588143... handshake new: [181] 0303d2376834853857d556014f5bd99e66a1512813e6bbe1c469ae60a2588143... record old: [186] 010000b60303d2376834853857d556014f5bd99e66a1512813e6bbe1c469ae60... record new: [185] 010000b50303d2376834853857d556014f5bd99e66a1512813e6bbe1c469ae60... client: Filtered packet: [190] 16030100b9010000b50303d2376834853857d556014f5bd99e66a1512813e6bb... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 02fefc extension new: [2] 0000 handshake old: [183] fefd3ec050cff92a20258f0fa6107f2806f6930e52e1c9db4b191d3154c586fa... handshake new: [182] fefd3ec050cff92a20258f0fa6107f2806f6930e52e1c9db4b191d3154c586fa... record old: [195] 010000b700000000000000b7fefd3ec050cff92a20258f0fa6107f2806f6930e... record new: [194] 010000b600000000000000b6fefd3ec050cff92a20258f0fa6107f2806f6930e... client: Filtered packet: [207] 16feff000000000000000000c2010000b600000000000000b6fefd3ec050cff9... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.EmptyVersionList/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 020304 extension new: [3] 000100 handshake old: [182] 03032ce23e752beeb169439c663a7f688b14aa41fcb1df9fa57719e87f954b6f... handshake new: [182] 03032ce23e752beeb169439c663a7f688b14aa41fcb1df9fa57719e87f954b6f... record old: [186] 010000b603032ce23e752beeb169439c663a7f688b14aa41fcb1df9fa57719e8... record new: [186] 010000b603032ce23e752beeb169439c663a7f688b14aa41fcb1df9fa57719e8... client: Filtered packet: [191] 16030100ba010000b603032ce23e752beeb169439c663a7f688b14aa41fcb1df... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [3] 02fefc extension new: [3] 000100 handshake old: [183] fefd98741a5b467211e5c74401b077681afe44507d479a60195afdbd27fa5753... handshake new: [183] fefd98741a5b467211e5c74401b077681afe44507d479a60195afdbd27fa5753... record old: [195] 010000b700000000000000b7fefd98741a5b467211e5c74401b077681afe4450... record new: [195] 010000b700000000000000b7fefd98741a5b467211e5c74401b077681afe4450... client: Filtered packet: [208] 16feff000000000000000000c3010000b700000000000000b7fefd98741a5b46... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_CLIENT_HELLO: SSL received a malformed Client Hello handshake message. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.OddVersionList/1 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.SignatureAlgorithmsInvalidTls13/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 00020401 handshake old: [182] 03039832e2fafa168e708b94b5871d6d22fe700a89c87d0b722af97e5114639e... handshake new: [162] 03039832e2fafa168e708b94b5871d6d22fe700a89c87d0b722af97e5114639e... record old: [186] 010000b603039832e2fafa168e708b94b5871d6d22fe700a89c87d0b722af97e... record new: [166] 010000a203039832e2fafa168e708b94b5871d6d22fe700a89c87d0b722af97e... client: Filtered packet: [171] 16030100a6010000a203039832e2fafa168e708b94b5871d6d22fe700a89c87d... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.SignatureAlgorithmsInvalidTls13/0 (3 ms) [ RUN ] ExtensionTls13/TlsExtensionTest13.SignatureAlgorithmsInvalidTls13/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING extension old: [24] 001604030503060302030804080508060401050106010201 extension new: [4] 00020401 handshake old: [183] fefd9a9390eecee3036875158d27628c92e294790f726981bc7050c26e7e8715... handshake new: [163] fefd9a9390eecee3036875158d27628c92e294790f726981bc7050c26e7e8715... record old: [195] 010000b700000000000000b7fefd9a9390eecee3036875158d27628c92e29479... record new: [175] 010000a300000000000000a3fefd9a9390eecee3036875158d27628c92e29479... client: Filtered packet: [188] 16feff000000000000000000af010000a300000000000000a3fefd9a9390eece... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ExtensionTls13/TlsExtensionTest13.SignatureAlgorithmsInvalidTls13/1 (3 ms) [----------] 22 tests from ExtensionTls13/TlsExtensionTest13 (618 ms total) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0301ae635788ed4f41c8b3a73c0d3ccb8c7eaed126e4607d5cab73a193819fd7... handshake new: [97] 0301ae635788ed4f41c8b3a73c0d3ccb8c7eaed126e4607d5cab73a193819fd7... record old: [713] 0200005d0301ae635788ed4f41c8b3a73c0d3ccb8c7eaed126e4607d5cab73a1... record new: [717] 020000610301ae635788ed4f41c8b3a73c0d3ccb8c7eaed126e4607d5cab73a1... server: Filtered packet: [722] 16030102cd020000610301ae635788ed4f41c8b3a73c0d3ccb8c7eaed126e460... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (4 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 0302671150848b66a30ffc78a60bbd5e5cbbbbfb5f5024c48f51c441249f8d73... handshake new: [97] 0302671150848b66a30ffc78a60bbd5e5cbbbbfb5f5024c48f51c441249f8d73... record old: [713] 0200005d0302671150848b66a30ffc78a60bbd5e5cbbbbfb5f5024c48f51c441... record new: [717] 020000610302671150848b66a30ffc78a60bbd5e5cbbbbfb5f5024c48f51c441... server: Filtered packet: [722] 16030202cd020000610302671150848b66a30ffc78a60bbd5e5cbbbbfb5f5024... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (4 ms) [ RUN ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] 030340d887dd42fa59392492d9f0a9929fc2efd7112bcb642aca60d2d4346790... handshake new: [97] 030340d887dd42fa59392492d9f0a9929fc2efd7112bcb642aca60d2d4346790... record old: [715] 0200005d030340d887dd42fa59392492d9f0a9929fc2efd7112bcb642aca60d2... record new: [719] 02000061030340d887dd42fa59392492d9f0a9929fc2efd7112bcb642aca60d2... server: Filtered packet: [724] 16030302cf02000061030340d887dd42fa59392492d9f0a9929fc2efd7112bcb... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionStream/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/2 (4 ms) [----------] 3 tests from BogusExtensionStream/TlsBogusExtensionTestPre13 (14 ms total) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] feff7ef9ad4e58107daa6546423db3ee6f3eb6fef331e704033117a5b4deb929... handshake new: [97] feff7ef9ad4e58107daa6546423db3ee6f3eb6fef331e704033117a5b4deb929... record old: [105] 0200005d000000000000005dfeff7ef9ad4e58107daa6546423db3ee6f3eb6fe... record new: [109] 020000610000000000000061feff7ef9ad4e58107daa6546423db3ee6f3eb6fe... server: Filtered packet: [801] 16feff0000000000000000006d020000610000000000000061feff7ef9ad4e58... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/0 (4 ms) [ RUN ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [93] fefd9065e7dc9c9ca5552b48f9b9e43ac4b325c00534fcf287d762db3eb57c71... handshake new: [97] fefd9065e7dc9c9ca5552b48f9b9e43ac4b325c00534fcf287d762db3eb57c71... record old: [105] 0200005d000000000000005dfefd9065e7dc9c9ca5552b48f9b9e43ac4b325c0... record new: [109] 020000610000000000000061fefd9065e7dc9c9ca5552b48f9b9e43ac4b325c0... server: Filtered packet: [803] 16fefd0000000000000000006d020000610000000000000061fefd9065e7dc9c... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtensionDatagram/TlsBogusExtensionTestPre13.AddBogusExtensionServerHello/1 (4 ms) [----------] 2 tests from BogusExtensionDatagram/TlsBogusExtensionTestPre13 (9 ms total) [----------] 12 tests from BogusExtension13/TlsBogusExtensionTest13 [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] 030336b72b14e6f05a1f5768b5f60c4119a4e970d1e8159d4c43ae271cfc8ac0... handshake new: [90] 030336b72b14e6f05a1f5768b5f60c4119a4e970d1e8159d4c43ae271cfc8ac0... record old: [90] 02000056030336b72b14e6f05a1f5768b5f60c4119a4e970d1e8159d4c43ae27... record new: [94] 0200005a030336b72b14e6f05a1f5768b5f60c4119a4e970d1e8159d4c43ae27... server: Filtered packet: [780] 160303005e0200005a030336b72b14e6f05a1f5768b5f60c4119a4e970d1e815... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_RECORD_TYPE: SSL received an unexpected record type. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/0 (5 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [86] fefdddf568f203829c8bbe2d53356a2126f5c50417d35f32a1564069c37dac0d... handshake new: [90] fefdddf568f203829c8bbe2d53356a2126f5c50417d35f32a1564069c37dac0d... record old: [98] 020000560000000000000056fefdddf568f203829c8bbe2d53356a2126f5c504... record new: [102] 0200005a000000000000005afefdddf568f203829c8bbe2d53356a2126f5c504... server: Filtered packet: [894] 16fefd000000000000000000660200005a000000000000005afefdddf568f203... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionServerHello/1 (5 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [42] 0028000a00160014001d001700180019639901000101010201030104001c0002... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [663] 0800002a0028000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [780] 160303005a02000056030354490ccd5632acedeee84c248f3e4617452a9b792f... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/0 (6 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [42] 0028000a00160014001d001700180019639901000101010201030104001c0002... record old: [50] 0800002600010000000000260024000a00160014001d00170018001963990100... record new: [54] 0800002a000100000000002a0028000a00160014001d00170018001963990100... server: Filtered packet: [894] 16fefd00000000000000000062020000560000000000000056fefdfb3a9b4edd... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionEncryptedExtensions/1 (6 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [663] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [780] 160303005a02000056030313d98f6ccc708a566dbca374ce63af70723bd15fb1... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/0 (6 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [894] 16fefd00000000000000000062020000560000000000000056fefd7c456dad1e... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificate/1 (6 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [694] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [698] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [815] 160303005a02000056030354685b51c9c4676523fe7fd36835dcd38a0d18cb9e... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/0 (6 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [959] 16fefd00000000000000000062020000560000000000000056fefd5a8e4cf345... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionCertificateRequest/1 (6 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] 0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [176] 020000ac0303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... record new: [180] 020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e... server: Filtered packet: [185] 16030300b4020000b00303cf21ad74e59a6111be1d8c021e65b891c2a211167a... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/0 (15 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [172] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... handshake new: [176] fefdcf21ad74e59a6111be1d8c021e65b891c2a211167abb8c5e079e09e2c8a8... record old: [184] 020000ac00000000000000acfefdcf21ad74e59a6111be1d8c021e65b891c2a2... record new: [188] 020000b000000000000000b0fefdcf21ad74e59a6111be1d8c021e65b891c2a2... server: Filtered packet: [201] 16fefd000000000000000000bc020000b000000000000000b0fefdcf21ad74e5... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionHelloRetryRequest/1 (15 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a300952a7c5202000000b2a0e7dc5714b05461e1a5aad80000000026be44... handshake new: [197] 0002a300952a7c5202000000b2a0e7dc5714b05461e1a5aad80000000026be44... record old: [197] 040000c10002a300952a7c5202000000b2a0e7dc5714b05461e1a5aad8000000... record new: [201] 040000c50002a300952a7c5202000000b2a0e7dc5714b05461e1a5aad8000000... server: Filtered packet: [223] 17030300da49569eca7f1b5a84ec49baf04292f3884cc6c27a1e15e6dbdbe545... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/0 (12 ms) [ RUN ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED handshake old: [193] 0002a3005529662102000000b29648ad5a06ccf6479455a42000000000716c41... handshake new: [197] 0002a3005529662102000000b29648ad5a06ccf6479455a42000000000716c41... record old: [205] 040000c100050000000000c10002a3005529662102000000b29648ad5a06ccf6... record new: [209] 040000c500050000000000c50002a3005529662102000000b29648ad5a06ccf6... server: Filtered packet: [231] 2fddd300e28d7adeaf53728744266c5e0394a70730b26f973b8450a7daccb098... Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] BogusExtension13/TlsBogusExtensionTest13.AddBogusExtensionNewSessionTicket/1 (11 ms) [----------] 12 tests from BogusExtension13/TlsBogusExtensionTest13 (104 ms total) [----------] 6 tests from DisallowedExtension13/TlsDisallowedExtensionTest13 [ RUN ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [42] 0028000a00160014001d001700180019639901000101010201030104001c0002... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [663] 0800002a0028000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [780] 160303005a0200005603035b9da2bbb4bebb5e46396486c02b518c53b6d73ad7... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionEncryptedExtensions/0 (6 ms) [ RUN ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [42] 0028000a00160014001d001700180019639901000101010201030104001c0002... record old: [50] 0800002600010000000000260024000a00160014001d00170018001963990100... record new: [54] 0800002a000100000000002a0028000a00160014001d00170018001963990100... server: Filtered packet: [894] 16fefd00000000000000000062020000560000000000000056fefda4233ae7fa... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionEncryptedExtensions/1 (6 ms) [ RUN ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [663] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [780] 160303005a020000560303590fd4fc680768a823e95a7f41b9f253e7578eb55d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificate/0 (6 ms) [ RUN ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [894] 16fefd00000000000000000062020000560000000000000056fefd70dcfb4f8e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificate/1 (6 ms) [ RUN ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [694] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [698] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [815] 160303005a020000560303ac6f989cd66b62d503cacbf8f200246b91006bb293... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificateRequest/0 (6 ms) [ RUN ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [959] 16fefd00000000000000000062020000560000000000000056fefd116eb10f40... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedExtension13/TlsDisallowedExtensionTest13.AddVersionExtensionCertificateRequest/1 (6 ms) [----------] 6 tests from DisallowedExtension13/TlsDisallowedExtensionTest13 (37 ms total) [----------] 6 tests from DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13 [ RUN ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionEncryptedExtensions/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [42] 0028000a00160014001d001700180019639901000101010201030104001c0002... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [663] 0800002a0028000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [780] 160303005a020000560303603de81fd52be8c3fdd0850131df6680d4529db4a0... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionEncryptedExtensions/0 (5 ms) [ RUN ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionEncryptedExtensions/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 0024000a00160014001d001700180019639901000101010201030104001c0002... handshake new: [42] 0028000a00160014001d001700180019639901000101010201030104001c0002... record old: [50] 0800002600010000000000260024000a00160014001d00170018001963990100... record new: [54] 0800002a000100000000002a0028000a00160014001d00170018001963990100... server: Filtered packet: [894] 16fefd00000000000000000062020000560000000000000056fefd50c47ade80... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionEncryptedExtensions/1 (5 ms) [ RUN ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificate/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [659] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [663] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [780] 160303005a0200005603030427953c01c86fb507687ec889965ef56596607bc9... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificate/0 (5 ms) [ RUN ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [441] 000001b50001b0308201ac30820115a003020102020102300d06092a864886f7... handshake new: [445] 000001b90001b0308201ac30820115a003020102020102300d06092a864886f7... record old: [453] 0b0001b900020000000001b9000001b50001b0308201ac30820115a003020102... record new: [457] 0b0001bd00020000000001bd000001b90001b0308201ac30820115a003020102... server: Filtered packet: [894] 16fefd00000000000000000062020000560000000000000056fefd1c4cfecdda... client: Fatal alert sent: 110 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_EXTENSION: SSL received an unexpected extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 110 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_EXTENSION_ALERT: SSL peer does not support requested TLS hello extension. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificate/1 (6 ms) [ RUN ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificateRequest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [694] 080000260024000a00160014001d001700180019639901000101010201030104... record new: [698] 080000260024000a00160014001d001700180019639901000101010201030104... server: Filtered packet: [815] 160303005a0200005603033b1b300d39ad95d9d61420ac841ff351dbf99c6ca9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificateRequest/0 (6 ms) [ RUN ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificateRequest/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [31] 00001c000d0018001604030503060302030804080508060401050106010201 handshake new: [35] 000020000d001800160403050306030203080408050806040105010601020100... record old: [43] 0d00001f000200000000001f00001c000d001800160403050306030203080408... record new: [47] 0d0000230002000000000023000020000d001800160403050306030203080408... server: Filtered packet: [959] 16fefd00000000000000000062020000560000000000000056fefd254e87011a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_EXTENSION_DISALLOWED_FOR_VERSION: SSL received an extension that is not permitted for this version. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13.AddPSKExtensionCertificateRequest/1 (5 ms) [----------] 6 tests from DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13 (35 ms total) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/0 (58 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientFirstFlightOnce/1 (57 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/0 (55 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightOnce/1 (56 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/0 (464 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Drop packet client: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropAllFirstTransmissions/1 (465 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/0 (360 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Drop packet server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerFirstFlightThrice/1 (359 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/0 (57 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightOnce/1 (56 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/0 (360 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Drop packet client: Drop packet client: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropClientSecondFlightThrice/1 (359 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/0 (360 ms) [ RUN ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Drop packet server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Drop packet server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramPre13/TlsConnectDatagramPre13.DropServerSecondFlightThrice/1 (360 ms) [----------] 14 tests from DatagramPre13/TlsConnectDatagramPre13 (3433 ms total) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[189] 010000b100000000000000b1fefd704dbe657dbe32799085c82893464baff9fc... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/0 (58 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.0 Handshake 0:[189] 010000b100000000000000b1fefd742ed9abe35f5436afd32d4a08e58c3df8ea... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientFirstFlightOnce/1 (58 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd02af87947385e967e252fe6d46f290355690... record drop: DTLS 1.3 <46> 200000000754f:[67] e12911b8e4358d70a18dee1ab6fb66c4d4a50a6520a9312d5ae72a9f7dcc98e2... record drop: DTLS 1.3 <46> 2000000008c79:[470] e63474fbbd6f2427350ddb872f3db269dc634878abb2dba1d8ef44cf8cd8a6e6... record drop: DTLS 1.3 <46> 200000000bdd1:[161] d0b95baab50488697d44f6ba24ae82535bc7619031b2aba1e874e3c8fa1561c0... record drop: DTLS 1.3 <46> 2000000001649:[61] f36543fdb1876819f5099f6b73da99c946dd845a46036844a45bc16207130f9f... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/0 (58 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd8045453a5c69b52ba96dd3ebc23cc1c01459... record drop: DTLS 1.3 <46> 200000000af5b:[67] af9337e04f31696cf8a7d46ebe3992e9b44f5bf9445ffad5c6df14605af3dc5b... record drop: DTLS 1.3 <46> 200000000858d:[470] d78de81262780c3bd3181341eb8fcd2bf5cce0f28968c2ca935334a346df767a... record drop: DTLS 1.3 <46> 20000000055dd:[161] ace6593063bd61d5b563807c4059f1cb7dddeb6b9d4f25707ec7d631c810deb9... record drop: DTLS 1.3 <46> 2000000009352:[61] 06664a077e2c510c5d8c458a7911d8efb992b8b47c364746d52f7b4cf17c97c1... server: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstFlightOnce/1 (56 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd83d4b65a6d8401cbea084e17ce0a68a5ebe0... server: Filtered packet: [779] 2ef7bf0043fefbb22940852607b55b252235eb3c8cc83de41e45f8b99ceb6fc9... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/0 (57 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd4cfed327bc1c01647010d8d722cdb997123c... server: Filtered packet: [779] 2ed61e0043e0a7cb20cf7091d39a6f96e615b67a6cb098f18b6a955602275959... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerFirstRecordOnce/1 (57 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000a147:[67] 1c07bd7a5854247b81615fec466fcc1143c1b3c5adc1e8529d99df85a98d5ba5... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd36fc3523c7... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/0 (6 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000076ad:[67] 23ff2e18e251235487afb2326e22649eb0e6b3575591882a2e7e60b393b9f467... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefdda68a5c86b... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerSecondRecordOnce/1 (6 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <35> 30000000000bb:[35] 7d47fe75b52974fe2293a009eb03383705bcb82ff5974e0a6cf1ae4c4aeac38e... server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/0 (6 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED record drop: DTLS 1.3 <47> 3000000006180:[35] 3871751efd7d2acb1f14c87f642eceb7edad88eefdabc4ab40b0131bb7dd3e98... server: Drop packet Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropServerAckOnce/1 (6 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000935c:[161] aac704a9e011aedf75f5bac9916fd50841e0bffe05e4b24c8b4363fcb2fd30d7... client: Filtered packet: [547] 2e222901dc40e51c2e4e3af44e61766a60cec5b322ee7849a304a6383fe4d329... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/0 (22 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000f501:[161] 2c962121c23a8e60f0dc9cfa17187f7d5270896c1d5181ed37c6acbee48c0e4d... client: Filtered packet: [547] 2ef0b601dcba72837e83acb1bf26edefe0fa96fdb6e987a2d8cd2ef5ec1c281c... client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropClientCertVerify/1 (23 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000002463:[257] a4a331ffef4c4e491500e60b8094ebaff5d589560fa44198bc2b16ebb5b817d7... server: Filtered packet: [183] 16fefd00000000000000000062020000560000000000000056fefd6f8f313708... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/0 (7 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000000f8a:[257] 51fa2fe8940a628e9e05a3b9291de43dd807ce1ee8a734cc47a779b1048628b7... server: Filtered packet: [183] 16fefd00000000000000000062020000560000000000000056fefd5795223c21... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropFirstHalfOfServerCertificate/1 (7 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000005fc5:[242] 54ad212919e82fd672e2e90bbca46544485e245dcceee9abb16bc8e72d3c6db5... server: Filtered packet: [166] 2e065800a1531f2f4b4280971522f032bfdbf4c8d8046b74fe42c88892ea983e... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/0 (6 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000001d5a:[242] 83865df54c7e6505925657c13a88f374e13d2d044a87c7c3f8684c4943be0d31... server: Filtered packet: [166] 2e975c00a11c0c2c81f43f3190c0655d6f8b13658d142e6c2fb6534351c46fb8... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropSecondHalfOfServerCertificate/1 (6 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/0 (11 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.NoDropsDuringZeroRtt/1 (11 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 2000000008b97:[71] b7604111585e1735c10178ef3f2e7bf8757c1603c2cccfe3296d8d6d603c728a... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefd9a8699fdff... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/0 (11 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake record drop: DTLS 1.3 <46> 2000000002efd:[71] d85cbb585447443f674d005d17492d5f27b14db70b9d917b93747e484a47b9a8... server: Filtered packet: [183] 16fefd000000000000000000680200005c000000000000005cfefd8f1d143be3... 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.DropEEDuringZeroRtt/1 (11 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000c837:[67] 8b57e9c393ab8ca43cf22585ee76d7ede4b90312644a4d1da2f7cc948a3c9c3c... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefd9ff7d75951... server: Send Direct [72] 2ec83700438b57e9c393ab8ca43cf22585ee76d7ede4b90312644a4d1da2f7cc... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/0 (6 ms) [ RUN ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000af42:[67] 2c5e9c2f30f11f5d7263e7cc69693be4f26d54865da89ea67fd248471cff79f2... server: Filtered packet: [818] 16fefd00000000000000000062020000560000000000000056fefda531d1803d... server: Send Direct [72] 2eaf4200432c5e9c2f30f11f5d7263e7cc69693be4f26d54865da89ea67fd248... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramDrop13/TlsDropDatagram13.ReorderServerEE/1 (6 ms) [----------] 22 tests from DatagramDrop13/TlsDropDatagram13 (506 ms total) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 20000000003c1:[470] 03ecee5c0380be311d89cccc9d037859adf987b16bc2c5b486a7d914e01902ac... server: Filtered packet: [415] 16fefd00000000000000000062020000560000000000000056fefd2ad601782a... record drop: DTLS 1.3 <46> 2000000001c86:[251] e13695a1bbbef328601e56d66b37403b1aa993ac5b948cdd1b2f735a27d352aa... server: Drop packet record drop: DTLS 1.2 ACK 2:[50] 0030000000000000000000000000000000000000000000000002000000000000... client: Drop packet record drop: DTLS 1.3 <46> 200000000ce5f:[177] 19ee7811de0534e03c580fd3c15c3a4636242cc04924e56ed6c5594d0e2c7d4a... server: Drop packet client: Send Direct [63] 1afefd0000000000000002003200300000000000000000000000000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/0 (6 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000005a6b:[470] c9028ec405a487c7f0329dfe6ca89a481a42b4c28bb7b4021daa7acab5eb91b7... server: Filtered packet: [415] 16fefd00000000000000000062020000560000000000000056fefd69b1ddd8a7... record drop: DTLS 1.3 <46> 200000000dc04:[251] 57371ae2efb887b29b7f21969bdc40df303162b4e9f320ec7125ff76e3297e6f... server: Drop packet record drop: DTLS 1.2 ACK 2:[50] 0030000000000000000000000000000000000000000000000002000000000000... client: Drop packet record drop: DTLS 1.3 <46> 20000000034b7:[177] ab2e3a71b2fd340b7face6bc3d2f561d783cec640ec3d72dd7f9efcc1c23b7af... server: Drop packet client: Send Direct [63] 1afefd0000000000000002003200300000000000000000000000000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropFirstHalf/1 (7 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 2000000006fb7:[470] ec980ebfb43f846b3f2d9814fc1c271c7c8ac530c72b23b5e8895f5d55cb73ac... server: Filtered packet: [415] 16fefd00000000000000000062020000560000000000000056fefd604b141d07... record drop: DTLS 1.3 <46> 2000000008259:[248] 65d7f4c1847825d2cfe6b927938ce04a99b18e0ce132716d4ef0607b727798b1... server: Drop packet record drop: DTLS 1.2 ACK 2:[50] 0030000000000000000000000000000000000000000000000002000000000000... client: Drop packet record drop: DTLS 1.3 <46> 2000000001e18:[177] d026937bde6e64606de15b7e8ceece85aa41c3bf5102a0f901f50f8b9f214c08... server: Drop packet client: Send Direct [63] 1afefd0000000000000002003200300000000000000000000000000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/0 (6 ms) [ RUN ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.3 <46> 200000000ad32:[470] bd21aa422dfaf7ac0d5312ff1fe5dcab8191df8034cd1cf9ea06ec327533a467... server: Filtered packet: [415] 16fefd00000000000000000062020000560000000000000056fefd889486719f... record drop: DTLS 1.3 <46> 20000000052d9:[248] 055587cc24c4759c0db276ebce60e6c56ac9bcf5f9d90419f7ea483148534cf9... server: Drop packet record drop: DTLS 1.2 ACK 2:[50] 0030000000000000000000000000000000000000000000000002000000000000... client: Drop packet record drop: DTLS 1.3 <46> 20000000032a8:[177] 860f7f120f50020998a97f728f9cc4b57aedc8ef0ed7a6f84d6e79f40c7e7664... server: Drop packet client: Send Direct [63] 1afefd0000000000000002003200300000000000000000000000000000000000... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramFragment13/TlsFragmentationAndRecoveryTest.DropSecondHalf/1 (6 ms) [----------] 4 tests from DatagramFragment13/TlsFragmentationAndRecoveryTest (28 ms total) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd9dd42d7001cb09612d1af27a8add7cf95b6e... record drop: DTLS 1.3 <46> 2000000002b1c:[67] a6cdfabbe93302db23b0083f70160ac66dcbdf7e049beea1f3251f1e4caf47d3... record drop: DTLS 1.3 <46> 2000000001b93:[257] daab3df1af642fe14e2e75f0b35bcecc211e9c58a3a700927e855d9be847f471... server: Drop packet record drop: DTLS 1.3 <46> 200000000895b:[242] 3e885032b8224c31599a07662c0570345bfb0ca9981ef63d3ce8e4d7cf10b83c... record drop: DTLS 1.3 <46> 2000000003843:[161] 197fa2d7872832765afab4d2888078235f4739ddd0d94e33447c274852931e28... server: Drop packet record drop: DTLS 1.3 <46> 2000000006618:[61] 65dc8596d14ee56d0171e205d042fedcc1bb93aa63625d90b663d38839a4cf59... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefd9dd42d7001... server: Send Direct [72] 2e2b1c0043a6cdfabbe93302db23b0083f70160ac66dcbdf7e049beea1f3251f... server: Send Direct [247] 2e895b00f23e885032b8224c31599a07662c0570345bfb0ca9981ef63d3ce8e4... server: Send Direct [262] 2e1b930101daab3df1af642fe14e2e75f0b35bcecc211e9c58a3a700927e855d... server: Send Direct [166] 2e384300a1197fa2d7872832765afab4d2888078235f4739ddd0d94e33447c27... server: Send Direct [66] 2e6618003d65dc8596d14ee56d0171e205d042fedcc1bb93aa63625d90b663d3... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/0 (6 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING record drop: DTLS 1.2 Handshake 0:[98] 020000560000000000000056fefd776760d2bcc667cfad3c76520d6cab18ceef... record drop: DTLS 1.3 <46> 200000000e54a:[67] 15b63d7cf86199d8cee08b7ef2c88db31b9c37fc73ce6dce6738d22c6575486b... record drop: DTLS 1.3 <46> 200000000129d:[257] 262c1fb7ea62173bd6493328cc6bc5f852d85deab9a53e752793219f72f5d50a... server: Drop packet record drop: DTLS 1.3 <46> 2000000006a45:[242] 99cdf3ba3d1881923101527036b8cd7e4e2b30610d5eb31726919c822c8fc9a5... record drop: DTLS 1.3 <46> 2000000005953:[161] 5209a56c835373a3dfce13776838986af885564aba0e80e27fbb94f394b0ba04... server: Drop packet record drop: DTLS 1.3 <46> 2000000002d03:[61] 37e6d12694eb75c22888a20d15f222cd29b3411a48d1cefb5ccbee311be9f202... server: Drop packet server: Send Direct [111] 16fefd00000000000000000062020000560000000000000056fefd776760d2bc... server: Send Direct [72] 2ee54a004315b63d7cf86199d8cee08b7ef2c88db31b9c37fc73ce6dce6738d2... server: Send Direct [247] 2e6a4500f299cdf3ba3d1881923101527036b8cd7e4e2b30610d5eb31726919c... server: Send Direct [262] 2e129d0101262c1fb7ea62173bd6493328cc6bc5f852d85deab9a53e75279321... server: Send Direct [166] 2e595300a15209a56c835373a3dfce13776838986af885564aba0e80e27fbb94... server: Send Direct [66] 2e2d03003d37e6d12694eb75c22888a20d15f222cd29b3411a48d1cefb5ccbee... client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.ReorderServerCertificate/1 (6 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000554a:[23] 135665edc51e34c0d9fefcc045bfe7be1ed4a92e7ac46d client: Drop packet record drop: DTLS 1.3 <45> 100000000a406:[29] 71c464aebb4f5c4c68ec9504beff583bfe6d29a3dc1807aa5845a265f8 record drop: DTLS 1.3 <46> 200000000e1e0:[61] fbdbd41c7fe87e88d696cd3099fff6510be1009f10cacf6c44683624b97f294e... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2da406001d71c464aebb4f5c4c68ec9504beff583bfe6d29a3dc1807aa5845a2... client: Send Direct [28] 2d554a0017135665edc51e34c0d9fefcc045bfe7be1ed4a92e7ac46d client: Send Direct [66] 2ee1e0003dfbdbd41c7fe87e88d696cd3099fff6510be1009f10cacf6c446836... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/0 (11 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 1000000001b9c:[23] ce2e4044a220808594278533c3dcc2c99e5a0c65e96f99 client: Drop packet record drop: DTLS 1.3 <45> 1000000005be8:[29] abdad83b04c7b6b362aba2ccc216796b001b8144157ab89f273e18cb37 record drop: DTLS 1.3 <46> 200000000750e:[61] e598f80243b328207efe242d88805f45ff6856a990f9c9147f44262cfcb7f30f... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d5be8001dabdad83b04c7b6b362aba2ccc216796b001b8144157ab89f273e18... client: Send Direct [28] 2d1b9c0017ce2e4044a220808594278533c3dcc2c99e5a0c65e96f99 client: Send Direct [66] 2e750e003de598f80243b328207efe242d88805f45ff6856a990f9c9147f4426... server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterEOEDDuringZeroRtt/1 (11 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 10000000069be:[23] e323859d220419242a57514b60cc5c6d144ace1bac0a9d client: Drop packet record drop: DTLS 1.3 <45> 100000000c797:[29] 3929f2703cf4f1972200dcc9940487a26cc458cac221e7edcb4d6eaf64 record drop: DTLS 1.3 <46> 200000000008e:[61] 7068b4ad40eb1a1f51f692c271fecffc80f1fa0c167c96830d9033e6f0c84563... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2dc797001d3929f2703cf4f1972200dcc9940487a26cc458cac221e7edcb4d6e... client: Send Direct [66] 2e008e003d7068b4ad40eb1a1f51f692c271fecffc80f1fa0c167c96830d9033... client: Send Direct [28] 2d69be0017e323859d220419242a57514b60cc5c6d144ace1bac0a9d server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/0 (11 ms) [ RUN ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Starting second handshake 0-RTT read 6 bytes record drop: DTLS 1.3 <45> 100000000f73c:[23] d6a0477d927f65076cb9358083d88b764377d70eb27222 client: Drop packet record drop: DTLS 1.3 <45> 1000000001239:[29] 6b2674a00c294b0f94fc315b59190459d1966cfeb9100d3beaa6e73166 record drop: DTLS 1.3 <46> 2000000009e7b:[61] fbf1a7365c95e5cafea42ef051f48d8f0a4f28f598d5941ebc0e6da17a927305... client: Drop packet client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Send Direct [34] 2d1239001d6b2674a00c294b0f94fc315b59190459d1966cfeb9100d3beaa6e7... client: Send Direct [66] 2e9e7b003dfbf1a7365c95e5cafea42ef051f48d8f0a4f28f598d5941ebc0e6d... client: Send Direct [28] 2df73c0017d6a0477d927f65076cb9358083d88b764377d70eb27222 server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] DatagramReorder13/TlsReorderDatagram13.DataAfterFinDuringZeroRtt/1 (11 ms) [----------] 6 tests from DatagramReorder13/TlsReorderDatagram13 (58 ms total) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/0 (6 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindow/1 (5 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/0 (6 ms) [ RUN ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] Datagram12Plus/TlsConnectDatagram12Plus.MissAWindowAndOne/1 (6 ms) [----------] 4 tests from Datagram12Plus/TlsConnectDatagram12Plus (24 ms total) [----------] 72 tests from DamageYStream/TlsDamageDHYTest [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703010d71ad4b4889d79ae789d34fecefba9b6e5be746b9b21737a72d... record new: [1190] 0200005703010d71ad4b4889d79ae789d34fecefba9b6e5be746b9b21737a72d... server: Filtered packet: [1195] 16030104a60200005703010d71ad4b4889d79ae789d34fecefba9b6e5be746b9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/0 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301ca802bdb0860aaf7c96f9236044262fd75a0a67db25b9959ec1a... record new: [1190] 020000570301ca802bdb0860aaf7c96f9236044262fd75a0a67db25b9959ec1a... server: Filtered packet: [1195] 16030104a6020000570301ca802bdb0860aaf7c96f9236044262fd75a0a67db2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/1 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301dfbdce33487dd058bef83b222165af50233f2359b045217b6bb5... record new: [1190] 020000570301dfbdce33487dd058bef83b222165af50233f2359b045217b6bb5... server: Filtered packet: [1195] 16030104a6020000570301dfbdce33487dd058bef83b222165af50233f2359b0... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/2 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301b485941c54211f7e5c5cf0b69883741b302cf995c223a8f8d317... record new: [1190] 020000570301b485941c54211f7e5c5cf0b69883741b302cf995c223a8f8d317... server: Filtered packet: [1195] 16030104a6020000570301b485941c54211f7e5c5cf0b69883741b302cf995c2... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/3 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301bc24a3a97b8f8d9ea06f7d8466313979f10c677d835ad632f7a6... record new: [1190] 020000570301bc24a3a97b8f8d9ea06f7d8466313979f10c677d835ad632f7a6... server: Filtered packet: [1195] 16030104a6020000570301bc24a3a97b8f8d9ea06f7d8466313979f10c677d83... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/4 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301363051890720ae05ab6297613903941afdc2119dcfffc2e5035b... record new: [1190] 020000570301363051890720ae05ab6297613903941afdc2119dcfffc2e5035b... server: Filtered packet: [1195] 16030104a6020000570301363051890720ae05ab6297613903941afdc2119dcf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/5 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703013311f746578a2abed57de2c3b9de63bdb270be5f2a9cb6c583cd... record new: [1190] 0200005703013311f746578a2abed57de2c3b9de63bdb270be5f2a9cb6c583cd... server: Filtered packet: [1195] 16030104a60200005703013311f746578a2abed57de2c3b9de63bdb270be5f2a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/6 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703010548424e196291348b6a191f284d4bc37828b949c55b7f580729... record new: [1190] 0200005703010548424e196291348b6a191f284d4bc37828b949c55b7f580729... server: Filtered packet: [1195] 16030104a60200005703010548424e196291348b6a191f284d4bc37828b949c5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/7 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030159e2fa24b2f2d7f0c09656b00d0667eaa472d9822a2d32b33972... record new: [1191] 02000057030159e2fa24b2f2d7f0c09656b00d0667eaa472d9822a2d32b33972... server: Filtered packet: [1196] 16030104a702000057030159e2fa24b2f2d7f0c09656b00d0667eaa472d9822a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/8 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570301fa2877142d32ada64ab1f51d2fc08e300453438de52d36fa1264... record new: [1191] 020000570301fa2877142d32ada64ab1f51d2fc08e300453438de52d36fa1264... server: Filtered packet: [1196] 16030104a7020000570301fa2877142d32ada64ab1f51d2fc08e300453438de5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/9 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030125ebece518082996da403c89ced8daa3123d490bb00c174f0f75... record new: [1191] 02000057030125ebece518082996da403c89ced8daa3123d490bb00c174f0f75... server: Filtered packet: [1196] 16030104a702000057030125ebece518082996da403c89ced8daa3123d490bb0... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/10 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703017bd2d8640d994eda436432b8e2d9f15c699dbb461ab392aee7af... record new: [1191] 0200005703017bd2d8640d994eda436432b8e2d9f15c699dbb461ab392aee7af... server: Filtered packet: [1196] 16030104a70200005703017bd2d8640d994eda436432b8e2d9f15c699dbb461a... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/11 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703026262374d100fc624f33d7df63ba466800aa9a618dacc97190b23... record new: [1190] 0200005703026262374d100fc624f33d7df63ba466800aa9a618dacc97190b23... server: Filtered packet: [1195] 16030204a60200005703026262374d100fc624f33d7df63ba466800aa9a618da... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/12 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030262ab17c44f2d22443be6440820ceff1f92de68e382708966aee6... record new: [1190] 02000057030262ab17c44f2d22443be6440820ceff1f92de68e382708966aee6... server: Filtered packet: [1195] 16030204a602000057030262ab17c44f2d22443be6440820ceff1f92de68e382... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/13 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302efd2978cfdf41e2292520607c2ceaec4ec6b587742fda839be29... record new: [1190] 020000570302efd2978cfdf41e2292520607c2ceaec4ec6b587742fda839be29... server: Filtered packet: [1195] 16030204a6020000570302efd2978cfdf41e2292520607c2ceaec4ec6b587742... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/14 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030215583fc7dd6854f189768aab49df046e9ed31674e9a1ba866dfc... record new: [1190] 02000057030215583fc7dd6854f189768aab49df046e9ed31674e9a1ba866dfc... server: Filtered packet: [1195] 16030204a602000057030215583fc7dd6854f189768aab49df046e9ed31674e9... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/15 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703025529874227111222121761df96f2fbd9eba1a2cbbe9516e745a2... record new: [1190] 0200005703025529874227111222121761df96f2fbd9eba1a2cbbe9516e745a2... server: Filtered packet: [1195] 16030204a60200005703025529874227111222121761df96f2fbd9eba1a2cbbe... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/16 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030200bbcf2e507dded6c37e9a4b4e6a85483138d232189f8def1c4b... record new: [1190] 02000057030200bbcf2e507dded6c37e9a4b4e6a85483138d232189f8def1c4b... server: Filtered packet: [1195] 16030204a602000057030200bbcf2e507dded6c37e9a4b4e6a85483138d23218... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/17 (9 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 02000057030261b877c64e65fbb91b879fcb7926384f6062197893299bd1d873... record new: [1190] 02000057030261b877c64e65fbb91b879fcb7926384f6062197893299bd1d873... server: Filtered packet: [1195] 16030204a602000057030261b877c64e65fbb91b879fcb7926384f6062197893... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/18 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703021219d55140e5161ee09e44dc4b3067e93d91a265ef19a3f84b21... record new: [1190] 0200005703021219d55140e5161ee09e44dc4b3067e93d91a265ef19a3f84b21... server: Filtered packet: [1195] 16030204a60200005703021219d55140e5161ee09e44dc4b3067e93d91a265ef... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/19 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302e247869fa94aca66f30943eb9ef8518a72963090547e4383fbc3... record new: [1191] 020000570302e247869fa94aca66f30943eb9ef8518a72963090547e4383fbc3... server: Filtered packet: [1196] 16030204a7020000570302e247869fa94aca66f30943eb9ef8518a7296309054... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/20 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302d1ea9a17dc4b647615c678657631d18f209d0c5be68b8cefa57f... record new: [1191] 020000570302d1ea9a17dc4b647615c678657631d18f209d0c5be68b8cefa57f... server: Filtered packet: [1196] 16030204a7020000570302d1ea9a17dc4b647615c678657631d18f209d0c5be6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/21 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 0200005703026521f141a0686440030caaba8f375f4a40949ca7f5fe0ae87892... record new: [1191] 0200005703026521f141a0686440030caaba8f375f4a40949ca7f5fe0ae87892... server: Filtered packet: [1196] 16030204a70200005703026521f141a0686440030caaba8f375f4a40949ca7f5... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/22 (11 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1190] 020000570302478bf947cdff00b394df29dcb6bcb1f200ebb96078504fb60a51... record new: [1191] 020000570302478bf947cdff00b394df29dcb6bcb1f200ebb96078504fb60a51... server: Filtered packet: [1196] 16030204a7020000570302478bf947cdff00b394df29dcb6bcb1f200ebb96078... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/23 (11 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303b556aa9be4b0eebdd4a7292933734f8c80dac93ae4710894a3c3... record new: [1192] 020000570303b556aa9be4b0eebdd4a7292933734f8c80dac93ae4710894a3c3... server: Filtered packet: [1197] 16030304a8020000570303b556aa9be4b0eebdd4a7292933734f8c80dac93ae4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/24 (11 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030342a0dc468a1f3f008d96d7d109e2644519e752aea57ccfea2ff0... record new: [1192] 02000057030342a0dc468a1f3f008d96d7d109e2644519e752aea57ccfea2ff0... server: Filtered packet: [1197] 16030304a802000057030342a0dc468a1f3f008d96d7d109e2644519e752aea5... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/25 (11 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303cb67d09871c8df85beed8f3810c5f3c7358bdc7fb3c9e256c545... record new: [1192] 020000570303cb67d09871c8df85beed8f3810c5f3c7358bdc7fb3c9e256c545... server: Filtered packet: [1197] 16030304a8020000570303cb67d09871c8df85beed8f3810c5f3c7358bdc7fb3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/26 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303a609f0299ee6d3982634824b94384ec1a0073bbe489adef9d95e... record new: [1192] 020000570303a609f0299ee6d3982634824b94384ec1a0073bbe489adef9d95e... server: Filtered packet: [1197] 16030304a8020000570303a609f0299ee6d3982634824b94384ec1a0073bbe48... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/27 (9 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030371f80557ec2232944cb9edbdb2b1c5bdb4d11b6cacc3b1d13127... record new: [1192] 02000057030371f80557ec2232944cb9edbdb2b1c5bdb4d11b6cacc3b1d13127... server: Filtered packet: [1197] 16030304a802000057030371f80557ec2232944cb9edbdb2b1c5bdb4d11b6cac... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/28 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303294f048f708968d8d9070c3d94cf95a377f8c538efb6734472ef... record new: [1192] 020000570303294f048f708968d8d9070c3d94cf95a377f8c538efb6734472ef... server: Filtered packet: [1197] 16030304a8020000570303294f048f708968d8d9070c3d94cf95a377f8c538ef... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/29 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703034f9174f7ab67c43a6fa2526c72463e4da549b824bff7db6252d5... record new: [1192] 0200005703034f9174f7ab67c43a6fa2526c72463e4da549b824bff7db6252d5... server: Filtered packet: [1197] 16030304a80200005703034f9174f7ab67c43a6fa2526c72463e4da549b824bf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/30 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303245193845ea366f8873c49ee07ffb9b5d6b1a4bb31eba2179892... record new: [1192] 020000570303245193845ea366f8873c49ee07ffb9b5d6b1a4bb31eba2179892... server: Filtered packet: [1197] 16030304a8020000570303245193845ea366f8873c49ee07ffb9b5d6b1a4bb31... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/31 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030350e32400d9fb74e5fcc8076e458b648a04ad63055debabbd0944... record new: [1193] 02000057030350e32400d9fb74e5fcc8076e458b648a04ad63055debabbd0944... server: Filtered packet: [1198] 16030304a902000057030350e32400d9fb74e5fcc8076e458b648a04ad63055d... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/32 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 020000570303d80687acdcb0b9233ab67ad265d13a10c217bf7e13976e6d9420... record new: [1193] 020000570303d80687acdcb0b9233ab67ad265d13a10c217bf7e13976e6d9420... server: Filtered packet: [1198] 16030304a9020000570303d80687acdcb0b9233ab67ad265d13a10c217bf7e13... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/33 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 0200005703035a3df4187449e0840d7c3dd4399c76930042b8bac79af60059df... record new: [1193] 0200005703035a3df4187449e0840d7c3dd4399c76930042b8bac79af60059df... server: Filtered packet: [1198] 16030304a90200005703035a3df4187449e0840d7c3dd4399c76930042b8bac7... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/34 (10 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [1192] 02000057030373a93f760d3ca8bb1643efd2b2955ce6efe856ba9178b925dddc... record new: [1193] 02000057030373a93f760d3ca8bb1643efd2b2955ce6efe856ba9178b925dddc... server: Filtered packet: [1198] 16030304a902000057030373a93f760d3ca8bb1643efd2b2955ce6efe856ba91... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageServerY/35 (11 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100262af0b72eebaa73d4c21dcc291fac26f4e53f24e932772ed3bf7fca50aa... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100262af0b72eebaa73d4c21dcc291fac26f4e53f24e932772ed3bf... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/0 (20 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f9f903d4ad6228e76970f756720c04a5e8234eed3f0ebafd28375e08a888... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100f9f903d4ad6228e76970f756720c04a5e8234eed3f0ebafd2837... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/1 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d49e97dfeeaae997dfa32d39bfee262fd21a9304685723b1edd041e129f6... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100d49e97dfeeaae997dfa32d39bfee262fd21a9304685723b1edd0... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/2 (20 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01001d6e75cf0bcd2a5e97b62d481e2ad0b2b8c1e808222f1b973997f95ce65b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201001d6e75cf0bcd2a5e97b62d481e2ad0b2b8c1e808222f1b973997... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [326] 1603010106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/3 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000c260df74ef375b44585c9f384a129b661420bee01f6fc32a5c01555b0c1... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201000c260df74ef375b44585c9f384a129b661420bee01f6fc32a5c0... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/4 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002bf578859ef2fc27ae156a63c973770aefc2630b4492b7e89c4def11e313... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201002bf578859ef2fc27ae156a63c973770aefc2630b4492b7e89c4d... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/5 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e2b531ecda19f46355006918629e9a1d99cf003f23d40f50f1256a087d91... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100e2b531ecda19f46355006918629e9a1d99cf003f23d40f50f125... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/6 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100cbf87ac0a5ae1174ee3a7a9bea6be45c9fe972f34c727116bd5c462c83db... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100cbf87ac0a5ae1174ee3a7a9bea6be45c9fe972f34c727116bd5c... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [326] 1603010106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/7 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100242beb0ef06ea63a12eebf6836ea5b6f003813c4436089b7e6fb2f27bf34... handshake new: [259] 010101242beb0ef06ea63a12eebf6836ea5b6f003813c4436089b7e6fb2f27bf... record old: [262] 100001020100242beb0ef06ea63a12eebf6836ea5b6f003813c4436089b7e6fb... record new: [263] 10000103010101242beb0ef06ea63a12eebf6836ea5b6f003813c4436089b7e6... client: Filtered packet: [327] 160301010710000103010101242beb0ef06ea63a12eebf6836ea5b6f003813c4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/8 (20 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fff17a0e7e362dac05522096e7e8692acb230bbe0cdb62f89039d8427992... handshake new: [259] 010101fff17a0e7e362dac05522096e7e8692acb230bbe0cdb62f89039d84279... record old: [262] 100001020100fff17a0e7e362dac05522096e7e8692acb230bbe0cdb62f89039... record new: [263] 10000103010101fff17a0e7e362dac05522096e7e8692acb230bbe0cdb62f890... client: Filtered packet: [327] 160301010710000103010101fff17a0e7e362dac05522096e7e8692acb230bbe... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/9 (20 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c7e69e61e8b9c2335403a8fd090c63255f97392d56d0c16962c654847a2c... handshake new: [259] 010100c7e69e61e8b9c2335403a8fd090c63255f97392d56d0c16962c654847a... record old: [262] 100001020100c7e69e61e8b9c2335403a8fd090c63255f97392d56d0c16962c6... record new: [263] 10000103010100c7e69e61e8b9c2335403a8fd090c63255f97392d56d0c16962... client: Filtered packet: [327] 160301010710000103010100c7e69e61e8b9c2335403a8fd090c63255f97392d... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/10 (22 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010038ca978d92a1538176f001c62bda80ef5a921adc5a999f6ba3b75d68da6a... handshake new: [259] 01010038ca978d92a1538176f001c62bda80ef5a921adc5a999f6ba3b75d68da... record old: [262] 10000102010038ca978d92a1538176f001c62bda80ef5a921adc5a999f6ba3b7... record new: [263] 1000010301010038ca978d92a1538176f001c62bda80ef5a921adc5a999f6ba3... client: Filtered packet: [327] 16030101071000010301010038ca978d92a1538176f001c62bda80ef5a921adc... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/11 (22 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a3293de297d75b7a7cb957cf9dee2df9f05b375b5675a56785c6ae0850eb... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100a3293de297d75b7a7cb957cf9dee2df9f05b375b5675a56785c6... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/12 (18 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f4f9b6013a6e3c2e4ea8d4da892da8408a3ff990399d690a28a4c17b5b52... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100f4f9b6013a6e3c2e4ea8d4da892da8408a3ff990399d690a28a4... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/13 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010050c28b29d7987d7bc75d804ec2fd7c5278dd1208d4ac1e55f82d69fd18c0... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010050c28b29d7987d7bc75d804ec2fd7c5278dd1208d4ac1e55f82d... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/14 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010052b1e3b3e34745cb75d802c58b57047895f07d0fe057460a8456f11e8b58... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 10000102010052b1e3b3e34745cb75d802c58b57047895f07d0fe057460a8456... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [342] 1603020106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/15 (18 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100733cf60f0c465652bf41af64b1ece6b1b59e2eec271932a0695a0587b827... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100733cf60f0c465652bf41af64b1ece6b1b59e2eec271932a0695a... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/16 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008a20638d0002012b1be059fd6234d3adda930516082cf00ea322f262cbbc... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 1000010201008a20638d0002012b1be059fd6234d3adda930516082cf00ea322... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/17 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a6e41ca6eee37a5a90fb283d93d46bf6c84934e8c27f3cd20174fad30370... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100a6e41ca6eee37a5a90fb283d93d46bf6c84934e8c27f3cd20174... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/18 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100dbcacf63f63577ab7270e3351ff0d13af4b8daf27981a6fafac875851bc5... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100dbcacf63f63577ab7270e3351ff0d13af4b8daf27981a6fafac8... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [342] 1603020106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/19 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004ca6e5582c428dd6cfcba430ab395dd6877b4a34b32fa658f828febed8f1... handshake new: [259] 0101014ca6e5582c428dd6cfcba430ab395dd6877b4a34b32fa658f828febed8... record old: [262] 1000010201004ca6e5582c428dd6cfcba430ab395dd6877b4a34b32fa658f828... record new: [263] 100001030101014ca6e5582c428dd6cfcba430ab395dd6877b4a34b32fa658f8... client: Filtered packet: [343] 1603020107100001030101014ca6e5582c428dd6cfcba430ab395dd6877b4a34... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/20 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010038d1dcb9ec5d5f949ef2acfb9376376373558ff4c6b5b126fbe6d3a0e4d1... handshake new: [259] 01010138d1dcb9ec5d5f949ef2acfb9376376373558ff4c6b5b126fbe6d3a0e4... record old: [262] 10000102010038d1dcb9ec5d5f949ef2acfb9376376373558ff4c6b5b126fbe6... record new: [263] 1000010301010138d1dcb9ec5d5f949ef2acfb9376376373558ff4c6b5b126fb... client: Filtered packet: [343] 16030201071000010301010138d1dcb9ec5d5f949ef2acfb9376376373558ff4... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/21 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c567ae1efd8fdd7bbdd30ad1ddb591174146923ee76172933a99f5ef9f25... handshake new: [259] 010100c567ae1efd8fdd7bbdd30ad1ddb591174146923ee76172933a99f5ef9f... record old: [262] 100001020100c567ae1efd8fdd7bbdd30ad1ddb591174146923ee76172933a99... record new: [263] 10000103010100c567ae1efd8fdd7bbdd30ad1ddb591174146923ee76172933a... client: Filtered packet: [343] 160302010710000103010100c567ae1efd8fdd7bbdd30ad1ddb591174146923e... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/22 (22 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009922cb97cf81980872a6a6acc206f5b849af9193b178c40cc2b95b279c05... handshake new: [259] 0101009922cb97cf81980872a6a6acc206f5b849af9193b178c40cc2b95b279c... record old: [262] 1000010201009922cb97cf81980872a6a6acc206f5b849af9193b178c40cc2b9... record new: [263] 100001030101009922cb97cf81980872a6a6acc206f5b849af9193b178c40cc2... client: Filtered packet: [343] 1603020107100001030101009922cb97cf81980872a6a6acc206f5b849af9193... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/23 (22 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009a03040c84d7371010fd498f7839efd40baabbbd1941552cc0afc32ad32b... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201009a03040c84d7371010fd498f7839efd40baabbbd1941552cc0af... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/24 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a7e8b092f1a7479e7cbf809fbb042bd6039efc0707ca1f70237f222e65f0... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100a7e8b092f1a7479e7cbf809fbb042bd6039efc0707ca1f70237f... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/25 (18 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007c4c80cfa8d1fc35d71757cff5a7ac555a18255081f371a21b57f01b16b9... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 1000010201007c4c80cfa8d1fc35d71757cff5a7ac555a18255081f371a21b57... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/26 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100fca28c3578d2aaf7f6409a22c45492f60bc5007910e2baeee7855d926005... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [262] 100001020100fca28c3578d2aaf7f6409a22c45492f60bc5007910e2baeee785... record new: [262] 1000010201000000000000000000000000000000000000000000000000000000... client: Filtered packet: [318] 1603030106100001020100000000000000000000000000000000000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/27 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a7b58de845ab5ab5812d4f7a55c8d5518c4398021b5a4acd221bde163783... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100a7b58de845ab5ab5812d4f7a55c8d5518c4398021b5a4acd221b... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/28 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b56ab6ac511a8cb0faed1a44f0c0d0fd37b18bb1fff34b8452e1ffbf208e... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [262] 100001020100b56ab6ac511a8cb0faed1a44f0c0d0fd37b18bb1fff34b8452e1... record new: [262] 100001020100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffadf85458a2bb4a9aafdc562027... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/29 (18 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01006df012511b3afd4b78509fd8e83e3b1575bcc67f2753ee6220e3cf032826... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 1000010201006df012511b3afd4b78509fd8e83e3b1575bcc67f2753ee6220e3... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/30 (18 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100f5dfd9639b39093a4cbdfdb5165747b8912c84151975b4a9b09de72b55f2... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [262] 100001020100f5dfd9639b39093a4cbdfdb5165747b8912c84151975b4a9b09d... record new: [262] 100001020100ffffffffffffffffffffffffffffffffffffffffffffffffffff... client: Filtered packet: [318] 1603030106100001020100ffffffffffffffffffffffffffffffffffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/31 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004da5e98d4632ad00be83008838754a4f3e251940f82fee7ab917517b722c... handshake new: [259] 0101014da5e98d4632ad00be83008838754a4f3e251940f82fee7ab917517b72... record old: [262] 1000010201004da5e98d4632ad00be83008838754a4f3e251940f82fee7ab917... record new: [263] 100001030101014da5e98d4632ad00be83008838754a4f3e251940f82fee7ab9... client: Filtered packet: [319] 1603030107100001030101014da5e98d4632ad00be83008838754a4f3e251940... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/32 (19 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01009d5f5234398a718dd2351cecf0c28e15ed48232667850a0936186291acfa... handshake new: [259] 0101019d5f5234398a718dd2351cecf0c28e15ed48232667850a0936186291ac... record old: [262] 1000010201009d5f5234398a718dd2351cecf0c28e15ed48232667850a093618... record new: [263] 100001030101019d5f5234398a718dd2351cecf0c28e15ed48232667850a0936... client: Filtered packet: [319] 1603030107100001030101019d5f5234398a718dd2351cecf0c28e15ed482326... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/33 (18 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d4a7c54316a3601a0ec20f1fdd0537162611fd0b1288ac3e19cea86b9840... handshake new: [259] 010100d4a7c54316a3601a0ec20f1fdd0537162611fd0b1288ac3e19cea86b98... record old: [262] 100001020100d4a7c54316a3601a0ec20f1fdd0537162611fd0b1288ac3e19ce... record new: [263] 10000103010100d4a7c54316a3601a0ec20f1fdd0537162611fd0b1288ac3e19... client: Filtered packet: [319] 160303010710000103010100d4a7c54316a3601a0ec20f1fdd0537162611fd0b... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/34 (22 ms) [ RUN ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d85237439e503e2fe0347f1cdad2b17bdb49c934d086951bfad1452344ce... handshake new: [259] 010100d85237439e503e2fe0347f1cdad2b17bdb49c934d086951bfad1452344... record old: [262] 100001020100d85237439e503e2fe0347f1cdad2b17bdb49c934d086951bfad1... record new: [263] 10000103010100d85237439e503e2fe0347f1cdad2b17bdb49c934d086951bfa... client: Filtered packet: [319] 160303010710000103010100d85237439e503e2fe0347f1cdad2b17bdb49c934... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYStream/TlsDamageDHYTest.DamageClientY/35 (23 ms) [----------] 72 tests from DamageYStream/TlsDamageDHYTest (1101 ms total) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff7448de9099... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/0 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffd0b6b9042f... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/1 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffe81bcafdfd... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/2 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff08ccc5890a... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/3 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff50913de006... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/4 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff829404632e... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/5 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feffb09abb25a4... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/6 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1274] 16feff00000000000000000063020000570000000000000057feff5ef420ec38... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/7 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffb9b244f651... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/8 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feffba9dc6f579... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/9 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff3264a00762... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/10 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [649] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [650] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [661] 0c00028900020000000002890100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [662] 0c00028a000200000000028a0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1275] 16feff00000000000000000063020000570000000000000057feff9525b3f3fc... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_PKCS11_DEVICE_ERROR: A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/11 (11 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdeeebf409f3... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/12 (11 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd2b5d32ecec... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/13 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd93a955873b... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/14 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdede18ed3da... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/15 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdba762b73bf... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/16 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdc7c8d5a6c6... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/17 (11 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefd9934972f2c... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/18 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1276] 16fefd00000000000000000063020000570000000000000057fefdd59ce763d8... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/19 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefdf549eccaeb... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/20 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefdb122179161... client: Fatal alert sent: 47 client: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 47 server: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/21 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefda06e924586... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/22 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [651] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... handshake new: [652] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [663] 0c00028b000200000000028b0100ffffffffffffffffadf85458a2bb4a9aafdc... record new: [664] 0c00028c000200000000028c0100ffffffffffffffffadf85458a2bb4a9aafdc... server: Filtered packet: [1277] 16fefd00000000000000000063020000570000000000000057fefd7033b04749... client: Fatal alert sent: 51 client: Handshake failed with error SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 51 server: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. server: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageServerY/23 (10 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ca24f3a18f82484087fa851b16ee1ba5657d8459bd71493993b81bf88701... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100ca24f3a18f82484087fa851b16ee1ba5657d... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/0 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002215d9d3538e84b1046e00f03e6e787099c7c9710dc788b75ea80c60784f... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201002215d9d3538e84b1046e00f03e6e787099c7... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/1 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002170047caab4f6a57feb34ac4dbbcfef2d5e0974bfe29a8ed7063705b2ad... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 10000102000100000000010201002170047caab4f6a57feb34ac4dbbcfef2d5e... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/2 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ba46342fc8c4136b2a1072da05107818968e322d6faefe26264a24c251b5... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100ba46342fc8c4136b2a1072da05107818968e... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [374] 16feff0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/3 (20 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100985159c264069be822bc275f01912f1dc98232b9e83d1ce6d0fb984c2d4d... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100985159c264069be822bc275f01912f1dc982... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/4 (20 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004c03dd2c96d1708949ab76af8b4b5da19ff62ee50bcfe3ca0d20db043da8... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 10000102000100000000010201004c03dd2c96d1708949ab76af8b4b5da19ff6... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/5 (20 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010037d68be528918b8b3e2f9b444962a5210c0607922d68a975e5af7e3d7ae5... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 100001020001000000000102010037d68be528918b8b3e2f9b444962a5210c06... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/6 (20 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01008434ca131c3f6365039a1c505724d06466d922db10c481ceaaf98fd33e67... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201008434ca131c3f6365039a1c505724d06466d9... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [374] 16feff0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/7 (20 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01002c43688bc89a4ecab215f159ab60ad3406a35c3b9f95231c6422c039f6ac... handshake new: [259] 0101012c43688bc89a4ecab215f159ab60ad3406a35c3b9f95231c6422c039f6... record old: [270] 10000102000100000000010201002c43688bc89a4ecab215f159ab60ad3406a3... record new: [271] 1000010300010000000001030101012c43688bc89a4ecab215f159ab60ad3406... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101012c43688b... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/8 (20 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100c709a6bb5e437c12582957ebd3eddde6fec775bb327c5320a0c49423f4ca... handshake new: [259] 010101c709a6bb5e437c12582957ebd3eddde6fec775bb327c5320a0c49423f4... record old: [270] 1000010200010000000001020100c709a6bb5e437c12582957ebd3eddde6fec7... record new: [271] 100001030001000000000103010101c709a6bb5e437c12582957ebd3eddde6fe... client: Filtered packet: [375] 16feff0000000000000001010f100001030001000000000103010101c709a6bb... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/9 (20 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01003e060ad03b056798022a90e5164f86aaebae2a9de6eb618c84849a4e7f35... handshake new: [259] 0101003e060ad03b056798022a90e5164f86aaebae2a9de6eb618c84849a4e7f... record old: [270] 10000102000100000000010201003e060ad03b056798022a90e5164f86aaebae... record new: [271] 1000010300010000000001030101003e060ad03b056798022a90e5164f86aaeb... client: Filtered packet: [375] 16feff0000000000000001010f1000010300010000000001030101003e060ad0... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/10 (23 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010088d385a222ed493613563646ff984819fff598eefa6fae8f79633561567a... handshake new: [259] 01010088d385a222ed493613563646ff984819fff598eefa6fae8f7963356156... record old: [270] 100001020001000000000102010088d385a222ed493613563646ff984819fff5... record new: [271] 10000103000100000000010301010088d385a222ed493613563646ff984819ff... client: Filtered packet: [375] 16feff0000000000000001010f10000103000100000000010301010088d385a2... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/11 (23 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010095412a9e313a9f23ff43c82eb0c4eb3d36a977cdb5d596b4967fd38be465... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010095412a9e313a9f23ff43c82eb0c4eb3d36a9... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/12 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100e54613b2660ed2137b8efaf1858b5e0c541fd686052f2bd99d505a785518... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100e54613b2660ed2137b8efaf1858b5e0c541f... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/13 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 010012bdcea41da27a363e11803a6385c8f2a6da8235f17adb8c71fcea703a06... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 100001020001000000000102010012bdcea41da27a363e11803a6385c8f2a6da... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/14 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ac02e40e39578278e422fea63dd53bb4bc8061456b15bd7b6566ddf2bd5c... handshake new: [258] 0100000000000000000000000000000000000000000000000000000000000000... record old: [270] 1000010200010000000001020100ac02e40e39578278e422fea63dd53bb4bc80... record new: [270] 1000010200010000000001020100000000000000000000000000000000000000... client: Filtered packet: [358] 16fefd0000000000000001010e10000102000100000000010201000000000000... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/15 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100b23531668f0dea274adef9a63c8563901ccbe27534826054fed2b97ad956... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100b23531668f0dea274adef9a63c8563901ccb... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/16 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100ee2d88301bea3b9d9e0dfbf2f5e8732caf32d0d87c182b72ad9dc663fe08... handshake new: [258] 0100ffffffffffffffffadf85458a2bb4a9aafdc5620273d3cf1d8b9c583ce2d... record old: [270] 1000010200010000000001020100ee2d88301bea3b9d9e0dfbf2f5e8732caf32... record new: [270] 1000010200010000000001020100ffffffffffffffffadf85458a2bb4a9aafdc... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/17 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100a5d34a24c7e5845104c0f165803049a8acb4cac9deb2d3fc9a6e4829f47e... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 1000010200010000000001020100a5d34a24c7e5845104c0f165803049a8acb4... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/18 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01000db447e33524966098bd10f75635d898be4a2e65f7e7db572a408cbe60a5... handshake new: [258] 0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff... record old: [270] 10000102000100000000010201000db447e33524966098bd10f75635d898be4a... record new: [270] 1000010200010000000001020100ffffffffffffffffffffffffffffffffffff... client: Filtered packet: [358] 16fefd0000000000000001010e1000010200010000000001020100ffffffffff... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/19 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100991d5e94a21ffd57c93eca697f5bd011d8cab203fe7e6ea7e7f695dc7a45... handshake new: [259] 010101991d5e94a21ffd57c93eca697f5bd011d8cab203fe7e6ea7e7f695dc7a... record old: [270] 1000010200010000000001020100991d5e94a21ffd57c93eca697f5bd011d8ca... record new: [271] 100001030001000000000103010101991d5e94a21ffd57c93eca697f5bd011d8... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101991d5e94... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/20 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 0100d6470002e231e1214d3106a977925550f457c7c6733279107bd6430caed7... handshake new: [259] 010101d6470002e231e1214d3106a977925550f457c7c6733279107bd6430cae... record old: [270] 1000010200010000000001020100d6470002e231e1214d3106a977925550f457... record new: [271] 100001030001000000000103010101d6470002e231e1214d3106a977925550f4... client: Filtered packet: [359] 16fefd0000000000000001010f100001030001000000000103010101d6470002... server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_RX_MALFORMED_DHE_KEY_SHARE: SSL received a malformed DHE key share handshake extension. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/21 (19 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01007988fe54470cbae7f2bd56659eddf89ba7bfe635c6bf0e9a8a80b09f0968... handshake new: [259] 0101007988fe54470cbae7f2bd56659eddf89ba7bfe635c6bf0e9a8a80b09f09... record old: [270] 10000102000100000000010201007988fe54470cbae7f2bd56659eddf89ba7bf... record new: [271] 1000010300010000000001030101007988fe54470cbae7f2bd56659eddf89ba7... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101007988fe54... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/22 (22 ms) [ RUN ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [258] 01004fdea8a9f10be90302f0d3f7e6b7337dec274195bcab572d328270673e1c... handshake new: [259] 0101004fdea8a9f10be90302f0d3f7e6b7337dec274195bcab572d328270673e... record old: [270] 10000102000100000000010201004fdea8a9f10be90302f0d3f7e6b7337dec27... record new: [271] 1000010300010000000001030101004fdea8a9f10be90302f0d3f7e6b7337dec... client: Filtered packet: [359] 16fefd0000000000000001010f1000010300010000000001030101004fdea8a9... server: Fatal alert sent: 51 server: Handshake failed with error SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE: Received incorrect handshakes hash values from peer. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 51 client: Handshake failed with error SSL_ERROR_DECRYPT_ERROR_ALERT: Peer reports failure of signature verification or key exchange. client: Changing state from CONNECTING to ERROR [ OK ] DamageYDatagram/TlsDamageDHYTest.DamageClientY/23 (22 ms) [----------] 48 tests from DamageYDatagram/TlsDamageDHYTest (745 ms total) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/0 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/1 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/2 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/3 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/4 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/6 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/7 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/8 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/9 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/10 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/11 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/12 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/13 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.SingleCipherSuite/14 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/0 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/1 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/2 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/3 (14 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/4 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/5 (7 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/6 (14 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/7 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/8 (15 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/9 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/10 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/11 (13 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/12 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/13 (15 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ResumeCipherSuite/14 (9 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/0 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/1 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/2 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/3 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/4 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/6 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/7 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/8 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/9 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/10 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/11 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/12 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/13 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.ReadLimit/14 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/0 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/1 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/2 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/3 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/4 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.1 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/5 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/6 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/7 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/8 (12 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/9 (6 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/10 (4 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/11 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_RC4_128_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/12 (10 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/13 (11 ms) [ RUN ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteRC4/TlsCipherSuiteTest.WriteLimit/14 (5 ms) [----------] 60 tests from CipherSuiteRC4/TlsCipherSuiteTest (594 ms total) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/0 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/1 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/2 (29 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/3 (28 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/4 (11 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/6 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/7 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/8 (29 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/9 (28 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/10 (11 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.SingleCipherSuite/11 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/0 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/1 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/4 (14 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/5 (9 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/6 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/7 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 (0 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/10 (13 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/11 (10 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/0 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/1 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/2 (31 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/3 (30 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/4 (11 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/5 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/6 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/7 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/8 (30 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/9 (30 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/10 (11 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.ReadLimit/11 (6 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/0 (4 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/1 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/2 (30 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/3 (30 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/4 (12 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/5 (7 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/6 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/7 (5 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/8 (30 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/9 (30 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/10 (10 ms) [ RUN ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD12/TlsCipherSuiteTest.WriteLimit/11 (6 ms) [----------] 48 tests from CipherSuiteAEAD12/TlsCipherSuiteTest (611 ms total) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/0 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/1 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/2 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/3 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/4 (21 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/5 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/6 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/7 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/8 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/9 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/10 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/11 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/12 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/13 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/14 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/15 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/16 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.SingleCipherSuite/17 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/0 (12 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/1 (13 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/2 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/3 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/4 (25 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/5 (25 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/6 (13 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/7 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/8 (24 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/9 (13 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/10 (13 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/11 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/12 (9 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/13 (25 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/14 (25 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/15 (12 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/16 (8 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ResumeCipherSuite/17 (25 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/0 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/1 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/2 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/3 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/4 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/5 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/6 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/7 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/8 (21 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/9 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/10 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/11 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/12 (7 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/13 (21 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/14 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/15 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/16 (5 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001ffffffffffff002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.ReadLimit/17 (21 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/0 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/1 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/2 (5 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/3 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/4 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/5 (21 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/6 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/7 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/8 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/9 (10 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/10 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/11 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/12 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/13 (22 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/14 (23 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/15 (11 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/16 (6 ms) [ RUN ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteAEAD/TlsCipherSuiteTest.WriteLimit/17 (23 ms) [----------] 72 tests from CipherSuiteAEAD/TlsCipherSuiteTest (999 ms total) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/0 (22 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/1 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/2 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/3 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/4 (21 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/5 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/6 (29 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/7 (29 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/8 (22 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/9 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/10 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/11 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/12 (22 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/13 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/14 (30 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.SingleCipherSuite/15 (29 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/0 (24 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/1 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/2 (12 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/3 (8 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/4 (25 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/5 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/8 (25 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/9 (7 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/10 (13 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/11 (9 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/12 (25 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/13 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 (0 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/0 (21 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/1 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/2 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/3 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/4 (22 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/5 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/6 (29 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/7 (28 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/8 (21 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/9 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/10 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/11 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/12 (22 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/13 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/14 (29 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.ReadLimit/15 (28 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/0 (22 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/1 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/2 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/3 (5 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/4 (21 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/5 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/6 (28 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/7 (29 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/8 (21 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/9 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/10 (10 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/11 (6 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/12 (21 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/13 (4 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/14 (28 ms) [ RUN ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBC12/TlsCipherSuiteTest.WriteLimit/15 (28 ms) [----------] 64 tests from CipherSuiteCBC12/TlsCipherSuiteTest (951 ms total) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/0 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/1 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/2 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/3 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/4 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/5 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/6 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/7 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/8 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/9 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/10 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/11 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/12 (5 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/13 (5 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/14 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/15 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/16 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/17 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/18 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/19 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/20 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/21 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/22 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/23 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/24 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/25 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/26 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/27 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/28 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/29 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/30 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/31 (5 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/32 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/33 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/34 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/35 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/36 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/37 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/38 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/39 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/40 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/41 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/42 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/43 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/44 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/45 (5 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/46 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.SingleCipherSuite/47 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/0 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/1 (14 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/2 (14 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/3 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/4 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/5 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/6 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/7 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/8 (14 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/9 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/10 (14 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/11 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/12 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/13 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/14 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/15 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/16 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/17 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/18 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/19 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/20 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/21 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/22 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/23 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/24 (14 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/25 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/26 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/27 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/28 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/29 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/30 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/31 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/32 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/33 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/34 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/35 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/36 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/37 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/38 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/39 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/40 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/41 (14 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/42 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/43 (15 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/44 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/45 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/46 (9 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ResumeCipherSuite/47 (8 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/0 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/1 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/2 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/3 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/4 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/5 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/6 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/7 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/8 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/9 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/10 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/11 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/12 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/13 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/14 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703010020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/15 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/16 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/17 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/18 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/19 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/20 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/21 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/22 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/23 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/24 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/25 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/26 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/27 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/28 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/29 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/30 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703020020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/31 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/32 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/33 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/34 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/35 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/36 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/37 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/38 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/39 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/40 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/41 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/42 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/43 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/44 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/45 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/46 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.ReadLimit/47 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/0 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/1 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/2 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/3 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/4 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/5 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/6 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/7 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/8 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/9 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/10 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/11 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/12 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/13 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/14 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/15 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/16 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/17 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/18 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.1 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/19 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/20 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/21 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/22 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.1 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/23 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/24 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/25 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/26 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.1 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/27 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/28 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/29 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/30 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.1 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/31 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_NULL_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/32 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/33 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/34 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/35 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_NULL_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/36 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/37 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/38 (10 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/39 (11 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_NULL_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/40 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/41 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/42 (13 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/43 (12 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/44 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/45 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/46 (6 ms) [ RUN ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCStream/TlsCipherSuiteTest.WriteLimit/47 (6 ms) [----------] 192 tests from CipherSuiteCBCStream/TlsCipherSuiteTest (2154 ms total) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/0 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/1 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/2 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/3 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/4 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/5 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/6 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/7 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/8 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/9 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/10 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/11 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/12 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/13 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/14 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/15 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/16 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/17 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/18 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/19 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/20 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/21 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/22 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.SingleCipherSuite/23 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/0 (14 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/1 (14 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/2 (14 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/3 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/4 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/5 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/6 (15 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/7 (16 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/8 (15 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/9 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/10 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/11 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/12 (14 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/13 (14 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/14 (14 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/15 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/16 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/17 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/18 (15 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/19 (16 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/20 (15 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/21 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/22 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ResumeCipherSuite/23 (9 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/0 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/1 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/2 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/3 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/4 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/5 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/6 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/7 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/8 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/9 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/10 (7 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17feff00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/11 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/12 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/13 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/14 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/15 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/16 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/17 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/18 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/19 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/20 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd0001000000100000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/21 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/22 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.ReadLimit/23 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/0 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/1 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 Version: DTLS 1.0 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/2 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/3 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/4 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/5 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/6 (13 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/7 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 Version: DTLS 1.0 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/8 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/9 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/10 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/11 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/12 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/13 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.2 Cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdh_ecdsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/14 (11 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/15 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/16 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/17 (10 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/18 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/19 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 Version: DTLS 1.2 Cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA Reset server:ecdh_rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDH_RSA_WITH_AES_256_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/20 (12 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/21 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/22 (6 ms) [ RUN ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteCBCDatagram/TlsCipherSuiteTest.WriteLimit/23 (6 ms) [----------] 96 tests from CipherSuiteCBCDatagram/TlsCipherSuiteTest (1085 ms total) [----------] 4224 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/0 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/2 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/3 (20 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/4 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/5 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/6 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/7 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/8 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/9 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/10 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/11 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/12 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/13 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/14 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/15 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/16 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/17 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/18 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/19 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/20 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/21 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/22 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/23 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/24 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/25 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/26 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/27 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/28 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/29 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/30 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/31 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/32 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/33 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/34 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/35 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/36 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/37 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/38 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/39 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/40 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/41 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/42 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/43 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/44 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/45 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/46 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/47 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/48 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/49 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/50 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/51 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/52 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/53 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/54 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/55 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/56 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/57 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/58 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/59 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/60 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/61 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/62 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/63 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/64 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/65 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/66 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/67 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/68 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/69 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/70 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/71 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/72 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/73 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/74 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/75 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/76 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/77 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/78 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/79 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/80 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/82 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/83 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/84 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/85 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/86 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/87 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/88 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/89 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/90 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/91 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/92 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/93 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/94 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/95 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/96 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/97 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/98 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/99 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/100 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/101 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/102 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/103 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/104 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/105 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/106 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/107 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/108 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/110 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/111 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/112 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/113 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/114 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/115 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/116 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/117 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/118 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/119 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/120 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/121 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/122 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/123 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/124 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/125 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/126 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/127 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/128 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/129 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/130 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/131 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/132 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/133 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/134 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/135 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/136 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/137 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/138 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/139 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/140 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/141 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/142 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/143 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/144 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/145 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/146 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/147 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/148 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/149 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/150 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/151 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/152 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/153 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/154 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/155 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/156 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/157 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/158 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/159 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/160 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/161 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/162 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/163 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/164 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/165 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/166 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/167 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/168 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/169 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/170 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/171 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/172 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/173 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/174 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/175 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/176 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/177 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/178 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/179 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/180 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/181 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/182 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/183 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/184 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/185 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/186 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/187 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/188 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/189 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/190 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/191 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/192 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/193 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/194 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/195 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/196 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/197 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/198 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/199 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/200 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/201 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/202 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/203 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/204 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/205 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/206 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/207 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/208 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/209 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/210 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/211 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/212 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/213 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/214 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/215 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/216 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/217 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/218 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/219 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/220 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/221 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/222 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/223 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/224 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/225 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/226 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/227 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/228 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/229 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/230 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/231 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/232 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/233 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/234 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/235 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/236 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/237 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/238 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/239 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/240 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/241 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/242 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/243 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/244 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/245 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/246 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/247 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/248 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/249 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/250 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/251 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/252 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/253 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/254 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/255 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/256 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/257 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/258 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/259 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/260 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/261 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/262 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/263 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/264 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/265 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/266 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/267 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/268 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/269 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/270 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/271 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/272 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/273 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/274 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/275 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/276 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/277 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/278 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/279 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/280 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/281 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/282 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/283 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/284 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/285 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/286 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/287 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/288 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/289 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/290 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/291 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/292 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/293 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/294 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/295 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/296 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/297 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/298 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/299 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/300 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/301 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/302 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/303 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/304 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/305 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/306 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/307 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/308 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/309 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/310 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/311 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/312 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/313 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/314 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/315 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/316 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/317 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/318 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/319 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/320 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/321 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/322 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/323 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/324 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/325 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/326 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/327 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/328 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/329 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/330 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/331 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/332 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/333 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/334 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/335 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/336 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/337 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/338 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/339 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/340 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/341 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/342 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/343 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/344 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/345 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/346 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/347 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/348 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/349 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/350 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/351 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/352 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/353 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/354 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/355 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/356 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/357 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/358 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/359 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/360 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/361 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/362 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/363 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/364 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/365 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/366 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/367 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/368 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/369 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/370 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/371 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/372 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/373 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/374 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/375 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/376 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/377 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/378 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/379 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/380 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/381 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/382 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/383 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/384 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/385 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/386 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/387 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/388 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/389 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/390 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/391 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/392 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/393 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/394 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/395 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/396 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/397 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/398 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/399 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/400 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/401 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/402 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/403 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/404 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/405 (31 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/406 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/407 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/408 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/409 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/410 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/411 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/412 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/413 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/414 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/415 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/416 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/417 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/418 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/419 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/420 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/421 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/422 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/423 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/424 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/425 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/426 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/427 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/428 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/429 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/430 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/431 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/432 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/433 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/434 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/435 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/436 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/437 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/438 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/439 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/440 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/441 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/442 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/443 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/444 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/445 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/446 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/447 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/448 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/449 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/450 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/451 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/452 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/453 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/454 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/455 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/456 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/457 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/458 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/459 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/460 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/461 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/462 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/463 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/464 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/465 (31 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/466 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/467 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/468 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/469 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/470 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/471 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/472 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/473 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/474 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/475 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/476 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/477 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/478 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/479 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/480 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/481 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/482 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/483 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/484 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/485 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/486 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/487 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/488 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/489 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/490 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/491 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/492 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/493 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/494 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/495 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/496 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/497 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/498 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/499 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/500 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/501 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/502 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/503 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/504 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/505 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/506 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/507 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/508 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/509 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/510 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/511 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/512 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/513 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/514 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/515 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/516 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/517 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/518 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/519 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/520 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/521 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/522 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/523 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/524 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/525 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/526 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/527 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/528 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/529 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/530 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/531 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/532 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/533 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/534 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/535 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/536 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/537 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/538 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/539 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/540 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/541 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/542 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/543 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/544 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/545 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/546 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/547 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/548 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/549 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/550 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/551 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/552 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/553 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/554 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/555 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/556 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/557 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/558 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/559 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/560 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/561 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/562 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/563 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/564 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/565 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/566 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/567 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/568 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/569 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/570 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/571 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/572 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/573 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/574 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/575 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/576 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/577 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/578 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/579 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/580 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/581 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/582 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/583 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/584 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/585 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/586 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/587 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/588 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/589 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/590 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/591 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/592 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/593 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/594 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/595 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/596 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/597 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/598 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/599 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/600 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/601 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/602 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/603 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/604 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/606 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/609 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/612 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/614 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/617 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/619 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/622 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/626 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/628 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/631 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/633 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/635 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/638 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/642 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/645 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/647 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/649 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/656 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/660 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/661 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/662 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/663 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/664 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/665 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/666 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/667 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/668 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/669 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/670 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/671 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/672 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/673 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/674 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/675 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/676 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/677 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/678 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/679 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/680 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/681 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/682 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/683 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/684 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/685 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/686 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/687 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/688 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/689 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/690 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/691 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/692 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/693 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/694 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/695 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/696 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/697 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/698 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/699 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/700 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/701 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/702 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/703 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/704 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/705 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/706 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/707 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/708 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/709 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/710 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/711 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/712 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/713 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/714 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/715 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/716 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/717 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/718 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/719 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/720 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/721 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/722 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/723 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/724 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/725 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/726 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/727 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/728 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/729 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/730 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/731 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/732 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/733 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/734 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/735 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/736 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/737 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/738 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/739 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/740 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/741 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/742 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/743 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/744 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/745 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/746 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/747 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/748 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/749 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/750 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/751 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/752 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/753 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/754 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/755 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/756 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/757 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/758 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/759 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/760 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/761 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/762 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/763 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/764 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/765 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/766 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/767 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/768 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/769 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/770 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/771 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/772 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/773 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/774 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/775 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/776 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/777 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/778 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/779 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/780 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/781 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/782 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/783 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/784 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/785 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/786 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/787 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/788 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/789 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/790 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/791 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/792 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/793 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/794 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/795 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/796 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/797 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/798 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/799 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/800 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/801 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/802 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/803 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/804 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/805 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/806 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/807 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/808 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/809 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/810 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/811 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/812 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/813 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/814 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/815 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/816 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/817 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/818 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/819 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/820 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/821 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/822 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/823 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/824 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/825 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/826 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/827 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/828 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/829 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/830 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/831 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/832 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/833 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/834 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/835 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/836 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/837 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/838 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/839 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/840 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/841 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/842 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/843 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/844 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/845 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/846 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/847 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/848 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/849 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/850 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/851 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/852 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/853 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/854 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/855 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/856 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/857 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/858 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/859 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/860 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/861 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/862 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/863 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/864 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/865 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/866 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/867 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/868 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/869 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/870 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/871 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/872 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/873 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/874 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/875 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/876 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/877 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/878 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/879 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/880 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/880 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/881 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/881 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/882 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/882 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/883 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/883 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/884 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/884 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/885 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/885 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/886 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/886 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/887 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/887 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/888 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/888 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/889 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/889 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/890 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/890 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/891 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/891 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/892 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/892 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/893 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/893 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/894 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/894 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/895 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/895 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/896 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/896 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/897 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/897 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/898 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/898 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/899 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/899 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/900 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/900 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/901 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/901 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/902 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/902 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/903 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/903 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/904 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/904 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/905 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/905 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/906 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/906 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/907 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/907 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/908 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/908 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/909 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/909 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/910 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/910 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/911 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/911 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/912 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/912 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/913 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/913 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/914 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/914 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/915 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/915 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/916 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/916 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/917 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/917 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/918 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/918 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/919 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/919 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/920 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/920 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/921 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/921 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/922 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/922 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/923 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/923 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/924 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/924 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/925 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/925 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/926 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/926 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/927 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/927 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/928 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/928 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/929 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/929 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/930 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/930 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/931 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/931 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/932 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/932 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/933 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/933 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/934 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/934 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/935 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/935 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/936 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/936 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/937 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/937 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/938 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/938 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/939 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/939 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/940 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/940 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/941 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/941 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/942 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/942 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/943 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/943 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/944 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/944 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/945 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/945 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/946 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/946 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/947 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/947 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/948 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/948 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/949 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/949 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/950 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/950 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/951 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/951 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/952 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/952 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/953 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/953 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/954 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/954 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/955 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/955 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/956 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/956 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/957 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/957 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/958 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/958 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/959 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/959 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/960 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/960 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/961 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/961 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/962 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/962 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/963 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/963 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/964 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/964 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/965 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/965 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/966 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/966 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/967 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/967 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/968 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/968 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/969 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/969 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/970 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/970 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/971 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/971 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/972 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/972 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/973 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/973 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/974 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/974 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/975 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/975 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/976 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/976 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/977 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/977 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/978 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/978 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/979 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/979 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/980 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/980 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/981 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/981 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/982 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/982 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/983 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/983 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/984 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/984 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/985 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/985 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/986 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/986 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/987 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/987 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/988 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/988 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/989 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/989 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/990 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/990 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/991 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/991 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/992 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/992 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/993 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/993 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/994 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/994 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/995 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/995 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/996 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/996 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/997 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/997 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/998 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/998 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/999 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/999 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1000 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1000 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1001 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1001 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1002 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1002 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1003 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1003 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1004 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1004 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1005 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1005 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1006 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1006 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1007 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1007 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1008 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1008 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1009 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1009 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1010 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1010 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1011 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1011 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1012 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1012 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1013 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1013 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1014 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1014 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1015 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1015 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1016 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1016 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1017 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1017 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1018 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1018 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1019 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1019 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1020 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1020 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1021 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1021 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1022 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1022 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1023 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1023 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1024 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1024 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1025 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1025 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1026 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1026 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1027 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1027 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1028 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1028 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1029 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1029 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1030 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1030 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1031 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1031 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1032 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1032 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1033 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1033 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1034 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1034 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1035 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1035 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1036 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1036 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1037 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1037 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1038 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1038 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1039 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1039 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1040 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1040 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1041 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1041 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1042 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1042 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1043 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1043 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1044 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1044 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1045 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1045 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1046 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1046 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1047 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1047 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1048 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1048 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1049 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1049 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1050 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1050 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1051 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1051 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1052 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1052 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1053 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1053 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1054 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1054 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1055 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.SingleCipherSuite/1055 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/0 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/2 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/3 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/4 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/5 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/6 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/7 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/8 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/9 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/10 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/11 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/12 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/13 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/14 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/15 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/16 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/17 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/18 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/19 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/20 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/21 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/22 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/23 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/24 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/25 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/26 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/27 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/28 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/29 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/30 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/31 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/32 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/33 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/34 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/35 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/36 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/37 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/38 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/39 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/40 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/41 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/42 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/43 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/44 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/45 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/46 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/47 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/48 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/49 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/50 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/51 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/52 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/53 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/54 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/55 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/56 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/57 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/58 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/59 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/60 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/61 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/62 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/63 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/64 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/65 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/66 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/67 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/68 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/69 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/70 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/71 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/72 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/73 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/74 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/75 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/76 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/77 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/78 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/79 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/80 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/81 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/82 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/83 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/84 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/85 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/86 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/87 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/88 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/89 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/90 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/91 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/92 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/93 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/94 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/95 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/96 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/97 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/98 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/99 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/100 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/101 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/102 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/103 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/104 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/105 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/106 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/107 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/108 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/109 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/110 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/111 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/112 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/113 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/114 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/115 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/116 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/117 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/118 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/119 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/120 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/121 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/122 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/123 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/124 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/125 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/126 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/127 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/128 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/129 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/130 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/131 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/132 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/133 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/134 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/135 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/136 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/137 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/138 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/139 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/140 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/141 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/142 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/143 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/144 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/145 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/146 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/147 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/148 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/149 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/150 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/151 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/152 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/153 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/154 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/155 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/156 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/157 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/158 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/159 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/160 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/161 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/162 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/163 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/164 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/165 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/166 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/167 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/168 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/169 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/170 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/171 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/172 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/173 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/174 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/175 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/176 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/177 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/178 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/179 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/180 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/181 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/182 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/183 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/184 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/185 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/186 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/187 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/188 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/189 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/190 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/191 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/192 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/193 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/194 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/195 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/196 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/197 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/198 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/199 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/200 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/201 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/202 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/203 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/204 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/205 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/206 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/207 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/208 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/209 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/210 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/211 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/212 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/213 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/214 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/215 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/216 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/217 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/218 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/219 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/220 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/221 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/222 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/223 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/224 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/225 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/226 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/227 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/228 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/229 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/230 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/231 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/232 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/233 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/234 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/235 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/236 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/237 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/238 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/239 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/240 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/241 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/242 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/243 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/244 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/245 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/246 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/247 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/248 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/249 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/250 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/251 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/252 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/253 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/254 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/255 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/256 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/257 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/258 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/259 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/260 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/261 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/262 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/263 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/264 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/265 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/266 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/267 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/268 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/269 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/270 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/271 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/272 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/273 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/274 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/275 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/276 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/277 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/278 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/279 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/280 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/281 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/282 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/283 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/284 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/285 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/286 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/287 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/288 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/289 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/290 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/291 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/292 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/293 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/294 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/295 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/296 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/297 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/298 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/299 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/300 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/301 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/302 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/303 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/304 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/305 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/306 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/307 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/308 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/309 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/310 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/311 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/312 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/313 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/314 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/315 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/316 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/317 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/318 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/319 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/320 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/321 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/322 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/323 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/324 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/325 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/326 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/327 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/328 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/329 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/330 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/331 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/332 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/333 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/334 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/335 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/336 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/337 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/338 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/339 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/340 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/341 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/342 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/343 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/344 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/345 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/346 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/347 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/348 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/349 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/350 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/351 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/352 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/353 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/354 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/355 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/356 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/357 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/358 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/359 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/360 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/361 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/362 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/363 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/364 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/365 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/366 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/367 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/368 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/369 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/370 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/371 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/372 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/373 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/374 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/375 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/376 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/377 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/378 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/379 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/380 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/381 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/382 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/383 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/384 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/385 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/386 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/387 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/388 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/389 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/390 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/391 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/392 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/393 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/394 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/395 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/528 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/529 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/530 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/531 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/532 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/533 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/534 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/535 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/536 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/537 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/538 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/539 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/540 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/541 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/542 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/543 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/544 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/545 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/546 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/547 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/548 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/549 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/550 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/551 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/552 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/553 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/554 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/555 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/556 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/557 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/558 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/559 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/560 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/561 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/562 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/563 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/564 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/565 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/566 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/567 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/568 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/569 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/570 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/571 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/572 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/573 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/574 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/575 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/576 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/577 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/578 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/579 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/580 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/581 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/582 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/583 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/584 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/585 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/586 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/587 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/588 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/589 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/590 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/591 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/592 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/593 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/594 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/596 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/597 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/598 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/599 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/600 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/601 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/602 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/603 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/605 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/606 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/607 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/608 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/609 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/610 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/611 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/612 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/613 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/614 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/615 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/616 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/617 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/618 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/619 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/620 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/621 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/622 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/623 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/624 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/625 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/626 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/627 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/628 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/629 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/630 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/631 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/632 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/633 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/634 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/635 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/636 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/637 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/638 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/639 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/640 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/641 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/642 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/643 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/644 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/645 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/646 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/647 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/648 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/649 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/650 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/651 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/652 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/653 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/654 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/655 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/656 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/657 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/658 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/659 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/660 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/661 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/662 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/663 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/664 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/665 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/666 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/667 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/668 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/669 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/670 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/671 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/672 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/673 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/674 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/675 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/676 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/677 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/678 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/679 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/680 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/681 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/682 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/683 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/684 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/685 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/686 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/687 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/688 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/689 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/690 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/691 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/692 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/693 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/694 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/695 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/696 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/697 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/698 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/699 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/700 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/701 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/702 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/703 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/704 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/705 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/706 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/707 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/708 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/709 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/710 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/711 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/712 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/713 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/714 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/715 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/716 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/717 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/718 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/719 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/720 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/721 (12 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/722 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/723 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/724 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/725 (13 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/726 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/727 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/728 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/729 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/730 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/731 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/732 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/733 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/734 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/735 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/736 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/737 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/738 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/739 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/740 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/741 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/742 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/743 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/744 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/745 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/746 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/747 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/748 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/749 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/750 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/751 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/752 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/753 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/754 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/755 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/756 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/757 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/758 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/759 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/760 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/761 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/762 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/763 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/764 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/765 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/766 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/767 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/768 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/769 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/770 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/771 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/772 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/773 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/774 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/775 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/776 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/777 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/778 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/779 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/780 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/781 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/782 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/783 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/784 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/785 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/786 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/787 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/788 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/789 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/790 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/791 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/792 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/793 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/794 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/795 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/796 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/797 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/798 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/799 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/800 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/801 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/802 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/803 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/804 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/805 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/806 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/807 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/808 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/809 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/810 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/811 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/812 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/813 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/814 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/815 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/816 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/817 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/818 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/819 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/820 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/821 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/822 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/823 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/824 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/825 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/826 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/827 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/828 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/829 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/830 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/831 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/832 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/833 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/834 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/835 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/836 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/837 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/838 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/839 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/840 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/841 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/842 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/843 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/844 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/845 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/846 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/847 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/848 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/849 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/850 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/851 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/852 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/853 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/854 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/855 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/856 (25 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/857 (26 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/858 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/859 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/860 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/861 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/862 (8 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/863 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/864 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/865 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/866 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/867 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/868 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/869 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/870 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/871 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/872 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/873 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/874 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/875 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/876 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/877 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/878 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/879 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/880 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/880 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/881 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/881 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/882 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/882 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/883 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/883 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/884 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/884 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/885 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/885 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/886 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/886 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/887 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/887 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/888 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/888 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/889 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/889 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/890 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/890 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/891 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/891 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/892 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/892 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/893 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/893 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/894 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/894 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/895 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/895 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/896 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/896 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/897 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/897 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/898 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/898 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/899 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/899 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/900 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/900 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/901 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/901 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/902 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/902 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/903 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/903 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/904 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/904 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/905 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/905 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/906 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/906 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/907 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/907 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/908 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/908 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/909 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/909 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/910 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/910 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/911 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/911 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/912 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/912 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/913 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/913 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/914 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/914 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/915 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/915 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/916 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/916 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/917 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/917 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/918 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/918 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/919 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/919 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/920 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/920 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/921 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/921 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/922 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/922 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/923 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/923 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/924 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/924 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/925 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/925 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/926 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/926 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/927 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/927 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/928 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/928 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/929 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/929 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/930 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/930 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/931 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/931 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/932 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/932 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/933 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/933 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/934 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/934 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/935 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/935 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/936 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/936 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/937 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/937 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/938 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/938 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/939 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/939 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/940 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/940 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/941 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/941 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/942 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/942 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/943 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/943 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/944 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/944 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/945 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/945 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/946 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/946 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/947 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/947 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/948 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/948 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/949 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/949 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/950 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/950 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/951 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/951 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/952 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/952 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/953 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/953 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/954 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/954 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/955 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/955 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/956 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/956 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/957 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/957 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/958 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/958 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/959 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/959 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/960 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/960 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/961 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/961 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/962 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/962 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/963 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/963 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/964 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/964 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/965 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/965 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/966 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/966 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/967 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/967 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/968 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/968 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/969 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/969 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/970 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/970 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/971 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/971 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/972 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/972 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/973 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/973 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/974 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/974 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/975 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/975 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/976 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/976 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/977 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/977 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/978 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/978 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/979 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/979 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/980 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/980 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/981 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/981 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/982 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/982 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/983 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/983 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/984 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/984 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/985 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/985 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/986 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/986 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/987 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/987 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/988 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/988 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/989 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/989 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/990 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/990 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/991 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/991 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/992 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/992 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/993 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/993 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/994 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/994 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/995 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/995 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/996 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/996 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/997 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/997 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/998 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/998 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/999 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/999 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1000 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1000 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1001 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1001 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1002 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1002 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1003 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1003 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1004 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1004 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1005 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1005 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1006 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1006 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1007 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1007 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1008 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1008 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1009 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1009 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1010 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1010 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1011 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1011 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1012 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1012 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1013 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1013 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1014 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1014 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1015 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1015 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1016 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1016 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1017 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1017 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1018 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1018 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1019 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1019 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1020 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1020 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1021 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1021 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1022 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1022 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1023 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1023 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1024 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1024 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1025 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1025 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1026 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1026 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1027 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1027 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1028 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1028 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1029 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1029 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1030 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1030 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1031 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1031 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1032 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1032 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1033 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1033 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1034 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1034 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1035 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1035 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1036 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1036 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1037 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1037 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1038 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1038 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1039 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1039 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1040 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1040 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1041 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1041 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1042 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1042 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1043 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1043 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1044 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1044 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1045 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1045 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1046 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1046 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1047 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1047 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1048 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1048 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1049 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1049 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1050 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1050 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1051 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1051 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1052 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1052 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1053 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1053 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1054 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1054 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1055 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Skipping DSA suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 ssl_ciphersuite_unittest.cc:246: Skipped Tickets not supported with DSA (bug 1174677). [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1055 (0 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/0 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/2 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/3 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/4 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/5 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/6 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/7 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/8 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/9 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/10 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/11 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/12 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/13 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/14 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/15 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/16 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/17 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/18 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/19 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/20 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/21 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/22 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/23 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/24 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/25 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/26 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/27 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/28 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/29 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/30 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/31 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/32 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/33 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/34 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/35 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/36 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/37 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/38 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/39 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/40 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/41 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/42 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/43 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/44 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/45 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/46 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/47 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/48 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/49 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/50 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/51 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/52 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/53 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/54 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/55 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/56 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/57 (20 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/58 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/59 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/60 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/61 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/62 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/63 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/64 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/65 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/66 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/67 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/68 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/69 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/70 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/71 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/72 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/73 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/74 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/75 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/76 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/77 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/78 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/79 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/80 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/82 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/83 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/84 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/85 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/86 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/87 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/88 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/89 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/90 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/91 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/92 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/93 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/94 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/95 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/96 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/97 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/98 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/99 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/100 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/101 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/102 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/103 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/104 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/105 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/106 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/107 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/108 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/110 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/111 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/112 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/113 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/114 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/115 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/116 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/117 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/118 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/119 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/120 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/121 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/122 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/123 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/124 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/125 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/126 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/127 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/128 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/129 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/130 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/131 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/132 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/133 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/134 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/135 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/136 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/137 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/138 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/139 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/140 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/141 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/142 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/143 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/144 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/145 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/146 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/147 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/148 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/149 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/150 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/151 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/152 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/153 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/154 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/155 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/156 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/157 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/158 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/159 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/160 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/161 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/162 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/163 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/164 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/165 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/166 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/167 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/168 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/169 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/170 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/171 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/172 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/173 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/174 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/175 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/176 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/177 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/178 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/179 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/180 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/181 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/182 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/183 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/184 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/185 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/186 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/187 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/188 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/189 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/190 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/191 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/192 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/193 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/194 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/195 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/196 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/197 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/198 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/199 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/200 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/201 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/202 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/203 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/204 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/205 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/206 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/207 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/208 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/209 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/210 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/211 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/212 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/213 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/214 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/215 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/216 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/217 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/218 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/219 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/220 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/221 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/222 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/223 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/224 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/225 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/226 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/227 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/228 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/229 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/230 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/231 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/232 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/233 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/234 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/235 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/236 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/237 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/238 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/239 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/240 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/241 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/242 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/243 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/244 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/245 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/246 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/247 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/248 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/249 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/250 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/251 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/252 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/253 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/254 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/255 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/256 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/257 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/258 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/259 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/260 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/261 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/262 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/263 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/264 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/265 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/266 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/267 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/268 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/269 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/270 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/271 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/272 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/273 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/274 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/275 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/276 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/277 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/278 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/279 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/280 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/281 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/282 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/283 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/284 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/285 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/286 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/287 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/288 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/289 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/290 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/291 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/292 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/293 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/294 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/295 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/296 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/297 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/298 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/299 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/300 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/301 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/302 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/303 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/304 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/305 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/306 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/307 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/308 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/309 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/310 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/311 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/312 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/313 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/314 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/315 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/316 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/317 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/318 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/319 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/320 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/321 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/322 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/323 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/324 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/325 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/326 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/327 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/328 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/329 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/330 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/331 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/332 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/333 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/334 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/335 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/336 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/337 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/338 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/339 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/340 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/341 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/342 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/343 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/344 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/345 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/346 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/347 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/348 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/349 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/350 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/351 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/352 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/353 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/354 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/355 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/356 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/357 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/358 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/359 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/360 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/361 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/362 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/363 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/364 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/365 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/366 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/367 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/368 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/369 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/370 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/371 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/372 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/373 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/374 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/375 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/376 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/377 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/378 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/379 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/380 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/381 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/382 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/383 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/384 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/385 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/386 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/387 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/388 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/389 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/390 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/391 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/392 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/393 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/394 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/395 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/396 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/397 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/398 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/399 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/400 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/401 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/402 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/403 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/404 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/405 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/406 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/407 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/408 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/409 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/410 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/411 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/412 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/413 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/414 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/415 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/416 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/417 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/418 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/419 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/420 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/421 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/422 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/423 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/424 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/425 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/426 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/427 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/428 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/429 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/430 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/431 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/432 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/433 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/434 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/435 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/436 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/437 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/438 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/439 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/440 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/441 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/442 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/443 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/444 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/445 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/446 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/447 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/448 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/449 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/450 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/451 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/452 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/453 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/454 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/455 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/456 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/457 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/458 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/459 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/460 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/461 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/462 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/463 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/464 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/465 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/466 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/467 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/468 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/469 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/470 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/471 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/472 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/473 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/474 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/475 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/476 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/477 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/478 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/479 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/480 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/481 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/482 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/483 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/484 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/485 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/486 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/487 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/488 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/489 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/490 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/491 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/492 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/493 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/494 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/495 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/496 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/497 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/498 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/499 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/500 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/501 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/502 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/503 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/504 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/505 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/506 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/507 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/508 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/509 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/510 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/511 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/512 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/513 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/514 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/515 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/516 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/517 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/518 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/519 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/520 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/521 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/522 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/523 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/524 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/525 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/526 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703030020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/527 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/528 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/529 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/530 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/531 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/532 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/533 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/534 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/535 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/536 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/537 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/538 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/539 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/540 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/541 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/542 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/543 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/544 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/545 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/546 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/547 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/548 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/549 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/550 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/551 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/552 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/553 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/554 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/555 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/556 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/557 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/558 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/559 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/560 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/561 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/562 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/563 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/564 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/565 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/566 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/567 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/568 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/569 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/570 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/571 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/572 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/573 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/574 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/575 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/576 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/577 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/578 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/579 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/580 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/581 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/582 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/583 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/584 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/585 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/586 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/587 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/588 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/589 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/590 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/591 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/592 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/593 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/594 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/595 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/596 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/597 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/598 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/599 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/600 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/601 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/602 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/603 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/604 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/606 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/609 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/612 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/614 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/617 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/619 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/622 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/626 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/628 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/631 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/633 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/635 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/638 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/642 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/645 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/646 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/647 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/649 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/655 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/656 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/660 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/661 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/662 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/663 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/664 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/665 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/666 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/667 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/668 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/669 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/670 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/671 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/672 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/673 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/674 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/675 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/676 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/677 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/678 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/679 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/680 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/681 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/682 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/683 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/684 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/685 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/686 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/687 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/688 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/689 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/690 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/691 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/692 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/693 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/694 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/695 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/696 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/697 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/698 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/699 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/700 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/701 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/702 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/703 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/704 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/705 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/706 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/707 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/708 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/709 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/710 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/711 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/712 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/713 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/714 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/715 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/716 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/717 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/718 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/719 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/720 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/721 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/722 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/723 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/724 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/725 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/726 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/727 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/728 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/729 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/730 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/731 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/732 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/733 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/734 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/735 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/736 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/737 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/738 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/739 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/740 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/741 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/742 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/743 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/744 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/745 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/746 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/747 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/748 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/749 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/750 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/751 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/752 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/753 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/754 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/755 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/756 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/757 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/758 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/759 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/760 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/761 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/762 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/763 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/764 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/765 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/766 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/767 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/768 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/769 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/770 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/771 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/772 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/773 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/774 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/775 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/776 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/777 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/778 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/779 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/780 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/781 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/782 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/783 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/784 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/785 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/786 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/787 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/788 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/789 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/790 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/791 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/792 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/793 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/794 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/795 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/796 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/797 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/798 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/799 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/800 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/801 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/802 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/803 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/804 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/805 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/806 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/807 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/808 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/809 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/810 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/811 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/812 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/813 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/814 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/815 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/816 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/817 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/818 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/819 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/820 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/821 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/822 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/823 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/824 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/825 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/826 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/827 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/828 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/829 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/830 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/831 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/832 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/833 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/834 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/835 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/836 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/837 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/838 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/839 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/840 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/841 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/842 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/843 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/844 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/845 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/846 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/847 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/848 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/849 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/850 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/851 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/852 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/853 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/854 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/855 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/856 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/857 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/858 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/859 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/860 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/861 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/862 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/863 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/864 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/865 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/866 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/867 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/868 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/869 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/870 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/871 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/872 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/873 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/874 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/875 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/876 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/877 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/878 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/879 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/880 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/880 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/881 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/881 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/882 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/882 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/883 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/883 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/884 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/884 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/885 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/885 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/886 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/886 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/887 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/887 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/888 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/888 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/889 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/889 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/890 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/890 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/891 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/891 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/892 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/892 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/893 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/893 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/894 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/894 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/895 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/895 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/896 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/896 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/897 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/897 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/898 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/898 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/899 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/899 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/900 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/900 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/901 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/901 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/902 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/902 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/903 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/903 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/904 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/904 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/905 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/905 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/906 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/906 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/907 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/907 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/908 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/908 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/909 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/909 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/910 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/910 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/911 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/911 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/912 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/912 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/913 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/913 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/914 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/914 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/915 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/915 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/916 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/916 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/917 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/917 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/918 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/918 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/919 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/919 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/920 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/920 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/921 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/921 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/922 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/922 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/923 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/923 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/924 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/924 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/925 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/925 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/926 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/926 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/927 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/927 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/928 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/928 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/929 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/929 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/930 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/930 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/931 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/931 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/932 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/932 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/933 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/933 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/934 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/934 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/935 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/935 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/936 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/936 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/937 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/937 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/938 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/938 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/939 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/939 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/940 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/940 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/941 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/941 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/942 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/942 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/943 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/943 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/944 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/944 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/945 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/945 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/946 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/946 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/947 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/947 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/948 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/948 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/949 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/949 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/950 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/950 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/951 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/951 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/952 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/952 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/953 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/953 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/954 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/954 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/955 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/955 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/956 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/956 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/957 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/957 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/958 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/958 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/959 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/959 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/960 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/960 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/961 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/961 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/962 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/962 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/963 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/963 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/964 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/964 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/965 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/965 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/966 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/966 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/967 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/967 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/968 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/968 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/969 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/969 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/970 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/970 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/971 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/971 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/972 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/972 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/973 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/973 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/974 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/974 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/975 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/975 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/976 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/976 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/977 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/977 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/978 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/978 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/979 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/979 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/980 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/980 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/981 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/981 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/982 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/982 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/983 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/983 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/984 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/984 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/985 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/985 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/986 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/986 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/987 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/987 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/988 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/988 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/989 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/989 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/990 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/990 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/991 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/991 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/992 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/992 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/993 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/993 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/994 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/994 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/995 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/995 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/996 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/996 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/997 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/997 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/998 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/998 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/999 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/999 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1000 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1000 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1001 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1001 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1002 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1002 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1003 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1003 (31 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1004 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1004 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1005 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1005 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1006 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1006 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1007 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1007 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1008 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1008 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1009 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1009 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1010 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1010 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1011 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1011 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1012 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1012 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1013 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1013 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1014 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1014 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1015 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1015 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1016 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1016 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1017 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1017 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1018 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1018 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1019 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1019 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1020 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1020 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1021 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1021 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1022 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1022 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1023 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1023 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1024 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1024 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1025 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1025 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1026 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1026 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1027 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1027 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1028 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1028 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1029 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1029 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1030 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1030 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1031 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1031 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1032 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1032 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1033 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1033 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1034 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1034 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1035 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1035 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1036 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1036 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1037 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1037 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1038 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1038 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1039 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1039 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1040 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1040 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1041 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1041 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1042 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1042 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1043 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1043 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1044 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1044 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1045 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1045 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1046 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1046 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1047 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1047 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1048 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1048 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1049 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1049 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1050 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1050 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1051 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1051 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1052 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1052 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1053 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1053 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1054 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1054 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1055 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [45] 17fefd00010005a0000000002006000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ReadLimit/1055 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/0 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/2 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/3 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/4 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/5 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/6 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/7 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/8 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/9 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/10 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/11 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/12 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/13 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/14 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/15 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/16 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/17 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/18 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/19 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/20 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/21 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/22 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/23 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/24 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/25 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/26 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/27 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/28 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/29 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/30 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/31 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/32 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/33 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/34 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/35 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/36 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/37 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/38 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/39 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/40 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/41 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/42 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/43 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/44 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/45 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/46 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/47 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/48 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/49 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/50 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/51 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/52 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/53 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/54 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/55 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/56 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/57 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/58 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/59 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/60 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/61 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/62 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/63 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/64 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/65 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/66 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/67 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/68 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/69 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/70 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/71 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/72 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/73 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/74 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/75 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/76 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/77 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/78 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/79 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/80 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/81 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/82 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/83 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/84 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/85 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/86 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/87 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/88 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/89 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/90 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/91 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/92 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/93 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/94 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/95 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/96 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/97 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/98 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/99 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/100 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/101 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/102 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/103 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/104 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/105 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/106 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/107 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/108 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/109 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/110 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/111 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/112 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/113 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/114 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/115 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/116 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/117 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/118 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/119 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/120 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/121 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/122 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/123 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/124 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/125 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/126 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/127 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/128 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/129 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/130 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/131 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/132 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/133 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/134 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/135 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/136 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/137 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/138 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/139 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/140 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/141 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/142 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/143 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/144 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/145 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/146 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/147 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/148 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/149 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/150 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/151 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/152 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/153 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/154 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/155 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/156 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/157 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/158 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/159 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/160 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/161 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/162 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/163 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/164 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/165 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/166 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/167 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/168 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/169 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/170 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/171 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/172 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/173 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/174 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/175 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/176 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/177 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/178 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/179 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/180 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/181 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/182 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/183 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/184 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/185 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/186 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/187 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/188 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/189 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/190 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/191 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/192 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/193 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/194 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/195 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/196 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 Version: TLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/197 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/198 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/199 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/200 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/201 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/202 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/203 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/204 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/205 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/206 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/207 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/208 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/209 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/210 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/211 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/212 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/213 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/214 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/215 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/216 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/217 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/218 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/219 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/220 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/221 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/222 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/223 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/224 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/225 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/226 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/227 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/228 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/229 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/230 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/231 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/232 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/233 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/234 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/235 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/236 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/237 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/238 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/239 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/240 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/241 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/242 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/243 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/244 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/245 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/246 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/247 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/248 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/249 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/250 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/251 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/252 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/253 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/254 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/255 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/256 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/257 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/258 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/259 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/260 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/261 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/262 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/263 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/264 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/265 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/266 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/267 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/268 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/269 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/270 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/271 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/272 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/273 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/274 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/275 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/276 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/277 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/278 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/279 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/280 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/281 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/282 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/283 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/284 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/285 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/286 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/287 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/288 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/289 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/290 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/291 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/292 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/293 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/294 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/295 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/296 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/297 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/298 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/299 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/300 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/301 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/302 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/303 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/304 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/305 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/306 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/307 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/308 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/309 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/310 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/311 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/312 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/313 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/314 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/315 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/316 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/317 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/318 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/319 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/320 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/321 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/322 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/323 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/324 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/325 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/326 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/327 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/328 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 Version: TLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/329 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/330 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/331 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/332 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/333 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/334 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/335 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/336 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/337 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/338 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/339 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/340 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/341 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/342 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/343 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/344 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/345 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/346 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/347 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/348 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/349 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/350 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/351 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/352 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/353 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/354 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/355 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/356 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/357 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/358 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/359 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/360 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/361 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/362 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/363 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/364 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/365 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/366 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/367 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/368 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/369 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/370 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/371 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/372 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/373 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/374 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/375 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/376 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/377 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/378 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/379 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/380 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/381 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/382 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/383 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/384 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/385 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/386 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/387 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/388 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/389 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/390 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/391 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/392 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/393 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/394 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/395 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/396 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/397 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/398 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/399 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/400 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/401 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/402 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/403 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/404 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/405 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/406 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/407 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/408 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/409 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/410 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/411 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/412 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/413 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/414 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/415 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/416 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/417 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/418 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/419 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/420 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/421 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/422 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/423 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/424 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/425 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/426 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/427 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/428 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/429 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/430 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/431 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/432 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/433 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/434 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/435 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/436 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/437 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/438 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/439 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/440 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/441 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/442 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/443 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/444 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/445 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/446 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/447 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/448 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/449 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/450 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/451 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/452 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/453 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/454 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/455 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/456 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/457 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/458 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/459 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/460 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/461 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/462 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/463 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/464 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/465 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/466 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/467 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/468 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/469 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/470 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/471 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/472 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/473 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/474 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/475 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/476 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/477 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/478 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/479 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/480 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/481 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/482 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/483 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/484 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/485 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/486 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/487 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/488 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/489 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/490 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/491 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/492 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/493 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/494 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/495 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/496 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/497 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/498 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/499 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/500 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/501 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/502 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/503 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/504 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/505 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/506 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/507 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/508 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/509 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/510 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/511 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/512 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/513 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/514 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/515 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/516 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/517 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/518 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/519 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/520 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/521 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/522 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/523 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/524 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/525 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/526 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 Version: TLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/527 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/528 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/529 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/530 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/531 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/532 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/533 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/534 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/535 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/536 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/537 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/538 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/539 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/540 (20 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/541 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/542 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/543 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/544 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/545 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/546 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/547 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/548 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/549 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/550 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/551 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/552 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/553 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/554 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/555 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/556 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/557 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/558 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/559 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/560 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/561 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/562 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/563 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/564 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/565 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/566 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/567 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/568 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/569 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/570 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/571 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/572 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/573 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/574 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/575 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/576 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/577 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/578 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/579 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/580 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/581 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/582 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/583 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/584 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/585 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/586 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/587 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/588 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/589 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/590 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/591 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/592 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/593 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/594 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/595 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/596 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/597 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/598 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/599 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/600 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/601 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/602 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/603 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/604 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/605 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/606 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/607 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/608 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/609 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/610 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/611 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/612 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/613 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/614 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/615 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/616 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/617 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/618 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/619 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/620 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/621 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/622 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/623 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/624 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/625 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/626 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/627 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/628 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/629 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/630 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/631 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/632 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/633 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/634 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/635 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/636 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/637 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/638 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/639 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/640 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/641 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/642 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/643 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/644 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/645 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/646 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/647 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/648 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/649 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/650 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/651 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/652 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/653 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/654 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/655 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/656 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/657 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/658 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/659 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/660 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/661 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/662 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/663 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/664 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/665 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/666 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/667 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/668 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/669 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/670 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/671 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/672 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/673 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/674 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/675 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/676 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/677 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/678 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/679 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/680 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/681 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/682 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/683 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/684 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/685 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/686 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/687 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/688 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/689 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/690 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/691 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/692 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/693 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/694 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/695 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/696 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/697 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/698 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/699 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/700 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/701 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/702 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/703 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/704 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/705 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/706 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/707 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/708 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/709 (9 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/710 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/711 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/712 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/713 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/714 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/715 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/716 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/717 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/718 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/719 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/720 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/721 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/722 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/723 (10 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/724 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/725 (11 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/726 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/727 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/728 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/729 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/730 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/731 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/732 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/733 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/734 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/735 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/736 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/737 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/738 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/739 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/740 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/741 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/742 (7 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/743 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/744 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/745 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/746 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/747 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/748 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/749 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/750 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/751 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/752 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/753 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/754 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/755 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/756 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/757 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/758 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/759 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/760 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/761 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/762 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/763 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/764 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/765 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/766 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/767 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/768 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/769 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/770 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/771 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/772 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/773 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/774 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/775 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/776 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/777 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/778 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/779 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/780 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/781 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/782 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/783 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/784 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/785 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/786 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/787 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/788 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/789 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/790 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 Version: DTLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/791 (6 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/792 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/793 (24 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/794 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/795 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/796 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/797 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/798 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/799 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/800 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/801 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/802 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/803 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/804 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/805 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/806 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/807 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/808 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/809 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/810 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/811 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/812 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/813 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/814 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/815 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/816 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/817 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/818 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/819 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/820 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/821 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/822 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/823 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/824 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/825 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/826 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/827 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/828 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/829 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/830 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/831 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/832 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/833 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/834 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/835 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/836 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/837 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/838 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/839 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/840 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/841 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/842 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/843 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/844 (23 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/845 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/846 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/847 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/848 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/849 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/850 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/851 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/852 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/853 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/854 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/855 (21 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/856 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 Version: DTLS 1.2 Cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/857 (22 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/858 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/859 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/860 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/861 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/862 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/863 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/864 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/865 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/866 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/867 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/868 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/869 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/870 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/871 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/872 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/873 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/874 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/875 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/876 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/877 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/878 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/879 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/880 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/880 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/881 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/881 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/882 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/882 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/883 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/883 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/884 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/884 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/885 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/885 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/886 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/886 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/887 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/887 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/888 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/888 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/889 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/889 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/890 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/890 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/891 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/891 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/892 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/892 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/893 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/893 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/894 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/894 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/895 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/895 (5 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/896 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/896 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/897 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/897 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/898 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/898 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/899 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/899 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/900 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/900 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/901 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/901 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/902 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/902 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/903 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/903 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/904 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/904 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/905 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/905 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/906 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/906 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/907 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/907 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/908 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/908 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/909 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/909 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/910 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/910 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/911 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/911 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/912 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/912 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/913 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/913 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/914 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/914 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/915 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/915 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/916 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/916 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/917 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/917 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/918 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/918 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/919 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/919 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/920 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/920 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/921 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/921 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/922 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/922 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/923 Version: DTLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/923 (4 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/924 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/924 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/925 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/925 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/926 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/926 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/927 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/927 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/928 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/928 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/929 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/929 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/930 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/930 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/931 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/931 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/932 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/932 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/933 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/933 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/934 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/934 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/935 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/935 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/936 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/936 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/937 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/937 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/938 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/938 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/939 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/939 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/940 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/940 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/941 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/941 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/942 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/942 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/943 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/943 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/944 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/944 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/945 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/945 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/946 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/946 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/947 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/947 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/948 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/948 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/949 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/949 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/950 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/950 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/951 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/951 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/952 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/952 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/953 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/953 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/954 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/954 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/955 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/955 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/956 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/956 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/957 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/957 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/958 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/958 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/959 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/959 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/960 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/960 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/961 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/961 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/962 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/962 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/963 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/963 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/964 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/964 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/965 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/965 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/966 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/966 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/967 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/967 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/968 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/968 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/969 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/969 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/970 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/970 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/971 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/971 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/972 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/972 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/973 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/973 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/974 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/974 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/975 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/975 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/976 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/976 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/977 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/977 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/978 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/978 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/979 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/979 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/980 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/980 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/981 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/981 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/982 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/982 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/983 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/983 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/984 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/984 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/985 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/985 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/986 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/986 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/987 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/987 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/988 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/988 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/989 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/989 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/990 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/990 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/991 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/991 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/992 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/992 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/993 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/993 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/994 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/994 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/995 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/995 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/996 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/996 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/997 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/997 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/998 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/998 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/999 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/999 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1000 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1000 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1001 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1001 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1002 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1002 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1003 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1003 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1004 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1004 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1005 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1005 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1006 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1006 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1007 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1007 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1008 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1008 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1009 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1009 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1010 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1010 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1011 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1011 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1012 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1012 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1013 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1013 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1014 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1014 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1015 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1015 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1016 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1016 (27 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1017 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1017 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1018 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1018 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1019 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1019 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1020 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1020 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1021 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1021 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1022 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1022 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1023 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1023 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1024 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1024 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1025 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1025 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1026 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1026 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1027 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1027 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1028 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1028 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1029 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1029 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1030 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1030 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1031 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1031 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1032 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1032 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1033 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1033 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1034 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1034 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1035 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1035 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1036 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1036 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1037 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1037 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1038 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1038 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1039 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1039 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1040 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1040 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1041 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1041 (30 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1042 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1042 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1043 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1043 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1044 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1044 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1045 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1045 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1046 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1046 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1047 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1047 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1048 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1048 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1049 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1049 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1050 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1050 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1051 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1051 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1052 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1052 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1053 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1053 (29 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1054 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1054 (28 ms) [ RUN ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1055 Version: DTLS 1.2 Cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 Reset server:dsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked [ OK ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.WriteLimit/1055 (28 ms) [----------] 4224 tests from CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest (63085 ms total) [----------] 1152 tests from CipherSuiteTLS13/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/0 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/1 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/2 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/3 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/4 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/5 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/6 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/7 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/8 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/9 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/10 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/11 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/12 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/13 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/14 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/15 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/16 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/17 (59 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/18 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/19 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/20 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/21 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/22 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/23 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/24 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/25 (36 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/26 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/27 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/28 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/29 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/30 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/31 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/32 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/33 (63 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/34 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/35 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/36 (55 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/37 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/38 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/39 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/40 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/41 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/42 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/43 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/44 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/45 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/46 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/47 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/48 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/49 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/50 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/51 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/52 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/53 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/54 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/55 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/56 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/57 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/58 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/59 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/60 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/61 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/62 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/63 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/64 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/65 (58 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/66 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/67 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/68 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/69 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/70 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/71 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/72 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/73 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/74 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/75 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/76 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/77 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/78 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/79 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/80 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/81 (64 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/82 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/83 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/84 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/85 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/86 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/87 (55 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/88 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/89 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/90 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/91 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/92 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/93 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/94 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/95 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/96 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/97 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/98 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/99 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/100 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/101 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/102 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/103 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/104 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/105 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/106 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/107 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/108 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/109 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/110 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/111 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/112 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/113 (58 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/114 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/115 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/116 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/117 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/118 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/119 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/120 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/121 (39 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/122 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/123 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/124 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/125 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/126 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/127 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/128 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/129 (63 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/130 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/131 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/132 (58 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/133 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/134 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/135 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/136 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/137 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/138 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/139 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/140 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/141 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/142 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/143 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/144 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/145 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/146 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/147 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/148 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/149 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/150 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/151 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/152 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/153 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/154 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/155 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/156 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/157 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/158 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/159 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/160 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/161 (59 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/162 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/163 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/164 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/165 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/166 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/167 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/168 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/169 (39 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/170 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/171 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/172 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/173 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/174 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/175 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/176 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/177 (63 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/178 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/179 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/180 (55 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/181 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/182 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/183 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/184 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/185 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/186 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/187 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/188 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/189 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/190 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/191 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/192 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/193 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/194 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/195 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/196 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/197 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/198 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/199 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/200 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/201 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/202 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/203 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/204 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/205 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/206 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/207 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/208 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/209 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/210 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/211 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/212 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/213 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/214 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/215 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/216 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/217 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/218 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/219 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/220 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/221 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/222 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/223 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/224 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/225 (64 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/226 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/227 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/228 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/229 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/230 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/231 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/232 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/233 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/234 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/235 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/236 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/237 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/238 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/239 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/240 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/240 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/241 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/241 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/242 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/242 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/243 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/243 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/244 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/244 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/245 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/245 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/246 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/246 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/247 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/247 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/248 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/248 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/249 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/249 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/250 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/250 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/251 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/251 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/252 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/252 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/253 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/253 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/254 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/254 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/255 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/255 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/256 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/256 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/257 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/257 (60 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/258 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/258 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/259 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/259 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/260 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/260 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/261 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/261 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/262 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/262 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/263 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/263 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/264 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/264 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/265 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/265 (39 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/266 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/266 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/267 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/267 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/268 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/268 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/269 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/269 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/270 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/270 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/271 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/271 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/272 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/272 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/273 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/273 (66 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/274 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/274 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/275 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/275 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/276 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/276 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/277 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/277 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/278 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/278 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/279 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/279 (54 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/280 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/280 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/281 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/281 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/282 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/282 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/283 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/283 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/284 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/284 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/285 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/285 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/286 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/286 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/287 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.SingleCipherSuite/287 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/0 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/1 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/2 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/3 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/4 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/5 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/6 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/7 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/8 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/9 (62 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/10 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/11 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/12 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/13 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/14 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/15 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/16 (86 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/17 (118 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/18 (80 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/19 (80 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/20 (88 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/21 (79 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/22 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/23 (90 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/24 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/25 (94 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/26 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/27 (45 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/28 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/29 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/30 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/31 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/32 (100 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/33 (129 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/34 (93 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/35 (92 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/36 (104 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/37 (95 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/38 (95 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/39 (106 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/40 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/41 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/42 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/43 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/44 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/45 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/46 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/47 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/48 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/49 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/50 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/51 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/52 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/53 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/54 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/55 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/56 (26 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/57 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/58 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/59 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/60 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/61 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/62 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/63 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/64 (85 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/65 (116 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/66 (80 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/67 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/68 (94 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/69 (81 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/70 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/71 (88 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/72 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/73 (77 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/74 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/75 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/76 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/77 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/78 (45 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/79 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/80 (98 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/81 (130 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/82 (98 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/83 (95 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/84 (102 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/85 (93 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/86 (95 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/87 (102 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/88 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/89 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/90 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/91 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/92 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/93 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/94 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/95 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/96 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/97 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/98 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/99 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/100 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/101 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/102 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/103 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/104 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/105 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/106 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/107 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/108 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/109 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/110 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/111 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/112 (87 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/113 (115 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/114 (81 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/115 (81 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/116 (88 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/117 (80 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/118 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/119 (90 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/120 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/121 (77 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/122 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/123 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/124 (53 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/125 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/126 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/127 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/128 (98 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/129 (130 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/130 (98 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/131 (98 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/132 (105 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/133 (98 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/134 (97 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/135 (107 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/136 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/137 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/138 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/139 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/140 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/141 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/142 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/143 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/144 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/145 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/146 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/147 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/148 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/149 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/150 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/151 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/152 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/153 (58 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/154 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/155 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/156 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/157 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/158 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/159 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/160 (84 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/161 (115 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/162 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/163 (80 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/164 (90 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/165 (81 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/166 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/167 (92 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/168 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/169 (75 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/170 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/171 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/172 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/173 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/174 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/175 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/176 (99 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/177 (131 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/178 (96 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/179 (94 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/180 (105 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/181 (98 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/182 (94 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/183 (105 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/184 (16 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/185 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/186 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/187 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/188 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/189 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/190 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/191 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/192 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/193 (45 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/194 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/195 (10 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/196 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/197 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/198 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/199 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/200 (27 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/201 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/202 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/203 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/204 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/205 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/206 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/207 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/208 (84 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/209 (114 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/210 (79 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/211 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/212 (89 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/213 (79 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/214 (81 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/215 (89 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/216 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/217 (74 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/218 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/219 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/220 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/221 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/222 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/223 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/224 (97 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/225 (127 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/226 (99 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/227 (95 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/228 (104 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/229 (91 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/230 (93 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/231 (100 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/232 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/233 (45 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/234 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/235 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/236 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/237 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/238 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/239 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/240 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/240 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/241 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/241 (45 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/242 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/242 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/243 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/243 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/244 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/244 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/245 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/245 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/246 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/246 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/247 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/247 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/248 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/248 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/249 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/249 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/250 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/250 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/251 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/251 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/252 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/252 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/253 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/253 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/254 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/254 (25 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/255 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/255 (32 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/256 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/256 (84 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/257 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/257 (117 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/258 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/258 (84 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/259 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/259 (80 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/260 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/260 (89 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/261 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/261 (82 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/262 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/262 (80 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/263 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/263 (92 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/264 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/264 (46 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/265 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/265 (77 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/266 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/266 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/267 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/267 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/268 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/268 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/269 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/269 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/270 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/270 (43 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/271 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/271 (52 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/272 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/272 (101 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/273 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/273 (132 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/274 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/274 (95 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/275 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/275 (96 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/276 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/276 (103 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/277 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/277 (94 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/278 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/278 (96 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/279 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/279 (102 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/280 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/280 (17 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/281 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/281 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/282 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/282 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/283 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/283 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/284 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/284 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/285 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/285 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/286 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/286 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/287 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ResumeCipherSuite/287 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/0 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/1 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/2 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/3 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/4 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/5 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/6 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/7 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/8 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/9 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/10 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/11 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/12 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/13 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/14 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/15 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/16 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/17 (58 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/18 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/19 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/20 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/21 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/22 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/23 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/24 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/25 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/26 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/27 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/28 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/29 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/30 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/31 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/32 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/33 (64 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/34 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/35 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/36 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/37 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/38 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/39 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/40 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/41 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/42 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/43 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/44 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/45 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/46 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/47 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/48 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/49 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/50 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/51 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/52 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/53 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/54 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/55 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/56 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/57 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/58 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/59 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/60 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/61 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/62 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/63 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/64 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/65 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/66 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/67 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/68 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/69 (39 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/70 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/71 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/72 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/73 (39 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/74 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/75 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/76 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/77 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/78 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/79 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/80 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/81 (64 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/82 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/83 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/84 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/85 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/86 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/87 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/88 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/89 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/90 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/91 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/92 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/93 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/94 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/95 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/96 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/97 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/98 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/99 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/100 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/101 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/102 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/103 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/104 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/105 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/106 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/107 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/108 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/109 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/110 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/111 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/112 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/113 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/114 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/115 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/116 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/117 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/118 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/119 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/120 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/121 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/122 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/123 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/124 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/125 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/126 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/127 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/128 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/129 (66 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/130 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/131 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/132 (55 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/133 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/134 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/135 (55 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/136 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/137 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/138 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/139 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/140 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/141 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/142 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/143 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2e30003068d47f50600adb6180067af4aca36204b1f967a8b9410536083595... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/144 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8c4d00306632b8f127ad4e2ab3d5260e172ffba8bd077b2a9070e0eb535003... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/145 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd1480030c0b79bd85b8a9a630a86e325a35bdecf23442b90871c42a5e0d0ac... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/146 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd1c30030d55a5fcc34699bf26ff9bdb57a758a27ccc7dc0ec6455d266b0e84... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/147 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fdc000030d87f979841fc50c2e568247c017167ea3f08a5ba89ff1e2388d241... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/148 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7c520030a52d7675aafadcddb64954d7144ccb98a5f4fe89dd53d0716ce390... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/149 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4fe7003088dd76b170e93b0d13f173f10d51f6dae6eece6644eccab5e8b5f4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/150 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f793b0030155f1aadd55daade83190f7d3fe8ee6f32616f33a86929571844cd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/151 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2e080030d26f7d179ed1c31dbf777281c245eda67e97fa69fae3180177d129... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/152 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd81000301065bcdd871e383a6377f0e2ceee9373037d8d8b3c930a961557fd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/153 (28 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fed100030ae524cdc8398200a4f24df6aa3390156a19f52426ec7ba2d0a59d6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/154 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc62d00301a2c36eb802558ea609556356f3c221bbcb76ac88e648022e2ca0e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/155 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffe5800306f12bd8e32958e36eb20d38bcabbe652c641dfbd58d41a2173af0c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/156 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd6260030a810139f1d12171915c0f959b7f6df99f820845ba021d88943e6e9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/157 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f187a0030c80b9f0e2ca7534639105c70d7bd24e43989cb6aeed0b40a71fb7f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/158 (11 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f86450030676feb00a1397fd63d9ff56a2cf2af0f873d89f1804b517b7be48c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/159 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe0ae003082908100a301347d31849c7cc27b74f39c4a0293be48c941b1efa5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/160 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3e410030c61b889b73853255d1401781c7c1bfa22b2f6754c5a1fc19ca1703... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/161 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f18910030b6a28aaceddd5330c9cebd1788a864e0b82e5ed88573a9a2416b32... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/162 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f802e003015ccddb65e430c7179f96eed6c38e6f87c32f620c3280b513d1335... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/163 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fff510030040bb0c06cd0057e71c68ef23e613788d9c0666b3f10803d7dcf6c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/164 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f83ba00306e399219ce6a41fe4c2af0b423ab49ab509956ce35c1a9c03ca6b8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/165 (44 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff24b003052beb90251ee4843d6036524599a9f3d50baa8c373981ca3622d15... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/166 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0ca50030fae5894c949fe0902ca124655e0e5b6b743ad6ff84952d34b700d3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/167 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7cd900307b1f6457464928cc867112978024626466ac61e03d5b2bc72f8265... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/168 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe4b6003052cb9b00de3c00939f2d0b268509c5ecb9a79d32158bd669bd03bc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/169 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8c08003092dce3544c2f803737feb5a36322dada3158f401c3a3bb310f7c9b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/170 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f79e10030495b8e5c438adff25401009ea2e6f164b7c29cf7091a62a73a1ea8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/171 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f41ed00306ab06ac43e1268e89e430e11a7036cea8512c2e0b264067da4a206... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/172 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f251c00305bc57eba97ad0c5fa64cadaaf30847981874e35552c54951e7209d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/173 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f823a00305d9450a9e2cce74007b49d2fdd0a76f020bd67f10a1ee7a4fb6d1d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/174 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff53b003091517494edd44e352896550450a233bc71e2de6161c34d0ba00bcf... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/175 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f618d003023c83058fc7e6968f31dbc695d1adbd2095c796f685e6765951ca6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/176 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9d21003032fc4b51c904f8a0cdcd8c3edfa1febc0920ab280dfe33e763c874... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/177 (65 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f165300308dd27352e3ce01127e47c8648067338b841ed3477a195df19f43a1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/178 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f86000030ecc68078ae59ffd33bee4ec4f3022ef1c807cdbf2eeb1b42f01cc6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/179 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f496d0030321b4eac464e847d48d03461b0da03ba932ffe11d58e501d431df4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/180 (56 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f706600309c4c286462324e2acc6da50a5d192d3ab3483834ad7bf21327f1b2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/181 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7f7f00301f6b9c130623268f25923236cd5b80193137d41790edfbbecf410e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/182 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc21a0030d9645895f822235363eeb805f1ddff1b9deabc091bbe51b551d790... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/183 (54 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f738600306dcf7d8335c833a500b1f92205c8a4a2dcce94ab1989dd91f25c69... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/184 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f80f500306e98189093dac242f20f86490535cd10df619e192a714a8e33b372... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/185 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f57230030a13066582b349e202ae5b06cb76055ac40f938cdfef7835782cf9f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/186 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fca25003065b4c0d7f25af8b6bf60ffb753c58f601ea85ddad2b0a8be76bf2c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/187 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3cf10030e4a2a7b1b747fd19ba95639abf215450fd858b0780c51a00f9a8db... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/188 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fee920030cf2d06a9e0688c781d4e770ae6e8af345fac12ad57f39c7e0f107a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/189 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f27570030e2c2f10fd0ce32121789daf214a0b36ecd102c89b1a51fdb84066a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/190 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb99f0030d2e312adade9620ef104dcd83f29118cb78d859424abd4ef2ab6c8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/191 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9d310030657bb0406d0c964b43d7b25caae11d8d83252a24c9dda6a0cf93a4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/192 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5e300030295cd365643bcc6f99e2c6b3d3fd549b4aac9a0f30124939c4c733... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/193 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f35fe003081aa76c0c00b680b3fdb71520127216cac3f5cdbefff1858b1cfb9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/194 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6af30030f6fb9ddadbd0fd7fb2ccf3648a982984f8a0201d20667709604757... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/195 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f144900308318f3309f93e2959cab916ced08de0810f7bd52e16f8f3b5455f0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/196 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f04db003091ca7cbabf33110d2b96778a411fe283d4751b5b1894805a292454... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/197 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6f86003051d3943947d39096d77e3b2351f6cb8c8f84ff5d3a882bae0f7d71... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/198 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff1a30030e161ad6e8876ee217e4ed3e2edc5f1894cc1e08f48a1124790c5d6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/199 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f220f00309e02693ec21d3d5d496c5f7207985ecf3cb4c30fe70f42b9bea243... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/200 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f671b0030b55a2643cab05ddc852d82ee70227a88cd011d49e0dcdb53bfa831... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/201 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff63600305e1469187b44b0ddcece866f69620c23c47ca874a53dd8bd349fbc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/202 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f4fca00303e14ac0800a85ea0c2c02bf2aacce048642760c10c0b65dc2a324c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/203 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f43330030ece65e91079d9c5c464b4399a76fb7862292410730e5ec9cdb9117... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/204 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd7210030eb675e2504078b496a3b2faf61233a5dba7458304b6b46882d8772... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/205 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe73100308b8e40222601a9bc4bb29cc77f028c5af3a3224b51c8e7063169d9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/206 (12 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0bde00301f18a8de9e176ddb967324a97109bc17da07d8c13483ef98c0fdea... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/207 (19 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f288a0030071eaaab904d0ce3faf2af18e778a5aec2afafdf0370e3d22f216d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/208 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f130400300fa40e918ec6c8ccc84a6d49b9282362ae64a091019cef891aa23a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/209 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5c1b0030beb6a185503b63111e06cd2a38e187c5b39b0cf036ef73c460d07a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/210 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f62e000304e264c6e423bcbea47cd504661386573f287d3c32236d5248e50c7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/211 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd0690030b0dd517fc53f953e881fbdd5411b172429987fe5ff6cc3dd24f160... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/212 (51 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5b89003062b1df3d4af360aa46e4a6a9ab3f146320663214b1bf86ff2dfbd8... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/213 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f415300305b53cd1d938000491576f4b4c8dd18d65cffeef27d5939549eb9b2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/214 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f043d003018aa85e67cf714e77ca93f7cd87d5b641dd3a6097c88f210d2b06a... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/215 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fea5600300d22e21c8b7c5557feb5297d21bafcb756ffd35528187ee546cc5d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/216 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe77600307d24ab638fb5a3098826e11db5524972aa5c83e50b379cc457d48d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/217 (37 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3b910030c39ad018bba5dc548f2dcfab3a8f8c577d095d39372a145e5c1b27... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/218 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f71e10030332089ba09bd0119e2d06dd2949a78da17ba7e8445fddcac981e2c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/219 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd7ca0030473bcfbee3234f7770617f4e0bb3599bfee27684606b39a9d26776... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/220 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f07100030a6ec5fd93d20a88f5eed410e38ff77eb528037e63983f80616b911... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/221 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fbdf900302a9b7ce7228349ed8bf9fc5174f97289fa9899c44483c0d3b02431... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/222 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f5c2600309b78d26ec7851b2a10ad2f5b275f7f452b895462692777eb4ce85e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/223 (31 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0f77003093669e4ea7e16c4f4e1c2335e50c28cfde43a728a750df29b1e6e6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/224 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7d9c0030008aea8b20fd3cee27d05565da20deda366658e4791d533451ed8c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/225 (63 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f16a30030f9035b174175429100c5801881ac068eab02a42f6118576a13293c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/226 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe04a0030f30c8013dc3565f4febbc8f46de47eca1efaaa3d70acde174abd6f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/227 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9af600302cf3c072b1c059bbcea176ae90277bc8b76360ad829483b2130261... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/228 (55 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0f22003032bab1cde8f6c479d7749c2db10f3e93741ab8ff40e7344962fc15... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/229 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe99f0030254ebae672c70e79c609e88621251d12b0f7b83252c8337a894dbe... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/230 (47 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fbbce0030fb67b8498e483b0727a9e986c4edbe6d23316016545876667998fe... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/231 (55 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8c4400307b4f16e30146e935e6c1f9716bcfed847c08664bcd9160775b1981... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/232 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f100e0030d33ecc1615fca3d6b7caa1799d818d7cf97d7b9187da449ae3b31f... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/233 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa6b00030e55dfc1d0b4b5c9b3809d6b73fe2edce140a6de167a95b280d34d6... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/234 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f33db0030aee43836ec65d36263c6ed0d86c3da06b8000b4f3b71513d7bd4b4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/235 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f656b003029757532c7571bda1ef084ddff8d1aa90d55199c04ef26151e88ba... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/236 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f245000300a0320e4d00f4d8b8c2df723a4f8ac82fc29321a3b35d5f8927a5d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/237 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f8a4f0030816bb6b5815a31f8f4ee471cf1cce2564c0fec53496233ab567d49... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/238 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f77940030f5ac06f0da68fe0d49bae842787e80b2adb1667647fea651c9a785... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/239 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/240 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f79580030e704975d39df12fe7823f40f00e47094171c61b07eeded8efa9c24... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/240 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/241 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f13060030839d94f863c9832d85d13c8999bff9bc63cd8b4e3144fd9b7445ef... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/241 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/242 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fcd0400309158fd796ae36065cf1260480025211c68bbca4e8a2ff5b33463ee... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/242 (6 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/243 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f90870030aed1a6d8019893751f02fe5e9c089d19fb4bcc5c6463a0b2a4a9ac... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/243 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/244 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb7d00030afae42801d98d0085a05fe1e3d8f441aabdf770bf4d34031f3de77... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/244 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/245 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f49c00030dd0a43fef7b022f0773c21413a1ceb1253fce1c9f4cc957c93a856... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/245 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/246 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1f930030db39897236bb2b93cc758215d781793e714db07316ef172c3beaca... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/246 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/247 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd6130030d3081ca9a4acc3069c940a10a7c76283e001e0c610eb1ffe65ffa4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/247 (18 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/248 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f16350030a94f343ea297469f08dde52d3006c9822f9da0f1ab4243b3fb62d3... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/248 (14 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/249 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7c910030c2d338e089e76187d83df67cdef2c855bac6a2627c8086484bc7e4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/249 (29 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/250 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fff8e0030ab372720de0e156d1b1aaebc16d8ceff8400ad58d0f95fdea4801d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/250 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/251 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd54b00301a8c46f2a0a1e346c384d16e9c577d76e0ac97287e8084c0e473dd... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/251 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/252 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fe2be003040c8c2ed0888842595d832a0426d16bc74942362117f75d07ce0f2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/252 (20 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/253 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f1a260030785122298675517e53be04f55f943541a48600ec5810d51be59c9c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/253 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/254 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f88330030a1d763991b2a4f5e249a2bf756dee9c419d552c4d99507b153c991... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/254 (13 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/255 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc00700302990e65ff212bb8f96ebba1d8da54468a1a78168d5e9125e2f717c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/255 (21 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/256 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f25810030b510ec2b7af2c167d974dc391c4904a69dd6151b868ed85cfd27cc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/256 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/257 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc98800307ac52b46f48c5a3502240713082b7c1a9bb11f4e5565bd5a70e5ef... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/257 (58 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/258 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f998d0030f74d42ece8b4a0a0e959625edf9655c163559436b75350c7f44b70... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/258 (41 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/259 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9e9b0030268cb1fc03a92d8c6c04c826de620a53c343c0f1c30b9c640afe7c... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/259 (40 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/260 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fb6ee0030d5f7bc6ee9b00b135270ab5afcd4cc2c92e38689e8a57ea255af5d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/260 (49 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/261 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f14960030788971b4be4eb096de842dff54815f6841ac90057f53a7acf7fa9b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/261 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/262 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0cf50030f2328ce76b4bbcaf4105f4e56001087d33b7de1b16a84e3f7367e9... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/262 (42 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/263 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7aec00301a620738a98dcc313844671949de7e59f4d5ec8bcc3079239fb947... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/263 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/264 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f0e8d0030b82700d71319e73bcbab3cfa43ccea792d703ed7517e32b2758a49... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/264 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/265 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc0d70030f3f788f020488800e80bab51e93a301a691233ce3d96f8e63dd035... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/265 (38 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/266 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffec3003094d866abb9037a734974afd4e0efc8643f54237a4cb71d32b6d5c2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/266 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/267 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffad200307e4258406a46abfec398acaaf80683637f1c1adcf3805b2a21d12d... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/267 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/268 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ff9f600300f4caecaff95a8c4d495c8671e09d66612b7e1755d4b0e9b9d6ca1... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/268 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/269 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa9490030e21bc4da541894991bc91add447f573eb3e67e4190f52859c1d853... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/269 (22 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/270 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f60a600309a5a735f8031547a884fdf29865aa48415498067abebf18e50eebb... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/270 (23 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/271 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f745b003062777cdb15d6ab5691df45b9f9a35612b5fb58c52fe7b9c8ad48f4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/271 (30 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/272 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f143e0030817d821d9a2e5b5c68639163bb01439809484bcc428a9c5df1a302... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/272 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/273 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fba6d0030e46749b5bbebdbab3eecc98847e563ba746e07a4b31e75c7d06555... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/273 (64 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/274 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f960a0030f2a0964cd7c61976719faae0148b84e4ae628470ad61c8697dc8ad... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/274 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/275 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f9b800030b04f59975e35ad2ba4164161c942637581c6b0962febea67242c0e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/275 (50 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/276 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fc63e00300ceb2cf1350a658d1646afbb4b9cc76a7180fe4b0046bed882d197... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/276 (58 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/277 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f20e90030dacb10c4939afade18b6941827ec856b7ea5ed27db2f6e6f346d1b... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/277 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/278 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fec6800300e133121ec20d4b241ed47484027ee6c92c285b7a660aa14ee7245... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/278 (48 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/279 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6c99003040b1f736cf215a5d8fd1910290a22fbe7448d58a1605dd9d01b013... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/279 (57 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/280 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp256r1_sha256 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f71c40030a684d3f2c268a8ecbbb740dd796171601cb6573facbb3195076e2e... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/280 (9 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/281 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f6e1f003024e386571e3165fb1a6775327425fdfabc85d58a3d13d7e5b107f4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/281 (24 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/282 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2faa1300309580a56443f8832ef21167f77819e8b01a561d45e9bd8a476ad974... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/282 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/283 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha384 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fff1f00306a30df6dd25514a8858b056f40eb65bb716cd8c43f4b995bf5e1e7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/283 (8 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/284 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_rsae_sha512 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fca5e0030a64873b1d126d5a3c5d4c8213972cbba361df4f7c1b2baface9eab... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/284 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/285 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha256 Reset server:rsa_pss, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7b850030ca71fc4b1463d7b29de06768211bddf508f6d6f86f16b18f630fa0... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/285 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/286 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha384 Reset server:rsa_pss384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fd9090030816a6bd18a505d8c6de7b831674c9b2b4be3473922f7301130b129... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/286 (7 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/287 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: rsa_pss_pss_sha512 Reset server:rsa_pss512, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f85e70030af7f0c265c829c1c2b37831cd480928f9621599d78780b187b7a79... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13/TlsCipherSuiteTest.ReadLimit/287 (15 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 Version: TLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 Version: TLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 Version: DTLS 1.3 Cipher suite: TLS_AES_128_GCM_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 Version: DTLS 1.3 Cipher suite: TLS_CHACHA20_POLY1305_SHA256 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/240 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/240 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/241 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/241 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/242 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/242 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/243 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/243 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/244 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/244 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/245 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/245 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/246 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/246 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/247 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/247 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/248 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/248 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/249 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/249 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/250 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/250 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/251 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/251 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/252 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/252 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/253 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/253 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/254 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/254 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/255 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/255 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/256 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/256 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/257 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/257 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/258 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/258 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/259 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/259 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/260 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/260 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/261 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/261 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/262 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/262 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/263 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/263 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/264 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/264 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/265 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/265 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/266 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/266 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/267 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/267 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/268 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/268 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/269 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/269 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/270 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/270 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/271 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/271 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/272 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/272 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/273 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/273 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/274 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/274 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/275 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/275 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/276 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/276 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/277 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/277 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/278 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/278 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/279 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/279 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/280 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/280 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/281 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/281 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/282 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/282 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/283 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/283 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/284 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/284 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/285 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/285 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/286 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/286 (0 ms) [ RUN ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/287 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/287 (0 ms) [----------] 1152 tests from CipherSuiteTLS13/TlsCipherSuiteTest (30966 ms total) [----------] 80 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/0 (23 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/1 (27 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/2 (58 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/3 (127 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/4 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/5 (63 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/6 (96 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/7 (190 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/8 (474 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/9 (23 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/10 (23 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/11 (28 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/12 (57 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/13 (127 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/14 (38 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/15 (64 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/16 (96 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/17 (185 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/18 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/18 (471 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/19 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.SingleCipherSuite/19 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/0 (46 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/1 (56 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/2 (113 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/3 (256 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/4 (76 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/5 (129 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/6 (199 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/7 (381 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/8 (952 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/9 (47 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/10 (46 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/11 (56 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/12 (116 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/13 (251 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/14 (79 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/15 (132 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/16 (194 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/17 (381 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/18 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/18 (942 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/19 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ResumeCipherSuite/19 (47 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/0 (22 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/1 (28 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/2 (56 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/3 (129 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/4 (40 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/5 (64 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/6 (100 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/7 (193 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/8 (469 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [37] 1703040020060000000000000000000000000000000000000000000000000000... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/9 (24 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fafda003089e043fa009a3ca1129213e56ea6006781b012a500a45e11c770d2... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/10 (23 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2b970030ff795ac11c71b5eeb1a8fe2b81fec4c330e78fa42804cdfe857681... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/11 (30 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f2ff300305cd7654334c130d250286b4a25274a6c2a5116b989a10d4083a5dc... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/12 (57 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2ffb4600301e299967c48a8549dce0adb025125323b859715469799daa792473... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/13 (128 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f7ffa0030c826d2995306c4bb591389642ea491351d87257b1c754c73884d95... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/14 (39 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f3794003067858a5e968128514a9d75e032c83e0d1a9d19d6888189e4addd52... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/15 (64 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f74680030663bfd00d4e1c7b6b1c767931474a0866aacd96a4aa046ba14d1a7... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/16 (96 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f398800304f1a8796bd2ba5141c6a5b509972e0552eb53710b3e0320fbc5067... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/17 (191 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/18 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2f792d003083c1a8557be99539df1e62af1da1765ddfa03a113f7a1c123c80f5... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/18 (471 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/19 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 Signature scheme: ecdsa_secp384r1_sha384 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: capture write secret for epoch 2 client: capture read secret for epoch 2 client: capture write secret for epoch 3 client: capture read secret for epoch 3 client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Send Direct [53] 2fa55a00309e06a72d0c2e7c781a0e6aa01660d22432481fd7c0ec0cf850c8e4... server: Read error SSL_ERROR_TOO_MANY_RECORDS: SSL sent or received too many records with the same symmetric key. server: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.ReadLimit/19 (23 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 (1 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 Version: TLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/18 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/18 (0 ms) [ RUN ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/19 Version: DTLS 1.3 Cipher suite: TLS_AES_256_GCM_SHA384 ssl_ciphersuite_unittest.cc:333: Skipped [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/19 (0 ms) [----------] 80 tests from CipherSuiteTLS13AllGroups/TlsCipherSuiteTest (9023 ms total) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_NULL_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_NULL_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/0 (6 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_RC4_128_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_RC4_128_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/1 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 Version: TLS 1.0 Cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/2 (5 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 Version: TLS 1.0 Cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_RSA_WITH_AES_128_CBC_SHA client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/3 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_CBC_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/4 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_128_GCM_SHA256 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/5 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 Version: TLS 1.2 Cipher suite: TLS_RSA_WITH_AES_256_GCM_SHA384 Reset server:rsa_decrypt, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_RSA_WITH_AES_256_GCM_SHA384 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/6 (4 ms) [ RUN ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 Version: TLS 1.2 Cipher suite: TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] TestSecurityStatus/SecurityStatusTest.CheckSecurityStatus/7 (6 ms) [----------] 8 tests from TestSecurityStatus/SecurityStatusTest (41 ms total) [----------] 80 tests from ClientAuthGenericStream/TlsConnectClientAuth [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13AsyncImmediate (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13AsyncDelay (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13Sync (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS13None (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12AsyncImmediate Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12AsyncImmediate (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12AsyncDelay Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12AsyncDelay (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12Sync Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12Sync (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12None Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS12None (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11AsyncImmediate Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11AsyncImmediate (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11AsyncDelay Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11AsyncDelay (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11Sync Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11Sync (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11None Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS11None (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10AsyncImmediate Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10AsyncImmediate (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10AsyncDelay Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10AsyncDelay (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10Sync Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10Sync (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10None Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuth/TLS10None (8 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13AsyncImmediate (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13AsyncDelay (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13Sync (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS13None (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12AsyncImmediate Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12AsyncImmediate (7 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12AsyncDelay Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12AsyncDelay (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12Sync Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12Sync (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12None Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS12None (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11AsyncImmediate Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11AsyncImmediate (5 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11AsyncDelay Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11AsyncDelay (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11Sync Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11Sync (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11None Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS11None (5 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10AsyncImmediate Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10AsyncImmediate (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10AsyncDelay Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10AsyncDelay (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10Sync Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10Sync (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10None Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthRequestedRejected/TLS10None (6 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13AsyncImmediate Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13AsyncImmediate (10 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13AsyncDelay Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13AsyncDelay (9 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13Sync Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13Sync (10 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13None Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS13None (10 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12AsyncImmediate Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12AsyncImmediate (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12AsyncDelay Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12AsyncDelay (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12Sync Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12Sync (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12None Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS12None (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11AsyncImmediate Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11AsyncImmediate (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11AsyncDelay Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11AsyncDelay (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11Sync Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11Sync (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11None Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS11None (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10AsyncImmediate Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10AsyncImmediate (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10AsyncDelay Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10AsyncDelay (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10Sync Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10Sync (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10None Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthEcdsa/TLS10None (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13AsyncImmediate Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13AsyncImmediate (12 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13AsyncDelay Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13AsyncDelay (11 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13Sync Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13Sync (11 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13None Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS13None (11 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12AsyncImmediate Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12AsyncImmediate (15 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12AsyncDelay Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12AsyncDelay (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12Sync Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12Sync (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12None Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS12None (13 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11AsyncImmediate Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11AsyncImmediate (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11AsyncDelay Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11AsyncDelay (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11Sync Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11Sync (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11None Version: TLS 1.1 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS11None (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10AsyncImmediate Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10AsyncImmediate (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10AsyncDelay Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10AsyncDelay (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10Sync Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10Sync (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10None Version: TLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthWithEch/TLS10None (14 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13AsyncImmediate Version: TLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13AsyncImmediate (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13AsyncDelay Version: TLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13AsyncDelay (15 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13Sync Version: TLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13Sync (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13None Version: TLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS13None (15 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12AsyncImmediate Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12AsyncImmediate (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12AsyncDelay Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12AsyncDelay (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12Sync Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12Sync (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12None Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS12None (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11AsyncImmediate Version: TLS 1.1 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11AsyncImmediate (15 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11AsyncDelay Version: TLS 1.1 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11AsyncDelay (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11Sync Version: TLS 1.1 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11Sync (15 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11None Version: TLS 1.1 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS11None (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10AsyncImmediate Version: TLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10AsyncImmediate (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10AsyncDelay Version: TLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10AsyncDelay (16 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10Sync Version: TLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10Sync (15 ms) [ RUN ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10None Version: TLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 769 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericStream/TlsConnectClientAuth.ClientAuthBigRsa/TLS10None (15 ms) [----------] 80 tests from ClientAuthGenericStream/TlsConnectClientAuth (927 ms total) [----------] 60 tests from ClientAuthGenericDatagram/TlsConnectClientAuth [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13AsyncImmediate Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13AsyncImmediate (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13AsyncDelay Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13AsyncDelay (9 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13Sync Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13Sync (9 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13None Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS13None (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12AsyncImmediate Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12AsyncImmediate (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12AsyncDelay Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12AsyncDelay (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12Sync Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12Sync (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12None Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS12None (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11AsyncImmediate Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11AsyncImmediate (9 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11AsyncDelay Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11AsyncDelay (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11Sync Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11Sync (9 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11None Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuth/DTLS11None (8 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13AsyncImmediate Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13AsyncImmediate (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13AsyncDelay Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13AsyncDelay (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13Sync Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13Sync (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13None Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS13None (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12AsyncImmediate Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12AsyncImmediate (5 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12AsyncDelay Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12AsyncDelay (5 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12Sync Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12Sync (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12None Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS12None (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11AsyncImmediate Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11AsyncImmediate (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11AsyncDelay Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11AsyncDelay (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11Sync Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11Sync (6 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11None Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthRequestedRejected/DTLS11None (7 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13AsyncImmediate Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13AsyncImmediate (10 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13AsyncDelay Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13AsyncDelay (9 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13Sync Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13Sync (9 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13None Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS13None (10 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12AsyncImmediate Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12AsyncImmediate (13 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12AsyncDelay Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12AsyncDelay (13 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12Sync Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12Sync (13 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12None Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS12None (12 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11AsyncImmediate Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11AsyncImmediate (13 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11AsyncDelay Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11AsyncDelay (13 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11Sync Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11Sync (13 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11None Version: DTLS 1.0 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthEcdsa/DTLS11None (12 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13AsyncImmediate Version: DTLS 1.3 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13AsyncImmediate (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13AsyncDelay Version: DTLS 1.3 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13AsyncDelay (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13Sync Version: DTLS 1.3 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13Sync (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13None Version: DTLS 1.3 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13None (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12AsyncImmediate Version: DTLS 1.2 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12AsyncImmediate (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12AsyncDelay Version: DTLS 1.2 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12AsyncDelay (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12Sync Version: DTLS 1.2 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12Sync (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12None Version: DTLS 1.2 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12None (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11AsyncImmediate Version: DTLS 1.0 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11AsyncImmediate (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11AsyncDelay Version: DTLS 1.0 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11AsyncDelay (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11Sync Version: DTLS 1.0 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11Sync (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11None Version: DTLS 1.0 ssl_auth_unittest.cc:925: Skipped [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11None (0 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13AsyncImmediate Version: DTLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13AsyncImmediate (15 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13AsyncDelay Version: DTLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13AsyncDelay (15 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13Sync Version: DTLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13Sync (16 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13None Version: DTLS 1.3 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS13None (16 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12AsyncImmediate Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12AsyncImmediate (16 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12AsyncDelay Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12AsyncDelay (16 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12Sync Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12Sync (15 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12None Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS12None (16 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11AsyncImmediate Version: DTLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11AsyncImmediate (15 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11AsyncDelay Version: DTLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11AsyncDelay (15 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11Sync Version: DTLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11Sync (15 ms) [ RUN ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11None Version: DTLS 1.0 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 770 cipher suite TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA client: Warning alert sent: 0 [ OK ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthBigRsa/DTLS11None (16 ms) [----------] 60 tests from ClientAuthGenericDatagram/TlsConnectClientAuth (527 ms total) [----------] 32 tests from ClientAuth13/TlsConnectClientAuth13 [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13AsyncDelay (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13Sync (5 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/TLS13None (5 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13AsyncImmediate Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13AsyncDelay Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13AsyncDelay (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13Sync Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13Sync (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13None Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthRequiredRejected/DTLS13None (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13AsyncImmediate Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13AsyncImmediate (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13AsyncDelay Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13AsyncDelay (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13Sync Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13Sync (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13None Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/TLS13None (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13AsyncImmediate Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13AsyncImmediate (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13AsyncDelay Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13AsyncDelay (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13Sync Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13Sync (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13None Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureScheme/DTLS13None (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13AsyncImmediate Version: TLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13AsyncImmediate (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13AsyncDelay Version: TLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13AsyncDelay (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13Sync Version: TLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13Sync (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13None Version: TLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/TLS13None (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13AsyncImmediate Version: DTLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13AsyncImmediate (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13AsyncDelay Version: DTLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13AsyncDelay (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13Sync Version: DTLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13Sync (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13None Version: DTLS 1.3 Reset server:rsa, client:rsa client: Changing state from INIT to CONNECTING client: Handshake failed with error SSL_ERROR_NO_SUPPORTED_SIGNATURE_ALGORITHM: No supported TLS signature algorithm was configured. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1SignatureSchemeOnly/DTLS13None (0 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13AsyncImmediate Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13AsyncImmediate (2 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13AsyncDelay Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13AsyncDelay (2 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13Sync Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13Sync (2 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13None Version: TLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/TLS13None (3 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13AsyncImmediate Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13AsyncImmediate (2 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13AsyncDelay Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13AsyncDelay (2 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13Sync Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13Sync (2 ms) [ RUN ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13None Version: DTLS 1.3 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 40 server: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 40 client: Handshake failed with error SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth13/TlsConnectClientAuth13.ClientAuthPkcs1AndEcdsaScheme/DTLS13None (2 ms) [----------] 32 tests from ClientAuth13/TlsConnectClientAuth13 (146 ms total) [----------] 52 tests from ClientAuth13/TlsConnectClientAuthStream13 [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13AsyncImmediate (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13AsyncDelay (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13Sync (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuth/TLS13None (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13AsyncImmediate (13 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13AsyncDelay (13 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13Sync (12 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterResumption/TLS13None (13 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13AsyncImmediate (11 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13AsyncDelay (11 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13Sync (11 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMultiple/TLS13None (13 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13AsyncDelay (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13Sync (7 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthConcurrent/TLS13None (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13AsyncDelay (5 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13Sync (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBeforeKeyUpdate/TLS13None (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13AsyncImmediate (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13AsyncDelay (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13Sync (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDuringClientKeyUpdate/TLS13None (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13AsyncImmediate (5 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13AsyncDelay (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13Sync (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthMissingExtension/TLS13None (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13AsyncImmediate (19 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13AsyncDelay (19 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13Sync (19 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthAfterClientAuth/TLS13None (19 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [47] 10b63d9df596d6ca6de05063e3357170b1001c000d0018001604030503060302... handshake new: [47] 10ff3d9df596d6ca6de05063e3357170b1001c000d0018001604030503060302... record old: [51] 0d00002f10b63d9df596d6ca6de05063e3357170b1001c000d00180016040305... record new: [51] 0d00002f10ff3d9df596d6ca6de05063e3357170b1001c000d00180016040305... server: Filtered packet: [73] 17030300442f2a6578cc21dbb2410f09f794d6570c38a600609da4f5956fae80... Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success server: Fatal alert sent: 47 server: Read error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Fatal alert received: 47 client: Read error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13AsyncImmediate (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [47] 10d795bd69722d07119eb9603b7966c80d001c000d0018001604030503060302... handshake new: [47] 109e95bd69722d07119eb9603b7966c80d001c000d0018001604030503060302... record old: [51] 0d00002f10d795bd69722d07119eb9603b7966c80d001c000d00180016040305... record new: [51] 0d00002f109e95bd69722d07119eb9603b7966c80d001c000d00180016040305... server: Filtered packet: [73] 1703030044fdacf823ec0bf51dfaf11e9e59c33c77a75f4ff909f2db7d365d8f... Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Fatal alert sent: 47 server: Read error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Fatal alert received: 47 client: Read error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13AsyncDelay (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [47] 104c0420baad771c0ace89a7801764f05c001c000d0018001604030503060302... handshake new: [47] 10050420baad771c0ace89a7801764f05c001c000d0018001604030503060302... record old: [51] 0d00002f104c0420baad771c0ace89a7801764f05c001c000d00180016040305... record new: [51] 0d00002f10050420baad771c0ace89a7801764f05c001c000d00180016040305... server: Filtered packet: [73] 170303004465a23281c6f868142860437761f0bf501aeb89c43ce4208cc0626a... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Fatal alert sent: 47 server: Read error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Fatal alert received: 47 client: Read error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13Sync (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [47] 10a0ca23bfd89240b443293571b80ad393001c000d0018001604030503060302... handshake new: [47] 10e9ca23bfd89240b443293571b80ad393001c000d0018001604030503060302... record old: [51] 0d00002f10a0ca23bfd89240b443293571b80ad393001c000d00180016040305... record new: [51] 0d00002f10e9ca23bfd89240b443293571b80ad393001c000d00180016040305... server: Filtered packet: [73] 1703030044b9f7205af8d4f9d00316658d323de46a6fb3e497d0275c9b6b3a9c... client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Fatal alert sent: 47 server: Read error SSL_ERROR_RX_MALFORMED_CERTIFICATE: SSL received a malformed Certificate handshake message. client: Fatal alert received: 47 client: Read error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthContextMismatch/TLS13None (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success handshake old: [132] 08040080c9333c2b91d5f102ad6e208b3cc2fca27359cc5359ec7b3ea94e963f... handshake new: [132] 08044980c9333c2b91d5f102ad6e208b3cc2fca27359cc5359ec7b3ea94e963f... record old: [639] 0b0001cf105df1b15b9d398989b3179cafae0a069c0001bb0001b6308201b230... record new: [639] 0b0001cf105df1b15b9d398989b3179cafae0a069c0001bb0001b6308201b230... client: Filtered packet: [661] 1703030290d80a1e119d6b205da250cafcbec6b46573d90975eb2b893e971307... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13AsyncImmediate (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 Waiting for complete call client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete handshake old: [132] 08040080baf8f94b65a7c91be9e6f8e4f182c5427e53e8357e8440bcc9004715... handshake new: [132] 08044980baf8f94b65a7c91be9e6f8e4f182c5427e53e8357e8440bcc9004715... record old: [639] 0b0001cf10faee55607a6d519a316bf4a129ba00720001bb0001b6308201b230... record new: [639] 0b0001cf10faee55607a6d519a316bf4a129ba00720001bb0001b6308201b230... client: Filtered packet: [661] 170303029002f318815c0cc38dd0ca29f9909818ced84399864d07dd5c8f23fb... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13AsyncDelay (8 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [132] 08040080d45d496368dd908fde515fc6a6e21868dbca709e2463bd4b6a400567... handshake new: [132] 08044980d45d496368dd908fde515fc6a6e21868dbca709e2463bd4b6a400567... record old: [639] 0b0001cf10171ade25e8708415604f1415c8ad80480001bb0001b6308201b230... record new: [639] 0b0001cf10171ade25e8708415604f1415c8ad80480001bb0001b6308201b230... client: Filtered packet: [661] 170303029095d9198b461d9104ed9362d30562b08841d8e9a54ad7ce26b4eb7c... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13Sync (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 handshake old: [132] 08040080bcda5b85165ade43f780bd244cb70f6df4969bb1627a865a0820d11b... handshake new: [132] 08044980bcda5b85165ade43f780bd244cb70f6df4969bb1627a865a0820d11b... record old: [639] 0b0001cf10f6bd7e88f3f84cffbf88729e3f8379c30001bb0001b6308201b230... record new: [639] 0b0001cf10f6bd7e88f3f84cffbf88729e3f8379c30001bb0001b6308201b230... client: Filtered packet: [661] 1703030290c3a8e6f7ab809aa70f6d0e1d3005ab7062b9e139cb0be68457fb55... server: Fatal alert sent: 50 server: Read error SSL_ERROR_RX_MALFORMED_CERT_VERIFY: SSL received a malformed Certificate Verify handshake message. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthBadSignature/TLS13None (9 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Fatal alert sent: 116 server: Read error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Fatal alert sent: 116 server: Read error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13AsyncDelay (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Fatal alert sent: 116 server: Read error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13Sync (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Fatal alert sent: 116 server: Read error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDecline/TLS13None (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13AsyncImmediate (16 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13AsyncDelay (17 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13Sync (16 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthWithSessionTicketsEnabled/TLS13None (16 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13AsyncDelay (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13Sync (6 ms) [ RUN ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth13/TlsConnectClientAuthStream13.PostHandshakeAuthDisjointSchemes/TLS13None (6 ms) [----------] 52 tests from ClientAuth13/TlsConnectClientAuthStream13 (520 ms total) [----------] 40 tests from ClientAuth12/TlsConnectClientAuth12 [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12AsyncImmediate Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12AsyncImmediate (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12AsyncDelay Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12AsyncDelay (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12Sync Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12Sync (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12None Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/TLS12None (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12AsyncImmediate Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12AsyncImmediate (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12AsyncDelay Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12AsyncDelay (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12Sync Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12Sync (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12None Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthCheckSigAlg/DTLS12None (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12AsyncImmediate Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12AsyncImmediate (15 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12AsyncDelay Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12AsyncDelay (16 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12Sync Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12Sync (19 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12None Version: TLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/TLS12None (15 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12AsyncImmediate Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12AsyncImmediate (15 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12AsyncDelay Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12AsyncDelay (17 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12Sync Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12Sync (16 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12None Version: DTLS 1.2 Reset server:rsa, client:rsa2048 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthBigRsaCheckSigAlg/DTLS12None (16 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12AsyncImmediate Version: TLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success handshake old: [132] 08090080482985b70357adaf3fdb1dd037b01223a7c03c99f50a6826f46b5bb4... handshake new: [132] 08040080482985b70357adaf3fdb1dd037b01223a7c03c99f50a6826f46b5bb4... record old: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... record new: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... client: Filtered packet: [835] 160303030b0b00025a0002570002543082025030820185a00302010202010630... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12AsyncImmediate (9 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12AsyncDelay Version: TLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete handshake old: [132] 08090080b10e09244ded0dd613bc76e6cc64894f2685d717209686876d326674... handshake new: [132] 08040080b10e09244ded0dd613bc76e6cc64894f2685d717209686876d326674... record old: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... record new: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... client: Filtered packet: [835] 160303030b0b00025a0002570002543082025030820185a00302010202010630... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12AsyncDelay (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12Sync Version: TLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08090080063c4a4e39d133cf067bc283eda10dda85ad90c34cce6a28d542b669... handshake new: [132] 08040080063c4a4e39d133cf067bc283eda10dda85ad90c34cce6a28d542b669... record old: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... record new: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... client: Filtered packet: [835] 160303030b0b00025a0002570002543082025030820185a00302010202010630... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12Sync (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12None Version: TLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080900801eb3e013f1e22fda15bcb1469e76ce23ac54709a8995ba1e4885c68f... handshake new: [132] 080400801eb3e013f1e22fda15bcb1469e76ce23ac54709a8995ba1e4885c68f... record old: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... record new: [779] 0b00025a0002570002543082025030820185a003020102020106304106092a86... client: Filtered packet: [835] 160303030b0b00025a0002570002543082025030820185a00302010202010630... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/TLS12None (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12AsyncImmediate Version: DTLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success handshake old: [132] 08090080178a0eaa3d516ed2fd49a403220e7b625550d1b8471a2b7b802591b9... handshake new: [132] 08040080178a0eaa3d516ed2fd49a403220e7b625550d1b8471a2b7b802591b9... record old: [144] 0f000084000300000000008408090080178a0eaa3d516ed2fd49a403220e7b62... record new: [144] 0f000084000300000000008408040080178a0eaa3d516ed2fd49a403220e7b62... client: Filtered packet: [917] 16fefd000000000000000102660b00025a000100000000025a00025700025430... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12AsyncImmediate (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12AsyncDelay Version: DTLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete handshake old: [132] 08090080b3f8418d4e5e216e3edc1eaa967c9487c7024852ddef22c66f5cb212... handshake new: [132] 08040080b3f8418d4e5e216e3edc1eaa967c9487c7024852ddef22c66f5cb212... record old: [144] 0f000084000300000000008408090080b3f8418d4e5e216e3edc1eaa967c9487... record new: [144] 0f000084000300000000008408040080b3f8418d4e5e216e3edc1eaa967c9487... client: Filtered packet: [917] 16fefd000000000000000102660b00025a000100000000025a00025700025430... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12AsyncDelay (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12Sync Version: DTLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080900803df6f5a909d32093dc32156189d1be814b2fb3b96e4e322c7b16622b... handshake new: [132] 080400803df6f5a909d32093dc32156189d1be814b2fb3b96e4e322c7b16622b... record old: [144] 0f0000840003000000000084080900803df6f5a909d32093dc32156189d1be81... record new: [144] 0f0000840003000000000084080400803df6f5a909d32093dc32156189d1be81... client: Filtered packet: [917] 16fefd000000000000000102660b00025a000100000000025a00025700025430... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12Sync (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12None Version: DTLS 1.2 Reset server:rsa, client:rsa_pss server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 08090080dbed896722d565da1e5e7e9969dd38e833f6a24ec9358859acb559a6... handshake new: [132] 08040080dbed896722d565da1e5e7e9969dd38e833f6a24ec9358859acb559a6... record old: [144] 0f000084000300000000008408090080dbed896722d565da1e5e7e9969dd38e8... record new: [144] 0f000084000300000000008408040080dbed896722d565da1e5e7e9969dd38e8... client: Filtered packet: [917] 16fefd000000000000000102660b00025a000100000000025a00025700025430... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentRsaeSignatureScheme/DTLS12None (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12AsyncImmediate Version: TLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success handshake old: [132] 0804008053a9cc79e85ab5509d0f40a32166c8bb321c6871531e7f9767c5c8ef... handshake new: [132] 0809008053a9cc79e85ab5509d0f40a32166c8bb321c6871531e7f9767c5c8ef... record old: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... record new: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... client: Filtered packet: [671] 16030302670b0001b60001b30001b0308201ac30820115a00302010202010230... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12AsyncImmediate (7 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12AsyncDelay Version: TLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete handshake old: [132] 080400806ddbe84bade01490f5e58ce13b2129934ec45e124ab31925d5a68b0f... handshake new: [132] 080900806ddbe84bade01490f5e58ce13b2129934ec45e124ab31925d5a68b0f... record old: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... record new: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... client: Filtered packet: [671] 16030302670b0001b60001b30001b0308201ac30820115a00302010202010230... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12AsyncDelay (7 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12Sync Version: TLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400802d4f20cc4a4604dfb5a2402205e7ee1fe45987893e2912a950a75b18... handshake new: [132] 080900802d4f20cc4a4604dfb5a2402205e7ee1fe45987893e2912a950a75b18... record old: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... record new: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... client: Filtered packet: [671] 16030302670b0001b60001b30001b0308201ac30820115a00302010202010230... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12Sync (7 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12None Version: TLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 0804008037b6657ae1defb2387fe872a5abebd3fad00b88e70f335282a20b32e... handshake new: [132] 0809008037b6657ae1defb2387fe872a5abebd3fad00b88e70f335282a20b32e... record old: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... record new: [615] 0b0001b60001b30001b0308201ac30820115a003020102020102300d06092a86... client: Filtered packet: [671] 16030302670b0001b60001b30001b0308201ac30820115a00302010202010230... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/TLS12None (7 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12AsyncImmediate Version: DTLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success handshake old: [132] 08040080473e020b8eccb1c343e9b04170f074f85f71c63e6783d425da326762... handshake new: [132] 08090080473e020b8eccb1c343e9b04170f074f85f71c63e6783d425da326762... record old: [144] 0f000084000300000000008408040080473e020b8eccb1c343e9b04170f074f8... record new: [144] 0f000084000300000000008408090080473e020b8eccb1c343e9b04170f074f8... client: Filtered packet: [753] 16fefd000000000000000101c20b0001b600010000000001b60001b30001b030... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12AsyncImmediate (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12AsyncDelay Version: DTLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status success Running Handshake prior to running SSL_ClientCertCallbackComplete handshake old: [132] 0804008082d4fc6bb3204ef87fcc5045ed4a502403c91a673bfebb29fe727aaf... handshake new: [132] 0809008082d4fc6bb3204ef87fcc5045ed4a502403c91a673bfebb29fe727aaf... record old: [144] 0f00008400030000000000840804008082d4fc6bb3204ef87fcc5045ed4a5024... record new: [144] 0f00008400030000000000840809008082d4fc6bb3204ef87fcc5045ed4a5024... client: Filtered packet: [753] 16fefd000000000000000101c20b0001b600010000000001b60001b30001b030... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12AsyncDelay (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12Sync Version: DTLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400803cfd9ffcc2cc8a91871bc8c5f43fc4ce503a5d0018c45108e5af2405... handshake new: [132] 080900803cfd9ffcc2cc8a91871bc8c5f43fc4ce503a5d0018c45108e5af2405... record old: [144] 0f0000840003000000000084080400803cfd9ffcc2cc8a91871bc8c5f43fc4ce... record new: [144] 0f0000840003000000000084080900803cfd9ffcc2cc8a91871bc8c5f43fc4ce... client: Filtered packet: [753] 16fefd000000000000000101c20b0001b600010000000001b60001b30001b030... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12Sync (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12None Version: DTLS 1.2 Reset server:rsa, client:rsa server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [132] 080400800cd712864c046206532939ef759049b4d1158aecf84f2226f01e0de9... handshake new: [132] 080900800cd712864c046206532939ef759049b4d1158aecf84f2226f01e0de9... record old: [144] 0f0000840003000000000084080400800cd712864c046206532939ef759049b4... record new: [144] 0f0000840003000000000084080900800cd712864c046206532939ef759049b4... client: Filtered packet: [753] 16fefd000000000000000101c20b0001b600010000000001b60001b30001b030... server: Fatal alert sent: 47 server: Handshake failed with error SSL_ERROR_INCORRECT_SIGNATURE_ALGORITHM: Incorrect signature algorithm specified in a digitally-signed element. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 47 client: Handshake failed with error SSL_ERROR_ILLEGAL_PARAMETER_ALERT: SSL peer rejected a handshake message for unacceptable content. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthInconsistentPssSignatureScheme/DTLS12None (8 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12AsyncImmediate Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [757] 0200005d03038f37ec06acd4c4c9b91a2b3a51b4602a11f2d8194f23ee06140c... record new: [727] 0200005d03038f37ec06acd4c4c9b91a2b3a51b4602a11f2d8194f23ee06140c... server: Filtered packet: [732] 16030302d70200005d03038f37ec06acd4c4c9b91a2b3a51b4602a11f2d8194f... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12AsyncImmediate (4 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12AsyncDelay Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [757] 0200005d03039f5a7d4ac997a53d7e9f8f88d472475a4a5696326f1d40980d5a... record new: [727] 0200005d03039f5a7d4ac997a53d7e9f8f88d472475a4a5696326f1d40980d5a... server: Filtered packet: [732] 16030302d70200005d03039f5a7d4ac997a53d7e9f8f88d472475a4a5696326f... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12AsyncDelay (4 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12Sync Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [757] 0200005d0303b9619289d8d5cced2c8b5fe6da02a92f2eabfb68fd7b403f91c9... record new: [727] 0200005d0303b9619289d8d5cced2c8b5fe6da02a92f2eabfb68fd7b403f91c9... server: Filtered packet: [732] 16030302d70200005d0303b9619289d8d5cced2c8b5fe6da02a92f2eabfb68fd... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12Sync (4 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12None Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [757] 0200005d0303c7a66fed495cec33ed5385f426a6f0bb6c5332d11a778ad25679... record new: [727] 0200005d0303c7a66fed495cec33ed5385f426a6f0bb6c5332d11a778ad25679... server: Filtered packet: [732] 16030302d70200005d0303c7a66fed495cec33ed5385f426a6f0bb6c5332d11a... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/TLS12None (4 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12AsyncImmediate Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [20] 0d00000800030000000000080301400200000000 server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefde0af225ddc... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12AsyncImmediate (5 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12AsyncDelay Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [20] 0d00000800030000000000080301400200000000 server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefd28ba55e187... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12AsyncDelay (5 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12Sync Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [20] 0d00000800030000000000080301400200000000 server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefd27bc4ebadf... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12Sync (5 ms) [ RUN ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12None Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Zeroing CertReq.supported_signature_algorithms handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [8] 0301400200000000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [20] 0d00000800030000000000080301400200000000 server: Filtered packet: [832] 16fefd000000000000000000690200005d000000000000005dfefd9c5c90222b... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12/TlsConnectClientAuth12.ClientAuthNoSigAlgs/DTLS12None (4 ms) [----------] 40 tests from ClientAuth12/TlsConnectClientAuth12 (377 ms total) [----------] 12 tests from ClientAuthPre13Stream/TlsConnectClientAuthPre13 [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10AsyncImmediate Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10AsyncImmediate (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10AsyncDelay Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10AsyncDelay (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10Sync Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10Sync (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10None Version: TLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS10None (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11AsyncImmediate Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11AsyncImmediate (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11AsyncDelay Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11AsyncDelay (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11Sync Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11Sync (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11None Version: TLS 1.1 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS11None (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12AsyncImmediate Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12AsyncImmediate (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12AsyncDelay Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12AsyncDelay (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12Sync Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12Sync (5 ms) [ RUN ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12None Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Stream/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/TLS12None (5 ms) [----------] 12 tests from ClientAuthPre13Stream/TlsConnectClientAuthPre13 (66 ms total) [----------] 8 tests from ClientAuthPre13Datagram/TlsConnectClientAuthPre13 [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11AsyncImmediate Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11AsyncImmediate (5 ms) [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11AsyncDelay Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11AsyncDelay (5 ms) [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11Sync Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11Sync (5 ms) [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11None Version: DTLS 1.0 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS11None (5 ms) [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12AsyncImmediate Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12AsyncImmediate (7 ms) [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12AsyncDelay Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING Waiting for complete call client: calling SSL_ClientCertCallbackComplete with status failed Running Handshake prior to running SSL_ClientCertCallbackComplete server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12AsyncDelay (5 ms) [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12Sync Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12Sync (5 ms) [ RUN ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12None Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuthPre13Datagram/TlsConnectClientAuthPre13.ClientAuthRequiredRejected/DTLS12None (5 ms) [----------] 8 tests from ClientAuthPre13Datagram/TlsConnectClientAuthPre13 (44 ms total) [----------] 16 tests from ClientAuth12Plus/TlsConnectClientAuth12Plus [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13AsyncImmediate Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13AsyncDelay Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13AsyncDelay (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13Sync Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13Sync (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13None Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS13None (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12AsyncImmediate Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12AsyncImmediate (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12AsyncDelay Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12AsyncDelay (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12Sync Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12Sync (5 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12None Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/TLS12None (5 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13AsyncImmediate Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13AsyncImmediate (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13AsyncDelay Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13AsyncDelay (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13Sync Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13Sync (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13None Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Fatal alert sent: 116 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 116 client: Handshake failed with error SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. client: Changing state from CONNECTED to ERROR client: Warning alert sent: 0 [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS13None (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12AsyncImmediate Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12AsyncImmediate (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12AsyncDelay Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12AsyncDelay (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12Sync Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12Sync (6 ms) [ RUN ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12None Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Fatal alert sent: 42 server: Handshake failed with error SSL_ERROR_NO_CERTIFICATE: Unable to find the certificate or key necessary for authentication. server: Changing state from CONNECTING to ERROR client: Fatal alert received: 42 client: Handshake failed with error SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. client: Changing state from CONNECTING to ERROR [ OK ] ClientAuth12Plus/TlsConnectClientAuth12Plus.ClientAuthDisjointSchemes/DTLS12None (5 ms) [----------] 16 tests from ClientAuth12Plus/TlsConnectClientAuth12Plus (100 ms total) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/4 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/5 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/6 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/7 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/8 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/9 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/4 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/5 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/6 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/7 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/8 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/9 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (7 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 Version: TLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/4 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/5 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/6 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/7 (6 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/8 (5 ms) [ RUN ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 Version: DTLS 1.2 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/9 (6 ms) [----------] 30 tests from SignatureSchemeRsa/TlsSignatureSchemeConfiguration (179 ms total) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (5 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (6 ms) [ RUN ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.3 Reset server:rsa_sign, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (5 ms) [----------] 12 tests from SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration (74 ms total) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (13 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (13 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (14 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (13 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (13 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (13 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (13 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (14 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (14 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (14 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (14 ms) [ RUN ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:rsa2048, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (14 ms) [----------] 12 tests from SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration (167 ms total) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (5 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (6 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (6 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (6 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (5 ms) [ RUN ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: DTLS 1.2 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (5 ms) [----------] 6 tests from SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration (36 ms total) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (10 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (6 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (10 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (7 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (10 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (7 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (10 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (7 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (10 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (7 ms) [ RUN ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (10 ms) [----------] 12 tests from SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration (107 ms total) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (23 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (41 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (22 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (40 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (22 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (39 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (21 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (38 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (21 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (41 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (22 ms) [ RUN ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (39 ms) [----------] 12 tests from SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration (376 ms total) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (57 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (107 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (57 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (108 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (59 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (111 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (58 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (107 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (59 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (111 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.3 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (57 ms) [ RUN ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa521, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (107 ms) [----------] 12 tests from SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration (1002 ms total) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/0 (10 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/1 (38 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/2 (10 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigServer/3 (40 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/0 (10 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/1 (39 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/2 (10 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigClient/3 (40 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 Version: TLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/0 (10 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 Version: TLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/1 (39 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 Version: DTLS 1.2 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/2 (10 ms) [ RUN ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 Version: DTLS 1.2 Reset server:ecdsa384, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration.SignatureSchemeConfigBoth/3 (39 ms) [----------] 12 tests from SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration (302 ms total) [----------] 32 tests from SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/0 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/1 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/1 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/2 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/2 (7 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/3 Version: TLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/3 (7 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/4 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/4 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/5 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/5 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/6 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/6 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/7 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/7 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/8 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/8 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/9 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/9 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/10 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/10 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/11 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/11 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/12 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/12 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/13 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/13 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/14 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/14 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/15 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/15 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/16 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/16 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/17 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/17 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/18 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/18 (7 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/19 Version: DTLS 1.3 Reset server:ecdsa256, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/19 (7 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/20 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/20 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/21 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/21 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/22 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/22 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/23 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/23 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/24 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/24 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/25 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/25 (8 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/26 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/26 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/27 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/27 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/28 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/28 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/29 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/29 (9 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/30 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/30 (10 ms) [ RUN ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/31 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Handshake success client: Changing state from CONNECTING to CONNECTED Connected with version 771 cipher suite TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 client: Warning alert sent: 0 [ OK ] SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus.PolicySuccessTest/31 (9 ms) [----------] 32 tests from SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus (285 ms total) [----------] 16 tests from SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12 [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/0 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [757] 0200005d03030a94a47605a89a60a0bf080671cf7cc82eaa2a2b333eedb3e627... record new: [731] 0200005d03030a94a47605a89a60a0bf080671cf7cc82eaa2a2b333eedb3e627... server: Filtered packet: [736] 16030302db0200005d03030a94a47605a89a60a0bf080671cf7cc82eaa2a2b33... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/0 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/1 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [757] 0200005d0303331020744730c920fe9b57e313445c6b74fc6a0ee69e99d4ebe3... record new: [731] 0200005d0303331020744730c920fe9b57e313445c6b74fc6a0ee69e99d4ebe3... server: Filtered packet: [736] 16030302db0200005d0303331020744730c920fe9b57e313445c6b74fc6a0ee6... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/1 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/2 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [757] 0200005d030318eff93fb9726044939a88376469d5b43bc5130405572467fcf4... record new: [731] 0200005d030318eff93fb9726044939a88376469d5b43bc5130405572467fcf4... server: Filtered packet: [736] 16030302db0200005d030318eff93fb9726044939a88376469d5b43bc5130405... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/2 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/3 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [757] 0200005d03035292abb5f200f14a1206c350855c2562205174f75060026d561a... record new: [731] 0200005d03035292abb5f200f14a1206c350855c2562205174f75060026d561a... server: Filtered packet: [736] 16030302db0200005d03035292abb5f200f14a1206c350855c2562205174f750... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/3 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/4 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204010000 record old: [757] 0200005d030315c11a1eeb50fe4406a4fb6458952b0f489737cf28d847dd0a1e... record new: [731] 0200005d030315c11a1eeb50fe4406a4fb6458952b0f489737cf28d847dd0a1e... server: Filtered packet: [736] 16030302db0200005d030315c11a1eeb50fe4406a4fb6458952b0f489737cf28... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/4 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/5 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204010000 record old: [757] 0200005d03031e8dde209bae58944fc9c2efe2eb7f86770fefd01a95da148341... record new: [731] 0200005d03031e8dde209bae58944fc9c2efe2eb7f86770fefd01a95da148341... server: Filtered packet: [736] 16030302db0200005d03031e8dde209bae58944fc9c2efe2eb7f86770fefd01a... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/5 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/6 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204030000 record old: [757] 0200005d0303b45659e41d0613c9234b178b843bc6e28a11f2a943886fc9f472... record new: [731] 0200005d0303b45659e41d0613c9234b178b843bc6e28a11f2a943886fc9f472... server: Filtered packet: [736] 16030302db0200005d0303b45659e41d0613c9234b178b843bc6e28a11f2a943... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/6 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/7 Version: TLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204030000 record old: [757] 0200005d03032deb2a6444ba8c48bd67eed521f5372391dc65a4a987e686703c... record new: [731] 0200005d03032deb2a6444ba8c48bd67eed521f5372391dc65a4a987e686703c... server: Filtered packet: [736] 16030302db0200005d03032deb2a6444ba8c48bd67eed521f5372391dc65a4a9... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/7 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/8 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000208090000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefd1cf65d5421... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/8 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/9 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000208090000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefd0fd30c7a03... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/9 (4 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/10 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000208090000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefdc1423eac09... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/10 (4 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/11 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000208090000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000208090000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefd4a828a8e4f... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/11 (4 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/12 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204010000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000204010000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefdd4c5544eec... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/12 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/13 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204010000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000204010000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefd7bc19b3e52... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/13 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/14 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204030000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000204030000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefd13a4313b73... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/14 (5 ms) [ RUN ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/15 Version: DTLS 1.2 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING handshake old: [38] 03014002001e0403050306030203080408050806040105010601020104020502... handshake new: [12] 030140020000000204030000 record old: [50] 0d000026000300000000002603014002001e0403050306030203080408050806... record new: [24] 0d00000c000300000000000c030140020000000204030000 server: Filtered packet: [836] 16fefd000000000000000000690200005d000000000000005dfefd60012efe7d... client: Fatal alert sent: 40 client: Handshake failed with error SSL_ERROR_UNSUPPORTED_SIGNATURE_ALGORITHM: The peer used an unsupported combination of signature and hash algorithm. client: Changing state from CONNECTING to ERROR server: Fatal alert received: 40 server: Handshake failed with error SSL_ERROR_HANDSHAKE_FAILURE_ALERT: SSL peer was unable to negotiate an acceptable set of security parameters. server: Changing state from CONNECTING to ERROR [ OK ] SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12.PolicyFailureTest/15 (5 ms) [----------] 16 tests from SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12 (81 ms total) [----------] 16 tests from AgentTests/TlsAgentTest [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/0 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/0 (1 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/1 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/1 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/2 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/3 client: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/4 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/4 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/5 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/6 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/6 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyFinished/7 server: Changing state from INIT to CONNECTING Process message: [9] 160301000414000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_FINISHED: SSL received an unexpected Finished handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyFinished/7 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/0 (1 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/1 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/2 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 client: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. client: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/3 (0 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/4 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/5 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/6 (2 ms) [ RUN ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 server: Changing state from INIT to CONNECTING Process message: [9] 16030100040f000000 server: Fatal alert sent: 10 server: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_CERT_VERIFY: SSL received an unexpected Certificate Verify handshake message. server: Changing state from CONNECTING to ERROR [ OK ] AgentTests/TlsAgentTest.EarlyCertificateVerify/7 (2 ms) [----------] 16 tests from AgentTests/TlsAgentTest (26 ms total) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/0 client: Changing state from INIT to CONNECTING Process message: [95] 160304005a0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/0 (1 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.CannedHello/1 client: Changing state from INIT to CONNECTING Process message: [111] 16030400000000000000000062020000560000000000000056fefd9cbc149b0e... [ OK ] ClientTests13/TlsAgentTestClient13.CannedHello/1 (1 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 client: Changing state from INIT to CONNECTING Process message: [99] 160304005e0200005603039cbc149b0e2efa0df3f05c707ae0d19b3e5a446bdf... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/0 (1 ms) [ RUN ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 client: Changing state from INIT to CONNECTING Process message: [123] 1603040000000000000000006e020000560000000000000056fefd9cbc149b0e... client: Fatal alert sent: 10 client: Handshake failed with error SSL_ERROR_RX_UNEXPECTED_HANDSHAKE: SSL received an unexpected Handshake record. client: Changing state from CONNECTING to ERROR [ OK ] ClientTests13/TlsAgentTestClient13.EncryptedExtensionsInClear/1 (1 ms) [----------] 4 tests from ClientTests13/TlsAgentTestClient13 (6 ms total) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/0 (12 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ResPskZeroRttReplay/1 (12 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/0 (7 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_CHACHA20_POLY1305_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ExtPskZeroRttReplay/1 (7 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 Version: TLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/0 (12 ms) [ RUN ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 Version: DTLS 1.3 server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING client: Changing state from INIT to CONNECTING 0-RTT read 6 bytes client: Handshake success client: Changing state from CONNECTING to CONNECTED server: Handshake success server: Changing state from CONNECTING to CONNECTED Connected with version 772 cipher suite TLS_AES_128_GCM_SHA256 server: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Read error PR_WOULD_BLOCK_ERROR: The operation would have blocked client: Warning alert sent: 0 Reset server:rsa, client:client server: Changing state from INIT to CONNECTING [ OK ] Tls13ZeroRttReplayTest/TlsZeroRttReplayTest.ZeroRttReplayAfterRollover/1 (13 ms) [----------] 6 tests from Tls13ZeroRttReplayTest/TlsZeroRttReplayTest (66 ms total) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.InitOnly/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddToEmpty/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddTwo/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.AddOneTwice/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Zero/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Zero/9 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/0 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/0 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/1 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/1 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/2 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/2 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/3 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/3 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/4 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/4 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/5 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/5 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/6 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/6 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/7 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/7 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/8 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/8 (0 ms) [ RUN ] BloomFilterConfigurations/BloomFilterTest.Fill/9 [ OK ] BloomFilterConfigurations/BloomFilterTest.Fill/9 (0 ms) [----------] 60 tests from BloomFilterConfigurations/BloomFilterTest (0 ms total) [----------] Global test environment tear-down [==========] 14173 tests from 118 test suites ran. (165820 ms total) [ PASSED ] 13564 tests. [ SKIPPED ] 609 tests, listed below: [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndServerRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectTls10AndClientRenegotiateHigher/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndServerWontRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ConnectAndClientWontRenegotiateLower/3 [ SKIPPED ] StreamOnly/TlsConnectStream.ShortRead/3 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls11/3 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] GenericStream/TlsConnectGeneric.ServerNegotiateTls12/3 [ SKIPPED ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/0 [ SKIPPED ] GenericStream/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/3 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.ServerNegotiateTls12/2 [ SKIPPED ] GenericDatagram/TlsConnectGeneric.CertificateCompressionTLS12AndBelow/0 [ SKIPPED ] TlsDowngradeSentinelTest/TlsDowngradeTest.TlsDowngradeSentinelTest/1 [ SKIPPED ] Pre13Stream/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] Pre13Datagram/TlsConnectGenericPre13.TestResumptionOverrideVersion/0 [ SKIPPED ] ZeroLengthRecordTest/ZeroLengthRecordSetup.ZeroLengthRecordRun/Dtls1_3ZeroLengthAckTest [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/2 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/3 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/8 [ SKIPPED ] CipherSuiteAEAD12/TlsCipherSuiteTest.ResumeCipherSuite/9 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/6 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/7 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/14 [ SKIPPED ] CipherSuiteCBC12/TlsCipherSuiteTest.ResumeCipherSuite/15 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/396 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/397 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/398 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/399 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/400 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/401 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/402 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/403 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/404 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/405 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/406 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/407 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/408 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/409 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/410 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/411 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/412 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/413 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/414 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/415 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/416 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/417 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/418 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/419 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/420 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/421 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/422 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/423 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/424 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/425 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/426 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/427 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/428 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/429 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/430 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/431 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/432 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/433 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/434 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/435 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/436 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/437 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/438 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/439 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/440 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/441 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/442 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/443 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/444 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/445 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/446 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/447 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/448 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/449 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/450 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/451 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/452 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/453 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/454 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/455 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/456 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/457 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/458 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/459 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/460 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/461 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/462 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/463 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/464 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/465 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/466 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/467 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/468 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/469 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/470 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/471 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/472 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/473 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/474 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/475 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/476 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/477 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/478 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/479 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/480 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/481 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/482 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/483 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/484 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/485 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/486 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/487 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/488 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/489 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/490 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/491 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/492 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/493 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/494 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/495 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/496 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/497 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/498 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/499 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/500 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/501 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/502 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/503 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/504 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/505 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/506 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/507 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/508 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/509 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/510 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/511 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/512 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/513 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/514 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/515 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/516 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/517 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/518 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/519 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/520 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/521 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/522 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/523 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/524 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/525 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/526 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/527 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/924 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/925 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/926 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/927 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/928 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/929 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/930 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/931 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/932 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/933 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/934 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/935 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/936 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/937 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/938 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/939 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/940 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/941 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/942 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/943 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/944 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/945 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/946 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/947 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/948 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/949 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/950 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/951 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/952 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/953 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/954 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/955 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/956 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/957 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/958 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/959 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/960 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/961 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/962 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/963 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/964 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/965 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/966 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/967 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/968 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/969 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/970 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/971 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/972 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/973 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/974 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/975 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/976 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/977 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/978 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/979 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/980 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/981 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/982 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/983 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/984 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/985 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/986 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/987 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/988 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/989 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/990 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/991 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/992 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/993 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/994 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/995 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/996 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/997 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/998 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/999 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1000 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1001 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1002 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1003 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1004 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1005 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1006 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1007 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1008 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1009 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1010 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1011 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1012 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1013 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1014 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1015 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1016 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1017 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1018 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1019 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1020 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1021 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1022 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1023 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1024 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1025 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1026 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1027 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1028 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1029 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1030 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1031 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1032 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1033 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1034 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1035 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1036 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1037 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1038 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1039 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1040 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1041 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1042 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1043 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1044 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1045 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1046 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1047 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1048 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1049 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1050 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1051 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1052 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1053 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1054 [ SKIPPED ] CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest.ResumeCipherSuite/1055 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/18 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/19 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/20 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/21 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/22 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/23 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/24 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/25 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/26 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/27 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/28 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/29 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/30 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/31 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/32 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/33 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/34 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/35 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/36 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/37 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/38 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/39 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/40 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/41 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/42 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/43 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/44 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/45 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/46 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/47 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/48 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/49 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/50 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/51 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/52 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/53 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/54 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/55 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/56 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/57 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/58 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/59 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/60 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/61 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/62 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/63 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/64 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/65 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/66 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/67 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/68 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/69 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/70 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/71 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/72 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/73 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/74 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/75 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/76 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/77 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/78 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/79 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/80 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/81 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/82 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/83 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/84 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/85 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/86 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/87 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/88 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/89 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/90 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/91 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/92 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/93 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/94 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/95 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/96 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/97 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/98 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/99 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/100 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/101 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/102 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/103 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/104 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/105 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/106 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/107 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/108 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/109 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/110 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/111 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/112 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/113 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/114 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/115 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/116 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/117 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/118 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/119 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/120 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/121 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/122 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/123 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/124 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/125 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/126 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/127 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/128 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/129 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/130 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/131 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/132 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/133 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/134 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/135 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/136 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/137 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/138 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/139 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/140 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/141 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/142 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/143 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/144 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/145 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/146 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/147 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/148 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/149 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/150 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/151 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/152 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/153 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/154 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/155 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/156 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/157 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/158 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/159 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/160 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/161 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/162 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/163 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/164 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/165 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/166 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/167 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/168 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/169 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/170 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/171 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/172 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/173 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/174 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/175 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/176 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/177 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/178 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/179 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/180 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/181 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/182 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/183 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/184 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/185 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/186 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/187 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/188 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/189 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/190 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/191 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/192 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/193 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/194 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/195 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/196 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/197 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/198 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/199 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/200 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/201 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/202 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/203 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/204 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/205 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/206 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/207 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/208 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/209 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/210 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/211 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/212 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/213 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/214 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/215 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/216 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/217 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/218 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/219 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/220 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/221 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/222 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/223 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/224 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/225 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/226 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/227 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/228 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/229 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/230 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/231 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/232 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/233 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/234 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/235 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/236 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/237 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/238 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/239 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/240 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/241 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/242 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/243 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/244 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/245 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/246 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/247 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/248 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/249 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/250 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/251 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/252 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/253 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/254 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/255 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/256 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/257 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/258 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/259 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/260 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/261 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/262 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/263 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/264 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/265 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/266 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/267 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/268 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/269 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/270 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/271 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/272 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/273 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/274 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/275 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/276 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/277 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/278 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/279 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/280 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/281 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/282 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/283 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/284 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/285 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/286 [ SKIPPED ] CipherSuiteTLS13/TlsCipherSuiteTest.WriteLimit/287 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/0 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/1 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/2 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/3 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/4 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/5 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/6 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/7 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/8 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/9 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/10 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/11 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/12 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/13 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/14 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/15 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/16 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/17 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/18 [ SKIPPED ] CipherSuiteTLS13AllGroups/TlsCipherSuiteTest.WriteLimit/19 [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13AsyncImmediate [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13AsyncDelay [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13Sync [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS13None [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12AsyncImmediate [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12AsyncDelay [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12Sync [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS12None [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11AsyncImmediate [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11AsyncDelay [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11Sync [ SKIPPED ] ClientAuthGenericDatagram/TlsConnectClientAuth.ClientAuthWithEch/DTLS11None YOU HAVE 64 DISABLED TESTS ssl_gtest.sh: #26: ssl_gtests ran successfully - PASSED DEBUG: Using xmllint to parse GTest XML report(s) ssl_gtest.sh: #27: 'DCDelegation: DCDelegations' - PASSED ssl_gtest.sh: #28: 'TlsConnectStreamTls13: ClientRejectHandshakeCertReq' - PASSED ssl_gtest.sh: #29: 'TlsConnectStreamTls13: RejectPha' - PASSED ssl_gtest.sh: #30: 'TlsConnectStreamTls13: Tls14ClientHelloWithSupportedVersions' - PASSED ssl_gtest.sh: #31: 'TlsConnectStreamTls13: Ssl30ClientHelloWithSupportedVersions' - PASSED ssl_gtest.sh: #32: 'TlsConnectStreamTls13: Ssl30ServerHelloWithSupportedVersions' - PASSED ssl_gtest.sh: #33: 'TlsConnectStreamTls13: ChangeCipherSpecBeforeClientHello13' - PASSED ssl_gtest.sh: #34: 'TlsConnectStreamTls13: ChangeCipherSpecBeforeClientHelloTwice' - PASSED ssl_gtest.sh: #35: 'TlsConnectStreamTls13: ChangeCipherSpecAfterClientHelloEmptySid' - PASSED ssl_gtest.sh: #36: 'TlsConnectStreamTls13: ChangeCipherSpecAfterServerHelloEmptySid' - PASSED ssl_gtest.sh: #37: 'TlsConnectStreamTls13: ChangeCipherSpecBeforeClientHello12' - PASSED ssl_gtest.sh: #38: 'TlsConnectStreamTls13: ChangeCipherSpecAfterFinished13' - PASSED ssl_gtest.sh: #39: 'TlsConnectStreamTls13: ExternalResumptionUseSecondTicket' - PASSED ssl_gtest.sh: #40: 'TlsConnectStreamTls13: ExternalTokenAfterHrr' - PASSED ssl_gtest.sh: #41: 'TlsConnectStreamTls13: ExternalTokenWithPeerId' - PASSED ssl_gtest.sh: #42: 'TlsConnectStreamTls13: RecordSizePlaintextExceed' - PASSED ssl_gtest.sh: #43: 'TlsConnectStreamTls13: RecordSizeCiphertextExceed' - PASSED ssl_gtest.sh: #44: 'TlsConnectStreamTls13: ClientHelloF5Padding' - PASSED ssl_gtest.sh: #45: 'TlsConnectStreamTls13: RecordSizeExceedPad' - PASSED ssl_gtest.sh: #46: 'TlsConnectStreamTls13: RecordSizeClientExtensionInvalid' - PASSED ssl_gtest.sh: #47: 'TlsConnectStreamTls13: ReplaceRecordLayerZeroRtt' - PASSED ssl_gtest.sh: #48: 'TlsConnectStreamTls13: ReplaceRecordLayerAsyncPostHandshake' - PASSED ssl_gtest.sh: #49: 'TlsConnectStreamTls13: ReplaceRecordLayerAsyncEarlyAuth' - PASSED ssl_gtest.sh: #50: 'TlsConnectStreamTls13: ForwardInvalidData' - PASSED ssl_gtest.sh: #51: 'TlsConnectStreamTls13: SuppressEndOfEarlyData' - PASSED ssl_gtest.sh: #52: 'TlsConnectStreamTls13: LargeRecord' - PASSED ssl_gtest.sh: #53: 'TlsConnectStreamTls13: TooLargeRecord' - PASSED ssl_gtest.sh: #54: 'TlsConnectStreamTls13: UnencryptedFinishedMessage' - PASSED ssl_gtest.sh: #55: 'TlsConnectStreamTls13: DecryptRecordClient' - PASSED ssl_gtest.sh: #56: 'TlsConnectStreamTls13: DecryptRecordServer' - PASSED ssl_gtest.sh: #57: 'TlsConnectStreamTls13: DropRecordServer' - PASSED ssl_gtest.sh: #58: 'TlsConnectStreamTls13: DropRecordClient' - PASSED ssl_gtest.sh: #59: 'TlsConnectStreamTls13: Tls13FailedWriteSecondFlight' - PASSED ssl_gtest.sh: #60: 'TlsConnectStreamTls13: KeyUpdateTooEarly_Client' - PASSED ssl_gtest.sh: #61: 'TlsConnectStreamTls13: KeyUpdateTooEarly_Server' - PASSED ssl_gtest.sh: #62: 'TlsConnectStreamTls13: TLSKeyUpdateWrongValueForUpdateRequested' - PASSED ssl_gtest.sh: #63: 'TlsConnectStreamTls13: TLSKeyUpdateWrongValueForLength_MessageTooLong' - PASSED ssl_gtest.sh: #64: 'TlsConnectStreamTls13: TLSKeyUpdateWrongValueForLength_MessageTooShort' - PASSED ssl_gtest.sh: #65: 'TlsConnectStreamTls13: RetryCallbackWithSessionTicketToken' - PASSED ssl_gtest.sh: #66: 'TlsConnectStreamTls13: RetryStatelessDamageFirstClientHello' - PASSED ssl_gtest.sh: #67: 'TlsConnectStreamTls13: RetryStatelessDamageSecondClientHello' - PASSED ssl_gtest.sh: #68: 'TlsConnectStreamTls13: SecondClientHelloSendSameTicket' - PASSED ssl_gtest.sh: #69: 'TlsConnectStreamTls13: RetryWithDifferentCipherSuite' - PASSED ssl_gtest.sh: #70: 'TlsConnectStreamTls13: HrrThenTls12' - PASSED ssl_gtest.sh: #71: 'TlsConnectStreamTls13: ZeroRttHrrThenTls12' - PASSED ssl_gtest.sh: #72: 'TlsConnectStreamTls13: HrrThenTls12SupportedVersions' - PASSED ssl_gtest.sh: #73: 'TlsConnectStreamTls13: ClientHelloExtensionPermutationWithPSK' - PASSED ssl_gtest.sh: #74: 'TlsConnectStreamTls13: ClientHelloExtensionPermutationProbabilisticTest' - PASSED ssl_gtest.sh: #75: 'TlsConnectStreamTls13: ClientHelloCertAuthXtnToleration' - PASSED ssl_gtest.sh: #76: 'TlsConnectStreamTls13: CustomExtensionAllNoopClient' - PASSED ssl_gtest.sh: #77: 'TlsConnectStreamTls13: CustomExtensionAllNoopServer' - PASSED ssl_gtest.sh: #78: 'TlsConnectStreamTls13: CustomExtensionEmptyWriterClient' - PASSED ssl_gtest.sh: #79: 'TlsConnectStreamTls13: CustomExtensionEmptyWriterServer' - PASSED ssl_gtest.sh: #80: 'TlsConnectStreamTls13: CustomExtensionWriterDisable' - PASSED ssl_gtest.sh: #81: 'TlsConnectStreamTls13: CustomExtensionOverride' - PASSED ssl_gtest.sh: #82: 'TlsConnectStreamTls13: CustomExtensionClientToServer' - PASSED ssl_gtest.sh: #83: 'TlsConnectStreamTls13: CustomExtensionServerToClientSH' - PASSED ssl_gtest.sh: #84: 'TlsConnectStreamTls13: CustomExtensionServerToClientEE' - PASSED ssl_gtest.sh: #85: 'TlsConnectStreamTls13: CustomExtensionUnsolicitedServer' - PASSED ssl_gtest.sh: #86: 'TlsConnectStreamTls13: CustomExtensionServerReject' - PASSED ssl_gtest.sh: #87: 'TlsConnectStreamTls13: CustomExtensionClientReject' - PASSED ssl_gtest.sh: #88: 'TlsConnectStreamTls13: CustomExtensionServerRejectAlert' - PASSED ssl_gtest.sh: #89: 'TlsConnectStreamTls13: CustomExtensionClientRejectAlert' - PASSED ssl_gtest.sh: #90: 'TlsConnectStreamTls13: CustomExtensionOnlyWriter' - PASSED ssl_gtest.sh: #91: 'TlsConnectStreamTls13: CustomExtensionOnlyHandler' - PASSED ssl_gtest.sh: #92: 'TlsConnectStreamTls13: CustomExtensionOverrunBuffer' - PASSED ssl_gtest.sh: #93: 'TlsConnectStreamTls13: CertificateCompression_CannotAddAlgorithmEmptyEncodingAndDecoding' - PASSED ssl_gtest.sh: #94: 'TlsConnectStreamTls13: CertificateCompression_CannotAddAlgorithmWithReservedID' - PASSED ssl_gtest.sh: #95: 'TlsConnectStreamTls13: CertificateCompression_AddingAlreadyExistingAlg' - PASSED ssl_gtest.sh: #96: 'TlsConnectStreamTls13: CertificateCompression_LengthIsOdd' - PASSED ssl_gtest.sh: #97: 'TlsConnectStreamTls13: CertificateCompression_LengthIsBiggerThanExpected' - PASSED ssl_gtest.sh: #98: 'TlsConnectStreamTls13: CertificateCompression_LengthIsSmallerThanExpected' - PASSED ssl_gtest.sh: #99: 'TlsConnectStreamTls13: CertificateCompression_ClientHelloUsedCompressedCertificate' - PASSED ssl_gtest.sh: #100: 'TlsConnectStreamTls13: CertificateCompression_ClientAuthUsesTheServerPreferredAlg' - PASSED ssl_gtest.sh: #101: 'TlsConnectStreamTls13: CertificateCompression_ServerReceivedUnexpectedEncodedCertificate' - PASSED ssl_gtest.sh: #102: 'TlsConnectStreamTls13: CertificateCompression_UnknownAlgorithmNoExtensionNegotiated' - PASSED ssl_gtest.sh: #103: 'TlsConnectStreamTls13: CertificateCompression_ServerReceivedUnexpectedEncodedCertificate_PostAuth' - PASSED ssl_gtest.sh: #104: 'TlsConnectStreamTls13: CertificateCompression_ServerReceivedUnexpectedEncodedCertificateAfterRequesting' - PASSED ssl_gtest.sh: #105: 'TlsConnectStreamTls13: CertificateCompression_OneCommonAlg' - PASSED ssl_gtest.sh: #106: 'TlsConnectStreamTls13: CertificateCompression_Preference' - PASSED ssl_gtest.sh: #107: 'TlsConnectStreamTls13: CertificateCompression_SameIDDifferentAlgs' - PASSED ssl_gtest.sh: #108: 'TlsConnectStreamTls13: CertificateCompression_NoCommonAlgs' - PASSED ssl_gtest.sh: #109: 'TlsConnectStreamTls13: CertificateCompression_TooManyAlgorithms' - PASSED ssl_gtest.sh: #110: 'TlsConnectStreamTls13: CertificateCompression_SameEncodingAsInCertificateExt' - PASSED ssl_gtest.sh: #111: 'TlsConnectStreamTls13: CertificateCompression_ServerChecksEncodingNoneInstalled' - PASSED ssl_gtest.sh: #112: 'TlsConnectStreamTls13: CertificateCompression_CompressionFunctionCreatesABufferOfSize0' - PASSED ssl_gtest.sh: #113: 'TlsConnectStreamTls13: CertificateCompression_ReceivedWrongAlgorithm' - PASSED ssl_gtest.sh: #114: 'TlsConnectStreamTls13: CertificateCompression_ReceivedZeroCompressedMessage' - PASSED ssl_gtest.sh: #115: 'TlsConnectStreamTls13: CertificateCompression_ReceivedLongerCompressedMessage' - PASSED ssl_gtest.sh: #116: 'TlsConnectStreamTls13: CertificateCompression_ReceivedCertificateTooLong' - PASSED ssl_gtest.sh: #117: 'TlsConnectStreamTls13: CertificateCompression_CertificateCannotEncode' - PASSED ssl_gtest.sh: #118: 'TlsConnectStreamTls13: CertificateCompression_CertificateCannotDecode' - PASSED ssl_gtest.sh: #119: 'TlsConnectStreamTls13: CertificateCompression_WrongDecodedCertificateLength' - PASSED ssl_gtest.sh: #120: 'TlsConnectStreamTls13: CertificateCompression_PostAuth' - PASSED ssl_gtest.sh: #121: 'TlsConnectStreamTls13: CertificateCompression_ClientOnlyDecodes' - PASSED ssl_gtest.sh: #122: 'TlsConnectStreamTls13: CertificateCompression_ClientOnlyDecodes_NoEncoding' - PASSED ssl_gtest.sh: #123: 'TlsConnectStreamTls13: CertificateCompression_TwoEncodedCertificateRequests' - PASSED ssl_gtest.sh: #124: 'TlsConnectStreamTls13: CertificateCompression_ServerDecodingIsNULL' - PASSED ssl_gtest.sh: #125: 'TlsConnectStreamTls13: ZeroRttUsingLateTicket' - PASSED ssl_gtest.sh: #126: 'TlsConnectStreamTls13: ZeroRttUsingLateTicketPha' - PASSED ssl_gtest.sh: #127: 'TlsConnectStreamTls13: ZeroRttUsingLateTicketClientAuth' - PASSED ssl_gtest.sh: #128: 'TlsConnectStreamTls13: ZeroRttLateReadTls' - PASSED ssl_gtest.sh: #129: 'TlsConnectStreamTls13: ZeroRttCoalesceReadTls' - PASSED ssl_gtest.sh: #130: 'TlsConnectStreamTls13: TimePassesByDefault' - PASSED ssl_gtest.sh: #131: 'TlsConnectStreamTls13: BadAntiReplayArgs' - PASSED ssl_gtest.sh: #132: 'TlsConnectStreamTls13: SuppressEndOfEarlyDataClientOnly' - PASSED ssl_gtest.sh: #133: 'SelfEncryptTest128: ShortKeyName' - PASSED ssl_gtest.sh: #134: 'SelfEncryptTest128: ShortIv' - PASSED ssl_gtest.sh: #135: 'SelfEncryptTest128: ShortCiphertextLen' - PASSED ssl_gtest.sh: #136: 'SelfEncryptTest128: ShortCiphertext' - PASSED ssl_gtest.sh: #137: 'SelfEncryptTest128: MacWithAESKeyEncrypt' - PASSED ssl_gtest.sh: #138: 'SelfEncryptTest128: AESWithMacKeyEncrypt' - PASSED ssl_gtest.sh: #139: 'SelfEncryptTest128: MacWithAESKeyDecrypt' - PASSED ssl_gtest.sh: #140: 'SelfEncryptTest128: AESWithMacKeyDecrypt' - PASSED ssl_gtest.sh: #141: 'TlsConnectTest: TestDowngradeDetectionToTls11' - PASSED ssl_gtest.sh: #142: 'TlsConnectTest: TestDowngradeDetectionToTls12' - PASSED ssl_gtest.sh: #143: 'TlsConnectTest: TestDisableDowngradeDetection' - PASSED ssl_gtest.sh: #144: 'TlsConnectTest: TestDowngradeDetectionToTls10' - PASSED ssl_gtest.sh: #145: 'TlsConnectTest: TestFallbackFromTls12' - PASSED ssl_gtest.sh: #146: 'TlsConnectTest: DisableFalseStartOnFallback' - PASSED ssl_gtest.sh: #147: 'TlsConnectTest: TestFallbackFromTls13' - PASSED ssl_gtest.sh: #148: 'TlsConnectTest: DisallowSSLv3HelloWithTLSv13Enabled' - PASSED ssl_gtest.sh: #149: 'TlsConnectTest: TlsSupportedVersionsEncoding' - PASSED ssl_gtest.sh: #150: 'TlsConnectTest: EchoTLS13CompatibilitySessionID' - PASSED ssl_gtest.sh: #151: 'TlsConnectTest: TLS13NonCompatModeSessionID' - PASSED ssl_gtest.sh: #152: 'TlsConnectTest: RenegotiationConfigTls13' - PASSED ssl_gtest.sh: #153: 'TlsConnectTest: Tls13RejectsRehandshakeClient' - PASSED ssl_gtest.sh: #154: 'TlsConnectTest: Tls13RejectsRehandshakeServer' - PASSED ssl_gtest.sh: #155: 'TlsConnectTest: TestTls13ResumptionTwice' - PASSED ssl_gtest.sh: #156: 'TlsConnectTest: TestTls13ResumptionDuplicateNST' - PASSED ssl_gtest.sh: #157: 'TlsConnectTest: TestTls13ResumptionDuplicateNSTWithToken' - PASSED ssl_gtest.sh: #158: 'TlsConnectTest: SendSessionTicketWithTicketsDisabled' - PASSED ssl_gtest.sh: #159: 'TlsConnectTest: SendTicketAfterResumption' - PASSED ssl_gtest.sh: #160: 'TlsConnectTest: SendSessionTicketInappropriate' - PASSED ssl_gtest.sh: #161: 'TlsConnectTest: SendSessionTicketMassiveToken' - PASSED ssl_gtest.sh: #162: 'TlsConnectTest: TestTls13ResumptionDowngrade' - PASSED ssl_gtest.sh: #163: 'TlsConnectTest: TestTls13ResumptionForcedDowngrade' - PASSED ssl_gtest.sh: #164: 'TlsConnectTest: HandshakeSecrets' - PASSED ssl_gtest.sh: #165: 'TlsConnectTest: ZeroRttSecrets' - PASSED ssl_gtest.sh: #166: 'TlsConnectTest: KeyUpdateSecrets' - PASSED ssl_gtest.sh: #167: 'TlsConnectTest: ConnectSSLv3' - PASSED ssl_gtest.sh: #168: 'TlsConnectTest: ConnectSSLv3ClientAuth' - PASSED ssl_gtest.sh: #169: 'TlsConnectTest: OneNRecordSplitting' - PASSED ssl_gtest.sh: #170: 'TlsConnectTest: KeyUpdateClient' - PASSED ssl_gtest.sh: #171: 'TlsConnectTest: KeyUpdateClientRequestUpdate' - PASSED ssl_gtest.sh: #172: 'TlsConnectTest: KeyUpdateServer' - PASSED ssl_gtest.sh: #173: 'TlsConnectTest: KeyUpdateServerRequestUpdate' - PASSED ssl_gtest.sh: #174: 'TlsConnectTest: KeyUpdateConsecutiveRequests' - PASSED ssl_gtest.sh: #175: 'TlsConnectTest: KeyUpdateLocalUpdateThenConsecutiveRequests' - PASSED ssl_gtest.sh: #176: 'TlsConnectTest: KeyUpdateMultiple' - PASSED ssl_gtest.sh: #177: 'TlsConnectTest: KeyUpdateBothRequest' - PASSED ssl_gtest.sh: #178: 'TlsConnectTest: KeyUpdateAutomaticOnWrite' - PASSED ssl_gtest.sh: #179: 'TlsConnectTest: KeyUpdateAutomaticOnRead' - PASSED ssl_gtest.sh: #180: 'TlsConnectTest: Select12AfterHelloRetryRequest' - PASSED ssl_gtest.sh: #181: 'TlsConnectTest: GatherExcessiveV3Record' - PASSED ssl_gtest.sh: #182: 'TlsConnectTest: DamageSecretHandleClientFinished' - PASSED ssl_gtest.sh: #183: 'TlsConnectTest: DamageSecretHandleServerFinished' - PASSED ssl_gtest.sh: #184: 'DtlsConnectTest: TestDtlsVersion11' - PASSED ssl_gtest.sh: #185: 'DtlsConnectTest: DtlsSupportedVersionsEncoding' - PASSED ssl_gtest.sh: #186: 'DtlsConnectTest: Dtls13VersionWorkaround' - PASSED ssl_gtest.sh: #187: 'Tls13NoSupportedVersions: Tls13ClientHelloWithoutSupportedVersionsServer12' - PASSED ssl_gtest.sh: #188: 'Tls13NoSupportedVersions: Tls13ClientHelloWithoutSupportedVersionsServer13' - PASSED ssl_gtest.sh: #189: 'Tls13NoSupportedVersions: Tls14ClientHelloWithoutSupportedVersionsServer13' - PASSED ssl_gtest.sh: #190: 'SSLv2ClientHelloTestF: Connect13' - PASSED ssl_gtest.sh: #191: 'SSLv2ClientHelloTestF: FallbackSCSV' - PASSED ssl_gtest.sh: #192: 'SSLv2ClientHelloTestF: InappropriateFallbackSCSV' - PASSED ssl_gtest.sh: #193: 'Tls13CompatTest: Disabled' - PASSED ssl_gtest.sh: #194: 'Tls13CompatTest: Enabled' - PASSED ssl_gtest.sh: #195: 'Tls13CompatTest: EnabledZeroRtt' - PASSED ssl_gtest.sh: #196: 'Tls13CompatTest: EnabledHrr' - PASSED ssl_gtest.sh: #197: 'Tls13CompatTest: EnabledStatelessHrr' - PASSED ssl_gtest.sh: #198: 'Tls13CompatTest: EnabledHrrZeroRtt' - PASSED ssl_gtest.sh: #199: 'Tls13CompatTest: EnabledAcceptedEch' - PASSED ssl_gtest.sh: #200: 'Tls13CompatTest: EnabledRejectedEch' - PASSED ssl_gtest.sh: #201: 'Tls13CompatTest: ChangeCipherSpecAfterClientHelloTwice' - PASSED ssl_gtest.sh: #202: 'Tls13CompatTest: ChangeCipherSpecAfterServerHelloTwice' - PASSED ssl_gtest.sh: #203: 'Tls13CompatTest: ConnectWith12ThenAttemptToResume13CompatMode' - PASSED ssl_gtest.sh: #204: 'TlsConnectDatagram13: CompatModeDtlsClient' - PASSED ssl_gtest.sh: #205: 'TlsConnectDatagram13: CompatModeDtlsServer' - PASSED ssl_gtest.sh: #206: 'TlsConnectDatagram13: SendSessionTicketDtls' - PASSED ssl_gtest.sh: #207: 'TlsConnectDatagram13: ForwardDataDtls' - PASSED ssl_gtest.sh: #208: 'TlsConnectDatagram13: AeadLimit' - PASSED ssl_gtest.sh: #209: 'TlsConnectDatagram13: ShortHeadersClient' - PASSED ssl_gtest.sh: #210: 'TlsConnectDatagram13: ShortHeadersServer' - PASSED ssl_gtest.sh: #211: 'TlsConnectDatagram13: DtlsAlternateShortHeader' - PASSED ssl_gtest.sh: #212: 'TlsConnectDatagram13: DTLSKU_ClientKUSucceed' - PASSED ssl_gtest.sh: #213: 'TlsConnectDatagram13: DTLSKU_ClientKUTwiceOnceIgnored' - PASSED ssl_gtest.sh: #214: 'TlsConnectDatagram13: DTLSKU_ServerKUSucceed' - PASSED ssl_gtest.sh: #215: 'TlsConnectDatagram13: DTLSKU_PreviousKUNotYetACKed' - PASSED ssl_gtest.sh: #216: 'TlsConnectDatagram13: DTLSKU_TwiceReceivedOnceIgnored' - PASSED ssl_gtest.sh: #217: 'TlsConnectDatagram13: DTLSKU_UpdateRequestedSucceed' - PASSED ssl_gtest.sh: #218: 'TlsConnectDatagram13: DTLSKU_UpdateRequestedTwiceSucceed' - PASSED ssl_gtest.sh: #219: 'TlsConnectDatagram13: DTLSKU_ServerUpdateRequestedSucceed' - PASSED ssl_gtest.sh: #220: 'TlsConnectDatagram13: DTLSKU_ServerUpdateRequestedTwiceSucceed' - PASSED ssl_gtest.sh: #221: 'TlsConnectDatagram13: DTLSKU_ClientServerConseqSucceed' - PASSED ssl_gtest.sh: #222: 'TlsConnectDatagram13: DTLSKU_ClientServerUpdateRequestedBothSucceed' - PASSED ssl_gtest.sh: #223: 'TlsConnectDatagram13: DTLSKU_KUInTheMiddleIsRejected' - PASSED ssl_gtest.sh: #224: 'TlsConnectDatagram13: DTLSKU_ClientImmediateSend' - PASSED ssl_gtest.sh: #225: 'TlsConnectDatagram13: DTLSKU_ServerImmediateSend' - PASSED ssl_gtest.sh: #226: 'TlsConnectDatagram13: DTLSKU_ClientImmediateSendAfterServerRead' - PASSED ssl_gtest.sh: #227: 'TlsConnectDatagram13: DTLSKU_ClientImmediateSendAfterServerReadAndACK' - PASSED ssl_gtest.sh: #228: 'TlsConnectDatagram13: DTLSKU_ClientWritingEpochUpdatedAfterReceivedACK' - PASSED ssl_gtest.sh: #229: 'TlsConnectDatagram13: DTLSKU_ClientMaxEpochReached' - PASSED ssl_gtest.sh: #230: 'TlsConnectDatagram13: DTLSKU_ClientMaxEpochReachedUpdateRequested' - PASSED ssl_gtest.sh: #231: 'TlsConnectDatagram13: DTLSKU_AutomaticOnWrite' - PASSED ssl_gtest.sh: #232: 'TlsConnectDatagram13: DTLSKU_AutomaticOnRead' - PASSED ssl_gtest.sh: #233: 'TlsConnectDatagram13: DTLSKU_CanSendBeforeThreshold' - PASSED ssl_gtest.sh: #234: 'TlsConnectDatagram13: DTLSKU_DiscardAfterThreshold' - PASSED ssl_gtest.sh: #235: 'TlsConnectDatagram13: DTLSKU_PreviousEpochIsAcceptedBeforeNew' - PASSED ssl_gtest.sh: #236: 'TlsConnectDatagram13: DTLSKU_2EpochsAgoIsRejected' - PASSED ssl_gtest.sh: #237: 'TlsConnectDatagram13: DTLSKU_PreviousEpochIsAcceptedAfterNew' - PASSED ssl_gtest.sh: #238: 'TlsConnectDatagram13: DTLS_EpochReconstruction' - PASSED ssl_gtest.sh: #239: 'TlsConnectDatagram13: DTLSKU_WrongValueForUpdateRequested' - PASSED ssl_gtest.sh: #240: 'TlsConnectDatagram13: DTLSKU_DamagedLength' - PASSED ssl_gtest.sh: #241: 'TlsConnectDatagram13: DTLSKU_DamagedLengthTooLong' - PASSED ssl_gtest.sh: #242: 'TlsConnectDatagram13: DTLSKU_DamagedFragmentLength' - PASSED ssl_gtest.sh: #243: 'TlsConnectDatagram13: DTLSKU_ModifACKEpoch' - PASSED ssl_gtest.sh: #244: 'TlsConnectDatagram13: DTLSKU_ModifACKSeqNum' - PASSED ssl_gtest.sh: #245: 'TlsConnectDatagram13: DTLSKU_TooEarly_ClientCannotSendKeyUpdate' - PASSED ssl_gtest.sh: #246: 'TlsConnectDatagram13: DTLSKeyUpdateTooEarly_ServerCannotSendKeyUpdate' - PASSED ssl_gtest.sh: #247: 'TlsConnectDatagram13: DTLSKU_TooEarly_Client' - PASSED ssl_gtest.sh: #248: 'TlsConnectDatagram13: DTLSKU_TooEarly_Server' - PASSED ssl_gtest.sh: #249: 'TlsConnectDatagram13: DropClientSecondFlightWithHelloRetry' - PASSED ssl_gtest.sh: #250: 'TlsConnectDatagram13: MessageSeq1ClientHello' - PASSED ssl_gtest.sh: #251: 'TlsConnectDatagram13: TlsVersionInDtls' - PASSED ssl_gtest.sh: #252: 'TlsConnectDatagram13: Dtls13RejectLegacyCookie' - PASSED ssl_gtest.sh: #253: 'TlsConnectDatagram13: SendOutOfOrderAppWithHandshakeKey' - PASSED ssl_gtest.sh: #254: 'TlsConnectDatagram13: SendOutOfOrderHsNonsenseWithHandshakeKey' - PASSED ssl_gtest.sh: #255: 'TlsConnectDatagram13: UnderflowSequenceNumber' - PASSED ssl_gtest.sh: #256: 'TlsConnectDatagram13: AuthCompleteBeforeFinished' - PASSED ssl_gtest.sh: #257: 'TlsConnectDatagram13: ZeroRttLateReadDtls' - PASSED ssl_gtest.sh: #258: 'TlsConnectDatagram13: ZeroRttLateArrivalDtls' - PASSED ssl_gtest.sh: #259: 'TlsConnectDatagram13: ZeroRttNoCoalesceReadDtls' - PASSED ssl_gtest.sh: #260: 'TlsConnectDatagram13: ZeroRttShortReadDtls' - PASSED ssl_gtest.sh: #261: 'RecordSizeDefaultsTest: RecordSizeBadValues' - PASSED ssl_gtest.sh: #262: 'RecordSizeDefaultsTest: RecordSizeGetValue' - PASSED ssl_gtest.sh: #263: 'MiscTest: NonExistentExperimentalAPI' - PASSED ssl_gtest.sh: #264: 'GatherV2ClientHelloTest: GatherV2RecordLongHeader' - PASSED ssl_gtest.sh: #265: 'GatherV2ClientHelloTest: GatherV2RecordLongHeader2' - PASSED ssl_gtest.sh: #266: 'GatherV2ClientHelloTest: GatherEmptyV2RecordLongHeader' - PASSED ssl_gtest.sh: #267: 'GatherV2ClientHelloTest: GatherV2RecordShortHeader' - PASSED ssl_gtest.sh: #268: 'GatherV2ClientHelloTest: GatherEmptyV2RecordShortHeader2' - PASSED ssl_gtest.sh: #269: 'GatherV2ClientHelloTest: GatherEmptyV2RecordShortHeader3' - PASSED ssl_gtest.sh: #270: 'GatherV2ClientHelloTest: GatherEmptyV2RecordShortHeader' - PASSED ssl_gtest.sh: #271: 'TlsExtensionTest13Stream: SignatureAlgorithmsPrecedingGarbage' - PASSED ssl_gtest.sh: #272: 'TlsExtensionTest13Stream: DropServerKeyShare' - PASSED ssl_gtest.sh: #273: 'TlsExtensionTest13Stream: WrongServerKeyShare' - PASSED ssl_gtest.sh: #274: 'TlsExtensionTest13Stream: UnknownServerKeyShare' - PASSED ssl_gtest.sh: #275: 'TlsExtensionTest13Stream: AddServerSignatureAlgorithmsOnResumption' - PASSED ssl_gtest.sh: #276: 'TlsExtensionTest13Stream: ResumeEmptyPskLabel' - PASSED ssl_gtest.sh: #277: 'TlsExtensionTest13Stream: ResumeIncorrectBinderValue' - PASSED ssl_gtest.sh: #278: 'TlsExtensionTest13Stream: ResumeIncorrectBinderLength' - PASSED ssl_gtest.sh: #279: 'TlsExtensionTest13Stream: ResumeBinderTooShort' - PASSED ssl_gtest.sh: #280: 'TlsExtensionTest13Stream: ResumeTwoPsks' - PASSED ssl_gtest.sh: #281: 'TlsExtensionTest13Stream: ResumeTwoIdentitiesOneBinder' - PASSED ssl_gtest.sh: #282: 'TlsExtensionTest13Stream: ResumeOneIdentityTwoBinders' - PASSED ssl_gtest.sh: #283: 'TlsExtensionTest13Stream: ResumePskExtensionNotLast' - PASSED ssl_gtest.sh: #284: 'TlsExtensionTest13Stream: ResumeNoKeModes' - PASSED ssl_gtest.sh: #285: 'TlsExtensionTest13Stream: ResumeBogusKeModes' - PASSED ssl_gtest.sh: #286: 'TlsCipherOrderTest: CipherOrderGet' - PASSED ssl_gtest.sh: #287: 'TlsCipherOrderTest: CipherOrderSet' - PASSED ssl_gtest.sh: #288: 'TlsCipherOrderTest: CipherOrderCopySocket' - PASSED ssl_gtest.sh: #289: 'TlsCipherOrderTest: CipherOrderSetLower' - PASSED ssl_gtest.sh: #290: 'TlsCipherOrderTest: CipherOrderSetControls' - PASSED ssl_gtest.sh: #291: 'TlsAgentStreamTestServer: ConfigureCertRsaPkcs1SignAndKEX' - PASSED ssl_gtest.sh: #292: 'TlsAgentStreamTestServer: ConfigureCertRsaPkcs1Sign' - PASSED ssl_gtest.sh: #293: 'TlsAgentStreamTestServer: ConfigureCertRsaPkcs1KEX' - PASSED ssl_gtest.sh: #294: 'TlsAgentStreamTestServer: ConfigureCertRsaPss' - PASSED ssl_gtest.sh: #295: 'TlsAgentStreamTestServer: Set0RttOptionClientHelloThenRead' - PASSED ssl_gtest.sh: #296: 'TlsAgentStreamTestClient: EncryptedExtensionsInClearTwoPieces' - PASSED ssl_gtest.sh: #297: 'TlsAgentStreamTestClient: Set0RttOptionThenWrite' - PASSED ssl_gtest.sh: #298: 'TlsAgentStreamTestClient: Set0RttOptionThenRead' - PASSED ssl_gtest.sh: #299: 'TlsAgentDgramTestClient: EncryptedExtensionsInClearTwoPieces' - PASSED ssl_gtest.sh: #300: 'TlsAgentDgramTestClient: AckWithBogusLengthField' - PASSED ssl_gtest.sh: #301: 'TlsAgentDgramTestClient: AckWithNonEvenLength' - PASSED ssl_gtest.sh: #302: 'AeadTest: AeadBadVersion' - PASSED ssl_gtest.sh: #303: 'AeadTest: AeadUnsupportedCipher' - PASSED ssl_gtest.sh: #304: 'AeadTest: AeadOlderCipher' - PASSED ssl_gtest.sh: #305: 'AeadTest: AeadNoLabel' - PASSED ssl_gtest.sh: #306: 'AeadTest: AeadLongLabel' - PASSED ssl_gtest.sh: #307: 'AeadTest: AeadNoPointer' - PASSED ssl_gtest.sh: #308: 'AeadTest: AeadAes128Gcm' - PASSED ssl_gtest.sh: #309: 'AeadTest: AeadAes256Gcm' - PASSED ssl_gtest.sh: #310: 'AeadTest: AeadChaCha20Poly1305' - PASSED ssl_gtest.sh: #311: 'KeyLogFileDTLS12/KeyLogFileTest: KeyLogFile/0 (1, 770)' - PASSED ssl_gtest.sh: #312: 'KeyLogFileDTLS12/KeyLogFileTest: KeyLogFile/1 (1, 771)' - PASSED ssl_gtest.sh: #313: 'KeyLogFileTLS12/KeyLogFileTest: KeyLogFile/0 (0, 769)' - PASSED ssl_gtest.sh: #314: 'KeyLogFileTLS12/KeyLogFileTest: KeyLogFile/1 (0, 770)' - PASSED ssl_gtest.sh: #315: 'KeyLogFileTLS12/KeyLogFileTest: KeyLogFile/2 (0, 771)' - PASSED ssl_gtest.sh: #316: 'KeyLogFileTLS13/KeyLogFileTest: KeyLogFile/0 (0, 772)' - PASSED ssl_gtest.sh: #317: 'KeyLogFileDTLS12/KeyLogFileUnsetTest: KeyLogFile/0 (1, 770)' - PASSED ssl_gtest.sh: #318: 'KeyLogFileDTLS12/KeyLogFileUnsetTest: KeyLogFile/1 (1, 771)' - PASSED ssl_gtest.sh: #319: 'KeyLogFileTLS12/KeyLogFileUnsetTest: KeyLogFile/0 (0, 769)' - PASSED ssl_gtest.sh: #320: 'KeyLogFileTLS12/KeyLogFileUnsetTest: KeyLogFile/1 (0, 770)' - PASSED ssl_gtest.sh: #321: 'KeyLogFileTLS12/KeyLogFileUnsetTest: KeyLogFile/2 (0, 771)' - PASSED ssl_gtest.sh: #322: 'KeyLogFileTLS13/KeyLogFileUnsetTest: KeyLogFile/0 (0, 772)' - PASSED ssl_gtest.sh: #323: 'KeyExchangeTest/TlsKeyExchangeTest13: Xyber768d00Supported/0 (0, 772)' - PASSED ssl_gtest.sh: #324: 'KeyExchangeTest/TlsKeyExchangeTest13: Xyber768d00Supported/1 (1, 772)' - PASSED ssl_gtest.sh: #325: 'KeyExchangeTest/TlsKeyExchangeTest13: Tls12ServerXyber768d00NotSupported/0 (0, 772)' - PASSED ssl_gtest.sh: #326: 'KeyExchangeTest/TlsKeyExchangeTest13: Tls12ServerXyber768d00NotSupported/1 (1, 772)' - PASSED ssl_gtest.sh: #327: 'KeyExchangeTest/TlsKeyExchangeTest13: Xyber768d00ClientDisabledByPolicy/0 (0, 772)' - PASSED ssl_gtest.sh: #328: 'KeyExchangeTest/TlsKeyExchangeTest13: Xyber768d00ClientDisabledByPolicy/1 (1, 772)' - PASSED ssl_gtest.sh: #329: 'KeyExchangeTest/TlsKeyExchangeTest13: Xyber768d00ServerDisabledByPolicy/0 (0, 772)' - PASSED ssl_gtest.sh: #330: 'KeyExchangeTest/TlsKeyExchangeTest13: Xyber768d00ServerDisabledByPolicy/1 (1, 772)' - PASSED ssl_gtest.sh: #331: 'KeyExchangeTest/TlsKeyExchangeTest13: Curve25519P256EqualPriorityClient13/0 (0, 772)' - PASSED ssl_gtest.sh: #332: 'KeyExchangeTest/TlsKeyExchangeTest13: Curve25519P256EqualPriorityClient13/1 (1, 772)' - PASSED ssl_gtest.sh: #333: 'KeyExchangeTest/TlsKeyExchangeTest13: Curve25519P256EqualPriorityServer13/0 (0, 772)' - PASSED ssl_gtest.sh: #334: 'KeyExchangeTest/TlsKeyExchangeTest13: Curve25519P256EqualPriorityServer13/1 (1, 772)' - PASSED ssl_gtest.sh: #335: 'KeyExchangeTest/TlsKeyExchangeTest13: EqualPriorityTestRetryECServer13/0 (0, 772)' - PASSED ssl_gtest.sh: #336: 'KeyExchangeTest/TlsKeyExchangeTest13: EqualPriorityTestRetryECServer13/1 (1, 772)' - PASSED ssl_gtest.sh: #337: 'KeyExchangeTest/TlsKeyExchangeTest13: NotEqualPriorityWithIntermediateGroup13/0 (0, 772)' - PASSED ssl_gtest.sh: #338: 'KeyExchangeTest/TlsKeyExchangeTest13: NotEqualPriorityWithIntermediateGroup13/1 (1, 772)' - PASSED ssl_gtest.sh: #339: 'KeyExchangeTest/TlsKeyExchangeTest13: NotEqualPriorityWithUnsupportedFFIntermediateGroup13/0 (0, 772)' - PASSED ssl_gtest.sh: #340: 'KeyExchangeTest/TlsKeyExchangeTest13: NotEqualPriorityWithUnsupportedFFIntermediateGroup13/1 (1, 772)' - PASSED ssl_gtest.sh: #341: 'KeyExchangeTest/TlsKeyExchangeTest13: NotEqualPriorityWithUnsupportedECIntermediateGroup13/0 (0, 772)' - PASSED ssl_gtest.sh: #342: 'KeyExchangeTest/TlsKeyExchangeTest13: NotEqualPriorityWithUnsupportedECIntermediateGroup13/1 (1, 772)' - PASSED ssl_gtest.sh: #343: 'KeyExchangeTest/TlsKeyExchangeTest13: EqualPriority13/0 (0, 772)' - PASSED ssl_gtest.sh: #344: 'KeyExchangeTest/TlsKeyExchangeTest13: EqualPriority13/1 (1, 772)' - PASSED ssl_gtest.sh: #345: 'KeyExchangeTest/TlsKeyExchangeTest13: MultipleClientShares/0 (0, 772)' - PASSED ssl_gtest.sh: #346: 'KeyExchangeTest/TlsKeyExchangeTest13: MultipleClientShares/1 (1, 772)' - PASSED ssl_gtest.sh: #347: 'KeyExchangeTest/TlsKeyExchangeTest: Tls12ClientXyber768d00NotSupported/0 (0, 772)' - PASSED ssl_gtest.sh: #348: 'KeyExchangeTest/TlsKeyExchangeTest: Tls12ClientXyber768d00NotSupported/1 (0, 771)' - PASSED ssl_gtest.sh: #349: 'KeyExchangeTest/TlsKeyExchangeTest: Tls12ClientXyber768d00NotSupported/2 (0, 770)' - PASSED ssl_gtest.sh: #350: 'KeyExchangeTest/TlsKeyExchangeTest: Tls12ClientXyber768d00NotSupported/3 (1, 772)' - PASSED ssl_gtest.sh: #351: 'KeyExchangeTest/TlsKeyExchangeTest: Tls12ClientXyber768d00NotSupported/4 (1, 771)' - PASSED ssl_gtest.sh: #352: 'KeyExchangeTest/TlsKeyExchangeTest: Tls12ClientXyber768d00NotSupported/5 (1, 770)' - PASSED ssl_gtest.sh: #353: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/0 (0, 772)' - PASSED ssl_gtest.sh: #354: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/1 (0, 771)' - PASSED ssl_gtest.sh: #355: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/2 (0, 770)' - PASSED ssl_gtest.sh: #356: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/3 (1, 772)' - PASSED ssl_gtest.sh: #357: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/4 (1, 771)' - PASSED ssl_gtest.sh: #358: 'KeyExchangeTest/TlsKeyExchangeTest: P384Priority/5 (1, 770)' - PASSED ssl_gtest.sh: #359: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/0 (0, 772)' - PASSED ssl_gtest.sh: #360: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/1 (0, 771)' - PASSED ssl_gtest.sh: #361: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/2 (0, 770)' - PASSED ssl_gtest.sh: #362: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/3 (1, 772)' - PASSED ssl_gtest.sh: #363: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/4 (1, 771)' - PASSED ssl_gtest.sh: #364: 'KeyExchangeTest/TlsKeyExchangeTest: DuplicateGroupConfig/5 (1, 770)' - PASSED ssl_gtest.sh: #365: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/0 (0, 772)' - PASSED ssl_gtest.sh: #366: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/1 (0, 771)' - PASSED ssl_gtest.sh: #367: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/2 (0, 770)' - PASSED ssl_gtest.sh: #368: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/3 (1, 772)' - PASSED ssl_gtest.sh: #369: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/4 (1, 771)' - PASSED ssl_gtest.sh: #370: 'KeyExchangeTest/TlsKeyExchangeTest: P384PriorityDHEnabled/5 (1, 770)' - PASSED ssl_gtest.sh: #371: 'KeyExchangeTest/TlsKeyExchangeTest: Curve25519/0 (0, 772)' - PASSED ssl_gtest.sh: #372: 'KeyExchangeTest/TlsKeyExchangeTest: Curve25519/1 (0, 771)' - PASSED ssl_gtest.sh: #373: 'KeyExchangeTest/TlsKeyExchangeTest: Curve25519/2 (0, 770)' - PASSED ssl_gtest.sh: #374: 'KeyExchangeTest/TlsKeyExchangeTest: Curve25519/3 (1, 772)' - PASSED ssl_gtest.sh: #375: 'KeyExchangeTest/TlsKeyExchangeTest: Curve25519/4 (1, 771)' - PASSED ssl_gtest.sh: #376: 'KeyExchangeTest/TlsKeyExchangeTest: Curve25519/5 (1, 770)' - PASSED ssl_gtest.sh: #377: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageClientShare/0 0' - PASSED ssl_gtest.sh: #378: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageClientShare/1 1' - PASSED ssl_gtest.sh: #379: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageClientShare/2 2' - PASSED ssl_gtest.sh: #380: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageClientShare/3 3' - PASSED ssl_gtest.sh: #381: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageClientShare/4 4' - PASSED ssl_gtest.sh: #382: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageClientShare/5 5' - PASSED ssl_gtest.sh: #383: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageServerShare/0 0' - PASSED ssl_gtest.sh: #384: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageServerShare/1 1' - PASSED ssl_gtest.sh: #385: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageServerShare/2 2' - PASSED ssl_gtest.sh: #386: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageServerShare/3 3' - PASSED ssl_gtest.sh: #387: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageServerShare/4 4' - PASSED ssl_gtest.sh: #388: 'TlsXyberDamageTest/TlsXyberDamageTest: DamageServerShare/5 5' - PASSED ssl_gtest.sh: #389: 'Version13Only/TlsConnectTls13: DCNotConfigured/0 0' - PASSED ssl_gtest.sh: #390: 'Version13Only/TlsConnectTls13: DCNotConfigured/1 1' - PASSED ssl_gtest.sh: #391: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP256/0 0' - PASSED ssl_gtest.sh: #392: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP256/1 1' - PASSED ssl_gtest.sh: #393: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP483/0 0' - PASSED ssl_gtest.sh: #394: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP483/1 1' - PASSED ssl_gtest.sh: #395: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP521/0 0' - PASSED ssl_gtest.sh: #396: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP521/1 1' - PASSED ssl_gtest.sh: #397: 'Version13Only/TlsConnectTls13: DCConnectRsaPssEcdsa/0 0' - PASSED ssl_gtest.sh: #398: 'Version13Only/TlsConnectTls13: DCConnectRsaPssEcdsa/1 1' - PASSED ssl_gtest.sh: #399: 'Version13Only/TlsConnectTls13: DCConnectRsaPssRsaPss/0 0' - PASSED ssl_gtest.sh: #400: 'Version13Only/TlsConnectTls13: DCConnectRsaPssRsaPss/1 1' - PASSED ssl_gtest.sh: #401: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP256RsaPss/0 0' - PASSED ssl_gtest.sh: #402: 'Version13Only/TlsConnectTls13: DCConnectEcdsaP256RsaPss/1 1' - PASSED ssl_gtest.sh: #403: 'Version13Only/TlsConnectTls13: DCReceiveUnadvertisedScheme/0 0' - PASSED ssl_gtest.sh: #404: 'Version13Only/TlsConnectTls13: DCReceiveUnadvertisedScheme/1 1' - PASSED ssl_gtest.sh: #405: 'Version13Only/TlsConnectTls13: DCConnectServerRsaeOnly/0 0' - PASSED ssl_gtest.sh: #406: 'Version13Only/TlsConnectTls13: DCConnectServerRsaeOnly/1 1' - PASSED ssl_gtest.sh: #407: 'Version13Only/TlsConnectTls13: DCConnectRsaeDelegator/0 0' - PASSED ssl_gtest.sh: #408: 'Version13Only/TlsConnectTls13: DCConnectRsaeDelegator/1 1' - PASSED ssl_gtest.sh: #409: 'Version13Only/TlsConnectTls13: DCConnectClientRsaeOnly/0 0' - PASSED ssl_gtest.sh: #410: 'Version13Only/TlsConnectTls13: DCConnectClientRsaeOnly/1 1' - PASSED ssl_gtest.sh: #411: 'Version13Only/TlsConnectTls13: DCConnectRsaeDcSpki/0 0' - PASSED ssl_gtest.sh: #412: 'Version13Only/TlsConnectTls13: DCConnectRsaeDcSpki/1 1' - PASSED ssl_gtest.sh: #413: 'Version13Only/TlsConnectTls13: DCWeakKey/0 0' - PASSED ssl_gtest.sh: #414: 'Version13Only/TlsConnectTls13: DCWeakKey/1 1' - PASSED ssl_gtest.sh: #415: 'Version13Only/TlsConnectTls13: DCAbortBadExpectedCertVerifyAlg/0 0' - PASSED ssl_gtest.sh: #416: 'Version13Only/TlsConnectTls13: DCAbortBadExpectedCertVerifyAlg/1 1' - PASSED ssl_gtest.sh: #417: 'Version13Only/TlsConnectTls13: DCAbortBadSignature/0 0' - PASSED ssl_gtest.sh: #418: 'Version13Only/TlsConnectTls13: DCAbortBadSignature/1 1' - PASSED ssl_gtest.sh: #419: 'Version13Only/TlsConnectTls13: DCAbortExpired/0 0' - PASSED ssl_gtest.sh: #420: 'Version13Only/TlsConnectTls13: DCAbortExpired/1 1' - PASSED ssl_gtest.sh: #421: 'Version13Only/TlsConnectTls13: DCAbortExcessiveTTL/0 0' - PASSED ssl_gtest.sh: #422: 'Version13Only/TlsConnectTls13: DCAbortExcessiveTTL/1 1' - PASSED ssl_gtest.sh: #423: 'Version13Only/TlsConnectTls13: DCAbortBadKeyUsage/0 0' - PASSED ssl_gtest.sh: #424: 'Version13Only/TlsConnectTls13: DCAbortBadKeyUsage/1 1' - PASSED ssl_gtest.sh: #425: 'Version13Only/TlsConnectTls13: DCConnectNoClientSupport/0 0' - PASSED ssl_gtest.sh: #426: 'Version13Only/TlsConnectTls13: DCConnectNoClientSupport/1 1' - PASSED ssl_gtest.sh: #427: 'Version13Only/TlsConnectTls13: DCConnectNoServerSupport/0 0' - PASSED ssl_gtest.sh: #428: 'Version13Only/TlsConnectTls13: DCConnectNoServerSupport/1 1' - PASSED ssl_gtest.sh: #429: 'Version13Only/TlsConnectTls13: DCConnectClientNoTls13/0 0' - PASSED ssl_gtest.sh: #430: 'Version13Only/TlsConnectTls13: DCConnectClientNoTls13/1 1' - PASSED ssl_gtest.sh: #431: 'Version13Only/TlsConnectTls13: DCConnectServerNoTls13/0 0' - PASSED ssl_gtest.sh: #432: 'Version13Only/TlsConnectTls13: DCConnectServerNoTls13/1 1' - PASSED ssl_gtest.sh: #433: 'Version13Only/TlsConnectTls13: DCConnectExpectedCertVerifyAlgNotSupported/0 0' - PASSED ssl_gtest.sh: #434: 'Version13Only/TlsConnectTls13: DCConnectExpectedCertVerifyAlgNotSupported/1 1' - PASSED ssl_gtest.sh: #435: 'Version13Only/TlsConnectTls13: DCCheckPreliminaryInfo/0 0' - PASSED ssl_gtest.sh: #436: 'Version13Only/TlsConnectTls13: DCCheckPreliminaryInfo/1 1' - PASSED ssl_gtest.sh: #437: 'Version13Only/TlsConnectTls13: DCCheckPreliminaryInfoNoDC/0 0' - PASSED ssl_gtest.sh: #438: 'Version13Only/TlsConnectTls13: DCCheckPreliminaryInfoNoDC/1 1' - PASSED ssl_gtest.sh: #439: 'Version13Only/TlsConnectTls13: DCRejectModifiedDCScheme/0 0' - PASSED ssl_gtest.sh: #440: 'Version13Only/TlsConnectTls13: DCRejectModifiedDCScheme/1 1' - PASSED ssl_gtest.sh: #441: 'Version13Only/TlsConnectTls13: DCRejectModifiedDCAuthKeyBits/0 0' - PASSED ssl_gtest.sh: #442: 'Version13Only/TlsConnectTls13: DCRejectModifiedDCAuthKeyBits/1 1' - PASSED ssl_gtest.sh: #443: 'Version13Only/TlsConnectTls13: TestTls13ResumeDifferentGroup/0 0' - PASSED ssl_gtest.sh: #444: 'Version13Only/TlsConnectTls13: TestTls13ResumeDifferentGroup/1 1' - PASSED ssl_gtest.sh: #445: 'Version13Only/TlsConnectTls13: TestTls13ResumeNoCertificateRequest/0 0' - PASSED ssl_gtest.sh: #446: 'Version13Only/TlsConnectTls13: TestTls13ResumeNoCertificateRequest/1 1' - PASSED ssl_gtest.sh: #447: 'Version13Only/TlsConnectTls13: WriteBeforeHandshakeCompleteOnResumption/0 0' - PASSED ssl_gtest.sh: #448: 'Version13Only/TlsConnectTls13: WriteBeforeHandshakeCompleteOnResumption/1 1' - PASSED ssl_gtest.sh: #449: 'Version13Only/TlsConnectTls13: ResumeClientCompatibleCipher/0 0' - PASSED ssl_gtest.sh: #450: 'Version13Only/TlsConnectTls13: ResumeClientCompatibleCipher/1 1' - PASSED ssl_gtest.sh: #451: 'Version13Only/TlsConnectTls13: ResumeServerCompatibleCipher/0 0' - PASSED ssl_gtest.sh: #452: 'Version13Only/TlsConnectTls13: ResumeServerCompatibleCipher/1 1' - PASSED ssl_gtest.sh: #453: 'Version13Only/TlsConnectTls13: UndefinedOuterContentType13/0 0' - PASSED ssl_gtest.sh: #454: 'Version13Only/TlsConnectTls13: UndefinedOuterContentType13/1 1' - PASSED ssl_gtest.sh: #455: 'Version13Only/TlsConnectTls13: UndefinedInnerContentType13/0 0' - PASSED ssl_gtest.sh: #456: 'Version13Only/TlsConnectTls13: UndefinedInnerContentType13/1 1' - PASSED ssl_gtest.sh: #457: 'Version13Only/TlsConnectTls13: CaptureAlertClient/0 0' - PASSED ssl_gtest.sh: #458: 'Version13Only/TlsConnectTls13: CaptureAlertClient/1 1' - PASSED ssl_gtest.sh: #459: 'Version13Only/TlsConnectTls13: WriteBeforeClientFinished/0 0' - PASSED ssl_gtest.sh: #460: 'Version13Only/TlsConnectTls13: WriteBeforeClientFinished/1 1' - PASSED ssl_gtest.sh: #461: 'Version13Only/TlsConnectTls13: WriteBeforeClientFinishedClientAuth/0 0' - PASSED ssl_gtest.sh: #462: 'Version13Only/TlsConnectTls13: WriteBeforeClientFinishedClientAuth/1 1' - PASSED ssl_gtest.sh: #463: 'Version13Only/TlsConnectTls13: WriteBeforeClientFinishedClientAuthRequired/0 0' - PASSED ssl_gtest.sh: #464: 'Version13Only/TlsConnectTls13: WriteBeforeClientFinishedClientAuthRequired/1 1' - PASSED ssl_gtest.sh: #465: 'Version13Only/TlsConnectTls13: UnknownAlert/0 0' - PASSED ssl_gtest.sh: #466: 'Version13Only/TlsConnectTls13: UnknownAlert/1 1' - PASSED ssl_gtest.sh: #467: 'Version13Only/TlsConnectTls13: AlertWrongLevel/0 0' - PASSED ssl_gtest.sh: #468: 'Version13Only/TlsConnectTls13: AlertWrongLevel/1 1' - PASSED ssl_gtest.sh: #469: 'Version13Only/TlsConnectTls13: UnknownRecord/0 0' - PASSED ssl_gtest.sh: #470: 'Version13Only/TlsConnectTls13: UnknownRecord/1 1' - PASSED ssl_gtest.sh: #471: 'Version13Only/TlsConnectTls13: HelloRetryRequestAbortsZeroRtt/0 0' - PASSED ssl_gtest.sh: #472: 'Version13Only/TlsConnectTls13: HelloRetryRequestAbortsZeroRtt/1 1' - PASSED ssl_gtest.sh: #473: 'Version13Only/TlsConnectTls13: SecondClientHelloRejectEarlyDataXtn/0 0' - PASSED ssl_gtest.sh: #474: 'Version13Only/TlsConnectTls13: SecondClientHelloRejectEarlyDataXtn/1 1' - PASSED ssl_gtest.sh: #475: 'Version13Only/TlsConnectTls13: RetryWithSameKeyShare/0 0' - PASSED ssl_gtest.sh: #476: 'Version13Only/TlsConnectTls13: RetryWithSameKeyShare/1 1' - PASSED ssl_gtest.sh: #477: 'Version13Only/TlsConnectTls13: RetryWithTwoShares/0 0' - PASSED ssl_gtest.sh: #478: 'Version13Only/TlsConnectTls13: RetryWithTwoShares/1 1' - PASSED ssl_gtest.sh: #479: 'Version13Only/TlsConnectTls13: RetryCallbackAccept/0 0' - PASSED ssl_gtest.sh: #480: 'Version13Only/TlsConnectTls13: RetryCallbackAccept/1 1' - PASSED ssl_gtest.sh: #481: 'Version13Only/TlsConnectTls13: RetryCallbackAcceptGroupMismatch/0 0' - PASSED ssl_gtest.sh: #482: 'Version13Only/TlsConnectTls13: RetryCallbackAcceptGroupMismatch/1 1' - PASSED ssl_gtest.sh: #483: 'Version13Only/TlsConnectTls13: RetryCallbackFail/0 0' - PASSED ssl_gtest.sh: #484: 'Version13Only/TlsConnectTls13: RetryCallbackFail/1 1' - PASSED ssl_gtest.sh: #485: 'Version13Only/TlsConnectTls13: RetryCallbackRequestHrrTwice/0 0' - PASSED ssl_gtest.sh: #486: 'Version13Only/TlsConnectTls13: RetryCallbackRequestHrrTwice/1 1' - PASSED ssl_gtest.sh: #487: 'Version13Only/TlsConnectTls13: RetryCallbackAcceptAndSetToken/0 0' - PASSED ssl_gtest.sh: #488: 'Version13Only/TlsConnectTls13: RetryCallbackAcceptAndSetToken/1 1' - PASSED ssl_gtest.sh: #489: 'Version13Only/TlsConnectTls13: RetryCallbackRejectAndSetToken/0 0' - PASSED ssl_gtest.sh: #490: 'Version13Only/TlsConnectTls13: RetryCallbackRejectAndSetToken/1 1' - PASSED ssl_gtest.sh: #491: 'Version13Only/TlsConnectTls13: RetryCallbackSetTooLargeToken/0 0' - PASSED ssl_gtest.sh: #492: 'Version13Only/TlsConnectTls13: RetryCallbackSetTooLargeToken/1 1' - PASSED ssl_gtest.sh: #493: 'Version13Only/TlsConnectTls13: RetryCallbackRetry/0 0' - PASSED ssl_gtest.sh: #494: 'Version13Only/TlsConnectTls13: RetryCallbackRetry/1 1' - PASSED ssl_gtest.sh: #495: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithAdditionalShares/0 0' - PASSED ssl_gtest.sh: #496: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithAdditionalShares/1 1' - PASSED ssl_gtest.sh: #497: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithGroupMismatch/0 0' - PASSED ssl_gtest.sh: #498: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithGroupMismatch/1 1' - PASSED ssl_gtest.sh: #499: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithToken/0 0' - PASSED ssl_gtest.sh: #500: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithToken/1 1' - PASSED ssl_gtest.sh: #501: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithTokenAndGroupMismatch/0 0' - PASSED ssl_gtest.sh: #502: 'Version13Only/TlsConnectTls13: RetryCallbackRetryWithTokenAndGroupMismatch/1 1' - PASSED ssl_gtest.sh: #503: 'Version13Only/TlsConnectTls13: VersionNumbersAfterRetry/0 0' - PASSED ssl_gtest.sh: #504: 'Version13Only/TlsConnectTls13: VersionNumbersAfterRetry/1 1' - PASSED ssl_gtest.sh: #505: 'Version13Only/TlsConnectTls13: RetryStateless/0 0' - PASSED ssl_gtest.sh: #506: 'Version13Only/TlsConnectTls13: RetryStateless/1 1' - PASSED ssl_gtest.sh: #507: 'Version13Only/TlsConnectTls13: RetryStatefulDropCookie/0 0' - PASSED ssl_gtest.sh: #508: 'Version13Only/TlsConnectTls13: RetryStatefulDropCookie/1 1' - PASSED ssl_gtest.sh: #509: 'Version13Only/TlsConnectTls13: RetryCookieEmpty/0 0' - PASSED ssl_gtest.sh: #510: 'Version13Only/TlsConnectTls13: RetryCookieEmpty/1 1' - PASSED ssl_gtest.sh: #511: 'Version13Only/TlsConnectTls13: RetryCookieWithExtras/0 0' - PASSED ssl_gtest.sh: #512: 'Version13Only/TlsConnectTls13: RetryCookieWithExtras/1 1' - PASSED ssl_gtest.sh: #513: 'Version13Only/TlsConnectTls13: RetryStatelessDisableSuiteClient/0 0' - PASSED ssl_gtest.sh: #514: 'Version13Only/TlsConnectTls13: RetryStatelessDisableSuiteClient/1 1' - PASSED ssl_gtest.sh: #515: 'Version13Only/TlsConnectTls13: RetryStatelessDisableSuiteServer/0 0' - PASSED ssl_gtest.sh: #516: 'Version13Only/TlsConnectTls13: RetryStatelessDisableSuiteServer/1 1' - PASSED ssl_gtest.sh: #517: 'Version13Only/TlsConnectTls13: RetryStatelessDisableGroupClient/0 0' - PASSED ssl_gtest.sh: #518: 'Version13Only/TlsConnectTls13: RetryStatelessDisableGroupClient/1 1' - PASSED ssl_gtest.sh: #519: 'Version13Only/TlsConnectTls13: RetryStatelessDisableGroupServer/0 0' - PASSED ssl_gtest.sh: #520: 'Version13Only/TlsConnectTls13: RetryStatelessDisableGroupServer/1 1' - PASSED ssl_gtest.sh: #521: 'Version13Only/TlsConnectTls13: RetryStatelessBadCookie/0 0' - PASSED ssl_gtest.sh: #522: 'Version13Only/TlsConnectTls13: RetryStatelessBadCookie/1 1' - PASSED ssl_gtest.sh: #523: 'Version13Only/TlsConnectTls13: TestTls13PskInvalidBinderValue/0 0' - PASSED ssl_gtest.sh: #524: 'Version13Only/TlsConnectTls13: TestTls13PskInvalidBinderValue/1 1' - PASSED ssl_gtest.sh: #525: 'Version13Only/TlsConnectTls13: ExporterSha384/0 0' - PASSED ssl_gtest.sh: #526: 'Version13Only/TlsConnectTls13: ExporterSha384/1 1' - PASSED ssl_gtest.sh: #527: 'Version13Only/TlsConnectTls13: ExporterContextEmptyIsSameAsNone/0 0' - PASSED ssl_gtest.sh: #528: 'Version13Only/TlsConnectTls13: ExporterContextEmptyIsSameAsNone/1 1' - PASSED ssl_gtest.sh: #529: 'Version13Only/TlsConnectTls13: EarlyExporter/0 0' - PASSED ssl_gtest.sh: #530: 'Version13Only/TlsConnectTls13: EarlyExporter/1 1' - PASSED ssl_gtest.sh: #531: 'Version13Only/TlsConnectTls13: EarlyExporterExternalPsk/0 0' - PASSED ssl_gtest.sh: #532: 'Version13Only/TlsConnectTls13: EarlyExporterExternalPsk/1 1' - PASSED ssl_gtest.sh: #533: 'Version13Only/TlsConnectTls13: DropSupportedGroupExtension/0 0' - PASSED ssl_gtest.sh: #534: 'Version13Only/TlsConnectTls13: DropSupportedGroupExtension/1 1' - PASSED ssl_gtest.sh: #535: 'Version13Only/TlsConnectTls13: UseLameGroup/0 0' - PASSED ssl_gtest.sh: #536: 'Version13Only/TlsConnectTls13: UseLameGroup/1 1' - PASSED ssl_gtest.sh: #537: 'Version13Only/TlsConnectTls13: SharesForBothEcdheAndDhe/0 0' - PASSED ssl_gtest.sh: #538: 'Version13Only/TlsConnectTls13: SharesForBothEcdheAndDhe/1 1' - PASSED ssl_gtest.sh: #539: 'Version13Only/TlsConnectTls13: NamedGroupMismatch13/0 0' - PASSED ssl_gtest.sh: #540: 'Version13Only/TlsConnectTls13: NamedGroupMismatch13/1 1' - PASSED ssl_gtest.sh: #541: 'Version13Only/TlsConnectTls13: ResumeFfdhe/0 0' - PASSED ssl_gtest.sh: #542: 'Version13Only/TlsConnectTls13: ResumeFfdhe/1 1' - PASSED ssl_gtest.sh: #543: 'Version13Only/TlsConnectTls13: DamageServerSignature/0 0' - PASSED ssl_gtest.sh: #544: 'Version13Only/TlsConnectTls13: DamageServerSignature/1 1' - PASSED ssl_gtest.sh: #545: 'Version13Only/TlsConnectTls13: ServerAuthRejectAsync/0 0' - PASSED ssl_gtest.sh: #546: 'Version13Only/TlsConnectTls13: ServerAuthRejectAsync/1 1' - PASSED ssl_gtest.sh: #547: 'Version13Only/TlsConnectTls13: SignatureSchemeCurveMismatch/0 0' - PASSED ssl_gtest.sh: #548: 'Version13Only/TlsConnectTls13: SignatureSchemeCurveMismatch/1 1' - PASSED ssl_gtest.sh: #549: 'Version13Only/TlsConnectTls13: SignatureSchemeBadConfig/0 0' - PASSED ssl_gtest.sh: #550: 'Version13Only/TlsConnectTls13: SignatureSchemeBadConfig/1 1' - PASSED ssl_gtest.sh: #551: 'Version13Only/TlsConnectTls13: SignatureAlgorithmDrop/0 0' - PASSED ssl_gtest.sh: #552: 'Version13Only/TlsConnectTls13: SignatureAlgorithmDrop/1 1' - PASSED ssl_gtest.sh: #553: 'Version13Only/TlsConnectTls13: UnsupportedSignatureSchemeAlert/0 0' - PASSED ssl_gtest.sh: #554: 'Version13Only/TlsConnectTls13: UnsupportedSignatureSchemeAlert/1 1' - PASSED ssl_gtest.sh: #555: 'Version13Only/TlsConnectTls13: InconsistentSignatureSchemeAlert/0 0' - PASSED ssl_gtest.sh: #556: 'Version13Only/TlsConnectTls13: InconsistentSignatureSchemeAlert/1 1' - PASSED ssl_gtest.sh: #557: 'Version13Only/TlsConnectTls13: AuthCompleteAfterFinished/0 0' - PASSED ssl_gtest.sh: #558: 'Version13Only/TlsConnectTls13: AuthCompleteAfterFinished/1 1' - PASSED ssl_gtest.sh: #559: 'Version13Only/TlsConnectTls13: AuthCompleteDelayed/0 0' - PASSED ssl_gtest.sh: #560: 'Version13Only/TlsConnectTls13: AuthCompleteDelayed/1 1' - PASSED ssl_gtest.sh: #561: 'Version13Only/TlsConnectTls13: AuthCompleteFailDelayed/0 0' - PASSED ssl_gtest.sh: #562: 'Version13Only/TlsConnectTls13: AuthCompleteFailDelayed/1 1' - PASSED ssl_gtest.sh: #563: 'Version13Only/TlsConnectTls13: Tls13CertDisabledGroup/0 0' - PASSED ssl_gtest.sh: #564: 'Version13Only/TlsConnectTls13: Tls13CertDisabledGroup/1 1' - PASSED ssl_gtest.sh: #565: 'Version13Only/TlsConnectTls13: Tls13DsaOnlyClient/0 0' - PASSED ssl_gtest.sh: #566: 'Version13Only/TlsConnectTls13: Tls13DsaOnlyClient/1 1' - PASSED ssl_gtest.sh: #567: 'Version13Only/TlsConnectTls13: Tls13DsaOnlyServer/0 0' - PASSED ssl_gtest.sh: #568: 'Version13Only/TlsConnectTls13: Tls13DsaOnlyServer/1 1' - PASSED ssl_gtest.sh: #569: 'Version13Only/TlsConnectTls13: Tls13Pkcs1OnlyClient/0 0' - PASSED ssl_gtest.sh: #570: 'Version13Only/TlsConnectTls13: Tls13Pkcs1OnlyClient/1 1' - PASSED ssl_gtest.sh: #571: 'Version13Only/TlsConnectTls13: Tls13Pkcs1OnlyServer/0 0' - PASSED ssl_gtest.sh: #572: 'Version13Only/TlsConnectTls13: Tls13Pkcs1OnlyServer/1 1' - PASSED ssl_gtest.sh: #573: 'Version13Only/TlsConnectTls13: Tls13DsaIsNotAdvertisedClient/0 0' - PASSED ssl_gtest.sh: #574: 'Version13Only/TlsConnectTls13: Tls13DsaIsNotAdvertisedClient/1 1' - PASSED ssl_gtest.sh: #575: 'Version13Only/TlsConnectTls13: Tls13DsaIsNotAdvertisedServer/0 0' - PASSED ssl_gtest.sh: #576: 'Version13Only/TlsConnectTls13: Tls13DsaIsNotAdvertisedServer/1 1' - PASSED ssl_gtest.sh: #577: 'Version13Only/TlsConnectTls13: Tls13RsaPkcs1IsAdvertisedClient/0 0' - PASSED ssl_gtest.sh: #578: 'Version13Only/TlsConnectTls13: Tls13RsaPkcs1IsAdvertisedClient/1 1' - PASSED ssl_gtest.sh: #579: 'Version13Only/TlsConnectTls13: Tls13RsaPkcs1IsAdvertisedServer/0 0' - PASSED ssl_gtest.sh: #580: 'Version13Only/TlsConnectTls13: Tls13RsaPkcs1IsAdvertisedServer/1 1' - PASSED ssl_gtest.sh: #581: 'Version13Only/TlsConnectTls13: ZeroRtt/0 0' - PASSED ssl_gtest.sh: #582: 'Version13Only/TlsConnectTls13: ZeroRtt/1 1' - PASSED ssl_gtest.sh: #583: 'Version13Only/TlsConnectTls13: ZeroRttServerRejectByOption/0 0' - PASSED ssl_gtest.sh: #584: 'Version13Only/TlsConnectTls13: ZeroRttServerRejectByOption/1 1' - PASSED ssl_gtest.sh: #585: 'Version13Only/TlsConnectTls13: ZeroRttApplicationReject/0 0' - PASSED ssl_gtest.sh: #586: 'Version13Only/TlsConnectTls13: ZeroRttApplicationReject/1 1' - PASSED ssl_gtest.sh: #587: 'Version13Only/TlsConnectTls13: ZeroRttApparentReplayAfterRestart/0 0' - PASSED ssl_gtest.sh: #588: 'Version13Only/TlsConnectTls13: ZeroRttApparentReplayAfterRestart/1 1' - PASSED ssl_gtest.sh: #589: 'Version13Only/TlsConnectTls13: ZeroRttOptionsSetLate/0 0' - PASSED ssl_gtest.sh: #590: 'Version13Only/TlsConnectTls13: ZeroRttOptionsSetLate/1 1' - PASSED ssl_gtest.sh: #591: 'Version13Only/TlsConnectTls13: ZeroRttServerForgetTicket/0 0' - PASSED ssl_gtest.sh: #592: 'Version13Only/TlsConnectTls13: ZeroRttServerForgetTicket/1 1' - PASSED ssl_gtest.sh: #593: 'Version13Only/TlsConnectTls13: ZeroRttServerOnly/0 0' - PASSED ssl_gtest.sh: #594: 'Version13Only/TlsConnectTls13: ZeroRttServerOnly/1 1' - PASSED ssl_gtest.sh: #595: 'Version13Only/TlsConnectTls13: ZeroRttRejectOldTicket/0 0' - PASSED ssl_gtest.sh: #596: 'Version13Only/TlsConnectTls13: ZeroRttRejectOldTicket/1 1' - PASSED ssl_gtest.sh: #597: 'Version13Only/TlsConnectTls13: ZeroRttRejectPrematureTicket/0 0' - PASSED ssl_gtest.sh: #598: 'Version13Only/TlsConnectTls13: ZeroRttRejectPrematureTicket/1 1' - PASSED ssl_gtest.sh: #599: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttAlpn/0 0' - PASSED ssl_gtest.sh: #600: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttAlpn/1 1' - PASSED ssl_gtest.sh: #601: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttAlpnChangeServer/0 0' - PASSED ssl_gtest.sh: #602: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttAlpnChangeServer/1 1' - PASSED ssl_gtest.sh: #603: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttNoAlpnServer/0 0' - PASSED ssl_gtest.sh: #604: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttNoAlpnServer/1 1' - PASSED ssl_gtest.sh: #605: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttNoAlpnClient/0 0' - PASSED ssl_gtest.sh: #606: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttNoAlpnClient/1 1' - PASSED ssl_gtest.sh: #607: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttAlpnChangeBoth/0 0' - PASSED ssl_gtest.sh: #608: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttAlpnChangeBoth/1 1' - PASSED ssl_gtest.sh: #609: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttDowngrade/0 0' - PASSED ssl_gtest.sh: #610: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttDowngrade/1 1' - PASSED ssl_gtest.sh: #611: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttDowngradeEarlyData/0 0' - PASSED ssl_gtest.sh: #612: 'Version13Only/TlsConnectTls13: TestTls13ZeroRttDowngradeEarlyData/1 1' - PASSED ssl_gtest.sh: #613: 'Version13Only/TlsConnectTls13: SendTooMuchEarlyData/0 0' - PASSED ssl_gtest.sh: #614: 'Version13Only/TlsConnectTls13: SendTooMuchEarlyData/1 1' - PASSED ssl_gtest.sh: #615: 'Version13Only/TlsConnectTls13: ReceiveTooMuchEarlyData/0 0' - PASSED ssl_gtest.sh: #616: 'Version13Only/TlsConnectTls13: ReceiveTooMuchEarlyData/1 1' - PASSED ssl_gtest.sh: #617: 'Version13Only/TlsConnectTls13: ZeroRttOrdering/0 0' - PASSED ssl_gtest.sh: #618: 'Version13Only/TlsConnectTls13: ZeroRttOrdering/1 1' - PASSED ssl_gtest.sh: #619: 'Version13Only/TlsConnectTls13: ZeroRttDifferentCompatibleCipher/0 0' - PASSED ssl_gtest.sh: #620: 'Version13Only/TlsConnectTls13: ZeroRttDifferentCompatibleCipher/1 1' - PASSED ssl_gtest.sh: #621: 'Version13Only/TlsConnectTls13: ZeroRttDifferentIncompatibleCipher/0 0' - PASSED ssl_gtest.sh: #622: 'Version13Only/TlsConnectTls13: ZeroRttDifferentIncompatibleCipher/1 1' - PASSED ssl_gtest.sh: #623: 'Tls13PskTest/Tls13PskTest: NormalExternal/0 (0, 4867)' - PASSED ssl_gtest.sh: #624: 'Tls13PskTest/Tls13PskTest: NormalExternal/1 (1, 4867)' - PASSED ssl_gtest.sh: #625: 'Tls13PskTest/Tls13PskTest: KeyTooLarge/0 (0, 4867)' - PASSED ssl_gtest.sh: #626: 'Tls13PskTest/Tls13PskTest: KeyTooLarge/1 (1, 4867)' - PASSED ssl_gtest.sh: #627: 'Tls13PskTest/Tls13PskTest: ClientVerifyHashType/0 (0, 4867)' - PASSED ssl_gtest.sh: #628: 'Tls13PskTest/Tls13PskTest: ClientVerifyHashType/1 (1, 4867)' - PASSED ssl_gtest.sh: #629: 'Tls13PskTest/Tls13PskTest: LabelMismatch/0 (0, 4867)' - PASSED ssl_gtest.sh: #630: 'Tls13PskTest/Tls13PskTest: LabelMismatch/1 (1, 4867)' - PASSED ssl_gtest.sh: #631: 'Tls13PskTest/Tls13PskTest: ResPskRetryStateless/0 (0, 4867)' - PASSED ssl_gtest.sh: #632: 'Tls13PskTest/Tls13PskTest: ResPskRetryStateless/1 (1, 4867)' - PASSED ssl_gtest.sh: #633: 'Tls13PskTest/Tls13PskTest: ExtPskRetryStateless/0 (0, 4867)' - PASSED ssl_gtest.sh: #634: 'Tls13PskTest/Tls13PskTest: ExtPskRetryStateless/1 (1, 4867)' - PASSED ssl_gtest.sh: #635: 'Tls13PskTest/Tls13PskTest: ClientOnly/0 (0, 4867)' - PASSED ssl_gtest.sh: #636: 'Tls13PskTest/Tls13PskTest: ClientOnly/1 (1, 4867)' - PASSED ssl_gtest.sh: #637: 'Tls13PskTest/Tls13PskTest: DropKexModes/0 (0, 4867)' - PASSED ssl_gtest.sh: #638: 'Tls13PskTest/Tls13PskTest: DropKexModes/1 (1, 4867)' - PASSED ssl_gtest.sh: #639: 'Tls13PskTest/Tls13PskTest: DropRequiredKeyShare/0 (0, 4867)' - PASSED ssl_gtest.sh: #640: 'Tls13PskTest/Tls13PskTest: DropRequiredKeyShare/1 (1, 4867)' - PASSED ssl_gtest.sh: #641: 'Tls13PskTest/Tls13PskTest: InvalidSelectedIdentity/0 (0, 4867)' - PASSED ssl_gtest.sh: #642: 'Tls13PskTest/Tls13PskTest: InvalidSelectedIdentity/1 (1, 4867)' - PASSED ssl_gtest.sh: #643: 'Tls13PskTest/Tls13PskTest: PreferEpsk/0 (0, 4867)' - PASSED ssl_gtest.sh: #644: 'Tls13PskTest/Tls13PskTest: PreferEpsk/1 (1, 4867)' - PASSED ssl_gtest.sh: #645: 'Tls13PskTest/Tls13PskTest: SuppressNewSessionTicket/0 (0, 4867)' - PASSED ssl_gtest.sh: #646: 'Tls13PskTest/Tls13PskTest: SuppressNewSessionTicket/1 (1, 4867)' - PASSED ssl_gtest.sh: #647: 'Tls13PskTest/Tls13PskTest: BadConfigValues/0 (0, 4867)' - PASSED ssl_gtest.sh: #648: 'Tls13PskTest/Tls13PskTest: BadConfigValues/1 (1, 4867)' - PASSED ssl_gtest.sh: #649: 'Tls13PskTest/Tls13PskTest: FallbackUnsupportedCiphersuite/0 (0, 4867)' - PASSED ssl_gtest.sh: #650: 'Tls13PskTest/Tls13PskTest: FallbackUnsupportedCiphersuite/1 (1, 4867)' - PASSED ssl_gtest.sh: #651: 'Tls13PskTest/Tls13PskTest: ExplicitSuiteNoOverlap/0 (0, 4867)' - PASSED ssl_gtest.sh: #652: 'Tls13PskTest/Tls13PskTest: ExplicitSuiteNoOverlap/1 (1, 4867)' - PASSED ssl_gtest.sh: #653: 'Tls13PskTest/Tls13PskTest: SuppressHandshakeCertReq/0 (0, 4867)' - PASSED ssl_gtest.sh: #654: 'Tls13PskTest/Tls13PskTest: SuppressHandshakeCertReq/1 (1, 4867)' - PASSED ssl_gtest.sh: #655: 'Tls13PskTest/Tls13PskTest: DisallowClientConfigWithoutServerCert/0 (0, 4867)' - PASSED ssl_gtest.sh: #656: 'Tls13PskTest/Tls13PskTest: DisallowClientConfigWithoutServerCert/1 (1, 4867)' - PASSED ssl_gtest.sh: #657: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttCiphers/0 (0, 4867)' - PASSED ssl_gtest.sh: #658: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttCiphers/1 (0, 4865)' - PASSED ssl_gtest.sh: #659: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttCiphers/2 (0, 4866)' - PASSED ssl_gtest.sh: #660: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttCiphers/3 (1, 4867)' - PASSED ssl_gtest.sh: #661: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttCiphers/4 (1, 4865)' - PASSED ssl_gtest.sh: #662: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttCiphers/5 (1, 4866)' - PASSED ssl_gtest.sh: #663: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttMaxEarlyData/0 (0, 4867)' - PASSED ssl_gtest.sh: #664: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttMaxEarlyData/1 (0, 4865)' - PASSED ssl_gtest.sh: #665: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttMaxEarlyData/2 (0, 4866)' - PASSED ssl_gtest.sh: #666: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttMaxEarlyData/3 (1, 4867)' - PASSED ssl_gtest.sh: #667: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttMaxEarlyData/4 (1, 4865)' - PASSED ssl_gtest.sh: #668: 'Tls13PskTestWithCiphers/Tls13PskTestWithCiphers: 0RttMaxEarlyData/5 (1, 4866)' - PASSED ssl_gtest.sh: #669: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/0 4' - PASSED ssl_gtest.sh: #670: 'AllHashFuncs/TlsHkdfTest: HkdfNullNull/1 5' - PASSED ssl_gtest.sh: #671: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/0 4' - PASSED ssl_gtest.sh: #672: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Only/1 5' - PASSED ssl_gtest.sh: #673: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/0 4' - PASSED ssl_gtest.sh: #674: 'AllHashFuncs/TlsHkdfTest: HkdfKey2Only/1 5' - PASSED ssl_gtest.sh: #675: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/0 4' - PASSED ssl_gtest.sh: #676: 'AllHashFuncs/TlsHkdfTest: HkdfKey1Key2/1 5' - PASSED ssl_gtest.sh: #677: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/0 4' - PASSED ssl_gtest.sh: #678: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabel/1 5' - PASSED ssl_gtest.sh: #679: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabelNoHash/0 4' - PASSED ssl_gtest.sh: #680: 'AllHashFuncs/TlsHkdfTest: HkdfExpandLabelNoHash/1 5' - PASSED ssl_gtest.sh: #681: 'AllHashFuncs/TlsHkdfTest: BadExtractWrapperInput/0 4' - PASSED ssl_gtest.sh: #682: 'AllHashFuncs/TlsHkdfTest: BadExtractWrapperInput/1 5' - PASSED ssl_gtest.sh: #683: 'AllHashFuncs/TlsHkdfTest: BadExpandLabelWrapperInput/0 4' - PASSED ssl_gtest.sh: #684: 'AllHashFuncs/TlsHkdfTest: BadExpandLabelWrapperInput/1 5' - PASSED ssl_gtest.sh: #685: 'VariousSizes/SelfEncryptTestVariable: SuccessCase/0 0' - PASSED ssl_gtest.sh: #686: 'VariousSizes/SelfEncryptTestVariable: SuccessCase/1 15' - PASSED ssl_gtest.sh: #687: 'VariousSizes/SelfEncryptTestVariable: SuccessCase/2 16' - PASSED ssl_gtest.sh: #688: 'VariousSizes/SelfEncryptTestVariable: SuccessCase/3 31' - PASSED ssl_gtest.sh: #689: 'VariousSizes/SelfEncryptTestVariable: SuccessCase/4 255' - PASSED ssl_gtest.sh: #690: 'VariousSizes/SelfEncryptTestVariable: SuccessCase/5 256' - PASSED ssl_gtest.sh: #691: 'VariousSizes/SelfEncryptTestVariable: SuccessCase/6 257' - PASSED ssl_gtest.sh: #692: 'VariousSizes/SelfEncryptTestVariable: WrongMacKey/0 0' - PASSED ssl_gtest.sh: #693: 'VariousSizes/SelfEncryptTestVariable: WrongMacKey/1 15' - PASSED ssl_gtest.sh: #694: 'VariousSizes/SelfEncryptTestVariable: WrongMacKey/2 16' - PASSED ssl_gtest.sh: #695: 'VariousSizes/SelfEncryptTestVariable: WrongMacKey/3 31' - PASSED ssl_gtest.sh: #696: 'VariousSizes/SelfEncryptTestVariable: WrongMacKey/4 255' - PASSED ssl_gtest.sh: #697: 'VariousSizes/SelfEncryptTestVariable: WrongMacKey/5 256' - PASSED ssl_gtest.sh: #698: 'VariousSizes/SelfEncryptTestVariable: WrongMacKey/6 257' - PASSED ssl_gtest.sh: #699: 'VariousSizes/SelfEncryptTestVariable: WrongKeyName/0 0' - PASSED ssl_gtest.sh: #700: 'VariousSizes/SelfEncryptTestVariable: WrongKeyName/1 15' - PASSED ssl_gtest.sh: #701: 'VariousSizes/SelfEncryptTestVariable: WrongKeyName/2 16' - PASSED ssl_gtest.sh: #702: 'VariousSizes/SelfEncryptTestVariable: WrongKeyName/3 31' - PASSED ssl_gtest.sh: #703: 'VariousSizes/SelfEncryptTestVariable: WrongKeyName/4 255' - PASSED ssl_gtest.sh: #704: 'VariousSizes/SelfEncryptTestVariable: WrongKeyName/5 256' - PASSED ssl_gtest.sh: #705: 'VariousSizes/SelfEncryptTestVariable: WrongKeyName/6 257' - PASSED ssl_gtest.sh: #706: 'VariousSizes/SelfEncryptTestVariable: AddAByte/0 0' - PASSED ssl_gtest.sh: #707: 'VariousSizes/SelfEncryptTestVariable: AddAByte/1 15' - PASSED ssl_gtest.sh: #708: 'VariousSizes/SelfEncryptTestVariable: AddAByte/2 16' - PASSED ssl_gtest.sh: #709: 'VariousSizes/SelfEncryptTestVariable: AddAByte/3 31' - PASSED ssl_gtest.sh: #710: 'VariousSizes/SelfEncryptTestVariable: AddAByte/4 255' - PASSED ssl_gtest.sh: #711: 'VariousSizes/SelfEncryptTestVariable: AddAByte/5 256' - PASSED ssl_gtest.sh: #712: 'VariousSizes/SelfEncryptTestVariable: AddAByte/6 257' - PASSED ssl_gtest.sh: #713: 'VariousSizes/SelfEncryptTestVariable: SubtractAByte/0 0' - PASSED ssl_gtest.sh: #714: 'VariousSizes/SelfEncryptTestVariable: SubtractAByte/1 15' - PASSED ssl_gtest.sh: #715: 'VariousSizes/SelfEncryptTestVariable: SubtractAByte/2 16' - PASSED ssl_gtest.sh: #716: 'VariousSizes/SelfEncryptTestVariable: SubtractAByte/3 31' - PASSED ssl_gtest.sh: #717: 'VariousSizes/SelfEncryptTestVariable: SubtractAByte/4 255' - PASSED ssl_gtest.sh: #718: 'VariousSizes/SelfEncryptTestVariable: SubtractAByte/5 256' - PASSED ssl_gtest.sh: #719: 'VariousSizes/SelfEncryptTestVariable: SubtractAByte/6 257' - PASSED ssl_gtest.sh: #720: 'VariousSizes/SelfEncryptTestVariable: BogusIv/0 0' - PASSED ssl_gtest.sh: #721: 'VariousSizes/SelfEncryptTestVariable: BogusIv/1 15' - PASSED ssl_gtest.sh: #722: 'VariousSizes/SelfEncryptTestVariable: BogusIv/2 16' - PASSED ssl_gtest.sh: #723: 'VariousSizes/SelfEncryptTestVariable: BogusIv/3 31' - PASSED ssl_gtest.sh: #724: 'VariousSizes/SelfEncryptTestVariable: BogusIv/4 255' - PASSED ssl_gtest.sh: #725: 'VariousSizes/SelfEncryptTestVariable: BogusIv/5 256' - PASSED ssl_gtest.sh: #726: 'VariousSizes/SelfEncryptTestVariable: BogusIv/6 257' - PASSED ssl_gtest.sh: #727: 'VariousSizes/SelfEncryptTestVariable: BogusCiphertext/0 0' - PASSED ssl_gtest.sh: #728: 'VariousSizes/SelfEncryptTestVariable: BogusCiphertext/1 15' - PASSED ssl_gtest.sh: #729: 'VariousSizes/SelfEncryptTestVariable: BogusCiphertext/2 16' - PASSED ssl_gtest.sh: #730: 'VariousSizes/SelfEncryptTestVariable: BogusCiphertext/3 31' - PASSED ssl_gtest.sh: #731: 'VariousSizes/SelfEncryptTestVariable: BogusCiphertext/4 255' - PASSED ssl_gtest.sh: #732: 'VariousSizes/SelfEncryptTestVariable: BogusCiphertext/5 256' - PASSED ssl_gtest.sh: #733: 'VariousSizes/SelfEncryptTestVariable: BogusCiphertext/6 257' - PASSED ssl_gtest.sh: #734: 'VariousSizes/SelfEncryptTestVariable: BadMac/0 0' - PASSED ssl_gtest.sh: #735: 'VariousSizes/SelfEncryptTestVariable: BadMac/1 15' - PASSED ssl_gtest.sh: #736: 'VariousSizes/SelfEncryptTestVariable: BadMac/2 16' - PASSED ssl_gtest.sh: #737: 'VariousSizes/SelfEncryptTestVariable: BadMac/3 31' - PASSED ssl_gtest.sh: #738: 'VariousSizes/SelfEncryptTestVariable: BadMac/4 255' - PASSED ssl_gtest.sh: #739: 'VariousSizes/SelfEncryptTestVariable: BadMac/5 256' - PASSED ssl_gtest.sh: #740: 'VariousSizes/SelfEncryptTestVariable: BadMac/6 257' - PASSED ssl_gtest.sh: #741: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/0 (0, 767, 767, 767, 767)' - PASSED ssl_gtest.sh: #742: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1 (0, 767, 767, 767, 768)' - PASSED ssl_gtest.sh: #743: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2 (0, 767, 767, 767, 769)' - PASSED ssl_gtest.sh: #744: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3 (0, 767, 767, 767, 770)' - PASSED ssl_gtest.sh: #745: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4 (0, 767, 767, 767, 771)' - PASSED ssl_gtest.sh: #746: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/5 (0, 767, 767, 767, 772)' - PASSED ssl_gtest.sh: #747: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/6 (0, 767, 767, 767, 773)' - PASSED ssl_gtest.sh: #748: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/7 (0, 767, 767, 768, 767)' - PASSED ssl_gtest.sh: #749: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/8 (0, 767, 767, 768, 768)' - PASSED ssl_gtest.sh: #750: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/9 (0, 767, 767, 768, 769)' - PASSED ssl_gtest.sh: #751: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/10 (0, 767, 767, 768, 770)' - PASSED ssl_gtest.sh: #752: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/11 (0, 767, 767, 768, 771)' - PASSED ssl_gtest.sh: #753: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/12 (0, 767, 767, 768, 772)' - PASSED ssl_gtest.sh: #754: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/13 (0, 767, 767, 768, 773)' - PASSED ssl_gtest.sh: #755: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/14 (0, 767, 767, 769, 767)' - PASSED ssl_gtest.sh: #756: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/15 (0, 767, 767, 769, 768)' - PASSED ssl_gtest.sh: #757: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/16 (0, 767, 767, 769, 769)' - PASSED ssl_gtest.sh: #758: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/17 (0, 767, 767, 769, 770)' - PASSED ssl_gtest.sh: #759: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/18 (0, 767, 767, 769, 771)' - PASSED ssl_gtest.sh: #760: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/19 (0, 767, 767, 769, 772)' - PASSED ssl_gtest.sh: #761: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/20 (0, 767, 767, 769, 773)' - PASSED ssl_gtest.sh: #762: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/21 (0, 767, 767, 770, 767)' - PASSED ssl_gtest.sh: #763: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/22 (0, 767, 767, 770, 768)' - PASSED ssl_gtest.sh: #764: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/23 (0, 767, 767, 770, 769)' - PASSED ssl_gtest.sh: #765: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/24 (0, 767, 767, 770, 770)' - PASSED ssl_gtest.sh: #766: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/25 (0, 767, 767, 770, 771)' - PASSED ssl_gtest.sh: #767: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/26 (0, 767, 767, 770, 772)' - PASSED ssl_gtest.sh: #768: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/27 (0, 767, 767, 770, 773)' - PASSED ssl_gtest.sh: #769: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/28 (0, 767, 767, 771, 767)' - PASSED ssl_gtest.sh: #770: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/29 (0, 767, 767, 771, 768)' - PASSED ssl_gtest.sh: #771: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/30 (0, 767, 767, 771, 769)' - PASSED ssl_gtest.sh: #772: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/31 (0, 767, 767, 771, 770)' - PASSED ssl_gtest.sh: #773: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/32 (0, 767, 767, 771, 771)' - PASSED ssl_gtest.sh: #774: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/33 (0, 767, 767, 771, 772)' - PASSED ssl_gtest.sh: #775: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/34 (0, 767, 767, 771, 773)' - PASSED ssl_gtest.sh: #776: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/35 (0, 767, 767, 772, 767)' - PASSED ssl_gtest.sh: #777: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/36 (0, 767, 767, 772, 768)' - PASSED ssl_gtest.sh: #778: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/37 (0, 767, 767, 772, 769)' - PASSED ssl_gtest.sh: #779: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/38 (0, 767, 767, 772, 770)' - PASSED ssl_gtest.sh: #780: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/39 (0, 767, 767, 772, 771)' - PASSED ssl_gtest.sh: #781: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/40 (0, 767, 767, 772, 772)' - PASSED ssl_gtest.sh: #782: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/41 (0, 767, 767, 772, 773)' - PASSED ssl_gtest.sh: #783: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/42 (0, 767, 767, 773, 767)' - PASSED ssl_gtest.sh: #784: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/43 (0, 767, 767, 773, 768)' - PASSED ssl_gtest.sh: #785: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/44 (0, 767, 767, 773, 769)' - PASSED ssl_gtest.sh: #786: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/45 (0, 767, 767, 773, 770)' - PASSED ssl_gtest.sh: #787: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/46 (0, 767, 767, 773, 771)' - PASSED ssl_gtest.sh: #788: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/47 (0, 767, 767, 773, 772)' - PASSED ssl_gtest.sh: #789: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/48 (0, 767, 767, 773, 773)' - PASSED ssl_gtest.sh: #790: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/49 (0, 767, 768, 767, 767)' - PASSED ssl_gtest.sh: #791: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/50 (0, 767, 768, 767, 768)' - PASSED ssl_gtest.sh: #792: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/51 (0, 767, 768, 767, 769)' - PASSED ssl_gtest.sh: #793: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/52 (0, 767, 768, 767, 770)' - PASSED ssl_gtest.sh: #794: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/53 (0, 767, 768, 767, 771)' - PASSED ssl_gtest.sh: #795: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/54 (0, 767, 768, 767, 772)' - PASSED ssl_gtest.sh: #796: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/55 (0, 767, 768, 767, 773)' - PASSED ssl_gtest.sh: #797: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/56 (0, 767, 768, 768, 767)' - PASSED ssl_gtest.sh: #798: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/57 (0, 767, 768, 768, 768)' - PASSED ssl_gtest.sh: #799: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/58 (0, 767, 768, 768, 769)' - PASSED ssl_gtest.sh: #800: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/59 (0, 767, 768, 768, 770)' - PASSED ssl_gtest.sh: #801: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/60 (0, 767, 768, 768, 771)' - PASSED ssl_gtest.sh: #802: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/61 (0, 767, 768, 768, 772)' - PASSED ssl_gtest.sh: #803: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/62 (0, 767, 768, 768, 773)' - PASSED ssl_gtest.sh: #804: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/63 (0, 767, 768, 769, 767)' - PASSED ssl_gtest.sh: #805: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/64 (0, 767, 768, 769, 768)' - PASSED ssl_gtest.sh: #806: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/65 (0, 767, 768, 769, 769)' - PASSED ssl_gtest.sh: #807: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/66 (0, 767, 768, 769, 770)' - PASSED ssl_gtest.sh: #808: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/67 (0, 767, 768, 769, 771)' - PASSED ssl_gtest.sh: #809: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/68 (0, 767, 768, 769, 772)' - PASSED ssl_gtest.sh: #810: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/69 (0, 767, 768, 769, 773)' - PASSED ssl_gtest.sh: #811: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/70 (0, 767, 768, 770, 767)' - PASSED ssl_gtest.sh: #812: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/71 (0, 767, 768, 770, 768)' - PASSED ssl_gtest.sh: #813: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/72 (0, 767, 768, 770, 769)' - PASSED ssl_gtest.sh: #814: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/73 (0, 767, 768, 770, 770)' - PASSED ssl_gtest.sh: #815: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/74 (0, 767, 768, 770, 771)' - PASSED ssl_gtest.sh: #816: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/75 (0, 767, 768, 770, 772)' - PASSED ssl_gtest.sh: #817: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/76 (0, 767, 768, 770, 773)' - PASSED ssl_gtest.sh: #818: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/77 (0, 767, 768, 771, 767)' - PASSED ssl_gtest.sh: #819: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/78 (0, 767, 768, 771, 768)' - PASSED ssl_gtest.sh: #820: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/79 (0, 767, 768, 771, 769)' - PASSED ssl_gtest.sh: #821: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/80 (0, 767, 768, 771, 770)' - PASSED ssl_gtest.sh: #822: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/81 (0, 767, 768, 771, 771)' - PASSED ssl_gtest.sh: #823: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/82 (0, 767, 768, 771, 772)' - PASSED ssl_gtest.sh: #824: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/83 (0, 767, 768, 771, 773)' - PASSED ssl_gtest.sh: #825: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/84 (0, 767, 768, 772, 767)' - PASSED ssl_gtest.sh: #826: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/85 (0, 767, 768, 772, 768)' - PASSED ssl_gtest.sh: #827: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/86 (0, 767, 768, 772, 769)' - PASSED ssl_gtest.sh: #828: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/87 (0, 767, 768, 772, 770)' - PASSED ssl_gtest.sh: #829: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/88 (0, 767, 768, 772, 771)' - PASSED ssl_gtest.sh: #830: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/89 (0, 767, 768, 772, 772)' - PASSED ssl_gtest.sh: #831: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/90 (0, 767, 768, 772, 773)' - PASSED ssl_gtest.sh: #832: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/91 (0, 767, 768, 773, 767)' - PASSED ssl_gtest.sh: #833: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/92 (0, 767, 768, 773, 768)' - PASSED ssl_gtest.sh: #834: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/93 (0, 767, 768, 773, 769)' - PASSED ssl_gtest.sh: #835: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/94 (0, 767, 768, 773, 770)' - PASSED ssl_gtest.sh: #836: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/95 (0, 767, 768, 773, 771)' - PASSED ssl_gtest.sh: #837: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/96 (0, 767, 768, 773, 772)' - PASSED ssl_gtest.sh: #838: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/97 (0, 767, 768, 773, 773)' - PASSED ssl_gtest.sh: #839: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/98 (0, 767, 769, 767, 767)' - PASSED ssl_gtest.sh: #840: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/99 (0, 767, 769, 767, 768)' - PASSED ssl_gtest.sh: #841: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/100 (0, 767, 769, 767, 769)' - PASSED ssl_gtest.sh: #842: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/101 (0, 767, 769, 767, 770)' - PASSED ssl_gtest.sh: #843: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/102 (0, 767, 769, 767, 771)' - PASSED ssl_gtest.sh: #844: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/103 (0, 767, 769, 767, 772)' - PASSED ssl_gtest.sh: #845: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/104 (0, 767, 769, 767, 773)' - PASSED ssl_gtest.sh: #846: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/105 (0, 767, 769, 768, 767)' - PASSED ssl_gtest.sh: #847: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/106 (0, 767, 769, 768, 768)' - PASSED ssl_gtest.sh: #848: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/107 (0, 767, 769, 768, 769)' - PASSED ssl_gtest.sh: #849: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/108 (0, 767, 769, 768, 770)' - PASSED ssl_gtest.sh: #850: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/109 (0, 767, 769, 768, 771)' - PASSED ssl_gtest.sh: #851: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/110 (0, 767, 769, 768, 772)' - PASSED ssl_gtest.sh: #852: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/111 (0, 767, 769, 768, 773)' - PASSED ssl_gtest.sh: #853: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/112 (0, 767, 769, 769, 767)' - PASSED ssl_gtest.sh: #854: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/113 (0, 767, 769, 769, 768)' - PASSED ssl_gtest.sh: #855: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/114 (0, 767, 769, 769, 769)' - PASSED ssl_gtest.sh: #856: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/115 (0, 767, 769, 769, 770)' - PASSED ssl_gtest.sh: #857: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/116 (0, 767, 769, 769, 771)' - PASSED ssl_gtest.sh: #858: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/117 (0, 767, 769, 769, 772)' - PASSED ssl_gtest.sh: #859: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/118 (0, 767, 769, 769, 773)' - PASSED ssl_gtest.sh: #860: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/119 (0, 767, 769, 770, 767)' - PASSED ssl_gtest.sh: #861: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/120 (0, 767, 769, 770, 768)' - PASSED ssl_gtest.sh: #862: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/121 (0, 767, 769, 770, 769)' - PASSED ssl_gtest.sh: #863: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/122 (0, 767, 769, 770, 770)' - PASSED ssl_gtest.sh: #864: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/123 (0, 767, 769, 770, 771)' - PASSED ssl_gtest.sh: #865: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/124 (0, 767, 769, 770, 772)' - PASSED ssl_gtest.sh: #866: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/125 (0, 767, 769, 770, 773)' - PASSED ssl_gtest.sh: #867: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/126 (0, 767, 769, 771, 767)' - PASSED ssl_gtest.sh: #868: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/127 (0, 767, 769, 771, 768)' - PASSED ssl_gtest.sh: #869: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/128 (0, 767, 769, 771, 769)' - PASSED ssl_gtest.sh: #870: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/129 (0, 767, 769, 771, 770)' - PASSED ssl_gtest.sh: #871: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/130 (0, 767, 769, 771, 771)' - PASSED ssl_gtest.sh: #872: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/131 (0, 767, 769, 771, 772)' - PASSED ssl_gtest.sh: #873: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/132 (0, 767, 769, 771, 773)' - PASSED ssl_gtest.sh: #874: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/133 (0, 767, 769, 772, 767)' - PASSED ssl_gtest.sh: #875: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/134 (0, 767, 769, 772, 768)' - PASSED ssl_gtest.sh: #876: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/135 (0, 767, 769, 772, 769)' - PASSED ssl_gtest.sh: #877: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/136 (0, 767, 769, 772, 770)' - PASSED ssl_gtest.sh: #878: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/137 (0, 767, 769, 772, 771)' - PASSED ssl_gtest.sh: #879: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/138 (0, 767, 769, 772, 772)' - PASSED ssl_gtest.sh: #880: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/139 (0, 767, 769, 772, 773)' - PASSED ssl_gtest.sh: #881: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/140 (0, 767, 769, 773, 767)' - PASSED ssl_gtest.sh: #882: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/141 (0, 767, 769, 773, 768)' - PASSED ssl_gtest.sh: #883: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/142 (0, 767, 769, 773, 769)' - PASSED ssl_gtest.sh: #884: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/143 (0, 767, 769, 773, 770)' - PASSED ssl_gtest.sh: #885: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/144 (0, 767, 769, 773, 771)' - PASSED ssl_gtest.sh: #886: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/145 (0, 767, 769, 773, 772)' - PASSED ssl_gtest.sh: #887: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/146 (0, 767, 769, 773, 773)' - PASSED ssl_gtest.sh: #888: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/147 (0, 767, 770, 767, 767)' - PASSED ssl_gtest.sh: #889: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/148 (0, 767, 770, 767, 768)' - PASSED ssl_gtest.sh: #890: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/149 (0, 767, 770, 767, 769)' - PASSED ssl_gtest.sh: #891: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/150 (0, 767, 770, 767, 770)' - PASSED ssl_gtest.sh: #892: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/151 (0, 767, 770, 767, 771)' - PASSED ssl_gtest.sh: #893: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/152 (0, 767, 770, 767, 772)' - PASSED ssl_gtest.sh: #894: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/153 (0, 767, 770, 767, 773)' - PASSED ssl_gtest.sh: #895: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/154 (0, 767, 770, 768, 767)' - PASSED ssl_gtest.sh: #896: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/155 (0, 767, 770, 768, 768)' - PASSED ssl_gtest.sh: #897: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/156 (0, 767, 770, 768, 769)' - PASSED ssl_gtest.sh: #898: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/157 (0, 767, 770, 768, 770)' - PASSED ssl_gtest.sh: #899: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/158 (0, 767, 770, 768, 771)' - PASSED ssl_gtest.sh: #900: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/159 (0, 767, 770, 768, 772)' - PASSED ssl_gtest.sh: #901: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/160 (0, 767, 770, 768, 773)' - PASSED ssl_gtest.sh: #902: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/161 (0, 767, 770, 769, 767)' - PASSED ssl_gtest.sh: #903: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/162 (0, 767, 770, 769, 768)' - PASSED ssl_gtest.sh: #904: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/163 (0, 767, 770, 769, 769)' - PASSED ssl_gtest.sh: #905: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/164 (0, 767, 770, 769, 770)' - PASSED ssl_gtest.sh: #906: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/165 (0, 767, 770, 769, 771)' - PASSED ssl_gtest.sh: #907: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/166 (0, 767, 770, 769, 772)' - PASSED ssl_gtest.sh: #908: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/167 (0, 767, 770, 769, 773)' - PASSED ssl_gtest.sh: #909: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/168 (0, 767, 770, 770, 767)' - PASSED ssl_gtest.sh: #910: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/169 (0, 767, 770, 770, 768)' - PASSED ssl_gtest.sh: #911: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/170 (0, 767, 770, 770, 769)' - PASSED ssl_gtest.sh: #912: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/171 (0, 767, 770, 770, 770)' - PASSED ssl_gtest.sh: #913: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/172 (0, 767, 770, 770, 771)' - PASSED ssl_gtest.sh: #914: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/173 (0, 767, 770, 770, 772)' - PASSED ssl_gtest.sh: #915: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/174 (0, 767, 770, 770, 773)' - PASSED ssl_gtest.sh: #916: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/175 (0, 767, 770, 771, 767)' - PASSED ssl_gtest.sh: #917: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/176 (0, 767, 770, 771, 768)' - PASSED ssl_gtest.sh: #918: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/177 (0, 767, 770, 771, 769)' - PASSED ssl_gtest.sh: #919: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/178 (0, 767, 770, 771, 770)' - PASSED ssl_gtest.sh: #920: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/179 (0, 767, 770, 771, 771)' - PASSED ssl_gtest.sh: #921: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/180 (0, 767, 770, 771, 772)' - PASSED ssl_gtest.sh: #922: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/181 (0, 767, 770, 771, 773)' - PASSED ssl_gtest.sh: #923: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/182 (0, 767, 770, 772, 767)' - PASSED ssl_gtest.sh: #924: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/183 (0, 767, 770, 772, 768)' - PASSED ssl_gtest.sh: #925: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/184 (0, 767, 770, 772, 769)' - PASSED ssl_gtest.sh: #926: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/185 (0, 767, 770, 772, 770)' - PASSED ssl_gtest.sh: #927: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/186 (0, 767, 770, 772, 771)' - PASSED ssl_gtest.sh: #928: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/187 (0, 767, 770, 772, 772)' - PASSED ssl_gtest.sh: #929: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/188 (0, 767, 770, 772, 773)' - PASSED ssl_gtest.sh: #930: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/189 (0, 767, 770, 773, 767)' - PASSED ssl_gtest.sh: #931: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/190 (0, 767, 770, 773, 768)' - PASSED ssl_gtest.sh: #932: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/191 (0, 767, 770, 773, 769)' - PASSED ssl_gtest.sh: #933: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/192 (0, 767, 770, 773, 770)' - PASSED ssl_gtest.sh: #934: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/193 (0, 767, 770, 773, 771)' - PASSED ssl_gtest.sh: #935: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/194 (0, 767, 770, 773, 772)' - PASSED ssl_gtest.sh: #936: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/195 (0, 767, 770, 773, 773)' - PASSED ssl_gtest.sh: #937: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/196 (0, 767, 771, 767, 767)' - PASSED ssl_gtest.sh: #938: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/197 (0, 767, 771, 767, 768)' - PASSED ssl_gtest.sh: #939: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/198 (0, 767, 771, 767, 769)' - PASSED ssl_gtest.sh: #940: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/199 (0, 767, 771, 767, 770)' - PASSED ssl_gtest.sh: #941: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/200 (0, 767, 771, 767, 771)' - PASSED ssl_gtest.sh: #942: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/201 (0, 767, 771, 767, 772)' - PASSED ssl_gtest.sh: #943: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/202 (0, 767, 771, 767, 773)' - PASSED ssl_gtest.sh: #944: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/203 (0, 767, 771, 768, 767)' - PASSED ssl_gtest.sh: #945: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/204 (0, 767, 771, 768, 768)' - PASSED ssl_gtest.sh: #946: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/205 (0, 767, 771, 768, 769)' - PASSED ssl_gtest.sh: #947: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/206 (0, 767, 771, 768, 770)' - PASSED ssl_gtest.sh: #948: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/207 (0, 767, 771, 768, 771)' - PASSED ssl_gtest.sh: #949: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/208 (0, 767, 771, 768, 772)' - PASSED ssl_gtest.sh: #950: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/209 (0, 767, 771, 768, 773)' - PASSED ssl_gtest.sh: #951: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/210 (0, 767, 771, 769, 767)' - PASSED ssl_gtest.sh: #952: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/211 (0, 767, 771, 769, 768)' - PASSED ssl_gtest.sh: #953: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/212 (0, 767, 771, 769, 769)' - PASSED ssl_gtest.sh: #954: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/213 (0, 767, 771, 769, 770)' - PASSED ssl_gtest.sh: #955: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/214 (0, 767, 771, 769, 771)' - PASSED ssl_gtest.sh: #956: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/215 (0, 767, 771, 769, 772)' - PASSED ssl_gtest.sh: #957: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/216 (0, 767, 771, 769, 773)' - PASSED ssl_gtest.sh: #958: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/217 (0, 767, 771, 770, 767)' - PASSED ssl_gtest.sh: #959: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/218 (0, 767, 771, 770, 768)' - PASSED ssl_gtest.sh: #960: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/219 (0, 767, 771, 770, 769)' - PASSED ssl_gtest.sh: #961: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/220 (0, 767, 771, 770, 770)' - PASSED ssl_gtest.sh: #962: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/221 (0, 767, 771, 770, 771)' - PASSED ssl_gtest.sh: #963: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/222 (0, 767, 771, 770, 772)' - PASSED ssl_gtest.sh: #964: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/223 (0, 767, 771, 770, 773)' - PASSED ssl_gtest.sh: #965: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/224 (0, 767, 771, 771, 767)' - PASSED ssl_gtest.sh: #966: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/225 (0, 767, 771, 771, 768)' - PASSED ssl_gtest.sh: #967: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/226 (0, 767, 771, 771, 769)' - PASSED ssl_gtest.sh: #968: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/227 (0, 767, 771, 771, 770)' - PASSED ssl_gtest.sh: #969: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/228 (0, 767, 771, 771, 771)' - PASSED ssl_gtest.sh: #970: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/229 (0, 767, 771, 771, 772)' - PASSED ssl_gtest.sh: #971: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/230 (0, 767, 771, 771, 773)' - PASSED ssl_gtest.sh: #972: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/231 (0, 767, 771, 772, 767)' - PASSED ssl_gtest.sh: #973: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/232 (0, 767, 771, 772, 768)' - PASSED ssl_gtest.sh: #974: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/233 (0, 767, 771, 772, 769)' - PASSED ssl_gtest.sh: #975: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/234 (0, 767, 771, 772, 770)' - PASSED ssl_gtest.sh: #976: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/235 (0, 767, 771, 772, 771)' - PASSED ssl_gtest.sh: #977: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/236 (0, 767, 771, 772, 772)' - PASSED ssl_gtest.sh: #978: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/237 (0, 767, 771, 772, 773)' - PASSED ssl_gtest.sh: #979: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/238 (0, 767, 771, 773, 767)' - PASSED ssl_gtest.sh: #980: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/239 (0, 767, 771, 773, 768)' - PASSED ssl_gtest.sh: #981: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/240 (0, 767, 771, 773, 769)' - PASSED ssl_gtest.sh: #982: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/241 (0, 767, 771, 773, 770)' - PASSED ssl_gtest.sh: #983: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/242 (0, 767, 771, 773, 771)' - PASSED ssl_gtest.sh: #984: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/243 (0, 767, 771, 773, 772)' - PASSED ssl_gtest.sh: #985: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/244 (0, 767, 771, 773, 773)' - PASSED ssl_gtest.sh: #986: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/245 (0, 767, 772, 767, 767)' - PASSED ssl_gtest.sh: #987: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/246 (0, 767, 772, 767, 768)' - PASSED ssl_gtest.sh: #988: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/247 (0, 767, 772, 767, 769)' - PASSED ssl_gtest.sh: #989: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/248 (0, 767, 772, 767, 770)' - PASSED ssl_gtest.sh: #990: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/249 (0, 767, 772, 767, 771)' - PASSED ssl_gtest.sh: #991: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/250 (0, 767, 772, 767, 772)' - PASSED ssl_gtest.sh: #992: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/251 (0, 767, 772, 767, 773)' - PASSED ssl_gtest.sh: #993: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/252 (0, 767, 772, 768, 767)' - PASSED ssl_gtest.sh: #994: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/253 (0, 767, 772, 768, 768)' - PASSED ssl_gtest.sh: #995: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/254 (0, 767, 772, 768, 769)' - PASSED ssl_gtest.sh: #996: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/255 (0, 767, 772, 768, 770)' - PASSED ssl_gtest.sh: #997: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/256 (0, 767, 772, 768, 771)' - PASSED ssl_gtest.sh: #998: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/257 (0, 767, 772, 768, 772)' - PASSED ssl_gtest.sh: #999: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/258 (0, 767, 772, 768, 773)' - PASSED ssl_gtest.sh: #1000: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/259 (0, 767, 772, 769, 767)' - PASSED ssl_gtest.sh: #1001: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/260 (0, 767, 772, 769, 768)' - PASSED ssl_gtest.sh: #1002: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/261 (0, 767, 772, 769, 769)' - PASSED ssl_gtest.sh: #1003: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/262 (0, 767, 772, 769, 770)' - PASSED ssl_gtest.sh: #1004: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/263 (0, 767, 772, 769, 771)' - PASSED ssl_gtest.sh: #1005: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/264 (0, 767, 772, 769, 772)' - PASSED ssl_gtest.sh: #1006: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/265 (0, 767, 772, 769, 773)' - PASSED ssl_gtest.sh: #1007: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/266 (0, 767, 772, 770, 767)' - PASSED ssl_gtest.sh: #1008: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/267 (0, 767, 772, 770, 768)' - PASSED ssl_gtest.sh: #1009: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/268 (0, 767, 772, 770, 769)' - PASSED ssl_gtest.sh: #1010: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/269 (0, 767, 772, 770, 770)' - PASSED ssl_gtest.sh: #1011: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/270 (0, 767, 772, 770, 771)' - PASSED ssl_gtest.sh: #1012: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/271 (0, 767, 772, 770, 772)' - PASSED ssl_gtest.sh: #1013: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/272 (0, 767, 772, 770, 773)' - PASSED ssl_gtest.sh: #1014: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/273 (0, 767, 772, 771, 767)' - PASSED ssl_gtest.sh: #1015: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/274 (0, 767, 772, 771, 768)' - PASSED ssl_gtest.sh: #1016: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/275 (0, 767, 772, 771, 769)' - PASSED ssl_gtest.sh: #1017: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/276 (0, 767, 772, 771, 770)' - PASSED ssl_gtest.sh: #1018: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/277 (0, 767, 772, 771, 771)' - PASSED ssl_gtest.sh: #1019: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/278 (0, 767, 772, 771, 772)' - PASSED ssl_gtest.sh: #1020: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/279 (0, 767, 772, 771, 773)' - PASSED ssl_gtest.sh: #1021: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/280 (0, 767, 772, 772, 767)' - PASSED ssl_gtest.sh: #1022: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/281 (0, 767, 772, 772, 768)' - PASSED ssl_gtest.sh: #1023: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/282 (0, 767, 772, 772, 769)' - PASSED ssl_gtest.sh: #1024: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/283 (0, 767, 772, 772, 770)' - PASSED ssl_gtest.sh: #1025: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/284 (0, 767, 772, 772, 771)' - PASSED ssl_gtest.sh: #1026: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/285 (0, 767, 772, 772, 772)' - PASSED ssl_gtest.sh: #1027: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/286 (0, 767, 772, 772, 773)' - PASSED ssl_gtest.sh: #1028: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/287 (0, 767, 772, 773, 767)' - PASSED ssl_gtest.sh: #1029: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/288 (0, 767, 772, 773, 768)' - PASSED ssl_gtest.sh: #1030: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/289 (0, 767, 772, 773, 769)' - PASSED ssl_gtest.sh: #1031: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/290 (0, 767, 772, 773, 770)' - PASSED ssl_gtest.sh: #1032: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/291 (0, 767, 772, 773, 771)' - PASSED ssl_gtest.sh: #1033: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/292 (0, 767, 772, 773, 772)' - PASSED ssl_gtest.sh: #1034: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/293 (0, 767, 772, 773, 773)' - PASSED ssl_gtest.sh: #1035: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/294 (0, 767, 773, 767, 767)' - PASSED ssl_gtest.sh: #1036: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/295 (0, 767, 773, 767, 768)' - PASSED ssl_gtest.sh: #1037: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/296 (0, 767, 773, 767, 769)' - PASSED ssl_gtest.sh: #1038: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/297 (0, 767, 773, 767, 770)' - PASSED ssl_gtest.sh: #1039: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/298 (0, 767, 773, 767, 771)' - PASSED ssl_gtest.sh: #1040: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/299 (0, 767, 773, 767, 772)' - PASSED ssl_gtest.sh: #1041: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/300 (0, 767, 773, 767, 773)' - PASSED ssl_gtest.sh: #1042: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/301 (0, 767, 773, 768, 767)' - PASSED ssl_gtest.sh: #1043: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/302 (0, 767, 773, 768, 768)' - PASSED ssl_gtest.sh: #1044: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/303 (0, 767, 773, 768, 769)' - PASSED ssl_gtest.sh: #1045: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/304 (0, 767, 773, 768, 770)' - PASSED ssl_gtest.sh: #1046: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/305 (0, 767, 773, 768, 771)' - PASSED ssl_gtest.sh: #1047: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/306 (0, 767, 773, 768, 772)' - PASSED ssl_gtest.sh: #1048: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/307 (0, 767, 773, 768, 773)' - PASSED ssl_gtest.sh: #1049: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/308 (0, 767, 773, 769, 767)' - PASSED ssl_gtest.sh: #1050: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/309 (0, 767, 773, 769, 768)' - PASSED ssl_gtest.sh: #1051: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/310 (0, 767, 773, 769, 769)' - PASSED ssl_gtest.sh: #1052: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/311 (0, 767, 773, 769, 770)' - PASSED ssl_gtest.sh: #1053: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/312 (0, 767, 773, 769, 771)' - PASSED ssl_gtest.sh: #1054: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/313 (0, 767, 773, 769, 772)' - PASSED ssl_gtest.sh: #1055: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/314 (0, 767, 773, 769, 773)' - PASSED ssl_gtest.sh: #1056: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/315 (0, 767, 773, 770, 767)' - PASSED ssl_gtest.sh: #1057: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/316 (0, 767, 773, 770, 768)' - PASSED ssl_gtest.sh: #1058: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/317 (0, 767, 773, 770, 769)' - PASSED ssl_gtest.sh: #1059: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/318 (0, 767, 773, 770, 770)' - PASSED ssl_gtest.sh: #1060: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/319 (0, 767, 773, 770, 771)' - PASSED ssl_gtest.sh: #1061: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/320 (0, 767, 773, 770, 772)' - PASSED ssl_gtest.sh: #1062: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/321 (0, 767, 773, 770, 773)' - PASSED ssl_gtest.sh: #1063: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/322 (0, 767, 773, 771, 767)' - PASSED ssl_gtest.sh: #1064: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/323 (0, 767, 773, 771, 768)' - PASSED ssl_gtest.sh: #1065: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/324 (0, 767, 773, 771, 769)' - PASSED ssl_gtest.sh: #1066: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/325 (0, 767, 773, 771, 770)' - PASSED ssl_gtest.sh: #1067: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/326 (0, 767, 773, 771, 771)' - PASSED ssl_gtest.sh: #1068: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/327 (0, 767, 773, 771, 772)' - PASSED ssl_gtest.sh: #1069: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/328 (0, 767, 773, 771, 773)' - PASSED ssl_gtest.sh: #1070: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/329 (0, 767, 773, 772, 767)' - PASSED ssl_gtest.sh: #1071: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/330 (0, 767, 773, 772, 768)' - PASSED ssl_gtest.sh: #1072: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/331 (0, 767, 773, 772, 769)' - PASSED ssl_gtest.sh: #1073: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/332 (0, 767, 773, 772, 770)' - PASSED ssl_gtest.sh: #1074: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/333 (0, 767, 773, 772, 771)' - PASSED ssl_gtest.sh: #1075: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/334 (0, 767, 773, 772, 772)' - PASSED ssl_gtest.sh: #1076: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/335 (0, 767, 773, 772, 773)' - PASSED ssl_gtest.sh: #1077: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/336 (0, 767, 773, 773, 767)' - PASSED ssl_gtest.sh: #1078: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/337 (0, 767, 773, 773, 768)' - PASSED ssl_gtest.sh: #1079: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/338 (0, 767, 773, 773, 769)' - PASSED ssl_gtest.sh: #1080: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/339 (0, 767, 773, 773, 770)' - PASSED ssl_gtest.sh: #1081: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/340 (0, 767, 773, 773, 771)' - PASSED ssl_gtest.sh: #1082: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/341 (0, 767, 773, 773, 772)' - PASSED ssl_gtest.sh: #1083: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/342 (0, 767, 773, 773, 773)' - PASSED ssl_gtest.sh: #1084: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/343 (0, 768, 767, 767, 767)' - PASSED ssl_gtest.sh: #1085: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/344 (0, 768, 767, 767, 768)' - PASSED ssl_gtest.sh: #1086: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/345 (0, 768, 767, 767, 769)' - PASSED ssl_gtest.sh: #1087: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/346 (0, 768, 767, 767, 770)' - PASSED ssl_gtest.sh: #1088: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/347 (0, 768, 767, 767, 771)' - PASSED ssl_gtest.sh: #1089: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/348 (0, 768, 767, 767, 772)' - PASSED ssl_gtest.sh: #1090: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/349 (0, 768, 767, 767, 773)' - PASSED ssl_gtest.sh: #1091: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/350 (0, 768, 767, 768, 767)' - PASSED ssl_gtest.sh: #1092: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/351 (0, 768, 767, 768, 768)' - PASSED ssl_gtest.sh: #1093: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/352 (0, 768, 767, 768, 769)' - PASSED ssl_gtest.sh: #1094: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/353 (0, 768, 767, 768, 770)' - PASSED ssl_gtest.sh: #1095: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/354 (0, 768, 767, 768, 771)' - PASSED ssl_gtest.sh: #1096: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/355 (0, 768, 767, 768, 772)' - PASSED ssl_gtest.sh: #1097: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/356 (0, 768, 767, 768, 773)' - PASSED ssl_gtest.sh: #1098: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/357 (0, 768, 767, 769, 767)' - PASSED ssl_gtest.sh: #1099: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/358 (0, 768, 767, 769, 768)' - PASSED ssl_gtest.sh: #1100: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/359 (0, 768, 767, 769, 769)' - PASSED ssl_gtest.sh: #1101: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/360 (0, 768, 767, 769, 770)' - PASSED ssl_gtest.sh: #1102: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/361 (0, 768, 767, 769, 771)' - PASSED ssl_gtest.sh: #1103: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/362 (0, 768, 767, 769, 772)' - PASSED ssl_gtest.sh: #1104: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/363 (0, 768, 767, 769, 773)' - PASSED ssl_gtest.sh: #1105: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/364 (0, 768, 767, 770, 767)' - PASSED ssl_gtest.sh: #1106: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/365 (0, 768, 767, 770, 768)' - PASSED ssl_gtest.sh: #1107: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/366 (0, 768, 767, 770, 769)' - PASSED ssl_gtest.sh: #1108: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/367 (0, 768, 767, 770, 770)' - PASSED ssl_gtest.sh: #1109: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/368 (0, 768, 767, 770, 771)' - PASSED ssl_gtest.sh: #1110: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/369 (0, 768, 767, 770, 772)' - PASSED ssl_gtest.sh: #1111: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/370 (0, 768, 767, 770, 773)' - PASSED ssl_gtest.sh: #1112: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/371 (0, 768, 767, 771, 767)' - PASSED ssl_gtest.sh: #1113: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/372 (0, 768, 767, 771, 768)' - PASSED ssl_gtest.sh: #1114: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/373 (0, 768, 767, 771, 769)' - PASSED ssl_gtest.sh: #1115: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/374 (0, 768, 767, 771, 770)' - PASSED ssl_gtest.sh: #1116: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/375 (0, 768, 767, 771, 771)' - PASSED ssl_gtest.sh: #1117: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/376 (0, 768, 767, 771, 772)' - PASSED ssl_gtest.sh: #1118: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/377 (0, 768, 767, 771, 773)' - PASSED ssl_gtest.sh: #1119: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/378 (0, 768, 767, 772, 767)' - PASSED ssl_gtest.sh: #1120: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/379 (0, 768, 767, 772, 768)' - PASSED ssl_gtest.sh: #1121: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/380 (0, 768, 767, 772, 769)' - PASSED ssl_gtest.sh: #1122: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/381 (0, 768, 767, 772, 770)' - PASSED ssl_gtest.sh: #1123: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/382 (0, 768, 767, 772, 771)' - PASSED ssl_gtest.sh: #1124: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/383 (0, 768, 767, 772, 772)' - PASSED ssl_gtest.sh: #1125: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/384 (0, 768, 767, 772, 773)' - PASSED ssl_gtest.sh: #1126: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/385 (0, 768, 767, 773, 767)' - PASSED ssl_gtest.sh: #1127: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/386 (0, 768, 767, 773, 768)' - PASSED ssl_gtest.sh: #1128: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/387 (0, 768, 767, 773, 769)' - PASSED ssl_gtest.sh: #1129: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/388 (0, 768, 767, 773, 770)' - PASSED ssl_gtest.sh: #1130: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/389 (0, 768, 767, 773, 771)' - PASSED ssl_gtest.sh: #1131: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/390 (0, 768, 767, 773, 772)' - PASSED ssl_gtest.sh: #1132: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/391 (0, 768, 767, 773, 773)' - PASSED ssl_gtest.sh: #1133: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/392 (0, 768, 768, 767, 767)' - PASSED ssl_gtest.sh: #1134: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/393 (0, 768, 768, 767, 768)' - PASSED ssl_gtest.sh: #1135: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/394 (0, 768, 768, 767, 769)' - PASSED ssl_gtest.sh: #1136: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/395 (0, 768, 768, 767, 770)' - PASSED ssl_gtest.sh: #1137: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/396 (0, 768, 768, 767, 771)' - PASSED ssl_gtest.sh: #1138: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/397 (0, 768, 768, 767, 772)' - PASSED ssl_gtest.sh: #1139: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/398 (0, 768, 768, 767, 773)' - PASSED ssl_gtest.sh: #1140: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/399 (0, 768, 768, 768, 767)' - PASSED ssl_gtest.sh: #1141: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/400 (0, 768, 768, 768, 768)' - PASSED ssl_gtest.sh: #1142: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/401 (0, 768, 768, 768, 769)' - PASSED ssl_gtest.sh: #1143: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/402 (0, 768, 768, 768, 770)' - PASSED ssl_gtest.sh: #1144: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/403 (0, 768, 768, 768, 771)' - PASSED ssl_gtest.sh: #1145: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/404 (0, 768, 768, 768, 772)' - PASSED ssl_gtest.sh: #1146: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/405 (0, 768, 768, 768, 773)' - PASSED ssl_gtest.sh: #1147: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/406 (0, 768, 768, 769, 767)' - PASSED ssl_gtest.sh: #1148: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/407 (0, 768, 768, 769, 768)' - PASSED ssl_gtest.sh: #1149: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/408 (0, 768, 768, 769, 769)' - PASSED ssl_gtest.sh: #1150: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/409 (0, 768, 768, 769, 770)' - PASSED ssl_gtest.sh: #1151: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/410 (0, 768, 768, 769, 771)' - PASSED ssl_gtest.sh: #1152: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/411 (0, 768, 768, 769, 772)' - PASSED ssl_gtest.sh: #1153: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/412 (0, 768, 768, 769, 773)' - PASSED ssl_gtest.sh: #1154: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/413 (0, 768, 768, 770, 767)' - PASSED ssl_gtest.sh: #1155: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/414 (0, 768, 768, 770, 768)' - PASSED ssl_gtest.sh: #1156: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/415 (0, 768, 768, 770, 769)' - PASSED ssl_gtest.sh: #1157: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/416 (0, 768, 768, 770, 770)' - PASSED ssl_gtest.sh: #1158: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/417 (0, 768, 768, 770, 771)' - PASSED ssl_gtest.sh: #1159: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/418 (0, 768, 768, 770, 772)' - PASSED ssl_gtest.sh: #1160: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/419 (0, 768, 768, 770, 773)' - PASSED ssl_gtest.sh: #1161: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/420 (0, 768, 768, 771, 767)' - PASSED ssl_gtest.sh: #1162: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/421 (0, 768, 768, 771, 768)' - PASSED ssl_gtest.sh: #1163: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/422 (0, 768, 768, 771, 769)' - PASSED ssl_gtest.sh: #1164: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/423 (0, 768, 768, 771, 770)' - PASSED ssl_gtest.sh: #1165: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/424 (0, 768, 768, 771, 771)' - PASSED ssl_gtest.sh: #1166: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/425 (0, 768, 768, 771, 772)' - PASSED ssl_gtest.sh: #1167: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/426 (0, 768, 768, 771, 773)' - PASSED ssl_gtest.sh: #1168: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/427 (0, 768, 768, 772, 767)' - PASSED ssl_gtest.sh: #1169: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/428 (0, 768, 768, 772, 768)' - PASSED ssl_gtest.sh: #1170: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/429 (0, 768, 768, 772, 769)' - PASSED ssl_gtest.sh: #1171: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/430 (0, 768, 768, 772, 770)' - PASSED ssl_gtest.sh: #1172: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/431 (0, 768, 768, 772, 771)' - PASSED ssl_gtest.sh: #1173: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/432 (0, 768, 768, 772, 772)' - PASSED ssl_gtest.sh: #1174: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/433 (0, 768, 768, 772, 773)' - PASSED ssl_gtest.sh: #1175: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/434 (0, 768, 768, 773, 767)' - PASSED ssl_gtest.sh: #1176: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/435 (0, 768, 768, 773, 768)' - PASSED ssl_gtest.sh: #1177: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/436 (0, 768, 768, 773, 769)' - PASSED ssl_gtest.sh: #1178: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/437 (0, 768, 768, 773, 770)' - PASSED ssl_gtest.sh: #1179: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/438 (0, 768, 768, 773, 771)' - PASSED ssl_gtest.sh: #1180: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/439 (0, 768, 768, 773, 772)' - PASSED ssl_gtest.sh: #1181: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/440 (0, 768, 768, 773, 773)' - PASSED ssl_gtest.sh: #1182: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/441 (0, 768, 769, 767, 767)' - PASSED ssl_gtest.sh: #1183: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/442 (0, 768, 769, 767, 768)' - PASSED ssl_gtest.sh: #1184: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/443 (0, 768, 769, 767, 769)' - PASSED ssl_gtest.sh: #1185: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/444 (0, 768, 769, 767, 770)' - PASSED ssl_gtest.sh: #1186: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/445 (0, 768, 769, 767, 771)' - PASSED ssl_gtest.sh: #1187: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/446 (0, 768, 769, 767, 772)' - PASSED ssl_gtest.sh: #1188: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/447 (0, 768, 769, 767, 773)' - PASSED ssl_gtest.sh: #1189: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/448 (0, 768, 769, 768, 767)' - PASSED ssl_gtest.sh: #1190: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/449 (0, 768, 769, 768, 768)' - PASSED ssl_gtest.sh: #1191: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/450 (0, 768, 769, 768, 769)' - PASSED ssl_gtest.sh: #1192: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/451 (0, 768, 769, 768, 770)' - PASSED ssl_gtest.sh: #1193: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/452 (0, 768, 769, 768, 771)' - PASSED ssl_gtest.sh: #1194: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/453 (0, 768, 769, 768, 772)' - PASSED ssl_gtest.sh: #1195: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/454 (0, 768, 769, 768, 773)' - PASSED ssl_gtest.sh: #1196: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/455 (0, 768, 769, 769, 767)' - PASSED ssl_gtest.sh: #1197: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/456 (0, 768, 769, 769, 768)' - PASSED ssl_gtest.sh: #1198: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/457 (0, 768, 769, 769, 769)' - PASSED ssl_gtest.sh: #1199: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/458 (0, 768, 769, 769, 770)' - PASSED ssl_gtest.sh: #1200: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/459 (0, 768, 769, 769, 771)' - PASSED ssl_gtest.sh: #1201: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/460 (0, 768, 769, 769, 772)' - PASSED ssl_gtest.sh: #1202: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/461 (0, 768, 769, 769, 773)' - PASSED ssl_gtest.sh: #1203: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/462 (0, 768, 769, 770, 767)' - PASSED ssl_gtest.sh: #1204: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/463 (0, 768, 769, 770, 768)' - PASSED ssl_gtest.sh: #1205: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/464 (0, 768, 769, 770, 769)' - PASSED ssl_gtest.sh: #1206: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/465 (0, 768, 769, 770, 770)' - PASSED ssl_gtest.sh: #1207: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/466 (0, 768, 769, 770, 771)' - PASSED ssl_gtest.sh: #1208: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/467 (0, 768, 769, 770, 772)' - PASSED ssl_gtest.sh: #1209: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/468 (0, 768, 769, 770, 773)' - PASSED ssl_gtest.sh: #1210: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/469 (0, 768, 769, 771, 767)' - PASSED ssl_gtest.sh: #1211: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/470 (0, 768, 769, 771, 768)' - PASSED ssl_gtest.sh: #1212: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/471 (0, 768, 769, 771, 769)' - PASSED ssl_gtest.sh: #1213: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/472 (0, 768, 769, 771, 770)' - PASSED ssl_gtest.sh: #1214: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/473 (0, 768, 769, 771, 771)' - PASSED ssl_gtest.sh: #1215: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/474 (0, 768, 769, 771, 772)' - PASSED ssl_gtest.sh: #1216: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/475 (0, 768, 769, 771, 773)' - PASSED ssl_gtest.sh: #1217: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/476 (0, 768, 769, 772, 767)' - PASSED ssl_gtest.sh: #1218: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/477 (0, 768, 769, 772, 768)' - PASSED ssl_gtest.sh: #1219: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/478 (0, 768, 769, 772, 769)' - PASSED ssl_gtest.sh: #1220: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/479 (0, 768, 769, 772, 770)' - PASSED ssl_gtest.sh: #1221: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/480 (0, 768, 769, 772, 771)' - PASSED ssl_gtest.sh: #1222: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/481 (0, 768, 769, 772, 772)' - PASSED ssl_gtest.sh: #1223: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/482 (0, 768, 769, 772, 773)' - PASSED ssl_gtest.sh: #1224: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/483 (0, 768, 769, 773, 767)' - PASSED ssl_gtest.sh: #1225: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/484 (0, 768, 769, 773, 768)' - PASSED ssl_gtest.sh: #1226: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/485 (0, 768, 769, 773, 769)' - PASSED ssl_gtest.sh: #1227: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/486 (0, 768, 769, 773, 770)' - PASSED ssl_gtest.sh: #1228: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/487 (0, 768, 769, 773, 771)' - PASSED ssl_gtest.sh: #1229: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/488 (0, 768, 769, 773, 772)' - PASSED ssl_gtest.sh: #1230: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/489 (0, 768, 769, 773, 773)' - PASSED ssl_gtest.sh: #1231: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/490 (0, 768, 770, 767, 767)' - PASSED ssl_gtest.sh: #1232: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/491 (0, 768, 770, 767, 768)' - PASSED ssl_gtest.sh: #1233: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/492 (0, 768, 770, 767, 769)' - PASSED ssl_gtest.sh: #1234: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/493 (0, 768, 770, 767, 770)' - PASSED ssl_gtest.sh: #1235: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/494 (0, 768, 770, 767, 771)' - PASSED ssl_gtest.sh: #1236: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/495 (0, 768, 770, 767, 772)' - PASSED ssl_gtest.sh: #1237: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/496 (0, 768, 770, 767, 773)' - PASSED ssl_gtest.sh: #1238: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/497 (0, 768, 770, 768, 767)' - PASSED ssl_gtest.sh: #1239: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/498 (0, 768, 770, 768, 768)' - PASSED ssl_gtest.sh: #1240: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/499 (0, 768, 770, 768, 769)' - PASSED ssl_gtest.sh: #1241: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/500 (0, 768, 770, 768, 770)' - PASSED ssl_gtest.sh: #1242: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/501 (0, 768, 770, 768, 771)' - PASSED ssl_gtest.sh: #1243: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/502 (0, 768, 770, 768, 772)' - PASSED ssl_gtest.sh: #1244: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/503 (0, 768, 770, 768, 773)' - PASSED ssl_gtest.sh: #1245: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/504 (0, 768, 770, 769, 767)' - PASSED ssl_gtest.sh: #1246: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/505 (0, 768, 770, 769, 768)' - PASSED ssl_gtest.sh: #1247: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/506 (0, 768, 770, 769, 769)' - PASSED ssl_gtest.sh: #1248: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/507 (0, 768, 770, 769, 770)' - PASSED ssl_gtest.sh: #1249: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/508 (0, 768, 770, 769, 771)' - PASSED ssl_gtest.sh: #1250: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/509 (0, 768, 770, 769, 772)' - PASSED ssl_gtest.sh: #1251: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/510 (0, 768, 770, 769, 773)' - PASSED ssl_gtest.sh: #1252: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/511 (0, 768, 770, 770, 767)' - PASSED ssl_gtest.sh: #1253: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/512 (0, 768, 770, 770, 768)' - PASSED ssl_gtest.sh: #1254: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/513 (0, 768, 770, 770, 769)' - PASSED ssl_gtest.sh: #1255: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/514 (0, 768, 770, 770, 770)' - PASSED ssl_gtest.sh: #1256: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/515 (0, 768, 770, 770, 771)' - PASSED ssl_gtest.sh: #1257: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/516 (0, 768, 770, 770, 772)' - PASSED ssl_gtest.sh: #1258: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/517 (0, 768, 770, 770, 773)' - PASSED ssl_gtest.sh: #1259: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/518 (0, 768, 770, 771, 767)' - PASSED ssl_gtest.sh: #1260: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/519 (0, 768, 770, 771, 768)' - PASSED ssl_gtest.sh: #1261: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/520 (0, 768, 770, 771, 769)' - PASSED ssl_gtest.sh: #1262: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/521 (0, 768, 770, 771, 770)' - PASSED ssl_gtest.sh: #1263: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/522 (0, 768, 770, 771, 771)' - PASSED ssl_gtest.sh: #1264: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/523 (0, 768, 770, 771, 772)' - PASSED ssl_gtest.sh: #1265: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/524 (0, 768, 770, 771, 773)' - PASSED ssl_gtest.sh: #1266: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/525 (0, 768, 770, 772, 767)' - PASSED ssl_gtest.sh: #1267: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/526 (0, 768, 770, 772, 768)' - PASSED ssl_gtest.sh: #1268: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/527 (0, 768, 770, 772, 769)' - PASSED ssl_gtest.sh: #1269: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/528 (0, 768, 770, 772, 770)' - PASSED ssl_gtest.sh: #1270: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/529 (0, 768, 770, 772, 771)' - PASSED ssl_gtest.sh: #1271: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/530 (0, 768, 770, 772, 772)' - PASSED ssl_gtest.sh: #1272: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/531 (0, 768, 770, 772, 773)' - PASSED ssl_gtest.sh: #1273: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/532 (0, 768, 770, 773, 767)' - PASSED ssl_gtest.sh: #1274: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/533 (0, 768, 770, 773, 768)' - PASSED ssl_gtest.sh: #1275: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/534 (0, 768, 770, 773, 769)' - PASSED ssl_gtest.sh: #1276: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/535 (0, 768, 770, 773, 770)' - PASSED ssl_gtest.sh: #1277: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/536 (0, 768, 770, 773, 771)' - PASSED ssl_gtest.sh: #1278: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/537 (0, 768, 770, 773, 772)' - PASSED ssl_gtest.sh: #1279: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/538 (0, 768, 770, 773, 773)' - PASSED ssl_gtest.sh: #1280: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/539 (0, 768, 771, 767, 767)' - PASSED ssl_gtest.sh: #1281: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/540 (0, 768, 771, 767, 768)' - PASSED ssl_gtest.sh: #1282: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/541 (0, 768, 771, 767, 769)' - PASSED ssl_gtest.sh: #1283: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/542 (0, 768, 771, 767, 770)' - PASSED ssl_gtest.sh: #1284: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/543 (0, 768, 771, 767, 771)' - PASSED ssl_gtest.sh: #1285: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/544 (0, 768, 771, 767, 772)' - PASSED ssl_gtest.sh: #1286: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/545 (0, 768, 771, 767, 773)' - PASSED ssl_gtest.sh: #1287: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/546 (0, 768, 771, 768, 767)' - PASSED ssl_gtest.sh: #1288: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/547 (0, 768, 771, 768, 768)' - PASSED ssl_gtest.sh: #1289: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/548 (0, 768, 771, 768, 769)' - PASSED ssl_gtest.sh: #1290: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/549 (0, 768, 771, 768, 770)' - PASSED ssl_gtest.sh: #1291: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/550 (0, 768, 771, 768, 771)' - PASSED ssl_gtest.sh: #1292: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/551 (0, 768, 771, 768, 772)' - PASSED ssl_gtest.sh: #1293: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/552 (0, 768, 771, 768, 773)' - PASSED ssl_gtest.sh: #1294: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/553 (0, 768, 771, 769, 767)' - PASSED ssl_gtest.sh: #1295: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/554 (0, 768, 771, 769, 768)' - PASSED ssl_gtest.sh: #1296: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/555 (0, 768, 771, 769, 769)' - PASSED ssl_gtest.sh: #1297: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/556 (0, 768, 771, 769, 770)' - PASSED ssl_gtest.sh: #1298: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/557 (0, 768, 771, 769, 771)' - PASSED ssl_gtest.sh: #1299: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/558 (0, 768, 771, 769, 772)' - PASSED ssl_gtest.sh: #1300: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/559 (0, 768, 771, 769, 773)' - PASSED ssl_gtest.sh: #1301: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/560 (0, 768, 771, 770, 767)' - PASSED ssl_gtest.sh: #1302: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/561 (0, 768, 771, 770, 768)' - PASSED ssl_gtest.sh: #1303: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/562 (0, 768, 771, 770, 769)' - PASSED ssl_gtest.sh: #1304: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/563 (0, 768, 771, 770, 770)' - PASSED ssl_gtest.sh: #1305: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/564 (0, 768, 771, 770, 771)' - PASSED ssl_gtest.sh: #1306: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/565 (0, 768, 771, 770, 772)' - PASSED ssl_gtest.sh: #1307: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/566 (0, 768, 771, 770, 773)' - PASSED ssl_gtest.sh: #1308: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/567 (0, 768, 771, 771, 767)' - PASSED ssl_gtest.sh: #1309: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/568 (0, 768, 771, 771, 768)' - PASSED ssl_gtest.sh: #1310: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/569 (0, 768, 771, 771, 769)' - PASSED ssl_gtest.sh: #1311: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/570 (0, 768, 771, 771, 770)' - PASSED ssl_gtest.sh: #1312: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/571 (0, 768, 771, 771, 771)' - PASSED ssl_gtest.sh: #1313: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/572 (0, 768, 771, 771, 772)' - PASSED ssl_gtest.sh: #1314: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/573 (0, 768, 771, 771, 773)' - PASSED ssl_gtest.sh: #1315: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/574 (0, 768, 771, 772, 767)' - PASSED ssl_gtest.sh: #1316: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/575 (0, 768, 771, 772, 768)' - PASSED ssl_gtest.sh: #1317: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/576 (0, 768, 771, 772, 769)' - PASSED ssl_gtest.sh: #1318: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/577 (0, 768, 771, 772, 770)' - PASSED ssl_gtest.sh: #1319: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/578 (0, 768, 771, 772, 771)' - PASSED ssl_gtest.sh: #1320: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/579 (0, 768, 771, 772, 772)' - PASSED ssl_gtest.sh: #1321: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/580 (0, 768, 771, 772, 773)' - PASSED ssl_gtest.sh: #1322: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/581 (0, 768, 771, 773, 767)' - PASSED ssl_gtest.sh: #1323: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/582 (0, 768, 771, 773, 768)' - PASSED ssl_gtest.sh: #1324: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/583 (0, 768, 771, 773, 769)' - PASSED ssl_gtest.sh: #1325: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/584 (0, 768, 771, 773, 770)' - PASSED ssl_gtest.sh: #1326: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/585 (0, 768, 771, 773, 771)' - PASSED ssl_gtest.sh: #1327: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/586 (0, 768, 771, 773, 772)' - PASSED ssl_gtest.sh: #1328: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/587 (0, 768, 771, 773, 773)' - PASSED ssl_gtest.sh: #1329: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/588 (0, 768, 772, 767, 767)' - PASSED ssl_gtest.sh: #1330: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/589 (0, 768, 772, 767, 768)' - PASSED ssl_gtest.sh: #1331: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/590 (0, 768, 772, 767, 769)' - PASSED ssl_gtest.sh: #1332: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/591 (0, 768, 772, 767, 770)' - PASSED ssl_gtest.sh: #1333: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/592 (0, 768, 772, 767, 771)' - PASSED ssl_gtest.sh: #1334: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/593 (0, 768, 772, 767, 772)' - PASSED ssl_gtest.sh: #1335: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/594 (0, 768, 772, 767, 773)' - PASSED ssl_gtest.sh: #1336: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/595 (0, 768, 772, 768, 767)' - PASSED ssl_gtest.sh: #1337: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/596 (0, 768, 772, 768, 768)' - PASSED ssl_gtest.sh: #1338: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/597 (0, 768, 772, 768, 769)' - PASSED ssl_gtest.sh: #1339: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/598 (0, 768, 772, 768, 770)' - PASSED ssl_gtest.sh: #1340: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/599 (0, 768, 772, 768, 771)' - PASSED ssl_gtest.sh: #1341: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/600 (0, 768, 772, 768, 772)' - PASSED ssl_gtest.sh: #1342: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/601 (0, 768, 772, 768, 773)' - PASSED ssl_gtest.sh: #1343: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/602 (0, 768, 772, 769, 767)' - PASSED ssl_gtest.sh: #1344: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/603 (0, 768, 772, 769, 768)' - PASSED ssl_gtest.sh: #1345: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/604 (0, 768, 772, 769, 769)' - PASSED ssl_gtest.sh: #1346: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/605 (0, 768, 772, 769, 770)' - PASSED ssl_gtest.sh: #1347: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/606 (0, 768, 772, 769, 771)' - PASSED ssl_gtest.sh: #1348: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/607 (0, 768, 772, 769, 772)' - PASSED ssl_gtest.sh: #1349: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/608 (0, 768, 772, 769, 773)' - PASSED ssl_gtest.sh: #1350: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/609 (0, 768, 772, 770, 767)' - PASSED ssl_gtest.sh: #1351: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/610 (0, 768, 772, 770, 768)' - PASSED ssl_gtest.sh: #1352: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/611 (0, 768, 772, 770, 769)' - PASSED ssl_gtest.sh: #1353: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/612 (0, 768, 772, 770, 770)' - PASSED ssl_gtest.sh: #1354: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/613 (0, 768, 772, 770, 771)' - PASSED ssl_gtest.sh: #1355: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/614 (0, 768, 772, 770, 772)' - PASSED ssl_gtest.sh: #1356: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/615 (0, 768, 772, 770, 773)' - PASSED ssl_gtest.sh: #1357: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/616 (0, 768, 772, 771, 767)' - PASSED ssl_gtest.sh: #1358: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/617 (0, 768, 772, 771, 768)' - PASSED ssl_gtest.sh: #1359: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/618 (0, 768, 772, 771, 769)' - PASSED ssl_gtest.sh: #1360: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/619 (0, 768, 772, 771, 770)' - PASSED ssl_gtest.sh: #1361: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/620 (0, 768, 772, 771, 771)' - PASSED ssl_gtest.sh: #1362: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/621 (0, 768, 772, 771, 772)' - PASSED ssl_gtest.sh: #1363: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/622 (0, 768, 772, 771, 773)' - PASSED ssl_gtest.sh: #1364: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/623 (0, 768, 772, 772, 767)' - PASSED ssl_gtest.sh: #1365: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/624 (0, 768, 772, 772, 768)' - PASSED ssl_gtest.sh: #1366: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/625 (0, 768, 772, 772, 769)' - PASSED ssl_gtest.sh: #1367: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/626 (0, 768, 772, 772, 770)' - PASSED ssl_gtest.sh: #1368: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/627 (0, 768, 772, 772, 771)' - PASSED ssl_gtest.sh: #1369: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/628 (0, 768, 772, 772, 772)' - PASSED ssl_gtest.sh: #1370: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/629 (0, 768, 772, 772, 773)' - PASSED ssl_gtest.sh: #1371: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/630 (0, 768, 772, 773, 767)' - PASSED ssl_gtest.sh: #1372: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/631 (0, 768, 772, 773, 768)' - PASSED ssl_gtest.sh: #1373: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/632 (0, 768, 772, 773, 769)' - PASSED ssl_gtest.sh: #1374: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/633 (0, 768, 772, 773, 770)' - PASSED ssl_gtest.sh: #1375: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/634 (0, 768, 772, 773, 771)' - PASSED ssl_gtest.sh: #1376: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/635 (0, 768, 772, 773, 772)' - PASSED ssl_gtest.sh: #1377: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/636 (0, 768, 772, 773, 773)' - PASSED ssl_gtest.sh: #1378: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/637 (0, 768, 773, 767, 767)' - PASSED ssl_gtest.sh: #1379: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/638 (0, 768, 773, 767, 768)' - PASSED ssl_gtest.sh: #1380: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/639 (0, 768, 773, 767, 769)' - PASSED ssl_gtest.sh: #1381: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/640 (0, 768, 773, 767, 770)' - PASSED ssl_gtest.sh: #1382: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/641 (0, 768, 773, 767, 771)' - PASSED ssl_gtest.sh: #1383: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/642 (0, 768, 773, 767, 772)' - PASSED ssl_gtest.sh: #1384: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/643 (0, 768, 773, 767, 773)' - PASSED ssl_gtest.sh: #1385: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/644 (0, 768, 773, 768, 767)' - PASSED ssl_gtest.sh: #1386: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/645 (0, 768, 773, 768, 768)' - PASSED ssl_gtest.sh: #1387: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/646 (0, 768, 773, 768, 769)' - PASSED ssl_gtest.sh: #1388: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/647 (0, 768, 773, 768, 770)' - PASSED ssl_gtest.sh: #1389: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/648 (0, 768, 773, 768, 771)' - PASSED ssl_gtest.sh: #1390: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/649 (0, 768, 773, 768, 772)' - PASSED ssl_gtest.sh: #1391: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/650 (0, 768, 773, 768, 773)' - PASSED ssl_gtest.sh: #1392: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/651 (0, 768, 773, 769, 767)' - PASSED ssl_gtest.sh: #1393: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/652 (0, 768, 773, 769, 768)' - PASSED ssl_gtest.sh: #1394: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/653 (0, 768, 773, 769, 769)' - PASSED ssl_gtest.sh: #1395: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/654 (0, 768, 773, 769, 770)' - PASSED ssl_gtest.sh: #1396: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/655 (0, 768, 773, 769, 771)' - PASSED ssl_gtest.sh: #1397: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/656 (0, 768, 773, 769, 772)' - PASSED ssl_gtest.sh: #1398: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/657 (0, 768, 773, 769, 773)' - PASSED ssl_gtest.sh: #1399: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/658 (0, 768, 773, 770, 767)' - PASSED ssl_gtest.sh: #1400: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/659 (0, 768, 773, 770, 768)' - PASSED ssl_gtest.sh: #1401: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/660 (0, 768, 773, 770, 769)' - PASSED ssl_gtest.sh: #1402: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/661 (0, 768, 773, 770, 770)' - PASSED ssl_gtest.sh: #1403: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/662 (0, 768, 773, 770, 771)' - PASSED ssl_gtest.sh: #1404: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/663 (0, 768, 773, 770, 772)' - PASSED ssl_gtest.sh: #1405: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/664 (0, 768, 773, 770, 773)' - PASSED ssl_gtest.sh: #1406: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/665 (0, 768, 773, 771, 767)' - PASSED ssl_gtest.sh: #1407: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/666 (0, 768, 773, 771, 768)' - PASSED ssl_gtest.sh: #1408: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/667 (0, 768, 773, 771, 769)' - PASSED ssl_gtest.sh: #1409: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/668 (0, 768, 773, 771, 770)' - PASSED ssl_gtest.sh: #1410: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/669 (0, 768, 773, 771, 771)' - PASSED ssl_gtest.sh: #1411: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/670 (0, 768, 773, 771, 772)' - PASSED ssl_gtest.sh: #1412: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/671 (0, 768, 773, 771, 773)' - PASSED ssl_gtest.sh: #1413: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/672 (0, 768, 773, 772, 767)' - PASSED ssl_gtest.sh: #1414: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/673 (0, 768, 773, 772, 768)' - PASSED ssl_gtest.sh: #1415: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/674 (0, 768, 773, 772, 769)' - PASSED ssl_gtest.sh: #1416: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/675 (0, 768, 773, 772, 770)' - PASSED ssl_gtest.sh: #1417: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/676 (0, 768, 773, 772, 771)' - PASSED ssl_gtest.sh: #1418: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/677 (0, 768, 773, 772, 772)' - PASSED ssl_gtest.sh: #1419: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/678 (0, 768, 773, 772, 773)' - PASSED ssl_gtest.sh: #1420: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/679 (0, 768, 773, 773, 767)' - PASSED ssl_gtest.sh: #1421: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/680 (0, 768, 773, 773, 768)' - PASSED ssl_gtest.sh: #1422: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/681 (0, 768, 773, 773, 769)' - PASSED ssl_gtest.sh: #1423: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/682 (0, 768, 773, 773, 770)' - PASSED ssl_gtest.sh: #1424: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/683 (0, 768, 773, 773, 771)' - PASSED ssl_gtest.sh: #1425: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/684 (0, 768, 773, 773, 772)' - PASSED ssl_gtest.sh: #1426: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/685 (0, 768, 773, 773, 773)' - PASSED ssl_gtest.sh: #1427: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/686 (0, 769, 767, 767, 767)' - PASSED ssl_gtest.sh: #1428: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/687 (0, 769, 767, 767, 768)' - PASSED ssl_gtest.sh: #1429: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/688 (0, 769, 767, 767, 769)' - PASSED ssl_gtest.sh: #1430: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/689 (0, 769, 767, 767, 770)' - PASSED ssl_gtest.sh: #1431: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/690 (0, 769, 767, 767, 771)' - PASSED ssl_gtest.sh: #1432: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/691 (0, 769, 767, 767, 772)' - PASSED ssl_gtest.sh: #1433: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/692 (0, 769, 767, 767, 773)' - PASSED ssl_gtest.sh: #1434: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/693 (0, 769, 767, 768, 767)' - PASSED ssl_gtest.sh: #1435: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/694 (0, 769, 767, 768, 768)' - PASSED ssl_gtest.sh: #1436: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/695 (0, 769, 767, 768, 769)' - PASSED ssl_gtest.sh: #1437: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/696 (0, 769, 767, 768, 770)' - PASSED ssl_gtest.sh: #1438: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/697 (0, 769, 767, 768, 771)' - PASSED ssl_gtest.sh: #1439: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/698 (0, 769, 767, 768, 772)' - PASSED ssl_gtest.sh: #1440: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/699 (0, 769, 767, 768, 773)' - PASSED ssl_gtest.sh: #1441: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/700 (0, 769, 767, 769, 767)' - PASSED ssl_gtest.sh: #1442: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/701 (0, 769, 767, 769, 768)' - PASSED ssl_gtest.sh: #1443: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/702 (0, 769, 767, 769, 769)' - PASSED ssl_gtest.sh: #1444: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/703 (0, 769, 767, 769, 770)' - PASSED ssl_gtest.sh: #1445: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/704 (0, 769, 767, 769, 771)' - PASSED ssl_gtest.sh: #1446: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/705 (0, 769, 767, 769, 772)' - PASSED ssl_gtest.sh: #1447: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/706 (0, 769, 767, 769, 773)' - PASSED ssl_gtest.sh: #1448: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/707 (0, 769, 767, 770, 767)' - PASSED ssl_gtest.sh: #1449: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/708 (0, 769, 767, 770, 768)' - PASSED ssl_gtest.sh: #1450: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/709 (0, 769, 767, 770, 769)' - PASSED ssl_gtest.sh: #1451: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/710 (0, 769, 767, 770, 770)' - PASSED ssl_gtest.sh: #1452: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/711 (0, 769, 767, 770, 771)' - PASSED ssl_gtest.sh: #1453: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/712 (0, 769, 767, 770, 772)' - PASSED ssl_gtest.sh: #1454: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/713 (0, 769, 767, 770, 773)' - PASSED ssl_gtest.sh: #1455: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/714 (0, 769, 767, 771, 767)' - PASSED ssl_gtest.sh: #1456: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/715 (0, 769, 767, 771, 768)' - PASSED ssl_gtest.sh: #1457: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/716 (0, 769, 767, 771, 769)' - PASSED ssl_gtest.sh: #1458: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/717 (0, 769, 767, 771, 770)' - PASSED ssl_gtest.sh: #1459: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/718 (0, 769, 767, 771, 771)' - PASSED ssl_gtest.sh: #1460: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/719 (0, 769, 767, 771, 772)' - PASSED ssl_gtest.sh: #1461: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/720 (0, 769, 767, 771, 773)' - PASSED ssl_gtest.sh: #1462: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/721 (0, 769, 767, 772, 767)' - PASSED ssl_gtest.sh: #1463: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/722 (0, 769, 767, 772, 768)' - PASSED ssl_gtest.sh: #1464: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/723 (0, 769, 767, 772, 769)' - PASSED ssl_gtest.sh: #1465: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/724 (0, 769, 767, 772, 770)' - PASSED ssl_gtest.sh: #1466: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/725 (0, 769, 767, 772, 771)' - PASSED ssl_gtest.sh: #1467: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/726 (0, 769, 767, 772, 772)' - PASSED ssl_gtest.sh: #1468: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/727 (0, 769, 767, 772, 773)' - PASSED ssl_gtest.sh: #1469: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/728 (0, 769, 767, 773, 767)' - PASSED ssl_gtest.sh: #1470: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/729 (0, 769, 767, 773, 768)' - PASSED ssl_gtest.sh: #1471: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/730 (0, 769, 767, 773, 769)' - PASSED ssl_gtest.sh: #1472: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/731 (0, 769, 767, 773, 770)' - PASSED ssl_gtest.sh: #1473: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/732 (0, 769, 767, 773, 771)' - PASSED ssl_gtest.sh: #1474: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/733 (0, 769, 767, 773, 772)' - PASSED ssl_gtest.sh: #1475: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/734 (0, 769, 767, 773, 773)' - PASSED ssl_gtest.sh: #1476: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/735 (0, 769, 768, 767, 767)' - PASSED ssl_gtest.sh: #1477: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/736 (0, 769, 768, 767, 768)' - PASSED ssl_gtest.sh: #1478: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/737 (0, 769, 768, 767, 769)' - PASSED ssl_gtest.sh: #1479: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/738 (0, 769, 768, 767, 770)' - PASSED ssl_gtest.sh: #1480: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/739 (0, 769, 768, 767, 771)' - PASSED ssl_gtest.sh: #1481: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/740 (0, 769, 768, 767, 772)' - PASSED ssl_gtest.sh: #1482: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/741 (0, 769, 768, 767, 773)' - PASSED ssl_gtest.sh: #1483: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/742 (0, 769, 768, 768, 767)' - PASSED ssl_gtest.sh: #1484: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/743 (0, 769, 768, 768, 768)' - PASSED ssl_gtest.sh: #1485: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/744 (0, 769, 768, 768, 769)' - PASSED ssl_gtest.sh: #1486: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/745 (0, 769, 768, 768, 770)' - PASSED ssl_gtest.sh: #1487: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/746 (0, 769, 768, 768, 771)' - PASSED ssl_gtest.sh: #1488: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/747 (0, 769, 768, 768, 772)' - PASSED ssl_gtest.sh: #1489: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/748 (0, 769, 768, 768, 773)' - PASSED ssl_gtest.sh: #1490: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/749 (0, 769, 768, 769, 767)' - PASSED ssl_gtest.sh: #1491: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/750 (0, 769, 768, 769, 768)' - PASSED ssl_gtest.sh: #1492: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/751 (0, 769, 768, 769, 769)' - PASSED ssl_gtest.sh: #1493: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/752 (0, 769, 768, 769, 770)' - PASSED ssl_gtest.sh: #1494: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/753 (0, 769, 768, 769, 771)' - PASSED ssl_gtest.sh: #1495: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/754 (0, 769, 768, 769, 772)' - PASSED ssl_gtest.sh: #1496: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/755 (0, 769, 768, 769, 773)' - PASSED ssl_gtest.sh: #1497: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/756 (0, 769, 768, 770, 767)' - PASSED ssl_gtest.sh: #1498: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/757 (0, 769, 768, 770, 768)' - PASSED ssl_gtest.sh: #1499: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/758 (0, 769, 768, 770, 769)' - PASSED ssl_gtest.sh: #1500: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/759 (0, 769, 768, 770, 770)' - PASSED ssl_gtest.sh: #1501: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/760 (0, 769, 768, 770, 771)' - PASSED ssl_gtest.sh: #1502: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/761 (0, 769, 768, 770, 772)' - PASSED ssl_gtest.sh: #1503: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/762 (0, 769, 768, 770, 773)' - PASSED ssl_gtest.sh: #1504: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/763 (0, 769, 768, 771, 767)' - PASSED ssl_gtest.sh: #1505: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/764 (0, 769, 768, 771, 768)' - PASSED ssl_gtest.sh: #1506: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/765 (0, 769, 768, 771, 769)' - PASSED ssl_gtest.sh: #1507: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/766 (0, 769, 768, 771, 770)' - PASSED ssl_gtest.sh: #1508: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/767 (0, 769, 768, 771, 771)' - PASSED ssl_gtest.sh: #1509: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/768 (0, 769, 768, 771, 772)' - PASSED ssl_gtest.sh: #1510: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/769 (0, 769, 768, 771, 773)' - PASSED ssl_gtest.sh: #1511: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/770 (0, 769, 768, 772, 767)' - PASSED ssl_gtest.sh: #1512: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/771 (0, 769, 768, 772, 768)' - PASSED ssl_gtest.sh: #1513: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/772 (0, 769, 768, 772, 769)' - PASSED ssl_gtest.sh: #1514: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/773 (0, 769, 768, 772, 770)' - PASSED ssl_gtest.sh: #1515: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/774 (0, 769, 768, 772, 771)' - PASSED ssl_gtest.sh: #1516: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/775 (0, 769, 768, 772, 772)' - PASSED ssl_gtest.sh: #1517: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/776 (0, 769, 768, 772, 773)' - PASSED ssl_gtest.sh: #1518: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/777 (0, 769, 768, 773, 767)' - PASSED ssl_gtest.sh: #1519: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/778 (0, 769, 768, 773, 768)' - PASSED ssl_gtest.sh: #1520: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/779 (0, 769, 768, 773, 769)' - PASSED ssl_gtest.sh: #1521: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/780 (0, 769, 768, 773, 770)' - PASSED ssl_gtest.sh: #1522: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/781 (0, 769, 768, 773, 771)' - PASSED ssl_gtest.sh: #1523: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/782 (0, 769, 768, 773, 772)' - PASSED ssl_gtest.sh: #1524: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/783 (0, 769, 768, 773, 773)' - PASSED ssl_gtest.sh: #1525: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/784 (0, 769, 769, 767, 767)' - PASSED ssl_gtest.sh: #1526: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/785 (0, 769, 769, 767, 768)' - PASSED ssl_gtest.sh: #1527: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/786 (0, 769, 769, 767, 769)' - PASSED ssl_gtest.sh: #1528: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/787 (0, 769, 769, 767, 770)' - PASSED ssl_gtest.sh: #1529: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/788 (0, 769, 769, 767, 771)' - PASSED ssl_gtest.sh: #1530: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/789 (0, 769, 769, 767, 772)' - PASSED ssl_gtest.sh: #1531: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/790 (0, 769, 769, 767, 773)' - PASSED ssl_gtest.sh: #1532: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/791 (0, 769, 769, 768, 767)' - PASSED ssl_gtest.sh: #1533: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/792 (0, 769, 769, 768, 768)' - PASSED ssl_gtest.sh: #1534: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/793 (0, 769, 769, 768, 769)' - PASSED ssl_gtest.sh: #1535: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/794 (0, 769, 769, 768, 770)' - PASSED ssl_gtest.sh: #1536: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/795 (0, 769, 769, 768, 771)' - PASSED ssl_gtest.sh: #1537: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/796 (0, 769, 769, 768, 772)' - PASSED ssl_gtest.sh: #1538: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/797 (0, 769, 769, 768, 773)' - PASSED ssl_gtest.sh: #1539: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/798 (0, 769, 769, 769, 767)' - PASSED ssl_gtest.sh: #1540: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/799 (0, 769, 769, 769, 768)' - PASSED ssl_gtest.sh: #1541: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/800 (0, 769, 769, 769, 769)' - PASSED ssl_gtest.sh: #1542: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/801 (0, 769, 769, 769, 770)' - PASSED ssl_gtest.sh: #1543: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/802 (0, 769, 769, 769, 771)' - PASSED ssl_gtest.sh: #1544: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/803 (0, 769, 769, 769, 772)' - PASSED ssl_gtest.sh: #1545: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/804 (0, 769, 769, 769, 773)' - PASSED ssl_gtest.sh: #1546: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/805 (0, 769, 769, 770, 767)' - PASSED ssl_gtest.sh: #1547: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/806 (0, 769, 769, 770, 768)' - PASSED ssl_gtest.sh: #1548: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/807 (0, 769, 769, 770, 769)' - PASSED ssl_gtest.sh: #1549: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/808 (0, 769, 769, 770, 770)' - PASSED ssl_gtest.sh: #1550: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/809 (0, 769, 769, 770, 771)' - PASSED ssl_gtest.sh: #1551: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/810 (0, 769, 769, 770, 772)' - PASSED ssl_gtest.sh: #1552: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/811 (0, 769, 769, 770, 773)' - PASSED ssl_gtest.sh: #1553: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/812 (0, 769, 769, 771, 767)' - PASSED ssl_gtest.sh: #1554: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/813 (0, 769, 769, 771, 768)' - PASSED ssl_gtest.sh: #1555: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/814 (0, 769, 769, 771, 769)' - PASSED ssl_gtest.sh: #1556: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/815 (0, 769, 769, 771, 770)' - PASSED ssl_gtest.sh: #1557: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/816 (0, 769, 769, 771, 771)' - PASSED ssl_gtest.sh: #1558: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/817 (0, 769, 769, 771, 772)' - PASSED ssl_gtest.sh: #1559: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/818 (0, 769, 769, 771, 773)' - PASSED ssl_gtest.sh: #1560: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/819 (0, 769, 769, 772, 767)' - PASSED ssl_gtest.sh: #1561: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/820 (0, 769, 769, 772, 768)' - PASSED ssl_gtest.sh: #1562: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/821 (0, 769, 769, 772, 769)' - PASSED ssl_gtest.sh: #1563: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/822 (0, 769, 769, 772, 770)' - PASSED ssl_gtest.sh: #1564: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/823 (0, 769, 769, 772, 771)' - PASSED ssl_gtest.sh: #1565: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/824 (0, 769, 769, 772, 772)' - PASSED ssl_gtest.sh: #1566: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/825 (0, 769, 769, 772, 773)' - PASSED ssl_gtest.sh: #1567: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/826 (0, 769, 769, 773, 767)' - PASSED ssl_gtest.sh: #1568: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/827 (0, 769, 769, 773, 768)' - PASSED ssl_gtest.sh: #1569: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/828 (0, 769, 769, 773, 769)' - PASSED ssl_gtest.sh: #1570: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/829 (0, 769, 769, 773, 770)' - PASSED ssl_gtest.sh: #1571: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/830 (0, 769, 769, 773, 771)' - PASSED ssl_gtest.sh: #1572: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/831 (0, 769, 769, 773, 772)' - PASSED ssl_gtest.sh: #1573: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/832 (0, 769, 769, 773, 773)' - PASSED ssl_gtest.sh: #1574: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/833 (0, 769, 770, 767, 767)' - PASSED ssl_gtest.sh: #1575: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/834 (0, 769, 770, 767, 768)' - PASSED ssl_gtest.sh: #1576: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/835 (0, 769, 770, 767, 769)' - PASSED ssl_gtest.sh: #1577: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/836 (0, 769, 770, 767, 770)' - PASSED ssl_gtest.sh: #1578: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/837 (0, 769, 770, 767, 771)' - PASSED ssl_gtest.sh: #1579: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/838 (0, 769, 770, 767, 772)' - PASSED ssl_gtest.sh: #1580: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/839 (0, 769, 770, 767, 773)' - PASSED ssl_gtest.sh: #1581: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/840 (0, 769, 770, 768, 767)' - PASSED ssl_gtest.sh: #1582: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/841 (0, 769, 770, 768, 768)' - PASSED ssl_gtest.sh: #1583: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/842 (0, 769, 770, 768, 769)' - PASSED ssl_gtest.sh: #1584: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/843 (0, 769, 770, 768, 770)' - PASSED ssl_gtest.sh: #1585: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/844 (0, 769, 770, 768, 771)' - PASSED ssl_gtest.sh: #1586: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/845 (0, 769, 770, 768, 772)' - PASSED ssl_gtest.sh: #1587: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/846 (0, 769, 770, 768, 773)' - PASSED ssl_gtest.sh: #1588: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/847 (0, 769, 770, 769, 767)' - PASSED ssl_gtest.sh: #1589: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/848 (0, 769, 770, 769, 768)' - PASSED ssl_gtest.sh: #1590: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/849 (0, 769, 770, 769, 769)' - PASSED ssl_gtest.sh: #1591: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/850 (0, 769, 770, 769, 770)' - PASSED ssl_gtest.sh: #1592: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/851 (0, 769, 770, 769, 771)' - PASSED ssl_gtest.sh: #1593: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/852 (0, 769, 770, 769, 772)' - PASSED ssl_gtest.sh: #1594: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/853 (0, 769, 770, 769, 773)' - PASSED ssl_gtest.sh: #1595: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/854 (0, 769, 770, 770, 767)' - PASSED ssl_gtest.sh: #1596: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/855 (0, 769, 770, 770, 768)' - PASSED ssl_gtest.sh: #1597: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/856 (0, 769, 770, 770, 769)' - PASSED ssl_gtest.sh: #1598: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/857 (0, 769, 770, 770, 770)' - PASSED ssl_gtest.sh: #1599: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/858 (0, 769, 770, 770, 771)' - PASSED ssl_gtest.sh: #1600: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/859 (0, 769, 770, 770, 772)' - PASSED ssl_gtest.sh: #1601: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/860 (0, 769, 770, 770, 773)' - PASSED ssl_gtest.sh: #1602: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/861 (0, 769, 770, 771, 767)' - PASSED ssl_gtest.sh: #1603: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/862 (0, 769, 770, 771, 768)' - PASSED ssl_gtest.sh: #1604: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/863 (0, 769, 770, 771, 769)' - PASSED ssl_gtest.sh: #1605: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/864 (0, 769, 770, 771, 770)' - PASSED ssl_gtest.sh: #1606: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/865 (0, 769, 770, 771, 771)' - PASSED ssl_gtest.sh: #1607: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/866 (0, 769, 770, 771, 772)' - PASSED ssl_gtest.sh: #1608: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/867 (0, 769, 770, 771, 773)' - PASSED ssl_gtest.sh: #1609: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/868 (0, 769, 770, 772, 767)' - PASSED ssl_gtest.sh: #1610: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/869 (0, 769, 770, 772, 768)' - PASSED ssl_gtest.sh: #1611: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/870 (0, 769, 770, 772, 769)' - PASSED ssl_gtest.sh: #1612: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/871 (0, 769, 770, 772, 770)' - PASSED ssl_gtest.sh: #1613: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/872 (0, 769, 770, 772, 771)' - PASSED ssl_gtest.sh: #1614: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/873 (0, 769, 770, 772, 772)' - PASSED ssl_gtest.sh: #1615: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/874 (0, 769, 770, 772, 773)' - PASSED ssl_gtest.sh: #1616: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/875 (0, 769, 770, 773, 767)' - PASSED ssl_gtest.sh: #1617: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/876 (0, 769, 770, 773, 768)' - PASSED ssl_gtest.sh: #1618: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/877 (0, 769, 770, 773, 769)' - PASSED ssl_gtest.sh: #1619: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/878 (0, 769, 770, 773, 770)' - PASSED ssl_gtest.sh: #1620: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/879 (0, 769, 770, 773, 771)' - PASSED ssl_gtest.sh: #1621: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/880 (0, 769, 770, 773, 772)' - PASSED ssl_gtest.sh: #1622: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/881 (0, 769, 770, 773, 773)' - PASSED ssl_gtest.sh: #1623: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/882 (0, 769, 771, 767, 767)' - PASSED ssl_gtest.sh: #1624: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/883 (0, 769, 771, 767, 768)' - PASSED ssl_gtest.sh: #1625: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/884 (0, 769, 771, 767, 769)' - PASSED ssl_gtest.sh: #1626: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/885 (0, 769, 771, 767, 770)' - PASSED ssl_gtest.sh: #1627: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/886 (0, 769, 771, 767, 771)' - PASSED ssl_gtest.sh: #1628: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/887 (0, 769, 771, 767, 772)' - PASSED ssl_gtest.sh: #1629: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/888 (0, 769, 771, 767, 773)' - PASSED ssl_gtest.sh: #1630: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/889 (0, 769, 771, 768, 767)' - PASSED ssl_gtest.sh: #1631: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/890 (0, 769, 771, 768, 768)' - PASSED ssl_gtest.sh: #1632: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/891 (0, 769, 771, 768, 769)' - PASSED ssl_gtest.sh: #1633: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/892 (0, 769, 771, 768, 770)' - PASSED ssl_gtest.sh: #1634: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/893 (0, 769, 771, 768, 771)' - PASSED ssl_gtest.sh: #1635: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/894 (0, 769, 771, 768, 772)' - PASSED ssl_gtest.sh: #1636: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/895 (0, 769, 771, 768, 773)' - PASSED ssl_gtest.sh: #1637: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/896 (0, 769, 771, 769, 767)' - PASSED ssl_gtest.sh: #1638: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/897 (0, 769, 771, 769, 768)' - PASSED ssl_gtest.sh: #1639: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/898 (0, 769, 771, 769, 769)' - PASSED ssl_gtest.sh: #1640: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/899 (0, 769, 771, 769, 770)' - PASSED ssl_gtest.sh: #1641: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/900 (0, 769, 771, 769, 771)' - PASSED ssl_gtest.sh: #1642: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/901 (0, 769, 771, 769, 772)' - PASSED ssl_gtest.sh: #1643: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/902 (0, 769, 771, 769, 773)' - PASSED ssl_gtest.sh: #1644: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/903 (0, 769, 771, 770, 767)' - PASSED ssl_gtest.sh: #1645: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/904 (0, 769, 771, 770, 768)' - PASSED ssl_gtest.sh: #1646: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/905 (0, 769, 771, 770, 769)' - PASSED ssl_gtest.sh: #1647: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/906 (0, 769, 771, 770, 770)' - PASSED ssl_gtest.sh: #1648: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/907 (0, 769, 771, 770, 771)' - PASSED ssl_gtest.sh: #1649: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/908 (0, 769, 771, 770, 772)' - PASSED ssl_gtest.sh: #1650: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/909 (0, 769, 771, 770, 773)' - PASSED ssl_gtest.sh: #1651: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/910 (0, 769, 771, 771, 767)' - PASSED ssl_gtest.sh: #1652: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/911 (0, 769, 771, 771, 768)' - PASSED ssl_gtest.sh: #1653: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/912 (0, 769, 771, 771, 769)' - PASSED ssl_gtest.sh: #1654: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/913 (0, 769, 771, 771, 770)' - PASSED ssl_gtest.sh: #1655: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/914 (0, 769, 771, 771, 771)' - PASSED ssl_gtest.sh: #1656: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/915 (0, 769, 771, 771, 772)' - PASSED ssl_gtest.sh: #1657: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/916 (0, 769, 771, 771, 773)' - PASSED ssl_gtest.sh: #1658: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/917 (0, 769, 771, 772, 767)' - PASSED ssl_gtest.sh: #1659: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/918 (0, 769, 771, 772, 768)' - PASSED ssl_gtest.sh: #1660: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/919 (0, 769, 771, 772, 769)' - PASSED ssl_gtest.sh: #1661: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/920 (0, 769, 771, 772, 770)' - PASSED ssl_gtest.sh: #1662: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/921 (0, 769, 771, 772, 771)' - PASSED ssl_gtest.sh: #1663: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/922 (0, 769, 771, 772, 772)' - PASSED ssl_gtest.sh: #1664: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/923 (0, 769, 771, 772, 773)' - PASSED ssl_gtest.sh: #1665: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/924 (0, 769, 771, 773, 767)' - PASSED ssl_gtest.sh: #1666: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/925 (0, 769, 771, 773, 768)' - PASSED ssl_gtest.sh: #1667: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/926 (0, 769, 771, 773, 769)' - PASSED ssl_gtest.sh: #1668: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/927 (0, 769, 771, 773, 770)' - PASSED ssl_gtest.sh: #1669: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/928 (0, 769, 771, 773, 771)' - PASSED ssl_gtest.sh: #1670: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/929 (0, 769, 771, 773, 772)' - PASSED ssl_gtest.sh: #1671: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/930 (0, 769, 771, 773, 773)' - PASSED ssl_gtest.sh: #1672: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/931 (0, 769, 772, 767, 767)' - PASSED ssl_gtest.sh: #1673: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/932 (0, 769, 772, 767, 768)' - PASSED ssl_gtest.sh: #1674: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/933 (0, 769, 772, 767, 769)' - PASSED ssl_gtest.sh: #1675: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/934 (0, 769, 772, 767, 770)' - PASSED ssl_gtest.sh: #1676: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/935 (0, 769, 772, 767, 771)' - PASSED ssl_gtest.sh: #1677: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/936 (0, 769, 772, 767, 772)' - PASSED ssl_gtest.sh: #1678: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/937 (0, 769, 772, 767, 773)' - PASSED ssl_gtest.sh: #1679: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/938 (0, 769, 772, 768, 767)' - PASSED ssl_gtest.sh: #1680: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/939 (0, 769, 772, 768, 768)' - PASSED ssl_gtest.sh: #1681: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/940 (0, 769, 772, 768, 769)' - PASSED ssl_gtest.sh: #1682: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/941 (0, 769, 772, 768, 770)' - PASSED ssl_gtest.sh: #1683: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/942 (0, 769, 772, 768, 771)' - PASSED ssl_gtest.sh: #1684: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/943 (0, 769, 772, 768, 772)' - PASSED ssl_gtest.sh: #1685: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/944 (0, 769, 772, 768, 773)' - PASSED ssl_gtest.sh: #1686: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/945 (0, 769, 772, 769, 767)' - PASSED ssl_gtest.sh: #1687: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/946 (0, 769, 772, 769, 768)' - PASSED ssl_gtest.sh: #1688: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/947 (0, 769, 772, 769, 769)' - PASSED ssl_gtest.sh: #1689: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/948 (0, 769, 772, 769, 770)' - PASSED ssl_gtest.sh: #1690: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/949 (0, 769, 772, 769, 771)' - PASSED ssl_gtest.sh: #1691: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/950 (0, 769, 772, 769, 772)' - PASSED ssl_gtest.sh: #1692: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/951 (0, 769, 772, 769, 773)' - PASSED ssl_gtest.sh: #1693: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/952 (0, 769, 772, 770, 767)' - PASSED ssl_gtest.sh: #1694: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/953 (0, 769, 772, 770, 768)' - PASSED ssl_gtest.sh: #1695: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/954 (0, 769, 772, 770, 769)' - PASSED ssl_gtest.sh: #1696: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/955 (0, 769, 772, 770, 770)' - PASSED ssl_gtest.sh: #1697: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/956 (0, 769, 772, 770, 771)' - PASSED ssl_gtest.sh: #1698: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/957 (0, 769, 772, 770, 772)' - PASSED ssl_gtest.sh: #1699: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/958 (0, 769, 772, 770, 773)' - PASSED ssl_gtest.sh: #1700: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/959 (0, 769, 772, 771, 767)' - PASSED ssl_gtest.sh: #1701: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/960 (0, 769, 772, 771, 768)' - PASSED ssl_gtest.sh: #1702: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/961 (0, 769, 772, 771, 769)' - PASSED ssl_gtest.sh: #1703: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/962 (0, 769, 772, 771, 770)' - PASSED ssl_gtest.sh: #1704: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/963 (0, 769, 772, 771, 771)' - PASSED ssl_gtest.sh: #1705: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/964 (0, 769, 772, 771, 772)' - PASSED ssl_gtest.sh: #1706: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/965 (0, 769, 772, 771, 773)' - PASSED ssl_gtest.sh: #1707: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/966 (0, 769, 772, 772, 767)' - PASSED ssl_gtest.sh: #1708: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/967 (0, 769, 772, 772, 768)' - PASSED ssl_gtest.sh: #1709: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/968 (0, 769, 772, 772, 769)' - PASSED ssl_gtest.sh: #1710: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/969 (0, 769, 772, 772, 770)' - PASSED ssl_gtest.sh: #1711: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/970 (0, 769, 772, 772, 771)' - PASSED ssl_gtest.sh: #1712: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/971 (0, 769, 772, 772, 772)' - PASSED ssl_gtest.sh: #1713: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/972 (0, 769, 772, 772, 773)' - PASSED ssl_gtest.sh: #1714: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/973 (0, 769, 772, 773, 767)' - PASSED ssl_gtest.sh: #1715: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/974 (0, 769, 772, 773, 768)' - PASSED ssl_gtest.sh: #1716: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/975 (0, 769, 772, 773, 769)' - PASSED ssl_gtest.sh: #1717: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/976 (0, 769, 772, 773, 770)' - PASSED ssl_gtest.sh: #1718: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/977 (0, 769, 772, 773, 771)' - PASSED ssl_gtest.sh: #1719: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/978 (0, 769, 772, 773, 772)' - PASSED ssl_gtest.sh: #1720: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/979 (0, 769, 772, 773, 773)' - PASSED ssl_gtest.sh: #1721: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/980 (0, 769, 773, 767, 767)' - PASSED ssl_gtest.sh: #1722: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/981 (0, 769, 773, 767, 768)' - PASSED ssl_gtest.sh: #1723: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/982 (0, 769, 773, 767, 769)' - PASSED ssl_gtest.sh: #1724: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/983 (0, 769, 773, 767, 770)' - PASSED ssl_gtest.sh: #1725: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/984 (0, 769, 773, 767, 771)' - PASSED ssl_gtest.sh: #1726: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/985 (0, 769, 773, 767, 772)' - PASSED ssl_gtest.sh: #1727: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/986 (0, 769, 773, 767, 773)' - PASSED ssl_gtest.sh: #1728: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/987 (0, 769, 773, 768, 767)' - PASSED ssl_gtest.sh: #1729: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/988 (0, 769, 773, 768, 768)' - PASSED ssl_gtest.sh: #1730: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/989 (0, 769, 773, 768, 769)' - PASSED ssl_gtest.sh: #1731: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/990 (0, 769, 773, 768, 770)' - PASSED ssl_gtest.sh: #1732: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/991 (0, 769, 773, 768, 771)' - PASSED ssl_gtest.sh: #1733: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/992 (0, 769, 773, 768, 772)' - PASSED ssl_gtest.sh: #1734: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/993 (0, 769, 773, 768, 773)' - PASSED ssl_gtest.sh: #1735: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/994 (0, 769, 773, 769, 767)' - PASSED ssl_gtest.sh: #1736: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/995 (0, 769, 773, 769, 768)' - PASSED ssl_gtest.sh: #1737: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/996 (0, 769, 773, 769, 769)' - PASSED ssl_gtest.sh: #1738: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/997 (0, 769, 773, 769, 770)' - PASSED ssl_gtest.sh: #1739: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/998 (0, 769, 773, 769, 771)' - PASSED ssl_gtest.sh: #1740: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/999 (0, 769, 773, 769, 772)' - PASSED ssl_gtest.sh: #1741: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1000 (0, 769, 773, 769, 773)' - PASSED ssl_gtest.sh: #1742: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1001 (0, 769, 773, 770, 767)' - PASSED ssl_gtest.sh: #1743: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1002 (0, 769, 773, 770, 768)' - PASSED ssl_gtest.sh: #1744: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1003 (0, 769, 773, 770, 769)' - PASSED ssl_gtest.sh: #1745: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1004 (0, 769, 773, 770, 770)' - PASSED ssl_gtest.sh: #1746: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1005 (0, 769, 773, 770, 771)' - PASSED ssl_gtest.sh: #1747: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1006 (0, 769, 773, 770, 772)' - PASSED ssl_gtest.sh: #1748: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1007 (0, 769, 773, 770, 773)' - PASSED ssl_gtest.sh: #1749: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1008 (0, 769, 773, 771, 767)' - PASSED ssl_gtest.sh: #1750: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1009 (0, 769, 773, 771, 768)' - PASSED ssl_gtest.sh: #1751: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1010 (0, 769, 773, 771, 769)' - PASSED ssl_gtest.sh: #1752: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1011 (0, 769, 773, 771, 770)' - PASSED ssl_gtest.sh: #1753: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1012 (0, 769, 773, 771, 771)' - PASSED ssl_gtest.sh: #1754: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1013 (0, 769, 773, 771, 772)' - PASSED ssl_gtest.sh: #1755: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1014 (0, 769, 773, 771, 773)' - PASSED ssl_gtest.sh: #1756: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1015 (0, 769, 773, 772, 767)' - PASSED ssl_gtest.sh: #1757: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1016 (0, 769, 773, 772, 768)' - PASSED ssl_gtest.sh: #1758: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1017 (0, 769, 773, 772, 769)' - PASSED ssl_gtest.sh: #1759: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1018 (0, 769, 773, 772, 770)' - PASSED ssl_gtest.sh: #1760: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1019 (0, 769, 773, 772, 771)' - PASSED ssl_gtest.sh: #1761: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1020 (0, 769, 773, 772, 772)' - PASSED ssl_gtest.sh: #1762: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1021 (0, 769, 773, 772, 773)' - PASSED ssl_gtest.sh: #1763: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1022 (0, 769, 773, 773, 767)' - PASSED ssl_gtest.sh: #1764: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1023 (0, 769, 773, 773, 768)' - PASSED ssl_gtest.sh: #1765: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1024 (0, 769, 773, 773, 769)' - PASSED ssl_gtest.sh: #1766: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1025 (0, 769, 773, 773, 770)' - PASSED ssl_gtest.sh: #1767: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1026 (0, 769, 773, 773, 771)' - PASSED ssl_gtest.sh: #1768: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1027 (0, 769, 773, 773, 772)' - PASSED ssl_gtest.sh: #1769: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1028 (0, 769, 773, 773, 773)' - PASSED ssl_gtest.sh: #1770: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1029 (0, 770, 767, 767, 767)' - PASSED ssl_gtest.sh: #1771: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1030 (0, 770, 767, 767, 768)' - PASSED ssl_gtest.sh: #1772: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1031 (0, 770, 767, 767, 769)' - PASSED ssl_gtest.sh: #1773: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1032 (0, 770, 767, 767, 770)' - PASSED ssl_gtest.sh: #1774: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1033 (0, 770, 767, 767, 771)' - PASSED ssl_gtest.sh: #1775: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1034 (0, 770, 767, 767, 772)' - PASSED ssl_gtest.sh: #1776: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1035 (0, 770, 767, 767, 773)' - PASSED ssl_gtest.sh: #1777: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1036 (0, 770, 767, 768, 767)' - PASSED ssl_gtest.sh: #1778: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1037 (0, 770, 767, 768, 768)' - PASSED ssl_gtest.sh: #1779: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1038 (0, 770, 767, 768, 769)' - PASSED ssl_gtest.sh: #1780: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1039 (0, 770, 767, 768, 770)' - PASSED ssl_gtest.sh: #1781: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1040 (0, 770, 767, 768, 771)' - PASSED ssl_gtest.sh: #1782: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1041 (0, 770, 767, 768, 772)' - PASSED ssl_gtest.sh: #1783: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1042 (0, 770, 767, 768, 773)' - PASSED ssl_gtest.sh: #1784: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1043 (0, 770, 767, 769, 767)' - PASSED ssl_gtest.sh: #1785: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1044 (0, 770, 767, 769, 768)' - PASSED ssl_gtest.sh: #1786: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1045 (0, 770, 767, 769, 769)' - PASSED ssl_gtest.sh: #1787: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1046 (0, 770, 767, 769, 770)' - PASSED ssl_gtest.sh: #1788: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1047 (0, 770, 767, 769, 771)' - PASSED ssl_gtest.sh: #1789: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1048 (0, 770, 767, 769, 772)' - PASSED ssl_gtest.sh: #1790: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1049 (0, 770, 767, 769, 773)' - PASSED ssl_gtest.sh: #1791: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1050 (0, 770, 767, 770, 767)' - PASSED ssl_gtest.sh: #1792: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1051 (0, 770, 767, 770, 768)' - PASSED ssl_gtest.sh: #1793: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1052 (0, 770, 767, 770, 769)' - PASSED ssl_gtest.sh: #1794: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1053 (0, 770, 767, 770, 770)' - PASSED ssl_gtest.sh: #1795: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1054 (0, 770, 767, 770, 771)' - PASSED ssl_gtest.sh: #1796: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1055 (0, 770, 767, 770, 772)' - PASSED ssl_gtest.sh: #1797: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1056 (0, 770, 767, 770, 773)' - PASSED ssl_gtest.sh: #1798: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1057 (0, 770, 767, 771, 767)' - PASSED ssl_gtest.sh: #1799: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1058 (0, 770, 767, 771, 768)' - PASSED ssl_gtest.sh: #1800: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1059 (0, 770, 767, 771, 769)' - PASSED ssl_gtest.sh: #1801: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1060 (0, 770, 767, 771, 770)' - PASSED ssl_gtest.sh: #1802: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1061 (0, 770, 767, 771, 771)' - PASSED ssl_gtest.sh: #1803: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1062 (0, 770, 767, 771, 772)' - PASSED ssl_gtest.sh: #1804: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1063 (0, 770, 767, 771, 773)' - PASSED ssl_gtest.sh: #1805: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1064 (0, 770, 767, 772, 767)' - PASSED ssl_gtest.sh: #1806: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1065 (0, 770, 767, 772, 768)' - PASSED ssl_gtest.sh: #1807: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1066 (0, 770, 767, 772, 769)' - PASSED ssl_gtest.sh: #1808: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1067 (0, 770, 767, 772, 770)' - PASSED ssl_gtest.sh: #1809: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1068 (0, 770, 767, 772, 771)' - PASSED ssl_gtest.sh: #1810: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1069 (0, 770, 767, 772, 772)' - PASSED ssl_gtest.sh: #1811: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1070 (0, 770, 767, 772, 773)' - PASSED ssl_gtest.sh: #1812: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1071 (0, 770, 767, 773, 767)' - PASSED ssl_gtest.sh: #1813: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1072 (0, 770, 767, 773, 768)' - PASSED ssl_gtest.sh: #1814: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1073 (0, 770, 767, 773, 769)' - PASSED ssl_gtest.sh: #1815: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1074 (0, 770, 767, 773, 770)' - PASSED ssl_gtest.sh: #1816: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1075 (0, 770, 767, 773, 771)' - PASSED ssl_gtest.sh: #1817: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1076 (0, 770, 767, 773, 772)' - PASSED ssl_gtest.sh: #1818: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1077 (0, 770, 767, 773, 773)' - PASSED ssl_gtest.sh: #1819: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1078 (0, 770, 768, 767, 767)' - PASSED ssl_gtest.sh: #1820: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1079 (0, 770, 768, 767, 768)' - PASSED ssl_gtest.sh: #1821: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1080 (0, 770, 768, 767, 769)' - PASSED ssl_gtest.sh: #1822: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1081 (0, 770, 768, 767, 770)' - PASSED ssl_gtest.sh: #1823: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1082 (0, 770, 768, 767, 771)' - PASSED ssl_gtest.sh: #1824: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1083 (0, 770, 768, 767, 772)' - PASSED ssl_gtest.sh: #1825: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1084 (0, 770, 768, 767, 773)' - PASSED ssl_gtest.sh: #1826: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1085 (0, 770, 768, 768, 767)' - PASSED ssl_gtest.sh: #1827: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1086 (0, 770, 768, 768, 768)' - PASSED ssl_gtest.sh: #1828: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1087 (0, 770, 768, 768, 769)' - PASSED ssl_gtest.sh: #1829: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1088 (0, 770, 768, 768, 770)' - PASSED ssl_gtest.sh: #1830: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1089 (0, 770, 768, 768, 771)' - PASSED ssl_gtest.sh: #1831: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1090 (0, 770, 768, 768, 772)' - PASSED ssl_gtest.sh: #1832: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1091 (0, 770, 768, 768, 773)' - PASSED ssl_gtest.sh: #1833: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1092 (0, 770, 768, 769, 767)' - PASSED ssl_gtest.sh: #1834: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1093 (0, 770, 768, 769, 768)' - PASSED ssl_gtest.sh: #1835: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1094 (0, 770, 768, 769, 769)' - PASSED ssl_gtest.sh: #1836: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1095 (0, 770, 768, 769, 770)' - PASSED ssl_gtest.sh: #1837: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1096 (0, 770, 768, 769, 771)' - PASSED ssl_gtest.sh: #1838: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1097 (0, 770, 768, 769, 772)' - PASSED ssl_gtest.sh: #1839: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1098 (0, 770, 768, 769, 773)' - PASSED ssl_gtest.sh: #1840: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1099 (0, 770, 768, 770, 767)' - PASSED ssl_gtest.sh: #1841: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1100 (0, 770, 768, 770, 768)' - PASSED ssl_gtest.sh: #1842: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1101 (0, 770, 768, 770, 769)' - PASSED ssl_gtest.sh: #1843: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1102 (0, 770, 768, 770, 770)' - PASSED ssl_gtest.sh: #1844: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1103 (0, 770, 768, 770, 771)' - PASSED ssl_gtest.sh: #1845: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1104 (0, 770, 768, 770, 772)' - PASSED ssl_gtest.sh: #1846: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1105 (0, 770, 768, 770, 773)' - PASSED ssl_gtest.sh: #1847: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1106 (0, 770, 768, 771, 767)' - PASSED ssl_gtest.sh: #1848: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1107 (0, 770, 768, 771, 768)' - PASSED ssl_gtest.sh: #1849: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1108 (0, 770, 768, 771, 769)' - PASSED ssl_gtest.sh: #1850: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1109 (0, 770, 768, 771, 770)' - PASSED ssl_gtest.sh: #1851: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1110 (0, 770, 768, 771, 771)' - PASSED ssl_gtest.sh: #1852: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1111 (0, 770, 768, 771, 772)' - PASSED ssl_gtest.sh: #1853: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1112 (0, 770, 768, 771, 773)' - PASSED ssl_gtest.sh: #1854: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1113 (0, 770, 768, 772, 767)' - PASSED ssl_gtest.sh: #1855: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1114 (0, 770, 768, 772, 768)' - PASSED ssl_gtest.sh: #1856: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1115 (0, 770, 768, 772, 769)' - PASSED ssl_gtest.sh: #1857: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1116 (0, 770, 768, 772, 770)' - PASSED ssl_gtest.sh: #1858: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1117 (0, 770, 768, 772, 771)' - PASSED ssl_gtest.sh: #1859: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1118 (0, 770, 768, 772, 772)' - PASSED ssl_gtest.sh: #1860: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1119 (0, 770, 768, 772, 773)' - PASSED ssl_gtest.sh: #1861: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1120 (0, 770, 768, 773, 767)' - PASSED ssl_gtest.sh: #1862: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1121 (0, 770, 768, 773, 768)' - PASSED ssl_gtest.sh: #1863: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1122 (0, 770, 768, 773, 769)' - PASSED ssl_gtest.sh: #1864: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1123 (0, 770, 768, 773, 770)' - PASSED ssl_gtest.sh: #1865: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1124 (0, 770, 768, 773, 771)' - PASSED ssl_gtest.sh: #1866: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1125 (0, 770, 768, 773, 772)' - PASSED ssl_gtest.sh: #1867: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1126 (0, 770, 768, 773, 773)' - PASSED ssl_gtest.sh: #1868: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1127 (0, 770, 769, 767, 767)' - PASSED ssl_gtest.sh: #1869: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1128 (0, 770, 769, 767, 768)' - PASSED ssl_gtest.sh: #1870: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1129 (0, 770, 769, 767, 769)' - PASSED ssl_gtest.sh: #1871: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1130 (0, 770, 769, 767, 770)' - PASSED ssl_gtest.sh: #1872: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1131 (0, 770, 769, 767, 771)' - PASSED ssl_gtest.sh: #1873: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1132 (0, 770, 769, 767, 772)' - PASSED ssl_gtest.sh: #1874: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1133 (0, 770, 769, 767, 773)' - PASSED ssl_gtest.sh: #1875: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1134 (0, 770, 769, 768, 767)' - PASSED ssl_gtest.sh: #1876: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1135 (0, 770, 769, 768, 768)' - PASSED ssl_gtest.sh: #1877: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1136 (0, 770, 769, 768, 769)' - PASSED ssl_gtest.sh: #1878: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1137 (0, 770, 769, 768, 770)' - PASSED ssl_gtest.sh: #1879: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1138 (0, 770, 769, 768, 771)' - PASSED ssl_gtest.sh: #1880: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1139 (0, 770, 769, 768, 772)' - PASSED ssl_gtest.sh: #1881: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1140 (0, 770, 769, 768, 773)' - PASSED ssl_gtest.sh: #1882: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1141 (0, 770, 769, 769, 767)' - PASSED ssl_gtest.sh: #1883: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1142 (0, 770, 769, 769, 768)' - PASSED ssl_gtest.sh: #1884: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1143 (0, 770, 769, 769, 769)' - PASSED ssl_gtest.sh: #1885: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1144 (0, 770, 769, 769, 770)' - PASSED ssl_gtest.sh: #1886: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1145 (0, 770, 769, 769, 771)' - PASSED ssl_gtest.sh: #1887: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1146 (0, 770, 769, 769, 772)' - PASSED ssl_gtest.sh: #1888: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1147 (0, 770, 769, 769, 773)' - PASSED ssl_gtest.sh: #1889: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1148 (0, 770, 769, 770, 767)' - PASSED ssl_gtest.sh: #1890: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1149 (0, 770, 769, 770, 768)' - PASSED ssl_gtest.sh: #1891: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1150 (0, 770, 769, 770, 769)' - PASSED ssl_gtest.sh: #1892: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1151 (0, 770, 769, 770, 770)' - PASSED ssl_gtest.sh: #1893: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1152 (0, 770, 769, 770, 771)' - PASSED ssl_gtest.sh: #1894: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1153 (0, 770, 769, 770, 772)' - PASSED ssl_gtest.sh: #1895: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1154 (0, 770, 769, 770, 773)' - PASSED ssl_gtest.sh: #1896: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1155 (0, 770, 769, 771, 767)' - PASSED ssl_gtest.sh: #1897: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1156 (0, 770, 769, 771, 768)' - PASSED ssl_gtest.sh: #1898: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1157 (0, 770, 769, 771, 769)' - PASSED ssl_gtest.sh: #1899: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1158 (0, 770, 769, 771, 770)' - PASSED ssl_gtest.sh: #1900: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1159 (0, 770, 769, 771, 771)' - PASSED ssl_gtest.sh: #1901: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1160 (0, 770, 769, 771, 772)' - PASSED ssl_gtest.sh: #1902: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1161 (0, 770, 769, 771, 773)' - PASSED ssl_gtest.sh: #1903: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1162 (0, 770, 769, 772, 767)' - PASSED ssl_gtest.sh: #1904: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1163 (0, 770, 769, 772, 768)' - PASSED ssl_gtest.sh: #1905: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1164 (0, 770, 769, 772, 769)' - PASSED ssl_gtest.sh: #1906: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1165 (0, 770, 769, 772, 770)' - PASSED ssl_gtest.sh: #1907: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1166 (0, 770, 769, 772, 771)' - PASSED ssl_gtest.sh: #1908: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1167 (0, 770, 769, 772, 772)' - PASSED ssl_gtest.sh: #1909: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1168 (0, 770, 769, 772, 773)' - PASSED ssl_gtest.sh: #1910: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1169 (0, 770, 769, 773, 767)' - PASSED ssl_gtest.sh: #1911: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1170 (0, 770, 769, 773, 768)' - PASSED ssl_gtest.sh: #1912: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1171 (0, 770, 769, 773, 769)' - PASSED ssl_gtest.sh: #1913: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1172 (0, 770, 769, 773, 770)' - PASSED ssl_gtest.sh: #1914: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1173 (0, 770, 769, 773, 771)' - PASSED ssl_gtest.sh: #1915: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1174 (0, 770, 769, 773, 772)' - PASSED ssl_gtest.sh: #1916: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1175 (0, 770, 769, 773, 773)' - PASSED ssl_gtest.sh: #1917: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1176 (0, 770, 770, 767, 767)' - PASSED ssl_gtest.sh: #1918: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1177 (0, 770, 770, 767, 768)' - PASSED ssl_gtest.sh: #1919: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1178 (0, 770, 770, 767, 769)' - PASSED ssl_gtest.sh: #1920: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1179 (0, 770, 770, 767, 770)' - PASSED ssl_gtest.sh: #1921: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1180 (0, 770, 770, 767, 771)' - PASSED ssl_gtest.sh: #1922: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1181 (0, 770, 770, 767, 772)' - PASSED ssl_gtest.sh: #1923: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1182 (0, 770, 770, 767, 773)' - PASSED ssl_gtest.sh: #1924: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1183 (0, 770, 770, 768, 767)' - PASSED ssl_gtest.sh: #1925: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1184 (0, 770, 770, 768, 768)' - PASSED ssl_gtest.sh: #1926: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1185 (0, 770, 770, 768, 769)' - PASSED ssl_gtest.sh: #1927: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1186 (0, 770, 770, 768, 770)' - PASSED ssl_gtest.sh: #1928: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1187 (0, 770, 770, 768, 771)' - PASSED ssl_gtest.sh: #1929: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1188 (0, 770, 770, 768, 772)' - PASSED ssl_gtest.sh: #1930: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1189 (0, 770, 770, 768, 773)' - PASSED ssl_gtest.sh: #1931: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1190 (0, 770, 770, 769, 767)' - PASSED ssl_gtest.sh: #1932: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1191 (0, 770, 770, 769, 768)' - PASSED ssl_gtest.sh: #1933: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1192 (0, 770, 770, 769, 769)' - PASSED ssl_gtest.sh: #1934: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1193 (0, 770, 770, 769, 770)' - PASSED ssl_gtest.sh: #1935: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1194 (0, 770, 770, 769, 771)' - PASSED ssl_gtest.sh: #1936: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1195 (0, 770, 770, 769, 772)' - PASSED ssl_gtest.sh: #1937: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1196 (0, 770, 770, 769, 773)' - PASSED ssl_gtest.sh: #1938: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1197 (0, 770, 770, 770, 767)' - PASSED ssl_gtest.sh: #1939: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1198 (0, 770, 770, 770, 768)' - PASSED ssl_gtest.sh: #1940: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1199 (0, 770, 770, 770, 769)' - PASSED ssl_gtest.sh: #1941: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1200 (0, 770, 770, 770, 770)' - PASSED ssl_gtest.sh: #1942: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1201 (0, 770, 770, 770, 771)' - PASSED ssl_gtest.sh: #1943: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1202 (0, 770, 770, 770, 772)' - PASSED ssl_gtest.sh: #1944: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1203 (0, 770, 770, 770, 773)' - PASSED ssl_gtest.sh: #1945: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1204 (0, 770, 770, 771, 767)' - PASSED ssl_gtest.sh: #1946: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1205 (0, 770, 770, 771, 768)' - PASSED ssl_gtest.sh: #1947: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1206 (0, 770, 770, 771, 769)' - PASSED ssl_gtest.sh: #1948: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1207 (0, 770, 770, 771, 770)' - PASSED ssl_gtest.sh: #1949: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1208 (0, 770, 770, 771, 771)' - PASSED ssl_gtest.sh: #1950: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1209 (0, 770, 770, 771, 772)' - PASSED ssl_gtest.sh: #1951: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1210 (0, 770, 770, 771, 773)' - PASSED ssl_gtest.sh: #1952: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1211 (0, 770, 770, 772, 767)' - PASSED ssl_gtest.sh: #1953: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1212 (0, 770, 770, 772, 768)' - PASSED ssl_gtest.sh: #1954: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1213 (0, 770, 770, 772, 769)' - PASSED ssl_gtest.sh: #1955: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1214 (0, 770, 770, 772, 770)' - PASSED ssl_gtest.sh: #1956: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1215 (0, 770, 770, 772, 771)' - PASSED ssl_gtest.sh: #1957: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1216 (0, 770, 770, 772, 772)' - PASSED ssl_gtest.sh: #1958: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1217 (0, 770, 770, 772, 773)' - PASSED ssl_gtest.sh: #1959: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1218 (0, 770, 770, 773, 767)' - PASSED ssl_gtest.sh: #1960: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1219 (0, 770, 770, 773, 768)' - PASSED ssl_gtest.sh: #1961: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1220 (0, 770, 770, 773, 769)' - PASSED ssl_gtest.sh: #1962: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1221 (0, 770, 770, 773, 770)' - PASSED ssl_gtest.sh: #1963: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1222 (0, 770, 770, 773, 771)' - PASSED ssl_gtest.sh: #1964: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1223 (0, 770, 770, 773, 772)' - PASSED ssl_gtest.sh: #1965: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1224 (0, 770, 770, 773, 773)' - PASSED ssl_gtest.sh: #1966: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1225 (0, 770, 771, 767, 767)' - PASSED ssl_gtest.sh: #1967: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1226 (0, 770, 771, 767, 768)' - PASSED ssl_gtest.sh: #1968: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1227 (0, 770, 771, 767, 769)' - PASSED ssl_gtest.sh: #1969: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1228 (0, 770, 771, 767, 770)' - PASSED ssl_gtest.sh: #1970: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1229 (0, 770, 771, 767, 771)' - PASSED ssl_gtest.sh: #1971: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1230 (0, 770, 771, 767, 772)' - PASSED ssl_gtest.sh: #1972: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1231 (0, 770, 771, 767, 773)' - PASSED ssl_gtest.sh: #1973: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1232 (0, 770, 771, 768, 767)' - PASSED ssl_gtest.sh: #1974: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1233 (0, 770, 771, 768, 768)' - PASSED ssl_gtest.sh: #1975: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1234 (0, 770, 771, 768, 769)' - PASSED ssl_gtest.sh: #1976: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1235 (0, 770, 771, 768, 770)' - PASSED ssl_gtest.sh: #1977: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1236 (0, 770, 771, 768, 771)' - PASSED ssl_gtest.sh: #1978: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1237 (0, 770, 771, 768, 772)' - PASSED ssl_gtest.sh: #1979: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1238 (0, 770, 771, 768, 773)' - PASSED ssl_gtest.sh: #1980: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1239 (0, 770, 771, 769, 767)' - PASSED ssl_gtest.sh: #1981: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1240 (0, 770, 771, 769, 768)' - PASSED ssl_gtest.sh: #1982: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1241 (0, 770, 771, 769, 769)' - PASSED ssl_gtest.sh: #1983: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1242 (0, 770, 771, 769, 770)' - PASSED ssl_gtest.sh: #1984: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1243 (0, 770, 771, 769, 771)' - PASSED ssl_gtest.sh: #1985: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1244 (0, 770, 771, 769, 772)' - PASSED ssl_gtest.sh: #1986: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1245 (0, 770, 771, 769, 773)' - PASSED ssl_gtest.sh: #1987: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1246 (0, 770, 771, 770, 767)' - PASSED ssl_gtest.sh: #1988: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1247 (0, 770, 771, 770, 768)' - PASSED ssl_gtest.sh: #1989: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1248 (0, 770, 771, 770, 769)' - PASSED ssl_gtest.sh: #1990: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1249 (0, 770, 771, 770, 770)' - PASSED ssl_gtest.sh: #1991: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1250 (0, 770, 771, 770, 771)' - PASSED ssl_gtest.sh: #1992: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1251 (0, 770, 771, 770, 772)' - PASSED ssl_gtest.sh: #1993: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1252 (0, 770, 771, 770, 773)' - PASSED ssl_gtest.sh: #1994: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1253 (0, 770, 771, 771, 767)' - PASSED ssl_gtest.sh: #1995: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1254 (0, 770, 771, 771, 768)' - PASSED ssl_gtest.sh: #1996: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1255 (0, 770, 771, 771, 769)' - PASSED ssl_gtest.sh: #1997: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1256 (0, 770, 771, 771, 770)' - PASSED ssl_gtest.sh: #1998: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1257 (0, 770, 771, 771, 771)' - PASSED ssl_gtest.sh: #1999: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1258 (0, 770, 771, 771, 772)' - PASSED ssl_gtest.sh: #2000: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1259 (0, 770, 771, 771, 773)' - PASSED ssl_gtest.sh: #2001: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1260 (0, 770, 771, 772, 767)' - PASSED ssl_gtest.sh: #2002: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1261 (0, 770, 771, 772, 768)' - PASSED ssl_gtest.sh: #2003: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1262 (0, 770, 771, 772, 769)' - PASSED ssl_gtest.sh: #2004: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1263 (0, 770, 771, 772, 770)' - PASSED ssl_gtest.sh: #2005: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1264 (0, 770, 771, 772, 771)' - PASSED ssl_gtest.sh: #2006: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1265 (0, 770, 771, 772, 772)' - PASSED ssl_gtest.sh: #2007: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1266 (0, 770, 771, 772, 773)' - PASSED ssl_gtest.sh: #2008: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1267 (0, 770, 771, 773, 767)' - PASSED ssl_gtest.sh: #2009: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1268 (0, 770, 771, 773, 768)' - PASSED ssl_gtest.sh: #2010: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1269 (0, 770, 771, 773, 769)' - PASSED ssl_gtest.sh: #2011: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1270 (0, 770, 771, 773, 770)' - PASSED ssl_gtest.sh: #2012: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1271 (0, 770, 771, 773, 771)' - PASSED ssl_gtest.sh: #2013: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1272 (0, 770, 771, 773, 772)' - PASSED ssl_gtest.sh: #2014: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1273 (0, 770, 771, 773, 773)' - PASSED ssl_gtest.sh: #2015: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1274 (0, 770, 772, 767, 767)' - PASSED ssl_gtest.sh: #2016: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1275 (0, 770, 772, 767, 768)' - PASSED ssl_gtest.sh: #2017: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1276 (0, 770, 772, 767, 769)' - PASSED ssl_gtest.sh: #2018: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1277 (0, 770, 772, 767, 770)' - PASSED ssl_gtest.sh: #2019: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1278 (0, 770, 772, 767, 771)' - PASSED ssl_gtest.sh: #2020: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1279 (0, 770, 772, 767, 772)' - PASSED ssl_gtest.sh: #2021: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1280 (0, 770, 772, 767, 773)' - PASSED ssl_gtest.sh: #2022: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1281 (0, 770, 772, 768, 767)' - PASSED ssl_gtest.sh: #2023: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1282 (0, 770, 772, 768, 768)' - PASSED ssl_gtest.sh: #2024: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1283 (0, 770, 772, 768, 769)' - PASSED ssl_gtest.sh: #2025: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1284 (0, 770, 772, 768, 770)' - PASSED ssl_gtest.sh: #2026: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1285 (0, 770, 772, 768, 771)' - PASSED ssl_gtest.sh: #2027: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1286 (0, 770, 772, 768, 772)' - PASSED ssl_gtest.sh: #2028: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1287 (0, 770, 772, 768, 773)' - PASSED ssl_gtest.sh: #2029: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1288 (0, 770, 772, 769, 767)' - PASSED ssl_gtest.sh: #2030: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1289 (0, 770, 772, 769, 768)' - PASSED ssl_gtest.sh: #2031: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1290 (0, 770, 772, 769, 769)' - PASSED ssl_gtest.sh: #2032: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1291 (0, 770, 772, 769, 770)' - PASSED ssl_gtest.sh: #2033: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1292 (0, 770, 772, 769, 771)' - PASSED ssl_gtest.sh: #2034: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1293 (0, 770, 772, 769, 772)' - PASSED ssl_gtest.sh: #2035: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1294 (0, 770, 772, 769, 773)' - PASSED ssl_gtest.sh: #2036: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1295 (0, 770, 772, 770, 767)' - PASSED ssl_gtest.sh: #2037: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1296 (0, 770, 772, 770, 768)' - PASSED ssl_gtest.sh: #2038: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1297 (0, 770, 772, 770, 769)' - PASSED ssl_gtest.sh: #2039: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1298 (0, 770, 772, 770, 770)' - PASSED ssl_gtest.sh: #2040: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1299 (0, 770, 772, 770, 771)' - PASSED ssl_gtest.sh: #2041: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1300 (0, 770, 772, 770, 772)' - PASSED ssl_gtest.sh: #2042: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1301 (0, 770, 772, 770, 773)' - PASSED ssl_gtest.sh: #2043: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1302 (0, 770, 772, 771, 767)' - PASSED ssl_gtest.sh: #2044: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1303 (0, 770, 772, 771, 768)' - PASSED ssl_gtest.sh: #2045: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1304 (0, 770, 772, 771, 769)' - PASSED ssl_gtest.sh: #2046: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1305 (0, 770, 772, 771, 770)' - PASSED ssl_gtest.sh: #2047: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1306 (0, 770, 772, 771, 771)' - PASSED ssl_gtest.sh: #2048: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1307 (0, 770, 772, 771, 772)' - PASSED ssl_gtest.sh: #2049: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1308 (0, 770, 772, 771, 773)' - PASSED ssl_gtest.sh: #2050: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1309 (0, 770, 772, 772, 767)' - PASSED ssl_gtest.sh: #2051: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1310 (0, 770, 772, 772, 768)' - PASSED ssl_gtest.sh: #2052: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1311 (0, 770, 772, 772, 769)' - PASSED ssl_gtest.sh: #2053: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1312 (0, 770, 772, 772, 770)' - PASSED ssl_gtest.sh: #2054: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1313 (0, 770, 772, 772, 771)' - PASSED ssl_gtest.sh: #2055: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1314 (0, 770, 772, 772, 772)' - PASSED ssl_gtest.sh: #2056: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1315 (0, 770, 772, 772, 773)' - PASSED ssl_gtest.sh: #2057: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1316 (0, 770, 772, 773, 767)' - PASSED ssl_gtest.sh: #2058: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1317 (0, 770, 772, 773, 768)' - PASSED ssl_gtest.sh: #2059: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1318 (0, 770, 772, 773, 769)' - PASSED ssl_gtest.sh: #2060: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1319 (0, 770, 772, 773, 770)' - PASSED ssl_gtest.sh: #2061: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1320 (0, 770, 772, 773, 771)' - PASSED ssl_gtest.sh: #2062: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1321 (0, 770, 772, 773, 772)' - PASSED ssl_gtest.sh: #2063: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1322 (0, 770, 772, 773, 773)' - PASSED ssl_gtest.sh: #2064: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1323 (0, 770, 773, 767, 767)' - PASSED ssl_gtest.sh: #2065: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1324 (0, 770, 773, 767, 768)' - PASSED ssl_gtest.sh: #2066: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1325 (0, 770, 773, 767, 769)' - PASSED ssl_gtest.sh: #2067: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1326 (0, 770, 773, 767, 770)' - PASSED ssl_gtest.sh: #2068: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1327 (0, 770, 773, 767, 771)' - PASSED ssl_gtest.sh: #2069: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1328 (0, 770, 773, 767, 772)' - PASSED ssl_gtest.sh: #2070: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1329 (0, 770, 773, 767, 773)' - PASSED ssl_gtest.sh: #2071: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1330 (0, 770, 773, 768, 767)' - PASSED ssl_gtest.sh: #2072: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1331 (0, 770, 773, 768, 768)' - PASSED ssl_gtest.sh: #2073: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1332 (0, 770, 773, 768, 769)' - PASSED ssl_gtest.sh: #2074: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1333 (0, 770, 773, 768, 770)' - PASSED ssl_gtest.sh: #2075: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1334 (0, 770, 773, 768, 771)' - PASSED ssl_gtest.sh: #2076: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1335 (0, 770, 773, 768, 772)' - PASSED ssl_gtest.sh: #2077: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1336 (0, 770, 773, 768, 773)' - PASSED ssl_gtest.sh: #2078: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1337 (0, 770, 773, 769, 767)' - PASSED ssl_gtest.sh: #2079: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1338 (0, 770, 773, 769, 768)' - PASSED ssl_gtest.sh: #2080: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1339 (0, 770, 773, 769, 769)' - PASSED ssl_gtest.sh: #2081: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1340 (0, 770, 773, 769, 770)' - PASSED ssl_gtest.sh: #2082: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1341 (0, 770, 773, 769, 771)' - PASSED ssl_gtest.sh: #2083: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1342 (0, 770, 773, 769, 772)' - PASSED ssl_gtest.sh: #2084: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1343 (0, 770, 773, 769, 773)' - PASSED ssl_gtest.sh: #2085: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1344 (0, 770, 773, 770, 767)' - PASSED ssl_gtest.sh: #2086: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1345 (0, 770, 773, 770, 768)' - PASSED ssl_gtest.sh: #2087: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1346 (0, 770, 773, 770, 769)' - PASSED ssl_gtest.sh: #2088: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1347 (0, 770, 773, 770, 770)' - PASSED ssl_gtest.sh: #2089: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1348 (0, 770, 773, 770, 771)' - PASSED ssl_gtest.sh: #2090: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1349 (0, 770, 773, 770, 772)' - PASSED ssl_gtest.sh: #2091: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1350 (0, 770, 773, 770, 773)' - PASSED ssl_gtest.sh: #2092: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1351 (0, 770, 773, 771, 767)' - PASSED ssl_gtest.sh: #2093: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1352 (0, 770, 773, 771, 768)' - PASSED ssl_gtest.sh: #2094: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1353 (0, 770, 773, 771, 769)' - PASSED ssl_gtest.sh: #2095: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1354 (0, 770, 773, 771, 770)' - PASSED ssl_gtest.sh: #2096: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1355 (0, 770, 773, 771, 771)' - PASSED ssl_gtest.sh: #2097: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1356 (0, 770, 773, 771, 772)' - PASSED ssl_gtest.sh: #2098: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1357 (0, 770, 773, 771, 773)' - PASSED ssl_gtest.sh: #2099: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1358 (0, 770, 773, 772, 767)' - PASSED ssl_gtest.sh: #2100: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1359 (0, 770, 773, 772, 768)' - PASSED ssl_gtest.sh: #2101: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1360 (0, 770, 773, 772, 769)' - PASSED ssl_gtest.sh: #2102: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1361 (0, 770, 773, 772, 770)' - PASSED ssl_gtest.sh: #2103: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1362 (0, 770, 773, 772, 771)' - PASSED ssl_gtest.sh: #2104: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1363 (0, 770, 773, 772, 772)' - PASSED ssl_gtest.sh: #2105: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1364 (0, 770, 773, 772, 773)' - PASSED ssl_gtest.sh: #2106: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1365 (0, 770, 773, 773, 767)' - PASSED ssl_gtest.sh: #2107: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1366 (0, 770, 773, 773, 768)' - PASSED ssl_gtest.sh: #2108: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1367 (0, 770, 773, 773, 769)' - PASSED ssl_gtest.sh: #2109: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1368 (0, 770, 773, 773, 770)' - PASSED ssl_gtest.sh: #2110: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1369 (0, 770, 773, 773, 771)' - PASSED ssl_gtest.sh: #2111: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1370 (0, 770, 773, 773, 772)' - PASSED ssl_gtest.sh: #2112: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1371 (0, 770, 773, 773, 773)' - PASSED ssl_gtest.sh: #2113: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1372 (0, 771, 767, 767, 767)' - PASSED ssl_gtest.sh: #2114: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1373 (0, 771, 767, 767, 768)' - PASSED ssl_gtest.sh: #2115: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1374 (0, 771, 767, 767, 769)' - PASSED ssl_gtest.sh: #2116: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1375 (0, 771, 767, 767, 770)' - PASSED ssl_gtest.sh: #2117: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1376 (0, 771, 767, 767, 771)' - PASSED ssl_gtest.sh: #2118: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1377 (0, 771, 767, 767, 772)' - PASSED ssl_gtest.sh: #2119: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1378 (0, 771, 767, 767, 773)' - PASSED ssl_gtest.sh: #2120: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1379 (0, 771, 767, 768, 767)' - PASSED ssl_gtest.sh: #2121: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1380 (0, 771, 767, 768, 768)' - PASSED ssl_gtest.sh: #2122: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1381 (0, 771, 767, 768, 769)' - PASSED ssl_gtest.sh: #2123: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1382 (0, 771, 767, 768, 770)' - PASSED ssl_gtest.sh: #2124: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1383 (0, 771, 767, 768, 771)' - PASSED ssl_gtest.sh: #2125: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1384 (0, 771, 767, 768, 772)' - PASSED ssl_gtest.sh: #2126: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1385 (0, 771, 767, 768, 773)' - PASSED ssl_gtest.sh: #2127: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1386 (0, 771, 767, 769, 767)' - PASSED ssl_gtest.sh: #2128: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1387 (0, 771, 767, 769, 768)' - PASSED ssl_gtest.sh: #2129: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1388 (0, 771, 767, 769, 769)' - PASSED ssl_gtest.sh: #2130: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1389 (0, 771, 767, 769, 770)' - PASSED ssl_gtest.sh: #2131: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1390 (0, 771, 767, 769, 771)' - PASSED ssl_gtest.sh: #2132: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1391 (0, 771, 767, 769, 772)' - PASSED ssl_gtest.sh: #2133: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1392 (0, 771, 767, 769, 773)' - PASSED ssl_gtest.sh: #2134: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1393 (0, 771, 767, 770, 767)' - PASSED ssl_gtest.sh: #2135: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1394 (0, 771, 767, 770, 768)' - PASSED ssl_gtest.sh: #2136: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1395 (0, 771, 767, 770, 769)' - PASSED ssl_gtest.sh: #2137: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1396 (0, 771, 767, 770, 770)' - PASSED ssl_gtest.sh: #2138: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1397 (0, 771, 767, 770, 771)' - PASSED ssl_gtest.sh: #2139: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1398 (0, 771, 767, 770, 772)' - PASSED ssl_gtest.sh: #2140: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1399 (0, 771, 767, 770, 773)' - PASSED ssl_gtest.sh: #2141: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1400 (0, 771, 767, 771, 767)' - PASSED ssl_gtest.sh: #2142: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1401 (0, 771, 767, 771, 768)' - PASSED ssl_gtest.sh: #2143: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1402 (0, 771, 767, 771, 769)' - PASSED ssl_gtest.sh: #2144: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1403 (0, 771, 767, 771, 770)' - PASSED ssl_gtest.sh: #2145: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1404 (0, 771, 767, 771, 771)' - PASSED ssl_gtest.sh: #2146: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1405 (0, 771, 767, 771, 772)' - PASSED ssl_gtest.sh: #2147: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1406 (0, 771, 767, 771, 773)' - PASSED ssl_gtest.sh: #2148: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1407 (0, 771, 767, 772, 767)' - PASSED ssl_gtest.sh: #2149: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1408 (0, 771, 767, 772, 768)' - PASSED ssl_gtest.sh: #2150: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1409 (0, 771, 767, 772, 769)' - PASSED ssl_gtest.sh: #2151: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1410 (0, 771, 767, 772, 770)' - PASSED ssl_gtest.sh: #2152: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1411 (0, 771, 767, 772, 771)' - PASSED ssl_gtest.sh: #2153: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1412 (0, 771, 767, 772, 772)' - PASSED ssl_gtest.sh: #2154: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1413 (0, 771, 767, 772, 773)' - PASSED ssl_gtest.sh: #2155: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1414 (0, 771, 767, 773, 767)' - PASSED ssl_gtest.sh: #2156: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1415 (0, 771, 767, 773, 768)' - PASSED ssl_gtest.sh: #2157: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1416 (0, 771, 767, 773, 769)' - PASSED ssl_gtest.sh: #2158: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1417 (0, 771, 767, 773, 770)' - PASSED ssl_gtest.sh: #2159: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1418 (0, 771, 767, 773, 771)' - PASSED ssl_gtest.sh: #2160: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1419 (0, 771, 767, 773, 772)' - PASSED ssl_gtest.sh: #2161: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1420 (0, 771, 767, 773, 773)' - PASSED ssl_gtest.sh: #2162: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1421 (0, 771, 768, 767, 767)' - PASSED ssl_gtest.sh: #2163: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1422 (0, 771, 768, 767, 768)' - PASSED ssl_gtest.sh: #2164: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1423 (0, 771, 768, 767, 769)' - PASSED ssl_gtest.sh: #2165: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1424 (0, 771, 768, 767, 770)' - PASSED ssl_gtest.sh: #2166: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1425 (0, 771, 768, 767, 771)' - PASSED ssl_gtest.sh: #2167: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1426 (0, 771, 768, 767, 772)' - PASSED ssl_gtest.sh: #2168: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1427 (0, 771, 768, 767, 773)' - PASSED ssl_gtest.sh: #2169: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1428 (0, 771, 768, 768, 767)' - PASSED ssl_gtest.sh: #2170: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1429 (0, 771, 768, 768, 768)' - PASSED ssl_gtest.sh: #2171: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1430 (0, 771, 768, 768, 769)' - PASSED ssl_gtest.sh: #2172: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1431 (0, 771, 768, 768, 770)' - PASSED ssl_gtest.sh: #2173: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1432 (0, 771, 768, 768, 771)' - PASSED ssl_gtest.sh: #2174: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1433 (0, 771, 768, 768, 772)' - PASSED ssl_gtest.sh: #2175: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1434 (0, 771, 768, 768, 773)' - PASSED ssl_gtest.sh: #2176: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1435 (0, 771, 768, 769, 767)' - PASSED ssl_gtest.sh: #2177: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1436 (0, 771, 768, 769, 768)' - PASSED ssl_gtest.sh: #2178: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1437 (0, 771, 768, 769, 769)' - PASSED ssl_gtest.sh: #2179: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1438 (0, 771, 768, 769, 770)' - PASSED ssl_gtest.sh: #2180: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1439 (0, 771, 768, 769, 771)' - PASSED ssl_gtest.sh: #2181: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1440 (0, 771, 768, 769, 772)' - PASSED ssl_gtest.sh: #2182: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1441 (0, 771, 768, 769, 773)' - PASSED ssl_gtest.sh: #2183: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1442 (0, 771, 768, 770, 767)' - PASSED ssl_gtest.sh: #2184: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1443 (0, 771, 768, 770, 768)' - PASSED ssl_gtest.sh: #2185: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1444 (0, 771, 768, 770, 769)' - PASSED ssl_gtest.sh: #2186: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1445 (0, 771, 768, 770, 770)' - PASSED ssl_gtest.sh: #2187: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1446 (0, 771, 768, 770, 771)' - PASSED ssl_gtest.sh: #2188: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1447 (0, 771, 768, 770, 772)' - PASSED ssl_gtest.sh: #2189: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1448 (0, 771, 768, 770, 773)' - PASSED ssl_gtest.sh: #2190: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1449 (0, 771, 768, 771, 767)' - PASSED ssl_gtest.sh: #2191: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1450 (0, 771, 768, 771, 768)' - PASSED ssl_gtest.sh: #2192: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1451 (0, 771, 768, 771, 769)' - PASSED ssl_gtest.sh: #2193: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1452 (0, 771, 768, 771, 770)' - PASSED ssl_gtest.sh: #2194: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1453 (0, 771, 768, 771, 771)' - PASSED ssl_gtest.sh: #2195: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1454 (0, 771, 768, 771, 772)' - PASSED ssl_gtest.sh: #2196: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1455 (0, 771, 768, 771, 773)' - PASSED ssl_gtest.sh: #2197: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1456 (0, 771, 768, 772, 767)' - PASSED ssl_gtest.sh: #2198: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1457 (0, 771, 768, 772, 768)' - PASSED ssl_gtest.sh: #2199: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1458 (0, 771, 768, 772, 769)' - PASSED ssl_gtest.sh: #2200: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1459 (0, 771, 768, 772, 770)' - PASSED ssl_gtest.sh: #2201: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1460 (0, 771, 768, 772, 771)' - PASSED ssl_gtest.sh: #2202: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1461 (0, 771, 768, 772, 772)' - PASSED ssl_gtest.sh: #2203: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1462 (0, 771, 768, 772, 773)' - PASSED ssl_gtest.sh: #2204: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1463 (0, 771, 768, 773, 767)' - PASSED ssl_gtest.sh: #2205: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1464 (0, 771, 768, 773, 768)' - PASSED ssl_gtest.sh: #2206: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1465 (0, 771, 768, 773, 769)' - PASSED ssl_gtest.sh: #2207: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1466 (0, 771, 768, 773, 770)' - PASSED ssl_gtest.sh: #2208: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1467 (0, 771, 768, 773, 771)' - PASSED ssl_gtest.sh: #2209: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1468 (0, 771, 768, 773, 772)' - PASSED ssl_gtest.sh: #2210: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1469 (0, 771, 768, 773, 773)' - PASSED ssl_gtest.sh: #2211: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1470 (0, 771, 769, 767, 767)' - PASSED ssl_gtest.sh: #2212: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1471 (0, 771, 769, 767, 768)' - PASSED ssl_gtest.sh: #2213: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1472 (0, 771, 769, 767, 769)' - PASSED ssl_gtest.sh: #2214: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1473 (0, 771, 769, 767, 770)' - PASSED ssl_gtest.sh: #2215: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1474 (0, 771, 769, 767, 771)' - PASSED ssl_gtest.sh: #2216: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1475 (0, 771, 769, 767, 772)' - PASSED ssl_gtest.sh: #2217: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1476 (0, 771, 769, 767, 773)' - PASSED ssl_gtest.sh: #2218: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1477 (0, 771, 769, 768, 767)' - PASSED ssl_gtest.sh: #2219: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1478 (0, 771, 769, 768, 768)' - PASSED ssl_gtest.sh: #2220: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1479 (0, 771, 769, 768, 769)' - PASSED ssl_gtest.sh: #2221: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1480 (0, 771, 769, 768, 770)' - PASSED ssl_gtest.sh: #2222: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1481 (0, 771, 769, 768, 771)' - PASSED ssl_gtest.sh: #2223: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1482 (0, 771, 769, 768, 772)' - PASSED ssl_gtest.sh: #2224: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1483 (0, 771, 769, 768, 773)' - PASSED ssl_gtest.sh: #2225: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1484 (0, 771, 769, 769, 767)' - PASSED ssl_gtest.sh: #2226: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1485 (0, 771, 769, 769, 768)' - PASSED ssl_gtest.sh: #2227: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1486 (0, 771, 769, 769, 769)' - PASSED ssl_gtest.sh: #2228: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1487 (0, 771, 769, 769, 770)' - PASSED ssl_gtest.sh: #2229: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1488 (0, 771, 769, 769, 771)' - PASSED ssl_gtest.sh: #2230: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1489 (0, 771, 769, 769, 772)' - PASSED ssl_gtest.sh: #2231: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1490 (0, 771, 769, 769, 773)' - PASSED ssl_gtest.sh: #2232: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1491 (0, 771, 769, 770, 767)' - PASSED ssl_gtest.sh: #2233: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1492 (0, 771, 769, 770, 768)' - PASSED ssl_gtest.sh: #2234: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1493 (0, 771, 769, 770, 769)' - PASSED ssl_gtest.sh: #2235: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1494 (0, 771, 769, 770, 770)' - PASSED ssl_gtest.sh: #2236: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1495 (0, 771, 769, 770, 771)' - PASSED ssl_gtest.sh: #2237: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1496 (0, 771, 769, 770, 772)' - PASSED ssl_gtest.sh: #2238: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1497 (0, 771, 769, 770, 773)' - PASSED ssl_gtest.sh: #2239: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1498 (0, 771, 769, 771, 767)' - PASSED ssl_gtest.sh: #2240: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1499 (0, 771, 769, 771, 768)' - PASSED ssl_gtest.sh: #2241: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1500 (0, 771, 769, 771, 769)' - PASSED ssl_gtest.sh: #2242: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1501 (0, 771, 769, 771, 770)' - PASSED ssl_gtest.sh: #2243: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1502 (0, 771, 769, 771, 771)' - PASSED ssl_gtest.sh: #2244: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1503 (0, 771, 769, 771, 772)' - PASSED ssl_gtest.sh: #2245: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1504 (0, 771, 769, 771, 773)' - PASSED ssl_gtest.sh: #2246: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1505 (0, 771, 769, 772, 767)' - PASSED ssl_gtest.sh: #2247: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1506 (0, 771, 769, 772, 768)' - PASSED ssl_gtest.sh: #2248: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1507 (0, 771, 769, 772, 769)' - PASSED ssl_gtest.sh: #2249: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1508 (0, 771, 769, 772, 770)' - PASSED ssl_gtest.sh: #2250: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1509 (0, 771, 769, 772, 771)' - PASSED ssl_gtest.sh: #2251: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1510 (0, 771, 769, 772, 772)' - PASSED ssl_gtest.sh: #2252: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1511 (0, 771, 769, 772, 773)' - PASSED ssl_gtest.sh: #2253: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1512 (0, 771, 769, 773, 767)' - PASSED ssl_gtest.sh: #2254: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1513 (0, 771, 769, 773, 768)' - PASSED ssl_gtest.sh: #2255: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1514 (0, 771, 769, 773, 769)' - PASSED ssl_gtest.sh: #2256: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1515 (0, 771, 769, 773, 770)' - PASSED ssl_gtest.sh: #2257: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1516 (0, 771, 769, 773, 771)' - PASSED ssl_gtest.sh: #2258: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1517 (0, 771, 769, 773, 772)' - PASSED ssl_gtest.sh: #2259: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1518 (0, 771, 769, 773, 773)' - PASSED ssl_gtest.sh: #2260: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1519 (0, 771, 770, 767, 767)' - PASSED ssl_gtest.sh: #2261: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1520 (0, 771, 770, 767, 768)' - PASSED ssl_gtest.sh: #2262: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1521 (0, 771, 770, 767, 769)' - PASSED ssl_gtest.sh: #2263: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1522 (0, 771, 770, 767, 770)' - PASSED ssl_gtest.sh: #2264: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1523 (0, 771, 770, 767, 771)' - PASSED ssl_gtest.sh: #2265: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1524 (0, 771, 770, 767, 772)' - PASSED ssl_gtest.sh: #2266: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1525 (0, 771, 770, 767, 773)' - PASSED ssl_gtest.sh: #2267: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1526 (0, 771, 770, 768, 767)' - PASSED ssl_gtest.sh: #2268: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1527 (0, 771, 770, 768, 768)' - PASSED ssl_gtest.sh: #2269: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1528 (0, 771, 770, 768, 769)' - PASSED ssl_gtest.sh: #2270: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1529 (0, 771, 770, 768, 770)' - PASSED ssl_gtest.sh: #2271: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1530 (0, 771, 770, 768, 771)' - PASSED ssl_gtest.sh: #2272: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1531 (0, 771, 770, 768, 772)' - PASSED ssl_gtest.sh: #2273: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1532 (0, 771, 770, 768, 773)' - PASSED ssl_gtest.sh: #2274: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1533 (0, 771, 770, 769, 767)' - PASSED ssl_gtest.sh: #2275: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1534 (0, 771, 770, 769, 768)' - PASSED ssl_gtest.sh: #2276: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1535 (0, 771, 770, 769, 769)' - PASSED ssl_gtest.sh: #2277: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1536 (0, 771, 770, 769, 770)' - PASSED ssl_gtest.sh: #2278: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1537 (0, 771, 770, 769, 771)' - PASSED ssl_gtest.sh: #2279: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1538 (0, 771, 770, 769, 772)' - PASSED ssl_gtest.sh: #2280: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1539 (0, 771, 770, 769, 773)' - PASSED ssl_gtest.sh: #2281: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1540 (0, 771, 770, 770, 767)' - PASSED ssl_gtest.sh: #2282: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1541 (0, 771, 770, 770, 768)' - PASSED ssl_gtest.sh: #2283: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1542 (0, 771, 770, 770, 769)' - PASSED ssl_gtest.sh: #2284: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1543 (0, 771, 770, 770, 770)' - PASSED ssl_gtest.sh: #2285: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1544 (0, 771, 770, 770, 771)' - PASSED ssl_gtest.sh: #2286: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1545 (0, 771, 770, 770, 772)' - PASSED ssl_gtest.sh: #2287: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1546 (0, 771, 770, 770, 773)' - PASSED ssl_gtest.sh: #2288: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1547 (0, 771, 770, 771, 767)' - PASSED ssl_gtest.sh: #2289: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1548 (0, 771, 770, 771, 768)' - PASSED ssl_gtest.sh: #2290: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1549 (0, 771, 770, 771, 769)' - PASSED ssl_gtest.sh: #2291: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1550 (0, 771, 770, 771, 770)' - PASSED ssl_gtest.sh: #2292: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1551 (0, 771, 770, 771, 771)' - PASSED ssl_gtest.sh: #2293: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1552 (0, 771, 770, 771, 772)' - PASSED ssl_gtest.sh: #2294: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1553 (0, 771, 770, 771, 773)' - PASSED ssl_gtest.sh: #2295: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1554 (0, 771, 770, 772, 767)' - PASSED ssl_gtest.sh: #2296: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1555 (0, 771, 770, 772, 768)' - PASSED ssl_gtest.sh: #2297: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1556 (0, 771, 770, 772, 769)' - PASSED ssl_gtest.sh: #2298: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1557 (0, 771, 770, 772, 770)' - PASSED ssl_gtest.sh: #2299: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1558 (0, 771, 770, 772, 771)' - PASSED ssl_gtest.sh: #2300: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1559 (0, 771, 770, 772, 772)' - PASSED ssl_gtest.sh: #2301: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1560 (0, 771, 770, 772, 773)' - PASSED ssl_gtest.sh: #2302: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1561 (0, 771, 770, 773, 767)' - PASSED ssl_gtest.sh: #2303: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1562 (0, 771, 770, 773, 768)' - PASSED ssl_gtest.sh: #2304: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1563 (0, 771, 770, 773, 769)' - PASSED ssl_gtest.sh: #2305: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1564 (0, 771, 770, 773, 770)' - PASSED ssl_gtest.sh: #2306: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1565 (0, 771, 770, 773, 771)' - PASSED ssl_gtest.sh: #2307: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1566 (0, 771, 770, 773, 772)' - PASSED ssl_gtest.sh: #2308: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1567 (0, 771, 770, 773, 773)' - PASSED ssl_gtest.sh: #2309: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1568 (0, 771, 771, 767, 767)' - PASSED ssl_gtest.sh: #2310: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1569 (0, 771, 771, 767, 768)' - PASSED ssl_gtest.sh: #2311: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1570 (0, 771, 771, 767, 769)' - PASSED ssl_gtest.sh: #2312: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1571 (0, 771, 771, 767, 770)' - PASSED ssl_gtest.sh: #2313: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1572 (0, 771, 771, 767, 771)' - PASSED ssl_gtest.sh: #2314: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1573 (0, 771, 771, 767, 772)' - PASSED ssl_gtest.sh: #2315: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1574 (0, 771, 771, 767, 773)' - PASSED ssl_gtest.sh: #2316: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1575 (0, 771, 771, 768, 767)' - PASSED ssl_gtest.sh: #2317: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1576 (0, 771, 771, 768, 768)' - PASSED ssl_gtest.sh: #2318: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1577 (0, 771, 771, 768, 769)' - PASSED ssl_gtest.sh: #2319: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1578 (0, 771, 771, 768, 770)' - PASSED ssl_gtest.sh: #2320: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1579 (0, 771, 771, 768, 771)' - PASSED ssl_gtest.sh: #2321: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1580 (0, 771, 771, 768, 772)' - PASSED ssl_gtest.sh: #2322: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1581 (0, 771, 771, 768, 773)' - PASSED ssl_gtest.sh: #2323: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1582 (0, 771, 771, 769, 767)' - PASSED ssl_gtest.sh: #2324: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1583 (0, 771, 771, 769, 768)' - PASSED ssl_gtest.sh: #2325: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1584 (0, 771, 771, 769, 769)' - PASSED ssl_gtest.sh: #2326: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1585 (0, 771, 771, 769, 770)' - PASSED ssl_gtest.sh: #2327: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1586 (0, 771, 771, 769, 771)' - PASSED ssl_gtest.sh: #2328: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1587 (0, 771, 771, 769, 772)' - PASSED ssl_gtest.sh: #2329: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1588 (0, 771, 771, 769, 773)' - PASSED ssl_gtest.sh: #2330: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1589 (0, 771, 771, 770, 767)' - PASSED ssl_gtest.sh: #2331: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1590 (0, 771, 771, 770, 768)' - PASSED ssl_gtest.sh: #2332: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1591 (0, 771, 771, 770, 769)' - PASSED ssl_gtest.sh: #2333: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1592 (0, 771, 771, 770, 770)' - PASSED ssl_gtest.sh: #2334: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1593 (0, 771, 771, 770, 771)' - PASSED ssl_gtest.sh: #2335: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1594 (0, 771, 771, 770, 772)' - PASSED ssl_gtest.sh: #2336: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1595 (0, 771, 771, 770, 773)' - PASSED ssl_gtest.sh: #2337: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1596 (0, 771, 771, 771, 767)' - PASSED ssl_gtest.sh: #2338: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1597 (0, 771, 771, 771, 768)' - PASSED ssl_gtest.sh: #2339: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1598 (0, 771, 771, 771, 769)' - PASSED ssl_gtest.sh: #2340: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1599 (0, 771, 771, 771, 770)' - PASSED ssl_gtest.sh: #2341: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1600 (0, 771, 771, 771, 771)' - PASSED ssl_gtest.sh: #2342: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1601 (0, 771, 771, 771, 772)' - PASSED ssl_gtest.sh: #2343: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1602 (0, 771, 771, 771, 773)' - PASSED ssl_gtest.sh: #2344: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1603 (0, 771, 771, 772, 767)' - PASSED ssl_gtest.sh: #2345: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1604 (0, 771, 771, 772, 768)' - PASSED ssl_gtest.sh: #2346: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1605 (0, 771, 771, 772, 769)' - PASSED ssl_gtest.sh: #2347: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1606 (0, 771, 771, 772, 770)' - PASSED ssl_gtest.sh: #2348: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1607 (0, 771, 771, 772, 771)' - PASSED ssl_gtest.sh: #2349: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1608 (0, 771, 771, 772, 772)' - PASSED ssl_gtest.sh: #2350: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1609 (0, 771, 771, 772, 773)' - PASSED ssl_gtest.sh: #2351: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1610 (0, 771, 771, 773, 767)' - PASSED ssl_gtest.sh: #2352: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1611 (0, 771, 771, 773, 768)' - PASSED ssl_gtest.sh: #2353: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1612 (0, 771, 771, 773, 769)' - PASSED ssl_gtest.sh: #2354: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1613 (0, 771, 771, 773, 770)' - PASSED ssl_gtest.sh: #2355: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1614 (0, 771, 771, 773, 771)' - PASSED ssl_gtest.sh: #2356: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1615 (0, 771, 771, 773, 772)' - PASSED ssl_gtest.sh: #2357: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1616 (0, 771, 771, 773, 773)' - PASSED ssl_gtest.sh: #2358: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1617 (0, 771, 772, 767, 767)' - PASSED ssl_gtest.sh: #2359: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1618 (0, 771, 772, 767, 768)' - PASSED ssl_gtest.sh: #2360: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1619 (0, 771, 772, 767, 769)' - PASSED ssl_gtest.sh: #2361: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1620 (0, 771, 772, 767, 770)' - PASSED ssl_gtest.sh: #2362: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1621 (0, 771, 772, 767, 771)' - PASSED ssl_gtest.sh: #2363: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1622 (0, 771, 772, 767, 772)' - PASSED ssl_gtest.sh: #2364: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1623 (0, 771, 772, 767, 773)' - PASSED ssl_gtest.sh: #2365: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1624 (0, 771, 772, 768, 767)' - PASSED ssl_gtest.sh: #2366: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1625 (0, 771, 772, 768, 768)' - PASSED ssl_gtest.sh: #2367: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1626 (0, 771, 772, 768, 769)' - PASSED ssl_gtest.sh: #2368: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1627 (0, 771, 772, 768, 770)' - PASSED ssl_gtest.sh: #2369: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1628 (0, 771, 772, 768, 771)' - PASSED ssl_gtest.sh: #2370: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1629 (0, 771, 772, 768, 772)' - PASSED ssl_gtest.sh: #2371: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1630 (0, 771, 772, 768, 773)' - PASSED ssl_gtest.sh: #2372: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1631 (0, 771, 772, 769, 767)' - PASSED ssl_gtest.sh: #2373: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1632 (0, 771, 772, 769, 768)' - PASSED ssl_gtest.sh: #2374: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1633 (0, 771, 772, 769, 769)' - PASSED ssl_gtest.sh: #2375: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1634 (0, 771, 772, 769, 770)' - PASSED ssl_gtest.sh: #2376: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1635 (0, 771, 772, 769, 771)' - PASSED ssl_gtest.sh: #2377: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1636 (0, 771, 772, 769, 772)' - PASSED ssl_gtest.sh: #2378: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1637 (0, 771, 772, 769, 773)' - PASSED ssl_gtest.sh: #2379: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1638 (0, 771, 772, 770, 767)' - PASSED ssl_gtest.sh: #2380: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1639 (0, 771, 772, 770, 768)' - PASSED ssl_gtest.sh: #2381: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1640 (0, 771, 772, 770, 769)' - PASSED ssl_gtest.sh: #2382: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1641 (0, 771, 772, 770, 770)' - PASSED ssl_gtest.sh: #2383: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1642 (0, 771, 772, 770, 771)' - PASSED ssl_gtest.sh: #2384: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1643 (0, 771, 772, 770, 772)' - PASSED ssl_gtest.sh: #2385: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1644 (0, 771, 772, 770, 773)' - PASSED ssl_gtest.sh: #2386: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1645 (0, 771, 772, 771, 767)' - PASSED ssl_gtest.sh: #2387: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1646 (0, 771, 772, 771, 768)' - PASSED ssl_gtest.sh: #2388: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1647 (0, 771, 772, 771, 769)' - PASSED ssl_gtest.sh: #2389: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1648 (0, 771, 772, 771, 770)' - PASSED ssl_gtest.sh: #2390: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1649 (0, 771, 772, 771, 771)' - PASSED ssl_gtest.sh: #2391: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1650 (0, 771, 772, 771, 772)' - PASSED ssl_gtest.sh: #2392: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1651 (0, 771, 772, 771, 773)' - PASSED ssl_gtest.sh: #2393: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1652 (0, 771, 772, 772, 767)' - PASSED ssl_gtest.sh: #2394: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1653 (0, 771, 772, 772, 768)' - PASSED ssl_gtest.sh: #2395: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1654 (0, 771, 772, 772, 769)' - PASSED ssl_gtest.sh: #2396: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1655 (0, 771, 772, 772, 770)' - PASSED ssl_gtest.sh: #2397: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1656 (0, 771, 772, 772, 771)' - PASSED ssl_gtest.sh: #2398: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1657 (0, 771, 772, 772, 772)' - PASSED ssl_gtest.sh: #2399: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1658 (0, 771, 772, 772, 773)' - PASSED ssl_gtest.sh: #2400: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1659 (0, 771, 772, 773, 767)' - PASSED ssl_gtest.sh: #2401: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1660 (0, 771, 772, 773, 768)' - PASSED ssl_gtest.sh: #2402: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1661 (0, 771, 772, 773, 769)' - PASSED ssl_gtest.sh: #2403: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1662 (0, 771, 772, 773, 770)' - PASSED ssl_gtest.sh: #2404: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1663 (0, 771, 772, 773, 771)' - PASSED ssl_gtest.sh: #2405: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1664 (0, 771, 772, 773, 772)' - PASSED ssl_gtest.sh: #2406: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1665 (0, 771, 772, 773, 773)' - PASSED ssl_gtest.sh: #2407: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1666 (0, 771, 773, 767, 767)' - PASSED ssl_gtest.sh: #2408: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1667 (0, 771, 773, 767, 768)' - PASSED ssl_gtest.sh: #2409: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1668 (0, 771, 773, 767, 769)' - PASSED ssl_gtest.sh: #2410: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1669 (0, 771, 773, 767, 770)' - PASSED ssl_gtest.sh: #2411: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1670 (0, 771, 773, 767, 771)' - PASSED ssl_gtest.sh: #2412: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1671 (0, 771, 773, 767, 772)' - PASSED ssl_gtest.sh: #2413: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1672 (0, 771, 773, 767, 773)' - PASSED ssl_gtest.sh: #2414: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1673 (0, 771, 773, 768, 767)' - PASSED ssl_gtest.sh: #2415: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1674 (0, 771, 773, 768, 768)' - PASSED ssl_gtest.sh: #2416: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1675 (0, 771, 773, 768, 769)' - PASSED ssl_gtest.sh: #2417: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1676 (0, 771, 773, 768, 770)' - PASSED ssl_gtest.sh: #2418: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1677 (0, 771, 773, 768, 771)' - PASSED ssl_gtest.sh: #2419: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1678 (0, 771, 773, 768, 772)' - PASSED ssl_gtest.sh: #2420: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1679 (0, 771, 773, 768, 773)' - PASSED ssl_gtest.sh: #2421: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1680 (0, 771, 773, 769, 767)' - PASSED ssl_gtest.sh: #2422: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1681 (0, 771, 773, 769, 768)' - PASSED ssl_gtest.sh: #2423: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1682 (0, 771, 773, 769, 769)' - PASSED ssl_gtest.sh: #2424: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1683 (0, 771, 773, 769, 770)' - PASSED ssl_gtest.sh: #2425: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1684 (0, 771, 773, 769, 771)' - PASSED ssl_gtest.sh: #2426: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1685 (0, 771, 773, 769, 772)' - PASSED ssl_gtest.sh: #2427: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1686 (0, 771, 773, 769, 773)' - PASSED ssl_gtest.sh: #2428: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1687 (0, 771, 773, 770, 767)' - PASSED ssl_gtest.sh: #2429: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1688 (0, 771, 773, 770, 768)' - PASSED ssl_gtest.sh: #2430: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1689 (0, 771, 773, 770, 769)' - PASSED ssl_gtest.sh: #2431: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1690 (0, 771, 773, 770, 770)' - PASSED ssl_gtest.sh: #2432: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1691 (0, 771, 773, 770, 771)' - PASSED ssl_gtest.sh: #2433: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1692 (0, 771, 773, 770, 772)' - PASSED ssl_gtest.sh: #2434: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1693 (0, 771, 773, 770, 773)' - PASSED ssl_gtest.sh: #2435: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1694 (0, 771, 773, 771, 767)' - PASSED ssl_gtest.sh: #2436: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1695 (0, 771, 773, 771, 768)' - PASSED ssl_gtest.sh: #2437: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1696 (0, 771, 773, 771, 769)' - PASSED ssl_gtest.sh: #2438: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1697 (0, 771, 773, 771, 770)' - PASSED ssl_gtest.sh: #2439: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1698 (0, 771, 773, 771, 771)' - PASSED ssl_gtest.sh: #2440: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1699 (0, 771, 773, 771, 772)' - PASSED ssl_gtest.sh: #2441: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1700 (0, 771, 773, 771, 773)' - PASSED ssl_gtest.sh: #2442: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1701 (0, 771, 773, 772, 767)' - PASSED ssl_gtest.sh: #2443: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1702 (0, 771, 773, 772, 768)' - PASSED ssl_gtest.sh: #2444: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1703 (0, 771, 773, 772, 769)' - PASSED ssl_gtest.sh: #2445: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1704 (0, 771, 773, 772, 770)' - PASSED ssl_gtest.sh: #2446: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1705 (0, 771, 773, 772, 771)' - PASSED ssl_gtest.sh: #2447: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1706 (0, 771, 773, 772, 772)' - PASSED ssl_gtest.sh: #2448: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1707 (0, 771, 773, 772, 773)' - PASSED ssl_gtest.sh: #2449: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1708 (0, 771, 773, 773, 767)' - PASSED ssl_gtest.sh: #2450: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1709 (0, 771, 773, 773, 768)' - PASSED ssl_gtest.sh: #2451: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1710 (0, 771, 773, 773, 769)' - PASSED ssl_gtest.sh: #2452: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1711 (0, 771, 773, 773, 770)' - PASSED ssl_gtest.sh: #2453: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1712 (0, 771, 773, 773, 771)' - PASSED ssl_gtest.sh: #2454: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1713 (0, 771, 773, 773, 772)' - PASSED ssl_gtest.sh: #2455: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1714 (0, 771, 773, 773, 773)' - PASSED ssl_gtest.sh: #2456: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1715 (0, 772, 767, 767, 767)' - PASSED ssl_gtest.sh: #2457: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1716 (0, 772, 767, 767, 768)' - PASSED ssl_gtest.sh: #2458: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1717 (0, 772, 767, 767, 769)' - PASSED ssl_gtest.sh: #2459: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1718 (0, 772, 767, 767, 770)' - PASSED ssl_gtest.sh: #2460: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1719 (0, 772, 767, 767, 771)' - PASSED ssl_gtest.sh: #2461: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1720 (0, 772, 767, 767, 772)' - PASSED ssl_gtest.sh: #2462: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1721 (0, 772, 767, 767, 773)' - PASSED ssl_gtest.sh: #2463: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1722 (0, 772, 767, 768, 767)' - PASSED ssl_gtest.sh: #2464: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1723 (0, 772, 767, 768, 768)' - PASSED ssl_gtest.sh: #2465: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1724 (0, 772, 767, 768, 769)' - PASSED ssl_gtest.sh: #2466: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1725 (0, 772, 767, 768, 770)' - PASSED ssl_gtest.sh: #2467: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1726 (0, 772, 767, 768, 771)' - PASSED ssl_gtest.sh: #2468: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1727 (0, 772, 767, 768, 772)' - PASSED ssl_gtest.sh: #2469: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1728 (0, 772, 767, 768, 773)' - PASSED ssl_gtest.sh: #2470: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1729 (0, 772, 767, 769, 767)' - PASSED ssl_gtest.sh: #2471: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1730 (0, 772, 767, 769, 768)' - PASSED ssl_gtest.sh: #2472: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1731 (0, 772, 767, 769, 769)' - PASSED ssl_gtest.sh: #2473: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1732 (0, 772, 767, 769, 770)' - PASSED ssl_gtest.sh: #2474: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1733 (0, 772, 767, 769, 771)' - PASSED ssl_gtest.sh: #2475: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1734 (0, 772, 767, 769, 772)' - PASSED ssl_gtest.sh: #2476: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1735 (0, 772, 767, 769, 773)' - PASSED ssl_gtest.sh: #2477: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1736 (0, 772, 767, 770, 767)' - PASSED ssl_gtest.sh: #2478: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1737 (0, 772, 767, 770, 768)' - PASSED ssl_gtest.sh: #2479: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1738 (0, 772, 767, 770, 769)' - PASSED ssl_gtest.sh: #2480: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1739 (0, 772, 767, 770, 770)' - PASSED ssl_gtest.sh: #2481: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1740 (0, 772, 767, 770, 771)' - PASSED ssl_gtest.sh: #2482: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1741 (0, 772, 767, 770, 772)' - PASSED ssl_gtest.sh: #2483: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1742 (0, 772, 767, 770, 773)' - PASSED ssl_gtest.sh: #2484: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1743 (0, 772, 767, 771, 767)' - PASSED ssl_gtest.sh: #2485: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1744 (0, 772, 767, 771, 768)' - PASSED ssl_gtest.sh: #2486: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1745 (0, 772, 767, 771, 769)' - PASSED ssl_gtest.sh: #2487: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1746 (0, 772, 767, 771, 770)' - PASSED ssl_gtest.sh: #2488: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1747 (0, 772, 767, 771, 771)' - PASSED ssl_gtest.sh: #2489: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1748 (0, 772, 767, 771, 772)' - PASSED ssl_gtest.sh: #2490: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1749 (0, 772, 767, 771, 773)' - PASSED ssl_gtest.sh: #2491: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1750 (0, 772, 767, 772, 767)' - PASSED ssl_gtest.sh: #2492: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1751 (0, 772, 767, 772, 768)' - PASSED ssl_gtest.sh: #2493: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1752 (0, 772, 767, 772, 769)' - PASSED ssl_gtest.sh: #2494: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1753 (0, 772, 767, 772, 770)' - PASSED ssl_gtest.sh: #2495: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1754 (0, 772, 767, 772, 771)' - PASSED ssl_gtest.sh: #2496: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1755 (0, 772, 767, 772, 772)' - PASSED ssl_gtest.sh: #2497: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1756 (0, 772, 767, 772, 773)' - PASSED ssl_gtest.sh: #2498: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1757 (0, 772, 767, 773, 767)' - PASSED ssl_gtest.sh: #2499: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1758 (0, 772, 767, 773, 768)' - PASSED ssl_gtest.sh: #2500: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1759 (0, 772, 767, 773, 769)' - PASSED ssl_gtest.sh: #2501: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1760 (0, 772, 767, 773, 770)' - PASSED ssl_gtest.sh: #2502: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1761 (0, 772, 767, 773, 771)' - PASSED ssl_gtest.sh: #2503: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1762 (0, 772, 767, 773, 772)' - PASSED ssl_gtest.sh: #2504: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1763 (0, 772, 767, 773, 773)' - PASSED ssl_gtest.sh: #2505: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1764 (0, 772, 768, 767, 767)' - PASSED ssl_gtest.sh: #2506: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1765 (0, 772, 768, 767, 768)' - PASSED ssl_gtest.sh: #2507: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1766 (0, 772, 768, 767, 769)' - PASSED ssl_gtest.sh: #2508: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1767 (0, 772, 768, 767, 770)' - PASSED ssl_gtest.sh: #2509: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1768 (0, 772, 768, 767, 771)' - PASSED ssl_gtest.sh: #2510: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1769 (0, 772, 768, 767, 772)' - PASSED ssl_gtest.sh: #2511: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1770 (0, 772, 768, 767, 773)' - PASSED ssl_gtest.sh: #2512: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1771 (0, 772, 768, 768, 767)' - PASSED ssl_gtest.sh: #2513: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1772 (0, 772, 768, 768, 768)' - PASSED ssl_gtest.sh: #2514: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1773 (0, 772, 768, 768, 769)' - PASSED ssl_gtest.sh: #2515: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1774 (0, 772, 768, 768, 770)' - PASSED ssl_gtest.sh: #2516: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1775 (0, 772, 768, 768, 771)' - PASSED ssl_gtest.sh: #2517: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1776 (0, 772, 768, 768, 772)' - PASSED ssl_gtest.sh: #2518: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1777 (0, 772, 768, 768, 773)' - PASSED ssl_gtest.sh: #2519: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1778 (0, 772, 768, 769, 767)' - PASSED ssl_gtest.sh: #2520: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1779 (0, 772, 768, 769, 768)' - PASSED ssl_gtest.sh: #2521: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1780 (0, 772, 768, 769, 769)' - PASSED ssl_gtest.sh: #2522: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1781 (0, 772, 768, 769, 770)' - PASSED ssl_gtest.sh: #2523: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1782 (0, 772, 768, 769, 771)' - PASSED ssl_gtest.sh: #2524: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1783 (0, 772, 768, 769, 772)' - PASSED ssl_gtest.sh: #2525: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1784 (0, 772, 768, 769, 773)' - PASSED ssl_gtest.sh: #2526: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1785 (0, 772, 768, 770, 767)' - PASSED ssl_gtest.sh: #2527: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1786 (0, 772, 768, 770, 768)' - PASSED ssl_gtest.sh: #2528: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1787 (0, 772, 768, 770, 769)' - PASSED ssl_gtest.sh: #2529: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1788 (0, 772, 768, 770, 770)' - PASSED ssl_gtest.sh: #2530: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1789 (0, 772, 768, 770, 771)' - PASSED ssl_gtest.sh: #2531: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1790 (0, 772, 768, 770, 772)' - PASSED ssl_gtest.sh: #2532: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1791 (0, 772, 768, 770, 773)' - PASSED ssl_gtest.sh: #2533: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1792 (0, 772, 768, 771, 767)' - PASSED ssl_gtest.sh: #2534: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1793 (0, 772, 768, 771, 768)' - PASSED ssl_gtest.sh: #2535: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1794 (0, 772, 768, 771, 769)' - PASSED ssl_gtest.sh: #2536: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1795 (0, 772, 768, 771, 770)' - PASSED ssl_gtest.sh: #2537: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1796 (0, 772, 768, 771, 771)' - PASSED ssl_gtest.sh: #2538: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1797 (0, 772, 768, 771, 772)' - PASSED ssl_gtest.sh: #2539: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1798 (0, 772, 768, 771, 773)' - PASSED ssl_gtest.sh: #2540: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1799 (0, 772, 768, 772, 767)' - PASSED ssl_gtest.sh: #2541: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1800 (0, 772, 768, 772, 768)' - PASSED ssl_gtest.sh: #2542: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1801 (0, 772, 768, 772, 769)' - PASSED ssl_gtest.sh: #2543: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1802 (0, 772, 768, 772, 770)' - PASSED ssl_gtest.sh: #2544: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1803 (0, 772, 768, 772, 771)' - PASSED ssl_gtest.sh: #2545: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1804 (0, 772, 768, 772, 772)' - PASSED ssl_gtest.sh: #2546: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1805 (0, 772, 768, 772, 773)' - PASSED ssl_gtest.sh: #2547: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1806 (0, 772, 768, 773, 767)' - PASSED ssl_gtest.sh: #2548: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1807 (0, 772, 768, 773, 768)' - PASSED ssl_gtest.sh: #2549: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1808 (0, 772, 768, 773, 769)' - PASSED ssl_gtest.sh: #2550: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1809 (0, 772, 768, 773, 770)' - PASSED ssl_gtest.sh: #2551: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1810 (0, 772, 768, 773, 771)' - PASSED ssl_gtest.sh: #2552: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1811 (0, 772, 768, 773, 772)' - PASSED ssl_gtest.sh: #2553: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1812 (0, 772, 768, 773, 773)' - PASSED ssl_gtest.sh: #2554: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1813 (0, 772, 769, 767, 767)' - PASSED ssl_gtest.sh: #2555: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1814 (0, 772, 769, 767, 768)' - PASSED ssl_gtest.sh: #2556: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1815 (0, 772, 769, 767, 769)' - PASSED ssl_gtest.sh: #2557: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1816 (0, 772, 769, 767, 770)' - PASSED ssl_gtest.sh: #2558: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1817 (0, 772, 769, 767, 771)' - PASSED ssl_gtest.sh: #2559: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1818 (0, 772, 769, 767, 772)' - PASSED ssl_gtest.sh: #2560: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1819 (0, 772, 769, 767, 773)' - PASSED ssl_gtest.sh: #2561: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1820 (0, 772, 769, 768, 767)' - PASSED ssl_gtest.sh: #2562: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1821 (0, 772, 769, 768, 768)' - PASSED ssl_gtest.sh: #2563: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1822 (0, 772, 769, 768, 769)' - PASSED ssl_gtest.sh: #2564: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1823 (0, 772, 769, 768, 770)' - PASSED ssl_gtest.sh: #2565: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1824 (0, 772, 769, 768, 771)' - PASSED ssl_gtest.sh: #2566: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1825 (0, 772, 769, 768, 772)' - PASSED ssl_gtest.sh: #2567: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1826 (0, 772, 769, 768, 773)' - PASSED ssl_gtest.sh: #2568: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1827 (0, 772, 769, 769, 767)' - PASSED ssl_gtest.sh: #2569: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1828 (0, 772, 769, 769, 768)' - PASSED ssl_gtest.sh: #2570: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1829 (0, 772, 769, 769, 769)' - PASSED ssl_gtest.sh: #2571: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1830 (0, 772, 769, 769, 770)' - PASSED ssl_gtest.sh: #2572: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1831 (0, 772, 769, 769, 771)' - PASSED ssl_gtest.sh: #2573: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1832 (0, 772, 769, 769, 772)' - PASSED ssl_gtest.sh: #2574: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1833 (0, 772, 769, 769, 773)' - PASSED ssl_gtest.sh: #2575: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1834 (0, 772, 769, 770, 767)' - PASSED ssl_gtest.sh: #2576: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1835 (0, 772, 769, 770, 768)' - PASSED ssl_gtest.sh: #2577: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1836 (0, 772, 769, 770, 769)' - PASSED ssl_gtest.sh: #2578: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1837 (0, 772, 769, 770, 770)' - PASSED ssl_gtest.sh: #2579: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1838 (0, 772, 769, 770, 771)' - PASSED ssl_gtest.sh: #2580: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1839 (0, 772, 769, 770, 772)' - PASSED ssl_gtest.sh: #2581: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1840 (0, 772, 769, 770, 773)' - PASSED ssl_gtest.sh: #2582: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1841 (0, 772, 769, 771, 767)' - PASSED ssl_gtest.sh: #2583: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1842 (0, 772, 769, 771, 768)' - PASSED ssl_gtest.sh: #2584: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1843 (0, 772, 769, 771, 769)' - PASSED ssl_gtest.sh: #2585: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1844 (0, 772, 769, 771, 770)' - PASSED ssl_gtest.sh: #2586: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1845 (0, 772, 769, 771, 771)' - PASSED ssl_gtest.sh: #2587: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1846 (0, 772, 769, 771, 772)' - PASSED ssl_gtest.sh: #2588: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1847 (0, 772, 769, 771, 773)' - PASSED ssl_gtest.sh: #2589: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1848 (0, 772, 769, 772, 767)' - PASSED ssl_gtest.sh: #2590: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1849 (0, 772, 769, 772, 768)' - PASSED ssl_gtest.sh: #2591: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1850 (0, 772, 769, 772, 769)' - PASSED ssl_gtest.sh: #2592: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1851 (0, 772, 769, 772, 770)' - PASSED ssl_gtest.sh: #2593: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1852 (0, 772, 769, 772, 771)' - PASSED ssl_gtest.sh: #2594: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1853 (0, 772, 769, 772, 772)' - PASSED ssl_gtest.sh: #2595: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1854 (0, 772, 769, 772, 773)' - PASSED ssl_gtest.sh: #2596: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1855 (0, 772, 769, 773, 767)' - PASSED ssl_gtest.sh: #2597: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1856 (0, 772, 769, 773, 768)' - PASSED ssl_gtest.sh: #2598: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1857 (0, 772, 769, 773, 769)' - PASSED ssl_gtest.sh: #2599: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1858 (0, 772, 769, 773, 770)' - PASSED ssl_gtest.sh: #2600: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1859 (0, 772, 769, 773, 771)' - PASSED ssl_gtest.sh: #2601: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1860 (0, 772, 769, 773, 772)' - PASSED ssl_gtest.sh: #2602: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1861 (0, 772, 769, 773, 773)' - PASSED ssl_gtest.sh: #2603: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1862 (0, 772, 770, 767, 767)' - PASSED ssl_gtest.sh: #2604: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1863 (0, 772, 770, 767, 768)' - PASSED ssl_gtest.sh: #2605: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1864 (0, 772, 770, 767, 769)' - PASSED ssl_gtest.sh: #2606: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1865 (0, 772, 770, 767, 770)' - PASSED ssl_gtest.sh: #2607: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1866 (0, 772, 770, 767, 771)' - PASSED ssl_gtest.sh: #2608: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1867 (0, 772, 770, 767, 772)' - PASSED ssl_gtest.sh: #2609: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1868 (0, 772, 770, 767, 773)' - PASSED ssl_gtest.sh: #2610: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1869 (0, 772, 770, 768, 767)' - PASSED ssl_gtest.sh: #2611: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1870 (0, 772, 770, 768, 768)' - PASSED ssl_gtest.sh: #2612: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1871 (0, 772, 770, 768, 769)' - PASSED ssl_gtest.sh: #2613: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1872 (0, 772, 770, 768, 770)' - PASSED ssl_gtest.sh: #2614: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1873 (0, 772, 770, 768, 771)' - PASSED ssl_gtest.sh: #2615: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1874 (0, 772, 770, 768, 772)' - PASSED ssl_gtest.sh: #2616: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1875 (0, 772, 770, 768, 773)' - PASSED ssl_gtest.sh: #2617: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1876 (0, 772, 770, 769, 767)' - PASSED ssl_gtest.sh: #2618: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1877 (0, 772, 770, 769, 768)' - PASSED ssl_gtest.sh: #2619: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1878 (0, 772, 770, 769, 769)' - PASSED ssl_gtest.sh: #2620: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1879 (0, 772, 770, 769, 770)' - PASSED ssl_gtest.sh: #2621: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1880 (0, 772, 770, 769, 771)' - PASSED ssl_gtest.sh: #2622: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1881 (0, 772, 770, 769, 772)' - PASSED ssl_gtest.sh: #2623: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1882 (0, 772, 770, 769, 773)' - PASSED ssl_gtest.sh: #2624: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1883 (0, 772, 770, 770, 767)' - PASSED ssl_gtest.sh: #2625: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1884 (0, 772, 770, 770, 768)' - PASSED ssl_gtest.sh: #2626: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1885 (0, 772, 770, 770, 769)' - PASSED ssl_gtest.sh: #2627: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1886 (0, 772, 770, 770, 770)' - PASSED ssl_gtest.sh: #2628: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1887 (0, 772, 770, 770, 771)' - PASSED ssl_gtest.sh: #2629: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1888 (0, 772, 770, 770, 772)' - PASSED ssl_gtest.sh: #2630: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1889 (0, 772, 770, 770, 773)' - PASSED ssl_gtest.sh: #2631: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1890 (0, 772, 770, 771, 767)' - PASSED ssl_gtest.sh: #2632: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1891 (0, 772, 770, 771, 768)' - PASSED ssl_gtest.sh: #2633: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1892 (0, 772, 770, 771, 769)' - PASSED ssl_gtest.sh: #2634: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1893 (0, 772, 770, 771, 770)' - PASSED ssl_gtest.sh: #2635: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1894 (0, 772, 770, 771, 771)' - PASSED ssl_gtest.sh: #2636: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1895 (0, 772, 770, 771, 772)' - PASSED ssl_gtest.sh: #2637: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1896 (0, 772, 770, 771, 773)' - PASSED ssl_gtest.sh: #2638: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1897 (0, 772, 770, 772, 767)' - PASSED ssl_gtest.sh: #2639: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1898 (0, 772, 770, 772, 768)' - PASSED ssl_gtest.sh: #2640: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1899 (0, 772, 770, 772, 769)' - PASSED ssl_gtest.sh: #2641: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1900 (0, 772, 770, 772, 770)' - PASSED ssl_gtest.sh: #2642: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1901 (0, 772, 770, 772, 771)' - PASSED ssl_gtest.sh: #2643: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1902 (0, 772, 770, 772, 772)' - PASSED ssl_gtest.sh: #2644: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1903 (0, 772, 770, 772, 773)' - PASSED ssl_gtest.sh: #2645: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1904 (0, 772, 770, 773, 767)' - PASSED ssl_gtest.sh: #2646: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1905 (0, 772, 770, 773, 768)' - PASSED ssl_gtest.sh: #2647: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1906 (0, 772, 770, 773, 769)' - PASSED ssl_gtest.sh: #2648: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1907 (0, 772, 770, 773, 770)' - PASSED ssl_gtest.sh: #2649: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1908 (0, 772, 770, 773, 771)' - PASSED ssl_gtest.sh: #2650: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1909 (0, 772, 770, 773, 772)' - PASSED ssl_gtest.sh: #2651: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1910 (0, 772, 770, 773, 773)' - PASSED ssl_gtest.sh: #2652: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1911 (0, 772, 771, 767, 767)' - PASSED ssl_gtest.sh: #2653: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1912 (0, 772, 771, 767, 768)' - PASSED ssl_gtest.sh: #2654: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1913 (0, 772, 771, 767, 769)' - PASSED ssl_gtest.sh: #2655: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1914 (0, 772, 771, 767, 770)' - PASSED ssl_gtest.sh: #2656: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1915 (0, 772, 771, 767, 771)' - PASSED ssl_gtest.sh: #2657: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1916 (0, 772, 771, 767, 772)' - PASSED ssl_gtest.sh: #2658: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1917 (0, 772, 771, 767, 773)' - PASSED ssl_gtest.sh: #2659: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1918 (0, 772, 771, 768, 767)' - PASSED ssl_gtest.sh: #2660: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1919 (0, 772, 771, 768, 768)' - PASSED ssl_gtest.sh: #2661: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1920 (0, 772, 771, 768, 769)' - PASSED ssl_gtest.sh: #2662: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1921 (0, 772, 771, 768, 770)' - PASSED ssl_gtest.sh: #2663: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1922 (0, 772, 771, 768, 771)' - PASSED ssl_gtest.sh: #2664: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1923 (0, 772, 771, 768, 772)' - PASSED ssl_gtest.sh: #2665: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1924 (0, 772, 771, 768, 773)' - PASSED ssl_gtest.sh: #2666: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1925 (0, 772, 771, 769, 767)' - PASSED ssl_gtest.sh: #2667: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1926 (0, 772, 771, 769, 768)' - PASSED ssl_gtest.sh: #2668: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1927 (0, 772, 771, 769, 769)' - PASSED ssl_gtest.sh: #2669: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1928 (0, 772, 771, 769, 770)' - PASSED ssl_gtest.sh: #2670: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1929 (0, 772, 771, 769, 771)' - PASSED ssl_gtest.sh: #2671: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1930 (0, 772, 771, 769, 772)' - PASSED ssl_gtest.sh: #2672: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1931 (0, 772, 771, 769, 773)' - PASSED ssl_gtest.sh: #2673: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1932 (0, 772, 771, 770, 767)' - PASSED ssl_gtest.sh: #2674: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1933 (0, 772, 771, 770, 768)' - PASSED ssl_gtest.sh: #2675: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1934 (0, 772, 771, 770, 769)' - PASSED ssl_gtest.sh: #2676: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1935 (0, 772, 771, 770, 770)' - PASSED ssl_gtest.sh: #2677: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1936 (0, 772, 771, 770, 771)' - PASSED ssl_gtest.sh: #2678: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1937 (0, 772, 771, 770, 772)' - PASSED ssl_gtest.sh: #2679: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1938 (0, 772, 771, 770, 773)' - PASSED ssl_gtest.sh: #2680: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1939 (0, 772, 771, 771, 767)' - PASSED ssl_gtest.sh: #2681: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1940 (0, 772, 771, 771, 768)' - PASSED ssl_gtest.sh: #2682: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1941 (0, 772, 771, 771, 769)' - PASSED ssl_gtest.sh: #2683: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1942 (0, 772, 771, 771, 770)' - PASSED ssl_gtest.sh: #2684: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1943 (0, 772, 771, 771, 771)' - PASSED ssl_gtest.sh: #2685: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1944 (0, 772, 771, 771, 772)' - PASSED ssl_gtest.sh: #2686: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1945 (0, 772, 771, 771, 773)' - PASSED ssl_gtest.sh: #2687: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1946 (0, 772, 771, 772, 767)' - PASSED ssl_gtest.sh: #2688: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1947 (0, 772, 771, 772, 768)' - PASSED ssl_gtest.sh: #2689: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1948 (0, 772, 771, 772, 769)' - PASSED ssl_gtest.sh: #2690: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1949 (0, 772, 771, 772, 770)' - PASSED ssl_gtest.sh: #2691: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1950 (0, 772, 771, 772, 771)' - PASSED ssl_gtest.sh: #2692: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1951 (0, 772, 771, 772, 772)' - PASSED ssl_gtest.sh: #2693: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1952 (0, 772, 771, 772, 773)' - PASSED ssl_gtest.sh: #2694: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1953 (0, 772, 771, 773, 767)' - PASSED ssl_gtest.sh: #2695: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1954 (0, 772, 771, 773, 768)' - PASSED ssl_gtest.sh: #2696: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1955 (0, 772, 771, 773, 769)' - PASSED ssl_gtest.sh: #2697: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1956 (0, 772, 771, 773, 770)' - PASSED ssl_gtest.sh: #2698: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1957 (0, 772, 771, 773, 771)' - PASSED ssl_gtest.sh: #2699: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1958 (0, 772, 771, 773, 772)' - PASSED ssl_gtest.sh: #2700: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1959 (0, 772, 771, 773, 773)' - PASSED ssl_gtest.sh: #2701: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1960 (0, 772, 772, 767, 767)' - PASSED ssl_gtest.sh: #2702: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1961 (0, 772, 772, 767, 768)' - PASSED ssl_gtest.sh: #2703: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1962 (0, 772, 772, 767, 769)' - PASSED ssl_gtest.sh: #2704: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1963 (0, 772, 772, 767, 770)' - PASSED ssl_gtest.sh: #2705: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1964 (0, 772, 772, 767, 771)' - PASSED ssl_gtest.sh: #2706: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1965 (0, 772, 772, 767, 772)' - PASSED ssl_gtest.sh: #2707: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1966 (0, 772, 772, 767, 773)' - PASSED ssl_gtest.sh: #2708: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1967 (0, 772, 772, 768, 767)' - PASSED ssl_gtest.sh: #2709: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1968 (0, 772, 772, 768, 768)' - PASSED ssl_gtest.sh: #2710: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1969 (0, 772, 772, 768, 769)' - PASSED ssl_gtest.sh: #2711: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1970 (0, 772, 772, 768, 770)' - PASSED ssl_gtest.sh: #2712: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1971 (0, 772, 772, 768, 771)' - PASSED ssl_gtest.sh: #2713: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1972 (0, 772, 772, 768, 772)' - PASSED ssl_gtest.sh: #2714: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1973 (0, 772, 772, 768, 773)' - PASSED ssl_gtest.sh: #2715: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1974 (0, 772, 772, 769, 767)' - PASSED ssl_gtest.sh: #2716: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1975 (0, 772, 772, 769, 768)' - PASSED ssl_gtest.sh: #2717: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1976 (0, 772, 772, 769, 769)' - PASSED ssl_gtest.sh: #2718: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1977 (0, 772, 772, 769, 770)' - PASSED ssl_gtest.sh: #2719: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1978 (0, 772, 772, 769, 771)' - PASSED ssl_gtest.sh: #2720: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1979 (0, 772, 772, 769, 772)' - PASSED ssl_gtest.sh: #2721: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1980 (0, 772, 772, 769, 773)' - PASSED ssl_gtest.sh: #2722: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1981 (0, 772, 772, 770, 767)' - PASSED ssl_gtest.sh: #2723: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1982 (0, 772, 772, 770, 768)' - PASSED ssl_gtest.sh: #2724: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1983 (0, 772, 772, 770, 769)' - PASSED ssl_gtest.sh: #2725: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1984 (0, 772, 772, 770, 770)' - PASSED ssl_gtest.sh: #2726: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1985 (0, 772, 772, 770, 771)' - PASSED ssl_gtest.sh: #2727: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1986 (0, 772, 772, 770, 772)' - PASSED ssl_gtest.sh: #2728: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1987 (0, 772, 772, 770, 773)' - PASSED ssl_gtest.sh: #2729: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1988 (0, 772, 772, 771, 767)' - PASSED ssl_gtest.sh: #2730: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1989 (0, 772, 772, 771, 768)' - PASSED ssl_gtest.sh: #2731: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1990 (0, 772, 772, 771, 769)' - PASSED ssl_gtest.sh: #2732: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1991 (0, 772, 772, 771, 770)' - PASSED ssl_gtest.sh: #2733: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1992 (0, 772, 772, 771, 771)' - PASSED ssl_gtest.sh: #2734: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1993 (0, 772, 772, 771, 772)' - PASSED ssl_gtest.sh: #2735: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1994 (0, 772, 772, 771, 773)' - PASSED ssl_gtest.sh: #2736: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1995 (0, 772, 772, 772, 767)' - PASSED ssl_gtest.sh: #2737: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1996 (0, 772, 772, 772, 768)' - PASSED ssl_gtest.sh: #2738: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1997 (0, 772, 772, 772, 769)' - PASSED ssl_gtest.sh: #2739: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1998 (0, 772, 772, 772, 770)' - PASSED ssl_gtest.sh: #2740: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/1999 (0, 772, 772, 772, 771)' - PASSED ssl_gtest.sh: #2741: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2000 (0, 772, 772, 772, 772)' - PASSED ssl_gtest.sh: #2742: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2001 (0, 772, 772, 772, 773)' - PASSED ssl_gtest.sh: #2743: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2002 (0, 772, 772, 773, 767)' - PASSED ssl_gtest.sh: #2744: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2003 (0, 772, 772, 773, 768)' - PASSED ssl_gtest.sh: #2745: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2004 (0, 772, 772, 773, 769)' - PASSED ssl_gtest.sh: #2746: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2005 (0, 772, 772, 773, 770)' - PASSED ssl_gtest.sh: #2747: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2006 (0, 772, 772, 773, 771)' - PASSED ssl_gtest.sh: #2748: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2007 (0, 772, 772, 773, 772)' - PASSED ssl_gtest.sh: #2749: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2008 (0, 772, 772, 773, 773)' - PASSED ssl_gtest.sh: #2750: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2009 (0, 772, 773, 767, 767)' - PASSED ssl_gtest.sh: #2751: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2010 (0, 772, 773, 767, 768)' - PASSED ssl_gtest.sh: #2752: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2011 (0, 772, 773, 767, 769)' - PASSED ssl_gtest.sh: #2753: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2012 (0, 772, 773, 767, 770)' - PASSED ssl_gtest.sh: #2754: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2013 (0, 772, 773, 767, 771)' - PASSED ssl_gtest.sh: #2755: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2014 (0, 772, 773, 767, 772)' - PASSED ssl_gtest.sh: #2756: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2015 (0, 772, 773, 767, 773)' - PASSED ssl_gtest.sh: #2757: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2016 (0, 772, 773, 768, 767)' - PASSED ssl_gtest.sh: #2758: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2017 (0, 772, 773, 768, 768)' - PASSED ssl_gtest.sh: #2759: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2018 (0, 772, 773, 768, 769)' - PASSED ssl_gtest.sh: #2760: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2019 (0, 772, 773, 768, 770)' - PASSED ssl_gtest.sh: #2761: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2020 (0, 772, 773, 768, 771)' - PASSED ssl_gtest.sh: #2762: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2021 (0, 772, 773, 768, 772)' - PASSED ssl_gtest.sh: #2763: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2022 (0, 772, 773, 768, 773)' - PASSED ssl_gtest.sh: #2764: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2023 (0, 772, 773, 769, 767)' - PASSED ssl_gtest.sh: #2765: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2024 (0, 772, 773, 769, 768)' - PASSED ssl_gtest.sh: #2766: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2025 (0, 772, 773, 769, 769)' - PASSED ssl_gtest.sh: #2767: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2026 (0, 772, 773, 769, 770)' - PASSED ssl_gtest.sh: #2768: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2027 (0, 772, 773, 769, 771)' - PASSED ssl_gtest.sh: #2769: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2028 (0, 772, 773, 769, 772)' - PASSED ssl_gtest.sh: #2770: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2029 (0, 772, 773, 769, 773)' - PASSED ssl_gtest.sh: #2771: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2030 (0, 772, 773, 770, 767)' - PASSED ssl_gtest.sh: #2772: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2031 (0, 772, 773, 770, 768)' - PASSED ssl_gtest.sh: #2773: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2032 (0, 772, 773, 770, 769)' - PASSED ssl_gtest.sh: #2774: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2033 (0, 772, 773, 770, 770)' - PASSED ssl_gtest.sh: #2775: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2034 (0, 772, 773, 770, 771)' - PASSED ssl_gtest.sh: #2776: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2035 (0, 772, 773, 770, 772)' - PASSED ssl_gtest.sh: #2777: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2036 (0, 772, 773, 770, 773)' - PASSED ssl_gtest.sh: #2778: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2037 (0, 772, 773, 771, 767)' - PASSED ssl_gtest.sh: #2779: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2038 (0, 772, 773, 771, 768)' - PASSED ssl_gtest.sh: #2780: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2039 (0, 772, 773, 771, 769)' - PASSED ssl_gtest.sh: #2781: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2040 (0, 772, 773, 771, 770)' - PASSED ssl_gtest.sh: #2782: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2041 (0, 772, 773, 771, 771)' - PASSED ssl_gtest.sh: #2783: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2042 (0, 772, 773, 771, 772)' - PASSED ssl_gtest.sh: #2784: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2043 (0, 772, 773, 771, 773)' - PASSED ssl_gtest.sh: #2785: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2044 (0, 772, 773, 772, 767)' - PASSED ssl_gtest.sh: #2786: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2045 (0, 772, 773, 772, 768)' - PASSED ssl_gtest.sh: #2787: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2046 (0, 772, 773, 772, 769)' - PASSED ssl_gtest.sh: #2788: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2047 (0, 772, 773, 772, 770)' - PASSED ssl_gtest.sh: #2789: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2048 (0, 772, 773, 772, 771)' - PASSED ssl_gtest.sh: #2790: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2049 (0, 772, 773, 772, 772)' - PASSED ssl_gtest.sh: #2791: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2050 (0, 772, 773, 772, 773)' - PASSED ssl_gtest.sh: #2792: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2051 (0, 772, 773, 773, 767)' - PASSED ssl_gtest.sh: #2793: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2052 (0, 772, 773, 773, 768)' - PASSED ssl_gtest.sh: #2794: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2053 (0, 772, 773, 773, 769)' - PASSED ssl_gtest.sh: #2795: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2054 (0, 772, 773, 773, 770)' - PASSED ssl_gtest.sh: #2796: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2055 (0, 772, 773, 773, 771)' - PASSED ssl_gtest.sh: #2797: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2056 (0, 772, 773, 773, 772)' - PASSED ssl_gtest.sh: #2798: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2057 (0, 772, 773, 773, 773)' - PASSED ssl_gtest.sh: #2799: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2058 (0, 773, 767, 767, 767)' - PASSED ssl_gtest.sh: #2800: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2059 (0, 773, 767, 767, 768)' - PASSED ssl_gtest.sh: #2801: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2060 (0, 773, 767, 767, 769)' - PASSED ssl_gtest.sh: #2802: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2061 (0, 773, 767, 767, 770)' - PASSED ssl_gtest.sh: #2803: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2062 (0, 773, 767, 767, 771)' - PASSED ssl_gtest.sh: #2804: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2063 (0, 773, 767, 767, 772)' - PASSED ssl_gtest.sh: #2805: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2064 (0, 773, 767, 767, 773)' - PASSED ssl_gtest.sh: #2806: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2065 (0, 773, 767, 768, 767)' - PASSED ssl_gtest.sh: #2807: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2066 (0, 773, 767, 768, 768)' - PASSED ssl_gtest.sh: #2808: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2067 (0, 773, 767, 768, 769)' - PASSED ssl_gtest.sh: #2809: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2068 (0, 773, 767, 768, 770)' - PASSED ssl_gtest.sh: #2810: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2069 (0, 773, 767, 768, 771)' - PASSED ssl_gtest.sh: #2811: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2070 (0, 773, 767, 768, 772)' - PASSED ssl_gtest.sh: #2812: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2071 (0, 773, 767, 768, 773)' - PASSED ssl_gtest.sh: #2813: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2072 (0, 773, 767, 769, 767)' - PASSED ssl_gtest.sh: #2814: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2073 (0, 773, 767, 769, 768)' - PASSED ssl_gtest.sh: #2815: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2074 (0, 773, 767, 769, 769)' - PASSED ssl_gtest.sh: #2816: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2075 (0, 773, 767, 769, 770)' - PASSED ssl_gtest.sh: #2817: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2076 (0, 773, 767, 769, 771)' - PASSED ssl_gtest.sh: #2818: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2077 (0, 773, 767, 769, 772)' - PASSED ssl_gtest.sh: #2819: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2078 (0, 773, 767, 769, 773)' - PASSED ssl_gtest.sh: #2820: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2079 (0, 773, 767, 770, 767)' - PASSED ssl_gtest.sh: #2821: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2080 (0, 773, 767, 770, 768)' - PASSED ssl_gtest.sh: #2822: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2081 (0, 773, 767, 770, 769)' - PASSED ssl_gtest.sh: #2823: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2082 (0, 773, 767, 770, 770)' - PASSED ssl_gtest.sh: #2824: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2083 (0, 773, 767, 770, 771)' - PASSED ssl_gtest.sh: #2825: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2084 (0, 773, 767, 770, 772)' - PASSED ssl_gtest.sh: #2826: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2085 (0, 773, 767, 770, 773)' - PASSED ssl_gtest.sh: #2827: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2086 (0, 773, 767, 771, 767)' - PASSED ssl_gtest.sh: #2828: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2087 (0, 773, 767, 771, 768)' - PASSED ssl_gtest.sh: #2829: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2088 (0, 773, 767, 771, 769)' - PASSED ssl_gtest.sh: #2830: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2089 (0, 773, 767, 771, 770)' - PASSED ssl_gtest.sh: #2831: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2090 (0, 773, 767, 771, 771)' - PASSED ssl_gtest.sh: #2832: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2091 (0, 773, 767, 771, 772)' - PASSED ssl_gtest.sh: #2833: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2092 (0, 773, 767, 771, 773)' - PASSED ssl_gtest.sh: #2834: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2093 (0, 773, 767, 772, 767)' - PASSED ssl_gtest.sh: #2835: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2094 (0, 773, 767, 772, 768)' - PASSED ssl_gtest.sh: #2836: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2095 (0, 773, 767, 772, 769)' - PASSED ssl_gtest.sh: #2837: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2096 (0, 773, 767, 772, 770)' - PASSED ssl_gtest.sh: #2838: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2097 (0, 773, 767, 772, 771)' - PASSED ssl_gtest.sh: #2839: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2098 (0, 773, 767, 772, 772)' - PASSED ssl_gtest.sh: #2840: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2099 (0, 773, 767, 772, 773)' - PASSED ssl_gtest.sh: #2841: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2100 (0, 773, 767, 773, 767)' - PASSED ssl_gtest.sh: #2842: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2101 (0, 773, 767, 773, 768)' - PASSED ssl_gtest.sh: #2843: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2102 (0, 773, 767, 773, 769)' - PASSED ssl_gtest.sh: #2844: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2103 (0, 773, 767, 773, 770)' - PASSED ssl_gtest.sh: #2845: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2104 (0, 773, 767, 773, 771)' - PASSED ssl_gtest.sh: #2846: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2105 (0, 773, 767, 773, 772)' - PASSED ssl_gtest.sh: #2847: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2106 (0, 773, 767, 773, 773)' - PASSED ssl_gtest.sh: #2848: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2107 (0, 773, 768, 767, 767)' - PASSED ssl_gtest.sh: #2849: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2108 (0, 773, 768, 767, 768)' - PASSED ssl_gtest.sh: #2850: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2109 (0, 773, 768, 767, 769)' - PASSED ssl_gtest.sh: #2851: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2110 (0, 773, 768, 767, 770)' - PASSED ssl_gtest.sh: #2852: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2111 (0, 773, 768, 767, 771)' - PASSED ssl_gtest.sh: #2853: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2112 (0, 773, 768, 767, 772)' - PASSED ssl_gtest.sh: #2854: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2113 (0, 773, 768, 767, 773)' - PASSED ssl_gtest.sh: #2855: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2114 (0, 773, 768, 768, 767)' - PASSED ssl_gtest.sh: #2856: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2115 (0, 773, 768, 768, 768)' - PASSED ssl_gtest.sh: #2857: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2116 (0, 773, 768, 768, 769)' - PASSED ssl_gtest.sh: #2858: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2117 (0, 773, 768, 768, 770)' - PASSED ssl_gtest.sh: #2859: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2118 (0, 773, 768, 768, 771)' - PASSED ssl_gtest.sh: #2860: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2119 (0, 773, 768, 768, 772)' - PASSED ssl_gtest.sh: #2861: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2120 (0, 773, 768, 768, 773)' - PASSED ssl_gtest.sh: #2862: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2121 (0, 773, 768, 769, 767)' - PASSED ssl_gtest.sh: #2863: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2122 (0, 773, 768, 769, 768)' - PASSED ssl_gtest.sh: #2864: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2123 (0, 773, 768, 769, 769)' - PASSED ssl_gtest.sh: #2865: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2124 (0, 773, 768, 769, 770)' - PASSED ssl_gtest.sh: #2866: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2125 (0, 773, 768, 769, 771)' - PASSED ssl_gtest.sh: #2867: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2126 (0, 773, 768, 769, 772)' - PASSED ssl_gtest.sh: #2868: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2127 (0, 773, 768, 769, 773)' - PASSED ssl_gtest.sh: #2869: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2128 (0, 773, 768, 770, 767)' - PASSED ssl_gtest.sh: #2870: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2129 (0, 773, 768, 770, 768)' - PASSED ssl_gtest.sh: #2871: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2130 (0, 773, 768, 770, 769)' - PASSED ssl_gtest.sh: #2872: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2131 (0, 773, 768, 770, 770)' - PASSED ssl_gtest.sh: #2873: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2132 (0, 773, 768, 770, 771)' - PASSED ssl_gtest.sh: #2874: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2133 (0, 773, 768, 770, 772)' - PASSED ssl_gtest.sh: #2875: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2134 (0, 773, 768, 770, 773)' - PASSED ssl_gtest.sh: #2876: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2135 (0, 773, 768, 771, 767)' - PASSED ssl_gtest.sh: #2877: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2136 (0, 773, 768, 771, 768)' - PASSED ssl_gtest.sh: #2878: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2137 (0, 773, 768, 771, 769)' - PASSED ssl_gtest.sh: #2879: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2138 (0, 773, 768, 771, 770)' - PASSED ssl_gtest.sh: #2880: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2139 (0, 773, 768, 771, 771)' - PASSED ssl_gtest.sh: #2881: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2140 (0, 773, 768, 771, 772)' - PASSED ssl_gtest.sh: #2882: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2141 (0, 773, 768, 771, 773)' - PASSED ssl_gtest.sh: #2883: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2142 (0, 773, 768, 772, 767)' - PASSED ssl_gtest.sh: #2884: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2143 (0, 773, 768, 772, 768)' - PASSED ssl_gtest.sh: #2885: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2144 (0, 773, 768, 772, 769)' - PASSED ssl_gtest.sh: #2886: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2145 (0, 773, 768, 772, 770)' - PASSED ssl_gtest.sh: #2887: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2146 (0, 773, 768, 772, 771)' - PASSED ssl_gtest.sh: #2888: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2147 (0, 773, 768, 772, 772)' - PASSED ssl_gtest.sh: #2889: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2148 (0, 773, 768, 772, 773)' - PASSED ssl_gtest.sh: #2890: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2149 (0, 773, 768, 773, 767)' - PASSED ssl_gtest.sh: #2891: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2150 (0, 773, 768, 773, 768)' - PASSED ssl_gtest.sh: #2892: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2151 (0, 773, 768, 773, 769)' - PASSED ssl_gtest.sh: #2893: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2152 (0, 773, 768, 773, 770)' - PASSED ssl_gtest.sh: #2894: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2153 (0, 773, 768, 773, 771)' - PASSED ssl_gtest.sh: #2895: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2154 (0, 773, 768, 773, 772)' - PASSED ssl_gtest.sh: #2896: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2155 (0, 773, 768, 773, 773)' - PASSED ssl_gtest.sh: #2897: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2156 (0, 773, 769, 767, 767)' - PASSED ssl_gtest.sh: #2898: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2157 (0, 773, 769, 767, 768)' - PASSED ssl_gtest.sh: #2899: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2158 (0, 773, 769, 767, 769)' - PASSED ssl_gtest.sh: #2900: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2159 (0, 773, 769, 767, 770)' - PASSED ssl_gtest.sh: #2901: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2160 (0, 773, 769, 767, 771)' - PASSED ssl_gtest.sh: #2902: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2161 (0, 773, 769, 767, 772)' - PASSED ssl_gtest.sh: #2903: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2162 (0, 773, 769, 767, 773)' - PASSED ssl_gtest.sh: #2904: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2163 (0, 773, 769, 768, 767)' - PASSED ssl_gtest.sh: #2905: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2164 (0, 773, 769, 768, 768)' - PASSED ssl_gtest.sh: #2906: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2165 (0, 773, 769, 768, 769)' - PASSED ssl_gtest.sh: #2907: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2166 (0, 773, 769, 768, 770)' - PASSED ssl_gtest.sh: #2908: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2167 (0, 773, 769, 768, 771)' - PASSED ssl_gtest.sh: #2909: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2168 (0, 773, 769, 768, 772)' - PASSED ssl_gtest.sh: #2910: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2169 (0, 773, 769, 768, 773)' - PASSED ssl_gtest.sh: #2911: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2170 (0, 773, 769, 769, 767)' - PASSED ssl_gtest.sh: #2912: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2171 (0, 773, 769, 769, 768)' - PASSED ssl_gtest.sh: #2913: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2172 (0, 773, 769, 769, 769)' - PASSED ssl_gtest.sh: #2914: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2173 (0, 773, 769, 769, 770)' - PASSED ssl_gtest.sh: #2915: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2174 (0, 773, 769, 769, 771)' - PASSED ssl_gtest.sh: #2916: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2175 (0, 773, 769, 769, 772)' - PASSED ssl_gtest.sh: #2917: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2176 (0, 773, 769, 769, 773)' - PASSED ssl_gtest.sh: #2918: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2177 (0, 773, 769, 770, 767)' - PASSED ssl_gtest.sh: #2919: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2178 (0, 773, 769, 770, 768)' - PASSED ssl_gtest.sh: #2920: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2179 (0, 773, 769, 770, 769)' - PASSED ssl_gtest.sh: #2921: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2180 (0, 773, 769, 770, 770)' - PASSED ssl_gtest.sh: #2922: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2181 (0, 773, 769, 770, 771)' - PASSED ssl_gtest.sh: #2923: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2182 (0, 773, 769, 770, 772)' - PASSED ssl_gtest.sh: #2924: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2183 (0, 773, 769, 770, 773)' - PASSED ssl_gtest.sh: #2925: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2184 (0, 773, 769, 771, 767)' - PASSED ssl_gtest.sh: #2926: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2185 (0, 773, 769, 771, 768)' - PASSED ssl_gtest.sh: #2927: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2186 (0, 773, 769, 771, 769)' - PASSED ssl_gtest.sh: #2928: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2187 (0, 773, 769, 771, 770)' - PASSED ssl_gtest.sh: #2929: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2188 (0, 773, 769, 771, 771)' - PASSED ssl_gtest.sh: #2930: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2189 (0, 773, 769, 771, 772)' - PASSED ssl_gtest.sh: #2931: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2190 (0, 773, 769, 771, 773)' - PASSED ssl_gtest.sh: #2932: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2191 (0, 773, 769, 772, 767)' - PASSED ssl_gtest.sh: #2933: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2192 (0, 773, 769, 772, 768)' - PASSED ssl_gtest.sh: #2934: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2193 (0, 773, 769, 772, 769)' - PASSED ssl_gtest.sh: #2935: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2194 (0, 773, 769, 772, 770)' - PASSED ssl_gtest.sh: #2936: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2195 (0, 773, 769, 772, 771)' - PASSED ssl_gtest.sh: #2937: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2196 (0, 773, 769, 772, 772)' - PASSED ssl_gtest.sh: #2938: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2197 (0, 773, 769, 772, 773)' - PASSED ssl_gtest.sh: #2939: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2198 (0, 773, 769, 773, 767)' - PASSED ssl_gtest.sh: #2940: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2199 (0, 773, 769, 773, 768)' - PASSED ssl_gtest.sh: #2941: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2200 (0, 773, 769, 773, 769)' - PASSED ssl_gtest.sh: #2942: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2201 (0, 773, 769, 773, 770)' - PASSED ssl_gtest.sh: #2943: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2202 (0, 773, 769, 773, 771)' - PASSED ssl_gtest.sh: #2944: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2203 (0, 773, 769, 773, 772)' - PASSED ssl_gtest.sh: #2945: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2204 (0, 773, 769, 773, 773)' - PASSED ssl_gtest.sh: #2946: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2205 (0, 773, 770, 767, 767)' - PASSED ssl_gtest.sh: #2947: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2206 (0, 773, 770, 767, 768)' - PASSED ssl_gtest.sh: #2948: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2207 (0, 773, 770, 767, 769)' - PASSED ssl_gtest.sh: #2949: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2208 (0, 773, 770, 767, 770)' - PASSED ssl_gtest.sh: #2950: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2209 (0, 773, 770, 767, 771)' - PASSED ssl_gtest.sh: #2951: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2210 (0, 773, 770, 767, 772)' - PASSED ssl_gtest.sh: #2952: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2211 (0, 773, 770, 767, 773)' - PASSED ssl_gtest.sh: #2953: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2212 (0, 773, 770, 768, 767)' - PASSED ssl_gtest.sh: #2954: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2213 (0, 773, 770, 768, 768)' - PASSED ssl_gtest.sh: #2955: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2214 (0, 773, 770, 768, 769)' - PASSED ssl_gtest.sh: #2956: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2215 (0, 773, 770, 768, 770)' - PASSED ssl_gtest.sh: #2957: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2216 (0, 773, 770, 768, 771)' - PASSED ssl_gtest.sh: #2958: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2217 (0, 773, 770, 768, 772)' - PASSED ssl_gtest.sh: #2959: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2218 (0, 773, 770, 768, 773)' - PASSED ssl_gtest.sh: #2960: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2219 (0, 773, 770, 769, 767)' - PASSED ssl_gtest.sh: #2961: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2220 (0, 773, 770, 769, 768)' - PASSED ssl_gtest.sh: #2962: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2221 (0, 773, 770, 769, 769)' - PASSED ssl_gtest.sh: #2963: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2222 (0, 773, 770, 769, 770)' - PASSED ssl_gtest.sh: #2964: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2223 (0, 773, 770, 769, 771)' - PASSED ssl_gtest.sh: #2965: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2224 (0, 773, 770, 769, 772)' - PASSED ssl_gtest.sh: #2966: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2225 (0, 773, 770, 769, 773)' - PASSED ssl_gtest.sh: #2967: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2226 (0, 773, 770, 770, 767)' - PASSED ssl_gtest.sh: #2968: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2227 (0, 773, 770, 770, 768)' - PASSED ssl_gtest.sh: #2969: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2228 (0, 773, 770, 770, 769)' - PASSED ssl_gtest.sh: #2970: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2229 (0, 773, 770, 770, 770)' - PASSED ssl_gtest.sh: #2971: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2230 (0, 773, 770, 770, 771)' - PASSED ssl_gtest.sh: #2972: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2231 (0, 773, 770, 770, 772)' - PASSED ssl_gtest.sh: #2973: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2232 (0, 773, 770, 770, 773)' - PASSED ssl_gtest.sh: #2974: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2233 (0, 773, 770, 771, 767)' - PASSED ssl_gtest.sh: #2975: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2234 (0, 773, 770, 771, 768)' - PASSED ssl_gtest.sh: #2976: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2235 (0, 773, 770, 771, 769)' - PASSED ssl_gtest.sh: #2977: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2236 (0, 773, 770, 771, 770)' - PASSED ssl_gtest.sh: #2978: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2237 (0, 773, 770, 771, 771)' - PASSED ssl_gtest.sh: #2979: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2238 (0, 773, 770, 771, 772)' - PASSED ssl_gtest.sh: #2980: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2239 (0, 773, 770, 771, 773)' - PASSED ssl_gtest.sh: #2981: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2240 (0, 773, 770, 772, 767)' - PASSED ssl_gtest.sh: #2982: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2241 (0, 773, 770, 772, 768)' - PASSED ssl_gtest.sh: #2983: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2242 (0, 773, 770, 772, 769)' - PASSED ssl_gtest.sh: #2984: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2243 (0, 773, 770, 772, 770)' - PASSED ssl_gtest.sh: #2985: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2244 (0, 773, 770, 772, 771)' - PASSED ssl_gtest.sh: #2986: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2245 (0, 773, 770, 772, 772)' - PASSED ssl_gtest.sh: #2987: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2246 (0, 773, 770, 772, 773)' - PASSED ssl_gtest.sh: #2988: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2247 (0, 773, 770, 773, 767)' - PASSED ssl_gtest.sh: #2989: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2248 (0, 773, 770, 773, 768)' - PASSED ssl_gtest.sh: #2990: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2249 (0, 773, 770, 773, 769)' - PASSED ssl_gtest.sh: #2991: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2250 (0, 773, 770, 773, 770)' - PASSED ssl_gtest.sh: #2992: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2251 (0, 773, 770, 773, 771)' - PASSED ssl_gtest.sh: #2993: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2252 (0, 773, 770, 773, 772)' - PASSED ssl_gtest.sh: #2994: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2253 (0, 773, 770, 773, 773)' - PASSED ssl_gtest.sh: #2995: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2254 (0, 773, 771, 767, 767)' - PASSED ssl_gtest.sh: #2996: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2255 (0, 773, 771, 767, 768)' - PASSED ssl_gtest.sh: #2997: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2256 (0, 773, 771, 767, 769)' - PASSED ssl_gtest.sh: #2998: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2257 (0, 773, 771, 767, 770)' - PASSED ssl_gtest.sh: #2999: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2258 (0, 773, 771, 767, 771)' - PASSED ssl_gtest.sh: #3000: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2259 (0, 773, 771, 767, 772)' - PASSED ssl_gtest.sh: #3001: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2260 (0, 773, 771, 767, 773)' - PASSED ssl_gtest.sh: #3002: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2261 (0, 773, 771, 768, 767)' - PASSED ssl_gtest.sh: #3003: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2262 (0, 773, 771, 768, 768)' - PASSED ssl_gtest.sh: #3004: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2263 (0, 773, 771, 768, 769)' - PASSED ssl_gtest.sh: #3005: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2264 (0, 773, 771, 768, 770)' - PASSED ssl_gtest.sh: #3006: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2265 (0, 773, 771, 768, 771)' - PASSED ssl_gtest.sh: #3007: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2266 (0, 773, 771, 768, 772)' - PASSED ssl_gtest.sh: #3008: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2267 (0, 773, 771, 768, 773)' - PASSED ssl_gtest.sh: #3009: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2268 (0, 773, 771, 769, 767)' - PASSED ssl_gtest.sh: #3010: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2269 (0, 773, 771, 769, 768)' - PASSED ssl_gtest.sh: #3011: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2270 (0, 773, 771, 769, 769)' - PASSED ssl_gtest.sh: #3012: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2271 (0, 773, 771, 769, 770)' - PASSED ssl_gtest.sh: #3013: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2272 (0, 773, 771, 769, 771)' - PASSED ssl_gtest.sh: #3014: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2273 (0, 773, 771, 769, 772)' - PASSED ssl_gtest.sh: #3015: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2274 (0, 773, 771, 769, 773)' - PASSED ssl_gtest.sh: #3016: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2275 (0, 773, 771, 770, 767)' - PASSED ssl_gtest.sh: #3017: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2276 (0, 773, 771, 770, 768)' - PASSED ssl_gtest.sh: #3018: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2277 (0, 773, 771, 770, 769)' - PASSED ssl_gtest.sh: #3019: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2278 (0, 773, 771, 770, 770)' - PASSED ssl_gtest.sh: #3020: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2279 (0, 773, 771, 770, 771)' - PASSED ssl_gtest.sh: #3021: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2280 (0, 773, 771, 770, 772)' - PASSED ssl_gtest.sh: #3022: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2281 (0, 773, 771, 770, 773)' - PASSED ssl_gtest.sh: #3023: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2282 (0, 773, 771, 771, 767)' - PASSED ssl_gtest.sh: #3024: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2283 (0, 773, 771, 771, 768)' - PASSED ssl_gtest.sh: #3025: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2284 (0, 773, 771, 771, 769)' - PASSED ssl_gtest.sh: #3026: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2285 (0, 773, 771, 771, 770)' - PASSED ssl_gtest.sh: #3027: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2286 (0, 773, 771, 771, 771)' - PASSED ssl_gtest.sh: #3028: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2287 (0, 773, 771, 771, 772)' - PASSED ssl_gtest.sh: #3029: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2288 (0, 773, 771, 771, 773)' - PASSED ssl_gtest.sh: #3030: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2289 (0, 773, 771, 772, 767)' - PASSED ssl_gtest.sh: #3031: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2290 (0, 773, 771, 772, 768)' - PASSED ssl_gtest.sh: #3032: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2291 (0, 773, 771, 772, 769)' - PASSED ssl_gtest.sh: #3033: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2292 (0, 773, 771, 772, 770)' - PASSED ssl_gtest.sh: #3034: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2293 (0, 773, 771, 772, 771)' - PASSED ssl_gtest.sh: #3035: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2294 (0, 773, 771, 772, 772)' - PASSED ssl_gtest.sh: #3036: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2295 (0, 773, 771, 772, 773)' - PASSED ssl_gtest.sh: #3037: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2296 (0, 773, 771, 773, 767)' - PASSED ssl_gtest.sh: #3038: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2297 (0, 773, 771, 773, 768)' - PASSED ssl_gtest.sh: #3039: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2298 (0, 773, 771, 773, 769)' - PASSED ssl_gtest.sh: #3040: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2299 (0, 773, 771, 773, 770)' - PASSED ssl_gtest.sh: #3041: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2300 (0, 773, 771, 773, 771)' - PASSED ssl_gtest.sh: #3042: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2301 (0, 773, 771, 773, 772)' - PASSED ssl_gtest.sh: #3043: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2302 (0, 773, 771, 773, 773)' - PASSED ssl_gtest.sh: #3044: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2303 (0, 773, 772, 767, 767)' - PASSED ssl_gtest.sh: #3045: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2304 (0, 773, 772, 767, 768)' - PASSED ssl_gtest.sh: #3046: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2305 (0, 773, 772, 767, 769)' - PASSED ssl_gtest.sh: #3047: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2306 (0, 773, 772, 767, 770)' - PASSED ssl_gtest.sh: #3048: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2307 (0, 773, 772, 767, 771)' - PASSED ssl_gtest.sh: #3049: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2308 (0, 773, 772, 767, 772)' - PASSED ssl_gtest.sh: #3050: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2309 (0, 773, 772, 767, 773)' - PASSED ssl_gtest.sh: #3051: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2310 (0, 773, 772, 768, 767)' - PASSED ssl_gtest.sh: #3052: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2311 (0, 773, 772, 768, 768)' - PASSED ssl_gtest.sh: #3053: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2312 (0, 773, 772, 768, 769)' - PASSED ssl_gtest.sh: #3054: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2313 (0, 773, 772, 768, 770)' - PASSED ssl_gtest.sh: #3055: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2314 (0, 773, 772, 768, 771)' - PASSED ssl_gtest.sh: #3056: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2315 (0, 773, 772, 768, 772)' - PASSED ssl_gtest.sh: #3057: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2316 (0, 773, 772, 768, 773)' - PASSED ssl_gtest.sh: #3058: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2317 (0, 773, 772, 769, 767)' - PASSED ssl_gtest.sh: #3059: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2318 (0, 773, 772, 769, 768)' - PASSED ssl_gtest.sh: #3060: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2319 (0, 773, 772, 769, 769)' - PASSED ssl_gtest.sh: #3061: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2320 (0, 773, 772, 769, 770)' - PASSED ssl_gtest.sh: #3062: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2321 (0, 773, 772, 769, 771)' - PASSED ssl_gtest.sh: #3063: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2322 (0, 773, 772, 769, 772)' - PASSED ssl_gtest.sh: #3064: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2323 (0, 773, 772, 769, 773)' - PASSED ssl_gtest.sh: #3065: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2324 (0, 773, 772, 770, 767)' - PASSED ssl_gtest.sh: #3066: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2325 (0, 773, 772, 770, 768)' - PASSED ssl_gtest.sh: #3067: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2326 (0, 773, 772, 770, 769)' - PASSED ssl_gtest.sh: #3068: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2327 (0, 773, 772, 770, 770)' - PASSED ssl_gtest.sh: #3069: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2328 (0, 773, 772, 770, 771)' - PASSED ssl_gtest.sh: #3070: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2329 (0, 773, 772, 770, 772)' - PASSED ssl_gtest.sh: #3071: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2330 (0, 773, 772, 770, 773)' - PASSED ssl_gtest.sh: #3072: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2331 (0, 773, 772, 771, 767)' - PASSED ssl_gtest.sh: #3073: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2332 (0, 773, 772, 771, 768)' - PASSED ssl_gtest.sh: #3074: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2333 (0, 773, 772, 771, 769)' - PASSED ssl_gtest.sh: #3075: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2334 (0, 773, 772, 771, 770)' - PASSED ssl_gtest.sh: #3076: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2335 (0, 773, 772, 771, 771)' - PASSED ssl_gtest.sh: #3077: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2336 (0, 773, 772, 771, 772)' - PASSED ssl_gtest.sh: #3078: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2337 (0, 773, 772, 771, 773)' - PASSED ssl_gtest.sh: #3079: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2338 (0, 773, 772, 772, 767)' - PASSED ssl_gtest.sh: #3080: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2339 (0, 773, 772, 772, 768)' - PASSED ssl_gtest.sh: #3081: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2340 (0, 773, 772, 772, 769)' - PASSED ssl_gtest.sh: #3082: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2341 (0, 773, 772, 772, 770)' - PASSED ssl_gtest.sh: #3083: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2342 (0, 773, 772, 772, 771)' - PASSED ssl_gtest.sh: #3084: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2343 (0, 773, 772, 772, 772)' - PASSED ssl_gtest.sh: #3085: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2344 (0, 773, 772, 772, 773)' - PASSED ssl_gtest.sh: #3086: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2345 (0, 773, 772, 773, 767)' - PASSED ssl_gtest.sh: #3087: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2346 (0, 773, 772, 773, 768)' - PASSED ssl_gtest.sh: #3088: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2347 (0, 773, 772, 773, 769)' - PASSED ssl_gtest.sh: #3089: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2348 (0, 773, 772, 773, 770)' - PASSED ssl_gtest.sh: #3090: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2349 (0, 773, 772, 773, 771)' - PASSED ssl_gtest.sh: #3091: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2350 (0, 773, 772, 773, 772)' - PASSED ssl_gtest.sh: #3092: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2351 (0, 773, 772, 773, 773)' - PASSED ssl_gtest.sh: #3093: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2352 (0, 773, 773, 767, 767)' - PASSED ssl_gtest.sh: #3094: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2353 (0, 773, 773, 767, 768)' - PASSED ssl_gtest.sh: #3095: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2354 (0, 773, 773, 767, 769)' - PASSED ssl_gtest.sh: #3096: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2355 (0, 773, 773, 767, 770)' - PASSED ssl_gtest.sh: #3097: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2356 (0, 773, 773, 767, 771)' - PASSED ssl_gtest.sh: #3098: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2357 (0, 773, 773, 767, 772)' - PASSED ssl_gtest.sh: #3099: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2358 (0, 773, 773, 767, 773)' - PASSED ssl_gtest.sh: #3100: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2359 (0, 773, 773, 768, 767)' - PASSED ssl_gtest.sh: #3101: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2360 (0, 773, 773, 768, 768)' - PASSED ssl_gtest.sh: #3102: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2361 (0, 773, 773, 768, 769)' - PASSED ssl_gtest.sh: #3103: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2362 (0, 773, 773, 768, 770)' - PASSED ssl_gtest.sh: #3104: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2363 (0, 773, 773, 768, 771)' - PASSED ssl_gtest.sh: #3105: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2364 (0, 773, 773, 768, 772)' - PASSED ssl_gtest.sh: #3106: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2365 (0, 773, 773, 768, 773)' - PASSED ssl_gtest.sh: #3107: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2366 (0, 773, 773, 769, 767)' - PASSED ssl_gtest.sh: #3108: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2367 (0, 773, 773, 769, 768)' - PASSED ssl_gtest.sh: #3109: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2368 (0, 773, 773, 769, 769)' - PASSED ssl_gtest.sh: #3110: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2369 (0, 773, 773, 769, 770)' - PASSED ssl_gtest.sh: #3111: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2370 (0, 773, 773, 769, 771)' - PASSED ssl_gtest.sh: #3112: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2371 (0, 773, 773, 769, 772)' - PASSED ssl_gtest.sh: #3113: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2372 (0, 773, 773, 769, 773)' - PASSED ssl_gtest.sh: #3114: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2373 (0, 773, 773, 770, 767)' - PASSED ssl_gtest.sh: #3115: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2374 (0, 773, 773, 770, 768)' - PASSED ssl_gtest.sh: #3116: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2375 (0, 773, 773, 770, 769)' - PASSED ssl_gtest.sh: #3117: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2376 (0, 773, 773, 770, 770)' - PASSED ssl_gtest.sh: #3118: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2377 (0, 773, 773, 770, 771)' - PASSED ssl_gtest.sh: #3119: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2378 (0, 773, 773, 770, 772)' - PASSED ssl_gtest.sh: #3120: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2379 (0, 773, 773, 770, 773)' - PASSED ssl_gtest.sh: #3121: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2380 (0, 773, 773, 771, 767)' - PASSED ssl_gtest.sh: #3122: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2381 (0, 773, 773, 771, 768)' - PASSED ssl_gtest.sh: #3123: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2382 (0, 773, 773, 771, 769)' - PASSED ssl_gtest.sh: #3124: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2383 (0, 773, 773, 771, 770)' - PASSED ssl_gtest.sh: #3125: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2384 (0, 773, 773, 771, 771)' - PASSED ssl_gtest.sh: #3126: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2385 (0, 773, 773, 771, 772)' - PASSED ssl_gtest.sh: #3127: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2386 (0, 773, 773, 771, 773)' - PASSED ssl_gtest.sh: #3128: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2387 (0, 773, 773, 772, 767)' - PASSED ssl_gtest.sh: #3129: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2388 (0, 773, 773, 772, 768)' - PASSED ssl_gtest.sh: #3130: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2389 (0, 773, 773, 772, 769)' - PASSED ssl_gtest.sh: #3131: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2390 (0, 773, 773, 772, 770)' - PASSED ssl_gtest.sh: #3132: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2391 (0, 773, 773, 772, 771)' - PASSED ssl_gtest.sh: #3133: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2392 (0, 773, 773, 772, 772)' - PASSED ssl_gtest.sh: #3134: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2393 (0, 773, 773, 772, 773)' - PASSED ssl_gtest.sh: #3135: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2394 (0, 773, 773, 773, 767)' - PASSED ssl_gtest.sh: #3136: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2395 (0, 773, 773, 773, 768)' - PASSED ssl_gtest.sh: #3137: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2396 (0, 773, 773, 773, 769)' - PASSED ssl_gtest.sh: #3138: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2397 (0, 773, 773, 773, 770)' - PASSED ssl_gtest.sh: #3139: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2398 (0, 773, 773, 773, 771)' - PASSED ssl_gtest.sh: #3140: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2399 (0, 773, 773, 773, 772)' - PASSED ssl_gtest.sh: #3141: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2400 (0, 773, 773, 773, 773)' - PASSED ssl_gtest.sh: #3142: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2401 (1, 767, 767, 767, 767)' - PASSED ssl_gtest.sh: #3143: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2402 (1, 767, 767, 767, 768)' - PASSED ssl_gtest.sh: #3144: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2403 (1, 767, 767, 767, 769)' - PASSED ssl_gtest.sh: #3145: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2404 (1, 767, 767, 767, 770)' - PASSED ssl_gtest.sh: #3146: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2405 (1, 767, 767, 767, 771)' - PASSED ssl_gtest.sh: #3147: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2406 (1, 767, 767, 767, 772)' - PASSED ssl_gtest.sh: #3148: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2407 (1, 767, 767, 767, 773)' - PASSED ssl_gtest.sh: #3149: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2408 (1, 767, 767, 768, 767)' - PASSED ssl_gtest.sh: #3150: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2409 (1, 767, 767, 768, 768)' - PASSED ssl_gtest.sh: #3151: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2410 (1, 767, 767, 768, 769)' - PASSED ssl_gtest.sh: #3152: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2411 (1, 767, 767, 768, 770)' - PASSED ssl_gtest.sh: #3153: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2412 (1, 767, 767, 768, 771)' - PASSED ssl_gtest.sh: #3154: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2413 (1, 767, 767, 768, 772)' - PASSED ssl_gtest.sh: #3155: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2414 (1, 767, 767, 768, 773)' - PASSED ssl_gtest.sh: #3156: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2415 (1, 767, 767, 769, 767)' - PASSED ssl_gtest.sh: #3157: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2416 (1, 767, 767, 769, 768)' - PASSED ssl_gtest.sh: #3158: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2417 (1, 767, 767, 769, 769)' - PASSED ssl_gtest.sh: #3159: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2418 (1, 767, 767, 769, 770)' - PASSED ssl_gtest.sh: #3160: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2419 (1, 767, 767, 769, 771)' - PASSED ssl_gtest.sh: #3161: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2420 (1, 767, 767, 769, 772)' - PASSED ssl_gtest.sh: #3162: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2421 (1, 767, 767, 769, 773)' - PASSED ssl_gtest.sh: #3163: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2422 (1, 767, 767, 770, 767)' - PASSED ssl_gtest.sh: #3164: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2423 (1, 767, 767, 770, 768)' - PASSED ssl_gtest.sh: #3165: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2424 (1, 767, 767, 770, 769)' - PASSED ssl_gtest.sh: #3166: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2425 (1, 767, 767, 770, 770)' - PASSED ssl_gtest.sh: #3167: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2426 (1, 767, 767, 770, 771)' - PASSED ssl_gtest.sh: #3168: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2427 (1, 767, 767, 770, 772)' - PASSED ssl_gtest.sh: #3169: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2428 (1, 767, 767, 770, 773)' - PASSED ssl_gtest.sh: #3170: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2429 (1, 767, 767, 771, 767)' - PASSED ssl_gtest.sh: #3171: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2430 (1, 767, 767, 771, 768)' - PASSED ssl_gtest.sh: #3172: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2431 (1, 767, 767, 771, 769)' - PASSED ssl_gtest.sh: #3173: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2432 (1, 767, 767, 771, 770)' - PASSED ssl_gtest.sh: #3174: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2433 (1, 767, 767, 771, 771)' - PASSED ssl_gtest.sh: #3175: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2434 (1, 767, 767, 771, 772)' - PASSED ssl_gtest.sh: #3176: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2435 (1, 767, 767, 771, 773)' - PASSED ssl_gtest.sh: #3177: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2436 (1, 767, 767, 772, 767)' - PASSED ssl_gtest.sh: #3178: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2437 (1, 767, 767, 772, 768)' - PASSED ssl_gtest.sh: #3179: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2438 (1, 767, 767, 772, 769)' - PASSED ssl_gtest.sh: #3180: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2439 (1, 767, 767, 772, 770)' - PASSED ssl_gtest.sh: #3181: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2440 (1, 767, 767, 772, 771)' - PASSED ssl_gtest.sh: #3182: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2441 (1, 767, 767, 772, 772)' - PASSED ssl_gtest.sh: #3183: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2442 (1, 767, 767, 772, 773)' - PASSED ssl_gtest.sh: #3184: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2443 (1, 767, 767, 773, 767)' - PASSED ssl_gtest.sh: #3185: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2444 (1, 767, 767, 773, 768)' - PASSED ssl_gtest.sh: #3186: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2445 (1, 767, 767, 773, 769)' - PASSED ssl_gtest.sh: #3187: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2446 (1, 767, 767, 773, 770)' - PASSED ssl_gtest.sh: #3188: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2447 (1, 767, 767, 773, 771)' - PASSED ssl_gtest.sh: #3189: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2448 (1, 767, 767, 773, 772)' - PASSED ssl_gtest.sh: #3190: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2449 (1, 767, 767, 773, 773)' - PASSED ssl_gtest.sh: #3191: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2450 (1, 767, 768, 767, 767)' - PASSED ssl_gtest.sh: #3192: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2451 (1, 767, 768, 767, 768)' - PASSED ssl_gtest.sh: #3193: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2452 (1, 767, 768, 767, 769)' - PASSED ssl_gtest.sh: #3194: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2453 (1, 767, 768, 767, 770)' - PASSED ssl_gtest.sh: #3195: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2454 (1, 767, 768, 767, 771)' - PASSED ssl_gtest.sh: #3196: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2455 (1, 767, 768, 767, 772)' - PASSED ssl_gtest.sh: #3197: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2456 (1, 767, 768, 767, 773)' - PASSED ssl_gtest.sh: #3198: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2457 (1, 767, 768, 768, 767)' - PASSED ssl_gtest.sh: #3199: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2458 (1, 767, 768, 768, 768)' - PASSED ssl_gtest.sh: #3200: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2459 (1, 767, 768, 768, 769)' - PASSED ssl_gtest.sh: #3201: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2460 (1, 767, 768, 768, 770)' - PASSED ssl_gtest.sh: #3202: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2461 (1, 767, 768, 768, 771)' - PASSED ssl_gtest.sh: #3203: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2462 (1, 767, 768, 768, 772)' - PASSED ssl_gtest.sh: #3204: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2463 (1, 767, 768, 768, 773)' - PASSED ssl_gtest.sh: #3205: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2464 (1, 767, 768, 769, 767)' - PASSED ssl_gtest.sh: #3206: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2465 (1, 767, 768, 769, 768)' - PASSED ssl_gtest.sh: #3207: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2466 (1, 767, 768, 769, 769)' - PASSED ssl_gtest.sh: #3208: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2467 (1, 767, 768, 769, 770)' - PASSED ssl_gtest.sh: #3209: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2468 (1, 767, 768, 769, 771)' - PASSED ssl_gtest.sh: #3210: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2469 (1, 767, 768, 769, 772)' - PASSED ssl_gtest.sh: #3211: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2470 (1, 767, 768, 769, 773)' - PASSED ssl_gtest.sh: #3212: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2471 (1, 767, 768, 770, 767)' - PASSED ssl_gtest.sh: #3213: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2472 (1, 767, 768, 770, 768)' - PASSED ssl_gtest.sh: #3214: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2473 (1, 767, 768, 770, 769)' - PASSED ssl_gtest.sh: #3215: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2474 (1, 767, 768, 770, 770)' - PASSED ssl_gtest.sh: #3216: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2475 (1, 767, 768, 770, 771)' - PASSED ssl_gtest.sh: #3217: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2476 (1, 767, 768, 770, 772)' - PASSED ssl_gtest.sh: #3218: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2477 (1, 767, 768, 770, 773)' - PASSED ssl_gtest.sh: #3219: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2478 (1, 767, 768, 771, 767)' - PASSED ssl_gtest.sh: #3220: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2479 (1, 767, 768, 771, 768)' - PASSED ssl_gtest.sh: #3221: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2480 (1, 767, 768, 771, 769)' - PASSED ssl_gtest.sh: #3222: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2481 (1, 767, 768, 771, 770)' - PASSED ssl_gtest.sh: #3223: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2482 (1, 767, 768, 771, 771)' - PASSED ssl_gtest.sh: #3224: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2483 (1, 767, 768, 771, 772)' - PASSED ssl_gtest.sh: #3225: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2484 (1, 767, 768, 771, 773)' - PASSED ssl_gtest.sh: #3226: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2485 (1, 767, 768, 772, 767)' - PASSED ssl_gtest.sh: #3227: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2486 (1, 767, 768, 772, 768)' - PASSED ssl_gtest.sh: #3228: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2487 (1, 767, 768, 772, 769)' - PASSED ssl_gtest.sh: #3229: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2488 (1, 767, 768, 772, 770)' - PASSED ssl_gtest.sh: #3230: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2489 (1, 767, 768, 772, 771)' - PASSED ssl_gtest.sh: #3231: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2490 (1, 767, 768, 772, 772)' - PASSED ssl_gtest.sh: #3232: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2491 (1, 767, 768, 772, 773)' - PASSED ssl_gtest.sh: #3233: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2492 (1, 767, 768, 773, 767)' - PASSED ssl_gtest.sh: #3234: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2493 (1, 767, 768, 773, 768)' - PASSED ssl_gtest.sh: #3235: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2494 (1, 767, 768, 773, 769)' - PASSED ssl_gtest.sh: #3236: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2495 (1, 767, 768, 773, 770)' - PASSED ssl_gtest.sh: #3237: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2496 (1, 767, 768, 773, 771)' - PASSED ssl_gtest.sh: #3238: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2497 (1, 767, 768, 773, 772)' - PASSED ssl_gtest.sh: #3239: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2498 (1, 767, 768, 773, 773)' - PASSED ssl_gtest.sh: #3240: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2499 (1, 767, 769, 767, 767)' - PASSED ssl_gtest.sh: #3241: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2500 (1, 767, 769, 767, 768)' - PASSED ssl_gtest.sh: #3242: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2501 (1, 767, 769, 767, 769)' - PASSED ssl_gtest.sh: #3243: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2502 (1, 767, 769, 767, 770)' - PASSED ssl_gtest.sh: #3244: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2503 (1, 767, 769, 767, 771)' - PASSED ssl_gtest.sh: #3245: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2504 (1, 767, 769, 767, 772)' - PASSED ssl_gtest.sh: #3246: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2505 (1, 767, 769, 767, 773)' - PASSED ssl_gtest.sh: #3247: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2506 (1, 767, 769, 768, 767)' - PASSED ssl_gtest.sh: #3248: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2507 (1, 767, 769, 768, 768)' - PASSED ssl_gtest.sh: #3249: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2508 (1, 767, 769, 768, 769)' - PASSED ssl_gtest.sh: #3250: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2509 (1, 767, 769, 768, 770)' - PASSED ssl_gtest.sh: #3251: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2510 (1, 767, 769, 768, 771)' - PASSED ssl_gtest.sh: #3252: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2511 (1, 767, 769, 768, 772)' - PASSED ssl_gtest.sh: #3253: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2512 (1, 767, 769, 768, 773)' - PASSED ssl_gtest.sh: #3254: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2513 (1, 767, 769, 769, 767)' - PASSED ssl_gtest.sh: #3255: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2514 (1, 767, 769, 769, 768)' - PASSED ssl_gtest.sh: #3256: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2515 (1, 767, 769, 769, 769)' - PASSED ssl_gtest.sh: #3257: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2516 (1, 767, 769, 769, 770)' - PASSED ssl_gtest.sh: #3258: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2517 (1, 767, 769, 769, 771)' - PASSED ssl_gtest.sh: #3259: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2518 (1, 767, 769, 769, 772)' - PASSED ssl_gtest.sh: #3260: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2519 (1, 767, 769, 769, 773)' - PASSED ssl_gtest.sh: #3261: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2520 (1, 767, 769, 770, 767)' - PASSED ssl_gtest.sh: #3262: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2521 (1, 767, 769, 770, 768)' - PASSED ssl_gtest.sh: #3263: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2522 (1, 767, 769, 770, 769)' - PASSED ssl_gtest.sh: #3264: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2523 (1, 767, 769, 770, 770)' - PASSED ssl_gtest.sh: #3265: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2524 (1, 767, 769, 770, 771)' - PASSED ssl_gtest.sh: #3266: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2525 (1, 767, 769, 770, 772)' - PASSED ssl_gtest.sh: #3267: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2526 (1, 767, 769, 770, 773)' - PASSED ssl_gtest.sh: #3268: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2527 (1, 767, 769, 771, 767)' - PASSED ssl_gtest.sh: #3269: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2528 (1, 767, 769, 771, 768)' - PASSED ssl_gtest.sh: #3270: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2529 (1, 767, 769, 771, 769)' - PASSED ssl_gtest.sh: #3271: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2530 (1, 767, 769, 771, 770)' - PASSED ssl_gtest.sh: #3272: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2531 (1, 767, 769, 771, 771)' - PASSED ssl_gtest.sh: #3273: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2532 (1, 767, 769, 771, 772)' - PASSED ssl_gtest.sh: #3274: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2533 (1, 767, 769, 771, 773)' - PASSED ssl_gtest.sh: #3275: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2534 (1, 767, 769, 772, 767)' - PASSED ssl_gtest.sh: #3276: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2535 (1, 767, 769, 772, 768)' - PASSED ssl_gtest.sh: #3277: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2536 (1, 767, 769, 772, 769)' - PASSED ssl_gtest.sh: #3278: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2537 (1, 767, 769, 772, 770)' - PASSED ssl_gtest.sh: #3279: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2538 (1, 767, 769, 772, 771)' - PASSED ssl_gtest.sh: #3280: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2539 (1, 767, 769, 772, 772)' - PASSED ssl_gtest.sh: #3281: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2540 (1, 767, 769, 772, 773)' - PASSED ssl_gtest.sh: #3282: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2541 (1, 767, 769, 773, 767)' - PASSED ssl_gtest.sh: #3283: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2542 (1, 767, 769, 773, 768)' - PASSED ssl_gtest.sh: #3284: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2543 (1, 767, 769, 773, 769)' - PASSED ssl_gtest.sh: #3285: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2544 (1, 767, 769, 773, 770)' - PASSED ssl_gtest.sh: #3286: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2545 (1, 767, 769, 773, 771)' - PASSED ssl_gtest.sh: #3287: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2546 (1, 767, 769, 773, 772)' - PASSED ssl_gtest.sh: #3288: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2547 (1, 767, 769, 773, 773)' - PASSED ssl_gtest.sh: #3289: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2548 (1, 767, 770, 767, 767)' - PASSED ssl_gtest.sh: #3290: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2549 (1, 767, 770, 767, 768)' - PASSED ssl_gtest.sh: #3291: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2550 (1, 767, 770, 767, 769)' - PASSED ssl_gtest.sh: #3292: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2551 (1, 767, 770, 767, 770)' - PASSED ssl_gtest.sh: #3293: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2552 (1, 767, 770, 767, 771)' - PASSED ssl_gtest.sh: #3294: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2553 (1, 767, 770, 767, 772)' - PASSED ssl_gtest.sh: #3295: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2554 (1, 767, 770, 767, 773)' - PASSED ssl_gtest.sh: #3296: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2555 (1, 767, 770, 768, 767)' - PASSED ssl_gtest.sh: #3297: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2556 (1, 767, 770, 768, 768)' - PASSED ssl_gtest.sh: #3298: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2557 (1, 767, 770, 768, 769)' - PASSED ssl_gtest.sh: #3299: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2558 (1, 767, 770, 768, 770)' - PASSED ssl_gtest.sh: #3300: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2559 (1, 767, 770, 768, 771)' - PASSED ssl_gtest.sh: #3301: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2560 (1, 767, 770, 768, 772)' - PASSED ssl_gtest.sh: #3302: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2561 (1, 767, 770, 768, 773)' - PASSED ssl_gtest.sh: #3303: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2562 (1, 767, 770, 769, 767)' - PASSED ssl_gtest.sh: #3304: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2563 (1, 767, 770, 769, 768)' - PASSED ssl_gtest.sh: #3305: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2564 (1, 767, 770, 769, 769)' - PASSED ssl_gtest.sh: #3306: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2565 (1, 767, 770, 769, 770)' - PASSED ssl_gtest.sh: #3307: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2566 (1, 767, 770, 769, 771)' - PASSED ssl_gtest.sh: #3308: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2567 (1, 767, 770, 769, 772)' - PASSED ssl_gtest.sh: #3309: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2568 (1, 767, 770, 769, 773)' - PASSED ssl_gtest.sh: #3310: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2569 (1, 767, 770, 770, 767)' - PASSED ssl_gtest.sh: #3311: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2570 (1, 767, 770, 770, 768)' - PASSED ssl_gtest.sh: #3312: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2571 (1, 767, 770, 770, 769)' - PASSED ssl_gtest.sh: #3313: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2572 (1, 767, 770, 770, 770)' - PASSED ssl_gtest.sh: #3314: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2573 (1, 767, 770, 770, 771)' - PASSED ssl_gtest.sh: #3315: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2574 (1, 767, 770, 770, 772)' - PASSED ssl_gtest.sh: #3316: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2575 (1, 767, 770, 770, 773)' - PASSED ssl_gtest.sh: #3317: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2576 (1, 767, 770, 771, 767)' - PASSED ssl_gtest.sh: #3318: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2577 (1, 767, 770, 771, 768)' - PASSED ssl_gtest.sh: #3319: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2578 (1, 767, 770, 771, 769)' - PASSED ssl_gtest.sh: #3320: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2579 (1, 767, 770, 771, 770)' - PASSED ssl_gtest.sh: #3321: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2580 (1, 767, 770, 771, 771)' - PASSED ssl_gtest.sh: #3322: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2581 (1, 767, 770, 771, 772)' - PASSED ssl_gtest.sh: #3323: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2582 (1, 767, 770, 771, 773)' - PASSED ssl_gtest.sh: #3324: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2583 (1, 767, 770, 772, 767)' - PASSED ssl_gtest.sh: #3325: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2584 (1, 767, 770, 772, 768)' - PASSED ssl_gtest.sh: #3326: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2585 (1, 767, 770, 772, 769)' - PASSED ssl_gtest.sh: #3327: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2586 (1, 767, 770, 772, 770)' - PASSED ssl_gtest.sh: #3328: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2587 (1, 767, 770, 772, 771)' - PASSED ssl_gtest.sh: #3329: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2588 (1, 767, 770, 772, 772)' - PASSED ssl_gtest.sh: #3330: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2589 (1, 767, 770, 772, 773)' - PASSED ssl_gtest.sh: #3331: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2590 (1, 767, 770, 773, 767)' - PASSED ssl_gtest.sh: #3332: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2591 (1, 767, 770, 773, 768)' - PASSED ssl_gtest.sh: #3333: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2592 (1, 767, 770, 773, 769)' - PASSED ssl_gtest.sh: #3334: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2593 (1, 767, 770, 773, 770)' - PASSED ssl_gtest.sh: #3335: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2594 (1, 767, 770, 773, 771)' - PASSED ssl_gtest.sh: #3336: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2595 (1, 767, 770, 773, 772)' - PASSED ssl_gtest.sh: #3337: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2596 (1, 767, 770, 773, 773)' - PASSED ssl_gtest.sh: #3338: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2597 (1, 767, 771, 767, 767)' - PASSED ssl_gtest.sh: #3339: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2598 (1, 767, 771, 767, 768)' - PASSED ssl_gtest.sh: #3340: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2599 (1, 767, 771, 767, 769)' - PASSED ssl_gtest.sh: #3341: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2600 (1, 767, 771, 767, 770)' - PASSED ssl_gtest.sh: #3342: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2601 (1, 767, 771, 767, 771)' - PASSED ssl_gtest.sh: #3343: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2602 (1, 767, 771, 767, 772)' - PASSED ssl_gtest.sh: #3344: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2603 (1, 767, 771, 767, 773)' - PASSED ssl_gtest.sh: #3345: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2604 (1, 767, 771, 768, 767)' - PASSED ssl_gtest.sh: #3346: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2605 (1, 767, 771, 768, 768)' - PASSED ssl_gtest.sh: #3347: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2606 (1, 767, 771, 768, 769)' - PASSED ssl_gtest.sh: #3348: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2607 (1, 767, 771, 768, 770)' - PASSED ssl_gtest.sh: #3349: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2608 (1, 767, 771, 768, 771)' - PASSED ssl_gtest.sh: #3350: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2609 (1, 767, 771, 768, 772)' - PASSED ssl_gtest.sh: #3351: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2610 (1, 767, 771, 768, 773)' - PASSED ssl_gtest.sh: #3352: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2611 (1, 767, 771, 769, 767)' - PASSED ssl_gtest.sh: #3353: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2612 (1, 767, 771, 769, 768)' - PASSED ssl_gtest.sh: #3354: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2613 (1, 767, 771, 769, 769)' - PASSED ssl_gtest.sh: #3355: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2614 (1, 767, 771, 769, 770)' - PASSED ssl_gtest.sh: #3356: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2615 (1, 767, 771, 769, 771)' - PASSED ssl_gtest.sh: #3357: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2616 (1, 767, 771, 769, 772)' - PASSED ssl_gtest.sh: #3358: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2617 (1, 767, 771, 769, 773)' - PASSED ssl_gtest.sh: #3359: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2618 (1, 767, 771, 770, 767)' - PASSED ssl_gtest.sh: #3360: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2619 (1, 767, 771, 770, 768)' - PASSED ssl_gtest.sh: #3361: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2620 (1, 767, 771, 770, 769)' - PASSED ssl_gtest.sh: #3362: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2621 (1, 767, 771, 770, 770)' - PASSED ssl_gtest.sh: #3363: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2622 (1, 767, 771, 770, 771)' - PASSED ssl_gtest.sh: #3364: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2623 (1, 767, 771, 770, 772)' - PASSED ssl_gtest.sh: #3365: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2624 (1, 767, 771, 770, 773)' - PASSED ssl_gtest.sh: #3366: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2625 (1, 767, 771, 771, 767)' - PASSED ssl_gtest.sh: #3367: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2626 (1, 767, 771, 771, 768)' - PASSED ssl_gtest.sh: #3368: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2627 (1, 767, 771, 771, 769)' - PASSED ssl_gtest.sh: #3369: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2628 (1, 767, 771, 771, 770)' - PASSED ssl_gtest.sh: #3370: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2629 (1, 767, 771, 771, 771)' - PASSED ssl_gtest.sh: #3371: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2630 (1, 767, 771, 771, 772)' - PASSED ssl_gtest.sh: #3372: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2631 (1, 767, 771, 771, 773)' - PASSED ssl_gtest.sh: #3373: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2632 (1, 767, 771, 772, 767)' - PASSED ssl_gtest.sh: #3374: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2633 (1, 767, 771, 772, 768)' - PASSED ssl_gtest.sh: #3375: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2634 (1, 767, 771, 772, 769)' - PASSED ssl_gtest.sh: #3376: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2635 (1, 767, 771, 772, 770)' - PASSED ssl_gtest.sh: #3377: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2636 (1, 767, 771, 772, 771)' - PASSED ssl_gtest.sh: #3378: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2637 (1, 767, 771, 772, 772)' - PASSED ssl_gtest.sh: #3379: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2638 (1, 767, 771, 772, 773)' - PASSED ssl_gtest.sh: #3380: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2639 (1, 767, 771, 773, 767)' - PASSED ssl_gtest.sh: #3381: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2640 (1, 767, 771, 773, 768)' - PASSED ssl_gtest.sh: #3382: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2641 (1, 767, 771, 773, 769)' - PASSED ssl_gtest.sh: #3383: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2642 (1, 767, 771, 773, 770)' - PASSED ssl_gtest.sh: #3384: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2643 (1, 767, 771, 773, 771)' - PASSED ssl_gtest.sh: #3385: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2644 (1, 767, 771, 773, 772)' - PASSED ssl_gtest.sh: #3386: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2645 (1, 767, 771, 773, 773)' - PASSED ssl_gtest.sh: #3387: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2646 (1, 767, 772, 767, 767)' - PASSED ssl_gtest.sh: #3388: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2647 (1, 767, 772, 767, 768)' - PASSED ssl_gtest.sh: #3389: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2648 (1, 767, 772, 767, 769)' - PASSED ssl_gtest.sh: #3390: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2649 (1, 767, 772, 767, 770)' - PASSED ssl_gtest.sh: #3391: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2650 (1, 767, 772, 767, 771)' - PASSED ssl_gtest.sh: #3392: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2651 (1, 767, 772, 767, 772)' - PASSED ssl_gtest.sh: #3393: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2652 (1, 767, 772, 767, 773)' - PASSED ssl_gtest.sh: #3394: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2653 (1, 767, 772, 768, 767)' - PASSED ssl_gtest.sh: #3395: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2654 (1, 767, 772, 768, 768)' - PASSED ssl_gtest.sh: #3396: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2655 (1, 767, 772, 768, 769)' - PASSED ssl_gtest.sh: #3397: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2656 (1, 767, 772, 768, 770)' - PASSED ssl_gtest.sh: #3398: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2657 (1, 767, 772, 768, 771)' - PASSED ssl_gtest.sh: #3399: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2658 (1, 767, 772, 768, 772)' - PASSED ssl_gtest.sh: #3400: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2659 (1, 767, 772, 768, 773)' - PASSED ssl_gtest.sh: #3401: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2660 (1, 767, 772, 769, 767)' - PASSED ssl_gtest.sh: #3402: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2661 (1, 767, 772, 769, 768)' - PASSED ssl_gtest.sh: #3403: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2662 (1, 767, 772, 769, 769)' - PASSED ssl_gtest.sh: #3404: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2663 (1, 767, 772, 769, 770)' - PASSED ssl_gtest.sh: #3405: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2664 (1, 767, 772, 769, 771)' - PASSED ssl_gtest.sh: #3406: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2665 (1, 767, 772, 769, 772)' - PASSED ssl_gtest.sh: #3407: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2666 (1, 767, 772, 769, 773)' - PASSED ssl_gtest.sh: #3408: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2667 (1, 767, 772, 770, 767)' - PASSED ssl_gtest.sh: #3409: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2668 (1, 767, 772, 770, 768)' - PASSED ssl_gtest.sh: #3410: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2669 (1, 767, 772, 770, 769)' - PASSED ssl_gtest.sh: #3411: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2670 (1, 767, 772, 770, 770)' - PASSED ssl_gtest.sh: #3412: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2671 (1, 767, 772, 770, 771)' - PASSED ssl_gtest.sh: #3413: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2672 (1, 767, 772, 770, 772)' - PASSED ssl_gtest.sh: #3414: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2673 (1, 767, 772, 770, 773)' - PASSED ssl_gtest.sh: #3415: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2674 (1, 767, 772, 771, 767)' - PASSED ssl_gtest.sh: #3416: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2675 (1, 767, 772, 771, 768)' - PASSED ssl_gtest.sh: #3417: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2676 (1, 767, 772, 771, 769)' - PASSED ssl_gtest.sh: #3418: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2677 (1, 767, 772, 771, 770)' - PASSED ssl_gtest.sh: #3419: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2678 (1, 767, 772, 771, 771)' - PASSED ssl_gtest.sh: #3420: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2679 (1, 767, 772, 771, 772)' - PASSED ssl_gtest.sh: #3421: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2680 (1, 767, 772, 771, 773)' - PASSED ssl_gtest.sh: #3422: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2681 (1, 767, 772, 772, 767)' - PASSED ssl_gtest.sh: #3423: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2682 (1, 767, 772, 772, 768)' - PASSED ssl_gtest.sh: #3424: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2683 (1, 767, 772, 772, 769)' - PASSED ssl_gtest.sh: #3425: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2684 (1, 767, 772, 772, 770)' - PASSED ssl_gtest.sh: #3426: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2685 (1, 767, 772, 772, 771)' - PASSED ssl_gtest.sh: #3427: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2686 (1, 767, 772, 772, 772)' - PASSED ssl_gtest.sh: #3428: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2687 (1, 767, 772, 772, 773)' - PASSED ssl_gtest.sh: #3429: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2688 (1, 767, 772, 773, 767)' - PASSED ssl_gtest.sh: #3430: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2689 (1, 767, 772, 773, 768)' - PASSED ssl_gtest.sh: #3431: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2690 (1, 767, 772, 773, 769)' - PASSED ssl_gtest.sh: #3432: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2691 (1, 767, 772, 773, 770)' - PASSED ssl_gtest.sh: #3433: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2692 (1, 767, 772, 773, 771)' - PASSED ssl_gtest.sh: #3434: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2693 (1, 767, 772, 773, 772)' - PASSED ssl_gtest.sh: #3435: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2694 (1, 767, 772, 773, 773)' - PASSED ssl_gtest.sh: #3436: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2695 (1, 767, 773, 767, 767)' - PASSED ssl_gtest.sh: #3437: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2696 (1, 767, 773, 767, 768)' - PASSED ssl_gtest.sh: #3438: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2697 (1, 767, 773, 767, 769)' - PASSED ssl_gtest.sh: #3439: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2698 (1, 767, 773, 767, 770)' - PASSED ssl_gtest.sh: #3440: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2699 (1, 767, 773, 767, 771)' - PASSED ssl_gtest.sh: #3441: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2700 (1, 767, 773, 767, 772)' - PASSED ssl_gtest.sh: #3442: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2701 (1, 767, 773, 767, 773)' - PASSED ssl_gtest.sh: #3443: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2702 (1, 767, 773, 768, 767)' - PASSED ssl_gtest.sh: #3444: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2703 (1, 767, 773, 768, 768)' - PASSED ssl_gtest.sh: #3445: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2704 (1, 767, 773, 768, 769)' - PASSED ssl_gtest.sh: #3446: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2705 (1, 767, 773, 768, 770)' - PASSED ssl_gtest.sh: #3447: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2706 (1, 767, 773, 768, 771)' - PASSED ssl_gtest.sh: #3448: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2707 (1, 767, 773, 768, 772)' - PASSED ssl_gtest.sh: #3449: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2708 (1, 767, 773, 768, 773)' - PASSED ssl_gtest.sh: #3450: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2709 (1, 767, 773, 769, 767)' - PASSED ssl_gtest.sh: #3451: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2710 (1, 767, 773, 769, 768)' - PASSED ssl_gtest.sh: #3452: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2711 (1, 767, 773, 769, 769)' - PASSED ssl_gtest.sh: #3453: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2712 (1, 767, 773, 769, 770)' - PASSED ssl_gtest.sh: #3454: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2713 (1, 767, 773, 769, 771)' - PASSED ssl_gtest.sh: #3455: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2714 (1, 767, 773, 769, 772)' - PASSED ssl_gtest.sh: #3456: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2715 (1, 767, 773, 769, 773)' - PASSED ssl_gtest.sh: #3457: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2716 (1, 767, 773, 770, 767)' - PASSED ssl_gtest.sh: #3458: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2717 (1, 767, 773, 770, 768)' - PASSED ssl_gtest.sh: #3459: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2718 (1, 767, 773, 770, 769)' - PASSED ssl_gtest.sh: #3460: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2719 (1, 767, 773, 770, 770)' - PASSED ssl_gtest.sh: #3461: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2720 (1, 767, 773, 770, 771)' - PASSED ssl_gtest.sh: #3462: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2721 (1, 767, 773, 770, 772)' - PASSED ssl_gtest.sh: #3463: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2722 (1, 767, 773, 770, 773)' - PASSED ssl_gtest.sh: #3464: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2723 (1, 767, 773, 771, 767)' - PASSED ssl_gtest.sh: #3465: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2724 (1, 767, 773, 771, 768)' - PASSED ssl_gtest.sh: #3466: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2725 (1, 767, 773, 771, 769)' - PASSED ssl_gtest.sh: #3467: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2726 (1, 767, 773, 771, 770)' - PASSED ssl_gtest.sh: #3468: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2727 (1, 767, 773, 771, 771)' - PASSED ssl_gtest.sh: #3469: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2728 (1, 767, 773, 771, 772)' - PASSED ssl_gtest.sh: #3470: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2729 (1, 767, 773, 771, 773)' - PASSED ssl_gtest.sh: #3471: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2730 (1, 767, 773, 772, 767)' - PASSED ssl_gtest.sh: #3472: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2731 (1, 767, 773, 772, 768)' - PASSED ssl_gtest.sh: #3473: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2732 (1, 767, 773, 772, 769)' - PASSED ssl_gtest.sh: #3474: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2733 (1, 767, 773, 772, 770)' - PASSED ssl_gtest.sh: #3475: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2734 (1, 767, 773, 772, 771)' - PASSED ssl_gtest.sh: #3476: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2735 (1, 767, 773, 772, 772)' - PASSED ssl_gtest.sh: #3477: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2736 (1, 767, 773, 772, 773)' - PASSED ssl_gtest.sh: #3478: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2737 (1, 767, 773, 773, 767)' - PASSED ssl_gtest.sh: #3479: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2738 (1, 767, 773, 773, 768)' - PASSED ssl_gtest.sh: #3480: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2739 (1, 767, 773, 773, 769)' - PASSED ssl_gtest.sh: #3481: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2740 (1, 767, 773, 773, 770)' - PASSED ssl_gtest.sh: #3482: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2741 (1, 767, 773, 773, 771)' - PASSED ssl_gtest.sh: #3483: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2742 (1, 767, 773, 773, 772)' - PASSED ssl_gtest.sh: #3484: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2743 (1, 767, 773, 773, 773)' - PASSED ssl_gtest.sh: #3485: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2744 (1, 768, 767, 767, 767)' - PASSED ssl_gtest.sh: #3486: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2745 (1, 768, 767, 767, 768)' - PASSED ssl_gtest.sh: #3487: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2746 (1, 768, 767, 767, 769)' - PASSED ssl_gtest.sh: #3488: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2747 (1, 768, 767, 767, 770)' - PASSED ssl_gtest.sh: #3489: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2748 (1, 768, 767, 767, 771)' - PASSED ssl_gtest.sh: #3490: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2749 (1, 768, 767, 767, 772)' - PASSED ssl_gtest.sh: #3491: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2750 (1, 768, 767, 767, 773)' - PASSED ssl_gtest.sh: #3492: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2751 (1, 768, 767, 768, 767)' - PASSED ssl_gtest.sh: #3493: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2752 (1, 768, 767, 768, 768)' - PASSED ssl_gtest.sh: #3494: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2753 (1, 768, 767, 768, 769)' - PASSED ssl_gtest.sh: #3495: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2754 (1, 768, 767, 768, 770)' - PASSED ssl_gtest.sh: #3496: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2755 (1, 768, 767, 768, 771)' - PASSED ssl_gtest.sh: #3497: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2756 (1, 768, 767, 768, 772)' - PASSED ssl_gtest.sh: #3498: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2757 (1, 768, 767, 768, 773)' - PASSED ssl_gtest.sh: #3499: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2758 (1, 768, 767, 769, 767)' - PASSED ssl_gtest.sh: #3500: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2759 (1, 768, 767, 769, 768)' - PASSED ssl_gtest.sh: #3501: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2760 (1, 768, 767, 769, 769)' - PASSED ssl_gtest.sh: #3502: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2761 (1, 768, 767, 769, 770)' - PASSED ssl_gtest.sh: #3503: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2762 (1, 768, 767, 769, 771)' - PASSED ssl_gtest.sh: #3504: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2763 (1, 768, 767, 769, 772)' - PASSED ssl_gtest.sh: #3505: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2764 (1, 768, 767, 769, 773)' - PASSED ssl_gtest.sh: #3506: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2765 (1, 768, 767, 770, 767)' - PASSED ssl_gtest.sh: #3507: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2766 (1, 768, 767, 770, 768)' - PASSED ssl_gtest.sh: #3508: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2767 (1, 768, 767, 770, 769)' - PASSED ssl_gtest.sh: #3509: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2768 (1, 768, 767, 770, 770)' - PASSED ssl_gtest.sh: #3510: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2769 (1, 768, 767, 770, 771)' - PASSED ssl_gtest.sh: #3511: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2770 (1, 768, 767, 770, 772)' - PASSED ssl_gtest.sh: #3512: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2771 (1, 768, 767, 770, 773)' - PASSED ssl_gtest.sh: #3513: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2772 (1, 768, 767, 771, 767)' - PASSED ssl_gtest.sh: #3514: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2773 (1, 768, 767, 771, 768)' - PASSED ssl_gtest.sh: #3515: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2774 (1, 768, 767, 771, 769)' - PASSED ssl_gtest.sh: #3516: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2775 (1, 768, 767, 771, 770)' - PASSED ssl_gtest.sh: #3517: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2776 (1, 768, 767, 771, 771)' - PASSED ssl_gtest.sh: #3518: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2777 (1, 768, 767, 771, 772)' - PASSED ssl_gtest.sh: #3519: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2778 (1, 768, 767, 771, 773)' - PASSED ssl_gtest.sh: #3520: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2779 (1, 768, 767, 772, 767)' - PASSED ssl_gtest.sh: #3521: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2780 (1, 768, 767, 772, 768)' - PASSED ssl_gtest.sh: #3522: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2781 (1, 768, 767, 772, 769)' - PASSED ssl_gtest.sh: #3523: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2782 (1, 768, 767, 772, 770)' - PASSED ssl_gtest.sh: #3524: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2783 (1, 768, 767, 772, 771)' - PASSED ssl_gtest.sh: #3525: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2784 (1, 768, 767, 772, 772)' - PASSED ssl_gtest.sh: #3526: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2785 (1, 768, 767, 772, 773)' - PASSED ssl_gtest.sh: #3527: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2786 (1, 768, 767, 773, 767)' - PASSED ssl_gtest.sh: #3528: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2787 (1, 768, 767, 773, 768)' - PASSED ssl_gtest.sh: #3529: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2788 (1, 768, 767, 773, 769)' - PASSED ssl_gtest.sh: #3530: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2789 (1, 768, 767, 773, 770)' - PASSED ssl_gtest.sh: #3531: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2790 (1, 768, 767, 773, 771)' - PASSED ssl_gtest.sh: #3532: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2791 (1, 768, 767, 773, 772)' - PASSED ssl_gtest.sh: #3533: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2792 (1, 768, 767, 773, 773)' - PASSED ssl_gtest.sh: #3534: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2793 (1, 768, 768, 767, 767)' - PASSED ssl_gtest.sh: #3535: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2794 (1, 768, 768, 767, 768)' - PASSED ssl_gtest.sh: #3536: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2795 (1, 768, 768, 767, 769)' - PASSED ssl_gtest.sh: #3537: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2796 (1, 768, 768, 767, 770)' - PASSED ssl_gtest.sh: #3538: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2797 (1, 768, 768, 767, 771)' - PASSED ssl_gtest.sh: #3539: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2798 (1, 768, 768, 767, 772)' - PASSED ssl_gtest.sh: #3540: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2799 (1, 768, 768, 767, 773)' - PASSED ssl_gtest.sh: #3541: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2800 (1, 768, 768, 768, 767)' - PASSED ssl_gtest.sh: #3542: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2801 (1, 768, 768, 768, 768)' - PASSED ssl_gtest.sh: #3543: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2802 (1, 768, 768, 768, 769)' - PASSED ssl_gtest.sh: #3544: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2803 (1, 768, 768, 768, 770)' - PASSED ssl_gtest.sh: #3545: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2804 (1, 768, 768, 768, 771)' - PASSED ssl_gtest.sh: #3546: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2805 (1, 768, 768, 768, 772)' - PASSED ssl_gtest.sh: #3547: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2806 (1, 768, 768, 768, 773)' - PASSED ssl_gtest.sh: #3548: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2807 (1, 768, 768, 769, 767)' - PASSED ssl_gtest.sh: #3549: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2808 (1, 768, 768, 769, 768)' - PASSED ssl_gtest.sh: #3550: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2809 (1, 768, 768, 769, 769)' - PASSED ssl_gtest.sh: #3551: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2810 (1, 768, 768, 769, 770)' - PASSED ssl_gtest.sh: #3552: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2811 (1, 768, 768, 769, 771)' - PASSED ssl_gtest.sh: #3553: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2812 (1, 768, 768, 769, 772)' - PASSED ssl_gtest.sh: #3554: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2813 (1, 768, 768, 769, 773)' - PASSED ssl_gtest.sh: #3555: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2814 (1, 768, 768, 770, 767)' - PASSED ssl_gtest.sh: #3556: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2815 (1, 768, 768, 770, 768)' - PASSED ssl_gtest.sh: #3557: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2816 (1, 768, 768, 770, 769)' - PASSED ssl_gtest.sh: #3558: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2817 (1, 768, 768, 770, 770)' - PASSED ssl_gtest.sh: #3559: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2818 (1, 768, 768, 770, 771)' - PASSED ssl_gtest.sh: #3560: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2819 (1, 768, 768, 770, 772)' - PASSED ssl_gtest.sh: #3561: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2820 (1, 768, 768, 770, 773)' - PASSED ssl_gtest.sh: #3562: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2821 (1, 768, 768, 771, 767)' - PASSED ssl_gtest.sh: #3563: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2822 (1, 768, 768, 771, 768)' - PASSED ssl_gtest.sh: #3564: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2823 (1, 768, 768, 771, 769)' - PASSED ssl_gtest.sh: #3565: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2824 (1, 768, 768, 771, 770)' - PASSED ssl_gtest.sh: #3566: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2825 (1, 768, 768, 771, 771)' - PASSED ssl_gtest.sh: #3567: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2826 (1, 768, 768, 771, 772)' - PASSED ssl_gtest.sh: #3568: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2827 (1, 768, 768, 771, 773)' - PASSED ssl_gtest.sh: #3569: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2828 (1, 768, 768, 772, 767)' - PASSED ssl_gtest.sh: #3570: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2829 (1, 768, 768, 772, 768)' - PASSED ssl_gtest.sh: #3571: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2830 (1, 768, 768, 772, 769)' - PASSED ssl_gtest.sh: #3572: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2831 (1, 768, 768, 772, 770)' - PASSED ssl_gtest.sh: #3573: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2832 (1, 768, 768, 772, 771)' - PASSED ssl_gtest.sh: #3574: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2833 (1, 768, 768, 772, 772)' - PASSED ssl_gtest.sh: #3575: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2834 (1, 768, 768, 772, 773)' - PASSED ssl_gtest.sh: #3576: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2835 (1, 768, 768, 773, 767)' - PASSED ssl_gtest.sh: #3577: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2836 (1, 768, 768, 773, 768)' - PASSED ssl_gtest.sh: #3578: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2837 (1, 768, 768, 773, 769)' - PASSED ssl_gtest.sh: #3579: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2838 (1, 768, 768, 773, 770)' - PASSED ssl_gtest.sh: #3580: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2839 (1, 768, 768, 773, 771)' - PASSED ssl_gtest.sh: #3581: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2840 (1, 768, 768, 773, 772)' - PASSED ssl_gtest.sh: #3582: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2841 (1, 768, 768, 773, 773)' - PASSED ssl_gtest.sh: #3583: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2842 (1, 768, 769, 767, 767)' - PASSED ssl_gtest.sh: #3584: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2843 (1, 768, 769, 767, 768)' - PASSED ssl_gtest.sh: #3585: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2844 (1, 768, 769, 767, 769)' - PASSED ssl_gtest.sh: #3586: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2845 (1, 768, 769, 767, 770)' - PASSED ssl_gtest.sh: #3587: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2846 (1, 768, 769, 767, 771)' - PASSED ssl_gtest.sh: #3588: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2847 (1, 768, 769, 767, 772)' - PASSED ssl_gtest.sh: #3589: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2848 (1, 768, 769, 767, 773)' - PASSED ssl_gtest.sh: #3590: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2849 (1, 768, 769, 768, 767)' - PASSED ssl_gtest.sh: #3591: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2850 (1, 768, 769, 768, 768)' - PASSED ssl_gtest.sh: #3592: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2851 (1, 768, 769, 768, 769)' - PASSED ssl_gtest.sh: #3593: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2852 (1, 768, 769, 768, 770)' - PASSED ssl_gtest.sh: #3594: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2853 (1, 768, 769, 768, 771)' - PASSED ssl_gtest.sh: #3595: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2854 (1, 768, 769, 768, 772)' - PASSED ssl_gtest.sh: #3596: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2855 (1, 768, 769, 768, 773)' - PASSED ssl_gtest.sh: #3597: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2856 (1, 768, 769, 769, 767)' - PASSED ssl_gtest.sh: #3598: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2857 (1, 768, 769, 769, 768)' - PASSED ssl_gtest.sh: #3599: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2858 (1, 768, 769, 769, 769)' - PASSED ssl_gtest.sh: #3600: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2859 (1, 768, 769, 769, 770)' - PASSED ssl_gtest.sh: #3601: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2860 (1, 768, 769, 769, 771)' - PASSED ssl_gtest.sh: #3602: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2861 (1, 768, 769, 769, 772)' - PASSED ssl_gtest.sh: #3603: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2862 (1, 768, 769, 769, 773)' - PASSED ssl_gtest.sh: #3604: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2863 (1, 768, 769, 770, 767)' - PASSED ssl_gtest.sh: #3605: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2864 (1, 768, 769, 770, 768)' - PASSED ssl_gtest.sh: #3606: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2865 (1, 768, 769, 770, 769)' - PASSED ssl_gtest.sh: #3607: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2866 (1, 768, 769, 770, 770)' - PASSED ssl_gtest.sh: #3608: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2867 (1, 768, 769, 770, 771)' - PASSED ssl_gtest.sh: #3609: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2868 (1, 768, 769, 770, 772)' - PASSED ssl_gtest.sh: #3610: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2869 (1, 768, 769, 770, 773)' - PASSED ssl_gtest.sh: #3611: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2870 (1, 768, 769, 771, 767)' - PASSED ssl_gtest.sh: #3612: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2871 (1, 768, 769, 771, 768)' - PASSED ssl_gtest.sh: #3613: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2872 (1, 768, 769, 771, 769)' - PASSED ssl_gtest.sh: #3614: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2873 (1, 768, 769, 771, 770)' - PASSED ssl_gtest.sh: #3615: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2874 (1, 768, 769, 771, 771)' - PASSED ssl_gtest.sh: #3616: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2875 (1, 768, 769, 771, 772)' - PASSED ssl_gtest.sh: #3617: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2876 (1, 768, 769, 771, 773)' - PASSED ssl_gtest.sh: #3618: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2877 (1, 768, 769, 772, 767)' - PASSED ssl_gtest.sh: #3619: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2878 (1, 768, 769, 772, 768)' - PASSED ssl_gtest.sh: #3620: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2879 (1, 768, 769, 772, 769)' - PASSED ssl_gtest.sh: #3621: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2880 (1, 768, 769, 772, 770)' - PASSED ssl_gtest.sh: #3622: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2881 (1, 768, 769, 772, 771)' - PASSED ssl_gtest.sh: #3623: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2882 (1, 768, 769, 772, 772)' - PASSED ssl_gtest.sh: #3624: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2883 (1, 768, 769, 772, 773)' - PASSED ssl_gtest.sh: #3625: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2884 (1, 768, 769, 773, 767)' - PASSED ssl_gtest.sh: #3626: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2885 (1, 768, 769, 773, 768)' - PASSED ssl_gtest.sh: #3627: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2886 (1, 768, 769, 773, 769)' - PASSED ssl_gtest.sh: #3628: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2887 (1, 768, 769, 773, 770)' - PASSED ssl_gtest.sh: #3629: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2888 (1, 768, 769, 773, 771)' - PASSED ssl_gtest.sh: #3630: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2889 (1, 768, 769, 773, 772)' - PASSED ssl_gtest.sh: #3631: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2890 (1, 768, 769, 773, 773)' - PASSED ssl_gtest.sh: #3632: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2891 (1, 768, 770, 767, 767)' - PASSED ssl_gtest.sh: #3633: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2892 (1, 768, 770, 767, 768)' - PASSED ssl_gtest.sh: #3634: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2893 (1, 768, 770, 767, 769)' - PASSED ssl_gtest.sh: #3635: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2894 (1, 768, 770, 767, 770)' - PASSED ssl_gtest.sh: #3636: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2895 (1, 768, 770, 767, 771)' - PASSED ssl_gtest.sh: #3637: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2896 (1, 768, 770, 767, 772)' - PASSED ssl_gtest.sh: #3638: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2897 (1, 768, 770, 767, 773)' - PASSED ssl_gtest.sh: #3639: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2898 (1, 768, 770, 768, 767)' - PASSED ssl_gtest.sh: #3640: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2899 (1, 768, 770, 768, 768)' - PASSED ssl_gtest.sh: #3641: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2900 (1, 768, 770, 768, 769)' - PASSED ssl_gtest.sh: #3642: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2901 (1, 768, 770, 768, 770)' - PASSED ssl_gtest.sh: #3643: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2902 (1, 768, 770, 768, 771)' - PASSED ssl_gtest.sh: #3644: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2903 (1, 768, 770, 768, 772)' - PASSED ssl_gtest.sh: #3645: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2904 (1, 768, 770, 768, 773)' - PASSED ssl_gtest.sh: #3646: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2905 (1, 768, 770, 769, 767)' - PASSED ssl_gtest.sh: #3647: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2906 (1, 768, 770, 769, 768)' - PASSED ssl_gtest.sh: #3648: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2907 (1, 768, 770, 769, 769)' - PASSED ssl_gtest.sh: #3649: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2908 (1, 768, 770, 769, 770)' - PASSED ssl_gtest.sh: #3650: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2909 (1, 768, 770, 769, 771)' - PASSED ssl_gtest.sh: #3651: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2910 (1, 768, 770, 769, 772)' - PASSED ssl_gtest.sh: #3652: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2911 (1, 768, 770, 769, 773)' - PASSED ssl_gtest.sh: #3653: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2912 (1, 768, 770, 770, 767)' - PASSED ssl_gtest.sh: #3654: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2913 (1, 768, 770, 770, 768)' - PASSED ssl_gtest.sh: #3655: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2914 (1, 768, 770, 770, 769)' - PASSED ssl_gtest.sh: #3656: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2915 (1, 768, 770, 770, 770)' - PASSED ssl_gtest.sh: #3657: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2916 (1, 768, 770, 770, 771)' - PASSED ssl_gtest.sh: #3658: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2917 (1, 768, 770, 770, 772)' - PASSED ssl_gtest.sh: #3659: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2918 (1, 768, 770, 770, 773)' - PASSED ssl_gtest.sh: #3660: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2919 (1, 768, 770, 771, 767)' - PASSED ssl_gtest.sh: #3661: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2920 (1, 768, 770, 771, 768)' - PASSED ssl_gtest.sh: #3662: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2921 (1, 768, 770, 771, 769)' - PASSED ssl_gtest.sh: #3663: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2922 (1, 768, 770, 771, 770)' - PASSED ssl_gtest.sh: #3664: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2923 (1, 768, 770, 771, 771)' - PASSED ssl_gtest.sh: #3665: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2924 (1, 768, 770, 771, 772)' - PASSED ssl_gtest.sh: #3666: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2925 (1, 768, 770, 771, 773)' - PASSED ssl_gtest.sh: #3667: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2926 (1, 768, 770, 772, 767)' - PASSED ssl_gtest.sh: #3668: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2927 (1, 768, 770, 772, 768)' - PASSED ssl_gtest.sh: #3669: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2928 (1, 768, 770, 772, 769)' - PASSED ssl_gtest.sh: #3670: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2929 (1, 768, 770, 772, 770)' - PASSED ssl_gtest.sh: #3671: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2930 (1, 768, 770, 772, 771)' - PASSED ssl_gtest.sh: #3672: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2931 (1, 768, 770, 772, 772)' - PASSED ssl_gtest.sh: #3673: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2932 (1, 768, 770, 772, 773)' - PASSED ssl_gtest.sh: #3674: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2933 (1, 768, 770, 773, 767)' - PASSED ssl_gtest.sh: #3675: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2934 (1, 768, 770, 773, 768)' - PASSED ssl_gtest.sh: #3676: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2935 (1, 768, 770, 773, 769)' - PASSED ssl_gtest.sh: #3677: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2936 (1, 768, 770, 773, 770)' - PASSED ssl_gtest.sh: #3678: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2937 (1, 768, 770, 773, 771)' - PASSED ssl_gtest.sh: #3679: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2938 (1, 768, 770, 773, 772)' - PASSED ssl_gtest.sh: #3680: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2939 (1, 768, 770, 773, 773)' - PASSED ssl_gtest.sh: #3681: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2940 (1, 768, 771, 767, 767)' - PASSED ssl_gtest.sh: #3682: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2941 (1, 768, 771, 767, 768)' - PASSED ssl_gtest.sh: #3683: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2942 (1, 768, 771, 767, 769)' - PASSED ssl_gtest.sh: #3684: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2943 (1, 768, 771, 767, 770)' - PASSED ssl_gtest.sh: #3685: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2944 (1, 768, 771, 767, 771)' - PASSED ssl_gtest.sh: #3686: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2945 (1, 768, 771, 767, 772)' - PASSED ssl_gtest.sh: #3687: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2946 (1, 768, 771, 767, 773)' - PASSED ssl_gtest.sh: #3688: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2947 (1, 768, 771, 768, 767)' - PASSED ssl_gtest.sh: #3689: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2948 (1, 768, 771, 768, 768)' - PASSED ssl_gtest.sh: #3690: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2949 (1, 768, 771, 768, 769)' - PASSED ssl_gtest.sh: #3691: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2950 (1, 768, 771, 768, 770)' - PASSED ssl_gtest.sh: #3692: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2951 (1, 768, 771, 768, 771)' - PASSED ssl_gtest.sh: #3693: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2952 (1, 768, 771, 768, 772)' - PASSED ssl_gtest.sh: #3694: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2953 (1, 768, 771, 768, 773)' - PASSED ssl_gtest.sh: #3695: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2954 (1, 768, 771, 769, 767)' - PASSED ssl_gtest.sh: #3696: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2955 (1, 768, 771, 769, 768)' - PASSED ssl_gtest.sh: #3697: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2956 (1, 768, 771, 769, 769)' - PASSED ssl_gtest.sh: #3698: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2957 (1, 768, 771, 769, 770)' - PASSED ssl_gtest.sh: #3699: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2958 (1, 768, 771, 769, 771)' - PASSED ssl_gtest.sh: #3700: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2959 (1, 768, 771, 769, 772)' - PASSED ssl_gtest.sh: #3701: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2960 (1, 768, 771, 769, 773)' - PASSED ssl_gtest.sh: #3702: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2961 (1, 768, 771, 770, 767)' - PASSED ssl_gtest.sh: #3703: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2962 (1, 768, 771, 770, 768)' - PASSED ssl_gtest.sh: #3704: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2963 (1, 768, 771, 770, 769)' - PASSED ssl_gtest.sh: #3705: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2964 (1, 768, 771, 770, 770)' - PASSED ssl_gtest.sh: #3706: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2965 (1, 768, 771, 770, 771)' - PASSED ssl_gtest.sh: #3707: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2966 (1, 768, 771, 770, 772)' - PASSED ssl_gtest.sh: #3708: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2967 (1, 768, 771, 770, 773)' - PASSED ssl_gtest.sh: #3709: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2968 (1, 768, 771, 771, 767)' - PASSED ssl_gtest.sh: #3710: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2969 (1, 768, 771, 771, 768)' - PASSED ssl_gtest.sh: #3711: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2970 (1, 768, 771, 771, 769)' - PASSED ssl_gtest.sh: #3712: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2971 (1, 768, 771, 771, 770)' - PASSED ssl_gtest.sh: #3713: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2972 (1, 768, 771, 771, 771)' - PASSED ssl_gtest.sh: #3714: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2973 (1, 768, 771, 771, 772)' - PASSED ssl_gtest.sh: #3715: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2974 (1, 768, 771, 771, 773)' - PASSED ssl_gtest.sh: #3716: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2975 (1, 768, 771, 772, 767)' - PASSED ssl_gtest.sh: #3717: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2976 (1, 768, 771, 772, 768)' - PASSED ssl_gtest.sh: #3718: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2977 (1, 768, 771, 772, 769)' - PASSED ssl_gtest.sh: #3719: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2978 (1, 768, 771, 772, 770)' - PASSED ssl_gtest.sh: #3720: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2979 (1, 768, 771, 772, 771)' - PASSED ssl_gtest.sh: #3721: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2980 (1, 768, 771, 772, 772)' - PASSED ssl_gtest.sh: #3722: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2981 (1, 768, 771, 772, 773)' - PASSED ssl_gtest.sh: #3723: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2982 (1, 768, 771, 773, 767)' - PASSED ssl_gtest.sh: #3724: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2983 (1, 768, 771, 773, 768)' - PASSED ssl_gtest.sh: #3725: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2984 (1, 768, 771, 773, 769)' - PASSED ssl_gtest.sh: #3726: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2985 (1, 768, 771, 773, 770)' - PASSED ssl_gtest.sh: #3727: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2986 (1, 768, 771, 773, 771)' - PASSED ssl_gtest.sh: #3728: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2987 (1, 768, 771, 773, 772)' - PASSED ssl_gtest.sh: #3729: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2988 (1, 768, 771, 773, 773)' - PASSED ssl_gtest.sh: #3730: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2989 (1, 768, 772, 767, 767)' - PASSED ssl_gtest.sh: #3731: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2990 (1, 768, 772, 767, 768)' - PASSED ssl_gtest.sh: #3732: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2991 (1, 768, 772, 767, 769)' - PASSED ssl_gtest.sh: #3733: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2992 (1, 768, 772, 767, 770)' - PASSED ssl_gtest.sh: #3734: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2993 (1, 768, 772, 767, 771)' - PASSED ssl_gtest.sh: #3735: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2994 (1, 768, 772, 767, 772)' - PASSED ssl_gtest.sh: #3736: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2995 (1, 768, 772, 767, 773)' - PASSED ssl_gtest.sh: #3737: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2996 (1, 768, 772, 768, 767)' - PASSED ssl_gtest.sh: #3738: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2997 (1, 768, 772, 768, 768)' - PASSED ssl_gtest.sh: #3739: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2998 (1, 768, 772, 768, 769)' - PASSED ssl_gtest.sh: #3740: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/2999 (1, 768, 772, 768, 770)' - PASSED ssl_gtest.sh: #3741: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3000 (1, 768, 772, 768, 771)' - PASSED ssl_gtest.sh: #3742: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3001 (1, 768, 772, 768, 772)' - PASSED ssl_gtest.sh: #3743: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3002 (1, 768, 772, 768, 773)' - PASSED ssl_gtest.sh: #3744: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3003 (1, 768, 772, 769, 767)' - PASSED ssl_gtest.sh: #3745: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3004 (1, 768, 772, 769, 768)' - PASSED ssl_gtest.sh: #3746: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3005 (1, 768, 772, 769, 769)' - PASSED ssl_gtest.sh: #3747: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3006 (1, 768, 772, 769, 770)' - PASSED ssl_gtest.sh: #3748: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3007 (1, 768, 772, 769, 771)' - PASSED ssl_gtest.sh: #3749: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3008 (1, 768, 772, 769, 772)' - PASSED ssl_gtest.sh: #3750: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3009 (1, 768, 772, 769, 773)' - PASSED ssl_gtest.sh: #3751: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3010 (1, 768, 772, 770, 767)' - PASSED ssl_gtest.sh: #3752: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3011 (1, 768, 772, 770, 768)' - PASSED ssl_gtest.sh: #3753: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3012 (1, 768, 772, 770, 769)' - PASSED ssl_gtest.sh: #3754: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3013 (1, 768, 772, 770, 770)' - PASSED ssl_gtest.sh: #3755: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3014 (1, 768, 772, 770, 771)' - PASSED ssl_gtest.sh: #3756: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3015 (1, 768, 772, 770, 772)' - PASSED ssl_gtest.sh: #3757: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3016 (1, 768, 772, 770, 773)' - PASSED ssl_gtest.sh: #3758: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3017 (1, 768, 772, 771, 767)' - PASSED ssl_gtest.sh: #3759: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3018 (1, 768, 772, 771, 768)' - PASSED ssl_gtest.sh: #3760: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3019 (1, 768, 772, 771, 769)' - PASSED ssl_gtest.sh: #3761: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3020 (1, 768, 772, 771, 770)' - PASSED ssl_gtest.sh: #3762: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3021 (1, 768, 772, 771, 771)' - PASSED ssl_gtest.sh: #3763: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3022 (1, 768, 772, 771, 772)' - PASSED ssl_gtest.sh: #3764: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3023 (1, 768, 772, 771, 773)' - PASSED ssl_gtest.sh: #3765: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3024 (1, 768, 772, 772, 767)' - PASSED ssl_gtest.sh: #3766: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3025 (1, 768, 772, 772, 768)' - PASSED ssl_gtest.sh: #3767: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3026 (1, 768, 772, 772, 769)' - PASSED ssl_gtest.sh: #3768: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3027 (1, 768, 772, 772, 770)' - PASSED ssl_gtest.sh: #3769: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3028 (1, 768, 772, 772, 771)' - PASSED ssl_gtest.sh: #3770: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3029 (1, 768, 772, 772, 772)' - PASSED ssl_gtest.sh: #3771: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3030 (1, 768, 772, 772, 773)' - PASSED ssl_gtest.sh: #3772: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3031 (1, 768, 772, 773, 767)' - PASSED ssl_gtest.sh: #3773: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3032 (1, 768, 772, 773, 768)' - PASSED ssl_gtest.sh: #3774: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3033 (1, 768, 772, 773, 769)' - PASSED ssl_gtest.sh: #3775: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3034 (1, 768, 772, 773, 770)' - PASSED ssl_gtest.sh: #3776: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3035 (1, 768, 772, 773, 771)' - PASSED ssl_gtest.sh: #3777: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3036 (1, 768, 772, 773, 772)' - PASSED ssl_gtest.sh: #3778: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3037 (1, 768, 772, 773, 773)' - PASSED ssl_gtest.sh: #3779: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3038 (1, 768, 773, 767, 767)' - PASSED ssl_gtest.sh: #3780: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3039 (1, 768, 773, 767, 768)' - PASSED ssl_gtest.sh: #3781: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3040 (1, 768, 773, 767, 769)' - PASSED ssl_gtest.sh: #3782: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3041 (1, 768, 773, 767, 770)' - PASSED ssl_gtest.sh: #3783: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3042 (1, 768, 773, 767, 771)' - PASSED ssl_gtest.sh: #3784: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3043 (1, 768, 773, 767, 772)' - PASSED ssl_gtest.sh: #3785: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3044 (1, 768, 773, 767, 773)' - PASSED ssl_gtest.sh: #3786: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3045 (1, 768, 773, 768, 767)' - PASSED ssl_gtest.sh: #3787: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3046 (1, 768, 773, 768, 768)' - PASSED ssl_gtest.sh: #3788: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3047 (1, 768, 773, 768, 769)' - PASSED ssl_gtest.sh: #3789: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3048 (1, 768, 773, 768, 770)' - PASSED ssl_gtest.sh: #3790: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3049 (1, 768, 773, 768, 771)' - PASSED ssl_gtest.sh: #3791: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3050 (1, 768, 773, 768, 772)' - PASSED ssl_gtest.sh: #3792: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3051 (1, 768, 773, 768, 773)' - PASSED ssl_gtest.sh: #3793: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3052 (1, 768, 773, 769, 767)' - PASSED ssl_gtest.sh: #3794: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3053 (1, 768, 773, 769, 768)' - PASSED ssl_gtest.sh: #3795: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3054 (1, 768, 773, 769, 769)' - PASSED ssl_gtest.sh: #3796: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3055 (1, 768, 773, 769, 770)' - PASSED ssl_gtest.sh: #3797: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3056 (1, 768, 773, 769, 771)' - PASSED ssl_gtest.sh: #3798: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3057 (1, 768, 773, 769, 772)' - PASSED ssl_gtest.sh: #3799: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3058 (1, 768, 773, 769, 773)' - PASSED ssl_gtest.sh: #3800: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3059 (1, 768, 773, 770, 767)' - PASSED ssl_gtest.sh: #3801: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3060 (1, 768, 773, 770, 768)' - PASSED ssl_gtest.sh: #3802: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3061 (1, 768, 773, 770, 769)' - PASSED ssl_gtest.sh: #3803: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3062 (1, 768, 773, 770, 770)' - PASSED ssl_gtest.sh: #3804: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3063 (1, 768, 773, 770, 771)' - PASSED ssl_gtest.sh: #3805: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3064 (1, 768, 773, 770, 772)' - PASSED ssl_gtest.sh: #3806: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3065 (1, 768, 773, 770, 773)' - PASSED ssl_gtest.sh: #3807: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3066 (1, 768, 773, 771, 767)' - PASSED ssl_gtest.sh: #3808: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3067 (1, 768, 773, 771, 768)' - PASSED ssl_gtest.sh: #3809: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3068 (1, 768, 773, 771, 769)' - PASSED ssl_gtest.sh: #3810: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3069 (1, 768, 773, 771, 770)' - PASSED ssl_gtest.sh: #3811: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3070 (1, 768, 773, 771, 771)' - PASSED ssl_gtest.sh: #3812: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3071 (1, 768, 773, 771, 772)' - PASSED ssl_gtest.sh: #3813: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3072 (1, 768, 773, 771, 773)' - PASSED ssl_gtest.sh: #3814: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3073 (1, 768, 773, 772, 767)' - PASSED ssl_gtest.sh: #3815: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3074 (1, 768, 773, 772, 768)' - PASSED ssl_gtest.sh: #3816: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3075 (1, 768, 773, 772, 769)' - PASSED ssl_gtest.sh: #3817: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3076 (1, 768, 773, 772, 770)' - PASSED ssl_gtest.sh: #3818: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3077 (1, 768, 773, 772, 771)' - PASSED ssl_gtest.sh: #3819: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3078 (1, 768, 773, 772, 772)' - PASSED ssl_gtest.sh: #3820: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3079 (1, 768, 773, 772, 773)' - PASSED ssl_gtest.sh: #3821: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3080 (1, 768, 773, 773, 767)' - PASSED ssl_gtest.sh: #3822: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3081 (1, 768, 773, 773, 768)' - PASSED ssl_gtest.sh: #3823: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3082 (1, 768, 773, 773, 769)' - PASSED ssl_gtest.sh: #3824: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3083 (1, 768, 773, 773, 770)' - PASSED ssl_gtest.sh: #3825: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3084 (1, 768, 773, 773, 771)' - PASSED ssl_gtest.sh: #3826: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3085 (1, 768, 773, 773, 772)' - PASSED ssl_gtest.sh: #3827: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3086 (1, 768, 773, 773, 773)' - PASSED ssl_gtest.sh: #3828: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3087 (1, 769, 767, 767, 767)' - PASSED ssl_gtest.sh: #3829: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3088 (1, 769, 767, 767, 768)' - PASSED ssl_gtest.sh: #3830: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3089 (1, 769, 767, 767, 769)' - PASSED ssl_gtest.sh: #3831: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3090 (1, 769, 767, 767, 770)' - PASSED ssl_gtest.sh: #3832: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3091 (1, 769, 767, 767, 771)' - PASSED ssl_gtest.sh: #3833: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3092 (1, 769, 767, 767, 772)' - PASSED ssl_gtest.sh: #3834: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3093 (1, 769, 767, 767, 773)' - PASSED ssl_gtest.sh: #3835: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3094 (1, 769, 767, 768, 767)' - PASSED ssl_gtest.sh: #3836: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3095 (1, 769, 767, 768, 768)' - PASSED ssl_gtest.sh: #3837: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3096 (1, 769, 767, 768, 769)' - PASSED ssl_gtest.sh: #3838: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3097 (1, 769, 767, 768, 770)' - PASSED ssl_gtest.sh: #3839: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3098 (1, 769, 767, 768, 771)' - PASSED ssl_gtest.sh: #3840: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3099 (1, 769, 767, 768, 772)' - PASSED ssl_gtest.sh: #3841: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3100 (1, 769, 767, 768, 773)' - PASSED ssl_gtest.sh: #3842: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3101 (1, 769, 767, 769, 767)' - PASSED ssl_gtest.sh: #3843: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3102 (1, 769, 767, 769, 768)' - PASSED ssl_gtest.sh: #3844: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3103 (1, 769, 767, 769, 769)' - PASSED ssl_gtest.sh: #3845: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3104 (1, 769, 767, 769, 770)' - PASSED ssl_gtest.sh: #3846: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3105 (1, 769, 767, 769, 771)' - PASSED ssl_gtest.sh: #3847: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3106 (1, 769, 767, 769, 772)' - PASSED ssl_gtest.sh: #3848: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3107 (1, 769, 767, 769, 773)' - PASSED ssl_gtest.sh: #3849: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3108 (1, 769, 767, 770, 767)' - PASSED ssl_gtest.sh: #3850: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3109 (1, 769, 767, 770, 768)' - PASSED ssl_gtest.sh: #3851: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3110 (1, 769, 767, 770, 769)' - PASSED ssl_gtest.sh: #3852: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3111 (1, 769, 767, 770, 770)' - PASSED ssl_gtest.sh: #3853: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3112 (1, 769, 767, 770, 771)' - PASSED ssl_gtest.sh: #3854: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3113 (1, 769, 767, 770, 772)' - PASSED ssl_gtest.sh: #3855: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3114 (1, 769, 767, 770, 773)' - PASSED ssl_gtest.sh: #3856: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3115 (1, 769, 767, 771, 767)' - PASSED ssl_gtest.sh: #3857: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3116 (1, 769, 767, 771, 768)' - PASSED ssl_gtest.sh: #3858: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3117 (1, 769, 767, 771, 769)' - PASSED ssl_gtest.sh: #3859: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3118 (1, 769, 767, 771, 770)' - PASSED ssl_gtest.sh: #3860: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3119 (1, 769, 767, 771, 771)' - PASSED ssl_gtest.sh: #3861: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3120 (1, 769, 767, 771, 772)' - PASSED ssl_gtest.sh: #3862: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3121 (1, 769, 767, 771, 773)' - PASSED ssl_gtest.sh: #3863: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3122 (1, 769, 767, 772, 767)' - PASSED ssl_gtest.sh: #3864: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3123 (1, 769, 767, 772, 768)' - PASSED ssl_gtest.sh: #3865: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3124 (1, 769, 767, 772, 769)' - PASSED ssl_gtest.sh: #3866: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3125 (1, 769, 767, 772, 770)' - PASSED ssl_gtest.sh: #3867: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3126 (1, 769, 767, 772, 771)' - PASSED ssl_gtest.sh: #3868: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3127 (1, 769, 767, 772, 772)' - PASSED ssl_gtest.sh: #3869: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3128 (1, 769, 767, 772, 773)' - PASSED ssl_gtest.sh: #3870: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3129 (1, 769, 767, 773, 767)' - PASSED ssl_gtest.sh: #3871: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3130 (1, 769, 767, 773, 768)' - PASSED ssl_gtest.sh: #3872: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3131 (1, 769, 767, 773, 769)' - PASSED ssl_gtest.sh: #3873: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3132 (1, 769, 767, 773, 770)' - PASSED ssl_gtest.sh: #3874: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3133 (1, 769, 767, 773, 771)' - PASSED ssl_gtest.sh: #3875: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3134 (1, 769, 767, 773, 772)' - PASSED ssl_gtest.sh: #3876: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3135 (1, 769, 767, 773, 773)' - PASSED ssl_gtest.sh: #3877: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3136 (1, 769, 768, 767, 767)' - PASSED ssl_gtest.sh: #3878: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3137 (1, 769, 768, 767, 768)' - PASSED ssl_gtest.sh: #3879: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3138 (1, 769, 768, 767, 769)' - PASSED ssl_gtest.sh: #3880: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3139 (1, 769, 768, 767, 770)' - PASSED ssl_gtest.sh: #3881: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3140 (1, 769, 768, 767, 771)' - PASSED ssl_gtest.sh: #3882: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3141 (1, 769, 768, 767, 772)' - PASSED ssl_gtest.sh: #3883: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3142 (1, 769, 768, 767, 773)' - PASSED ssl_gtest.sh: #3884: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3143 (1, 769, 768, 768, 767)' - PASSED ssl_gtest.sh: #3885: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3144 (1, 769, 768, 768, 768)' - PASSED ssl_gtest.sh: #3886: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3145 (1, 769, 768, 768, 769)' - PASSED ssl_gtest.sh: #3887: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3146 (1, 769, 768, 768, 770)' - PASSED ssl_gtest.sh: #3888: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3147 (1, 769, 768, 768, 771)' - PASSED ssl_gtest.sh: #3889: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3148 (1, 769, 768, 768, 772)' - PASSED ssl_gtest.sh: #3890: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3149 (1, 769, 768, 768, 773)' - PASSED ssl_gtest.sh: #3891: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3150 (1, 769, 768, 769, 767)' - PASSED ssl_gtest.sh: #3892: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3151 (1, 769, 768, 769, 768)' - PASSED ssl_gtest.sh: #3893: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3152 (1, 769, 768, 769, 769)' - PASSED ssl_gtest.sh: #3894: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3153 (1, 769, 768, 769, 770)' - PASSED ssl_gtest.sh: #3895: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3154 (1, 769, 768, 769, 771)' - PASSED ssl_gtest.sh: #3896: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3155 (1, 769, 768, 769, 772)' - PASSED ssl_gtest.sh: #3897: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3156 (1, 769, 768, 769, 773)' - PASSED ssl_gtest.sh: #3898: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3157 (1, 769, 768, 770, 767)' - PASSED ssl_gtest.sh: #3899: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3158 (1, 769, 768, 770, 768)' - PASSED ssl_gtest.sh: #3900: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3159 (1, 769, 768, 770, 769)' - PASSED ssl_gtest.sh: #3901: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3160 (1, 769, 768, 770, 770)' - PASSED ssl_gtest.sh: #3902: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3161 (1, 769, 768, 770, 771)' - PASSED ssl_gtest.sh: #3903: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3162 (1, 769, 768, 770, 772)' - PASSED ssl_gtest.sh: #3904: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3163 (1, 769, 768, 770, 773)' - PASSED ssl_gtest.sh: #3905: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3164 (1, 769, 768, 771, 767)' - PASSED ssl_gtest.sh: #3906: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3165 (1, 769, 768, 771, 768)' - PASSED ssl_gtest.sh: #3907: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3166 (1, 769, 768, 771, 769)' - PASSED ssl_gtest.sh: #3908: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3167 (1, 769, 768, 771, 770)' - PASSED ssl_gtest.sh: #3909: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3168 (1, 769, 768, 771, 771)' - PASSED ssl_gtest.sh: #3910: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3169 (1, 769, 768, 771, 772)' - PASSED ssl_gtest.sh: #3911: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3170 (1, 769, 768, 771, 773)' - PASSED ssl_gtest.sh: #3912: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3171 (1, 769, 768, 772, 767)' - PASSED ssl_gtest.sh: #3913: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3172 (1, 769, 768, 772, 768)' - PASSED ssl_gtest.sh: #3914: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3173 (1, 769, 768, 772, 769)' - PASSED ssl_gtest.sh: #3915: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3174 (1, 769, 768, 772, 770)' - PASSED ssl_gtest.sh: #3916: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3175 (1, 769, 768, 772, 771)' - PASSED ssl_gtest.sh: #3917: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3176 (1, 769, 768, 772, 772)' - PASSED ssl_gtest.sh: #3918: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3177 (1, 769, 768, 772, 773)' - PASSED ssl_gtest.sh: #3919: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3178 (1, 769, 768, 773, 767)' - PASSED ssl_gtest.sh: #3920: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3179 (1, 769, 768, 773, 768)' - PASSED ssl_gtest.sh: #3921: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3180 (1, 769, 768, 773, 769)' - PASSED ssl_gtest.sh: #3922: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3181 (1, 769, 768, 773, 770)' - PASSED ssl_gtest.sh: #3923: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3182 (1, 769, 768, 773, 771)' - PASSED ssl_gtest.sh: #3924: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3183 (1, 769, 768, 773, 772)' - PASSED ssl_gtest.sh: #3925: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3184 (1, 769, 768, 773, 773)' - PASSED ssl_gtest.sh: #3926: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3185 (1, 769, 769, 767, 767)' - PASSED ssl_gtest.sh: #3927: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3186 (1, 769, 769, 767, 768)' - PASSED ssl_gtest.sh: #3928: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3187 (1, 769, 769, 767, 769)' - PASSED ssl_gtest.sh: #3929: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3188 (1, 769, 769, 767, 770)' - PASSED ssl_gtest.sh: #3930: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3189 (1, 769, 769, 767, 771)' - PASSED ssl_gtest.sh: #3931: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3190 (1, 769, 769, 767, 772)' - PASSED ssl_gtest.sh: #3932: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3191 (1, 769, 769, 767, 773)' - PASSED ssl_gtest.sh: #3933: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3192 (1, 769, 769, 768, 767)' - PASSED ssl_gtest.sh: #3934: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3193 (1, 769, 769, 768, 768)' - PASSED ssl_gtest.sh: #3935: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3194 (1, 769, 769, 768, 769)' - PASSED ssl_gtest.sh: #3936: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3195 (1, 769, 769, 768, 770)' - PASSED ssl_gtest.sh: #3937: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3196 (1, 769, 769, 768, 771)' - PASSED ssl_gtest.sh: #3938: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3197 (1, 769, 769, 768, 772)' - PASSED ssl_gtest.sh: #3939: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3198 (1, 769, 769, 768, 773)' - PASSED ssl_gtest.sh: #3940: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3199 (1, 769, 769, 769, 767)' - PASSED ssl_gtest.sh: #3941: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3200 (1, 769, 769, 769, 768)' - PASSED ssl_gtest.sh: #3942: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3201 (1, 769, 769, 769, 769)' - PASSED ssl_gtest.sh: #3943: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3202 (1, 769, 769, 769, 770)' - PASSED ssl_gtest.sh: #3944: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3203 (1, 769, 769, 769, 771)' - PASSED ssl_gtest.sh: #3945: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3204 (1, 769, 769, 769, 772)' - PASSED ssl_gtest.sh: #3946: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3205 (1, 769, 769, 769, 773)' - PASSED ssl_gtest.sh: #3947: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3206 (1, 769, 769, 770, 767)' - PASSED ssl_gtest.sh: #3948: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3207 (1, 769, 769, 770, 768)' - PASSED ssl_gtest.sh: #3949: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3208 (1, 769, 769, 770, 769)' - PASSED ssl_gtest.sh: #3950: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3209 (1, 769, 769, 770, 770)' - PASSED ssl_gtest.sh: #3951: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3210 (1, 769, 769, 770, 771)' - PASSED ssl_gtest.sh: #3952: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3211 (1, 769, 769, 770, 772)' - PASSED ssl_gtest.sh: #3953: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3212 (1, 769, 769, 770, 773)' - PASSED ssl_gtest.sh: #3954: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3213 (1, 769, 769, 771, 767)' - PASSED ssl_gtest.sh: #3955: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3214 (1, 769, 769, 771, 768)' - PASSED ssl_gtest.sh: #3956: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3215 (1, 769, 769, 771, 769)' - PASSED ssl_gtest.sh: #3957: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3216 (1, 769, 769, 771, 770)' - PASSED ssl_gtest.sh: #3958: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3217 (1, 769, 769, 771, 771)' - PASSED ssl_gtest.sh: #3959: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3218 (1, 769, 769, 771, 772)' - PASSED ssl_gtest.sh: #3960: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3219 (1, 769, 769, 771, 773)' - PASSED ssl_gtest.sh: #3961: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3220 (1, 769, 769, 772, 767)' - PASSED ssl_gtest.sh: #3962: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3221 (1, 769, 769, 772, 768)' - PASSED ssl_gtest.sh: #3963: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3222 (1, 769, 769, 772, 769)' - PASSED ssl_gtest.sh: #3964: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3223 (1, 769, 769, 772, 770)' - PASSED ssl_gtest.sh: #3965: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3224 (1, 769, 769, 772, 771)' - PASSED ssl_gtest.sh: #3966: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3225 (1, 769, 769, 772, 772)' - PASSED ssl_gtest.sh: #3967: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3226 (1, 769, 769, 772, 773)' - PASSED ssl_gtest.sh: #3968: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3227 (1, 769, 769, 773, 767)' - PASSED ssl_gtest.sh: #3969: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3228 (1, 769, 769, 773, 768)' - PASSED ssl_gtest.sh: #3970: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3229 (1, 769, 769, 773, 769)' - PASSED ssl_gtest.sh: #3971: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3230 (1, 769, 769, 773, 770)' - PASSED ssl_gtest.sh: #3972: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3231 (1, 769, 769, 773, 771)' - PASSED ssl_gtest.sh: #3973: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3232 (1, 769, 769, 773, 772)' - PASSED ssl_gtest.sh: #3974: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3233 (1, 769, 769, 773, 773)' - PASSED ssl_gtest.sh: #3975: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3234 (1, 769, 770, 767, 767)' - PASSED ssl_gtest.sh: #3976: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3235 (1, 769, 770, 767, 768)' - PASSED ssl_gtest.sh: #3977: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3236 (1, 769, 770, 767, 769)' - PASSED ssl_gtest.sh: #3978: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3237 (1, 769, 770, 767, 770)' - PASSED ssl_gtest.sh: #3979: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3238 (1, 769, 770, 767, 771)' - PASSED ssl_gtest.sh: #3980: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3239 (1, 769, 770, 767, 772)' - PASSED ssl_gtest.sh: #3981: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3240 (1, 769, 770, 767, 773)' - PASSED ssl_gtest.sh: #3982: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3241 (1, 769, 770, 768, 767)' - PASSED ssl_gtest.sh: #3983: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3242 (1, 769, 770, 768, 768)' - PASSED ssl_gtest.sh: #3984: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3243 (1, 769, 770, 768, 769)' - PASSED ssl_gtest.sh: #3985: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3244 (1, 769, 770, 768, 770)' - PASSED ssl_gtest.sh: #3986: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3245 (1, 769, 770, 768, 771)' - PASSED ssl_gtest.sh: #3987: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3246 (1, 769, 770, 768, 772)' - PASSED ssl_gtest.sh: #3988: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3247 (1, 769, 770, 768, 773)' - PASSED ssl_gtest.sh: #3989: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3248 (1, 769, 770, 769, 767)' - PASSED ssl_gtest.sh: #3990: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3249 (1, 769, 770, 769, 768)' - PASSED ssl_gtest.sh: #3991: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3250 (1, 769, 770, 769, 769)' - PASSED ssl_gtest.sh: #3992: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3251 (1, 769, 770, 769, 770)' - PASSED ssl_gtest.sh: #3993: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3252 (1, 769, 770, 769, 771)' - PASSED ssl_gtest.sh: #3994: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3253 (1, 769, 770, 769, 772)' - PASSED ssl_gtest.sh: #3995: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3254 (1, 769, 770, 769, 773)' - PASSED ssl_gtest.sh: #3996: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3255 (1, 769, 770, 770, 767)' - PASSED ssl_gtest.sh: #3997: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3256 (1, 769, 770, 770, 768)' - PASSED ssl_gtest.sh: #3998: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3257 (1, 769, 770, 770, 769)' - PASSED ssl_gtest.sh: #3999: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3258 (1, 769, 770, 770, 770)' - PASSED ssl_gtest.sh: #4000: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3259 (1, 769, 770, 770, 771)' - PASSED ssl_gtest.sh: #4001: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3260 (1, 769, 770, 770, 772)' - PASSED ssl_gtest.sh: #4002: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3261 (1, 769, 770, 770, 773)' - PASSED ssl_gtest.sh: #4003: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3262 (1, 769, 770, 771, 767)' - PASSED ssl_gtest.sh: #4004: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3263 (1, 769, 770, 771, 768)' - PASSED ssl_gtest.sh: #4005: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3264 (1, 769, 770, 771, 769)' - PASSED ssl_gtest.sh: #4006: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3265 (1, 769, 770, 771, 770)' - PASSED ssl_gtest.sh: #4007: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3266 (1, 769, 770, 771, 771)' - PASSED ssl_gtest.sh: #4008: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3267 (1, 769, 770, 771, 772)' - PASSED ssl_gtest.sh: #4009: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3268 (1, 769, 770, 771, 773)' - PASSED ssl_gtest.sh: #4010: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3269 (1, 769, 770, 772, 767)' - PASSED ssl_gtest.sh: #4011: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3270 (1, 769, 770, 772, 768)' - PASSED ssl_gtest.sh: #4012: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3271 (1, 769, 770, 772, 769)' - PASSED ssl_gtest.sh: #4013: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3272 (1, 769, 770, 772, 770)' - PASSED ssl_gtest.sh: #4014: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3273 (1, 769, 770, 772, 771)' - PASSED ssl_gtest.sh: #4015: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3274 (1, 769, 770, 772, 772)' - PASSED ssl_gtest.sh: #4016: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3275 (1, 769, 770, 772, 773)' - PASSED ssl_gtest.sh: #4017: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3276 (1, 769, 770, 773, 767)' - PASSED ssl_gtest.sh: #4018: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3277 (1, 769, 770, 773, 768)' - PASSED ssl_gtest.sh: #4019: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3278 (1, 769, 770, 773, 769)' - PASSED ssl_gtest.sh: #4020: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3279 (1, 769, 770, 773, 770)' - PASSED ssl_gtest.sh: #4021: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3280 (1, 769, 770, 773, 771)' - PASSED ssl_gtest.sh: #4022: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3281 (1, 769, 770, 773, 772)' - PASSED ssl_gtest.sh: #4023: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3282 (1, 769, 770, 773, 773)' - PASSED ssl_gtest.sh: #4024: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3283 (1, 769, 771, 767, 767)' - PASSED ssl_gtest.sh: #4025: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3284 (1, 769, 771, 767, 768)' - PASSED ssl_gtest.sh: #4026: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3285 (1, 769, 771, 767, 769)' - PASSED ssl_gtest.sh: #4027: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3286 (1, 769, 771, 767, 770)' - PASSED ssl_gtest.sh: #4028: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3287 (1, 769, 771, 767, 771)' - PASSED ssl_gtest.sh: #4029: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3288 (1, 769, 771, 767, 772)' - PASSED ssl_gtest.sh: #4030: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3289 (1, 769, 771, 767, 773)' - PASSED ssl_gtest.sh: #4031: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3290 (1, 769, 771, 768, 767)' - PASSED ssl_gtest.sh: #4032: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3291 (1, 769, 771, 768, 768)' - PASSED ssl_gtest.sh: #4033: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3292 (1, 769, 771, 768, 769)' - PASSED ssl_gtest.sh: #4034: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3293 (1, 769, 771, 768, 770)' - PASSED ssl_gtest.sh: #4035: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3294 (1, 769, 771, 768, 771)' - PASSED ssl_gtest.sh: #4036: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3295 (1, 769, 771, 768, 772)' - PASSED ssl_gtest.sh: #4037: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3296 (1, 769, 771, 768, 773)' - PASSED ssl_gtest.sh: #4038: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3297 (1, 769, 771, 769, 767)' - PASSED ssl_gtest.sh: #4039: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3298 (1, 769, 771, 769, 768)' - PASSED ssl_gtest.sh: #4040: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3299 (1, 769, 771, 769, 769)' - PASSED ssl_gtest.sh: #4041: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3300 (1, 769, 771, 769, 770)' - PASSED ssl_gtest.sh: #4042: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3301 (1, 769, 771, 769, 771)' - PASSED ssl_gtest.sh: #4043: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3302 (1, 769, 771, 769, 772)' - PASSED ssl_gtest.sh: #4044: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3303 (1, 769, 771, 769, 773)' - PASSED ssl_gtest.sh: #4045: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3304 (1, 769, 771, 770, 767)' - PASSED ssl_gtest.sh: #4046: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3305 (1, 769, 771, 770, 768)' - PASSED ssl_gtest.sh: #4047: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3306 (1, 769, 771, 770, 769)' - PASSED ssl_gtest.sh: #4048: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3307 (1, 769, 771, 770, 770)' - PASSED ssl_gtest.sh: #4049: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3308 (1, 769, 771, 770, 771)' - PASSED ssl_gtest.sh: #4050: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3309 (1, 769, 771, 770, 772)' - PASSED ssl_gtest.sh: #4051: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3310 (1, 769, 771, 770, 773)' - PASSED ssl_gtest.sh: #4052: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3311 (1, 769, 771, 771, 767)' - PASSED ssl_gtest.sh: #4053: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3312 (1, 769, 771, 771, 768)' - PASSED ssl_gtest.sh: #4054: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3313 (1, 769, 771, 771, 769)' - PASSED ssl_gtest.sh: #4055: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3314 (1, 769, 771, 771, 770)' - PASSED ssl_gtest.sh: #4056: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3315 (1, 769, 771, 771, 771)' - PASSED ssl_gtest.sh: #4057: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3316 (1, 769, 771, 771, 772)' - PASSED ssl_gtest.sh: #4058: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3317 (1, 769, 771, 771, 773)' - PASSED ssl_gtest.sh: #4059: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3318 (1, 769, 771, 772, 767)' - PASSED ssl_gtest.sh: #4060: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3319 (1, 769, 771, 772, 768)' - PASSED ssl_gtest.sh: #4061: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3320 (1, 769, 771, 772, 769)' - PASSED ssl_gtest.sh: #4062: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3321 (1, 769, 771, 772, 770)' - PASSED ssl_gtest.sh: #4063: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3322 (1, 769, 771, 772, 771)' - PASSED ssl_gtest.sh: #4064: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3323 (1, 769, 771, 772, 772)' - PASSED ssl_gtest.sh: #4065: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3324 (1, 769, 771, 772, 773)' - PASSED ssl_gtest.sh: #4066: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3325 (1, 769, 771, 773, 767)' - PASSED ssl_gtest.sh: #4067: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3326 (1, 769, 771, 773, 768)' - PASSED ssl_gtest.sh: #4068: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3327 (1, 769, 771, 773, 769)' - PASSED ssl_gtest.sh: #4069: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3328 (1, 769, 771, 773, 770)' - PASSED ssl_gtest.sh: #4070: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3329 (1, 769, 771, 773, 771)' - PASSED ssl_gtest.sh: #4071: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3330 (1, 769, 771, 773, 772)' - PASSED ssl_gtest.sh: #4072: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3331 (1, 769, 771, 773, 773)' - PASSED ssl_gtest.sh: #4073: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3332 (1, 769, 772, 767, 767)' - PASSED ssl_gtest.sh: #4074: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3333 (1, 769, 772, 767, 768)' - PASSED ssl_gtest.sh: #4075: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3334 (1, 769, 772, 767, 769)' - PASSED ssl_gtest.sh: #4076: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3335 (1, 769, 772, 767, 770)' - PASSED ssl_gtest.sh: #4077: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3336 (1, 769, 772, 767, 771)' - PASSED ssl_gtest.sh: #4078: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3337 (1, 769, 772, 767, 772)' - PASSED ssl_gtest.sh: #4079: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3338 (1, 769, 772, 767, 773)' - PASSED ssl_gtest.sh: #4080: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3339 (1, 769, 772, 768, 767)' - PASSED ssl_gtest.sh: #4081: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3340 (1, 769, 772, 768, 768)' - PASSED ssl_gtest.sh: #4082: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3341 (1, 769, 772, 768, 769)' - PASSED ssl_gtest.sh: #4083: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3342 (1, 769, 772, 768, 770)' - PASSED ssl_gtest.sh: #4084: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3343 (1, 769, 772, 768, 771)' - PASSED ssl_gtest.sh: #4085: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3344 (1, 769, 772, 768, 772)' - PASSED ssl_gtest.sh: #4086: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3345 (1, 769, 772, 768, 773)' - PASSED ssl_gtest.sh: #4087: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3346 (1, 769, 772, 769, 767)' - PASSED ssl_gtest.sh: #4088: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3347 (1, 769, 772, 769, 768)' - PASSED ssl_gtest.sh: #4089: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3348 (1, 769, 772, 769, 769)' - PASSED ssl_gtest.sh: #4090: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3349 (1, 769, 772, 769, 770)' - PASSED ssl_gtest.sh: #4091: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3350 (1, 769, 772, 769, 771)' - PASSED ssl_gtest.sh: #4092: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3351 (1, 769, 772, 769, 772)' - PASSED ssl_gtest.sh: #4093: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3352 (1, 769, 772, 769, 773)' - PASSED ssl_gtest.sh: #4094: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3353 (1, 769, 772, 770, 767)' - PASSED ssl_gtest.sh: #4095: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3354 (1, 769, 772, 770, 768)' - PASSED ssl_gtest.sh: #4096: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3355 (1, 769, 772, 770, 769)' - PASSED ssl_gtest.sh: #4097: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3356 (1, 769, 772, 770, 770)' - PASSED ssl_gtest.sh: #4098: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3357 (1, 769, 772, 770, 771)' - PASSED ssl_gtest.sh: #4099: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3358 (1, 769, 772, 770, 772)' - PASSED ssl_gtest.sh: #4100: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3359 (1, 769, 772, 770, 773)' - PASSED ssl_gtest.sh: #4101: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3360 (1, 769, 772, 771, 767)' - PASSED ssl_gtest.sh: #4102: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3361 (1, 769, 772, 771, 768)' - PASSED ssl_gtest.sh: #4103: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3362 (1, 769, 772, 771, 769)' - PASSED ssl_gtest.sh: #4104: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3363 (1, 769, 772, 771, 770)' - PASSED ssl_gtest.sh: #4105: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3364 (1, 769, 772, 771, 771)' - PASSED ssl_gtest.sh: #4106: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3365 (1, 769, 772, 771, 772)' - PASSED ssl_gtest.sh: #4107: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3366 (1, 769, 772, 771, 773)' - PASSED ssl_gtest.sh: #4108: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3367 (1, 769, 772, 772, 767)' - PASSED ssl_gtest.sh: #4109: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3368 (1, 769, 772, 772, 768)' - PASSED ssl_gtest.sh: #4110: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3369 (1, 769, 772, 772, 769)' - PASSED ssl_gtest.sh: #4111: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3370 (1, 769, 772, 772, 770)' - PASSED ssl_gtest.sh: #4112: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3371 (1, 769, 772, 772, 771)' - PASSED ssl_gtest.sh: #4113: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3372 (1, 769, 772, 772, 772)' - PASSED ssl_gtest.sh: #4114: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3373 (1, 769, 772, 772, 773)' - PASSED ssl_gtest.sh: #4115: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3374 (1, 769, 772, 773, 767)' - PASSED ssl_gtest.sh: #4116: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3375 (1, 769, 772, 773, 768)' - PASSED ssl_gtest.sh: #4117: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3376 (1, 769, 772, 773, 769)' - PASSED ssl_gtest.sh: #4118: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3377 (1, 769, 772, 773, 770)' - PASSED ssl_gtest.sh: #4119: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3378 (1, 769, 772, 773, 771)' - PASSED ssl_gtest.sh: #4120: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3379 (1, 769, 772, 773, 772)' - PASSED ssl_gtest.sh: #4121: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3380 (1, 769, 772, 773, 773)' - PASSED ssl_gtest.sh: #4122: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3381 (1, 769, 773, 767, 767)' - PASSED ssl_gtest.sh: #4123: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3382 (1, 769, 773, 767, 768)' - PASSED ssl_gtest.sh: #4124: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3383 (1, 769, 773, 767, 769)' - PASSED ssl_gtest.sh: #4125: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3384 (1, 769, 773, 767, 770)' - PASSED ssl_gtest.sh: #4126: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3385 (1, 769, 773, 767, 771)' - PASSED ssl_gtest.sh: #4127: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3386 (1, 769, 773, 767, 772)' - PASSED ssl_gtest.sh: #4128: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3387 (1, 769, 773, 767, 773)' - PASSED ssl_gtest.sh: #4129: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3388 (1, 769, 773, 768, 767)' - PASSED ssl_gtest.sh: #4130: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3389 (1, 769, 773, 768, 768)' - PASSED ssl_gtest.sh: #4131: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3390 (1, 769, 773, 768, 769)' - PASSED ssl_gtest.sh: #4132: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3391 (1, 769, 773, 768, 770)' - PASSED ssl_gtest.sh: #4133: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3392 (1, 769, 773, 768, 771)' - PASSED ssl_gtest.sh: #4134: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3393 (1, 769, 773, 768, 772)' - PASSED ssl_gtest.sh: #4135: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3394 (1, 769, 773, 768, 773)' - PASSED ssl_gtest.sh: #4136: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3395 (1, 769, 773, 769, 767)' - PASSED ssl_gtest.sh: #4137: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3396 (1, 769, 773, 769, 768)' - PASSED ssl_gtest.sh: #4138: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3397 (1, 769, 773, 769, 769)' - PASSED ssl_gtest.sh: #4139: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3398 (1, 769, 773, 769, 770)' - PASSED ssl_gtest.sh: #4140: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3399 (1, 769, 773, 769, 771)' - PASSED ssl_gtest.sh: #4141: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3400 (1, 769, 773, 769, 772)' - PASSED ssl_gtest.sh: #4142: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3401 (1, 769, 773, 769, 773)' - PASSED ssl_gtest.sh: #4143: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3402 (1, 769, 773, 770, 767)' - PASSED ssl_gtest.sh: #4144: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3403 (1, 769, 773, 770, 768)' - PASSED ssl_gtest.sh: #4145: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3404 (1, 769, 773, 770, 769)' - PASSED ssl_gtest.sh: #4146: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3405 (1, 769, 773, 770, 770)' - PASSED ssl_gtest.sh: #4147: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3406 (1, 769, 773, 770, 771)' - PASSED ssl_gtest.sh: #4148: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3407 (1, 769, 773, 770, 772)' - PASSED ssl_gtest.sh: #4149: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3408 (1, 769, 773, 770, 773)' - PASSED ssl_gtest.sh: #4150: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3409 (1, 769, 773, 771, 767)' - PASSED ssl_gtest.sh: #4151: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3410 (1, 769, 773, 771, 768)' - PASSED ssl_gtest.sh: #4152: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3411 (1, 769, 773, 771, 769)' - PASSED ssl_gtest.sh: #4153: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3412 (1, 769, 773, 771, 770)' - PASSED ssl_gtest.sh: #4154: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3413 (1, 769, 773, 771, 771)' - PASSED ssl_gtest.sh: #4155: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3414 (1, 769, 773, 771, 772)' - PASSED ssl_gtest.sh: #4156: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3415 (1, 769, 773, 771, 773)' - PASSED ssl_gtest.sh: #4157: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3416 (1, 769, 773, 772, 767)' - PASSED ssl_gtest.sh: #4158: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3417 (1, 769, 773, 772, 768)' - PASSED ssl_gtest.sh: #4159: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3418 (1, 769, 773, 772, 769)' - PASSED ssl_gtest.sh: #4160: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3419 (1, 769, 773, 772, 770)' - PASSED ssl_gtest.sh: #4161: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3420 (1, 769, 773, 772, 771)' - PASSED ssl_gtest.sh: #4162: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3421 (1, 769, 773, 772, 772)' - PASSED ssl_gtest.sh: #4163: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3422 (1, 769, 773, 772, 773)' - PASSED ssl_gtest.sh: #4164: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3423 (1, 769, 773, 773, 767)' - PASSED ssl_gtest.sh: #4165: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3424 (1, 769, 773, 773, 768)' - PASSED ssl_gtest.sh: #4166: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3425 (1, 769, 773, 773, 769)' - PASSED ssl_gtest.sh: #4167: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3426 (1, 769, 773, 773, 770)' - PASSED ssl_gtest.sh: #4168: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3427 (1, 769, 773, 773, 771)' - PASSED ssl_gtest.sh: #4169: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3428 (1, 769, 773, 773, 772)' - PASSED ssl_gtest.sh: #4170: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3429 (1, 769, 773, 773, 773)' - PASSED ssl_gtest.sh: #4171: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3430 (1, 770, 767, 767, 767)' - PASSED ssl_gtest.sh: #4172: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3431 (1, 770, 767, 767, 768)' - PASSED ssl_gtest.sh: #4173: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3432 (1, 770, 767, 767, 769)' - PASSED ssl_gtest.sh: #4174: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3433 (1, 770, 767, 767, 770)' - PASSED ssl_gtest.sh: #4175: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3434 (1, 770, 767, 767, 771)' - PASSED ssl_gtest.sh: #4176: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3435 (1, 770, 767, 767, 772)' - PASSED ssl_gtest.sh: #4177: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3436 (1, 770, 767, 767, 773)' - PASSED ssl_gtest.sh: #4178: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3437 (1, 770, 767, 768, 767)' - PASSED ssl_gtest.sh: #4179: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3438 (1, 770, 767, 768, 768)' - PASSED ssl_gtest.sh: #4180: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3439 (1, 770, 767, 768, 769)' - PASSED ssl_gtest.sh: #4181: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3440 (1, 770, 767, 768, 770)' - PASSED ssl_gtest.sh: #4182: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3441 (1, 770, 767, 768, 771)' - PASSED ssl_gtest.sh: #4183: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3442 (1, 770, 767, 768, 772)' - PASSED ssl_gtest.sh: #4184: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3443 (1, 770, 767, 768, 773)' - PASSED ssl_gtest.sh: #4185: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3444 (1, 770, 767, 769, 767)' - PASSED ssl_gtest.sh: #4186: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3445 (1, 770, 767, 769, 768)' - PASSED ssl_gtest.sh: #4187: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3446 (1, 770, 767, 769, 769)' - PASSED ssl_gtest.sh: #4188: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3447 (1, 770, 767, 769, 770)' - PASSED ssl_gtest.sh: #4189: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3448 (1, 770, 767, 769, 771)' - PASSED ssl_gtest.sh: #4190: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3449 (1, 770, 767, 769, 772)' - PASSED ssl_gtest.sh: #4191: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3450 (1, 770, 767, 769, 773)' - PASSED ssl_gtest.sh: #4192: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3451 (1, 770, 767, 770, 767)' - PASSED ssl_gtest.sh: #4193: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3452 (1, 770, 767, 770, 768)' - PASSED ssl_gtest.sh: #4194: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3453 (1, 770, 767, 770, 769)' - PASSED ssl_gtest.sh: #4195: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3454 (1, 770, 767, 770, 770)' - PASSED ssl_gtest.sh: #4196: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3455 (1, 770, 767, 770, 771)' - PASSED ssl_gtest.sh: #4197: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3456 (1, 770, 767, 770, 772)' - PASSED ssl_gtest.sh: #4198: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3457 (1, 770, 767, 770, 773)' - PASSED ssl_gtest.sh: #4199: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3458 (1, 770, 767, 771, 767)' - PASSED ssl_gtest.sh: #4200: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3459 (1, 770, 767, 771, 768)' - PASSED ssl_gtest.sh: #4201: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3460 (1, 770, 767, 771, 769)' - PASSED ssl_gtest.sh: #4202: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3461 (1, 770, 767, 771, 770)' - PASSED ssl_gtest.sh: #4203: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3462 (1, 770, 767, 771, 771)' - PASSED ssl_gtest.sh: #4204: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3463 (1, 770, 767, 771, 772)' - PASSED ssl_gtest.sh: #4205: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3464 (1, 770, 767, 771, 773)' - PASSED ssl_gtest.sh: #4206: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3465 (1, 770, 767, 772, 767)' - PASSED ssl_gtest.sh: #4207: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3466 (1, 770, 767, 772, 768)' - PASSED ssl_gtest.sh: #4208: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3467 (1, 770, 767, 772, 769)' - PASSED ssl_gtest.sh: #4209: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3468 (1, 770, 767, 772, 770)' - PASSED ssl_gtest.sh: #4210: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3469 (1, 770, 767, 772, 771)' - PASSED ssl_gtest.sh: #4211: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3470 (1, 770, 767, 772, 772)' - PASSED ssl_gtest.sh: #4212: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3471 (1, 770, 767, 772, 773)' - PASSED ssl_gtest.sh: #4213: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3472 (1, 770, 767, 773, 767)' - PASSED ssl_gtest.sh: #4214: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3473 (1, 770, 767, 773, 768)' - PASSED ssl_gtest.sh: #4215: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3474 (1, 770, 767, 773, 769)' - PASSED ssl_gtest.sh: #4216: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3475 (1, 770, 767, 773, 770)' - PASSED ssl_gtest.sh: #4217: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3476 (1, 770, 767, 773, 771)' - PASSED ssl_gtest.sh: #4218: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3477 (1, 770, 767, 773, 772)' - PASSED ssl_gtest.sh: #4219: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3478 (1, 770, 767, 773, 773)' - PASSED ssl_gtest.sh: #4220: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3479 (1, 770, 768, 767, 767)' - PASSED ssl_gtest.sh: #4221: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3480 (1, 770, 768, 767, 768)' - PASSED ssl_gtest.sh: #4222: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3481 (1, 770, 768, 767, 769)' - PASSED ssl_gtest.sh: #4223: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3482 (1, 770, 768, 767, 770)' - PASSED ssl_gtest.sh: #4224: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3483 (1, 770, 768, 767, 771)' - PASSED ssl_gtest.sh: #4225: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3484 (1, 770, 768, 767, 772)' - PASSED ssl_gtest.sh: #4226: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3485 (1, 770, 768, 767, 773)' - PASSED ssl_gtest.sh: #4227: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3486 (1, 770, 768, 768, 767)' - PASSED ssl_gtest.sh: #4228: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3487 (1, 770, 768, 768, 768)' - PASSED ssl_gtest.sh: #4229: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3488 (1, 770, 768, 768, 769)' - PASSED ssl_gtest.sh: #4230: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3489 (1, 770, 768, 768, 770)' - PASSED ssl_gtest.sh: #4231: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3490 (1, 770, 768, 768, 771)' - PASSED ssl_gtest.sh: #4232: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3491 (1, 770, 768, 768, 772)' - PASSED ssl_gtest.sh: #4233: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3492 (1, 770, 768, 768, 773)' - PASSED ssl_gtest.sh: #4234: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3493 (1, 770, 768, 769, 767)' - PASSED ssl_gtest.sh: #4235: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3494 (1, 770, 768, 769, 768)' - PASSED ssl_gtest.sh: #4236: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3495 (1, 770, 768, 769, 769)' - PASSED ssl_gtest.sh: #4237: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3496 (1, 770, 768, 769, 770)' - PASSED ssl_gtest.sh: #4238: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3497 (1, 770, 768, 769, 771)' - PASSED ssl_gtest.sh: #4239: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3498 (1, 770, 768, 769, 772)' - PASSED ssl_gtest.sh: #4240: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3499 (1, 770, 768, 769, 773)' - PASSED ssl_gtest.sh: #4241: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3500 (1, 770, 768, 770, 767)' - PASSED ssl_gtest.sh: #4242: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3501 (1, 770, 768, 770, 768)' - PASSED ssl_gtest.sh: #4243: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3502 (1, 770, 768, 770, 769)' - PASSED ssl_gtest.sh: #4244: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3503 (1, 770, 768, 770, 770)' - PASSED ssl_gtest.sh: #4245: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3504 (1, 770, 768, 770, 771)' - PASSED ssl_gtest.sh: #4246: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3505 (1, 770, 768, 770, 772)' - PASSED ssl_gtest.sh: #4247: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3506 (1, 770, 768, 770, 773)' - PASSED ssl_gtest.sh: #4248: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3507 (1, 770, 768, 771, 767)' - PASSED ssl_gtest.sh: #4249: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3508 (1, 770, 768, 771, 768)' - PASSED ssl_gtest.sh: #4250: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3509 (1, 770, 768, 771, 769)' - PASSED ssl_gtest.sh: #4251: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3510 (1, 770, 768, 771, 770)' - PASSED ssl_gtest.sh: #4252: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3511 (1, 770, 768, 771, 771)' - PASSED ssl_gtest.sh: #4253: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3512 (1, 770, 768, 771, 772)' - PASSED ssl_gtest.sh: #4254: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3513 (1, 770, 768, 771, 773)' - PASSED ssl_gtest.sh: #4255: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3514 (1, 770, 768, 772, 767)' - PASSED ssl_gtest.sh: #4256: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3515 (1, 770, 768, 772, 768)' - PASSED ssl_gtest.sh: #4257: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3516 (1, 770, 768, 772, 769)' - PASSED ssl_gtest.sh: #4258: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3517 (1, 770, 768, 772, 770)' - PASSED ssl_gtest.sh: #4259: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3518 (1, 770, 768, 772, 771)' - PASSED ssl_gtest.sh: #4260: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3519 (1, 770, 768, 772, 772)' - PASSED ssl_gtest.sh: #4261: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3520 (1, 770, 768, 772, 773)' - PASSED ssl_gtest.sh: #4262: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3521 (1, 770, 768, 773, 767)' - PASSED ssl_gtest.sh: #4263: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3522 (1, 770, 768, 773, 768)' - PASSED ssl_gtest.sh: #4264: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3523 (1, 770, 768, 773, 769)' - PASSED ssl_gtest.sh: #4265: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3524 (1, 770, 768, 773, 770)' - PASSED ssl_gtest.sh: #4266: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3525 (1, 770, 768, 773, 771)' - PASSED ssl_gtest.sh: #4267: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3526 (1, 770, 768, 773, 772)' - PASSED ssl_gtest.sh: #4268: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3527 (1, 770, 768, 773, 773)' - PASSED ssl_gtest.sh: #4269: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3528 (1, 770, 769, 767, 767)' - PASSED ssl_gtest.sh: #4270: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3529 (1, 770, 769, 767, 768)' - PASSED ssl_gtest.sh: #4271: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3530 (1, 770, 769, 767, 769)' - PASSED ssl_gtest.sh: #4272: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3531 (1, 770, 769, 767, 770)' - PASSED ssl_gtest.sh: #4273: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3532 (1, 770, 769, 767, 771)' - PASSED ssl_gtest.sh: #4274: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3533 (1, 770, 769, 767, 772)' - PASSED ssl_gtest.sh: #4275: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3534 (1, 770, 769, 767, 773)' - PASSED ssl_gtest.sh: #4276: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3535 (1, 770, 769, 768, 767)' - PASSED ssl_gtest.sh: #4277: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3536 (1, 770, 769, 768, 768)' - PASSED ssl_gtest.sh: #4278: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3537 (1, 770, 769, 768, 769)' - PASSED ssl_gtest.sh: #4279: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3538 (1, 770, 769, 768, 770)' - PASSED ssl_gtest.sh: #4280: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3539 (1, 770, 769, 768, 771)' - PASSED ssl_gtest.sh: #4281: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3540 (1, 770, 769, 768, 772)' - PASSED ssl_gtest.sh: #4282: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3541 (1, 770, 769, 768, 773)' - PASSED ssl_gtest.sh: #4283: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3542 (1, 770, 769, 769, 767)' - PASSED ssl_gtest.sh: #4284: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3543 (1, 770, 769, 769, 768)' - PASSED ssl_gtest.sh: #4285: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3544 (1, 770, 769, 769, 769)' - PASSED ssl_gtest.sh: #4286: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3545 (1, 770, 769, 769, 770)' - PASSED ssl_gtest.sh: #4287: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3546 (1, 770, 769, 769, 771)' - PASSED ssl_gtest.sh: #4288: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3547 (1, 770, 769, 769, 772)' - PASSED ssl_gtest.sh: #4289: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3548 (1, 770, 769, 769, 773)' - PASSED ssl_gtest.sh: #4290: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3549 (1, 770, 769, 770, 767)' - PASSED ssl_gtest.sh: #4291: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3550 (1, 770, 769, 770, 768)' - PASSED ssl_gtest.sh: #4292: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3551 (1, 770, 769, 770, 769)' - PASSED ssl_gtest.sh: #4293: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3552 (1, 770, 769, 770, 770)' - PASSED ssl_gtest.sh: #4294: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3553 (1, 770, 769, 770, 771)' - PASSED ssl_gtest.sh: #4295: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3554 (1, 770, 769, 770, 772)' - PASSED ssl_gtest.sh: #4296: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3555 (1, 770, 769, 770, 773)' - PASSED ssl_gtest.sh: #4297: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3556 (1, 770, 769, 771, 767)' - PASSED ssl_gtest.sh: #4298: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3557 (1, 770, 769, 771, 768)' - PASSED ssl_gtest.sh: #4299: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3558 (1, 770, 769, 771, 769)' - PASSED ssl_gtest.sh: #4300: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3559 (1, 770, 769, 771, 770)' - PASSED ssl_gtest.sh: #4301: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3560 (1, 770, 769, 771, 771)' - PASSED ssl_gtest.sh: #4302: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3561 (1, 770, 769, 771, 772)' - PASSED ssl_gtest.sh: #4303: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3562 (1, 770, 769, 771, 773)' - PASSED ssl_gtest.sh: #4304: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3563 (1, 770, 769, 772, 767)' - PASSED ssl_gtest.sh: #4305: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3564 (1, 770, 769, 772, 768)' - PASSED ssl_gtest.sh: #4306: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3565 (1, 770, 769, 772, 769)' - PASSED ssl_gtest.sh: #4307: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3566 (1, 770, 769, 772, 770)' - PASSED ssl_gtest.sh: #4308: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3567 (1, 770, 769, 772, 771)' - PASSED ssl_gtest.sh: #4309: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3568 (1, 770, 769, 772, 772)' - PASSED ssl_gtest.sh: #4310: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3569 (1, 770, 769, 772, 773)' - PASSED ssl_gtest.sh: #4311: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3570 (1, 770, 769, 773, 767)' - PASSED ssl_gtest.sh: #4312: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3571 (1, 770, 769, 773, 768)' - PASSED ssl_gtest.sh: #4313: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3572 (1, 770, 769, 773, 769)' - PASSED ssl_gtest.sh: #4314: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3573 (1, 770, 769, 773, 770)' - PASSED ssl_gtest.sh: #4315: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3574 (1, 770, 769, 773, 771)' - PASSED ssl_gtest.sh: #4316: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3575 (1, 770, 769, 773, 772)' - PASSED ssl_gtest.sh: #4317: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3576 (1, 770, 769, 773, 773)' - PASSED ssl_gtest.sh: #4318: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3577 (1, 770, 770, 767, 767)' - PASSED ssl_gtest.sh: #4319: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3578 (1, 770, 770, 767, 768)' - PASSED ssl_gtest.sh: #4320: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3579 (1, 770, 770, 767, 769)' - PASSED ssl_gtest.sh: #4321: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3580 (1, 770, 770, 767, 770)' - PASSED ssl_gtest.sh: #4322: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3581 (1, 770, 770, 767, 771)' - PASSED ssl_gtest.sh: #4323: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3582 (1, 770, 770, 767, 772)' - PASSED ssl_gtest.sh: #4324: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3583 (1, 770, 770, 767, 773)' - PASSED ssl_gtest.sh: #4325: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3584 (1, 770, 770, 768, 767)' - PASSED ssl_gtest.sh: #4326: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3585 (1, 770, 770, 768, 768)' - PASSED ssl_gtest.sh: #4327: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3586 (1, 770, 770, 768, 769)' - PASSED ssl_gtest.sh: #4328: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3587 (1, 770, 770, 768, 770)' - PASSED ssl_gtest.sh: #4329: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3588 (1, 770, 770, 768, 771)' - PASSED ssl_gtest.sh: #4330: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3589 (1, 770, 770, 768, 772)' - PASSED ssl_gtest.sh: #4331: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3590 (1, 770, 770, 768, 773)' - PASSED ssl_gtest.sh: #4332: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3591 (1, 770, 770, 769, 767)' - PASSED ssl_gtest.sh: #4333: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3592 (1, 770, 770, 769, 768)' - PASSED ssl_gtest.sh: #4334: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3593 (1, 770, 770, 769, 769)' - PASSED ssl_gtest.sh: #4335: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3594 (1, 770, 770, 769, 770)' - PASSED ssl_gtest.sh: #4336: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3595 (1, 770, 770, 769, 771)' - PASSED ssl_gtest.sh: #4337: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3596 (1, 770, 770, 769, 772)' - PASSED ssl_gtest.sh: #4338: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3597 (1, 770, 770, 769, 773)' - PASSED ssl_gtest.sh: #4339: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3598 (1, 770, 770, 770, 767)' - PASSED ssl_gtest.sh: #4340: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3599 (1, 770, 770, 770, 768)' - PASSED ssl_gtest.sh: #4341: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3600 (1, 770, 770, 770, 769)' - PASSED ssl_gtest.sh: #4342: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3601 (1, 770, 770, 770, 770)' - PASSED ssl_gtest.sh: #4343: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3602 (1, 770, 770, 770, 771)' - PASSED ssl_gtest.sh: #4344: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3603 (1, 770, 770, 770, 772)' - PASSED ssl_gtest.sh: #4345: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3604 (1, 770, 770, 770, 773)' - PASSED ssl_gtest.sh: #4346: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3605 (1, 770, 770, 771, 767)' - PASSED ssl_gtest.sh: #4347: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3606 (1, 770, 770, 771, 768)' - PASSED ssl_gtest.sh: #4348: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3607 (1, 770, 770, 771, 769)' - PASSED ssl_gtest.sh: #4349: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3608 (1, 770, 770, 771, 770)' - PASSED ssl_gtest.sh: #4350: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3609 (1, 770, 770, 771, 771)' - PASSED ssl_gtest.sh: #4351: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3610 (1, 770, 770, 771, 772)' - PASSED ssl_gtest.sh: #4352: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3611 (1, 770, 770, 771, 773)' - PASSED ssl_gtest.sh: #4353: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3612 (1, 770, 770, 772, 767)' - PASSED ssl_gtest.sh: #4354: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3613 (1, 770, 770, 772, 768)' - PASSED ssl_gtest.sh: #4355: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3614 (1, 770, 770, 772, 769)' - PASSED ssl_gtest.sh: #4356: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3615 (1, 770, 770, 772, 770)' - PASSED ssl_gtest.sh: #4357: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3616 (1, 770, 770, 772, 771)' - PASSED ssl_gtest.sh: #4358: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3617 (1, 770, 770, 772, 772)' - PASSED ssl_gtest.sh: #4359: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3618 (1, 770, 770, 772, 773)' - PASSED ssl_gtest.sh: #4360: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3619 (1, 770, 770, 773, 767)' - PASSED ssl_gtest.sh: #4361: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3620 (1, 770, 770, 773, 768)' - PASSED ssl_gtest.sh: #4362: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3621 (1, 770, 770, 773, 769)' - PASSED ssl_gtest.sh: #4363: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3622 (1, 770, 770, 773, 770)' - PASSED ssl_gtest.sh: #4364: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3623 (1, 770, 770, 773, 771)' - PASSED ssl_gtest.sh: #4365: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3624 (1, 770, 770, 773, 772)' - PASSED ssl_gtest.sh: #4366: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3625 (1, 770, 770, 773, 773)' - PASSED ssl_gtest.sh: #4367: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3626 (1, 770, 771, 767, 767)' - PASSED ssl_gtest.sh: #4368: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3627 (1, 770, 771, 767, 768)' - PASSED ssl_gtest.sh: #4369: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3628 (1, 770, 771, 767, 769)' - PASSED ssl_gtest.sh: #4370: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3629 (1, 770, 771, 767, 770)' - PASSED ssl_gtest.sh: #4371: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3630 (1, 770, 771, 767, 771)' - PASSED ssl_gtest.sh: #4372: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3631 (1, 770, 771, 767, 772)' - PASSED ssl_gtest.sh: #4373: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3632 (1, 770, 771, 767, 773)' - PASSED ssl_gtest.sh: #4374: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3633 (1, 770, 771, 768, 767)' - PASSED ssl_gtest.sh: #4375: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3634 (1, 770, 771, 768, 768)' - PASSED ssl_gtest.sh: #4376: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3635 (1, 770, 771, 768, 769)' - PASSED ssl_gtest.sh: #4377: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3636 (1, 770, 771, 768, 770)' - PASSED ssl_gtest.sh: #4378: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3637 (1, 770, 771, 768, 771)' - PASSED ssl_gtest.sh: #4379: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3638 (1, 770, 771, 768, 772)' - PASSED ssl_gtest.sh: #4380: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3639 (1, 770, 771, 768, 773)' - PASSED ssl_gtest.sh: #4381: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3640 (1, 770, 771, 769, 767)' - PASSED ssl_gtest.sh: #4382: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3641 (1, 770, 771, 769, 768)' - PASSED ssl_gtest.sh: #4383: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3642 (1, 770, 771, 769, 769)' - PASSED ssl_gtest.sh: #4384: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3643 (1, 770, 771, 769, 770)' - PASSED ssl_gtest.sh: #4385: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3644 (1, 770, 771, 769, 771)' - PASSED ssl_gtest.sh: #4386: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3645 (1, 770, 771, 769, 772)' - PASSED ssl_gtest.sh: #4387: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3646 (1, 770, 771, 769, 773)' - PASSED ssl_gtest.sh: #4388: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3647 (1, 770, 771, 770, 767)' - PASSED ssl_gtest.sh: #4389: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3648 (1, 770, 771, 770, 768)' - PASSED ssl_gtest.sh: #4390: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3649 (1, 770, 771, 770, 769)' - PASSED ssl_gtest.sh: #4391: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3650 (1, 770, 771, 770, 770)' - PASSED ssl_gtest.sh: #4392: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3651 (1, 770, 771, 770, 771)' - PASSED ssl_gtest.sh: #4393: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3652 (1, 770, 771, 770, 772)' - PASSED ssl_gtest.sh: #4394: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3653 (1, 770, 771, 770, 773)' - PASSED ssl_gtest.sh: #4395: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3654 (1, 770, 771, 771, 767)' - PASSED ssl_gtest.sh: #4396: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3655 (1, 770, 771, 771, 768)' - PASSED ssl_gtest.sh: #4397: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3656 (1, 770, 771, 771, 769)' - PASSED ssl_gtest.sh: #4398: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3657 (1, 770, 771, 771, 770)' - PASSED ssl_gtest.sh: #4399: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3658 (1, 770, 771, 771, 771)' - PASSED ssl_gtest.sh: #4400: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3659 (1, 770, 771, 771, 772)' - PASSED ssl_gtest.sh: #4401: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3660 (1, 770, 771, 771, 773)' - PASSED ssl_gtest.sh: #4402: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3661 (1, 770, 771, 772, 767)' - PASSED ssl_gtest.sh: #4403: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3662 (1, 770, 771, 772, 768)' - PASSED ssl_gtest.sh: #4404: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3663 (1, 770, 771, 772, 769)' - PASSED ssl_gtest.sh: #4405: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3664 (1, 770, 771, 772, 770)' - PASSED ssl_gtest.sh: #4406: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3665 (1, 770, 771, 772, 771)' - PASSED ssl_gtest.sh: #4407: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3666 (1, 770, 771, 772, 772)' - PASSED ssl_gtest.sh: #4408: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3667 (1, 770, 771, 772, 773)' - PASSED ssl_gtest.sh: #4409: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3668 (1, 770, 771, 773, 767)' - PASSED ssl_gtest.sh: #4410: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3669 (1, 770, 771, 773, 768)' - PASSED ssl_gtest.sh: #4411: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3670 (1, 770, 771, 773, 769)' - PASSED ssl_gtest.sh: #4412: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3671 (1, 770, 771, 773, 770)' - PASSED ssl_gtest.sh: #4413: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3672 (1, 770, 771, 773, 771)' - PASSED ssl_gtest.sh: #4414: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3673 (1, 770, 771, 773, 772)' - PASSED ssl_gtest.sh: #4415: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3674 (1, 770, 771, 773, 773)' - PASSED ssl_gtest.sh: #4416: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3675 (1, 770, 772, 767, 767)' - PASSED ssl_gtest.sh: #4417: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3676 (1, 770, 772, 767, 768)' - PASSED ssl_gtest.sh: #4418: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3677 (1, 770, 772, 767, 769)' - PASSED ssl_gtest.sh: #4419: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3678 (1, 770, 772, 767, 770)' - PASSED ssl_gtest.sh: #4420: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3679 (1, 770, 772, 767, 771)' - PASSED ssl_gtest.sh: #4421: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3680 (1, 770, 772, 767, 772)' - PASSED ssl_gtest.sh: #4422: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3681 (1, 770, 772, 767, 773)' - PASSED ssl_gtest.sh: #4423: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3682 (1, 770, 772, 768, 767)' - PASSED ssl_gtest.sh: #4424: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3683 (1, 770, 772, 768, 768)' - PASSED ssl_gtest.sh: #4425: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3684 (1, 770, 772, 768, 769)' - PASSED ssl_gtest.sh: #4426: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3685 (1, 770, 772, 768, 770)' - PASSED ssl_gtest.sh: #4427: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3686 (1, 770, 772, 768, 771)' - PASSED ssl_gtest.sh: #4428: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3687 (1, 770, 772, 768, 772)' - PASSED ssl_gtest.sh: #4429: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3688 (1, 770, 772, 768, 773)' - PASSED ssl_gtest.sh: #4430: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3689 (1, 770, 772, 769, 767)' - PASSED ssl_gtest.sh: #4431: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3690 (1, 770, 772, 769, 768)' - PASSED ssl_gtest.sh: #4432: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3691 (1, 770, 772, 769, 769)' - PASSED ssl_gtest.sh: #4433: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3692 (1, 770, 772, 769, 770)' - PASSED ssl_gtest.sh: #4434: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3693 (1, 770, 772, 769, 771)' - PASSED ssl_gtest.sh: #4435: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3694 (1, 770, 772, 769, 772)' - PASSED ssl_gtest.sh: #4436: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3695 (1, 770, 772, 769, 773)' - PASSED ssl_gtest.sh: #4437: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3696 (1, 770, 772, 770, 767)' - PASSED ssl_gtest.sh: #4438: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3697 (1, 770, 772, 770, 768)' - PASSED ssl_gtest.sh: #4439: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3698 (1, 770, 772, 770, 769)' - PASSED ssl_gtest.sh: #4440: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3699 (1, 770, 772, 770, 770)' - PASSED ssl_gtest.sh: #4441: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3700 (1, 770, 772, 770, 771)' - PASSED ssl_gtest.sh: #4442: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3701 (1, 770, 772, 770, 772)' - PASSED ssl_gtest.sh: #4443: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3702 (1, 770, 772, 770, 773)' - PASSED ssl_gtest.sh: #4444: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3703 (1, 770, 772, 771, 767)' - PASSED ssl_gtest.sh: #4445: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3704 (1, 770, 772, 771, 768)' - PASSED ssl_gtest.sh: #4446: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3705 (1, 770, 772, 771, 769)' - PASSED ssl_gtest.sh: #4447: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3706 (1, 770, 772, 771, 770)' - PASSED ssl_gtest.sh: #4448: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3707 (1, 770, 772, 771, 771)' - PASSED ssl_gtest.sh: #4449: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3708 (1, 770, 772, 771, 772)' - PASSED ssl_gtest.sh: #4450: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3709 (1, 770, 772, 771, 773)' - PASSED ssl_gtest.sh: #4451: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3710 (1, 770, 772, 772, 767)' - PASSED ssl_gtest.sh: #4452: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3711 (1, 770, 772, 772, 768)' - PASSED ssl_gtest.sh: #4453: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3712 (1, 770, 772, 772, 769)' - PASSED ssl_gtest.sh: #4454: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3713 (1, 770, 772, 772, 770)' - PASSED ssl_gtest.sh: #4455: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3714 (1, 770, 772, 772, 771)' - PASSED ssl_gtest.sh: #4456: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3715 (1, 770, 772, 772, 772)' - PASSED ssl_gtest.sh: #4457: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3716 (1, 770, 772, 772, 773)' - PASSED ssl_gtest.sh: #4458: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3717 (1, 770, 772, 773, 767)' - PASSED ssl_gtest.sh: #4459: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3718 (1, 770, 772, 773, 768)' - PASSED ssl_gtest.sh: #4460: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3719 (1, 770, 772, 773, 769)' - PASSED ssl_gtest.sh: #4461: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3720 (1, 770, 772, 773, 770)' - PASSED ssl_gtest.sh: #4462: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3721 (1, 770, 772, 773, 771)' - PASSED ssl_gtest.sh: #4463: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3722 (1, 770, 772, 773, 772)' - PASSED ssl_gtest.sh: #4464: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3723 (1, 770, 772, 773, 773)' - PASSED ssl_gtest.sh: #4465: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3724 (1, 770, 773, 767, 767)' - PASSED ssl_gtest.sh: #4466: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3725 (1, 770, 773, 767, 768)' - PASSED ssl_gtest.sh: #4467: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3726 (1, 770, 773, 767, 769)' - PASSED ssl_gtest.sh: #4468: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3727 (1, 770, 773, 767, 770)' - PASSED ssl_gtest.sh: #4469: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3728 (1, 770, 773, 767, 771)' - PASSED ssl_gtest.sh: #4470: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3729 (1, 770, 773, 767, 772)' - PASSED ssl_gtest.sh: #4471: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3730 (1, 770, 773, 767, 773)' - PASSED ssl_gtest.sh: #4472: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3731 (1, 770, 773, 768, 767)' - PASSED ssl_gtest.sh: #4473: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3732 (1, 770, 773, 768, 768)' - PASSED ssl_gtest.sh: #4474: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3733 (1, 770, 773, 768, 769)' - PASSED ssl_gtest.sh: #4475: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3734 (1, 770, 773, 768, 770)' - PASSED ssl_gtest.sh: #4476: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3735 (1, 770, 773, 768, 771)' - PASSED ssl_gtest.sh: #4477: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3736 (1, 770, 773, 768, 772)' - PASSED ssl_gtest.sh: #4478: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3737 (1, 770, 773, 768, 773)' - PASSED ssl_gtest.sh: #4479: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3738 (1, 770, 773, 769, 767)' - PASSED ssl_gtest.sh: #4480: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3739 (1, 770, 773, 769, 768)' - PASSED ssl_gtest.sh: #4481: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3740 (1, 770, 773, 769, 769)' - PASSED ssl_gtest.sh: #4482: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3741 (1, 770, 773, 769, 770)' - PASSED ssl_gtest.sh: #4483: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3742 (1, 770, 773, 769, 771)' - PASSED ssl_gtest.sh: #4484: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3743 (1, 770, 773, 769, 772)' - PASSED ssl_gtest.sh: #4485: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3744 (1, 770, 773, 769, 773)' - PASSED ssl_gtest.sh: #4486: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3745 (1, 770, 773, 770, 767)' - PASSED ssl_gtest.sh: #4487: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3746 (1, 770, 773, 770, 768)' - PASSED ssl_gtest.sh: #4488: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3747 (1, 770, 773, 770, 769)' - PASSED ssl_gtest.sh: #4489: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3748 (1, 770, 773, 770, 770)' - PASSED ssl_gtest.sh: #4490: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3749 (1, 770, 773, 770, 771)' - PASSED ssl_gtest.sh: #4491: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3750 (1, 770, 773, 770, 772)' - PASSED ssl_gtest.sh: #4492: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3751 (1, 770, 773, 770, 773)' - PASSED ssl_gtest.sh: #4493: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3752 (1, 770, 773, 771, 767)' - PASSED ssl_gtest.sh: #4494: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3753 (1, 770, 773, 771, 768)' - PASSED ssl_gtest.sh: #4495: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3754 (1, 770, 773, 771, 769)' - PASSED ssl_gtest.sh: #4496: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3755 (1, 770, 773, 771, 770)' - PASSED ssl_gtest.sh: #4497: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3756 (1, 770, 773, 771, 771)' - PASSED ssl_gtest.sh: #4498: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3757 (1, 770, 773, 771, 772)' - PASSED ssl_gtest.sh: #4499: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3758 (1, 770, 773, 771, 773)' - PASSED ssl_gtest.sh: #4500: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3759 (1, 770, 773, 772, 767)' - PASSED ssl_gtest.sh: #4501: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3760 (1, 770, 773, 772, 768)' - PASSED ssl_gtest.sh: #4502: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3761 (1, 770, 773, 772, 769)' - PASSED ssl_gtest.sh: #4503: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3762 (1, 770, 773, 772, 770)' - PASSED ssl_gtest.sh: #4504: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3763 (1, 770, 773, 772, 771)' - PASSED ssl_gtest.sh: #4505: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3764 (1, 770, 773, 772, 772)' - PASSED ssl_gtest.sh: #4506: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3765 (1, 770, 773, 772, 773)' - PASSED ssl_gtest.sh: #4507: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3766 (1, 770, 773, 773, 767)' - PASSED ssl_gtest.sh: #4508: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3767 (1, 770, 773, 773, 768)' - PASSED ssl_gtest.sh: #4509: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3768 (1, 770, 773, 773, 769)' - PASSED ssl_gtest.sh: #4510: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3769 (1, 770, 773, 773, 770)' - PASSED ssl_gtest.sh: #4511: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3770 (1, 770, 773, 773, 771)' - PASSED ssl_gtest.sh: #4512: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3771 (1, 770, 773, 773, 772)' - PASSED ssl_gtest.sh: #4513: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3772 (1, 770, 773, 773, 773)' - PASSED ssl_gtest.sh: #4514: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3773 (1, 771, 767, 767, 767)' - PASSED ssl_gtest.sh: #4515: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3774 (1, 771, 767, 767, 768)' - PASSED ssl_gtest.sh: #4516: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3775 (1, 771, 767, 767, 769)' - PASSED ssl_gtest.sh: #4517: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3776 (1, 771, 767, 767, 770)' - PASSED ssl_gtest.sh: #4518: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3777 (1, 771, 767, 767, 771)' - PASSED ssl_gtest.sh: #4519: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3778 (1, 771, 767, 767, 772)' - PASSED ssl_gtest.sh: #4520: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3779 (1, 771, 767, 767, 773)' - PASSED ssl_gtest.sh: #4521: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3780 (1, 771, 767, 768, 767)' - PASSED ssl_gtest.sh: #4522: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3781 (1, 771, 767, 768, 768)' - PASSED ssl_gtest.sh: #4523: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3782 (1, 771, 767, 768, 769)' - PASSED ssl_gtest.sh: #4524: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3783 (1, 771, 767, 768, 770)' - PASSED ssl_gtest.sh: #4525: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3784 (1, 771, 767, 768, 771)' - PASSED ssl_gtest.sh: #4526: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3785 (1, 771, 767, 768, 772)' - PASSED ssl_gtest.sh: #4527: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3786 (1, 771, 767, 768, 773)' - PASSED ssl_gtest.sh: #4528: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3787 (1, 771, 767, 769, 767)' - PASSED ssl_gtest.sh: #4529: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3788 (1, 771, 767, 769, 768)' - PASSED ssl_gtest.sh: #4530: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3789 (1, 771, 767, 769, 769)' - PASSED ssl_gtest.sh: #4531: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3790 (1, 771, 767, 769, 770)' - PASSED ssl_gtest.sh: #4532: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3791 (1, 771, 767, 769, 771)' - PASSED ssl_gtest.sh: #4533: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3792 (1, 771, 767, 769, 772)' - PASSED ssl_gtest.sh: #4534: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3793 (1, 771, 767, 769, 773)' - PASSED ssl_gtest.sh: #4535: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3794 (1, 771, 767, 770, 767)' - PASSED ssl_gtest.sh: #4536: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3795 (1, 771, 767, 770, 768)' - PASSED ssl_gtest.sh: #4537: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3796 (1, 771, 767, 770, 769)' - PASSED ssl_gtest.sh: #4538: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3797 (1, 771, 767, 770, 770)' - PASSED ssl_gtest.sh: #4539: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3798 (1, 771, 767, 770, 771)' - PASSED ssl_gtest.sh: #4540: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3799 (1, 771, 767, 770, 772)' - PASSED ssl_gtest.sh: #4541: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3800 (1, 771, 767, 770, 773)' - PASSED ssl_gtest.sh: #4542: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3801 (1, 771, 767, 771, 767)' - PASSED ssl_gtest.sh: #4543: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3802 (1, 771, 767, 771, 768)' - PASSED ssl_gtest.sh: #4544: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3803 (1, 771, 767, 771, 769)' - PASSED ssl_gtest.sh: #4545: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3804 (1, 771, 767, 771, 770)' - PASSED ssl_gtest.sh: #4546: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3805 (1, 771, 767, 771, 771)' - PASSED ssl_gtest.sh: #4547: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3806 (1, 771, 767, 771, 772)' - PASSED ssl_gtest.sh: #4548: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3807 (1, 771, 767, 771, 773)' - PASSED ssl_gtest.sh: #4549: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3808 (1, 771, 767, 772, 767)' - PASSED ssl_gtest.sh: #4550: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3809 (1, 771, 767, 772, 768)' - PASSED ssl_gtest.sh: #4551: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3810 (1, 771, 767, 772, 769)' - PASSED ssl_gtest.sh: #4552: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3811 (1, 771, 767, 772, 770)' - PASSED ssl_gtest.sh: #4553: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3812 (1, 771, 767, 772, 771)' - PASSED ssl_gtest.sh: #4554: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3813 (1, 771, 767, 772, 772)' - PASSED ssl_gtest.sh: #4555: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3814 (1, 771, 767, 772, 773)' - PASSED ssl_gtest.sh: #4556: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3815 (1, 771, 767, 773, 767)' - PASSED ssl_gtest.sh: #4557: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3816 (1, 771, 767, 773, 768)' - PASSED ssl_gtest.sh: #4558: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3817 (1, 771, 767, 773, 769)' - PASSED ssl_gtest.sh: #4559: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3818 (1, 771, 767, 773, 770)' - PASSED ssl_gtest.sh: #4560: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3819 (1, 771, 767, 773, 771)' - PASSED ssl_gtest.sh: #4561: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3820 (1, 771, 767, 773, 772)' - PASSED ssl_gtest.sh: #4562: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3821 (1, 771, 767, 773, 773)' - PASSED ssl_gtest.sh: #4563: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3822 (1, 771, 768, 767, 767)' - PASSED ssl_gtest.sh: #4564: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3823 (1, 771, 768, 767, 768)' - PASSED ssl_gtest.sh: #4565: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3824 (1, 771, 768, 767, 769)' - PASSED ssl_gtest.sh: #4566: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3825 (1, 771, 768, 767, 770)' - PASSED ssl_gtest.sh: #4567: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3826 (1, 771, 768, 767, 771)' - PASSED ssl_gtest.sh: #4568: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3827 (1, 771, 768, 767, 772)' - PASSED ssl_gtest.sh: #4569: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3828 (1, 771, 768, 767, 773)' - PASSED ssl_gtest.sh: #4570: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3829 (1, 771, 768, 768, 767)' - PASSED ssl_gtest.sh: #4571: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3830 (1, 771, 768, 768, 768)' - PASSED ssl_gtest.sh: #4572: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3831 (1, 771, 768, 768, 769)' - PASSED ssl_gtest.sh: #4573: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3832 (1, 771, 768, 768, 770)' - PASSED ssl_gtest.sh: #4574: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3833 (1, 771, 768, 768, 771)' - PASSED ssl_gtest.sh: #4575: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3834 (1, 771, 768, 768, 772)' - PASSED ssl_gtest.sh: #4576: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3835 (1, 771, 768, 768, 773)' - PASSED ssl_gtest.sh: #4577: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3836 (1, 771, 768, 769, 767)' - PASSED ssl_gtest.sh: #4578: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3837 (1, 771, 768, 769, 768)' - PASSED ssl_gtest.sh: #4579: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3838 (1, 771, 768, 769, 769)' - PASSED ssl_gtest.sh: #4580: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3839 (1, 771, 768, 769, 770)' - PASSED ssl_gtest.sh: #4581: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3840 (1, 771, 768, 769, 771)' - PASSED ssl_gtest.sh: #4582: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3841 (1, 771, 768, 769, 772)' - PASSED ssl_gtest.sh: #4583: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3842 (1, 771, 768, 769, 773)' - PASSED ssl_gtest.sh: #4584: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3843 (1, 771, 768, 770, 767)' - PASSED ssl_gtest.sh: #4585: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3844 (1, 771, 768, 770, 768)' - PASSED ssl_gtest.sh: #4586: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3845 (1, 771, 768, 770, 769)' - PASSED ssl_gtest.sh: #4587: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3846 (1, 771, 768, 770, 770)' - PASSED ssl_gtest.sh: #4588: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3847 (1, 771, 768, 770, 771)' - PASSED ssl_gtest.sh: #4589: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3848 (1, 771, 768, 770, 772)' - PASSED ssl_gtest.sh: #4590: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3849 (1, 771, 768, 770, 773)' - PASSED ssl_gtest.sh: #4591: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3850 (1, 771, 768, 771, 767)' - PASSED ssl_gtest.sh: #4592: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3851 (1, 771, 768, 771, 768)' - PASSED ssl_gtest.sh: #4593: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3852 (1, 771, 768, 771, 769)' - PASSED ssl_gtest.sh: #4594: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3853 (1, 771, 768, 771, 770)' - PASSED ssl_gtest.sh: #4595: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3854 (1, 771, 768, 771, 771)' - PASSED ssl_gtest.sh: #4596: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3855 (1, 771, 768, 771, 772)' - PASSED ssl_gtest.sh: #4597: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3856 (1, 771, 768, 771, 773)' - PASSED ssl_gtest.sh: #4598: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3857 (1, 771, 768, 772, 767)' - PASSED ssl_gtest.sh: #4599: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3858 (1, 771, 768, 772, 768)' - PASSED ssl_gtest.sh: #4600: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3859 (1, 771, 768, 772, 769)' - PASSED ssl_gtest.sh: #4601: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3860 (1, 771, 768, 772, 770)' - PASSED ssl_gtest.sh: #4602: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3861 (1, 771, 768, 772, 771)' - PASSED ssl_gtest.sh: #4603: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3862 (1, 771, 768, 772, 772)' - PASSED ssl_gtest.sh: #4604: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3863 (1, 771, 768, 772, 773)' - PASSED ssl_gtest.sh: #4605: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3864 (1, 771, 768, 773, 767)' - PASSED ssl_gtest.sh: #4606: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3865 (1, 771, 768, 773, 768)' - PASSED ssl_gtest.sh: #4607: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3866 (1, 771, 768, 773, 769)' - PASSED ssl_gtest.sh: #4608: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3867 (1, 771, 768, 773, 770)' - PASSED ssl_gtest.sh: #4609: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3868 (1, 771, 768, 773, 771)' - PASSED ssl_gtest.sh: #4610: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3869 (1, 771, 768, 773, 772)' - PASSED ssl_gtest.sh: #4611: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3870 (1, 771, 768, 773, 773)' - PASSED ssl_gtest.sh: #4612: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3871 (1, 771, 769, 767, 767)' - PASSED ssl_gtest.sh: #4613: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3872 (1, 771, 769, 767, 768)' - PASSED ssl_gtest.sh: #4614: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3873 (1, 771, 769, 767, 769)' - PASSED ssl_gtest.sh: #4615: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3874 (1, 771, 769, 767, 770)' - PASSED ssl_gtest.sh: #4616: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3875 (1, 771, 769, 767, 771)' - PASSED ssl_gtest.sh: #4617: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3876 (1, 771, 769, 767, 772)' - PASSED ssl_gtest.sh: #4618: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3877 (1, 771, 769, 767, 773)' - PASSED ssl_gtest.sh: #4619: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3878 (1, 771, 769, 768, 767)' - PASSED ssl_gtest.sh: #4620: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3879 (1, 771, 769, 768, 768)' - PASSED ssl_gtest.sh: #4621: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3880 (1, 771, 769, 768, 769)' - PASSED ssl_gtest.sh: #4622: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3881 (1, 771, 769, 768, 770)' - PASSED ssl_gtest.sh: #4623: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3882 (1, 771, 769, 768, 771)' - PASSED ssl_gtest.sh: #4624: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3883 (1, 771, 769, 768, 772)' - PASSED ssl_gtest.sh: #4625: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3884 (1, 771, 769, 768, 773)' - PASSED ssl_gtest.sh: #4626: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3885 (1, 771, 769, 769, 767)' - PASSED ssl_gtest.sh: #4627: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3886 (1, 771, 769, 769, 768)' - PASSED ssl_gtest.sh: #4628: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3887 (1, 771, 769, 769, 769)' - PASSED ssl_gtest.sh: #4629: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3888 (1, 771, 769, 769, 770)' - PASSED ssl_gtest.sh: #4630: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3889 (1, 771, 769, 769, 771)' - PASSED ssl_gtest.sh: #4631: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3890 (1, 771, 769, 769, 772)' - PASSED ssl_gtest.sh: #4632: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3891 (1, 771, 769, 769, 773)' - PASSED ssl_gtest.sh: #4633: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3892 (1, 771, 769, 770, 767)' - PASSED ssl_gtest.sh: #4634: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3893 (1, 771, 769, 770, 768)' - PASSED ssl_gtest.sh: #4635: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3894 (1, 771, 769, 770, 769)' - PASSED ssl_gtest.sh: #4636: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3895 (1, 771, 769, 770, 770)' - PASSED ssl_gtest.sh: #4637: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3896 (1, 771, 769, 770, 771)' - PASSED ssl_gtest.sh: #4638: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3897 (1, 771, 769, 770, 772)' - PASSED ssl_gtest.sh: #4639: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3898 (1, 771, 769, 770, 773)' - PASSED ssl_gtest.sh: #4640: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3899 (1, 771, 769, 771, 767)' - PASSED ssl_gtest.sh: #4641: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3900 (1, 771, 769, 771, 768)' - PASSED ssl_gtest.sh: #4642: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3901 (1, 771, 769, 771, 769)' - PASSED ssl_gtest.sh: #4643: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3902 (1, 771, 769, 771, 770)' - PASSED ssl_gtest.sh: #4644: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3903 (1, 771, 769, 771, 771)' - PASSED ssl_gtest.sh: #4645: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3904 (1, 771, 769, 771, 772)' - PASSED ssl_gtest.sh: #4646: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3905 (1, 771, 769, 771, 773)' - PASSED ssl_gtest.sh: #4647: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3906 (1, 771, 769, 772, 767)' - PASSED ssl_gtest.sh: #4648: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3907 (1, 771, 769, 772, 768)' - PASSED ssl_gtest.sh: #4649: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3908 (1, 771, 769, 772, 769)' - PASSED ssl_gtest.sh: #4650: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3909 (1, 771, 769, 772, 770)' - PASSED ssl_gtest.sh: #4651: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3910 (1, 771, 769, 772, 771)' - PASSED ssl_gtest.sh: #4652: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3911 (1, 771, 769, 772, 772)' - PASSED ssl_gtest.sh: #4653: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3912 (1, 771, 769, 772, 773)' - PASSED ssl_gtest.sh: #4654: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3913 (1, 771, 769, 773, 767)' - PASSED ssl_gtest.sh: #4655: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3914 (1, 771, 769, 773, 768)' - PASSED ssl_gtest.sh: #4656: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3915 (1, 771, 769, 773, 769)' - PASSED ssl_gtest.sh: #4657: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3916 (1, 771, 769, 773, 770)' - PASSED ssl_gtest.sh: #4658: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3917 (1, 771, 769, 773, 771)' - PASSED ssl_gtest.sh: #4659: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3918 (1, 771, 769, 773, 772)' - PASSED ssl_gtest.sh: #4660: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3919 (1, 771, 769, 773, 773)' - PASSED ssl_gtest.sh: #4661: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3920 (1, 771, 770, 767, 767)' - PASSED ssl_gtest.sh: #4662: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3921 (1, 771, 770, 767, 768)' - PASSED ssl_gtest.sh: #4663: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3922 (1, 771, 770, 767, 769)' - PASSED ssl_gtest.sh: #4664: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3923 (1, 771, 770, 767, 770)' - PASSED ssl_gtest.sh: #4665: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3924 (1, 771, 770, 767, 771)' - PASSED ssl_gtest.sh: #4666: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3925 (1, 771, 770, 767, 772)' - PASSED ssl_gtest.sh: #4667: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3926 (1, 771, 770, 767, 773)' - PASSED ssl_gtest.sh: #4668: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3927 (1, 771, 770, 768, 767)' - PASSED ssl_gtest.sh: #4669: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3928 (1, 771, 770, 768, 768)' - PASSED ssl_gtest.sh: #4670: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3929 (1, 771, 770, 768, 769)' - PASSED ssl_gtest.sh: #4671: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3930 (1, 771, 770, 768, 770)' - PASSED ssl_gtest.sh: #4672: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3931 (1, 771, 770, 768, 771)' - PASSED ssl_gtest.sh: #4673: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3932 (1, 771, 770, 768, 772)' - PASSED ssl_gtest.sh: #4674: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3933 (1, 771, 770, 768, 773)' - PASSED ssl_gtest.sh: #4675: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3934 (1, 771, 770, 769, 767)' - PASSED ssl_gtest.sh: #4676: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3935 (1, 771, 770, 769, 768)' - PASSED ssl_gtest.sh: #4677: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3936 (1, 771, 770, 769, 769)' - PASSED ssl_gtest.sh: #4678: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3937 (1, 771, 770, 769, 770)' - PASSED ssl_gtest.sh: #4679: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3938 (1, 771, 770, 769, 771)' - PASSED ssl_gtest.sh: #4680: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3939 (1, 771, 770, 769, 772)' - PASSED ssl_gtest.sh: #4681: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3940 (1, 771, 770, 769, 773)' - PASSED ssl_gtest.sh: #4682: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3941 (1, 771, 770, 770, 767)' - PASSED ssl_gtest.sh: #4683: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3942 (1, 771, 770, 770, 768)' - PASSED ssl_gtest.sh: #4684: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3943 (1, 771, 770, 770, 769)' - PASSED ssl_gtest.sh: #4685: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3944 (1, 771, 770, 770, 770)' - PASSED ssl_gtest.sh: #4686: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3945 (1, 771, 770, 770, 771)' - PASSED ssl_gtest.sh: #4687: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3946 (1, 771, 770, 770, 772)' - PASSED ssl_gtest.sh: #4688: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3947 (1, 771, 770, 770, 773)' - PASSED ssl_gtest.sh: #4689: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3948 (1, 771, 770, 771, 767)' - PASSED ssl_gtest.sh: #4690: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3949 (1, 771, 770, 771, 768)' - PASSED ssl_gtest.sh: #4691: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3950 (1, 771, 770, 771, 769)' - PASSED ssl_gtest.sh: #4692: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3951 (1, 771, 770, 771, 770)' - PASSED ssl_gtest.sh: #4693: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3952 (1, 771, 770, 771, 771)' - PASSED ssl_gtest.sh: #4694: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3953 (1, 771, 770, 771, 772)' - PASSED ssl_gtest.sh: #4695: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3954 (1, 771, 770, 771, 773)' - PASSED ssl_gtest.sh: #4696: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3955 (1, 771, 770, 772, 767)' - PASSED ssl_gtest.sh: #4697: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3956 (1, 771, 770, 772, 768)' - PASSED ssl_gtest.sh: #4698: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3957 (1, 771, 770, 772, 769)' - PASSED ssl_gtest.sh: #4699: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3958 (1, 771, 770, 772, 770)' - PASSED ssl_gtest.sh: #4700: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3959 (1, 771, 770, 772, 771)' - PASSED ssl_gtest.sh: #4701: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3960 (1, 771, 770, 772, 772)' - PASSED ssl_gtest.sh: #4702: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3961 (1, 771, 770, 772, 773)' - PASSED ssl_gtest.sh: #4703: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3962 (1, 771, 770, 773, 767)' - PASSED ssl_gtest.sh: #4704: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3963 (1, 771, 770, 773, 768)' - PASSED ssl_gtest.sh: #4705: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3964 (1, 771, 770, 773, 769)' - PASSED ssl_gtest.sh: #4706: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3965 (1, 771, 770, 773, 770)' - PASSED ssl_gtest.sh: #4707: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3966 (1, 771, 770, 773, 771)' - PASSED ssl_gtest.sh: #4708: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3967 (1, 771, 770, 773, 772)' - PASSED ssl_gtest.sh: #4709: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3968 (1, 771, 770, 773, 773)' - PASSED ssl_gtest.sh: #4710: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3969 (1, 771, 771, 767, 767)' - PASSED ssl_gtest.sh: #4711: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3970 (1, 771, 771, 767, 768)' - PASSED ssl_gtest.sh: #4712: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3971 (1, 771, 771, 767, 769)' - PASSED ssl_gtest.sh: #4713: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3972 (1, 771, 771, 767, 770)' - PASSED ssl_gtest.sh: #4714: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3973 (1, 771, 771, 767, 771)' - PASSED ssl_gtest.sh: #4715: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3974 (1, 771, 771, 767, 772)' - PASSED ssl_gtest.sh: #4716: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3975 (1, 771, 771, 767, 773)' - PASSED ssl_gtest.sh: #4717: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3976 (1, 771, 771, 768, 767)' - PASSED ssl_gtest.sh: #4718: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3977 (1, 771, 771, 768, 768)' - PASSED ssl_gtest.sh: #4719: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3978 (1, 771, 771, 768, 769)' - PASSED ssl_gtest.sh: #4720: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3979 (1, 771, 771, 768, 770)' - PASSED ssl_gtest.sh: #4721: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3980 (1, 771, 771, 768, 771)' - PASSED ssl_gtest.sh: #4722: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3981 (1, 771, 771, 768, 772)' - PASSED ssl_gtest.sh: #4723: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3982 (1, 771, 771, 768, 773)' - PASSED ssl_gtest.sh: #4724: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3983 (1, 771, 771, 769, 767)' - PASSED ssl_gtest.sh: #4725: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3984 (1, 771, 771, 769, 768)' - PASSED ssl_gtest.sh: #4726: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3985 (1, 771, 771, 769, 769)' - PASSED ssl_gtest.sh: #4727: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3986 (1, 771, 771, 769, 770)' - PASSED ssl_gtest.sh: #4728: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3987 (1, 771, 771, 769, 771)' - PASSED ssl_gtest.sh: #4729: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3988 (1, 771, 771, 769, 772)' - PASSED ssl_gtest.sh: #4730: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3989 (1, 771, 771, 769, 773)' - PASSED ssl_gtest.sh: #4731: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3990 (1, 771, 771, 770, 767)' - PASSED ssl_gtest.sh: #4732: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3991 (1, 771, 771, 770, 768)' - PASSED ssl_gtest.sh: #4733: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3992 (1, 771, 771, 770, 769)' - PASSED ssl_gtest.sh: #4734: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3993 (1, 771, 771, 770, 770)' - PASSED ssl_gtest.sh: #4735: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3994 (1, 771, 771, 770, 771)' - PASSED ssl_gtest.sh: #4736: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3995 (1, 771, 771, 770, 772)' - PASSED ssl_gtest.sh: #4737: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3996 (1, 771, 771, 770, 773)' - PASSED ssl_gtest.sh: #4738: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3997 (1, 771, 771, 771, 767)' - PASSED ssl_gtest.sh: #4739: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3998 (1, 771, 771, 771, 768)' - PASSED ssl_gtest.sh: #4740: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/3999 (1, 771, 771, 771, 769)' - PASSED ssl_gtest.sh: #4741: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4000 (1, 771, 771, 771, 770)' - PASSED ssl_gtest.sh: #4742: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4001 (1, 771, 771, 771, 771)' - PASSED ssl_gtest.sh: #4743: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4002 (1, 771, 771, 771, 772)' - PASSED ssl_gtest.sh: #4744: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4003 (1, 771, 771, 771, 773)' - PASSED ssl_gtest.sh: #4745: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4004 (1, 771, 771, 772, 767)' - PASSED ssl_gtest.sh: #4746: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4005 (1, 771, 771, 772, 768)' - PASSED ssl_gtest.sh: #4747: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4006 (1, 771, 771, 772, 769)' - PASSED ssl_gtest.sh: #4748: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4007 (1, 771, 771, 772, 770)' - PASSED ssl_gtest.sh: #4749: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4008 (1, 771, 771, 772, 771)' - PASSED ssl_gtest.sh: #4750: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4009 (1, 771, 771, 772, 772)' - PASSED ssl_gtest.sh: #4751: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4010 (1, 771, 771, 772, 773)' - PASSED ssl_gtest.sh: #4752: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4011 (1, 771, 771, 773, 767)' - PASSED ssl_gtest.sh: #4753: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4012 (1, 771, 771, 773, 768)' - PASSED ssl_gtest.sh: #4754: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4013 (1, 771, 771, 773, 769)' - PASSED ssl_gtest.sh: #4755: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4014 (1, 771, 771, 773, 770)' - PASSED ssl_gtest.sh: #4756: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4015 (1, 771, 771, 773, 771)' - PASSED ssl_gtest.sh: #4757: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4016 (1, 771, 771, 773, 772)' - PASSED ssl_gtest.sh: #4758: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4017 (1, 771, 771, 773, 773)' - PASSED ssl_gtest.sh: #4759: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4018 (1, 771, 772, 767, 767)' - PASSED ssl_gtest.sh: #4760: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4019 (1, 771, 772, 767, 768)' - PASSED ssl_gtest.sh: #4761: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4020 (1, 771, 772, 767, 769)' - PASSED ssl_gtest.sh: #4762: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4021 (1, 771, 772, 767, 770)' - PASSED ssl_gtest.sh: #4763: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4022 (1, 771, 772, 767, 771)' - PASSED ssl_gtest.sh: #4764: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4023 (1, 771, 772, 767, 772)' - PASSED ssl_gtest.sh: #4765: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4024 (1, 771, 772, 767, 773)' - PASSED ssl_gtest.sh: #4766: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4025 (1, 771, 772, 768, 767)' - PASSED ssl_gtest.sh: #4767: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4026 (1, 771, 772, 768, 768)' - PASSED ssl_gtest.sh: #4768: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4027 (1, 771, 772, 768, 769)' - PASSED ssl_gtest.sh: #4769: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4028 (1, 771, 772, 768, 770)' - PASSED ssl_gtest.sh: #4770: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4029 (1, 771, 772, 768, 771)' - PASSED ssl_gtest.sh: #4771: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4030 (1, 771, 772, 768, 772)' - PASSED ssl_gtest.sh: #4772: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4031 (1, 771, 772, 768, 773)' - PASSED ssl_gtest.sh: #4773: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4032 (1, 771, 772, 769, 767)' - PASSED ssl_gtest.sh: #4774: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4033 (1, 771, 772, 769, 768)' - PASSED ssl_gtest.sh: #4775: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4034 (1, 771, 772, 769, 769)' - PASSED ssl_gtest.sh: #4776: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4035 (1, 771, 772, 769, 770)' - PASSED ssl_gtest.sh: #4777: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4036 (1, 771, 772, 769, 771)' - PASSED ssl_gtest.sh: #4778: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4037 (1, 771, 772, 769, 772)' - PASSED ssl_gtest.sh: #4779: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4038 (1, 771, 772, 769, 773)' - PASSED ssl_gtest.sh: #4780: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4039 (1, 771, 772, 770, 767)' - PASSED ssl_gtest.sh: #4781: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4040 (1, 771, 772, 770, 768)' - PASSED ssl_gtest.sh: #4782: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4041 (1, 771, 772, 770, 769)' - PASSED ssl_gtest.sh: #4783: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4042 (1, 771, 772, 770, 770)' - PASSED ssl_gtest.sh: #4784: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4043 (1, 771, 772, 770, 771)' - PASSED ssl_gtest.sh: #4785: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4044 (1, 771, 772, 770, 772)' - PASSED ssl_gtest.sh: #4786: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4045 (1, 771, 772, 770, 773)' - PASSED ssl_gtest.sh: #4787: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4046 (1, 771, 772, 771, 767)' - PASSED ssl_gtest.sh: #4788: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4047 (1, 771, 772, 771, 768)' - PASSED ssl_gtest.sh: #4789: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4048 (1, 771, 772, 771, 769)' - PASSED ssl_gtest.sh: #4790: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4049 (1, 771, 772, 771, 770)' - PASSED ssl_gtest.sh: #4791: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4050 (1, 771, 772, 771, 771)' - PASSED ssl_gtest.sh: #4792: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4051 (1, 771, 772, 771, 772)' - PASSED ssl_gtest.sh: #4793: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4052 (1, 771, 772, 771, 773)' - PASSED ssl_gtest.sh: #4794: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4053 (1, 771, 772, 772, 767)' - PASSED ssl_gtest.sh: #4795: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4054 (1, 771, 772, 772, 768)' - PASSED ssl_gtest.sh: #4796: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4055 (1, 771, 772, 772, 769)' - PASSED ssl_gtest.sh: #4797: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4056 (1, 771, 772, 772, 770)' - PASSED ssl_gtest.sh: #4798: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4057 (1, 771, 772, 772, 771)' - PASSED ssl_gtest.sh: #4799: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4058 (1, 771, 772, 772, 772)' - PASSED ssl_gtest.sh: #4800: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4059 (1, 771, 772, 772, 773)' - PASSED ssl_gtest.sh: #4801: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4060 (1, 771, 772, 773, 767)' - PASSED ssl_gtest.sh: #4802: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4061 (1, 771, 772, 773, 768)' - PASSED ssl_gtest.sh: #4803: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4062 (1, 771, 772, 773, 769)' - PASSED ssl_gtest.sh: #4804: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4063 (1, 771, 772, 773, 770)' - PASSED ssl_gtest.sh: #4805: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4064 (1, 771, 772, 773, 771)' - PASSED ssl_gtest.sh: #4806: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4065 (1, 771, 772, 773, 772)' - PASSED ssl_gtest.sh: #4807: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4066 (1, 771, 772, 773, 773)' - PASSED ssl_gtest.sh: #4808: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4067 (1, 771, 773, 767, 767)' - PASSED ssl_gtest.sh: #4809: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4068 (1, 771, 773, 767, 768)' - PASSED ssl_gtest.sh: #4810: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4069 (1, 771, 773, 767, 769)' - PASSED ssl_gtest.sh: #4811: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4070 (1, 771, 773, 767, 770)' - PASSED ssl_gtest.sh: #4812: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4071 (1, 771, 773, 767, 771)' - PASSED ssl_gtest.sh: #4813: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4072 (1, 771, 773, 767, 772)' - PASSED ssl_gtest.sh: #4814: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4073 (1, 771, 773, 767, 773)' - PASSED ssl_gtest.sh: #4815: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4074 (1, 771, 773, 768, 767)' - PASSED ssl_gtest.sh: #4816: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4075 (1, 771, 773, 768, 768)' - PASSED ssl_gtest.sh: #4817: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4076 (1, 771, 773, 768, 769)' - PASSED ssl_gtest.sh: #4818: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4077 (1, 771, 773, 768, 770)' - PASSED ssl_gtest.sh: #4819: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4078 (1, 771, 773, 768, 771)' - PASSED ssl_gtest.sh: #4820: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4079 (1, 771, 773, 768, 772)' - PASSED ssl_gtest.sh: #4821: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4080 (1, 771, 773, 768, 773)' - PASSED ssl_gtest.sh: #4822: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4081 (1, 771, 773, 769, 767)' - PASSED ssl_gtest.sh: #4823: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4082 (1, 771, 773, 769, 768)' - PASSED ssl_gtest.sh: #4824: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4083 (1, 771, 773, 769, 769)' - PASSED ssl_gtest.sh: #4825: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4084 (1, 771, 773, 769, 770)' - PASSED ssl_gtest.sh: #4826: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4085 (1, 771, 773, 769, 771)' - PASSED ssl_gtest.sh: #4827: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4086 (1, 771, 773, 769, 772)' - PASSED ssl_gtest.sh: #4828: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4087 (1, 771, 773, 769, 773)' - PASSED ssl_gtest.sh: #4829: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4088 (1, 771, 773, 770, 767)' - PASSED ssl_gtest.sh: #4830: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4089 (1, 771, 773, 770, 768)' - PASSED ssl_gtest.sh: #4831: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4090 (1, 771, 773, 770, 769)' - PASSED ssl_gtest.sh: #4832: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4091 (1, 771, 773, 770, 770)' - PASSED ssl_gtest.sh: #4833: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4092 (1, 771, 773, 770, 771)' - PASSED ssl_gtest.sh: #4834: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4093 (1, 771, 773, 770, 772)' - PASSED ssl_gtest.sh: #4835: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4094 (1, 771, 773, 770, 773)' - PASSED ssl_gtest.sh: #4836: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4095 (1, 771, 773, 771, 767)' - PASSED ssl_gtest.sh: #4837: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4096 (1, 771, 773, 771, 768)' - PASSED ssl_gtest.sh: #4838: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4097 (1, 771, 773, 771, 769)' - PASSED ssl_gtest.sh: #4839: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4098 (1, 771, 773, 771, 770)' - PASSED ssl_gtest.sh: #4840: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4099 (1, 771, 773, 771, 771)' - PASSED ssl_gtest.sh: #4841: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4100 (1, 771, 773, 771, 772)' - PASSED ssl_gtest.sh: #4842: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4101 (1, 771, 773, 771, 773)' - PASSED ssl_gtest.sh: #4843: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4102 (1, 771, 773, 772, 767)' - PASSED ssl_gtest.sh: #4844: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4103 (1, 771, 773, 772, 768)' - PASSED ssl_gtest.sh: #4845: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4104 (1, 771, 773, 772, 769)' - PASSED ssl_gtest.sh: #4846: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4105 (1, 771, 773, 772, 770)' - PASSED ssl_gtest.sh: #4847: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4106 (1, 771, 773, 772, 771)' - PASSED ssl_gtest.sh: #4848: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4107 (1, 771, 773, 772, 772)' - PASSED ssl_gtest.sh: #4849: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4108 (1, 771, 773, 772, 773)' - PASSED ssl_gtest.sh: #4850: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4109 (1, 771, 773, 773, 767)' - PASSED ssl_gtest.sh: #4851: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4110 (1, 771, 773, 773, 768)' - PASSED ssl_gtest.sh: #4852: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4111 (1, 771, 773, 773, 769)' - PASSED ssl_gtest.sh: #4853: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4112 (1, 771, 773, 773, 770)' - PASSED ssl_gtest.sh: #4854: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4113 (1, 771, 773, 773, 771)' - PASSED ssl_gtest.sh: #4855: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4114 (1, 771, 773, 773, 772)' - PASSED ssl_gtest.sh: #4856: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4115 (1, 771, 773, 773, 773)' - PASSED ssl_gtest.sh: #4857: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4116 (1, 772, 767, 767, 767)' - PASSED ssl_gtest.sh: #4858: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4117 (1, 772, 767, 767, 768)' - PASSED ssl_gtest.sh: #4859: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4118 (1, 772, 767, 767, 769)' - PASSED ssl_gtest.sh: #4860: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4119 (1, 772, 767, 767, 770)' - PASSED ssl_gtest.sh: #4861: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4120 (1, 772, 767, 767, 771)' - PASSED ssl_gtest.sh: #4862: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4121 (1, 772, 767, 767, 772)' - PASSED ssl_gtest.sh: #4863: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4122 (1, 772, 767, 767, 773)' - PASSED ssl_gtest.sh: #4864: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4123 (1, 772, 767, 768, 767)' - PASSED ssl_gtest.sh: #4865: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4124 (1, 772, 767, 768, 768)' - PASSED ssl_gtest.sh: #4866: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4125 (1, 772, 767, 768, 769)' - PASSED ssl_gtest.sh: #4867: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4126 (1, 772, 767, 768, 770)' - PASSED ssl_gtest.sh: #4868: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4127 (1, 772, 767, 768, 771)' - PASSED ssl_gtest.sh: #4869: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4128 (1, 772, 767, 768, 772)' - PASSED ssl_gtest.sh: #4870: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4129 (1, 772, 767, 768, 773)' - PASSED ssl_gtest.sh: #4871: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4130 (1, 772, 767, 769, 767)' - PASSED ssl_gtest.sh: #4872: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4131 (1, 772, 767, 769, 768)' - PASSED ssl_gtest.sh: #4873: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4132 (1, 772, 767, 769, 769)' - PASSED ssl_gtest.sh: #4874: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4133 (1, 772, 767, 769, 770)' - PASSED ssl_gtest.sh: #4875: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4134 (1, 772, 767, 769, 771)' - PASSED ssl_gtest.sh: #4876: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4135 (1, 772, 767, 769, 772)' - PASSED ssl_gtest.sh: #4877: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4136 (1, 772, 767, 769, 773)' - PASSED ssl_gtest.sh: #4878: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4137 (1, 772, 767, 770, 767)' - PASSED ssl_gtest.sh: #4879: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4138 (1, 772, 767, 770, 768)' - PASSED ssl_gtest.sh: #4880: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4139 (1, 772, 767, 770, 769)' - PASSED ssl_gtest.sh: #4881: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4140 (1, 772, 767, 770, 770)' - PASSED ssl_gtest.sh: #4882: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4141 (1, 772, 767, 770, 771)' - PASSED ssl_gtest.sh: #4883: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4142 (1, 772, 767, 770, 772)' - PASSED ssl_gtest.sh: #4884: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4143 (1, 772, 767, 770, 773)' - PASSED ssl_gtest.sh: #4885: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4144 (1, 772, 767, 771, 767)' - PASSED ssl_gtest.sh: #4886: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4145 (1, 772, 767, 771, 768)' - PASSED ssl_gtest.sh: #4887: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4146 (1, 772, 767, 771, 769)' - PASSED ssl_gtest.sh: #4888: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4147 (1, 772, 767, 771, 770)' - PASSED ssl_gtest.sh: #4889: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4148 (1, 772, 767, 771, 771)' - PASSED ssl_gtest.sh: #4890: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4149 (1, 772, 767, 771, 772)' - PASSED ssl_gtest.sh: #4891: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4150 (1, 772, 767, 771, 773)' - PASSED ssl_gtest.sh: #4892: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4151 (1, 772, 767, 772, 767)' - PASSED ssl_gtest.sh: #4893: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4152 (1, 772, 767, 772, 768)' - PASSED ssl_gtest.sh: #4894: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4153 (1, 772, 767, 772, 769)' - PASSED ssl_gtest.sh: #4895: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4154 (1, 772, 767, 772, 770)' - PASSED ssl_gtest.sh: #4896: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4155 (1, 772, 767, 772, 771)' - PASSED ssl_gtest.sh: #4897: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4156 (1, 772, 767, 772, 772)' - PASSED ssl_gtest.sh: #4898: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4157 (1, 772, 767, 772, 773)' - PASSED ssl_gtest.sh: #4899: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4158 (1, 772, 767, 773, 767)' - PASSED ssl_gtest.sh: #4900: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4159 (1, 772, 767, 773, 768)' - PASSED ssl_gtest.sh: #4901: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4160 (1, 772, 767, 773, 769)' - PASSED ssl_gtest.sh: #4902: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4161 (1, 772, 767, 773, 770)' - PASSED ssl_gtest.sh: #4903: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4162 (1, 772, 767, 773, 771)' - PASSED ssl_gtest.sh: #4904: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4163 (1, 772, 767, 773, 772)' - PASSED ssl_gtest.sh: #4905: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4164 (1, 772, 767, 773, 773)' - PASSED ssl_gtest.sh: #4906: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4165 (1, 772, 768, 767, 767)' - PASSED ssl_gtest.sh: #4907: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4166 (1, 772, 768, 767, 768)' - PASSED ssl_gtest.sh: #4908: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4167 (1, 772, 768, 767, 769)' - PASSED ssl_gtest.sh: #4909: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4168 (1, 772, 768, 767, 770)' - PASSED ssl_gtest.sh: #4910: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4169 (1, 772, 768, 767, 771)' - PASSED ssl_gtest.sh: #4911: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4170 (1, 772, 768, 767, 772)' - PASSED ssl_gtest.sh: #4912: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4171 (1, 772, 768, 767, 773)' - PASSED ssl_gtest.sh: #4913: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4172 (1, 772, 768, 768, 767)' - PASSED ssl_gtest.sh: #4914: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4173 (1, 772, 768, 768, 768)' - PASSED ssl_gtest.sh: #4915: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4174 (1, 772, 768, 768, 769)' - PASSED ssl_gtest.sh: #4916: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4175 (1, 772, 768, 768, 770)' - PASSED ssl_gtest.sh: #4917: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4176 (1, 772, 768, 768, 771)' - PASSED ssl_gtest.sh: #4918: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4177 (1, 772, 768, 768, 772)' - PASSED ssl_gtest.sh: #4919: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4178 (1, 772, 768, 768, 773)' - PASSED ssl_gtest.sh: #4920: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4179 (1, 772, 768, 769, 767)' - PASSED ssl_gtest.sh: #4921: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4180 (1, 772, 768, 769, 768)' - PASSED ssl_gtest.sh: #4922: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4181 (1, 772, 768, 769, 769)' - PASSED ssl_gtest.sh: #4923: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4182 (1, 772, 768, 769, 770)' - PASSED ssl_gtest.sh: #4924: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4183 (1, 772, 768, 769, 771)' - PASSED ssl_gtest.sh: #4925: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4184 (1, 772, 768, 769, 772)' - PASSED ssl_gtest.sh: #4926: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4185 (1, 772, 768, 769, 773)' - PASSED ssl_gtest.sh: #4927: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4186 (1, 772, 768, 770, 767)' - PASSED ssl_gtest.sh: #4928: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4187 (1, 772, 768, 770, 768)' - PASSED ssl_gtest.sh: #4929: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4188 (1, 772, 768, 770, 769)' - PASSED ssl_gtest.sh: #4930: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4189 (1, 772, 768, 770, 770)' - PASSED ssl_gtest.sh: #4931: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4190 (1, 772, 768, 770, 771)' - PASSED ssl_gtest.sh: #4932: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4191 (1, 772, 768, 770, 772)' - PASSED ssl_gtest.sh: #4933: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4192 (1, 772, 768, 770, 773)' - PASSED ssl_gtest.sh: #4934: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4193 (1, 772, 768, 771, 767)' - PASSED ssl_gtest.sh: #4935: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4194 (1, 772, 768, 771, 768)' - PASSED ssl_gtest.sh: #4936: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4195 (1, 772, 768, 771, 769)' - PASSED ssl_gtest.sh: #4937: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4196 (1, 772, 768, 771, 770)' - PASSED ssl_gtest.sh: #4938: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4197 (1, 772, 768, 771, 771)' - PASSED ssl_gtest.sh: #4939: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4198 (1, 772, 768, 771, 772)' - PASSED ssl_gtest.sh: #4940: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4199 (1, 772, 768, 771, 773)' - PASSED ssl_gtest.sh: #4941: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4200 (1, 772, 768, 772, 767)' - PASSED ssl_gtest.sh: #4942: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4201 (1, 772, 768, 772, 768)' - PASSED ssl_gtest.sh: #4943: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4202 (1, 772, 768, 772, 769)' - PASSED ssl_gtest.sh: #4944: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4203 (1, 772, 768, 772, 770)' - PASSED ssl_gtest.sh: #4945: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4204 (1, 772, 768, 772, 771)' - PASSED ssl_gtest.sh: #4946: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4205 (1, 772, 768, 772, 772)' - PASSED ssl_gtest.sh: #4947: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4206 (1, 772, 768, 772, 773)' - PASSED ssl_gtest.sh: #4948: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4207 (1, 772, 768, 773, 767)' - PASSED ssl_gtest.sh: #4949: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4208 (1, 772, 768, 773, 768)' - PASSED ssl_gtest.sh: #4950: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4209 (1, 772, 768, 773, 769)' - PASSED ssl_gtest.sh: #4951: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4210 (1, 772, 768, 773, 770)' - PASSED ssl_gtest.sh: #4952: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4211 (1, 772, 768, 773, 771)' - PASSED ssl_gtest.sh: #4953: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4212 (1, 772, 768, 773, 772)' - PASSED ssl_gtest.sh: #4954: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4213 (1, 772, 768, 773, 773)' - PASSED ssl_gtest.sh: #4955: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4214 (1, 772, 769, 767, 767)' - PASSED ssl_gtest.sh: #4956: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4215 (1, 772, 769, 767, 768)' - PASSED ssl_gtest.sh: #4957: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4216 (1, 772, 769, 767, 769)' - PASSED ssl_gtest.sh: #4958: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4217 (1, 772, 769, 767, 770)' - PASSED ssl_gtest.sh: #4959: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4218 (1, 772, 769, 767, 771)' - PASSED ssl_gtest.sh: #4960: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4219 (1, 772, 769, 767, 772)' - PASSED ssl_gtest.sh: #4961: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4220 (1, 772, 769, 767, 773)' - PASSED ssl_gtest.sh: #4962: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4221 (1, 772, 769, 768, 767)' - PASSED ssl_gtest.sh: #4963: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4222 (1, 772, 769, 768, 768)' - PASSED ssl_gtest.sh: #4964: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4223 (1, 772, 769, 768, 769)' - PASSED ssl_gtest.sh: #4965: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4224 (1, 772, 769, 768, 770)' - PASSED ssl_gtest.sh: #4966: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4225 (1, 772, 769, 768, 771)' - PASSED ssl_gtest.sh: #4967: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4226 (1, 772, 769, 768, 772)' - PASSED ssl_gtest.sh: #4968: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4227 (1, 772, 769, 768, 773)' - PASSED ssl_gtest.sh: #4969: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4228 (1, 772, 769, 769, 767)' - PASSED ssl_gtest.sh: #4970: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4229 (1, 772, 769, 769, 768)' - PASSED ssl_gtest.sh: #4971: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4230 (1, 772, 769, 769, 769)' - PASSED ssl_gtest.sh: #4972: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4231 (1, 772, 769, 769, 770)' - PASSED ssl_gtest.sh: #4973: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4232 (1, 772, 769, 769, 771)' - PASSED ssl_gtest.sh: #4974: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4233 (1, 772, 769, 769, 772)' - PASSED ssl_gtest.sh: #4975: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4234 (1, 772, 769, 769, 773)' - PASSED ssl_gtest.sh: #4976: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4235 (1, 772, 769, 770, 767)' - PASSED ssl_gtest.sh: #4977: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4236 (1, 772, 769, 770, 768)' - PASSED ssl_gtest.sh: #4978: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4237 (1, 772, 769, 770, 769)' - PASSED ssl_gtest.sh: #4979: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4238 (1, 772, 769, 770, 770)' - PASSED ssl_gtest.sh: #4980: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4239 (1, 772, 769, 770, 771)' - PASSED ssl_gtest.sh: #4981: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4240 (1, 772, 769, 770, 772)' - PASSED ssl_gtest.sh: #4982: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4241 (1, 772, 769, 770, 773)' - PASSED ssl_gtest.sh: #4983: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4242 (1, 772, 769, 771, 767)' - PASSED ssl_gtest.sh: #4984: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4243 (1, 772, 769, 771, 768)' - PASSED ssl_gtest.sh: #4985: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4244 (1, 772, 769, 771, 769)' - PASSED ssl_gtest.sh: #4986: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4245 (1, 772, 769, 771, 770)' - PASSED ssl_gtest.sh: #4987: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4246 (1, 772, 769, 771, 771)' - PASSED ssl_gtest.sh: #4988: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4247 (1, 772, 769, 771, 772)' - PASSED ssl_gtest.sh: #4989: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4248 (1, 772, 769, 771, 773)' - PASSED ssl_gtest.sh: #4990: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4249 (1, 772, 769, 772, 767)' - PASSED ssl_gtest.sh: #4991: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4250 (1, 772, 769, 772, 768)' - PASSED ssl_gtest.sh: #4992: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4251 (1, 772, 769, 772, 769)' - PASSED ssl_gtest.sh: #4993: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4252 (1, 772, 769, 772, 770)' - PASSED ssl_gtest.sh: #4994: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4253 (1, 772, 769, 772, 771)' - PASSED ssl_gtest.sh: #4995: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4254 (1, 772, 769, 772, 772)' - PASSED ssl_gtest.sh: #4996: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4255 (1, 772, 769, 772, 773)' - PASSED ssl_gtest.sh: #4997: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4256 (1, 772, 769, 773, 767)' - PASSED ssl_gtest.sh: #4998: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4257 (1, 772, 769, 773, 768)' - PASSED ssl_gtest.sh: #4999: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4258 (1, 772, 769, 773, 769)' - PASSED ssl_gtest.sh: #5000: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4259 (1, 772, 769, 773, 770)' - PASSED ssl_gtest.sh: #5001: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4260 (1, 772, 769, 773, 771)' - PASSED ssl_gtest.sh: #5002: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4261 (1, 772, 769, 773, 772)' - PASSED ssl_gtest.sh: #5003: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4262 (1, 772, 769, 773, 773)' - PASSED ssl_gtest.sh: #5004: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4263 (1, 772, 770, 767, 767)' - PASSED ssl_gtest.sh: #5005: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4264 (1, 772, 770, 767, 768)' - PASSED ssl_gtest.sh: #5006: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4265 (1, 772, 770, 767, 769)' - PASSED ssl_gtest.sh: #5007: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4266 (1, 772, 770, 767, 770)' - PASSED ssl_gtest.sh: #5008: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4267 (1, 772, 770, 767, 771)' - PASSED ssl_gtest.sh: #5009: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4268 (1, 772, 770, 767, 772)' - PASSED ssl_gtest.sh: #5010: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4269 (1, 772, 770, 767, 773)' - PASSED ssl_gtest.sh: #5011: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4270 (1, 772, 770, 768, 767)' - PASSED ssl_gtest.sh: #5012: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4271 (1, 772, 770, 768, 768)' - PASSED ssl_gtest.sh: #5013: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4272 (1, 772, 770, 768, 769)' - PASSED ssl_gtest.sh: #5014: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4273 (1, 772, 770, 768, 770)' - PASSED ssl_gtest.sh: #5015: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4274 (1, 772, 770, 768, 771)' - PASSED ssl_gtest.sh: #5016: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4275 (1, 772, 770, 768, 772)' - PASSED ssl_gtest.sh: #5017: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4276 (1, 772, 770, 768, 773)' - PASSED ssl_gtest.sh: #5018: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4277 (1, 772, 770, 769, 767)' - PASSED ssl_gtest.sh: #5019: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4278 (1, 772, 770, 769, 768)' - PASSED ssl_gtest.sh: #5020: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4279 (1, 772, 770, 769, 769)' - PASSED ssl_gtest.sh: #5021: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4280 (1, 772, 770, 769, 770)' - PASSED ssl_gtest.sh: #5022: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4281 (1, 772, 770, 769, 771)' - PASSED ssl_gtest.sh: #5023: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4282 (1, 772, 770, 769, 772)' - PASSED ssl_gtest.sh: #5024: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4283 (1, 772, 770, 769, 773)' - PASSED ssl_gtest.sh: #5025: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4284 (1, 772, 770, 770, 767)' - PASSED ssl_gtest.sh: #5026: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4285 (1, 772, 770, 770, 768)' - PASSED ssl_gtest.sh: #5027: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4286 (1, 772, 770, 770, 769)' - PASSED ssl_gtest.sh: #5028: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4287 (1, 772, 770, 770, 770)' - PASSED ssl_gtest.sh: #5029: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4288 (1, 772, 770, 770, 771)' - PASSED ssl_gtest.sh: #5030: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4289 (1, 772, 770, 770, 772)' - PASSED ssl_gtest.sh: #5031: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4290 (1, 772, 770, 770, 773)' - PASSED ssl_gtest.sh: #5032: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4291 (1, 772, 770, 771, 767)' - PASSED ssl_gtest.sh: #5033: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4292 (1, 772, 770, 771, 768)' - PASSED ssl_gtest.sh: #5034: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4293 (1, 772, 770, 771, 769)' - PASSED ssl_gtest.sh: #5035: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4294 (1, 772, 770, 771, 770)' - PASSED ssl_gtest.sh: #5036: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4295 (1, 772, 770, 771, 771)' - PASSED ssl_gtest.sh: #5037: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4296 (1, 772, 770, 771, 772)' - PASSED ssl_gtest.sh: #5038: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4297 (1, 772, 770, 771, 773)' - PASSED ssl_gtest.sh: #5039: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4298 (1, 772, 770, 772, 767)' - PASSED ssl_gtest.sh: #5040: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4299 (1, 772, 770, 772, 768)' - PASSED ssl_gtest.sh: #5041: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4300 (1, 772, 770, 772, 769)' - PASSED ssl_gtest.sh: #5042: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4301 (1, 772, 770, 772, 770)' - PASSED ssl_gtest.sh: #5043: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4302 (1, 772, 770, 772, 771)' - PASSED ssl_gtest.sh: #5044: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4303 (1, 772, 770, 772, 772)' - PASSED ssl_gtest.sh: #5045: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4304 (1, 772, 770, 772, 773)' - PASSED ssl_gtest.sh: #5046: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4305 (1, 772, 770, 773, 767)' - PASSED ssl_gtest.sh: #5047: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4306 (1, 772, 770, 773, 768)' - PASSED ssl_gtest.sh: #5048: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4307 (1, 772, 770, 773, 769)' - PASSED ssl_gtest.sh: #5049: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4308 (1, 772, 770, 773, 770)' - PASSED ssl_gtest.sh: #5050: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4309 (1, 772, 770, 773, 771)' - PASSED ssl_gtest.sh: #5051: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4310 (1, 772, 770, 773, 772)' - PASSED ssl_gtest.sh: #5052: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4311 (1, 772, 770, 773, 773)' - PASSED ssl_gtest.sh: #5053: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4312 (1, 772, 771, 767, 767)' - PASSED ssl_gtest.sh: #5054: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4313 (1, 772, 771, 767, 768)' - PASSED ssl_gtest.sh: #5055: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4314 (1, 772, 771, 767, 769)' - PASSED ssl_gtest.sh: #5056: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4315 (1, 772, 771, 767, 770)' - PASSED ssl_gtest.sh: #5057: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4316 (1, 772, 771, 767, 771)' - PASSED ssl_gtest.sh: #5058: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4317 (1, 772, 771, 767, 772)' - PASSED ssl_gtest.sh: #5059: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4318 (1, 772, 771, 767, 773)' - PASSED ssl_gtest.sh: #5060: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4319 (1, 772, 771, 768, 767)' - PASSED ssl_gtest.sh: #5061: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4320 (1, 772, 771, 768, 768)' - PASSED ssl_gtest.sh: #5062: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4321 (1, 772, 771, 768, 769)' - PASSED ssl_gtest.sh: #5063: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4322 (1, 772, 771, 768, 770)' - PASSED ssl_gtest.sh: #5064: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4323 (1, 772, 771, 768, 771)' - PASSED ssl_gtest.sh: #5065: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4324 (1, 772, 771, 768, 772)' - PASSED ssl_gtest.sh: #5066: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4325 (1, 772, 771, 768, 773)' - PASSED ssl_gtest.sh: #5067: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4326 (1, 772, 771, 769, 767)' - PASSED ssl_gtest.sh: #5068: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4327 (1, 772, 771, 769, 768)' - PASSED ssl_gtest.sh: #5069: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4328 (1, 772, 771, 769, 769)' - PASSED ssl_gtest.sh: #5070: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4329 (1, 772, 771, 769, 770)' - PASSED ssl_gtest.sh: #5071: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4330 (1, 772, 771, 769, 771)' - PASSED ssl_gtest.sh: #5072: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4331 (1, 772, 771, 769, 772)' - PASSED ssl_gtest.sh: #5073: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4332 (1, 772, 771, 769, 773)' - PASSED ssl_gtest.sh: #5074: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4333 (1, 772, 771, 770, 767)' - PASSED ssl_gtest.sh: #5075: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4334 (1, 772, 771, 770, 768)' - PASSED ssl_gtest.sh: #5076: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4335 (1, 772, 771, 770, 769)' - PASSED ssl_gtest.sh: #5077: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4336 (1, 772, 771, 770, 770)' - PASSED ssl_gtest.sh: #5078: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4337 (1, 772, 771, 770, 771)' - PASSED ssl_gtest.sh: #5079: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4338 (1, 772, 771, 770, 772)' - PASSED ssl_gtest.sh: #5080: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4339 (1, 772, 771, 770, 773)' - PASSED ssl_gtest.sh: #5081: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4340 (1, 772, 771, 771, 767)' - PASSED ssl_gtest.sh: #5082: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4341 (1, 772, 771, 771, 768)' - PASSED ssl_gtest.sh: #5083: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4342 (1, 772, 771, 771, 769)' - PASSED ssl_gtest.sh: #5084: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4343 (1, 772, 771, 771, 770)' - PASSED ssl_gtest.sh: #5085: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4344 (1, 772, 771, 771, 771)' - PASSED ssl_gtest.sh: #5086: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4345 (1, 772, 771, 771, 772)' - PASSED ssl_gtest.sh: #5087: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4346 (1, 772, 771, 771, 773)' - PASSED ssl_gtest.sh: #5088: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4347 (1, 772, 771, 772, 767)' - PASSED ssl_gtest.sh: #5089: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4348 (1, 772, 771, 772, 768)' - PASSED ssl_gtest.sh: #5090: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4349 (1, 772, 771, 772, 769)' - PASSED ssl_gtest.sh: #5091: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4350 (1, 772, 771, 772, 770)' - PASSED ssl_gtest.sh: #5092: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4351 (1, 772, 771, 772, 771)' - PASSED ssl_gtest.sh: #5093: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4352 (1, 772, 771, 772, 772)' - PASSED ssl_gtest.sh: #5094: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4353 (1, 772, 771, 772, 773)' - PASSED ssl_gtest.sh: #5095: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4354 (1, 772, 771, 773, 767)' - PASSED ssl_gtest.sh: #5096: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4355 (1, 772, 771, 773, 768)' - PASSED ssl_gtest.sh: #5097: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4356 (1, 772, 771, 773, 769)' - PASSED ssl_gtest.sh: #5098: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4357 (1, 772, 771, 773, 770)' - PASSED ssl_gtest.sh: #5099: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4358 (1, 772, 771, 773, 771)' - PASSED ssl_gtest.sh: #5100: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4359 (1, 772, 771, 773, 772)' - PASSED ssl_gtest.sh: #5101: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4360 (1, 772, 771, 773, 773)' - PASSED ssl_gtest.sh: #5102: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4361 (1, 772, 772, 767, 767)' - PASSED ssl_gtest.sh: #5103: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4362 (1, 772, 772, 767, 768)' - PASSED ssl_gtest.sh: #5104: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4363 (1, 772, 772, 767, 769)' - PASSED ssl_gtest.sh: #5105: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4364 (1, 772, 772, 767, 770)' - PASSED ssl_gtest.sh: #5106: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4365 (1, 772, 772, 767, 771)' - PASSED ssl_gtest.sh: #5107: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4366 (1, 772, 772, 767, 772)' - PASSED ssl_gtest.sh: #5108: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4367 (1, 772, 772, 767, 773)' - PASSED ssl_gtest.sh: #5109: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4368 (1, 772, 772, 768, 767)' - PASSED ssl_gtest.sh: #5110: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4369 (1, 772, 772, 768, 768)' - PASSED ssl_gtest.sh: #5111: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4370 (1, 772, 772, 768, 769)' - PASSED ssl_gtest.sh: #5112: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4371 (1, 772, 772, 768, 770)' - PASSED ssl_gtest.sh: #5113: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4372 (1, 772, 772, 768, 771)' - PASSED ssl_gtest.sh: #5114: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4373 (1, 772, 772, 768, 772)' - PASSED ssl_gtest.sh: #5115: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4374 (1, 772, 772, 768, 773)' - PASSED ssl_gtest.sh: #5116: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4375 (1, 772, 772, 769, 767)' - PASSED ssl_gtest.sh: #5117: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4376 (1, 772, 772, 769, 768)' - PASSED ssl_gtest.sh: #5118: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4377 (1, 772, 772, 769, 769)' - PASSED ssl_gtest.sh: #5119: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4378 (1, 772, 772, 769, 770)' - PASSED ssl_gtest.sh: #5120: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4379 (1, 772, 772, 769, 771)' - PASSED ssl_gtest.sh: #5121: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4380 (1, 772, 772, 769, 772)' - PASSED ssl_gtest.sh: #5122: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4381 (1, 772, 772, 769, 773)' - PASSED ssl_gtest.sh: #5123: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4382 (1, 772, 772, 770, 767)' - PASSED ssl_gtest.sh: #5124: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4383 (1, 772, 772, 770, 768)' - PASSED ssl_gtest.sh: #5125: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4384 (1, 772, 772, 770, 769)' - PASSED ssl_gtest.sh: #5126: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4385 (1, 772, 772, 770, 770)' - PASSED ssl_gtest.sh: #5127: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4386 (1, 772, 772, 770, 771)' - PASSED ssl_gtest.sh: #5128: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4387 (1, 772, 772, 770, 772)' - PASSED ssl_gtest.sh: #5129: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4388 (1, 772, 772, 770, 773)' - PASSED ssl_gtest.sh: #5130: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4389 (1, 772, 772, 771, 767)' - PASSED ssl_gtest.sh: #5131: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4390 (1, 772, 772, 771, 768)' - PASSED ssl_gtest.sh: #5132: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4391 (1, 772, 772, 771, 769)' - PASSED ssl_gtest.sh: #5133: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4392 (1, 772, 772, 771, 770)' - PASSED ssl_gtest.sh: #5134: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4393 (1, 772, 772, 771, 771)' - PASSED ssl_gtest.sh: #5135: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4394 (1, 772, 772, 771, 772)' - PASSED ssl_gtest.sh: #5136: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4395 (1, 772, 772, 771, 773)' - PASSED ssl_gtest.sh: #5137: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4396 (1, 772, 772, 772, 767)' - PASSED ssl_gtest.sh: #5138: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4397 (1, 772, 772, 772, 768)' - PASSED ssl_gtest.sh: #5139: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4398 (1, 772, 772, 772, 769)' - PASSED ssl_gtest.sh: #5140: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4399 (1, 772, 772, 772, 770)' - PASSED ssl_gtest.sh: #5141: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4400 (1, 772, 772, 772, 771)' - PASSED ssl_gtest.sh: #5142: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4401 (1, 772, 772, 772, 772)' - PASSED ssl_gtest.sh: #5143: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4402 (1, 772, 772, 772, 773)' - PASSED ssl_gtest.sh: #5144: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4403 (1, 772, 772, 773, 767)' - PASSED ssl_gtest.sh: #5145: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4404 (1, 772, 772, 773, 768)' - PASSED ssl_gtest.sh: #5146: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4405 (1, 772, 772, 773, 769)' - PASSED ssl_gtest.sh: #5147: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4406 (1, 772, 772, 773, 770)' - PASSED ssl_gtest.sh: #5148: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4407 (1, 772, 772, 773, 771)' - PASSED ssl_gtest.sh: #5149: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4408 (1, 772, 772, 773, 772)' - PASSED ssl_gtest.sh: #5150: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4409 (1, 772, 772, 773, 773)' - PASSED ssl_gtest.sh: #5151: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4410 (1, 772, 773, 767, 767)' - PASSED ssl_gtest.sh: #5152: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4411 (1, 772, 773, 767, 768)' - PASSED ssl_gtest.sh: #5153: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4412 (1, 772, 773, 767, 769)' - PASSED ssl_gtest.sh: #5154: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4413 (1, 772, 773, 767, 770)' - PASSED ssl_gtest.sh: #5155: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4414 (1, 772, 773, 767, 771)' - PASSED ssl_gtest.sh: #5156: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4415 (1, 772, 773, 767, 772)' - PASSED ssl_gtest.sh: #5157: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4416 (1, 772, 773, 767, 773)' - PASSED ssl_gtest.sh: #5158: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4417 (1, 772, 773, 768, 767)' - PASSED ssl_gtest.sh: #5159: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4418 (1, 772, 773, 768, 768)' - PASSED ssl_gtest.sh: #5160: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4419 (1, 772, 773, 768, 769)' - PASSED ssl_gtest.sh: #5161: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4420 (1, 772, 773, 768, 770)' - PASSED ssl_gtest.sh: #5162: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4421 (1, 772, 773, 768, 771)' - PASSED ssl_gtest.sh: #5163: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4422 (1, 772, 773, 768, 772)' - PASSED ssl_gtest.sh: #5164: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4423 (1, 772, 773, 768, 773)' - PASSED ssl_gtest.sh: #5165: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4424 (1, 772, 773, 769, 767)' - PASSED ssl_gtest.sh: #5166: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4425 (1, 772, 773, 769, 768)' - PASSED ssl_gtest.sh: #5167: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4426 (1, 772, 773, 769, 769)' - PASSED ssl_gtest.sh: #5168: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4427 (1, 772, 773, 769, 770)' - PASSED ssl_gtest.sh: #5169: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4428 (1, 772, 773, 769, 771)' - PASSED ssl_gtest.sh: #5170: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4429 (1, 772, 773, 769, 772)' - PASSED ssl_gtest.sh: #5171: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4430 (1, 772, 773, 769, 773)' - PASSED ssl_gtest.sh: #5172: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4431 (1, 772, 773, 770, 767)' - PASSED ssl_gtest.sh: #5173: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4432 (1, 772, 773, 770, 768)' - PASSED ssl_gtest.sh: #5174: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4433 (1, 772, 773, 770, 769)' - PASSED ssl_gtest.sh: #5175: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4434 (1, 772, 773, 770, 770)' - PASSED ssl_gtest.sh: #5176: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4435 (1, 772, 773, 770, 771)' - PASSED ssl_gtest.sh: #5177: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4436 (1, 772, 773, 770, 772)' - PASSED ssl_gtest.sh: #5178: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4437 (1, 772, 773, 770, 773)' - PASSED ssl_gtest.sh: #5179: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4438 (1, 772, 773, 771, 767)' - PASSED ssl_gtest.sh: #5180: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4439 (1, 772, 773, 771, 768)' - PASSED ssl_gtest.sh: #5181: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4440 (1, 772, 773, 771, 769)' - PASSED ssl_gtest.sh: #5182: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4441 (1, 772, 773, 771, 770)' - PASSED ssl_gtest.sh: #5183: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4442 (1, 772, 773, 771, 771)' - PASSED ssl_gtest.sh: #5184: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4443 (1, 772, 773, 771, 772)' - PASSED ssl_gtest.sh: #5185: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4444 (1, 772, 773, 771, 773)' - PASSED ssl_gtest.sh: #5186: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4445 (1, 772, 773, 772, 767)' - PASSED ssl_gtest.sh: #5187: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4446 (1, 772, 773, 772, 768)' - PASSED ssl_gtest.sh: #5188: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4447 (1, 772, 773, 772, 769)' - PASSED ssl_gtest.sh: #5189: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4448 (1, 772, 773, 772, 770)' - PASSED ssl_gtest.sh: #5190: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4449 (1, 772, 773, 772, 771)' - PASSED ssl_gtest.sh: #5191: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4450 (1, 772, 773, 772, 772)' - PASSED ssl_gtest.sh: #5192: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4451 (1, 772, 773, 772, 773)' - PASSED ssl_gtest.sh: #5193: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4452 (1, 772, 773, 773, 767)' - PASSED ssl_gtest.sh: #5194: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4453 (1, 772, 773, 773, 768)' - PASSED ssl_gtest.sh: #5195: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4454 (1, 772, 773, 773, 769)' - PASSED ssl_gtest.sh: #5196: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4455 (1, 772, 773, 773, 770)' - PASSED ssl_gtest.sh: #5197: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4456 (1, 772, 773, 773, 771)' - PASSED ssl_gtest.sh: #5198: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4457 (1, 772, 773, 773, 772)' - PASSED ssl_gtest.sh: #5199: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4458 (1, 772, 773, 773, 773)' - PASSED ssl_gtest.sh: #5200: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4459 (1, 773, 767, 767, 767)' - PASSED ssl_gtest.sh: #5201: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4460 (1, 773, 767, 767, 768)' - PASSED ssl_gtest.sh: #5202: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4461 (1, 773, 767, 767, 769)' - PASSED ssl_gtest.sh: #5203: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4462 (1, 773, 767, 767, 770)' - PASSED ssl_gtest.sh: #5204: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4463 (1, 773, 767, 767, 771)' - PASSED ssl_gtest.sh: #5205: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4464 (1, 773, 767, 767, 772)' - PASSED ssl_gtest.sh: #5206: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4465 (1, 773, 767, 767, 773)' - PASSED ssl_gtest.sh: #5207: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4466 (1, 773, 767, 768, 767)' - PASSED ssl_gtest.sh: #5208: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4467 (1, 773, 767, 768, 768)' - PASSED ssl_gtest.sh: #5209: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4468 (1, 773, 767, 768, 769)' - PASSED ssl_gtest.sh: #5210: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4469 (1, 773, 767, 768, 770)' - PASSED ssl_gtest.sh: #5211: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4470 (1, 773, 767, 768, 771)' - PASSED ssl_gtest.sh: #5212: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4471 (1, 773, 767, 768, 772)' - PASSED ssl_gtest.sh: #5213: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4472 (1, 773, 767, 768, 773)' - PASSED ssl_gtest.sh: #5214: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4473 (1, 773, 767, 769, 767)' - PASSED ssl_gtest.sh: #5215: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4474 (1, 773, 767, 769, 768)' - PASSED ssl_gtest.sh: #5216: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4475 (1, 773, 767, 769, 769)' - PASSED ssl_gtest.sh: #5217: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4476 (1, 773, 767, 769, 770)' - PASSED ssl_gtest.sh: #5218: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4477 (1, 773, 767, 769, 771)' - PASSED ssl_gtest.sh: #5219: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4478 (1, 773, 767, 769, 772)' - PASSED ssl_gtest.sh: #5220: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4479 (1, 773, 767, 769, 773)' - PASSED ssl_gtest.sh: #5221: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4480 (1, 773, 767, 770, 767)' - PASSED ssl_gtest.sh: #5222: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4481 (1, 773, 767, 770, 768)' - PASSED ssl_gtest.sh: #5223: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4482 (1, 773, 767, 770, 769)' - PASSED ssl_gtest.sh: #5224: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4483 (1, 773, 767, 770, 770)' - PASSED ssl_gtest.sh: #5225: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4484 (1, 773, 767, 770, 771)' - PASSED ssl_gtest.sh: #5226: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4485 (1, 773, 767, 770, 772)' - PASSED ssl_gtest.sh: #5227: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4486 (1, 773, 767, 770, 773)' - PASSED ssl_gtest.sh: #5228: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4487 (1, 773, 767, 771, 767)' - PASSED ssl_gtest.sh: #5229: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4488 (1, 773, 767, 771, 768)' - PASSED ssl_gtest.sh: #5230: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4489 (1, 773, 767, 771, 769)' - PASSED ssl_gtest.sh: #5231: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4490 (1, 773, 767, 771, 770)' - PASSED ssl_gtest.sh: #5232: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4491 (1, 773, 767, 771, 771)' - PASSED ssl_gtest.sh: #5233: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4492 (1, 773, 767, 771, 772)' - PASSED ssl_gtest.sh: #5234: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4493 (1, 773, 767, 771, 773)' - PASSED ssl_gtest.sh: #5235: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4494 (1, 773, 767, 772, 767)' - PASSED ssl_gtest.sh: #5236: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4495 (1, 773, 767, 772, 768)' - PASSED ssl_gtest.sh: #5237: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4496 (1, 773, 767, 772, 769)' - PASSED ssl_gtest.sh: #5238: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4497 (1, 773, 767, 772, 770)' - PASSED ssl_gtest.sh: #5239: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4498 (1, 773, 767, 772, 771)' - PASSED ssl_gtest.sh: #5240: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4499 (1, 773, 767, 772, 772)' - PASSED ssl_gtest.sh: #5241: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4500 (1, 773, 767, 772, 773)' - PASSED ssl_gtest.sh: #5242: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4501 (1, 773, 767, 773, 767)' - PASSED ssl_gtest.sh: #5243: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4502 (1, 773, 767, 773, 768)' - PASSED ssl_gtest.sh: #5244: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4503 (1, 773, 767, 773, 769)' - PASSED ssl_gtest.sh: #5245: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4504 (1, 773, 767, 773, 770)' - PASSED ssl_gtest.sh: #5246: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4505 (1, 773, 767, 773, 771)' - PASSED ssl_gtest.sh: #5247: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4506 (1, 773, 767, 773, 772)' - PASSED ssl_gtest.sh: #5248: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4507 (1, 773, 767, 773, 773)' - PASSED ssl_gtest.sh: #5249: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4508 (1, 773, 768, 767, 767)' - PASSED ssl_gtest.sh: #5250: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4509 (1, 773, 768, 767, 768)' - PASSED ssl_gtest.sh: #5251: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4510 (1, 773, 768, 767, 769)' - PASSED ssl_gtest.sh: #5252: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4511 (1, 773, 768, 767, 770)' - PASSED ssl_gtest.sh: #5253: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4512 (1, 773, 768, 767, 771)' - PASSED ssl_gtest.sh: #5254: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4513 (1, 773, 768, 767, 772)' - PASSED ssl_gtest.sh: #5255: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4514 (1, 773, 768, 767, 773)' - PASSED ssl_gtest.sh: #5256: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4515 (1, 773, 768, 768, 767)' - PASSED ssl_gtest.sh: #5257: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4516 (1, 773, 768, 768, 768)' - PASSED ssl_gtest.sh: #5258: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4517 (1, 773, 768, 768, 769)' - PASSED ssl_gtest.sh: #5259: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4518 (1, 773, 768, 768, 770)' - PASSED ssl_gtest.sh: #5260: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4519 (1, 773, 768, 768, 771)' - PASSED ssl_gtest.sh: #5261: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4520 (1, 773, 768, 768, 772)' - PASSED ssl_gtest.sh: #5262: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4521 (1, 773, 768, 768, 773)' - PASSED ssl_gtest.sh: #5263: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4522 (1, 773, 768, 769, 767)' - PASSED ssl_gtest.sh: #5264: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4523 (1, 773, 768, 769, 768)' - PASSED ssl_gtest.sh: #5265: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4524 (1, 773, 768, 769, 769)' - PASSED ssl_gtest.sh: #5266: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4525 (1, 773, 768, 769, 770)' - PASSED ssl_gtest.sh: #5267: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4526 (1, 773, 768, 769, 771)' - PASSED ssl_gtest.sh: #5268: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4527 (1, 773, 768, 769, 772)' - PASSED ssl_gtest.sh: #5269: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4528 (1, 773, 768, 769, 773)' - PASSED ssl_gtest.sh: #5270: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4529 (1, 773, 768, 770, 767)' - PASSED ssl_gtest.sh: #5271: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4530 (1, 773, 768, 770, 768)' - PASSED ssl_gtest.sh: #5272: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4531 (1, 773, 768, 770, 769)' - PASSED ssl_gtest.sh: #5273: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4532 (1, 773, 768, 770, 770)' - PASSED ssl_gtest.sh: #5274: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4533 (1, 773, 768, 770, 771)' - PASSED ssl_gtest.sh: #5275: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4534 (1, 773, 768, 770, 772)' - PASSED ssl_gtest.sh: #5276: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4535 (1, 773, 768, 770, 773)' - PASSED ssl_gtest.sh: #5277: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4536 (1, 773, 768, 771, 767)' - PASSED ssl_gtest.sh: #5278: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4537 (1, 773, 768, 771, 768)' - PASSED ssl_gtest.sh: #5279: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4538 (1, 773, 768, 771, 769)' - PASSED ssl_gtest.sh: #5280: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4539 (1, 773, 768, 771, 770)' - PASSED ssl_gtest.sh: #5281: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4540 (1, 773, 768, 771, 771)' - PASSED ssl_gtest.sh: #5282: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4541 (1, 773, 768, 771, 772)' - PASSED ssl_gtest.sh: #5283: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4542 (1, 773, 768, 771, 773)' - PASSED ssl_gtest.sh: #5284: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4543 (1, 773, 768, 772, 767)' - PASSED ssl_gtest.sh: #5285: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4544 (1, 773, 768, 772, 768)' - PASSED ssl_gtest.sh: #5286: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4545 (1, 773, 768, 772, 769)' - PASSED ssl_gtest.sh: #5287: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4546 (1, 773, 768, 772, 770)' - PASSED ssl_gtest.sh: #5288: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4547 (1, 773, 768, 772, 771)' - PASSED ssl_gtest.sh: #5289: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4548 (1, 773, 768, 772, 772)' - PASSED ssl_gtest.sh: #5290: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4549 (1, 773, 768, 772, 773)' - PASSED ssl_gtest.sh: #5291: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4550 (1, 773, 768, 773, 767)' - PASSED ssl_gtest.sh: #5292: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4551 (1, 773, 768, 773, 768)' - PASSED ssl_gtest.sh: #5293: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4552 (1, 773, 768, 773, 769)' - PASSED ssl_gtest.sh: #5294: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4553 (1, 773, 768, 773, 770)' - PASSED ssl_gtest.sh: #5295: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4554 (1, 773, 768, 773, 771)' - PASSED ssl_gtest.sh: #5296: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4555 (1, 773, 768, 773, 772)' - PASSED ssl_gtest.sh: #5297: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4556 (1, 773, 768, 773, 773)' - PASSED ssl_gtest.sh: #5298: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4557 (1, 773, 769, 767, 767)' - PASSED ssl_gtest.sh: #5299: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4558 (1, 773, 769, 767, 768)' - PASSED ssl_gtest.sh: #5300: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4559 (1, 773, 769, 767, 769)' - PASSED ssl_gtest.sh: #5301: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4560 (1, 773, 769, 767, 770)' - PASSED ssl_gtest.sh: #5302: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4561 (1, 773, 769, 767, 771)' - PASSED ssl_gtest.sh: #5303: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4562 (1, 773, 769, 767, 772)' - PASSED ssl_gtest.sh: #5304: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4563 (1, 773, 769, 767, 773)' - PASSED ssl_gtest.sh: #5305: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4564 (1, 773, 769, 768, 767)' - PASSED ssl_gtest.sh: #5306: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4565 (1, 773, 769, 768, 768)' - PASSED ssl_gtest.sh: #5307: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4566 (1, 773, 769, 768, 769)' - PASSED ssl_gtest.sh: #5308: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4567 (1, 773, 769, 768, 770)' - PASSED ssl_gtest.sh: #5309: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4568 (1, 773, 769, 768, 771)' - PASSED ssl_gtest.sh: #5310: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4569 (1, 773, 769, 768, 772)' - PASSED ssl_gtest.sh: #5311: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4570 (1, 773, 769, 768, 773)' - PASSED ssl_gtest.sh: #5312: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4571 (1, 773, 769, 769, 767)' - PASSED ssl_gtest.sh: #5313: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4572 (1, 773, 769, 769, 768)' - PASSED ssl_gtest.sh: #5314: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4573 (1, 773, 769, 769, 769)' - PASSED ssl_gtest.sh: #5315: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4574 (1, 773, 769, 769, 770)' - PASSED ssl_gtest.sh: #5316: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4575 (1, 773, 769, 769, 771)' - PASSED ssl_gtest.sh: #5317: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4576 (1, 773, 769, 769, 772)' - PASSED ssl_gtest.sh: #5318: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4577 (1, 773, 769, 769, 773)' - PASSED ssl_gtest.sh: #5319: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4578 (1, 773, 769, 770, 767)' - PASSED ssl_gtest.sh: #5320: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4579 (1, 773, 769, 770, 768)' - PASSED ssl_gtest.sh: #5321: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4580 (1, 773, 769, 770, 769)' - PASSED ssl_gtest.sh: #5322: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4581 (1, 773, 769, 770, 770)' - PASSED ssl_gtest.sh: #5323: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4582 (1, 773, 769, 770, 771)' - PASSED ssl_gtest.sh: #5324: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4583 (1, 773, 769, 770, 772)' - PASSED ssl_gtest.sh: #5325: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4584 (1, 773, 769, 770, 773)' - PASSED ssl_gtest.sh: #5326: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4585 (1, 773, 769, 771, 767)' - PASSED ssl_gtest.sh: #5327: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4586 (1, 773, 769, 771, 768)' - PASSED ssl_gtest.sh: #5328: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4587 (1, 773, 769, 771, 769)' - PASSED ssl_gtest.sh: #5329: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4588 (1, 773, 769, 771, 770)' - PASSED ssl_gtest.sh: #5330: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4589 (1, 773, 769, 771, 771)' - PASSED ssl_gtest.sh: #5331: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4590 (1, 773, 769, 771, 772)' - PASSED ssl_gtest.sh: #5332: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4591 (1, 773, 769, 771, 773)' - PASSED ssl_gtest.sh: #5333: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4592 (1, 773, 769, 772, 767)' - PASSED ssl_gtest.sh: #5334: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4593 (1, 773, 769, 772, 768)' - PASSED ssl_gtest.sh: #5335: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4594 (1, 773, 769, 772, 769)' - PASSED ssl_gtest.sh: #5336: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4595 (1, 773, 769, 772, 770)' - PASSED ssl_gtest.sh: #5337: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4596 (1, 773, 769, 772, 771)' - PASSED ssl_gtest.sh: #5338: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4597 (1, 773, 769, 772, 772)' - PASSED ssl_gtest.sh: #5339: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4598 (1, 773, 769, 772, 773)' - PASSED ssl_gtest.sh: #5340: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4599 (1, 773, 769, 773, 767)' - PASSED ssl_gtest.sh: #5341: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4600 (1, 773, 769, 773, 768)' - PASSED ssl_gtest.sh: #5342: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4601 (1, 773, 769, 773, 769)' - PASSED ssl_gtest.sh: #5343: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4602 (1, 773, 769, 773, 770)' - PASSED ssl_gtest.sh: #5344: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4603 (1, 773, 769, 773, 771)' - PASSED ssl_gtest.sh: #5345: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4604 (1, 773, 769, 773, 772)' - PASSED ssl_gtest.sh: #5346: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4605 (1, 773, 769, 773, 773)' - PASSED ssl_gtest.sh: #5347: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4606 (1, 773, 770, 767, 767)' - PASSED ssl_gtest.sh: #5348: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4607 (1, 773, 770, 767, 768)' - PASSED ssl_gtest.sh: #5349: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4608 (1, 773, 770, 767, 769)' - PASSED ssl_gtest.sh: #5350: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4609 (1, 773, 770, 767, 770)' - PASSED ssl_gtest.sh: #5351: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4610 (1, 773, 770, 767, 771)' - PASSED ssl_gtest.sh: #5352: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4611 (1, 773, 770, 767, 772)' - PASSED ssl_gtest.sh: #5353: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4612 (1, 773, 770, 767, 773)' - PASSED ssl_gtest.sh: #5354: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4613 (1, 773, 770, 768, 767)' - PASSED ssl_gtest.sh: #5355: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4614 (1, 773, 770, 768, 768)' - PASSED ssl_gtest.sh: #5356: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4615 (1, 773, 770, 768, 769)' - PASSED ssl_gtest.sh: #5357: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4616 (1, 773, 770, 768, 770)' - PASSED ssl_gtest.sh: #5358: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4617 (1, 773, 770, 768, 771)' - PASSED ssl_gtest.sh: #5359: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4618 (1, 773, 770, 768, 772)' - PASSED ssl_gtest.sh: #5360: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4619 (1, 773, 770, 768, 773)' - PASSED ssl_gtest.sh: #5361: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4620 (1, 773, 770, 769, 767)' - PASSED ssl_gtest.sh: #5362: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4621 (1, 773, 770, 769, 768)' - PASSED ssl_gtest.sh: #5363: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4622 (1, 773, 770, 769, 769)' - PASSED ssl_gtest.sh: #5364: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4623 (1, 773, 770, 769, 770)' - PASSED ssl_gtest.sh: #5365: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4624 (1, 773, 770, 769, 771)' - PASSED ssl_gtest.sh: #5366: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4625 (1, 773, 770, 769, 772)' - PASSED ssl_gtest.sh: #5367: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4626 (1, 773, 770, 769, 773)' - PASSED ssl_gtest.sh: #5368: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4627 (1, 773, 770, 770, 767)' - PASSED ssl_gtest.sh: #5369: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4628 (1, 773, 770, 770, 768)' - PASSED ssl_gtest.sh: #5370: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4629 (1, 773, 770, 770, 769)' - PASSED ssl_gtest.sh: #5371: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4630 (1, 773, 770, 770, 770)' - PASSED ssl_gtest.sh: #5372: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4631 (1, 773, 770, 770, 771)' - PASSED ssl_gtest.sh: #5373: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4632 (1, 773, 770, 770, 772)' - PASSED ssl_gtest.sh: #5374: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4633 (1, 773, 770, 770, 773)' - PASSED ssl_gtest.sh: #5375: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4634 (1, 773, 770, 771, 767)' - PASSED ssl_gtest.sh: #5376: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4635 (1, 773, 770, 771, 768)' - PASSED ssl_gtest.sh: #5377: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4636 (1, 773, 770, 771, 769)' - PASSED ssl_gtest.sh: #5378: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4637 (1, 773, 770, 771, 770)' - PASSED ssl_gtest.sh: #5379: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4638 (1, 773, 770, 771, 771)' - PASSED ssl_gtest.sh: #5380: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4639 (1, 773, 770, 771, 772)' - PASSED ssl_gtest.sh: #5381: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4640 (1, 773, 770, 771, 773)' - PASSED ssl_gtest.sh: #5382: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4641 (1, 773, 770, 772, 767)' - PASSED ssl_gtest.sh: #5383: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4642 (1, 773, 770, 772, 768)' - PASSED ssl_gtest.sh: #5384: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4643 (1, 773, 770, 772, 769)' - PASSED ssl_gtest.sh: #5385: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4644 (1, 773, 770, 772, 770)' - PASSED ssl_gtest.sh: #5386: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4645 (1, 773, 770, 772, 771)' - PASSED ssl_gtest.sh: #5387: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4646 (1, 773, 770, 772, 772)' - PASSED ssl_gtest.sh: #5388: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4647 (1, 773, 770, 772, 773)' - PASSED ssl_gtest.sh: #5389: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4648 (1, 773, 770, 773, 767)' - PASSED ssl_gtest.sh: #5390: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4649 (1, 773, 770, 773, 768)' - PASSED ssl_gtest.sh: #5391: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4650 (1, 773, 770, 773, 769)' - PASSED ssl_gtest.sh: #5392: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4651 (1, 773, 770, 773, 770)' - PASSED ssl_gtest.sh: #5393: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4652 (1, 773, 770, 773, 771)' - PASSED ssl_gtest.sh: #5394: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4653 (1, 773, 770, 773, 772)' - PASSED ssl_gtest.sh: #5395: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4654 (1, 773, 770, 773, 773)' - PASSED ssl_gtest.sh: #5396: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4655 (1, 773, 771, 767, 767)' - PASSED ssl_gtest.sh: #5397: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4656 (1, 773, 771, 767, 768)' - PASSED ssl_gtest.sh: #5398: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4657 (1, 773, 771, 767, 769)' - PASSED ssl_gtest.sh: #5399: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4658 (1, 773, 771, 767, 770)' - PASSED ssl_gtest.sh: #5400: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4659 (1, 773, 771, 767, 771)' - PASSED ssl_gtest.sh: #5401: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4660 (1, 773, 771, 767, 772)' - PASSED ssl_gtest.sh: #5402: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4661 (1, 773, 771, 767, 773)' - PASSED ssl_gtest.sh: #5403: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4662 (1, 773, 771, 768, 767)' - PASSED ssl_gtest.sh: #5404: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4663 (1, 773, 771, 768, 768)' - PASSED ssl_gtest.sh: #5405: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4664 (1, 773, 771, 768, 769)' - PASSED ssl_gtest.sh: #5406: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4665 (1, 773, 771, 768, 770)' - PASSED ssl_gtest.sh: #5407: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4666 (1, 773, 771, 768, 771)' - PASSED ssl_gtest.sh: #5408: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4667 (1, 773, 771, 768, 772)' - PASSED ssl_gtest.sh: #5409: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4668 (1, 773, 771, 768, 773)' - PASSED ssl_gtest.sh: #5410: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4669 (1, 773, 771, 769, 767)' - PASSED ssl_gtest.sh: #5411: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4670 (1, 773, 771, 769, 768)' - PASSED ssl_gtest.sh: #5412: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4671 (1, 773, 771, 769, 769)' - PASSED ssl_gtest.sh: #5413: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4672 (1, 773, 771, 769, 770)' - PASSED ssl_gtest.sh: #5414: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4673 (1, 773, 771, 769, 771)' - PASSED ssl_gtest.sh: #5415: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4674 (1, 773, 771, 769, 772)' - PASSED ssl_gtest.sh: #5416: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4675 (1, 773, 771, 769, 773)' - PASSED ssl_gtest.sh: #5417: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4676 (1, 773, 771, 770, 767)' - PASSED ssl_gtest.sh: #5418: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4677 (1, 773, 771, 770, 768)' - PASSED ssl_gtest.sh: #5419: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4678 (1, 773, 771, 770, 769)' - PASSED ssl_gtest.sh: #5420: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4679 (1, 773, 771, 770, 770)' - PASSED ssl_gtest.sh: #5421: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4680 (1, 773, 771, 770, 771)' - PASSED ssl_gtest.sh: #5422: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4681 (1, 773, 771, 770, 772)' - PASSED ssl_gtest.sh: #5423: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4682 (1, 773, 771, 770, 773)' - PASSED ssl_gtest.sh: #5424: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4683 (1, 773, 771, 771, 767)' - PASSED ssl_gtest.sh: #5425: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4684 (1, 773, 771, 771, 768)' - PASSED ssl_gtest.sh: #5426: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4685 (1, 773, 771, 771, 769)' - PASSED ssl_gtest.sh: #5427: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4686 (1, 773, 771, 771, 770)' - PASSED ssl_gtest.sh: #5428: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4687 (1, 773, 771, 771, 771)' - PASSED ssl_gtest.sh: #5429: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4688 (1, 773, 771, 771, 772)' - PASSED ssl_gtest.sh: #5430: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4689 (1, 773, 771, 771, 773)' - PASSED ssl_gtest.sh: #5431: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4690 (1, 773, 771, 772, 767)' - PASSED ssl_gtest.sh: #5432: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4691 (1, 773, 771, 772, 768)' - PASSED ssl_gtest.sh: #5433: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4692 (1, 773, 771, 772, 769)' - PASSED ssl_gtest.sh: #5434: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4693 (1, 773, 771, 772, 770)' - PASSED ssl_gtest.sh: #5435: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4694 (1, 773, 771, 772, 771)' - PASSED ssl_gtest.sh: #5436: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4695 (1, 773, 771, 772, 772)' - PASSED ssl_gtest.sh: #5437: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4696 (1, 773, 771, 772, 773)' - PASSED ssl_gtest.sh: #5438: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4697 (1, 773, 771, 773, 767)' - PASSED ssl_gtest.sh: #5439: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4698 (1, 773, 771, 773, 768)' - PASSED ssl_gtest.sh: #5440: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4699 (1, 773, 771, 773, 769)' - PASSED ssl_gtest.sh: #5441: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4700 (1, 773, 771, 773, 770)' - PASSED ssl_gtest.sh: #5442: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4701 (1, 773, 771, 773, 771)' - PASSED ssl_gtest.sh: #5443: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4702 (1, 773, 771, 773, 772)' - PASSED ssl_gtest.sh: #5444: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4703 (1, 773, 771, 773, 773)' - PASSED ssl_gtest.sh: #5445: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4704 (1, 773, 772, 767, 767)' - PASSED ssl_gtest.sh: #5446: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4705 (1, 773, 772, 767, 768)' - PASSED ssl_gtest.sh: #5447: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4706 (1, 773, 772, 767, 769)' - PASSED ssl_gtest.sh: #5448: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4707 (1, 773, 772, 767, 770)' - PASSED ssl_gtest.sh: #5449: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4708 (1, 773, 772, 767, 771)' - PASSED ssl_gtest.sh: #5450: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4709 (1, 773, 772, 767, 772)' - PASSED ssl_gtest.sh: #5451: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4710 (1, 773, 772, 767, 773)' - PASSED ssl_gtest.sh: #5452: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4711 (1, 773, 772, 768, 767)' - PASSED ssl_gtest.sh: #5453: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4712 (1, 773, 772, 768, 768)' - PASSED ssl_gtest.sh: #5454: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4713 (1, 773, 772, 768, 769)' - PASSED ssl_gtest.sh: #5455: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4714 (1, 773, 772, 768, 770)' - PASSED ssl_gtest.sh: #5456: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4715 (1, 773, 772, 768, 771)' - PASSED ssl_gtest.sh: #5457: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4716 (1, 773, 772, 768, 772)' - PASSED ssl_gtest.sh: #5458: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4717 (1, 773, 772, 768, 773)' - PASSED ssl_gtest.sh: #5459: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4718 (1, 773, 772, 769, 767)' - PASSED ssl_gtest.sh: #5460: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4719 (1, 773, 772, 769, 768)' - PASSED ssl_gtest.sh: #5461: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4720 (1, 773, 772, 769, 769)' - PASSED ssl_gtest.sh: #5462: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4721 (1, 773, 772, 769, 770)' - PASSED ssl_gtest.sh: #5463: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4722 (1, 773, 772, 769, 771)' - PASSED ssl_gtest.sh: #5464: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4723 (1, 773, 772, 769, 772)' - PASSED ssl_gtest.sh: #5465: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4724 (1, 773, 772, 769, 773)' - PASSED ssl_gtest.sh: #5466: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4725 (1, 773, 772, 770, 767)' - PASSED ssl_gtest.sh: #5467: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4726 (1, 773, 772, 770, 768)' - PASSED ssl_gtest.sh: #5468: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4727 (1, 773, 772, 770, 769)' - PASSED ssl_gtest.sh: #5469: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4728 (1, 773, 772, 770, 770)' - PASSED ssl_gtest.sh: #5470: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4729 (1, 773, 772, 770, 771)' - PASSED ssl_gtest.sh: #5471: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4730 (1, 773, 772, 770, 772)' - PASSED ssl_gtest.sh: #5472: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4731 (1, 773, 772, 770, 773)' - PASSED ssl_gtest.sh: #5473: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4732 (1, 773, 772, 771, 767)' - PASSED ssl_gtest.sh: #5474: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4733 (1, 773, 772, 771, 768)' - PASSED ssl_gtest.sh: #5475: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4734 (1, 773, 772, 771, 769)' - PASSED ssl_gtest.sh: #5476: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4735 (1, 773, 772, 771, 770)' - PASSED ssl_gtest.sh: #5477: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4736 (1, 773, 772, 771, 771)' - PASSED ssl_gtest.sh: #5478: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4737 (1, 773, 772, 771, 772)' - PASSED ssl_gtest.sh: #5479: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4738 (1, 773, 772, 771, 773)' - PASSED ssl_gtest.sh: #5480: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4739 (1, 773, 772, 772, 767)' - PASSED ssl_gtest.sh: #5481: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4740 (1, 773, 772, 772, 768)' - PASSED ssl_gtest.sh: #5482: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4741 (1, 773, 772, 772, 769)' - PASSED ssl_gtest.sh: #5483: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4742 (1, 773, 772, 772, 770)' - PASSED ssl_gtest.sh: #5484: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4743 (1, 773, 772, 772, 771)' - PASSED ssl_gtest.sh: #5485: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4744 (1, 773, 772, 772, 772)' - PASSED ssl_gtest.sh: #5486: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4745 (1, 773, 772, 772, 773)' - PASSED ssl_gtest.sh: #5487: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4746 (1, 773, 772, 773, 767)' - PASSED ssl_gtest.sh: #5488: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4747 (1, 773, 772, 773, 768)' - PASSED ssl_gtest.sh: #5489: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4748 (1, 773, 772, 773, 769)' - PASSED ssl_gtest.sh: #5490: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4749 (1, 773, 772, 773, 770)' - PASSED ssl_gtest.sh: #5491: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4750 (1, 773, 772, 773, 771)' - PASSED ssl_gtest.sh: #5492: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4751 (1, 773, 772, 773, 772)' - PASSED ssl_gtest.sh: #5493: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4752 (1, 773, 772, 773, 773)' - PASSED ssl_gtest.sh: #5494: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4753 (1, 773, 773, 767, 767)' - PASSED ssl_gtest.sh: #5495: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4754 (1, 773, 773, 767, 768)' - PASSED ssl_gtest.sh: #5496: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4755 (1, 773, 773, 767, 769)' - PASSED ssl_gtest.sh: #5497: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4756 (1, 773, 773, 767, 770)' - PASSED ssl_gtest.sh: #5498: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4757 (1, 773, 773, 767, 771)' - PASSED ssl_gtest.sh: #5499: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4758 (1, 773, 773, 767, 772)' - PASSED ssl_gtest.sh: #5500: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4759 (1, 773, 773, 767, 773)' - PASSED ssl_gtest.sh: #5501: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4760 (1, 773, 773, 768, 767)' - PASSED ssl_gtest.sh: #5502: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4761 (1, 773, 773, 768, 768)' - PASSED ssl_gtest.sh: #5503: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4762 (1, 773, 773, 768, 769)' - PASSED ssl_gtest.sh: #5504: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4763 (1, 773, 773, 768, 770)' - PASSED ssl_gtest.sh: #5505: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4764 (1, 773, 773, 768, 771)' - PASSED ssl_gtest.sh: #5506: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4765 (1, 773, 773, 768, 772)' - PASSED ssl_gtest.sh: #5507: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4766 (1, 773, 773, 768, 773)' - PASSED ssl_gtest.sh: #5508: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4767 (1, 773, 773, 769, 767)' - PASSED ssl_gtest.sh: #5509: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4768 (1, 773, 773, 769, 768)' - PASSED ssl_gtest.sh: #5510: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4769 (1, 773, 773, 769, 769)' - PASSED ssl_gtest.sh: #5511: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4770 (1, 773, 773, 769, 770)' - PASSED ssl_gtest.sh: #5512: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4771 (1, 773, 773, 769, 771)' - PASSED ssl_gtest.sh: #5513: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4772 (1, 773, 773, 769, 772)' - PASSED ssl_gtest.sh: #5514: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4773 (1, 773, 773, 769, 773)' - PASSED ssl_gtest.sh: #5515: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4774 (1, 773, 773, 770, 767)' - PASSED ssl_gtest.sh: #5516: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4775 (1, 773, 773, 770, 768)' - PASSED ssl_gtest.sh: #5517: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4776 (1, 773, 773, 770, 769)' - PASSED ssl_gtest.sh: #5518: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4777 (1, 773, 773, 770, 770)' - PASSED ssl_gtest.sh: #5519: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4778 (1, 773, 773, 770, 771)' - PASSED ssl_gtest.sh: #5520: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4779 (1, 773, 773, 770, 772)' - PASSED ssl_gtest.sh: #5521: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4780 (1, 773, 773, 770, 773)' - PASSED ssl_gtest.sh: #5522: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4781 (1, 773, 773, 771, 767)' - PASSED ssl_gtest.sh: #5523: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4782 (1, 773, 773, 771, 768)' - PASSED ssl_gtest.sh: #5524: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4783 (1, 773, 773, 771, 769)' - PASSED ssl_gtest.sh: #5525: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4784 (1, 773, 773, 771, 770)' - PASSED ssl_gtest.sh: #5526: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4785 (1, 773, 773, 771, 771)' - PASSED ssl_gtest.sh: #5527: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4786 (1, 773, 773, 771, 772)' - PASSED ssl_gtest.sh: #5528: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4787 (1, 773, 773, 771, 773)' - PASSED ssl_gtest.sh: #5529: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4788 (1, 773, 773, 772, 767)' - PASSED ssl_gtest.sh: #5530: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4789 (1, 773, 773, 772, 768)' - PASSED ssl_gtest.sh: #5531: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4790 (1, 773, 773, 772, 769)' - PASSED ssl_gtest.sh: #5532: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4791 (1, 773, 773, 772, 770)' - PASSED ssl_gtest.sh: #5533: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4792 (1, 773, 773, 772, 771)' - PASSED ssl_gtest.sh: #5534: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4793 (1, 773, 773, 772, 772)' - PASSED ssl_gtest.sh: #5535: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4794 (1, 773, 773, 772, 773)' - PASSED ssl_gtest.sh: #5536: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4795 (1, 773, 773, 773, 767)' - PASSED ssl_gtest.sh: #5537: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4796 (1, 773, 773, 773, 768)' - PASSED ssl_gtest.sh: #5538: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4797 (1, 773, 773, 773, 769)' - PASSED ssl_gtest.sh: #5539: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4798 (1, 773, 773, 773, 770)' - PASSED ssl_gtest.sh: #5540: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4799 (1, 773, 773, 773, 771)' - PASSED ssl_gtest.sh: #5541: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4800 (1, 773, 773, 773, 772)' - PASSED ssl_gtest.sh: #5542: 'TLSVersionRanges/TestPolicyVersionRange: TestAllTLSVersionsAndPolicyCombinations/4801 (1, 773, 773, 773, 773)' - PASSED ssl_gtest.sh: #5543: 'StreamOnly/TlsConnectStream: ServerNegotiateTls10/0 772' - PASSED ssl_gtest.sh: #5544: 'StreamOnly/TlsConnectStream: ServerNegotiateTls10/1 771' - PASSED ssl_gtest.sh: #5545: 'StreamOnly/TlsConnectStream: ServerNegotiateTls10/2 770' - PASSED ssl_gtest.sh: #5546: 'StreamOnly/TlsConnectStream: ServerNegotiateTls10/3 769' - PASSED ssl_gtest.sh: #5547: 'StreamOnly/TlsConnectStream: ConnectTls10AndServerRenegotiateHigher/0 772' - PASSED ssl_gtest.sh: #5548: 'StreamOnly/TlsConnectStream: ConnectTls10AndServerRenegotiateHigher/1 771' - PASSED ssl_gtest.sh: #5549: 'StreamOnly/TlsConnectStream: ConnectTls10AndServerRenegotiateHigher/2 770' - PASSED ssl_gtest.sh: #5550: 'StreamOnly/TlsConnectStream: ConnectTls10AndClientRenegotiateHigher/0 772' - PASSED ssl_gtest.sh: #5551: 'StreamOnly/TlsConnectStream: ConnectTls10AndClientRenegotiateHigher/1 771' - PASSED ssl_gtest.sh: #5552: 'StreamOnly/TlsConnectStream: ConnectTls10AndClientRenegotiateHigher/2 770' - PASSED ssl_gtest.sh: #5553: 'StreamOnly/TlsConnectStream: ConnectAndServerRenegotiateLower/0 772' - PASSED ssl_gtest.sh: #5554: 'StreamOnly/TlsConnectStream: ConnectAndServerRenegotiateLower/1 771' - PASSED ssl_gtest.sh: #5555: 'StreamOnly/TlsConnectStream: ConnectAndServerRenegotiateLower/2 770' - PASSED ssl_gtest.sh: #5556: 'StreamOnly/TlsConnectStream: ConnectAndServerWontRenegotiateLower/0 772' - PASSED ssl_gtest.sh: #5557: 'StreamOnly/TlsConnectStream: ConnectAndServerWontRenegotiateLower/1 771' - PASSED ssl_gtest.sh: #5558: 'StreamOnly/TlsConnectStream: ConnectAndServerWontRenegotiateLower/2 770' - PASSED ssl_gtest.sh: #5559: 'StreamOnly/TlsConnectStream: ConnectAndClientWontRenegotiateLower/0 772' - PASSED ssl_gtest.sh: #5560: 'StreamOnly/TlsConnectStream: ConnectAndClientWontRenegotiateLower/1 771' - PASSED ssl_gtest.sh: #5561: 'StreamOnly/TlsConnectStream: ConnectAndClientWontRenegotiateLower/2 770' - PASSED ssl_gtest.sh: #5562: 'StreamOnly/TlsConnectStream: ResumptionOverrideCipher/0 772' - PASSED ssl_gtest.sh: #5563: 'StreamOnly/TlsConnectStream: ResumptionOverrideCipher/1 771' - PASSED ssl_gtest.sh: #5564: 'StreamOnly/TlsConnectStream: ResumptionOverrideCipher/2 770' - PASSED ssl_gtest.sh: #5565: 'StreamOnly/TlsConnectStream: ResumptionOverrideCipher/3 769' - PASSED ssl_gtest.sh: #5566: 'StreamOnly/TlsConnectStream: ReplaceRecordLayer/0 772' - PASSED ssl_gtest.sh: #5567: 'StreamOnly/TlsConnectStream: ReplaceRecordLayer/1 771' - PASSED ssl_gtest.sh: #5568: 'StreamOnly/TlsConnectStream: ReplaceRecordLayer/2 770' - PASSED ssl_gtest.sh: #5569: 'StreamOnly/TlsConnectStream: ReplaceRecordLayer/3 769' - PASSED ssl_gtest.sh: #5570: 'StreamOnly/TlsConnectStream: ReplaceRecordLayerAsyncLateAuth/0 772' - PASSED ssl_gtest.sh: #5571: 'StreamOnly/TlsConnectStream: ReplaceRecordLayerAsyncLateAuth/1 771' - PASSED ssl_gtest.sh: #5572: 'StreamOnly/TlsConnectStream: ReplaceRecordLayerAsyncLateAuth/2 770' - PASSED ssl_gtest.sh: #5573: 'StreamOnly/TlsConnectStream: ReplaceRecordLayerAsyncLateAuth/3 769' - PASSED ssl_gtest.sh: #5574: 'StreamOnly/TlsConnectStream: ForwardDataFromWrongEpoch/0 772' - PASSED ssl_gtest.sh: #5575: 'StreamOnly/TlsConnectStream: ForwardDataFromWrongEpoch/1 771' - PASSED ssl_gtest.sh: #5576: 'StreamOnly/TlsConnectStream: ForwardDataFromWrongEpoch/2 770' - PASSED ssl_gtest.sh: #5577: 'StreamOnly/TlsConnectStream: ForwardDataFromWrongEpoch/3 769' - PASSED ssl_gtest.sh: #5578: 'StreamOnly/TlsConnectStream: BadRecordMac/0 772' - PASSED ssl_gtest.sh: #5579: 'StreamOnly/TlsConnectStream: BadRecordMac/1 771' - PASSED ssl_gtest.sh: #5580: 'StreamOnly/TlsConnectStream: BadRecordMac/2 770' - PASSED ssl_gtest.sh: #5581: 'StreamOnly/TlsConnectStream: BadRecordMac/3 769' - PASSED ssl_gtest.sh: #5582: 'StreamOnly/TlsConnectStream: ShortRead/0 772' - PASSED ssl_gtest.sh: #5583: 'StreamOnly/TlsConnectStream: ShortRead/1 771' - PASSED ssl_gtest.sh: #5584: 'StreamOnly/TlsConnectStream: ShortRead/2 770' - PASSED ssl_gtest.sh: #5585: 'StreamOnly/TlsConnectStream: GatherBufferPartialReadTest/0 772' - PASSED ssl_gtest.sh: #5586: 'StreamOnly/TlsConnectStream: GatherBufferPartialReadTest/1 771' - PASSED ssl_gtest.sh: #5587: 'StreamOnly/TlsConnectStream: GatherBufferPartialReadTest/2 770' - PASSED ssl_gtest.sh: #5588: 'StreamOnly/TlsConnectStream: GatherBufferPartialReadTest/3 769' - PASSED ssl_gtest.sh: #5589: 'StreamOnly/TlsConnectStream: IncludePadding/0 772' - PASSED ssl_gtest.sh: #5590: 'StreamOnly/TlsConnectStream: IncludePadding/1 771' - PASSED ssl_gtest.sh: #5591: 'StreamOnly/TlsConnectStream: IncludePadding/2 770' - PASSED ssl_gtest.sh: #5592: 'StreamOnly/TlsConnectStream: IncludePadding/3 769' - PASSED ssl_gtest.sh: #5593: 'GenericStream/TlsConnectGeneric: ServerNegotiateTls11/0 (0, 772)' - PASSED ssl_gtest.sh: #5594: 'GenericStream/TlsConnectGeneric: ServerNegotiateTls11/1 (0, 771)' - PASSED ssl_gtest.sh: #5595: 'GenericStream/TlsConnectGeneric: ServerNegotiateTls11/2 (0, 770)' - PASSED ssl_gtest.sh: #5596: 'GenericStream/TlsConnectGeneric: ServerNegotiateTls12/0 (0, 772)' - PASSED ssl_gtest.sh: #5597: 'GenericStream/TlsConnectGeneric: ServerNegotiateTls12/1 (0, 771)' - PASSED ssl_gtest.sh: #5598: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/0 (0, 772)' - PASSED ssl_gtest.sh: #5599: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/1 (0, 771)' - PASSED ssl_gtest.sh: #5600: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/2 (0, 770)' - PASSED ssl_gtest.sh: #5601: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/3 (0, 769)' - PASSED ssl_gtest.sh: #5602: 'GenericStream/TlsConnectGeneric: TestFallbackSCSVVersionMatch/0 (0, 772)' - PASSED ssl_gtest.sh: #5603: 'GenericStream/TlsConnectGeneric: TestFallbackSCSVVersionMatch/1 (0, 771)' - PASSED ssl_gtest.sh: #5604: 'GenericStream/TlsConnectGeneric: TestFallbackSCSVVersionMatch/2 (0, 770)' - PASSED ssl_gtest.sh: #5605: 'GenericStream/TlsConnectGeneric: TestFallbackSCSVVersionMatch/3 (0, 769)' - PASSED ssl_gtest.sh: #5606: 'GenericStream/TlsConnectGeneric: AlertBeforeServerHello/0 (0, 772)' - PASSED ssl_gtest.sh: #5607: 'GenericStream/TlsConnectGeneric: AlertBeforeServerHello/1 (0, 771)' - PASSED ssl_gtest.sh: #5608: 'GenericStream/TlsConnectGeneric: AlertBeforeServerHello/2 (0, 770)' - PASSED ssl_gtest.sh: #5609: 'GenericStream/TlsConnectGeneric: AlertBeforeServerHello/3 (0, 769)' - PASSED ssl_gtest.sh: #5610: 'GenericStream/TlsConnectGeneric: ServerAuthBiggestRsa/0 (0, 772)' - PASSED ssl_gtest.sh: #5611: 'GenericStream/TlsConnectGeneric: ServerAuthBiggestRsa/1 (0, 771)' - PASSED ssl_gtest.sh: #5612: 'GenericStream/TlsConnectGeneric: ServerAuthBiggestRsa/2 (0, 770)' - PASSED ssl_gtest.sh: #5613: 'GenericStream/TlsConnectGeneric: ServerAuthBiggestRsa/3 (0, 769)' - PASSED ssl_gtest.sh: #5614: 'GenericStream/TlsConnectGeneric: ConnectResumeClientBothTicketServerTicketForget/0 (0, 772)' - PASSED ssl_gtest.sh: #5615: 'GenericStream/TlsConnectGeneric: ConnectResumeClientBothTicketServerTicketForget/1 (0, 771)' - PASSED ssl_gtest.sh: #5616: 'GenericStream/TlsConnectGeneric: ConnectResumeClientBothTicketServerTicketForget/2 (0, 770)' - PASSED ssl_gtest.sh: #5617: 'GenericStream/TlsConnectGeneric: ConnectResumeClientBothTicketServerTicketForget/3 (0, 769)' - PASSED ssl_gtest.sh: #5618: 'GenericStream/TlsConnectGeneric: ConnectWithExpiredTicketAtServer/0 (0, 772)' - PASSED ssl_gtest.sh: #5619: 'GenericStream/TlsConnectGeneric: ConnectWithExpiredTicketAtServer/1 (0, 771)' - PASSED ssl_gtest.sh: #5620: 'GenericStream/TlsConnectGeneric: ConnectWithExpiredTicketAtServer/2 (0, 770)' - PASSED ssl_gtest.sh: #5621: 'GenericStream/TlsConnectGeneric: ConnectWithExpiredTicketAtServer/3 (0, 769)' - PASSED ssl_gtest.sh: #5622: 'GenericStream/TlsConnectGeneric: ConnectResumeCorruptTicket/0 (0, 772)' - PASSED ssl_gtest.sh: #5623: 'GenericStream/TlsConnectGeneric: ConnectResumeCorruptTicket/1 (0, 771)' - PASSED ssl_gtest.sh: #5624: 'GenericStream/TlsConnectGeneric: ConnectResumeCorruptTicket/2 (0, 770)' - PASSED ssl_gtest.sh: #5625: 'GenericStream/TlsConnectGeneric: ConnectResumeCorruptTicket/3 (0, 769)' - PASSED ssl_gtest.sh: #5626: 'GenericStream/TlsConnectGeneric: ServerSNICertSwitch/0 (0, 772)' - PASSED ssl_gtest.sh: #5627: 'GenericStream/TlsConnectGeneric: ServerSNICertSwitch/1 (0, 771)' - PASSED ssl_gtest.sh: #5628: 'GenericStream/TlsConnectGeneric: ServerSNICertSwitch/2 (0, 770)' - PASSED ssl_gtest.sh: #5629: 'GenericStream/TlsConnectGeneric: ServerSNICertSwitch/3 (0, 769)' - PASSED ssl_gtest.sh: #5630: 'GenericStream/TlsConnectGeneric: ServerSNICertTypeSwitch/0 (0, 772)' - PASSED ssl_gtest.sh: #5631: 'GenericStream/TlsConnectGeneric: ServerSNICertTypeSwitch/1 (0, 771)' - PASSED ssl_gtest.sh: #5632: 'GenericStream/TlsConnectGeneric: ServerSNICertTypeSwitch/2 (0, 770)' - PASSED ssl_gtest.sh: #5633: 'GenericStream/TlsConnectGeneric: ServerSNICertTypeSwitch/3 (0, 769)' - PASSED ssl_gtest.sh: #5634: 'GenericStream/TlsConnectGeneric: RecordSizeMaximum/0 (0, 772)' - PASSED ssl_gtest.sh: #5635: 'GenericStream/TlsConnectGeneric: RecordSizeMaximum/1 (0, 771)' - PASSED ssl_gtest.sh: #5636: 'GenericStream/TlsConnectGeneric: RecordSizeMaximum/2 (0, 770)' - PASSED ssl_gtest.sh: #5637: 'GenericStream/TlsConnectGeneric: RecordSizeMaximum/3 (0, 769)' - PASSED ssl_gtest.sh: #5638: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumClient/0 (0, 772)' - PASSED ssl_gtest.sh: #5639: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumClient/1 (0, 771)' - PASSED ssl_gtest.sh: #5640: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumClient/2 (0, 770)' - PASSED ssl_gtest.sh: #5641: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumClient/3 (0, 769)' - PASSED ssl_gtest.sh: #5642: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumServer/0 (0, 772)' - PASSED ssl_gtest.sh: #5643: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumServer/1 (0, 771)' - PASSED ssl_gtest.sh: #5644: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumServer/2 (0, 770)' - PASSED ssl_gtest.sh: #5645: 'GenericStream/TlsConnectGeneric: RecordSizeMinimumServer/3 (0, 769)' - PASSED ssl_gtest.sh: #5646: 'GenericStream/TlsConnectGeneric: RecordSizeAsymmetric/0 (0, 772)' - PASSED ssl_gtest.sh: #5647: 'GenericStream/TlsConnectGeneric: RecordSizeAsymmetric/1 (0, 771)' - PASSED ssl_gtest.sh: #5648: 'GenericStream/TlsConnectGeneric: RecordSizeAsymmetric/2 (0, 770)' - PASSED ssl_gtest.sh: #5649: 'GenericStream/TlsConnectGeneric: RecordSizeAsymmetric/3 (0, 769)' - PASSED ssl_gtest.sh: #5650: 'GenericStream/TlsConnectGeneric: RecordSizeBadValues/0 (0, 772)' - PASSED ssl_gtest.sh: #5651: 'GenericStream/TlsConnectGeneric: RecordSizeBadValues/1 (0, 771)' - PASSED ssl_gtest.sh: #5652: 'GenericStream/TlsConnectGeneric: RecordSizeBadValues/2 (0, 770)' - PASSED ssl_gtest.sh: #5653: 'GenericStream/TlsConnectGeneric: RecordSizeBadValues/3 (0, 769)' - PASSED ssl_gtest.sh: #5654: 'GenericStream/TlsConnectGeneric: RecordSizeGetValues/0 (0, 772)' - PASSED ssl_gtest.sh: #5655: 'GenericStream/TlsConnectGeneric: RecordSizeGetValues/1 (0, 771)' - PASSED ssl_gtest.sh: #5656: 'GenericStream/TlsConnectGeneric: RecordSizeGetValues/2 (0, 770)' - PASSED ssl_gtest.sh: #5657: 'GenericStream/TlsConnectGeneric: RecordSizeGetValues/3 (0, 769)' - PASSED ssl_gtest.sh: #5658: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionClient/0 (0, 772)' - PASSED ssl_gtest.sh: #5659: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionClient/1 (0, 771)' - PASSED ssl_gtest.sh: #5660: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionClient/2 (0, 770)' - PASSED ssl_gtest.sh: #5661: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionClient/3 (0, 769)' - PASSED ssl_gtest.sh: #5662: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionServer/0 (0, 772)' - PASSED ssl_gtest.sh: #5663: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionServer/1 (0, 771)' - PASSED ssl_gtest.sh: #5664: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionServer/2 (0, 770)' - PASSED ssl_gtest.sh: #5665: 'GenericStream/TlsConnectGeneric: RecordSizeCapExtensionServer/3 (0, 769)' - PASSED ssl_gtest.sh: #5666: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionInvalid/0 (0, 772)' - PASSED ssl_gtest.sh: #5667: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionInvalid/1 (0, 771)' - PASSED ssl_gtest.sh: #5668: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionInvalid/2 (0, 770)' - PASSED ssl_gtest.sh: #5669: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionInvalid/3 (0, 769)' - PASSED ssl_gtest.sh: #5670: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionExtra/0 (0, 772)' - PASSED ssl_gtest.sh: #5671: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionExtra/1 (0, 771)' - PASSED ssl_gtest.sh: #5672: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionExtra/2 (0, 770)' - PASSED ssl_gtest.sh: #5673: 'GenericStream/TlsConnectGeneric: RecordSizeServerExtensionExtra/3 (0, 769)' - PASSED ssl_gtest.sh: #5674: 'GenericStream/TlsConnectGeneric: RecordGatherOverlong/0 (0, 772)' - PASSED ssl_gtest.sh: #5675: 'GenericStream/TlsConnectGeneric: RecordGatherOverlong/1 (0, 771)' - PASSED ssl_gtest.sh: #5676: 'GenericStream/TlsConnectGeneric: RecordGatherOverlong/2 (0, 770)' - PASSED ssl_gtest.sh: #5677: 'GenericStream/TlsConnectGeneric: RecordGatherOverlong/3 (0, 769)' - PASSED ssl_gtest.sh: #5678: 'GenericStream/TlsConnectGeneric: RecordSizeExtensionOverlong/0 (0, 772)' - PASSED ssl_gtest.sh: #5679: 'GenericStream/TlsConnectGeneric: RecordSizeExtensionOverlong/1 (0, 771)' - PASSED ssl_gtest.sh: #5680: 'GenericStream/TlsConnectGeneric: RecordSizeExtensionOverlong/2 (0, 770)' - PASSED ssl_gtest.sh: #5681: 'GenericStream/TlsConnectGeneric: RecordSizeExtensionOverlong/3 (0, 769)' - PASSED ssl_gtest.sh: #5682: 'GenericStream/TlsConnectGeneric: RecordExpansionOverlong/0 (0, 772)' - PASSED ssl_gtest.sh: #5683: 'GenericStream/TlsConnectGeneric: RecordExpansionOverlong/1 (0, 771)' - PASSED ssl_gtest.sh: #5684: 'GenericStream/TlsConnectGeneric: RecordExpansionOverlong/2 (0, 770)' - PASSED ssl_gtest.sh: #5685: 'GenericStream/TlsConnectGeneric: RecordExpansionOverlong/3 (0, 769)' - PASSED ssl_gtest.sh: #5686: 'GenericStream/TlsConnectGeneric: RecordSizeDefaultLong/0 (0, 772)' - PASSED ssl_gtest.sh: #5687: 'GenericStream/TlsConnectGeneric: RecordSizeDefaultLong/1 (0, 771)' - PASSED ssl_gtest.sh: #5688: 'GenericStream/TlsConnectGeneric: RecordSizeDefaultLong/2 (0, 770)' - PASSED ssl_gtest.sh: #5689: 'GenericStream/TlsConnectGeneric: RecordSizeDefaultLong/3 (0, 769)' - PASSED ssl_gtest.sh: #5690: 'GenericStream/TlsConnectGeneric: RecordSizeLimitLong/0 (0, 772)' - PASSED ssl_gtest.sh: #5691: 'GenericStream/TlsConnectGeneric: RecordSizeLimitLong/1 (0, 771)' - PASSED ssl_gtest.sh: #5692: 'GenericStream/TlsConnectGeneric: RecordSizeLimitLong/2 (0, 770)' - PASSED ssl_gtest.sh: #5693: 'GenericStream/TlsConnectGeneric: RecordSizeLimitLong/3 (0, 769)' - PASSED ssl_gtest.sh: #5694: 'GenericStream/TlsConnectGeneric: SetupOnly/0 (0, 772)' - PASSED ssl_gtest.sh: #5695: 'GenericStream/TlsConnectGeneric: SetupOnly/1 (0, 771)' - PASSED ssl_gtest.sh: #5696: 'GenericStream/TlsConnectGeneric: SetupOnly/2 (0, 770)' - PASSED ssl_gtest.sh: #5697: 'GenericStream/TlsConnectGeneric: SetupOnly/3 (0, 769)' - PASSED ssl_gtest.sh: #5698: 'GenericStream/TlsConnectGeneric: Connect/0 (0, 772)' - PASSED ssl_gtest.sh: #5699: 'GenericStream/TlsConnectGeneric: Connect/1 (0, 771)' - PASSED ssl_gtest.sh: #5700: 'GenericStream/TlsConnectGeneric: Connect/2 (0, 770)' - PASSED ssl_gtest.sh: #5701: 'GenericStream/TlsConnectGeneric: Connect/3 (0, 769)' - PASSED ssl_gtest.sh: #5702: 'GenericStream/TlsConnectGeneric: ConnectEcdsa/0 (0, 772)' - PASSED ssl_gtest.sh: #5703: 'GenericStream/TlsConnectGeneric: ConnectEcdsa/1 (0, 771)' - PASSED ssl_gtest.sh: #5704: 'GenericStream/TlsConnectGeneric: ConnectEcdsa/2 (0, 770)' - PASSED ssl_gtest.sh: #5705: 'GenericStream/TlsConnectGeneric: ConnectEcdsa/3 (0, 769)' - PASSED ssl_gtest.sh: #5706: 'GenericStream/TlsConnectGeneric: CipherSuiteMismatch/0 (0, 772)' - PASSED ssl_gtest.sh: #5707: 'GenericStream/TlsConnectGeneric: CipherSuiteMismatch/1 (0, 771)' - PASSED ssl_gtest.sh: #5708: 'GenericStream/TlsConnectGeneric: CipherSuiteMismatch/2 (0, 770)' - PASSED ssl_gtest.sh: #5709: 'GenericStream/TlsConnectGeneric: CipherSuiteMismatch/3 (0, 769)' - PASSED ssl_gtest.sh: #5710: 'GenericStream/TlsConnectGeneric: CaptureAlertServer/0 (0, 772)' - PASSED ssl_gtest.sh: #5711: 'GenericStream/TlsConnectGeneric: CaptureAlertServer/1 (0, 771)' - PASSED ssl_gtest.sh: #5712: 'GenericStream/TlsConnectGeneric: CaptureAlertServer/2 (0, 770)' - PASSED ssl_gtest.sh: #5713: 'GenericStream/TlsConnectGeneric: CaptureAlertServer/3 (0, 769)' - PASSED ssl_gtest.sh: #5714: 'GenericStream/TlsConnectGeneric: ConnectAlpn/0 (0, 772)' - PASSED ssl_gtest.sh: #5715: 'GenericStream/TlsConnectGeneric: ConnectAlpn/1 (0, 771)' - PASSED ssl_gtest.sh: #5716: 'GenericStream/TlsConnectGeneric: ConnectAlpn/2 (0, 770)' - PASSED ssl_gtest.sh: #5717: 'GenericStream/TlsConnectGeneric: ConnectAlpn/3 (0, 769)' - PASSED ssl_gtest.sh: #5718: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityA/0 (0, 772)' - PASSED ssl_gtest.sh: #5719: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityA/1 (0, 771)' - PASSED ssl_gtest.sh: #5720: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityA/2 (0, 770)' - PASSED ssl_gtest.sh: #5721: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityA/3 (0, 769)' - PASSED ssl_gtest.sh: #5722: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityB/0 (0, 772)' - PASSED ssl_gtest.sh: #5723: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityB/1 (0, 771)' - PASSED ssl_gtest.sh: #5724: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityB/2 (0, 770)' - PASSED ssl_gtest.sh: #5725: 'GenericStream/TlsConnectGeneric: ConnectAlpnPriorityB/3 (0, 769)' - PASSED ssl_gtest.sh: #5726: 'GenericStream/TlsConnectGeneric: ConnectAlpnClone/0 (0, 772)' - PASSED ssl_gtest.sh: #5727: 'GenericStream/TlsConnectGeneric: ConnectAlpnClone/1 (0, 771)' - PASSED ssl_gtest.sh: #5728: 'GenericStream/TlsConnectGeneric: ConnectAlpnClone/2 (0, 770)' - PASSED ssl_gtest.sh: #5729: 'GenericStream/TlsConnectGeneric: ConnectAlpnClone/3 (0, 769)' - PASSED ssl_gtest.sh: #5730: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackA/0 (0, 772)' - PASSED ssl_gtest.sh: #5731: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackA/1 (0, 771)' - PASSED ssl_gtest.sh: #5732: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackA/2 (0, 770)' - PASSED ssl_gtest.sh: #5733: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackA/3 (0, 769)' - PASSED ssl_gtest.sh: #5734: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackB/0 (0, 772)' - PASSED ssl_gtest.sh: #5735: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackB/1 (0, 771)' - PASSED ssl_gtest.sh: #5736: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackB/2 (0, 770)' - PASSED ssl_gtest.sh: #5737: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackB/3 (0, 769)' - PASSED ssl_gtest.sh: #5738: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackC/0 (0, 772)' - PASSED ssl_gtest.sh: #5739: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackC/1 (0, 771)' - PASSED ssl_gtest.sh: #5740: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackC/2 (0, 770)' - PASSED ssl_gtest.sh: #5741: 'GenericStream/TlsConnectGeneric: ConnectAlpnWithCustomCallbackC/3 (0, 769)' - PASSED ssl_gtest.sh: #5742: 'GenericStream/TlsConnectGeneric: ConnectSendReceive/0 (0, 772)' - PASSED ssl_gtest.sh: #5743: 'GenericStream/TlsConnectGeneric: ConnectSendReceive/1 (0, 771)' - PASSED ssl_gtest.sh: #5744: 'GenericStream/TlsConnectGeneric: ConnectSendReceive/2 (0, 770)' - PASSED ssl_gtest.sh: #5745: 'GenericStream/TlsConnectGeneric: ConnectSendReceive/3 (0, 769)' - PASSED ssl_gtest.sh: #5746: 'GenericStream/TlsConnectGeneric: ConnectWithCompressionEnabled/0 (0, 772)' - PASSED ssl_gtest.sh: #5747: 'GenericStream/TlsConnectGeneric: ConnectWithCompressionEnabled/1 (0, 771)' - PASSED ssl_gtest.sh: #5748: 'GenericStream/TlsConnectGeneric: ConnectWithCompressionEnabled/2 (0, 770)' - PASSED ssl_gtest.sh: #5749: 'GenericStream/TlsConnectGeneric: ConnectWithCompressionEnabled/3 (0, 769)' - PASSED ssl_gtest.sh: #5750: 'GenericStream/TlsConnectGeneric: CheckRandoms/0 (0, 772)' - PASSED ssl_gtest.sh: #5751: 'GenericStream/TlsConnectGeneric: CheckRandoms/1 (0, 771)' - PASSED ssl_gtest.sh: #5752: 'GenericStream/TlsConnectGeneric: CheckRandoms/2 (0, 770)' - PASSED ssl_gtest.sh: #5753: 'GenericStream/TlsConnectGeneric: CheckRandoms/3 (0, 769)' - PASSED ssl_gtest.sh: #5754: 'GenericStream/TlsConnectGeneric: ShutdownOneSide/0 (0, 772)' - PASSED ssl_gtest.sh: #5755: 'GenericStream/TlsConnectGeneric: ShutdownOneSide/1 (0, 771)' - PASSED ssl_gtest.sh: #5756: 'GenericStream/TlsConnectGeneric: ShutdownOneSide/2 (0, 770)' - PASSED ssl_gtest.sh: #5757: 'GenericStream/TlsConnectGeneric: ShutdownOneSide/3 (0, 769)' - PASSED ssl_gtest.sh: #5758: 'GenericStream/TlsConnectGeneric: ShutdownOneSideThenCloseTcp/0 (0, 772)' - PASSED ssl_gtest.sh: #5759: 'GenericStream/TlsConnectGeneric: ShutdownOneSideThenCloseTcp/1 (0, 771)' - PASSED ssl_gtest.sh: #5760: 'GenericStream/TlsConnectGeneric: ShutdownOneSideThenCloseTcp/2 (0, 770)' - PASSED ssl_gtest.sh: #5761: 'GenericStream/TlsConnectGeneric: ShutdownOneSideThenCloseTcp/3 (0, 769)' - PASSED ssl_gtest.sh: #5762: 'GenericStream/TlsConnectGeneric: AlpnDisabled/0 (0, 772)' - PASSED ssl_gtest.sh: #5763: 'GenericStream/TlsConnectGeneric: AlpnDisabled/1 (0, 771)' - PASSED ssl_gtest.sh: #5764: 'GenericStream/TlsConnectGeneric: AlpnDisabled/2 (0, 770)' - PASSED ssl_gtest.sh: #5765: 'GenericStream/TlsConnectGeneric: AlpnDisabled/3 (0, 769)' - PASSED ssl_gtest.sh: #5766: 'GenericStream/TlsConnectGeneric: ClientHelloExtensionPermutation/0 (0, 772)' - PASSED ssl_gtest.sh: #5767: 'GenericStream/TlsConnectGeneric: ClientHelloExtensionPermutation/1 (0, 771)' - PASSED ssl_gtest.sh: #5768: 'GenericStream/TlsConnectGeneric: ClientHelloExtensionPermutation/2 (0, 770)' - PASSED ssl_gtest.sh: #5769: 'GenericStream/TlsConnectGeneric: ClientHelloExtensionPermutation/3 (0, 769)' - PASSED ssl_gtest.sh: #5770: 'GenericStream/TlsConnectGeneric: ExporterBasic/0 (0, 772)' - PASSED ssl_gtest.sh: #5771: 'GenericStream/TlsConnectGeneric: ExporterBasic/1 (0, 771)' - PASSED ssl_gtest.sh: #5772: 'GenericStream/TlsConnectGeneric: ExporterBasic/2 (0, 770)' - PASSED ssl_gtest.sh: #5773: 'GenericStream/TlsConnectGeneric: ExporterBasic/3 (0, 769)' - PASSED ssl_gtest.sh: #5774: 'GenericStream/TlsConnectGeneric: ExporterContext/0 (0, 772)' - PASSED ssl_gtest.sh: #5775: 'GenericStream/TlsConnectGeneric: ExporterContext/1 (0, 771)' - PASSED ssl_gtest.sh: #5776: 'GenericStream/TlsConnectGeneric: ExporterContext/2 (0, 770)' - PASSED ssl_gtest.sh: #5777: 'GenericStream/TlsConnectGeneric: ExporterContext/3 (0, 769)' - PASSED ssl_gtest.sh: #5778: 'GenericStream/TlsConnectGeneric: ConnectEcdhe/0 (0, 772)' - PASSED ssl_gtest.sh: #5779: 'GenericStream/TlsConnectGeneric: ConnectEcdhe/1 (0, 771)' - PASSED ssl_gtest.sh: #5780: 'GenericStream/TlsConnectGeneric: ConnectEcdhe/2 (0, 770)' - PASSED ssl_gtest.sh: #5781: 'GenericStream/TlsConnectGeneric: ConnectEcdhe/3 (0, 769)' - PASSED ssl_gtest.sh: #5782: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Client/0 (0, 772)' - PASSED ssl_gtest.sh: #5783: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Client/1 (0, 771)' - PASSED ssl_gtest.sh: #5784: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Client/2 (0, 770)' - PASSED ssl_gtest.sh: #5785: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Client/3 (0, 769)' - PASSED ssl_gtest.sh: #5786: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/0 (0, 772)' - PASSED ssl_gtest.sh: #5787: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/1 (0, 771)' - PASSED ssl_gtest.sh: #5788: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/2 (0, 770)' - PASSED ssl_gtest.sh: #5789: 'GenericStream/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/3 (0, 769)' - PASSED ssl_gtest.sh: #5790: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Server/0 (0, 772)' - PASSED ssl_gtest.sh: #5791: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Server/1 (0, 771)' - PASSED ssl_gtest.sh: #5792: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Server/2 (0, 770)' - PASSED ssl_gtest.sh: #5793: 'GenericStream/TlsConnectGeneric: ConnectEcdheP384Server/3 (0, 769)' - PASSED ssl_gtest.sh: #5794: 'GenericStream/TlsConnectGeneric: ConnectEcdheGroupMismatch/0 (0, 772)' - PASSED ssl_gtest.sh: #5795: 'GenericStream/TlsConnectGeneric: ConnectEcdheGroupMismatch/1 (0, 771)' - PASSED ssl_gtest.sh: #5796: 'GenericStream/TlsConnectGeneric: ConnectEcdheGroupMismatch/2 (0, 770)' - PASSED ssl_gtest.sh: #5797: 'GenericStream/TlsConnectGeneric: ConnectEcdheGroupMismatch/3 (0, 769)' - PASSED ssl_gtest.sh: #5798: 'GenericStream/TlsConnectGeneric: P256ClientAndCurve25519Server/0 (0, 772)' - PASSED ssl_gtest.sh: #5799: 'GenericStream/TlsConnectGeneric: P256ClientAndCurve25519Server/1 (0, 771)' - PASSED ssl_gtest.sh: #5800: 'GenericStream/TlsConnectGeneric: P256ClientAndCurve25519Server/2 (0, 770)' - PASSED ssl_gtest.sh: #5801: 'GenericStream/TlsConnectGeneric: P256ClientAndCurve25519Server/3 (0, 769)' - PASSED ssl_gtest.sh: #5802: 'GenericStream/TlsConnectGeneric: ConnectDhe/0 (0, 772)' - PASSED ssl_gtest.sh: #5803: 'GenericStream/TlsConnectGeneric: ConnectDhe/1 (0, 771)' - PASSED ssl_gtest.sh: #5804: 'GenericStream/TlsConnectGeneric: ConnectDhe/2 (0, 770)' - PASSED ssl_gtest.sh: #5805: 'GenericStream/TlsConnectGeneric: ConnectDhe/3 (0, 769)' - PASSED ssl_gtest.sh: #5806: 'GenericStream/TlsConnectGeneric: ConnectFfdheClient/0 (0, 772)' - PASSED ssl_gtest.sh: #5807: 'GenericStream/TlsConnectGeneric: ConnectFfdheClient/1 (0, 771)' - PASSED ssl_gtest.sh: #5808: 'GenericStream/TlsConnectGeneric: ConnectFfdheClient/2 (0, 770)' - PASSED ssl_gtest.sh: #5809: 'GenericStream/TlsConnectGeneric: ConnectFfdheClient/3 (0, 769)' - PASSED ssl_gtest.sh: #5810: 'GenericStream/TlsConnectGeneric: Ffdhe3072/0 (0, 772)' - PASSED ssl_gtest.sh: #5811: 'GenericStream/TlsConnectGeneric: Ffdhe3072/1 (0, 771)' - PASSED ssl_gtest.sh: #5812: 'GenericStream/TlsConnectGeneric: Ffdhe3072/2 (0, 770)' - PASSED ssl_gtest.sh: #5813: 'GenericStream/TlsConnectGeneric: Ffdhe3072/3 (0, 769)' - PASSED ssl_gtest.sh: #5814: 'GenericStream/TlsConnectGeneric: DamageClientSignature/0 (0, 772)' - PASSED ssl_gtest.sh: #5815: 'GenericStream/TlsConnectGeneric: DamageClientSignature/1 (0, 771)' - PASSED ssl_gtest.sh: #5816: 'GenericStream/TlsConnectGeneric: DamageClientSignature/2 (0, 770)' - PASSED ssl_gtest.sh: #5817: 'GenericStream/TlsConnectGeneric: DamageClientSignature/3 (0, 769)' - PASSED ssl_gtest.sh: #5818: 'GenericStream/TlsConnectGeneric: CertificateCompressionTLS12AndBelow/1 (0, 771)' - PASSED ssl_gtest.sh: #5819: 'GenericStream/TlsConnectGeneric: CertificateCompressionTLS12AndBelow/2 (0, 770)' - PASSED ssl_gtest.sh: #5820: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsSuccess/0 (0, 772)' - PASSED ssl_gtest.sh: #5821: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsSuccess/1 (0, 771)' - PASSED ssl_gtest.sh: #5822: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsSuccess/2 (0, 770)' - PASSED ssl_gtest.sh: #5823: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsSuccess/3 (0, 769)' - PASSED ssl_gtest.sh: #5824: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveClient/0 (0, 772)' - PASSED ssl_gtest.sh: #5825: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveClient/1 (0, 771)' - PASSED ssl_gtest.sh: #5826: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveClient/2 (0, 770)' - PASSED ssl_gtest.sh: #5827: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveClient/3 (0, 769)' - PASSED ssl_gtest.sh: #5828: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveServer/0 (0, 772)' - PASSED ssl_gtest.sh: #5829: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveServer/1 (0, 771)' - PASSED ssl_gtest.sh: #5830: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveServer/2 (0, 770)' - PASSED ssl_gtest.sh: #5831: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveServer/3 (0, 769)' - PASSED ssl_gtest.sh: #5832: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveBoth/0 (0, 772)' - PASSED ssl_gtest.sh: #5833: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveBoth/1 (0, 771)' - PASSED ssl_gtest.sh: #5834: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveBoth/2 (0, 770)' - PASSED ssl_gtest.sh: #5835: 'GenericStream/TlsConnectGeneric: SignedCertificateTimestampsInactiveBoth/3 (0, 769)' - PASSED ssl_gtest.sh: #5836: 'GenericStream/TlsConnectGeneric: NoOcsp/0 (0, 772)' - PASSED ssl_gtest.sh: #5837: 'GenericStream/TlsConnectGeneric: NoOcsp/1 (0, 771)' - PASSED ssl_gtest.sh: #5838: 'GenericStream/TlsConnectGeneric: NoOcsp/2 (0, 770)' - PASSED ssl_gtest.sh: #5839: 'GenericStream/TlsConnectGeneric: NoOcsp/3 (0, 769)' - PASSED ssl_gtest.sh: #5840: 'GenericStream/TlsConnectGeneric: OcspNotRequested/0 (0, 772)' - PASSED ssl_gtest.sh: #5841: 'GenericStream/TlsConnectGeneric: OcspNotRequested/1 (0, 771)' - PASSED ssl_gtest.sh: #5842: 'GenericStream/TlsConnectGeneric: OcspNotRequested/2 (0, 770)' - PASSED ssl_gtest.sh: #5843: 'GenericStream/TlsConnectGeneric: OcspNotRequested/3 (0, 769)' - PASSED ssl_gtest.sh: #5844: 'GenericStream/TlsConnectGeneric: OcspNotProvided/0 (0, 772)' - PASSED ssl_gtest.sh: #5845: 'GenericStream/TlsConnectGeneric: OcspNotProvided/1 (0, 771)' - PASSED ssl_gtest.sh: #5846: 'GenericStream/TlsConnectGeneric: OcspNotProvided/2 (0, 770)' - PASSED ssl_gtest.sh: #5847: 'GenericStream/TlsConnectGeneric: OcspNotProvided/3 (0, 769)' - PASSED ssl_gtest.sh: #5848: 'GenericStream/TlsConnectGeneric: OcspSuccess/0 (0, 772)' - PASSED ssl_gtest.sh: #5849: 'GenericStream/TlsConnectGeneric: OcspSuccess/1 (0, 771)' - PASSED ssl_gtest.sh: #5850: 'GenericStream/TlsConnectGeneric: OcspSuccess/2 (0, 770)' - PASSED ssl_gtest.sh: #5851: 'GenericStream/TlsConnectGeneric: OcspSuccess/3 (0, 769)' - PASSED ssl_gtest.sh: #5852: 'GenericStream/TlsConnectGeneric: OcspHugeSuccess/0 (0, 772)' - PASSED ssl_gtest.sh: #5853: 'GenericStream/TlsConnectGeneric: OcspHugeSuccess/1 (0, 771)' - PASSED ssl_gtest.sh: #5854: 'GenericStream/TlsConnectGeneric: OcspHugeSuccess/2 (0, 770)' - PASSED ssl_gtest.sh: #5855: 'GenericStream/TlsConnectGeneric: OcspHugeSuccess/3 (0, 769)' - PASSED ssl_gtest.sh: #5856: 'GenericStream/TlsConnectGeneric: ServerAuthBigRsa/0 (0, 772)' - PASSED ssl_gtest.sh: #5857: 'GenericStream/TlsConnectGeneric: ServerAuthBigRsa/1 (0, 771)' - PASSED ssl_gtest.sh: #5858: 'GenericStream/TlsConnectGeneric: ServerAuthBigRsa/2 (0, 770)' - PASSED ssl_gtest.sh: #5859: 'GenericStream/TlsConnectGeneric: ServerAuthBigRsa/3 (0, 769)' - PASSED ssl_gtest.sh: #5860: 'GenericStream/TlsConnectGeneric: ServerAuthRsaChain/0 (0, 772)' - PASSED ssl_gtest.sh: #5861: 'GenericStream/TlsConnectGeneric: ServerAuthRsaChain/1 (0, 771)' - PASSED ssl_gtest.sh: #5862: 'GenericStream/TlsConnectGeneric: ServerAuthRsaChain/2 (0, 770)' - PASSED ssl_gtest.sh: #5863: 'GenericStream/TlsConnectGeneric: ServerAuthRsaChain/3 (0, 769)' - PASSED ssl_gtest.sh: #5864: 'GenericStream/TlsConnectGeneric: ServerAuthRsaPssChain/0 (0, 772)' - PASSED ssl_gtest.sh: #5865: 'GenericStream/TlsConnectGeneric: ServerAuthRsaPssChain/1 (0, 771)' - PASSED ssl_gtest.sh: #5866: 'GenericStream/TlsConnectGeneric: ServerAuthRsaPssChain/2 (0, 770)' - PASSED ssl_gtest.sh: #5867: 'GenericStream/TlsConnectGeneric: ServerAuthRsaPssChain/3 (0, 769)' - PASSED ssl_gtest.sh: #5868: 'GenericStream/TlsConnectGeneric: ServerAuthRsaCARsaPssChain/0 (0, 772)' - PASSED ssl_gtest.sh: #5869: 'GenericStream/TlsConnectGeneric: ServerAuthRsaCARsaPssChain/1 (0, 771)' - PASSED ssl_gtest.sh: #5870: 'GenericStream/TlsConnectGeneric: ServerAuthRsaCARsaPssChain/2 (0, 770)' - PASSED ssl_gtest.sh: #5871: 'GenericStream/TlsConnectGeneric: ServerAuthRsaCARsaPssChain/3 (0, 769)' - PASSED ssl_gtest.sh: #5872: 'GenericStream/TlsConnectGeneric: ServerAuthRejected/0 (0, 772)' - PASSED ssl_gtest.sh: #5873: 'GenericStream/TlsConnectGeneric: ServerAuthRejected/1 (0, 771)' - PASSED ssl_gtest.sh: #5874: 'GenericStream/TlsConnectGeneric: ServerAuthRejected/2 (0, 770)' - PASSED ssl_gtest.sh: #5875: 'GenericStream/TlsConnectGeneric: ServerAuthRejected/3 (0, 769)' - PASSED ssl_gtest.sh: #5876: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerAuth/0 (0, 772)' - PASSED ssl_gtest.sh: #5877: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerAuth/1 (0, 771)' - PASSED ssl_gtest.sh: #5878: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerAuth/2 (0, 770)' - PASSED ssl_gtest.sh: #5879: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerAuth/3 (0, 769)' - PASSED ssl_gtest.sh: #5880: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmClientOnly/0 (0, 772)' - PASSED ssl_gtest.sh: #5881: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmClientOnly/1 (0, 771)' - PASSED ssl_gtest.sh: #5882: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmClientOnly/2 (0, 770)' - PASSED ssl_gtest.sh: #5883: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmClientOnly/3 (0, 769)' - PASSED ssl_gtest.sh: #5884: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerOnly/0 (0, 772)' - PASSED ssl_gtest.sh: #5885: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerOnly/1 (0, 771)' - PASSED ssl_gtest.sh: #5886: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerOnly/2 (0, 770)' - PASSED ssl_gtest.sh: #5887: 'GenericStream/TlsConnectGeneric: SignatureAlgorithmServerOnly/3 (0, 769)' - PASSED ssl_gtest.sh: #5888: 'GenericStream/TlsConnectGeneric: AuthFailImmediate/0 (0, 772)' - PASSED ssl_gtest.sh: #5889: 'GenericStream/TlsConnectGeneric: AuthFailImmediate/1 (0, 771)' - PASSED ssl_gtest.sh: #5890: 'GenericStream/TlsConnectGeneric: AuthFailImmediate/2 (0, 770)' - PASSED ssl_gtest.sh: #5891: 'GenericStream/TlsConnectGeneric: AuthFailImmediate/3 (0, 769)' - PASSED ssl_gtest.sh: #5892: 'GenericStream/TlsConnectGeneric: SuppressEndOfEarlyDataNoZeroRtt/0 (0, 772)' - PASSED ssl_gtest.sh: #5893: 'GenericStream/TlsConnectGeneric: SuppressEndOfEarlyDataNoZeroRtt/1 (0, 771)' - PASSED ssl_gtest.sh: #5894: 'GenericStream/TlsConnectGeneric: SuppressEndOfEarlyDataNoZeroRtt/2 (0, 770)' - PASSED ssl_gtest.sh: #5895: 'GenericStream/TlsConnectGeneric: SuppressEndOfEarlyDataNoZeroRtt/3 (0, 769)' - PASSED ssl_gtest.sh: #5896: 'GenericDatagram/TlsConnectGeneric: ServerNegotiateTls11/0 (1, 772)' - PASSED ssl_gtest.sh: #5897: 'GenericDatagram/TlsConnectGeneric: ServerNegotiateTls11/1 (1, 771)' - PASSED ssl_gtest.sh: #5898: 'GenericDatagram/TlsConnectGeneric: ServerNegotiateTls11/2 (1, 770)' - PASSED ssl_gtest.sh: #5899: 'GenericDatagram/TlsConnectGeneric: ServerNegotiateTls12/0 (1, 772)' - PASSED ssl_gtest.sh: #5900: 'GenericDatagram/TlsConnectGeneric: ServerNegotiateTls12/1 (1, 771)' - PASSED ssl_gtest.sh: #5901: 'GenericDatagram/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/0 (1, 772)' - PASSED ssl_gtest.sh: #5902: 'GenericDatagram/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/1 (1, 771)' - PASSED ssl_gtest.sh: #5903: 'GenericDatagram/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne/2 (1, 770)' - PASSED ssl_gtest.sh: #5904: 'GenericDatagram/TlsConnectGeneric: TestFallbackSCSVVersionMatch/0 (1, 772)' - PASSED ssl_gtest.sh: #5905: 'GenericDatagram/TlsConnectGeneric: TestFallbackSCSVVersionMatch/1 (1, 771)' - PASSED ssl_gtest.sh: #5906: 'GenericDatagram/TlsConnectGeneric: TestFallbackSCSVVersionMatch/2 (1, 770)' - PASSED ssl_gtest.sh: #5907: 'GenericDatagram/TlsConnectGeneric: AlertBeforeServerHello/0 (1, 772)' - PASSED ssl_gtest.sh: #5908: 'GenericDatagram/TlsConnectGeneric: AlertBeforeServerHello/1 (1, 771)' - PASSED ssl_gtest.sh: #5909: 'GenericDatagram/TlsConnectGeneric: AlertBeforeServerHello/2 (1, 770)' - PASSED ssl_gtest.sh: #5910: 'GenericDatagram/TlsConnectGeneric: ServerAuthBiggestRsa/0 (1, 772)' - PASSED ssl_gtest.sh: #5911: 'GenericDatagram/TlsConnectGeneric: ServerAuthBiggestRsa/1 (1, 771)' - PASSED ssl_gtest.sh: #5912: 'GenericDatagram/TlsConnectGeneric: ServerAuthBiggestRsa/2 (1, 770)' - PASSED ssl_gtest.sh: #5913: 'GenericDatagram/TlsConnectGeneric: ConnectResumeClientBothTicketServerTicketForget/0 (1, 772)' - PASSED ssl_gtest.sh: #5914: 'GenericDatagram/TlsConnectGeneric: ConnectResumeClientBothTicketServerTicketForget/1 (1, 771)' - PASSED ssl_gtest.sh: #5915: 'GenericDatagram/TlsConnectGeneric: ConnectResumeClientBothTicketServerTicketForget/2 (1, 770)' - PASSED ssl_gtest.sh: #5916: 'GenericDatagram/TlsConnectGeneric: ConnectWithExpiredTicketAtServer/0 (1, 772)' - PASSED ssl_gtest.sh: #5917: 'GenericDatagram/TlsConnectGeneric: ConnectWithExpiredTicketAtServer/1 (1, 771)' - PASSED ssl_gtest.sh: #5918: 'GenericDatagram/TlsConnectGeneric: ConnectWithExpiredTicketAtServer/2 (1, 770)' - PASSED ssl_gtest.sh: #5919: 'GenericDatagram/TlsConnectGeneric: ConnectResumeCorruptTicket/0 (1, 772)' - PASSED ssl_gtest.sh: #5920: 'GenericDatagram/TlsConnectGeneric: ConnectResumeCorruptTicket/1 (1, 771)' - PASSED ssl_gtest.sh: #5921: 'GenericDatagram/TlsConnectGeneric: ConnectResumeCorruptTicket/2 (1, 770)' - PASSED ssl_gtest.sh: #5922: 'GenericDatagram/TlsConnectGeneric: ServerSNICertSwitch/0 (1, 772)' - PASSED ssl_gtest.sh: #5923: 'GenericDatagram/TlsConnectGeneric: ServerSNICertSwitch/1 (1, 771)' - PASSED ssl_gtest.sh: #5924: 'GenericDatagram/TlsConnectGeneric: ServerSNICertSwitch/2 (1, 770)' - PASSED ssl_gtest.sh: #5925: 'GenericDatagram/TlsConnectGeneric: ServerSNICertTypeSwitch/0 (1, 772)' - PASSED ssl_gtest.sh: #5926: 'GenericDatagram/TlsConnectGeneric: ServerSNICertTypeSwitch/1 (1, 771)' - PASSED ssl_gtest.sh: #5927: 'GenericDatagram/TlsConnectGeneric: ServerSNICertTypeSwitch/2 (1, 770)' - PASSED ssl_gtest.sh: #5928: 'GenericDatagram/TlsConnectGeneric: RecordSizeMaximum/0 (1, 772)' - PASSED ssl_gtest.sh: #5929: 'GenericDatagram/TlsConnectGeneric: RecordSizeMaximum/1 (1, 771)' - PASSED ssl_gtest.sh: #5930: 'GenericDatagram/TlsConnectGeneric: RecordSizeMaximum/2 (1, 770)' - PASSED ssl_gtest.sh: #5931: 'GenericDatagram/TlsConnectGeneric: RecordSizeMinimumClient/0 (1, 772)' - PASSED ssl_gtest.sh: #5932: 'GenericDatagram/TlsConnectGeneric: RecordSizeMinimumClient/1 (1, 771)' - PASSED ssl_gtest.sh: #5933: 'GenericDatagram/TlsConnectGeneric: RecordSizeMinimumClient/2 (1, 770)' - PASSED ssl_gtest.sh: #5934: 'GenericDatagram/TlsConnectGeneric: RecordSizeMinimumServer/0 (1, 772)' - PASSED ssl_gtest.sh: #5935: 'GenericDatagram/TlsConnectGeneric: RecordSizeMinimumServer/1 (1, 771)' - PASSED ssl_gtest.sh: #5936: 'GenericDatagram/TlsConnectGeneric: RecordSizeMinimumServer/2 (1, 770)' - PASSED ssl_gtest.sh: #5937: 'GenericDatagram/TlsConnectGeneric: RecordSizeAsymmetric/0 (1, 772)' - PASSED ssl_gtest.sh: #5938: 'GenericDatagram/TlsConnectGeneric: RecordSizeAsymmetric/1 (1, 771)' - PASSED ssl_gtest.sh: #5939: 'GenericDatagram/TlsConnectGeneric: RecordSizeAsymmetric/2 (1, 770)' - PASSED ssl_gtest.sh: #5940: 'GenericDatagram/TlsConnectGeneric: RecordSizeBadValues/0 (1, 772)' - PASSED ssl_gtest.sh: #5941: 'GenericDatagram/TlsConnectGeneric: RecordSizeBadValues/1 (1, 771)' - PASSED ssl_gtest.sh: #5942: 'GenericDatagram/TlsConnectGeneric: RecordSizeBadValues/2 (1, 770)' - PASSED ssl_gtest.sh: #5943: 'GenericDatagram/TlsConnectGeneric: RecordSizeGetValues/0 (1, 772)' - PASSED ssl_gtest.sh: #5944: 'GenericDatagram/TlsConnectGeneric: RecordSizeGetValues/1 (1, 771)' - PASSED ssl_gtest.sh: #5945: 'GenericDatagram/TlsConnectGeneric: RecordSizeGetValues/2 (1, 770)' - PASSED ssl_gtest.sh: #5946: 'GenericDatagram/TlsConnectGeneric: RecordSizeCapExtensionClient/0 (1, 772)' - PASSED ssl_gtest.sh: #5947: 'GenericDatagram/TlsConnectGeneric: RecordSizeCapExtensionClient/1 (1, 771)' - PASSED ssl_gtest.sh: #5948: 'GenericDatagram/TlsConnectGeneric: RecordSizeCapExtensionClient/2 (1, 770)' - PASSED ssl_gtest.sh: #5949: 'GenericDatagram/TlsConnectGeneric: RecordSizeCapExtensionServer/0 (1, 772)' - PASSED ssl_gtest.sh: #5950: 'GenericDatagram/TlsConnectGeneric: RecordSizeCapExtensionServer/1 (1, 771)' - PASSED ssl_gtest.sh: #5951: 'GenericDatagram/TlsConnectGeneric: RecordSizeCapExtensionServer/2 (1, 770)' - PASSED ssl_gtest.sh: #5952: 'GenericDatagram/TlsConnectGeneric: RecordSizeServerExtensionInvalid/0 (1, 772)' - PASSED ssl_gtest.sh: #5953: 'GenericDatagram/TlsConnectGeneric: RecordSizeServerExtensionInvalid/1 (1, 771)' - PASSED ssl_gtest.sh: #5954: 'GenericDatagram/TlsConnectGeneric: RecordSizeServerExtensionInvalid/2 (1, 770)' - PASSED ssl_gtest.sh: #5955: 'GenericDatagram/TlsConnectGeneric: RecordSizeServerExtensionExtra/0 (1, 772)' - PASSED ssl_gtest.sh: #5956: 'GenericDatagram/TlsConnectGeneric: RecordSizeServerExtensionExtra/1 (1, 771)' - PASSED ssl_gtest.sh: #5957: 'GenericDatagram/TlsConnectGeneric: RecordSizeServerExtensionExtra/2 (1, 770)' - PASSED ssl_gtest.sh: #5958: 'GenericDatagram/TlsConnectGeneric: RecordGatherOverlong/0 (1, 772)' - PASSED ssl_gtest.sh: #5959: 'GenericDatagram/TlsConnectGeneric: RecordGatherOverlong/1 (1, 771)' - PASSED ssl_gtest.sh: #5960: 'GenericDatagram/TlsConnectGeneric: RecordGatherOverlong/2 (1, 770)' - PASSED ssl_gtest.sh: #5961: 'GenericDatagram/TlsConnectGeneric: RecordSizeExtensionOverlong/0 (1, 772)' - PASSED ssl_gtest.sh: #5962: 'GenericDatagram/TlsConnectGeneric: RecordSizeExtensionOverlong/1 (1, 771)' - PASSED ssl_gtest.sh: #5963: 'GenericDatagram/TlsConnectGeneric: RecordSizeExtensionOverlong/2 (1, 770)' - PASSED ssl_gtest.sh: #5964: 'GenericDatagram/TlsConnectGeneric: RecordExpansionOverlong/0 (1, 772)' - PASSED ssl_gtest.sh: #5965: 'GenericDatagram/TlsConnectGeneric: RecordExpansionOverlong/1 (1, 771)' - PASSED ssl_gtest.sh: #5966: 'GenericDatagram/TlsConnectGeneric: RecordExpansionOverlong/2 (1, 770)' - PASSED ssl_gtest.sh: #5967: 'GenericDatagram/TlsConnectGeneric: RecordSizeDefaultLong/0 (1, 772)' - PASSED ssl_gtest.sh: #5968: 'GenericDatagram/TlsConnectGeneric: RecordSizeDefaultLong/1 (1, 771)' - PASSED ssl_gtest.sh: #5969: 'GenericDatagram/TlsConnectGeneric: RecordSizeDefaultLong/2 (1, 770)' - PASSED ssl_gtest.sh: #5970: 'GenericDatagram/TlsConnectGeneric: RecordSizeLimitLong/0 (1, 772)' - PASSED ssl_gtest.sh: #5971: 'GenericDatagram/TlsConnectGeneric: RecordSizeLimitLong/1 (1, 771)' - PASSED ssl_gtest.sh: #5972: 'GenericDatagram/TlsConnectGeneric: RecordSizeLimitLong/2 (1, 770)' - PASSED ssl_gtest.sh: #5973: 'GenericDatagram/TlsConnectGeneric: SetupOnly/0 (1, 772)' - PASSED ssl_gtest.sh: #5974: 'GenericDatagram/TlsConnectGeneric: SetupOnly/1 (1, 771)' - PASSED ssl_gtest.sh: #5975: 'GenericDatagram/TlsConnectGeneric: SetupOnly/2 (1, 770)' - PASSED ssl_gtest.sh: #5976: 'GenericDatagram/TlsConnectGeneric: Connect/0 (1, 772)' - PASSED ssl_gtest.sh: #5977: 'GenericDatagram/TlsConnectGeneric: Connect/1 (1, 771)' - PASSED ssl_gtest.sh: #5978: 'GenericDatagram/TlsConnectGeneric: Connect/2 (1, 770)' - PASSED ssl_gtest.sh: #5979: 'GenericDatagram/TlsConnectGeneric: ConnectEcdsa/0 (1, 772)' - PASSED ssl_gtest.sh: #5980: 'GenericDatagram/TlsConnectGeneric: ConnectEcdsa/1 (1, 771)' - PASSED ssl_gtest.sh: #5981: 'GenericDatagram/TlsConnectGeneric: ConnectEcdsa/2 (1, 770)' - PASSED ssl_gtest.sh: #5982: 'GenericDatagram/TlsConnectGeneric: CipherSuiteMismatch/0 (1, 772)' - PASSED ssl_gtest.sh: #5983: 'GenericDatagram/TlsConnectGeneric: CipherSuiteMismatch/1 (1, 771)' - PASSED ssl_gtest.sh: #5984: 'GenericDatagram/TlsConnectGeneric: CipherSuiteMismatch/2 (1, 770)' - PASSED ssl_gtest.sh: #5985: 'GenericDatagram/TlsConnectGeneric: CaptureAlertServer/0 (1, 772)' - PASSED ssl_gtest.sh: #5986: 'GenericDatagram/TlsConnectGeneric: CaptureAlertServer/1 (1, 771)' - PASSED ssl_gtest.sh: #5987: 'GenericDatagram/TlsConnectGeneric: CaptureAlertServer/2 (1, 770)' - PASSED ssl_gtest.sh: #5988: 'GenericDatagram/TlsConnectGeneric: ConnectAlpn/0 (1, 772)' - PASSED ssl_gtest.sh: #5989: 'GenericDatagram/TlsConnectGeneric: ConnectAlpn/1 (1, 771)' - PASSED ssl_gtest.sh: #5990: 'GenericDatagram/TlsConnectGeneric: ConnectAlpn/2 (1, 770)' - PASSED ssl_gtest.sh: #5991: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnPriorityA/0 (1, 772)' - PASSED ssl_gtest.sh: #5992: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnPriorityA/1 (1, 771)' - PASSED ssl_gtest.sh: #5993: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnPriorityA/2 (1, 770)' - PASSED ssl_gtest.sh: #5994: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnPriorityB/0 (1, 772)' - PASSED ssl_gtest.sh: #5995: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnPriorityB/1 (1, 771)' - PASSED ssl_gtest.sh: #5996: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnPriorityB/2 (1, 770)' - PASSED ssl_gtest.sh: #5997: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnClone/0 (1, 772)' - PASSED ssl_gtest.sh: #5998: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnClone/1 (1, 771)' - PASSED ssl_gtest.sh: #5999: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnClone/2 (1, 770)' - PASSED ssl_gtest.sh: #6000: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackA/0 (1, 772)' - PASSED ssl_gtest.sh: #6001: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackA/1 (1, 771)' - PASSED ssl_gtest.sh: #6002: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackA/2 (1, 770)' - PASSED ssl_gtest.sh: #6003: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackB/0 (1, 772)' - PASSED ssl_gtest.sh: #6004: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackB/1 (1, 771)' - PASSED ssl_gtest.sh: #6005: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackB/2 (1, 770)' - PASSED ssl_gtest.sh: #6006: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackC/0 (1, 772)' - PASSED ssl_gtest.sh: #6007: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackC/1 (1, 771)' - PASSED ssl_gtest.sh: #6008: 'GenericDatagram/TlsConnectGeneric: ConnectAlpnWithCustomCallbackC/2 (1, 770)' - PASSED ssl_gtest.sh: #6009: 'GenericDatagram/TlsConnectGeneric: ConnectSendReceive/0 (1, 772)' - PASSED ssl_gtest.sh: #6010: 'GenericDatagram/TlsConnectGeneric: ConnectSendReceive/1 (1, 771)' - PASSED ssl_gtest.sh: #6011: 'GenericDatagram/TlsConnectGeneric: ConnectSendReceive/2 (1, 770)' - PASSED ssl_gtest.sh: #6012: 'GenericDatagram/TlsConnectGeneric: ConnectWithCompressionEnabled/0 (1, 772)' - PASSED ssl_gtest.sh: #6013: 'GenericDatagram/TlsConnectGeneric: ConnectWithCompressionEnabled/1 (1, 771)' - PASSED ssl_gtest.sh: #6014: 'GenericDatagram/TlsConnectGeneric: ConnectWithCompressionEnabled/2 (1, 770)' - PASSED ssl_gtest.sh: #6015: 'GenericDatagram/TlsConnectGeneric: CheckRandoms/0 (1, 772)' - PASSED ssl_gtest.sh: #6016: 'GenericDatagram/TlsConnectGeneric: CheckRandoms/1 (1, 771)' - PASSED ssl_gtest.sh: #6017: 'GenericDatagram/TlsConnectGeneric: CheckRandoms/2 (1, 770)' - PASSED ssl_gtest.sh: #6018: 'GenericDatagram/TlsConnectGeneric: ShutdownOneSide/0 (1, 772)' - PASSED ssl_gtest.sh: #6019: 'GenericDatagram/TlsConnectGeneric: ShutdownOneSide/1 (1, 771)' - PASSED ssl_gtest.sh: #6020: 'GenericDatagram/TlsConnectGeneric: ShutdownOneSide/2 (1, 770)' - PASSED ssl_gtest.sh: #6021: 'GenericDatagram/TlsConnectGeneric: ShutdownOneSideThenCloseTcp/0 (1, 772)' - PASSED ssl_gtest.sh: #6022: 'GenericDatagram/TlsConnectGeneric: ShutdownOneSideThenCloseTcp/1 (1, 771)' - PASSED ssl_gtest.sh: #6023: 'GenericDatagram/TlsConnectGeneric: ShutdownOneSideThenCloseTcp/2 (1, 770)' - PASSED ssl_gtest.sh: #6024: 'GenericDatagram/TlsConnectGeneric: AlpnDisabled/0 (1, 772)' - PASSED ssl_gtest.sh: #6025: 'GenericDatagram/TlsConnectGeneric: AlpnDisabled/1 (1, 771)' - PASSED ssl_gtest.sh: #6026: 'GenericDatagram/TlsConnectGeneric: AlpnDisabled/2 (1, 770)' - PASSED ssl_gtest.sh: #6027: 'GenericDatagram/TlsConnectGeneric: ClientHelloExtensionPermutation/0 (1, 772)' - PASSED ssl_gtest.sh: #6028: 'GenericDatagram/TlsConnectGeneric: ClientHelloExtensionPermutation/1 (1, 771)' - PASSED ssl_gtest.sh: #6029: 'GenericDatagram/TlsConnectGeneric: ClientHelloExtensionPermutation/2 (1, 770)' - PASSED ssl_gtest.sh: #6030: 'GenericDatagram/TlsConnectGeneric: ExporterBasic/0 (1, 772)' - PASSED ssl_gtest.sh: #6031: 'GenericDatagram/TlsConnectGeneric: ExporterBasic/1 (1, 771)' - PASSED ssl_gtest.sh: #6032: 'GenericDatagram/TlsConnectGeneric: ExporterBasic/2 (1, 770)' - PASSED ssl_gtest.sh: #6033: 'GenericDatagram/TlsConnectGeneric: ExporterContext/0 (1, 772)' - PASSED ssl_gtest.sh: #6034: 'GenericDatagram/TlsConnectGeneric: ExporterContext/1 (1, 771)' - PASSED ssl_gtest.sh: #6035: 'GenericDatagram/TlsConnectGeneric: ExporterContext/2 (1, 770)' - PASSED ssl_gtest.sh: #6036: 'GenericDatagram/TlsConnectGeneric: ConnectEcdhe/0 (1, 772)' - PASSED ssl_gtest.sh: #6037: 'GenericDatagram/TlsConnectGeneric: ConnectEcdhe/1 (1, 771)' - PASSED ssl_gtest.sh: #6038: 'GenericDatagram/TlsConnectGeneric: ConnectEcdhe/2 (1, 770)' - PASSED ssl_gtest.sh: #6039: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheP384Client/0 (1, 772)' - PASSED ssl_gtest.sh: #6040: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheP384Client/1 (1, 771)' - PASSED ssl_gtest.sh: #6041: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheP384Client/2 (1, 770)' - PASSED ssl_gtest.sh: #6042: 'GenericDatagram/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/0 (1, 772)' - PASSED ssl_gtest.sh: #6043: 'GenericDatagram/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/1 (1, 771)' - PASSED ssl_gtest.sh: #6044: 'GenericDatagram/TlsConnectGeneric: ClientOfferTls11_Tls13ServerNegotiateEachVersionOneByOne_HRR/2 (1, 770)' - PASSED ssl_gtest.sh: #6045: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheP384Server/0 (1, 772)' - PASSED ssl_gtest.sh: #6046: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheP384Server/1 (1, 771)' - PASSED ssl_gtest.sh: #6047: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheP384Server/2 (1, 770)' - PASSED ssl_gtest.sh: #6048: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheGroupMismatch/0 (1, 772)' - PASSED ssl_gtest.sh: #6049: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheGroupMismatch/1 (1, 771)' - PASSED ssl_gtest.sh: #6050: 'GenericDatagram/TlsConnectGeneric: ConnectEcdheGroupMismatch/2 (1, 770)' - PASSED ssl_gtest.sh: #6051: 'GenericDatagram/TlsConnectGeneric: P256ClientAndCurve25519Server/0 (1, 772)' - PASSED ssl_gtest.sh: #6052: 'GenericDatagram/TlsConnectGeneric: P256ClientAndCurve25519Server/1 (1, 771)' - PASSED ssl_gtest.sh: #6053: 'GenericDatagram/TlsConnectGeneric: P256ClientAndCurve25519Server/2 (1, 770)' - PASSED ssl_gtest.sh: #6054: 'GenericDatagram/TlsConnectGeneric: ConnectDhe/0 (1, 772)' - PASSED ssl_gtest.sh: #6055: 'GenericDatagram/TlsConnectGeneric: ConnectDhe/1 (1, 771)' - PASSED ssl_gtest.sh: #6056: 'GenericDatagram/TlsConnectGeneric: ConnectDhe/2 (1, 770)' - PASSED ssl_gtest.sh: #6057: 'GenericDatagram/TlsConnectGeneric: ConnectFfdheClient/0 (1, 772)' - PASSED ssl_gtest.sh: #6058: 'GenericDatagram/TlsConnectGeneric: ConnectFfdheClient/1 (1, 771)' - PASSED ssl_gtest.sh: #6059: 'GenericDatagram/TlsConnectGeneric: ConnectFfdheClient/2 (1, 770)' - PASSED ssl_gtest.sh: #6060: 'GenericDatagram/TlsConnectGeneric: Ffdhe3072/0 (1, 772)' - PASSED ssl_gtest.sh: #6061: 'GenericDatagram/TlsConnectGeneric: Ffdhe3072/1 (1, 771)' - PASSED ssl_gtest.sh: #6062: 'GenericDatagram/TlsConnectGeneric: Ffdhe3072/2 (1, 770)' - PASSED ssl_gtest.sh: #6063: 'GenericDatagram/TlsConnectGeneric: DamageClientSignature/0 (1, 772)' - PASSED ssl_gtest.sh: #6064: 'GenericDatagram/TlsConnectGeneric: DamageClientSignature/1 (1, 771)' - PASSED ssl_gtest.sh: #6065: 'GenericDatagram/TlsConnectGeneric: DamageClientSignature/2 (1, 770)' - PASSED ssl_gtest.sh: #6066: 'GenericDatagram/TlsConnectGeneric: CertificateCompressionTLS12AndBelow/1 (1, 771)' - PASSED ssl_gtest.sh: #6067: 'GenericDatagram/TlsConnectGeneric: CertificateCompressionTLS12AndBelow/2 (1, 770)' - PASSED ssl_gtest.sh: #6068: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsSuccess/0 (1, 772)' - PASSED ssl_gtest.sh: #6069: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsSuccess/1 (1, 771)' - PASSED ssl_gtest.sh: #6070: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsSuccess/2 (1, 770)' - PASSED ssl_gtest.sh: #6071: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveClient/0 (1, 772)' - PASSED ssl_gtest.sh: #6072: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveClient/1 (1, 771)' - PASSED ssl_gtest.sh: #6073: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveClient/2 (1, 770)' - PASSED ssl_gtest.sh: #6074: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveServer/0 (1, 772)' - PASSED ssl_gtest.sh: #6075: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveServer/1 (1, 771)' - PASSED ssl_gtest.sh: #6076: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveServer/2 (1, 770)' - PASSED ssl_gtest.sh: #6077: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveBoth/0 (1, 772)' - PASSED ssl_gtest.sh: #6078: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveBoth/1 (1, 771)' - PASSED ssl_gtest.sh: #6079: 'GenericDatagram/TlsConnectGeneric: SignedCertificateTimestampsInactiveBoth/2 (1, 770)' - PASSED ssl_gtest.sh: #6080: 'GenericDatagram/TlsConnectGeneric: NoOcsp/0 (1, 772)' - PASSED ssl_gtest.sh: #6081: 'GenericDatagram/TlsConnectGeneric: NoOcsp/1 (1, 771)' - PASSED ssl_gtest.sh: #6082: 'GenericDatagram/TlsConnectGeneric: NoOcsp/2 (1, 770)' - PASSED ssl_gtest.sh: #6083: 'GenericDatagram/TlsConnectGeneric: OcspNotRequested/0 (1, 772)' - PASSED ssl_gtest.sh: #6084: 'GenericDatagram/TlsConnectGeneric: OcspNotRequested/1 (1, 771)' - PASSED ssl_gtest.sh: #6085: 'GenericDatagram/TlsConnectGeneric: OcspNotRequested/2 (1, 770)' - PASSED ssl_gtest.sh: #6086: 'GenericDatagram/TlsConnectGeneric: OcspNotProvided/0 (1, 772)' - PASSED ssl_gtest.sh: #6087: 'GenericDatagram/TlsConnectGeneric: OcspNotProvided/1 (1, 771)' - PASSED ssl_gtest.sh: #6088: 'GenericDatagram/TlsConnectGeneric: OcspNotProvided/2 (1, 770)' - PASSED ssl_gtest.sh: #6089: 'GenericDatagram/TlsConnectGeneric: OcspSuccess/0 (1, 772)' - PASSED ssl_gtest.sh: #6090: 'GenericDatagram/TlsConnectGeneric: OcspSuccess/1 (1, 771)' - PASSED ssl_gtest.sh: #6091: 'GenericDatagram/TlsConnectGeneric: OcspSuccess/2 (1, 770)' - PASSED ssl_gtest.sh: #6092: 'GenericDatagram/TlsConnectGeneric: OcspHugeSuccess/0 (1, 772)' - PASSED ssl_gtest.sh: #6093: 'GenericDatagram/TlsConnectGeneric: OcspHugeSuccess/1 (1, 771)' - PASSED ssl_gtest.sh: #6094: 'GenericDatagram/TlsConnectGeneric: OcspHugeSuccess/2 (1, 770)' - PASSED ssl_gtest.sh: #6095: 'GenericDatagram/TlsConnectGeneric: ServerAuthBigRsa/0 (1, 772)' - PASSED ssl_gtest.sh: #6096: 'GenericDatagram/TlsConnectGeneric: ServerAuthBigRsa/1 (1, 771)' - PASSED ssl_gtest.sh: #6097: 'GenericDatagram/TlsConnectGeneric: ServerAuthBigRsa/2 (1, 770)' - PASSED ssl_gtest.sh: #6098: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaChain/0 (1, 772)' - PASSED ssl_gtest.sh: #6099: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaChain/1 (1, 771)' - PASSED ssl_gtest.sh: #6100: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaChain/2 (1, 770)' - PASSED ssl_gtest.sh: #6101: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaPssChain/0 (1, 772)' - PASSED ssl_gtest.sh: #6102: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaPssChain/1 (1, 771)' - PASSED ssl_gtest.sh: #6103: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaPssChain/2 (1, 770)' - PASSED ssl_gtest.sh: #6104: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaCARsaPssChain/0 (1, 772)' - PASSED ssl_gtest.sh: #6105: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaCARsaPssChain/1 (1, 771)' - PASSED ssl_gtest.sh: #6106: 'GenericDatagram/TlsConnectGeneric: ServerAuthRsaCARsaPssChain/2 (1, 770)' - PASSED ssl_gtest.sh: #6107: 'GenericDatagram/TlsConnectGeneric: ServerAuthRejected/0 (1, 772)' - PASSED ssl_gtest.sh: #6108: 'GenericDatagram/TlsConnectGeneric: ServerAuthRejected/1 (1, 771)' - PASSED ssl_gtest.sh: #6109: 'GenericDatagram/TlsConnectGeneric: ServerAuthRejected/2 (1, 770)' - PASSED ssl_gtest.sh: #6110: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmServerAuth/0 (1, 772)' - PASSED ssl_gtest.sh: #6111: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmServerAuth/1 (1, 771)' - PASSED ssl_gtest.sh: #6112: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmServerAuth/2 (1, 770)' - PASSED ssl_gtest.sh: #6113: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmClientOnly/0 (1, 772)' - PASSED ssl_gtest.sh: #6114: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmClientOnly/1 (1, 771)' - PASSED ssl_gtest.sh: #6115: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmClientOnly/2 (1, 770)' - PASSED ssl_gtest.sh: #6116: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmServerOnly/0 (1, 772)' - PASSED ssl_gtest.sh: #6117: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmServerOnly/1 (1, 771)' - PASSED ssl_gtest.sh: #6118: 'GenericDatagram/TlsConnectGeneric: SignatureAlgorithmServerOnly/2 (1, 770)' - PASSED ssl_gtest.sh: #6119: 'GenericDatagram/TlsConnectGeneric: AuthFailImmediate/0 (1, 772)' - PASSED ssl_gtest.sh: #6120: 'GenericDatagram/TlsConnectGeneric: AuthFailImmediate/1 (1, 771)' - PASSED ssl_gtest.sh: #6121: 'GenericDatagram/TlsConnectGeneric: AuthFailImmediate/2 (1, 770)' - PASSED ssl_gtest.sh: #6122: 'GenericDatagram/TlsConnectGeneric: SuppressEndOfEarlyDataNoZeroRtt/0 (1, 772)' - PASSED ssl_gtest.sh: #6123: 'GenericDatagram/TlsConnectGeneric: SuppressEndOfEarlyDataNoZeroRtt/1 (1, 771)' - PASSED ssl_gtest.sh: #6124: 'GenericDatagram/TlsConnectGeneric: SuppressEndOfEarlyDataNoZeroRtt/2 (1, 770)' - PASSED ssl_gtest.sh: #6125: 'TlsDowngradeSentinelTest/TlsDowngradeTest: TlsDowngradeSentinelTest/0 (0, 772, 772)' - PASSED ssl_gtest.sh: #6126: 'TlsDowngradeSentinelTest/TlsDowngradeTest: TlsDowngradeSentinelTest/2 (0, 771, 772)' - PASSED ssl_gtest.sh: #6127: 'TlsDowngradeSentinelTest/TlsDowngradeTest: TlsDowngradeSentinelTest/3 (0, 771, 771)' - PASSED ssl_gtest.sh: #6128: 'TlsDowngradeSentinelTest/TlsDowngradeTest: TlsDowngradeSentinelTest/4 (0, 770, 772)' - PASSED ssl_gtest.sh: #6129: 'TlsDowngradeSentinelTest/TlsDowngradeTest: TlsDowngradeSentinelTest/5 (0, 770, 771)' - PASSED ssl_gtest.sh: #6130: 'TlsDowngradeSentinelTest/TlsDowngradeTest: TlsDowngradeSentinelTest/6 (0, 769, 772)' - PASSED ssl_gtest.sh: #6131: 'TlsDowngradeSentinelTest/TlsDowngradeTest: TlsDowngradeSentinelTest/7 (0, 769, 771)' - PASSED ssl_gtest.sh: #6132: 'Pre13Stream/TlsConnectGenericPre13: TestFallbackSCSVVersionMismatch/0 (0, 769)' - PASSED ssl_gtest.sh: #6133: 'Pre13Stream/TlsConnectGenericPre13: TestFallbackSCSVVersionMismatch/1 (0, 770)' - PASSED ssl_gtest.sh: #6134: 'Pre13Stream/TlsConnectGenericPre13: TestFallbackSCSVVersionMismatch/2 (0, 771)' - PASSED ssl_gtest.sh: #6135: 'Pre13Stream/TlsConnectGenericPre13: ClientHelloUnsupportedTlsVersion/0 (0, 769)' - PASSED ssl_gtest.sh: #6136: 'Pre13Stream/TlsConnectGenericPre13: ClientHelloUnsupportedTlsVersion/1 (0, 770)' - PASSED ssl_gtest.sh: #6137: 'Pre13Stream/TlsConnectGenericPre13: ClientHelloUnsupportedTlsVersion/2 (0, 771)' - PASSED ssl_gtest.sh: #6138: 'Pre13Stream/TlsConnectGenericPre13: ConnectStaticRSA/0 (0, 769)' - PASSED ssl_gtest.sh: #6139: 'Pre13Stream/TlsConnectGenericPre13: ConnectStaticRSA/1 (0, 770)' - PASSED ssl_gtest.sh: #6140: 'Pre13Stream/TlsConnectGenericPre13: ConnectStaticRSA/2 (0, 771)' - PASSED ssl_gtest.sh: #6141: 'Pre13Stream/TlsConnectGenericPre13: ConnectStaticRSABogusPMSVersionIgnore/0 (0, 769)' - PASSED ssl_gtest.sh: #6142: 'Pre13Stream/TlsConnectGenericPre13: ConnectStaticRSABogusPMSVersionIgnore/1 (0, 770)' - PASSED ssl_gtest.sh: #6143: 'Pre13Stream/TlsConnectGenericPre13: ConnectStaticRSABogusPMSVersionIgnore/2 (0, 771)' - PASSED ssl_gtest.sh: #6144: 'Pre13Stream/TlsConnectGenericPre13: TooLargeRSAKeyInCert/0 (0, 769)' - PASSED ssl_gtest.sh: #6145: 'Pre13Stream/TlsConnectGenericPre13: TooLargeRSAKeyInCert/1 (0, 770)' - PASSED ssl_gtest.sh: #6146: 'Pre13Stream/TlsConnectGenericPre13: TooLargeRSAKeyInCert/2 (0, 771)' - PASSED ssl_gtest.sh: #6147: 'Pre13Stream/TlsConnectGenericPre13: ConnectResumed/0 (0, 769)' - PASSED ssl_gtest.sh: #6148: 'Pre13Stream/TlsConnectGenericPre13: ConnectResumed/1 (0, 770)' - PASSED ssl_gtest.sh: #6149: 'Pre13Stream/TlsConnectGenericPre13: ConnectResumed/2 (0, 771)' - PASSED ssl_gtest.sh: #6150: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithHigherVersionTls13/0 (0, 769)' - PASSED ssl_gtest.sh: #6151: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithHigherVersionTls13/1 (0, 770)' - PASSED ssl_gtest.sh: #6152: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithHigherVersionTls13/2 (0, 771)' - PASSED ssl_gtest.sh: #6153: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithHigherVersionTls13SessionId/0 (0, 769)' - PASSED ssl_gtest.sh: #6154: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithHigherVersionTls13SessionId/1 (0, 770)' - PASSED ssl_gtest.sh: #6155: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithHigherVersionTls13SessionId/2 (0, 771)' - PASSED ssl_gtest.sh: #6156: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithLowerVersionFromTls13/0 (0, 769)' - PASSED ssl_gtest.sh: #6157: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithLowerVersionFromTls13/1 (0, 770)' - PASSED ssl_gtest.sh: #6158: 'Pre13Stream/TlsConnectGenericPre13: ResumeWithLowerVersionFromTls13/2 (0, 771)' - PASSED ssl_gtest.sh: #6159: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdheTwiceReuseKey/0 (0, 769)' - PASSED ssl_gtest.sh: #6160: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdheTwiceReuseKey/1 (0, 770)' - PASSED ssl_gtest.sh: #6161: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdheTwiceReuseKey/2 (0, 771)' - PASSED ssl_gtest.sh: #6162: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdheTwiceNewKey/0 (0, 769)' - PASSED ssl_gtest.sh: #6163: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdheTwiceNewKey/1 (0, 770)' - PASSED ssl_gtest.sh: #6164: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdheTwiceNewKey/2 (0, 771)' - PASSED ssl_gtest.sh: #6165: 'Pre13Stream/TlsConnectGenericPre13: TestResumptionOverrideVersion/1 (0, 770)' - PASSED ssl_gtest.sh: #6166: 'Pre13Stream/TlsConnectGenericPre13: TestResumptionOverrideVersion/2 (0, 771)' - PASSED ssl_gtest.sh: #6167: 'Pre13Stream/TlsConnectGenericPre13: ReConnectCache/0 (0, 769)' - PASSED ssl_gtest.sh: #6168: 'Pre13Stream/TlsConnectGenericPre13: ReConnectCache/1 (0, 770)' - PASSED ssl_gtest.sh: #6169: 'Pre13Stream/TlsConnectGenericPre13: ReConnectCache/2 (0, 771)' - PASSED ssl_gtest.sh: #6170: 'Pre13Stream/TlsConnectGenericPre13: RecordSizeClientExtensionInvalid/0 (0, 769)' - PASSED ssl_gtest.sh: #6171: 'Pre13Stream/TlsConnectGenericPre13: RecordSizeClientExtensionInvalid/1 (0, 770)' - PASSED ssl_gtest.sh: #6172: 'Pre13Stream/TlsConnectGenericPre13: RecordSizeClientExtensionInvalid/2 (0, 771)' - PASSED ssl_gtest.sh: #6173: 'Pre13Stream/TlsConnectGenericPre13: CaptureAlertClient/0 (0, 769)' - PASSED ssl_gtest.sh: #6174: 'Pre13Stream/TlsConnectGenericPre13: CaptureAlertClient/1 (0, 770)' - PASSED ssl_gtest.sh: #6175: 'Pre13Stream/TlsConnectGenericPre13: CaptureAlertClient/2 (0, 771)' - PASSED ssl_gtest.sh: #6176: 'Pre13Stream/TlsConnectGenericPre13: ConnectFalseStart/0 (0, 769)' - PASSED ssl_gtest.sh: #6177: 'Pre13Stream/TlsConnectGenericPre13: ConnectFalseStart/1 (0, 770)' - PASSED ssl_gtest.sh: #6178: 'Pre13Stream/TlsConnectGenericPre13: ConnectFalseStart/2 (0, 771)' - PASSED ssl_gtest.sh: #6179: 'Pre13Stream/TlsConnectGenericPre13: ExporterContextLengthTooLong/0 (0, 769)' - PASSED ssl_gtest.sh: #6180: 'Pre13Stream/TlsConnectGenericPre13: ExporterContextLengthTooLong/1 (0, 770)' - PASSED ssl_gtest.sh: #6181: 'Pre13Stream/TlsConnectGenericPre13: ExporterContextLengthTooLong/2 (0, 771)' - PASSED ssl_gtest.sh: #6182: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecret/0 (0, 769)' - PASSED ssl_gtest.sh: #6183: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecret/1 (0, 770)' - PASSED ssl_gtest.sh: #6184: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecret/2 (0, 771)' - PASSED ssl_gtest.sh: #6185: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretStaticRSA/0 (0, 769)' - PASSED ssl_gtest.sh: #6186: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretStaticRSA/1 (0, 770)' - PASSED ssl_gtest.sh: #6187: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretStaticRSA/2 (0, 771)' - PASSED ssl_gtest.sh: #6188: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretECDHE/0 (0, 769)' - PASSED ssl_gtest.sh: #6189: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretECDHE/1 (0, 770)' - PASSED ssl_gtest.sh: #6190: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretECDHE/2 (0, 771)' - PASSED ssl_gtest.sh: #6191: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretTicket/0 (0, 769)' - PASSED ssl_gtest.sh: #6192: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretTicket/1 (0, 770)' - PASSED ssl_gtest.sh: #6193: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretTicket/2 (0, 771)' - PASSED ssl_gtest.sh: #6194: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretClientOnly/0 (0, 769)' - PASSED ssl_gtest.sh: #6195: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretClientOnly/1 (0, 770)' - PASSED ssl_gtest.sh: #6196: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretClientOnly/2 (0, 771)' - PASSED ssl_gtest.sh: #6197: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretServerOnly/0 (0, 769)' - PASSED ssl_gtest.sh: #6198: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretServerOnly/1 (0, 770)' - PASSED ssl_gtest.sh: #6199: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretServerOnly/2 (0, 771)' - PASSED ssl_gtest.sh: #6200: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretResumeWithout/0 (0, 769)' - PASSED ssl_gtest.sh: #6201: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretResumeWithout/1 (0, 770)' - PASSED ssl_gtest.sh: #6202: 'Pre13Stream/TlsConnectGenericPre13: ConnectExtendedMasterSecretResumeWithout/2 (0, 771)' - PASSED ssl_gtest.sh: #6203: 'Pre13Stream/TlsConnectGenericPre13: ConnectNormalResumeWithExtendedMasterSecret/0 (0, 769)' - PASSED ssl_gtest.sh: #6204: 'Pre13Stream/TlsConnectGenericPre13: ConnectNormalResumeWithExtendedMasterSecret/1 (0, 770)' - PASSED ssl_gtest.sh: #6205: 'Pre13Stream/TlsConnectGenericPre13: ConnectNormalResumeWithExtendedMasterSecret/2 (0, 771)' - PASSED ssl_gtest.sh: #6206: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdh/0 (0, 769)' - PASSED ssl_gtest.sh: #6207: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdh/1 (0, 770)' - PASSED ssl_gtest.sh: #6208: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdh/2 (0, 771)' - PASSED ssl_gtest.sh: #6209: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdhWithoutDisablingSuites/0 (0, 769)' - PASSED ssl_gtest.sh: #6210: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdhWithoutDisablingSuites/1 (0, 770)' - PASSED ssl_gtest.sh: #6211: 'Pre13Stream/TlsConnectGenericPre13: ConnectEcdhWithoutDisablingSuites/2 (0, 771)' - PASSED ssl_gtest.sh: #6212: 'Pre13Stream/TlsConnectGenericPre13: P384PriorityOnServer/0 (0, 769)' - PASSED ssl_gtest.sh: #6213: 'Pre13Stream/TlsConnectGenericPre13: P384PriorityOnServer/1 (0, 770)' - PASSED ssl_gtest.sh: #6214: 'Pre13Stream/TlsConnectGenericPre13: P384PriorityOnServer/2 (0, 771)' - PASSED ssl_gtest.sh: #6215: 'Pre13Stream/TlsConnectGenericPre13: P384PriorityFromModelSocket/0 (0, 769)' - PASSED ssl_gtest.sh: #6216: 'Pre13Stream/TlsConnectGenericPre13: P384PriorityFromModelSocket/1 (0, 770)' - PASSED ssl_gtest.sh: #6217: 'Pre13Stream/TlsConnectGenericPre13: P384PriorityFromModelSocket/2 (0, 771)' - PASSED ssl_gtest.sh: #6218: 'Pre13Stream/TlsConnectGenericPre13: DropSupportedGroupExtensionP256/0 (0, 769)' - PASSED ssl_gtest.sh: #6219: 'Pre13Stream/TlsConnectGenericPre13: DropSupportedGroupExtensionP256/1 (0, 770)' - PASSED ssl_gtest.sh: #6220: 'Pre13Stream/TlsConnectGenericPre13: DropSupportedGroupExtensionP256/2 (0, 771)' - PASSED ssl_gtest.sh: #6221: 'Pre13Stream/TlsConnectGenericPre13: UseLameGroup/0 (0, 769)' - PASSED ssl_gtest.sh: #6222: 'Pre13Stream/TlsConnectGenericPre13: UseLameGroup/1 (0, 770)' - PASSED ssl_gtest.sh: #6223: 'Pre13Stream/TlsConnectGenericPre13: UseLameGroup/2 (0, 771)' - PASSED ssl_gtest.sh: #6224: 'Pre13Stream/TlsConnectGenericPre13: GroupPreferenceServerPriority/0 (0, 769)' - PASSED ssl_gtest.sh: #6225: 'Pre13Stream/TlsConnectGenericPre13: GroupPreferenceServerPriority/1 (0, 770)' - PASSED ssl_gtest.sh: #6226: 'Pre13Stream/TlsConnectGenericPre13: GroupPreferenceServerPriority/2 (0, 771)' - PASSED ssl_gtest.sh: #6227: 'Pre13Stream/TlsConnectGenericPre13: ConnectECDHEmptyServerPoint/0 (0, 769)' - PASSED ssl_gtest.sh: #6228: 'Pre13Stream/TlsConnectGenericPre13: ConnectECDHEmptyServerPoint/1 (0, 770)' - PASSED ssl_gtest.sh: #6229: 'Pre13Stream/TlsConnectGenericPre13: ConnectECDHEmptyServerPoint/2 (0, 771)' - PASSED ssl_gtest.sh: #6230: 'Pre13Stream/TlsConnectGenericPre13: ConnectECDHEmptyClientPoint/0 (0, 769)' - PASSED ssl_gtest.sh: #6231: 'Pre13Stream/TlsConnectGenericPre13: ConnectECDHEmptyClientPoint/1 (0, 770)' - PASSED ssl_gtest.sh: #6232: 'Pre13Stream/TlsConnectGenericPre13: ConnectECDHEmptyClientPoint/2 (0, 771)' - PASSED ssl_gtest.sh: #6233: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedCurveType/0 (0, 769)' - PASSED ssl_gtest.sh: #6234: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedCurveType/1 (0, 770)' - PASSED ssl_gtest.sh: #6235: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedCurveType/2 (0, 771)' - PASSED ssl_gtest.sh: #6236: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedCurve/0 (0, 769)' - PASSED ssl_gtest.sh: #6237: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedCurve/1 (0, 770)' - PASSED ssl_gtest.sh: #6238: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedCurve/2 (0, 771)' - PASSED ssl_gtest.sh: #6239: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedPointFormat/0 (0, 769)' - PASSED ssl_gtest.sh: #6240: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedPointFormat/1 (0, 770)' - PASSED ssl_gtest.sh: #6241: 'Pre13Stream/TlsConnectGenericPre13: ConnectUnsupportedPointFormat/2 (0, 771)' - PASSED ssl_gtest.sh: #6242: 'Pre13Stream/TlsConnectGenericPre13: ConnectFfdheServer/0 (0, 769)' - PASSED ssl_gtest.sh: #6243: 'Pre13Stream/TlsConnectGenericPre13: ConnectFfdheServer/1 (0, 770)' - PASSED ssl_gtest.sh: #6244: 'Pre13Stream/TlsConnectGenericPre13: ConnectFfdheServer/2 (0, 771)' - PASSED ssl_gtest.sh: #6245: 'Pre13Stream/TlsConnectGenericPre13: DamageServerKeyShare/0 (0, 769)' - PASSED ssl_gtest.sh: #6246: 'Pre13Stream/TlsConnectGenericPre13: DamageServerKeyShare/1 (0, 770)' - PASSED ssl_gtest.sh: #6247: 'Pre13Stream/TlsConnectGenericPre13: DamageServerKeyShare/2 (0, 771)' - PASSED ssl_gtest.sh: #6248: 'Pre13Stream/TlsConnectGenericPre13: MakeDhePEven/0 (0, 769)' - PASSED ssl_gtest.sh: #6249: 'Pre13Stream/TlsConnectGenericPre13: MakeDhePEven/1 (0, 770)' - PASSED ssl_gtest.sh: #6250: 'Pre13Stream/TlsConnectGenericPre13: MakeDhePEven/2 (0, 771)' - PASSED ssl_gtest.sh: #6251: 'Pre13Stream/TlsConnectGenericPre13: PadDheP/0 (0, 769)' - PASSED ssl_gtest.sh: #6252: 'Pre13Stream/TlsConnectGenericPre13: PadDheP/1 (0, 770)' - PASSED ssl_gtest.sh: #6253: 'Pre13Stream/TlsConnectGenericPre13: PadDheP/2 (0, 771)' - PASSED ssl_gtest.sh: #6254: 'Pre13Stream/TlsConnectGenericPre13: WeakDHGroup/0 (0, 769)' - PASSED ssl_gtest.sh: #6255: 'Pre13Stream/TlsConnectGenericPre13: WeakDHGroup/1 (0, 770)' - PASSED ssl_gtest.sh: #6256: 'Pre13Stream/TlsConnectGenericPre13: WeakDHGroup/2 (0, 771)' - PASSED ssl_gtest.sh: #6257: 'Pre13Stream/TlsConnectGenericPre13: NamedGroupMismatchPre13/0 (0, 769)' - PASSED ssl_gtest.sh: #6258: 'Pre13Stream/TlsConnectGenericPre13: NamedGroupMismatchPre13/1 (0, 770)' - PASSED ssl_gtest.sh: #6259: 'Pre13Stream/TlsConnectGenericPre13: NamedGroupMismatchPre13/2 (0, 771)' - PASSED ssl_gtest.sh: #6260: 'Pre13Stream/TlsConnectGenericPre13: TooBigDHGroup/0 (0, 769)' - PASSED ssl_gtest.sh: #6261: 'Pre13Stream/TlsConnectGenericPre13: TooBigDHGroup/1 (0, 770)' - PASSED ssl_gtest.sh: #6262: 'Pre13Stream/TlsConnectGenericPre13: TooBigDHGroup/2 (0, 771)' - PASSED ssl_gtest.sh: #6263: 'Pre13Stream/TlsConnectGenericPre13: RequireNamedGroupsMismatchPre13/0 (0, 769)' - PASSED ssl_gtest.sh: #6264: 'Pre13Stream/TlsConnectGenericPre13: RequireNamedGroupsMismatchPre13/1 (0, 770)' - PASSED ssl_gtest.sh: #6265: 'Pre13Stream/TlsConnectGenericPre13: RequireNamedGroupsMismatchPre13/2 (0, 771)' - PASSED ssl_gtest.sh: #6266: 'Pre13Stream/TlsConnectGenericPre13: PreferredFfdhe/0 (0, 769)' - PASSED ssl_gtest.sh: #6267: 'Pre13Stream/TlsConnectGenericPre13: PreferredFfdhe/1 (0, 770)' - PASSED ssl_gtest.sh: #6268: 'Pre13Stream/TlsConnectGenericPre13: PreferredFfdhe/2 (0, 771)' - PASSED ssl_gtest.sh: #6269: 'Pre13Stream/TlsConnectGenericPre13: MismatchDHE/0 (0, 769)' - PASSED ssl_gtest.sh: #6270: 'Pre13Stream/TlsConnectGenericPre13: MismatchDHE/1 (0, 770)' - PASSED ssl_gtest.sh: #6271: 'Pre13Stream/TlsConnectGenericPre13: MismatchDHE/2 (0, 771)' - PASSED ssl_gtest.sh: #6272: 'Pre13Stream/TlsConnectGenericPre13: InvalidDERSignatureFfdhe/0 (0, 769)' - PASSED ssl_gtest.sh: #6273: 'Pre13Stream/TlsConnectGenericPre13: InvalidDERSignatureFfdhe/1 (0, 770)' - PASSED ssl_gtest.sh: #6274: 'Pre13Stream/TlsConnectGenericPre13: InvalidDERSignatureFfdhe/2 (0, 771)' - PASSED ssl_gtest.sh: #6275: 'Pre13Stream/TlsConnectGenericPre13: DamageServerSignature/0 (0, 769)' - PASSED ssl_gtest.sh: #6276: 'Pre13Stream/TlsConnectGenericPre13: DamageServerSignature/1 (0, 770)' - PASSED ssl_gtest.sh: #6277: 'Pre13Stream/TlsConnectGenericPre13: DamageServerSignature/2 (0, 771)' - PASSED ssl_gtest.sh: #6278: 'Pre13Stream/TlsConnectGenericPre13: SignedCertificateTimestampsLegacy/0 (0, 769)' - PASSED ssl_gtest.sh: #6279: 'Pre13Stream/TlsConnectGenericPre13: SignedCertificateTimestampsLegacy/1 (0, 770)' - PASSED ssl_gtest.sh: #6280: 'Pre13Stream/TlsConnectGenericPre13: SignedCertificateTimestampsLegacy/2 (0, 771)' - PASSED ssl_gtest.sh: #6281: 'Pre13Stream/TlsConnectGenericPre13: OcspMangled/0 (0, 769)' - PASSED ssl_gtest.sh: #6282: 'Pre13Stream/TlsConnectGenericPre13: OcspMangled/1 (0, 770)' - PASSED ssl_gtest.sh: #6283: 'Pre13Stream/TlsConnectGenericPre13: OcspMangled/2 (0, 771)' - PASSED ssl_gtest.sh: #6284: 'Pre13Stream/TlsConnectGenericPre13: ServerAuthRejectAsync/0 (0, 769)' - PASSED ssl_gtest.sh: #6285: 'Pre13Stream/TlsConnectGenericPre13: ServerAuthRejectAsync/1 (0, 770)' - PASSED ssl_gtest.sh: #6286: 'Pre13Stream/TlsConnectGenericPre13: ServerAuthRejectAsync/2 (0, 771)' - PASSED ssl_gtest.sh: #6287: 'Pre13Stream/TlsConnectGenericPre13: SignatureAlgorithmNoOverlapStaticRsa/0 (0, 769)' - PASSED ssl_gtest.sh: #6288: 'Pre13Stream/TlsConnectGenericPre13: SignatureAlgorithmNoOverlapStaticRsa/1 (0, 770)' - PASSED ssl_gtest.sh: #6289: 'Pre13Stream/TlsConnectGenericPre13: SignatureAlgorithmNoOverlapStaticRsa/2 (0, 771)' - PASSED ssl_gtest.sh: #6290: 'Pre13Stream/TlsConnectGenericPre13: ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (0, 769)' - PASSED ssl_gtest.sh: #6291: 'Pre13Stream/TlsConnectGenericPre13: ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (0, 770)' - PASSED ssl_gtest.sh: #6292: 'Pre13Stream/TlsConnectGenericPre13: ClientWriteBetweenCCSAndFinishedWithFalseStart/2 (0, 771)' - PASSED ssl_gtest.sh: #6293: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteBeforeFinishedWithFalseStart/0 (0, 769)' - PASSED ssl_gtest.sh: #6294: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteBeforeFinishedWithFalseStart/1 (0, 770)' - PASSED ssl_gtest.sh: #6295: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteBeforeFinishedWithFalseStart/2 (0, 771)' - PASSED ssl_gtest.sh: #6296: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteDelayed/0 (0, 769)' - PASSED ssl_gtest.sh: #6297: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteDelayed/1 (0, 770)' - PASSED ssl_gtest.sh: #6298: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteDelayed/2 (0, 771)' - PASSED ssl_gtest.sh: #6299: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteFailDelayed/0 (0, 769)' - PASSED ssl_gtest.sh: #6300: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteFailDelayed/1 (0, 770)' - PASSED ssl_gtest.sh: #6301: 'Pre13Stream/TlsConnectGenericPre13: AuthCompleteFailDelayed/2 (0, 771)' - PASSED ssl_gtest.sh: #6302: 'Pre13Datagram/TlsConnectGenericPre13: TestFallbackSCSVVersionMismatch/0 (1, 770)' - PASSED ssl_gtest.sh: #6303: 'Pre13Datagram/TlsConnectGenericPre13: TestFallbackSCSVVersionMismatch/1 (1, 771)' - PASSED ssl_gtest.sh: #6304: 'Pre13Datagram/TlsConnectGenericPre13: ClientHelloUnsupportedTlsVersion/0 (1, 770)' - PASSED ssl_gtest.sh: #6305: 'Pre13Datagram/TlsConnectGenericPre13: ClientHelloUnsupportedTlsVersion/1 (1, 771)' - PASSED ssl_gtest.sh: #6306: 'Pre13Datagram/TlsConnectGenericPre13: ConnectStaticRSA/0 (1, 770)' - PASSED ssl_gtest.sh: #6307: 'Pre13Datagram/TlsConnectGenericPre13: ConnectStaticRSA/1 (1, 771)' - PASSED ssl_gtest.sh: #6308: 'Pre13Datagram/TlsConnectGenericPre13: ConnectStaticRSABogusPMSVersionIgnore/0 (1, 770)' - PASSED ssl_gtest.sh: #6309: 'Pre13Datagram/TlsConnectGenericPre13: ConnectStaticRSABogusPMSVersionIgnore/1 (1, 771)' - PASSED ssl_gtest.sh: #6310: 'Pre13Datagram/TlsConnectGenericPre13: TooLargeRSAKeyInCert/0 (1, 770)' - PASSED ssl_gtest.sh: #6311: 'Pre13Datagram/TlsConnectGenericPre13: TooLargeRSAKeyInCert/1 (1, 771)' - PASSED ssl_gtest.sh: #6312: 'Pre13Datagram/TlsConnectGenericPre13: ConnectResumed/0 (1, 770)' - PASSED ssl_gtest.sh: #6313: 'Pre13Datagram/TlsConnectGenericPre13: ConnectResumed/1 (1, 771)' - PASSED ssl_gtest.sh: #6314: 'Pre13Datagram/TlsConnectGenericPre13: ResumeWithHigherVersionTls13/0 (1, 770)' - PASSED ssl_gtest.sh: #6315: 'Pre13Datagram/TlsConnectGenericPre13: ResumeWithHigherVersionTls13/1 (1, 771)' - PASSED ssl_gtest.sh: #6316: 'Pre13Datagram/TlsConnectGenericPre13: ResumeWithHigherVersionTls13SessionId/0 (1, 770)' - PASSED ssl_gtest.sh: #6317: 'Pre13Datagram/TlsConnectGenericPre13: ResumeWithHigherVersionTls13SessionId/1 (1, 771)' - PASSED ssl_gtest.sh: #6318: 'Pre13Datagram/TlsConnectGenericPre13: ResumeWithLowerVersionFromTls13/0 (1, 770)' - PASSED ssl_gtest.sh: #6319: 'Pre13Datagram/TlsConnectGenericPre13: ResumeWithLowerVersionFromTls13/1 (1, 771)' - PASSED ssl_gtest.sh: #6320: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdheTwiceReuseKey/0 (1, 770)' - PASSED ssl_gtest.sh: #6321: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdheTwiceReuseKey/1 (1, 771)' - PASSED ssl_gtest.sh: #6322: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdheTwiceNewKey/0 (1, 770)' - PASSED ssl_gtest.sh: #6323: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdheTwiceNewKey/1 (1, 771)' - PASSED ssl_gtest.sh: #6324: 'Pre13Datagram/TlsConnectGenericPre13: TestResumptionOverrideVersion/1 (1, 771)' - PASSED ssl_gtest.sh: #6325: 'Pre13Datagram/TlsConnectGenericPre13: ReConnectCache/0 (1, 770)' - PASSED ssl_gtest.sh: #6326: 'Pre13Datagram/TlsConnectGenericPre13: ReConnectCache/1 (1, 771)' - PASSED ssl_gtest.sh: #6327: 'Pre13Datagram/TlsConnectGenericPre13: RecordSizeClientExtensionInvalid/0 (1, 770)' - PASSED ssl_gtest.sh: #6328: 'Pre13Datagram/TlsConnectGenericPre13: RecordSizeClientExtensionInvalid/1 (1, 771)' - PASSED ssl_gtest.sh: #6329: 'Pre13Datagram/TlsConnectGenericPre13: CaptureAlertClient/0 (1, 770)' - PASSED ssl_gtest.sh: #6330: 'Pre13Datagram/TlsConnectGenericPre13: CaptureAlertClient/1 (1, 771)' - PASSED ssl_gtest.sh: #6331: 'Pre13Datagram/TlsConnectGenericPre13: ConnectFalseStart/0 (1, 770)' - PASSED ssl_gtest.sh: #6332: 'Pre13Datagram/TlsConnectGenericPre13: ConnectFalseStart/1 (1, 771)' - PASSED ssl_gtest.sh: #6333: 'Pre13Datagram/TlsConnectGenericPre13: ExporterContextLengthTooLong/0 (1, 770)' - PASSED ssl_gtest.sh: #6334: 'Pre13Datagram/TlsConnectGenericPre13: ExporterContextLengthTooLong/1 (1, 771)' - PASSED ssl_gtest.sh: #6335: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecret/0 (1, 770)' - PASSED ssl_gtest.sh: #6336: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecret/1 (1, 771)' - PASSED ssl_gtest.sh: #6337: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretStaticRSA/0 (1, 770)' - PASSED ssl_gtest.sh: #6338: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretStaticRSA/1 (1, 771)' - PASSED ssl_gtest.sh: #6339: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretECDHE/0 (1, 770)' - PASSED ssl_gtest.sh: #6340: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretECDHE/1 (1, 771)' - PASSED ssl_gtest.sh: #6341: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretTicket/0 (1, 770)' - PASSED ssl_gtest.sh: #6342: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretTicket/1 (1, 771)' - PASSED ssl_gtest.sh: #6343: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretClientOnly/0 (1, 770)' - PASSED ssl_gtest.sh: #6344: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretClientOnly/1 (1, 771)' - PASSED ssl_gtest.sh: #6345: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretServerOnly/0 (1, 770)' - PASSED ssl_gtest.sh: #6346: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretServerOnly/1 (1, 771)' - PASSED ssl_gtest.sh: #6347: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretResumeWithout/0 (1, 770)' - PASSED ssl_gtest.sh: #6348: 'Pre13Datagram/TlsConnectGenericPre13: ConnectExtendedMasterSecretResumeWithout/1 (1, 771)' - PASSED ssl_gtest.sh: #6349: 'Pre13Datagram/TlsConnectGenericPre13: ConnectNormalResumeWithExtendedMasterSecret/0 (1, 770)' - PASSED ssl_gtest.sh: #6350: 'Pre13Datagram/TlsConnectGenericPre13: ConnectNormalResumeWithExtendedMasterSecret/1 (1, 771)' - PASSED ssl_gtest.sh: #6351: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdh/0 (1, 770)' - PASSED ssl_gtest.sh: #6352: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdh/1 (1, 771)' - PASSED ssl_gtest.sh: #6353: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdhWithoutDisablingSuites/0 (1, 770)' - PASSED ssl_gtest.sh: #6354: 'Pre13Datagram/TlsConnectGenericPre13: ConnectEcdhWithoutDisablingSuites/1 (1, 771)' - PASSED ssl_gtest.sh: #6355: 'Pre13Datagram/TlsConnectGenericPre13: P384PriorityOnServer/0 (1, 770)' - PASSED ssl_gtest.sh: #6356: 'Pre13Datagram/TlsConnectGenericPre13: P384PriorityOnServer/1 (1, 771)' - PASSED ssl_gtest.sh: #6357: 'Pre13Datagram/TlsConnectGenericPre13: P384PriorityFromModelSocket/0 (1, 770)' - PASSED ssl_gtest.sh: #6358: 'Pre13Datagram/TlsConnectGenericPre13: P384PriorityFromModelSocket/1 (1, 771)' - PASSED ssl_gtest.sh: #6359: 'Pre13Datagram/TlsConnectGenericPre13: DropSupportedGroupExtensionP256/0 (1, 770)' - PASSED ssl_gtest.sh: #6360: 'Pre13Datagram/TlsConnectGenericPre13: DropSupportedGroupExtensionP256/1 (1, 771)' - PASSED ssl_gtest.sh: #6361: 'Pre13Datagram/TlsConnectGenericPre13: UseLameGroup/0 (1, 770)' - PASSED ssl_gtest.sh: #6362: 'Pre13Datagram/TlsConnectGenericPre13: UseLameGroup/1 (1, 771)' - PASSED ssl_gtest.sh: #6363: 'Pre13Datagram/TlsConnectGenericPre13: GroupPreferenceServerPriority/0 (1, 770)' - PASSED ssl_gtest.sh: #6364: 'Pre13Datagram/TlsConnectGenericPre13: GroupPreferenceServerPriority/1 (1, 771)' - PASSED ssl_gtest.sh: #6365: 'Pre13Datagram/TlsConnectGenericPre13: ConnectECDHEmptyServerPoint/0 (1, 770)' - PASSED ssl_gtest.sh: #6366: 'Pre13Datagram/TlsConnectGenericPre13: ConnectECDHEmptyServerPoint/1 (1, 771)' - PASSED ssl_gtest.sh: #6367: 'Pre13Datagram/TlsConnectGenericPre13: ConnectECDHEmptyClientPoint/0 (1, 770)' - PASSED ssl_gtest.sh: #6368: 'Pre13Datagram/TlsConnectGenericPre13: ConnectECDHEmptyClientPoint/1 (1, 771)' - PASSED ssl_gtest.sh: #6369: 'Pre13Datagram/TlsConnectGenericPre13: ConnectUnsupportedCurveType/0 (1, 770)' - PASSED ssl_gtest.sh: #6370: 'Pre13Datagram/TlsConnectGenericPre13: ConnectUnsupportedCurveType/1 (1, 771)' - PASSED ssl_gtest.sh: #6371: 'Pre13Datagram/TlsConnectGenericPre13: ConnectUnsupportedCurve/0 (1, 770)' - PASSED ssl_gtest.sh: #6372: 'Pre13Datagram/TlsConnectGenericPre13: ConnectUnsupportedCurve/1 (1, 771)' - PASSED ssl_gtest.sh: #6373: 'Pre13Datagram/TlsConnectGenericPre13: ConnectUnsupportedPointFormat/0 (1, 770)' - PASSED ssl_gtest.sh: #6374: 'Pre13Datagram/TlsConnectGenericPre13: ConnectUnsupportedPointFormat/1 (1, 771)' - PASSED ssl_gtest.sh: #6375: 'Pre13Datagram/TlsConnectGenericPre13: ConnectFfdheServer/0 (1, 770)' - PASSED ssl_gtest.sh: #6376: 'Pre13Datagram/TlsConnectGenericPre13: ConnectFfdheServer/1 (1, 771)' - PASSED ssl_gtest.sh: #6377: 'Pre13Datagram/TlsConnectGenericPre13: DamageServerKeyShare/0 (1, 770)' - PASSED ssl_gtest.sh: #6378: 'Pre13Datagram/TlsConnectGenericPre13: DamageServerKeyShare/1 (1, 771)' - PASSED ssl_gtest.sh: #6379: 'Pre13Datagram/TlsConnectGenericPre13: MakeDhePEven/0 (1, 770)' - PASSED ssl_gtest.sh: #6380: 'Pre13Datagram/TlsConnectGenericPre13: MakeDhePEven/1 (1, 771)' - PASSED ssl_gtest.sh: #6381: 'Pre13Datagram/TlsConnectGenericPre13: PadDheP/0 (1, 770)' - PASSED ssl_gtest.sh: #6382: 'Pre13Datagram/TlsConnectGenericPre13: PadDheP/1 (1, 771)' - PASSED ssl_gtest.sh: #6383: 'Pre13Datagram/TlsConnectGenericPre13: WeakDHGroup/0 (1, 770)' - PASSED ssl_gtest.sh: #6384: 'Pre13Datagram/TlsConnectGenericPre13: WeakDHGroup/1 (1, 771)' - PASSED ssl_gtest.sh: #6385: 'Pre13Datagram/TlsConnectGenericPre13: NamedGroupMismatchPre13/0 (1, 770)' - PASSED ssl_gtest.sh: #6386: 'Pre13Datagram/TlsConnectGenericPre13: NamedGroupMismatchPre13/1 (1, 771)' - PASSED ssl_gtest.sh: #6387: 'Pre13Datagram/TlsConnectGenericPre13: TooBigDHGroup/0 (1, 770)' - PASSED ssl_gtest.sh: #6388: 'Pre13Datagram/TlsConnectGenericPre13: TooBigDHGroup/1 (1, 771)' - PASSED ssl_gtest.sh: #6389: 'Pre13Datagram/TlsConnectGenericPre13: RequireNamedGroupsMismatchPre13/0 (1, 770)' - PASSED ssl_gtest.sh: #6390: 'Pre13Datagram/TlsConnectGenericPre13: RequireNamedGroupsMismatchPre13/1 (1, 771)' - PASSED ssl_gtest.sh: #6391: 'Pre13Datagram/TlsConnectGenericPre13: PreferredFfdhe/0 (1, 770)' - PASSED ssl_gtest.sh: #6392: 'Pre13Datagram/TlsConnectGenericPre13: PreferredFfdhe/1 (1, 771)' - PASSED ssl_gtest.sh: #6393: 'Pre13Datagram/TlsConnectGenericPre13: MismatchDHE/0 (1, 770)' - PASSED ssl_gtest.sh: #6394: 'Pre13Datagram/TlsConnectGenericPre13: MismatchDHE/1 (1, 771)' - PASSED ssl_gtest.sh: #6395: 'Pre13Datagram/TlsConnectGenericPre13: InvalidDERSignatureFfdhe/0 (1, 770)' - PASSED ssl_gtest.sh: #6396: 'Pre13Datagram/TlsConnectGenericPre13: InvalidDERSignatureFfdhe/1 (1, 771)' - PASSED ssl_gtest.sh: #6397: 'Pre13Datagram/TlsConnectGenericPre13: DamageServerSignature/0 (1, 770)' - PASSED ssl_gtest.sh: #6398: 'Pre13Datagram/TlsConnectGenericPre13: DamageServerSignature/1 (1, 771)' - PASSED ssl_gtest.sh: #6399: 'Pre13Datagram/TlsConnectGenericPre13: SignedCertificateTimestampsLegacy/0 (1, 770)' - PASSED ssl_gtest.sh: #6400: 'Pre13Datagram/TlsConnectGenericPre13: SignedCertificateTimestampsLegacy/1 (1, 771)' - PASSED ssl_gtest.sh: #6401: 'Pre13Datagram/TlsConnectGenericPre13: OcspMangled/0 (1, 770)' - PASSED ssl_gtest.sh: #6402: 'Pre13Datagram/TlsConnectGenericPre13: OcspMangled/1 (1, 771)' - PASSED ssl_gtest.sh: #6403: 'Pre13Datagram/TlsConnectGenericPre13: ServerAuthRejectAsync/0 (1, 770)' - PASSED ssl_gtest.sh: #6404: 'Pre13Datagram/TlsConnectGenericPre13: ServerAuthRejectAsync/1 (1, 771)' - PASSED ssl_gtest.sh: #6405: 'Pre13Datagram/TlsConnectGenericPre13: SignatureAlgorithmNoOverlapStaticRsa/0 (1, 770)' - PASSED ssl_gtest.sh: #6406: 'Pre13Datagram/TlsConnectGenericPre13: SignatureAlgorithmNoOverlapStaticRsa/1 (1, 771)' - PASSED ssl_gtest.sh: #6407: 'Pre13Datagram/TlsConnectGenericPre13: ClientWriteBetweenCCSAndFinishedWithFalseStart/0 (1, 770)' - PASSED ssl_gtest.sh: #6408: 'Pre13Datagram/TlsConnectGenericPre13: ClientWriteBetweenCCSAndFinishedWithFalseStart/1 (1, 771)' - PASSED ssl_gtest.sh: #6409: 'Pre13Datagram/TlsConnectGenericPre13: AuthCompleteBeforeFinishedWithFalseStart/0 (1, 770)' - PASSED ssl_gtest.sh: #6410: 'Pre13Datagram/TlsConnectGenericPre13: AuthCompleteBeforeFinishedWithFalseStart/1 (1, 771)' - PASSED ssl_gtest.sh: #6411: 'Pre13Datagram/TlsConnectGenericPre13: AuthCompleteDelayed/0 (1, 770)' - PASSED ssl_gtest.sh: #6412: 'Pre13Datagram/TlsConnectGenericPre13: AuthCompleteDelayed/1 (1, 771)' - PASSED ssl_gtest.sh: #6413: 'Pre13Datagram/TlsConnectGenericPre13: AuthCompleteFailDelayed/0 (1, 770)' - PASSED ssl_gtest.sh: #6414: 'Pre13Datagram/TlsConnectGenericPre13: AuthCompleteFailDelayed/1 (1, 771)' - PASSED ssl_gtest.sh: #6415: 'VersionsStream10Pre13/SSLv2ClientHelloTest: Connect/0 769' - PASSED ssl_gtest.sh: #6416: 'VersionsStream10Pre13/SSLv2ClientHelloTest: ConnectDisabled/0 769' - PASSED ssl_gtest.sh: #6417: 'VersionsStream10Pre13/SSLv2ClientHelloTest: ConnectAfterEmptyV3Record/0 769' - PASSED ssl_gtest.sh: #6418: 'VersionsStream10Pre13/SSLv2ClientHelloTest: NegotiateECSuite/0 769' - PASSED ssl_gtest.sh: #6419: 'VersionsStream10Pre13/SSLv2ClientHelloTest: AddPadding/0 769' - PASSED ssl_gtest.sh: #6420: 'VersionsStream10Pre13/SSLv2ClientHelloTest: SendSecurityEscape/0 769' - PASSED ssl_gtest.sh: #6421: 'VersionsStream10Pre13/SSLv2ClientHelloTest: AddErroneousPadding/0 769' - PASSED ssl_gtest.sh: #6422: 'VersionsStream10Pre13/SSLv2ClientHelloTest: AddErroneousPadding2/0 769' - PASSED ssl_gtest.sh: #6423: 'VersionsStream10Pre13/SSLv2ClientHelloTest: SmallClientRandom/0 769' - PASSED ssl_gtest.sh: #6424: 'VersionsStream10Pre13/SSLv2ClientHelloTest: MaxClientRandom/0 769' - PASSED ssl_gtest.sh: #6425: 'VersionsStream10Pre13/SSLv2ClientHelloTest: BigClientRandom/0 769' - PASSED ssl_gtest.sh: #6426: 'VersionsStream10Pre13/SSLv2ClientHelloTest: RequireSafeRenegotiation/0 769' - PASSED ssl_gtest.sh: #6427: 'VersionsStream10Pre13/SSLv2ClientHelloTest: RequireSafeRenegotiationWithSCSV/0 769' - PASSED ssl_gtest.sh: #6428: 'VersionsStream10Pre13/SSLv2ClientHelloTest: CheckServerRandom/0 769' - PASSED ssl_gtest.sh: #6429: 'VersionsStreamPre13/SSLv2ClientHelloTest: Connect/0 770' - PASSED ssl_gtest.sh: #6430: 'VersionsStreamPre13/SSLv2ClientHelloTest: Connect/1 771' - PASSED ssl_gtest.sh: #6431: 'VersionsStreamPre13/SSLv2ClientHelloTest: ConnectDisabled/0 770' - PASSED ssl_gtest.sh: #6432: 'VersionsStreamPre13/SSLv2ClientHelloTest: ConnectDisabled/1 771' - PASSED ssl_gtest.sh: #6433: 'VersionsStreamPre13/SSLv2ClientHelloTest: ConnectAfterEmptyV3Record/0 770' - PASSED ssl_gtest.sh: #6434: 'VersionsStreamPre13/SSLv2ClientHelloTest: ConnectAfterEmptyV3Record/1 771' - PASSED ssl_gtest.sh: #6435: 'VersionsStreamPre13/SSLv2ClientHelloTest: NegotiateECSuite/0 770' - PASSED ssl_gtest.sh: #6436: 'VersionsStreamPre13/SSLv2ClientHelloTest: NegotiateECSuite/1 771' - PASSED ssl_gtest.sh: #6437: 'VersionsStreamPre13/SSLv2ClientHelloTest: AddPadding/0 770' - PASSED ssl_gtest.sh: #6438: 'VersionsStreamPre13/SSLv2ClientHelloTest: AddPadding/1 771' - PASSED ssl_gtest.sh: #6439: 'VersionsStreamPre13/SSLv2ClientHelloTest: SendSecurityEscape/0 770' - PASSED ssl_gtest.sh: #6440: 'VersionsStreamPre13/SSLv2ClientHelloTest: SendSecurityEscape/1 771' - PASSED ssl_gtest.sh: #6441: 'VersionsStreamPre13/SSLv2ClientHelloTest: AddErroneousPadding/0 770' - PASSED ssl_gtest.sh: #6442: 'VersionsStreamPre13/SSLv2ClientHelloTest: AddErroneousPadding/1 771' - PASSED ssl_gtest.sh: #6443: 'VersionsStreamPre13/SSLv2ClientHelloTest: AddErroneousPadding2/0 770' - PASSED ssl_gtest.sh: #6444: 'VersionsStreamPre13/SSLv2ClientHelloTest: AddErroneousPadding2/1 771' - PASSED ssl_gtest.sh: #6445: 'VersionsStreamPre13/SSLv2ClientHelloTest: SmallClientRandom/0 770' - PASSED ssl_gtest.sh: #6446: 'VersionsStreamPre13/SSLv2ClientHelloTest: SmallClientRandom/1 771' - PASSED ssl_gtest.sh: #6447: 'VersionsStreamPre13/SSLv2ClientHelloTest: MaxClientRandom/0 770' - PASSED ssl_gtest.sh: #6448: 'VersionsStreamPre13/SSLv2ClientHelloTest: MaxClientRandom/1 771' - PASSED ssl_gtest.sh: #6449: 'VersionsStreamPre13/SSLv2ClientHelloTest: BigClientRandom/0 770' - PASSED ssl_gtest.sh: #6450: 'VersionsStreamPre13/SSLv2ClientHelloTest: BigClientRandom/1 771' - PASSED ssl_gtest.sh: #6451: 'VersionsStreamPre13/SSLv2ClientHelloTest: RequireSafeRenegotiation/0 770' - PASSED ssl_gtest.sh: #6452: 'VersionsStreamPre13/SSLv2ClientHelloTest: RequireSafeRenegotiation/1 771' - PASSED ssl_gtest.sh: #6453: 'VersionsStreamPre13/SSLv2ClientHelloTest: RequireSafeRenegotiationWithSCSV/0 770' - PASSED ssl_gtest.sh: #6454: 'VersionsStreamPre13/SSLv2ClientHelloTest: RequireSafeRenegotiationWithSCSV/1 771' - PASSED ssl_gtest.sh: #6455: 'VersionsStreamPre13/SSLv2ClientHelloTest: CheckServerRandom/0 770' - PASSED ssl_gtest.sh: #6456: 'VersionsStreamPre13/SSLv2ClientHelloTest: CheckServerRandom/1 771' - PASSED ssl_gtest.sh: #6457: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectStaticRSABogusCKE/0 769' - PASSED ssl_gtest.sh: #6458: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectStaticRSABogusCKE/1 770' - PASSED ssl_gtest.sh: #6459: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectStaticRSABogusCKE/2 771' - PASSED ssl_gtest.sh: #6460: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectStaticRSABogusPMSVersionDetect/0 769' - PASSED ssl_gtest.sh: #6461: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectStaticRSABogusPMSVersionDetect/1 770' - PASSED ssl_gtest.sh: #6462: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectStaticRSABogusPMSVersionDetect/2 771' - PASSED ssl_gtest.sh: #6463: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusCKE/0 769' - PASSED ssl_gtest.sh: #6464: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusCKE/1 770' - PASSED ssl_gtest.sh: #6465: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusCKE/2 771' - PASSED ssl_gtest.sh: #6466: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/0 769' - PASSED ssl_gtest.sh: #6467: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/1 770' - PASSED ssl_gtest.sh: #6468: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusPMSVersionDetect/2 771' - PASSED ssl_gtest.sh: #6469: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/0 769' - PASSED ssl_gtest.sh: #6470: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/1 770' - PASSED ssl_gtest.sh: #6471: 'Pre13StreamOnly/TlsConnectStreamPre13: ConnectExtendedMasterSecretStaticRSABogusPMSVersionIgnore/2 771' - PASSED ssl_gtest.sh: #6472: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateClient/0 769' - PASSED ssl_gtest.sh: #6473: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateClient/1 770' - PASSED ssl_gtest.sh: #6474: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateClient/2 771' - PASSED ssl_gtest.sh: #6475: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateServer/0 769' - PASSED ssl_gtest.sh: #6476: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateServer/1 770' - PASSED ssl_gtest.sh: #6477: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateServer/2 771' - PASSED ssl_gtest.sh: #6478: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateRandoms/0 769' - PASSED ssl_gtest.sh: #6479: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateRandoms/1 770' - PASSED ssl_gtest.sh: #6480: 'Pre13StreamOnly/TlsConnectStreamPre13: RenegotiateRandoms/2 771' - PASSED ssl_gtest.sh: #6481: 'Pre13StreamOnly/TlsConnectStreamPre13: ClientFinishedHeaderBeforeCCS/0 769' - PASSED ssl_gtest.sh: #6482: 'Pre13StreamOnly/TlsConnectStreamPre13: ClientFinishedHeaderBeforeCCS/1 770' - PASSED ssl_gtest.sh: #6483: 'Pre13StreamOnly/TlsConnectStreamPre13: ClientFinishedHeaderBeforeCCS/2 771' - PASSED ssl_gtest.sh: #6484: 'Pre13StreamOnly/TlsConnectStreamPre13: ServerFinishedHeaderBeforeCCS/0 769' - PASSED ssl_gtest.sh: #6485: 'Pre13StreamOnly/TlsConnectStreamPre13: ServerFinishedHeaderBeforeCCS/1 770' - PASSED ssl_gtest.sh: #6486: 'Pre13StreamOnly/TlsConnectStreamPre13: ServerFinishedHeaderBeforeCCS/2 771' - PASSED ssl_gtest.sh: #6487: 'Pre13StreamOnly/TlsConnectStreamPre13: HrrRandomOnTls10/0 769' - PASSED ssl_gtest.sh: #6488: 'Pre13StreamOnly/TlsConnectStreamPre13: HrrRandomOnTls10/1 770' - PASSED ssl_gtest.sh: #6489: 'Pre13StreamOnly/TlsConnectStreamPre13: HrrRandomOnTls10/2 771' - PASSED ssl_gtest.sh: #6490: 'Pre13StreamOnly/TlsConnectStreamPre13: ConfiguredGroupsRenegotiate/0 769' - PASSED ssl_gtest.sh: #6491: 'Pre13StreamOnly/TlsConnectStreamPre13: ConfiguredGroupsRenegotiate/1 770' - PASSED ssl_gtest.sh: #6492: 'Pre13StreamOnly/TlsConnectStreamPre13: ConfiguredGroupsRenegotiate/2 771' - PASSED ssl_gtest.sh: #6493: 'SkipTls10/TlsSkipTest: SkipCertificateRsa/0 (0, 769)' - PASSED ssl_gtest.sh: #6494: 'SkipTls10/TlsSkipTest: SkipCertificateDhe/0 (0, 769)' - PASSED ssl_gtest.sh: #6495: 'SkipTls10/TlsSkipTest: SkipCertificateEcdhe/0 (0, 769)' - PASSED ssl_gtest.sh: #6496: 'SkipTls10/TlsSkipTest: SkipCertificateEcdsa/0 (0, 769)' - PASSED ssl_gtest.sh: #6497: 'SkipTls10/TlsSkipTest: SkipServerKeyExchange/0 (0, 769)' - PASSED ssl_gtest.sh: #6498: 'SkipTls10/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 (0, 769)' - PASSED ssl_gtest.sh: #6499: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExch/0 (0, 769)' - PASSED ssl_gtest.sh: #6500: 'SkipTls10/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 (0, 769)' - PASSED ssl_gtest.sh: #6501: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/0 (0, 770)' - PASSED ssl_gtest.sh: #6502: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/1 (0, 771)' - PASSED ssl_gtest.sh: #6503: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/2 (1, 770)' - PASSED ssl_gtest.sh: #6504: 'SkipVariants/TlsSkipTest: SkipCertificateRsa/3 (1, 771)' - PASSED ssl_gtest.sh: #6505: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/0 (0, 770)' - PASSED ssl_gtest.sh: #6506: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/1 (0, 771)' - PASSED ssl_gtest.sh: #6507: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/2 (1, 770)' - PASSED ssl_gtest.sh: #6508: 'SkipVariants/TlsSkipTest: SkipCertificateDhe/3 (1, 771)' - PASSED ssl_gtest.sh: #6509: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/0 (0, 770)' - PASSED ssl_gtest.sh: #6510: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/1 (0, 771)' - PASSED ssl_gtest.sh: #6511: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/2 (1, 770)' - PASSED ssl_gtest.sh: #6512: 'SkipVariants/TlsSkipTest: SkipCertificateEcdhe/3 (1, 771)' - PASSED ssl_gtest.sh: #6513: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/0 (0, 770)' - PASSED ssl_gtest.sh: #6514: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/1 (0, 771)' - PASSED ssl_gtest.sh: #6515: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/2 (1, 770)' - PASSED ssl_gtest.sh: #6516: 'SkipVariants/TlsSkipTest: SkipCertificateEcdsa/3 (1, 771)' - PASSED ssl_gtest.sh: #6517: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/0 (0, 770)' - PASSED ssl_gtest.sh: #6518: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/1 (0, 771)' - PASSED ssl_gtest.sh: #6519: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/2 (1, 770)' - PASSED ssl_gtest.sh: #6520: 'SkipVariants/TlsSkipTest: SkipServerKeyExchange/3 (1, 771)' - PASSED ssl_gtest.sh: #6521: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/0 (0, 770)' - PASSED ssl_gtest.sh: #6522: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/1 (0, 771)' - PASSED ssl_gtest.sh: #6523: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/2 (1, 770)' - PASSED ssl_gtest.sh: #6524: 'SkipVariants/TlsSkipTest: SkipServerKeyExchangeEcdsa/3 (1, 771)' - PASSED ssl_gtest.sh: #6525: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/0 (0, 770)' - PASSED ssl_gtest.sh: #6526: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/1 (0, 771)' - PASSED ssl_gtest.sh: #6527: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/2 (1, 770)' - PASSED ssl_gtest.sh: #6528: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExch/3 (1, 771)' - PASSED ssl_gtest.sh: #6529: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/0 (0, 770)' - PASSED ssl_gtest.sh: #6530: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/1 (0, 771)' - PASSED ssl_gtest.sh: #6531: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/2 (1, 770)' - PASSED ssl_gtest.sh: #6532: 'SkipVariants/TlsSkipTest: SkipCertAndKeyExchEcdsa/3 (1, 771)' - PASSED ssl_gtest.sh: #6533: 'Skip13Variants/Tls13SkipTest: SkipEncryptedExtensions/0 0' - PASSED ssl_gtest.sh: #6534: 'Skip13Variants/Tls13SkipTest: SkipEncryptedExtensions/1 1' - PASSED ssl_gtest.sh: #6535: 'Skip13Variants/Tls13SkipTest: SkipServerCertificate/0 0' - PASSED ssl_gtest.sh: #6536: 'Skip13Variants/Tls13SkipTest: SkipServerCertificate/1 1' - PASSED ssl_gtest.sh: #6537: 'Skip13Variants/Tls13SkipTest: SkipServerCertificateVerify/0 0' - PASSED ssl_gtest.sh: #6538: 'Skip13Variants/Tls13SkipTest: SkipServerCertificateVerify/1 1' - PASSED ssl_gtest.sh: #6539: 'Skip13Variants/Tls13SkipTest: SkipClientCertificate/0 0' - PASSED ssl_gtest.sh: #6540: 'Skip13Variants/Tls13SkipTest: SkipClientCertificate/1 1' - PASSED ssl_gtest.sh: #6541: 'Skip13Variants/Tls13SkipTest: SkipClientCertificateVerify/0 0' - PASSED ssl_gtest.sh: #6542: 'Skip13Variants/Tls13SkipTest: SkipClientCertificateVerify/1 1' - PASSED ssl_gtest.sh: #6543: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6544: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6545: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6546: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6547: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6548: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6549: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6550: 'GenericStream/TlsConnectGenericResumption: ConnectClientCacheDisabled/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6551: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6552: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6553: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6554: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6555: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6556: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6557: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6558: 'GenericStream/TlsConnectGenericResumption: ConnectServerCacheDisabled/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6559: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6560: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6561: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6562: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6563: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6564: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6565: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6566: 'GenericStream/TlsConnectGenericResumption: ConnectSessionCacheDisabled/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6567: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6568: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6569: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6570: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6571: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6572: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6573: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6574: 'GenericStream/TlsConnectGenericResumption: ConnectResumeSupportBoth/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6575: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6576: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6577: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6578: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6579: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6580: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6581: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6582: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6583: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6584: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6585: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6586: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6587: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6588: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6589: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6590: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6591: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6592: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6593: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6594: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6595: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6596: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6597: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6598: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6599: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6600: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6601: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6602: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6603: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6604: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6605: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6606: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6607: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6608: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6609: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6610: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6611: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6612: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6613: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6614: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6615: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6616: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6617: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6618: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6619: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6620: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6621: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6622: 'GenericStream/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6623: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6624: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6625: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6626: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6627: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6628: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6629: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6630: 'GenericStream/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6631: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6632: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6633: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6634: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6635: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6636: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6637: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6638: 'GenericStream/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6639: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6640: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6641: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6642: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6643: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6644: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6645: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6646: 'GenericStream/TlsConnectGenericResumption: ReConnectTicket/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6647: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6648: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6649: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6650: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6651: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6652: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6653: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6654: 'GenericStream/TlsConnectGenericResumption: ReConnectAgainTicket/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6655: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6656: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6657: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6658: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6659: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6660: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6661: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6662: 'GenericStream/TlsConnectGenericResumption: ConnectResumeClientAuth/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6663: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6664: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6665: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6666: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6667: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6668: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6669: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6670: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6671: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/0 (0, 772, true)' - PASSED ssl_gtest.sh: #6672: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/1 (0, 772, false)' - PASSED ssl_gtest.sh: #6673: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/2 (0, 771, true)' - PASSED ssl_gtest.sh: #6674: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/3 (0, 771, false)' - PASSED ssl_gtest.sh: #6675: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/4 (0, 770, true)' - PASSED ssl_gtest.sh: #6676: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/5 (0, 770, false)' - PASSED ssl_gtest.sh: #6677: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/6 (0, 769, true)' - PASSED ssl_gtest.sh: #6678: 'GenericStream/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/7 (0, 769, false)' - PASSED ssl_gtest.sh: #6679: 'GenericDatagram/TlsConnectGenericResumption: ConnectClientCacheDisabled/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6680: 'GenericDatagram/TlsConnectGenericResumption: ConnectClientCacheDisabled/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6681: 'GenericDatagram/TlsConnectGenericResumption: ConnectClientCacheDisabled/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6682: 'GenericDatagram/TlsConnectGenericResumption: ConnectClientCacheDisabled/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6683: 'GenericDatagram/TlsConnectGenericResumption: ConnectClientCacheDisabled/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6684: 'GenericDatagram/TlsConnectGenericResumption: ConnectClientCacheDisabled/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6685: 'GenericDatagram/TlsConnectGenericResumption: ConnectServerCacheDisabled/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6686: 'GenericDatagram/TlsConnectGenericResumption: ConnectServerCacheDisabled/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6687: 'GenericDatagram/TlsConnectGenericResumption: ConnectServerCacheDisabled/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6688: 'GenericDatagram/TlsConnectGenericResumption: ConnectServerCacheDisabled/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6689: 'GenericDatagram/TlsConnectGenericResumption: ConnectServerCacheDisabled/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6690: 'GenericDatagram/TlsConnectGenericResumption: ConnectServerCacheDisabled/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6691: 'GenericDatagram/TlsConnectGenericResumption: ConnectSessionCacheDisabled/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6692: 'GenericDatagram/TlsConnectGenericResumption: ConnectSessionCacheDisabled/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6693: 'GenericDatagram/TlsConnectGenericResumption: ConnectSessionCacheDisabled/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6694: 'GenericDatagram/TlsConnectGenericResumption: ConnectSessionCacheDisabled/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6695: 'GenericDatagram/TlsConnectGenericResumption: ConnectSessionCacheDisabled/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6696: 'GenericDatagram/TlsConnectGenericResumption: ConnectSessionCacheDisabled/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6697: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeSupportBoth/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6698: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeSupportBoth/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6699: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeSupportBoth/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6700: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeSupportBoth/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6701: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeSupportBoth/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6702: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeSupportBoth/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6703: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6704: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6705: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6706: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6707: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6708: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientTicketServerBoth/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6709: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6710: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6711: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6712: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6713: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6714: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothTicketServerTicket/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6715: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6716: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6717: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6718: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6719: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6720: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientServerTicketOnly/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6721: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6722: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6723: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6724: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6725: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6726: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientBothServerNone/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6727: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6728: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6729: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6730: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6731: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6732: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientNoneServerBoth/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6733: 'GenericDatagram/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6734: 'GenericDatagram/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6735: 'GenericDatagram/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6736: 'GenericDatagram/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6737: 'GenericDatagram/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6738: 'GenericDatagram/TlsConnectGenericResumption: ConnectWithExpiredTicketAtClient/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6739: 'GenericDatagram/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6740: 'GenericDatagram/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6741: 'GenericDatagram/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6742: 'GenericDatagram/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6743: 'GenericDatagram/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6744: 'GenericDatagram/TlsConnectGenericResumption: ResumeClientIncompatibleCipher/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6745: 'GenericDatagram/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6746: 'GenericDatagram/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6747: 'GenericDatagram/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6748: 'GenericDatagram/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6749: 'GenericDatagram/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6750: 'GenericDatagram/TlsConnectGenericResumption: ResumeServerIncompatibleCipher/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6751: 'GenericDatagram/TlsConnectGenericResumption: ReConnectTicket/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6752: 'GenericDatagram/TlsConnectGenericResumption: ReConnectTicket/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6753: 'GenericDatagram/TlsConnectGenericResumption: ReConnectTicket/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6754: 'GenericDatagram/TlsConnectGenericResumption: ReConnectTicket/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6755: 'GenericDatagram/TlsConnectGenericResumption: ReConnectTicket/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6756: 'GenericDatagram/TlsConnectGenericResumption: ReConnectTicket/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6757: 'GenericDatagram/TlsConnectGenericResumption: ReConnectAgainTicket/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6758: 'GenericDatagram/TlsConnectGenericResumption: ReConnectAgainTicket/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6759: 'GenericDatagram/TlsConnectGenericResumption: ReConnectAgainTicket/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6760: 'GenericDatagram/TlsConnectGenericResumption: ReConnectAgainTicket/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6761: 'GenericDatagram/TlsConnectGenericResumption: ReConnectAgainTicket/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6762: 'GenericDatagram/TlsConnectGenericResumption: ReConnectAgainTicket/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6763: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientAuth/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6764: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientAuth/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6765: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientAuth/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6766: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientAuth/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6767: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientAuth/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6768: 'GenericDatagram/TlsConnectGenericResumption: ConnectResumeClientAuth/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6769: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6770: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6771: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6772: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6773: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6774: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumption/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6775: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/0 (1, 772, true)' - PASSED ssl_gtest.sh: #6776: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/1 (1, 772, false)' - PASSED ssl_gtest.sh: #6777: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/2 (1, 771, true)' - PASSED ssl_gtest.sh: #6778: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/3 (1, 771, false)' - PASSED ssl_gtest.sh: #6779: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/4 (1, 770, true)' - PASSED ssl_gtest.sh: #6780: 'GenericDatagram/TlsConnectGenericResumption: ClientAuthRequiredOnResumptionNoCert/5 (1, 770, false)' - PASSED ssl_gtest.sh: #6781: 'Pre12Stream/TlsConnectPre12: ResumeWithHigherVersionTls12/0 (0, 769)' - PASSED ssl_gtest.sh: #6782: 'Pre12Stream/TlsConnectPre12: ResumeWithHigherVersionTls12/1 (0, 770)' - PASSED ssl_gtest.sh: #6783: 'Pre12Stream/TlsConnectPre12: ResumeWithLowerVersionFromTls12/0 (0, 769)' - PASSED ssl_gtest.sh: #6784: 'Pre12Stream/TlsConnectPre12: ResumeWithLowerVersionFromTls12/1 (0, 770)' - PASSED ssl_gtest.sh: #6785: 'Pre12Stream/TlsConnectPre12: ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/0 (0, 769)' - PASSED ssl_gtest.sh: #6786: 'Pre12Stream/TlsConnectPre12: ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/1 (0, 770)' - PASSED ssl_gtest.sh: #6787: 'Pre12Stream/TlsConnectPre12: ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/0 (0, 769)' - PASSED ssl_gtest.sh: #6788: 'Pre12Stream/TlsConnectPre12: ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/1 (0, 770)' - PASSED ssl_gtest.sh: #6789: 'Pre12Stream/TlsConnectPre12: ConnectSigAlgDisabledByPolicyDhePre12/0 (0, 769)' - PASSED ssl_gtest.sh: #6790: 'Pre12Stream/TlsConnectPre12: ConnectSigAlgDisabledByPolicyDhePre12/1 (0, 770)' - PASSED ssl_gtest.sh: #6791: 'Pre12Stream/TlsConnectPre12: ServerAuthRsaPssFails/0 (0, 769)' - PASSED ssl_gtest.sh: #6792: 'Pre12Stream/TlsConnectPre12: ServerAuthRsaPssFails/1 (0, 770)' - PASSED ssl_gtest.sh: #6793: 'Pre12Stream/TlsConnectPre12: SignatureAlgorithmNoOverlapEcdsa/0 (0, 769)' - PASSED ssl_gtest.sh: #6794: 'Pre12Stream/TlsConnectPre12: SignatureAlgorithmNoOverlapEcdsa/1 (0, 770)' - PASSED ssl_gtest.sh: #6795: 'Pre12Datagram/TlsConnectPre12: ResumeWithHigherVersionTls12/0 (1, 770)' - PASSED ssl_gtest.sh: #6796: 'Pre12Datagram/TlsConnectPre12: ResumeWithLowerVersionFromTls12/0 (1, 770)' - PASSED ssl_gtest.sh: #6797: 'Pre12Datagram/TlsConnectPre12: ConnectSigAlgDisabledWeakGroupByOption3072DhePre12/0 (1, 770)' - PASSED ssl_gtest.sh: #6798: 'Pre12Datagram/TlsConnectPre12: ConnectSigAlgDisabledWeakGroupByOption2048DhePre12/0 (1, 770)' - PASSED ssl_gtest.sh: #6799: 'Pre12Datagram/TlsConnectPre12: ConnectSigAlgDisabledByPolicyDhePre12/0 (1, 770)' - PASSED ssl_gtest.sh: #6800: 'Pre12Datagram/TlsConnectPre12: ServerAuthRsaPssFails/0 (1, 770)' - PASSED ssl_gtest.sh: #6801: 'Pre12Datagram/TlsConnectPre12: SignatureAlgorithmNoOverlapEcdsa/0 (1, 770)' - PASSED ssl_gtest.sh: #6802: 'GenericStream/TlsConnectGenericResumptionToken: CheckSessionId/0 (0, 772)' - PASSED ssl_gtest.sh: #6803: 'GenericStream/TlsConnectGenericResumptionToken: CheckSessionId/1 (0, 771)' - PASSED ssl_gtest.sh: #6804: 'GenericStream/TlsConnectGenericResumptionToken: CheckSessionId/2 (0, 770)' - PASSED ssl_gtest.sh: #6805: 'GenericStream/TlsConnectGenericResumptionToken: CheckSessionId/3 (0, 769)' - PASSED ssl_gtest.sh: #6806: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfo/0 (0, 772)' - PASSED ssl_gtest.sh: #6807: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfo/1 (0, 771)' - PASSED ssl_gtest.sh: #6808: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfo/2 (0, 770)' - PASSED ssl_gtest.sh: #6809: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfo/3 (0, 769)' - PASSED ssl_gtest.sh: #6810: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketClient/0 (0, 772)' - PASSED ssl_gtest.sh: #6811: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketClient/1 (0, 771)' - PASSED ssl_gtest.sh: #6812: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketClient/2 (0, 770)' - PASSED ssl_gtest.sh: #6813: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketClient/3 (0, 769)' - PASSED ssl_gtest.sh: #6814: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketServer/0 (0, 772)' - PASSED ssl_gtest.sh: #6815: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketServer/1 (0, 771)' - PASSED ssl_gtest.sh: #6816: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketServer/2 (0, 770)' - PASSED ssl_gtest.sh: #6817: 'GenericStream/TlsConnectGenericResumptionToken: RefuseExpiredTicketServer/3 (0, 769)' - PASSED ssl_gtest.sh: #6818: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfoAlpn/0 (0, 772)' - PASSED ssl_gtest.sh: #6819: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfoAlpn/1 (0, 771)' - PASSED ssl_gtest.sh: #6820: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfoAlpn/2 (0, 770)' - PASSED ssl_gtest.sh: #6821: 'GenericStream/TlsConnectGenericResumptionToken: ConnectResumeGetInfoAlpn/3 (0, 769)' - PASSED ssl_gtest.sh: #6822: 'GenericDatagram/TlsConnectGenericResumptionToken: CheckSessionId/0 (1, 772)' - PASSED ssl_gtest.sh: #6823: 'GenericDatagram/TlsConnectGenericResumptionToken: CheckSessionId/1 (1, 771)' - PASSED ssl_gtest.sh: #6824: 'GenericDatagram/TlsConnectGenericResumptionToken: CheckSessionId/2 (1, 770)' - PASSED ssl_gtest.sh: #6825: 'GenericDatagram/TlsConnectGenericResumptionToken: ConnectResumeGetInfo/0 (1, 772)' - PASSED ssl_gtest.sh: #6826: 'GenericDatagram/TlsConnectGenericResumptionToken: ConnectResumeGetInfo/1 (1, 771)' - PASSED ssl_gtest.sh: #6827: 'GenericDatagram/TlsConnectGenericResumptionToken: ConnectResumeGetInfo/2 (1, 770)' - PASSED ssl_gtest.sh: #6828: 'GenericDatagram/TlsConnectGenericResumptionToken: RefuseExpiredTicketClient/0 (1, 772)' - PASSED ssl_gtest.sh: #6829: 'GenericDatagram/TlsConnectGenericResumptionToken: RefuseExpiredTicketClient/1 (1, 771)' - PASSED ssl_gtest.sh: #6830: 'GenericDatagram/TlsConnectGenericResumptionToken: RefuseExpiredTicketClient/2 (1, 770)' - PASSED ssl_gtest.sh: #6831: 'GenericDatagram/TlsConnectGenericResumptionToken: RefuseExpiredTicketServer/0 (1, 772)' - PASSED ssl_gtest.sh: #6832: 'GenericDatagram/TlsConnectGenericResumptionToken: RefuseExpiredTicketServer/1 (1, 771)' - PASSED ssl_gtest.sh: #6833: 'GenericDatagram/TlsConnectGenericResumptionToken: RefuseExpiredTicketServer/2 (1, 770)' - PASSED ssl_gtest.sh: #6834: 'GenericDatagram/TlsConnectGenericResumptionToken: ConnectResumeGetInfoAlpn/0 (1, 772)' - PASSED ssl_gtest.sh: #6835: 'GenericDatagram/TlsConnectGenericResumptionToken: ConnectResumeGetInfoAlpn/1 (1, 771)' - PASSED ssl_gtest.sh: #6836: 'GenericDatagram/TlsConnectGenericResumptionToken: ConnectResumeGetInfoAlpn/2 (1, 770)' - PASSED ssl_gtest.sh: #6837: 'GenericDatagram/TlsConnectTls13ResumptionToken: ConnectResumeGetInfoZeroRtt/0 0' - PASSED ssl_gtest.sh: #6838: 'GenericDatagram/TlsConnectTls13ResumptionToken: ConnectResumeGetInfoZeroRtt/1 1' - PASSED ssl_gtest.sh: #6839: 'TlsPadding/TlsPaddingTest: Correct/0 (1, true)' - PASSED ssl_gtest.sh: #6840: 'TlsPadding/TlsPaddingTest: Correct/1 (1, false)' - PASSED ssl_gtest.sh: #6841: 'TlsPadding/TlsPaddingTest: Correct/2 (19, true)' - PASSED ssl_gtest.sh: #6842: 'TlsPadding/TlsPaddingTest: Correct/3 (19, false)' - PASSED ssl_gtest.sh: #6843: 'TlsPadding/TlsPaddingTest: Correct/4 (20, true)' - PASSED ssl_gtest.sh: #6844: 'TlsPadding/TlsPaddingTest: Correct/5 (20, false)' - PASSED ssl_gtest.sh: #6845: 'TlsPadding/TlsPaddingTest: Correct/6 (30, true)' - PASSED ssl_gtest.sh: #6846: 'TlsPadding/TlsPaddingTest: Correct/7 (30, false)' - PASSED ssl_gtest.sh: #6847: 'TlsPadding/TlsPaddingTest: Correct/8 (31, true)' - PASSED ssl_gtest.sh: #6848: 'TlsPadding/TlsPaddingTest: Correct/9 (31, false)' - PASSED ssl_gtest.sh: #6849: 'TlsPadding/TlsPaddingTest: Correct/10 (32, true)' - PASSED ssl_gtest.sh: #6850: 'TlsPadding/TlsPaddingTest: Correct/11 (32, false)' - PASSED ssl_gtest.sh: #6851: 'TlsPadding/TlsPaddingTest: Correct/12 (36, true)' - PASSED ssl_gtest.sh: #6852: 'TlsPadding/TlsPaddingTest: Correct/13 (36, false)' - PASSED ssl_gtest.sh: #6853: 'TlsPadding/TlsPaddingTest: Correct/14 (256, true)' - PASSED ssl_gtest.sh: #6854: 'TlsPadding/TlsPaddingTest: Correct/15 (256, false)' - PASSED ssl_gtest.sh: #6855: 'TlsPadding/TlsPaddingTest: Correct/16 (257, true)' - PASSED ssl_gtest.sh: #6856: 'TlsPadding/TlsPaddingTest: Correct/17 (257, false)' - PASSED ssl_gtest.sh: #6857: 'TlsPadding/TlsPaddingTest: Correct/18 (287, true)' - PASSED ssl_gtest.sh: #6858: 'TlsPadding/TlsPaddingTest: Correct/19 (287, false)' - PASSED ssl_gtest.sh: #6859: 'TlsPadding/TlsPaddingTest: Correct/20 (288, true)' - PASSED ssl_gtest.sh: #6860: 'TlsPadding/TlsPaddingTest: Correct/21 (288, false)' - PASSED ssl_gtest.sh: #6861: 'TlsPadding/TlsPaddingTest: PadTooLong/0 (1, true)' - PASSED ssl_gtest.sh: #6862: 'TlsPadding/TlsPaddingTest: PadTooLong/1 (1, false)' - PASSED ssl_gtest.sh: #6863: 'TlsPadding/TlsPaddingTest: PadTooLong/2 (19, true)' - PASSED ssl_gtest.sh: #6864: 'TlsPadding/TlsPaddingTest: PadTooLong/3 (19, false)' - PASSED ssl_gtest.sh: #6865: 'TlsPadding/TlsPaddingTest: PadTooLong/4 (20, true)' - PASSED ssl_gtest.sh: #6866: 'TlsPadding/TlsPaddingTest: PadTooLong/5 (20, false)' - PASSED ssl_gtest.sh: #6867: 'TlsPadding/TlsPaddingTest: PadTooLong/6 (30, true)' - PASSED ssl_gtest.sh: #6868: 'TlsPadding/TlsPaddingTest: PadTooLong/7 (30, false)' - PASSED ssl_gtest.sh: #6869: 'TlsPadding/TlsPaddingTest: PadTooLong/8 (31, true)' - PASSED ssl_gtest.sh: #6870: 'TlsPadding/TlsPaddingTest: PadTooLong/9 (31, false)' - PASSED ssl_gtest.sh: #6871: 'TlsPadding/TlsPaddingTest: PadTooLong/10 (32, true)' - PASSED ssl_gtest.sh: #6872: 'TlsPadding/TlsPaddingTest: PadTooLong/11 (32, false)' - PASSED ssl_gtest.sh: #6873: 'TlsPadding/TlsPaddingTest: PadTooLong/12 (36, true)' - PASSED ssl_gtest.sh: #6874: 'TlsPadding/TlsPaddingTest: PadTooLong/13 (36, false)' - PASSED ssl_gtest.sh: #6875: 'TlsPadding/TlsPaddingTest: PadTooLong/14 (256, true)' - PASSED ssl_gtest.sh: #6876: 'TlsPadding/TlsPaddingTest: PadTooLong/15 (256, false)' - PASSED ssl_gtest.sh: #6877: 'TlsPadding/TlsPaddingTest: PadTooLong/16 (257, true)' - PASSED ssl_gtest.sh: #6878: 'TlsPadding/TlsPaddingTest: PadTooLong/17 (257, false)' - PASSED ssl_gtest.sh: #6879: 'TlsPadding/TlsPaddingTest: PadTooLong/18 (287, true)' - PASSED ssl_gtest.sh: #6880: 'TlsPadding/TlsPaddingTest: PadTooLong/19 (287, false)' - PASSED ssl_gtest.sh: #6881: 'TlsPadding/TlsPaddingTest: PadTooLong/20 (288, true)' - PASSED ssl_gtest.sh: #6882: 'TlsPadding/TlsPaddingTest: PadTooLong/21 (288, false)' - PASSED ssl_gtest.sh: #6883: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #6884: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #6885: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #6886: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #6887: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #6888: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #6889: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #6890: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #6891: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #6892: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #6893: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #6894: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #6895: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #6896: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #6897: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #6898: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #6899: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #6900: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #6901: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #6902: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #6903: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #6904: 'TlsPadding/TlsPaddingTest: FirstByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #6905: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/0 (1, true)' - PASSED ssl_gtest.sh: #6906: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/1 (1, false)' - PASSED ssl_gtest.sh: #6907: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/2 (19, true)' - PASSED ssl_gtest.sh: #6908: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/3 (19, false)' - PASSED ssl_gtest.sh: #6909: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/4 (20, true)' - PASSED ssl_gtest.sh: #6910: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/5 (20, false)' - PASSED ssl_gtest.sh: #6911: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/6 (30, true)' - PASSED ssl_gtest.sh: #6912: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/7 (30, false)' - PASSED ssl_gtest.sh: #6913: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/8 (31, true)' - PASSED ssl_gtest.sh: #6914: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/9 (31, false)' - PASSED ssl_gtest.sh: #6915: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/10 (32, true)' - PASSED ssl_gtest.sh: #6916: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/11 (32, false)' - PASSED ssl_gtest.sh: #6917: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/12 (36, true)' - PASSED ssl_gtest.sh: #6918: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/13 (36, false)' - PASSED ssl_gtest.sh: #6919: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/14 (256, true)' - PASSED ssl_gtest.sh: #6920: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/15 (256, false)' - PASSED ssl_gtest.sh: #6921: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/16 (257, true)' - PASSED ssl_gtest.sh: #6922: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/17 (257, false)' - PASSED ssl_gtest.sh: #6923: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/18 (287, true)' - PASSED ssl_gtest.sh: #6924: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/19 (287, false)' - PASSED ssl_gtest.sh: #6925: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/20 (288, true)' - PASSED ssl_gtest.sh: #6926: 'TlsPadding/TlsPaddingTest: LastByteOfPadWrong/21 (288, false)' - PASSED ssl_gtest.sh: #6927: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakeTest (0, 22, 0)' - PASSED ssl_gtest.sh: #6928: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakePadding1BTest (0, 22, 1)' - PASSED ssl_gtest.sh: #6929: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextHandshakePadding100BTest (0, 22, 100)' - PASSED ssl_gtest.sh: #6930: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertTest (0, 21, 0)' - PASSED ssl_gtest.sh: #6931: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertPadding1BTest (0, 21, 1)' - PASSED ssl_gtest.sh: #6932: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/TlsZeroLengthInnerPlaintextAlertPadding100BTest (0, 21, 100)' - PASSED ssl_gtest.sh: #6933: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakeTest (1, 22, 0)' - PASSED ssl_gtest.sh: #6934: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakePadding1BTest (1, 22, 1)' - PASSED ssl_gtest.sh: #6935: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextHandshakePadding100BTest (1, 22, 100)' - PASSED ssl_gtest.sh: #6936: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertTest (1, 21, 0)' - PASSED ssl_gtest.sh: #6937: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertPadding1BTest (1, 21, 1)' - PASSED ssl_gtest.sh: #6938: 'ZeroLengthInnerPlaintextTest/ZeroLengthInnerPlaintextSetupTls13: ZeroLengthInnerPlaintextRun/DtlsZeroLengthInnerPlaintextAlertPadding100BTest (1, 21, 100)' - PASSED ssl_gtest.sh: #6939: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_3ZeroLengthHandshakeTest (0, 772, 22)' - PASSED ssl_gtest.sh: #6940: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_3ZeroLengthAlertTest (0, 772, 21)' - PASSED ssl_gtest.sh: #6941: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_3ZeroLengthChangeCipherSpecTest (0, 772, 20)' - PASSED ssl_gtest.sh: #6942: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_3ZeroLengthApplicationDataTest (0, 772, 23)' - PASSED ssl_gtest.sh: #6943: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_3ZeroLengthAckTest (0, 772, 26)' - PASSED ssl_gtest.sh: #6944: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_2ZeroLengthHandshakeTest (0, 771, 22)' - PASSED ssl_gtest.sh: #6945: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_2ZeroLengthAlertTest (0, 771, 21)' - PASSED ssl_gtest.sh: #6946: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_2ZeroLengthChangeCipherSpecTest (0, 771, 20)' - PASSED ssl_gtest.sh: #6947: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_2ZeroLengthApplicationDataTest (0, 771, 23)' - PASSED ssl_gtest.sh: #6948: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_2ZeroLengthAckTest (0, 771, 26)' - PASSED ssl_gtest.sh: #6949: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_1ZeroLengthHandshakeTest (0, 770, 22)' - PASSED ssl_gtest.sh: #6950: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_1ZeroLengthAlertTest (0, 770, 21)' - PASSED ssl_gtest.sh: #6951: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_1ZeroLengthChangeCipherSpecTest (0, 770, 20)' - PASSED ssl_gtest.sh: #6952: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_1ZeroLengthApplicationDataTest (0, 770, 23)' - PASSED ssl_gtest.sh: #6953: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Tls1_1ZeroLengthAckTest (0, 770, 26)' - PASSED ssl_gtest.sh: #6954: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_3ZeroLengthHandshakeTest (1, 772, 22)' - PASSED ssl_gtest.sh: #6955: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_3ZeroLengthAlertTest (1, 772, 21)' - PASSED ssl_gtest.sh: #6956: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_3ZeroLengthChangeCipherSpecTest (1, 772, 20)' - PASSED ssl_gtest.sh: #6957: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_3ZeroLengthApplicationDataTest (1, 772, 23)' - PASSED ssl_gtest.sh: #6958: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_2ZeroLengthHandshakeTest (1, 771, 22)' - PASSED ssl_gtest.sh: #6959: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_2ZeroLengthAlertTest (1, 771, 21)' - PASSED ssl_gtest.sh: #6960: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_2ZeroLengthChangeCipherSpecTest (1, 771, 20)' - PASSED ssl_gtest.sh: #6961: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_2ZeroLengthApplicationDataTest (1, 771, 23)' - PASSED ssl_gtest.sh: #6962: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_2ZeroLengthAckTest (1, 771, 26)' - PASSED ssl_gtest.sh: #6963: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_1ZeroLengthHandshakeTest (1, 770, 22)' - PASSED ssl_gtest.sh: #6964: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_1ZeroLengthAlertTest (1, 770, 21)' - PASSED ssl_gtest.sh: #6965: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_1ZeroLengthChangeCipherSpecTest (1, 770, 20)' - PASSED ssl_gtest.sh: #6966: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_1ZeroLengthApplicationDataTest (1, 770, 23)' - PASSED ssl_gtest.sh: #6967: 'ZeroLengthRecordTest/ZeroLengthRecordSetup: ZeroLengthRecordRun/Dtls1_1ZeroLengthAckTest (1, 770, 26)' - PASSED ssl_gtest.sh: #6968: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePreClientHello/0 (0, 772)' - PASSED ssl_gtest.sh: #6969: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePreClientHello/1 (0, 771)' - PASSED ssl_gtest.sh: #6970: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePreClientHello/2 (0, 770)' - PASSED ssl_gtest.sh: #6971: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePreClientHello/3 (0, 769)' - PASSED ssl_gtest.sh: #6972: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePostClientHello/0 (0, 772)' - PASSED ssl_gtest.sh: #6973: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePostClientHello/1 (0, 771)' - PASSED ssl_gtest.sh: #6974: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePostClientHello/2 (0, 770)' - PASSED ssl_gtest.sh: #6975: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePostClientHello/3 (0, 769)' - PASSED ssl_gtest.sh: #6976: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePreClientHello/0 (0, 772)' - PASSED ssl_gtest.sh: #6977: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePreClientHello/1 (0, 771)' - PASSED ssl_gtest.sh: #6978: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePreClientHello/2 (0, 770)' - PASSED ssl_gtest.sh: #6979: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePreClientHello/3 (0, 769)' - PASSED ssl_gtest.sh: #6980: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePostClientHello/0 (0, 772)' - PASSED ssl_gtest.sh: #6981: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePostClientHello/1 (0, 771)' - PASSED ssl_gtest.sh: #6982: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePostClientHello/2 (0, 770)' - PASSED ssl_gtest.sh: #6983: 'UndefinedContentTypePreHandshakeStream/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePostClientHello/3 (0, 769)' - PASSED ssl_gtest.sh: #6984: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePreClientHello/0 (1, 772)' - PASSED ssl_gtest.sh: #6985: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePreClientHello/1 (1, 771)' - PASSED ssl_gtest.sh: #6986: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePreClientHello/2 (1, 770)' - PASSED ssl_gtest.sh: #6987: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePostClientHello/0 (1, 772)' - PASSED ssl_gtest.sh: #6988: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePostClientHello/1 (1, 771)' - PASSED ssl_gtest.sh: #6989: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ServerReceiveUndefinedContentTypePostClientHello/2 (1, 770)' - PASSED ssl_gtest.sh: #6990: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePreClientHello/0 (1, 772)' - PASSED ssl_gtest.sh: #6991: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePreClientHello/1 (1, 771)' - PASSED ssl_gtest.sh: #6992: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePreClientHello/2 (1, 770)' - PASSED ssl_gtest.sh: #6993: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePostClientHello/0 (1, 772)' - PASSED ssl_gtest.sh: #6994: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePostClientHello/1 (1, 771)' - PASSED ssl_gtest.sh: #6995: 'UndefinedContentTypePreHandshakeDatagram/UndefinedContentTypeSetup: ClientReceiveUndefinedContentTypePostClientHello/2 (1, 770)' - PASSED ssl_gtest.sh: #6996: 'GenericMasking/VariantSuiteTest: MaskContextNoLabel/0 (0, 4867)' - PASSED ssl_gtest.sh: #6997: 'GenericMasking/VariantSuiteTest: MaskContextNoLabel/1 (0, 4865)' - PASSED ssl_gtest.sh: #6998: 'GenericMasking/VariantSuiteTest: MaskContextNoLabel/2 (0, 4866)' - PASSED ssl_gtest.sh: #6999: 'GenericMasking/VariantSuiteTest: MaskContextNoLabel/3 (1, 4867)' - PASSED ssl_gtest.sh: #7000: 'GenericMasking/VariantSuiteTest: MaskContextNoLabel/4 (1, 4865)' - PASSED ssl_gtest.sh: #7001: 'GenericMasking/VariantSuiteTest: MaskContextNoLabel/5 (1, 4866)' - PASSED ssl_gtest.sh: #7002: 'GenericMasking/VariantSuiteTest: MaskNoSample/0 (0, 4867)' - PASSED ssl_gtest.sh: #7003: 'GenericMasking/VariantSuiteTest: MaskNoSample/1 (0, 4865)' - PASSED ssl_gtest.sh: #7004: 'GenericMasking/VariantSuiteTest: MaskNoSample/2 (0, 4866)' - PASSED ssl_gtest.sh: #7005: 'GenericMasking/VariantSuiteTest: MaskNoSample/3 (1, 4867)' - PASSED ssl_gtest.sh: #7006: 'GenericMasking/VariantSuiteTest: MaskNoSample/4 (1, 4865)' - PASSED ssl_gtest.sh: #7007: 'GenericMasking/VariantSuiteTest: MaskNoSample/5 (1, 4866)' - PASSED ssl_gtest.sh: #7008: 'GenericMasking/VariantSuiteTest: MaskShortSample/0 (0, 4867)' - PASSED ssl_gtest.sh: #7009: 'GenericMasking/VariantSuiteTest: MaskShortSample/1 (0, 4865)' - PASSED ssl_gtest.sh: #7010: 'GenericMasking/VariantSuiteTest: MaskShortSample/2 (0, 4866)' - PASSED ssl_gtest.sh: #7011: 'GenericMasking/VariantSuiteTest: MaskShortSample/3 (1, 4867)' - PASSED ssl_gtest.sh: #7012: 'GenericMasking/VariantSuiteTest: MaskShortSample/4 (1, 4865)' - PASSED ssl_gtest.sh: #7013: 'GenericMasking/VariantSuiteTest: MaskShortSample/5 (1, 4866)' - PASSED ssl_gtest.sh: #7014: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedMech/0 (0, 4867)' - PASSED ssl_gtest.sh: #7015: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedMech/1 (0, 4865)' - PASSED ssl_gtest.sh: #7016: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedMech/2 (0, 4866)' - PASSED ssl_gtest.sh: #7017: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedMech/3 (1, 4867)' - PASSED ssl_gtest.sh: #7018: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedMech/4 (1, 4865)' - PASSED ssl_gtest.sh: #7019: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedMech/5 (1, 4866)' - PASSED ssl_gtest.sh: #7020: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedVersion/0 (0, 4867)' - PASSED ssl_gtest.sh: #7021: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedVersion/1 (0, 4865)' - PASSED ssl_gtest.sh: #7022: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedVersion/2 (0, 4866)' - PASSED ssl_gtest.sh: #7023: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedVersion/3 (1, 4867)' - PASSED ssl_gtest.sh: #7024: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedVersion/4 (1, 4865)' - PASSED ssl_gtest.sh: #7025: 'GenericMasking/VariantSuiteTest: MaskContextUnsupportedVersion/5 (1, 4866)' - PASSED ssl_gtest.sh: #7026: 'GenericMasking/VariantSuiteTest: MaskMaxLength/0 (0, 4867)' - PASSED ssl_gtest.sh: #7027: 'GenericMasking/VariantSuiteTest: MaskMaxLength/1 (0, 4865)' - PASSED ssl_gtest.sh: #7028: 'GenericMasking/VariantSuiteTest: MaskMaxLength/2 (0, 4866)' - PASSED ssl_gtest.sh: #7029: 'GenericMasking/VariantSuiteTest: MaskMaxLength/3 (1, 4867)' - PASSED ssl_gtest.sh: #7030: 'GenericMasking/VariantSuiteTest: MaskMaxLength/4 (1, 4865)' - PASSED ssl_gtest.sh: #7031: 'GenericMasking/VariantSuiteTest: MaskMaxLength/5 (1, 4866)' - PASSED ssl_gtest.sh: #7032: 'GenericMasking/VariantSuiteTest: MaskMinLength/0 (0, 4867)' - PASSED ssl_gtest.sh: #7033: 'GenericMasking/VariantSuiteTest: MaskMinLength/1 (0, 4865)' - PASSED ssl_gtest.sh: #7034: 'GenericMasking/VariantSuiteTest: MaskMinLength/2 (0, 4866)' - PASSED ssl_gtest.sh: #7035: 'GenericMasking/VariantSuiteTest: MaskMinLength/3 (1, 4867)' - PASSED ssl_gtest.sh: #7036: 'GenericMasking/VariantSuiteTest: MaskMinLength/4 (1, 4865)' - PASSED ssl_gtest.sh: #7037: 'GenericMasking/VariantSuiteTest: MaskMinLength/5 (1, 4866)' - PASSED ssl_gtest.sh: #7038: 'GenericMasking/VariantSuiteTest: MaskRotateLabel/0 (0, 4867)' - PASSED ssl_gtest.sh: #7039: 'GenericMasking/VariantSuiteTest: MaskRotateLabel/1 (0, 4865)' - PASSED ssl_gtest.sh: #7040: 'GenericMasking/VariantSuiteTest: MaskRotateLabel/2 (0, 4866)' - PASSED ssl_gtest.sh: #7041: 'GenericMasking/VariantSuiteTest: MaskRotateLabel/3 (1, 4867)' - PASSED ssl_gtest.sh: #7042: 'GenericMasking/VariantSuiteTest: MaskRotateLabel/4 (1, 4865)' - PASSED ssl_gtest.sh: #7043: 'GenericMasking/VariantSuiteTest: MaskRotateLabel/5 (1, 4866)' - PASSED ssl_gtest.sh: #7044: 'GenericMasking/VariantSuiteTest: MaskRotateSample/0 (0, 4867)' - PASSED ssl_gtest.sh: #7045: 'GenericMasking/VariantSuiteTest: MaskRotateSample/1 (0, 4865)' - PASSED ssl_gtest.sh: #7046: 'GenericMasking/VariantSuiteTest: MaskRotateSample/2 (0, 4866)' - PASSED ssl_gtest.sh: #7047: 'GenericMasking/VariantSuiteTest: MaskRotateSample/3 (1, 4867)' - PASSED ssl_gtest.sh: #7048: 'GenericMasking/VariantSuiteTest: MaskRotateSample/4 (1, 4865)' - PASSED ssl_gtest.sh: #7049: 'GenericMasking/VariantSuiteTest: MaskRotateSample/5 (1, 4866)' - PASSED ssl_gtest.sh: #7050: 'GenericMasking/VariantSuiteTest: MaskRederive/0 (0, 4867)' - PASSED ssl_gtest.sh: #7051: 'GenericMasking/VariantSuiteTest: MaskRederive/1 (0, 4865)' - PASSED ssl_gtest.sh: #7052: 'GenericMasking/VariantSuiteTest: MaskRederive/2 (0, 4866)' - PASSED ssl_gtest.sh: #7053: 'GenericMasking/VariantSuiteTest: MaskRederive/3 (1, 4867)' - PASSED ssl_gtest.sh: #7054: 'GenericMasking/VariantSuiteTest: MaskRederive/4 (1, 4865)' - PASSED ssl_gtest.sh: #7055: 'GenericMasking/VariantSuiteTest: MaskRederive/5 (1, 4866)' - PASSED ssl_gtest.sh: #7056: 'GenericMasking/SuiteTest: MaskTlsVariantKeySeparation/0 4867' - PASSED ssl_gtest.sh: #7057: 'GenericMasking/SuiteTest: MaskTlsVariantKeySeparation/1 4865' - PASSED ssl_gtest.sh: #7058: 'GenericMasking/SuiteTest: MaskTlsVariantKeySeparation/2 4866' - PASSED ssl_gtest.sh: #7059: 'GenericMasking/VariantTest: MaskChaChaRederiveOddSizes/0 0' - PASSED ssl_gtest.sh: #7060: 'GenericMasking/VariantTest: MaskChaChaRederiveOddSizes/1 1' - PASSED ssl_gtest.sh: #7061: 'DatagramOnly/TlsConnectDatagram: ConnectSrtp/0 772' - PASSED ssl_gtest.sh: #7062: 'DatagramOnly/TlsConnectDatagram: ConnectSrtp/1 771' - PASSED ssl_gtest.sh: #7063: 'DatagramOnly/TlsConnectDatagram: ConnectSrtp/2 770' - PASSED ssl_gtest.sh: #7064: 'DatagramOnly/TlsConnectDatagram: ShortRead/0 772' - PASSED ssl_gtest.sh: #7065: 'DatagramOnly/TlsConnectDatagram: ShortRead/1 771' - PASSED ssl_gtest.sh: #7066: 'DatagramOnly/TlsConnectDatagram: ShortRead/2 770' - PASSED ssl_gtest.sh: #7067: 'DatagramOnly/TlsConnectDatagram: BlockedWrite/0 772' - PASSED ssl_gtest.sh: #7068: 'DatagramOnly/TlsConnectDatagram: BlockedWrite/1 771' - PASSED ssl_gtest.sh: #7069: 'DatagramOnly/TlsConnectDatagram: BlockedWrite/2 770' - PASSED ssl_gtest.sh: #7070: 'DatagramOnly/TlsConnectDatagram: FragmentClientPackets/0 772' - PASSED ssl_gtest.sh: #7071: 'DatagramOnly/TlsConnectDatagram: FragmentClientPackets/1 771' - PASSED ssl_gtest.sh: #7072: 'DatagramOnly/TlsConnectDatagram: FragmentClientPackets/2 770' - PASSED ssl_gtest.sh: #7073: 'DatagramOnly/TlsConnectDatagram: FragmentServerPackets/0 772' - PASSED ssl_gtest.sh: #7074: 'DatagramOnly/TlsConnectDatagram: FragmentServerPackets/1 771' - PASSED ssl_gtest.sh: #7075: 'DatagramOnly/TlsConnectDatagram: FragmentServerPackets/2 770' - PASSED ssl_gtest.sh: #7076: 'DatagramOnly/TlsConnectDatagram: MissLotsOfPackets/0 772' - PASSED ssl_gtest.sh: #7077: 'DatagramOnly/TlsConnectDatagram: MissLotsOfPackets/1 771' - PASSED ssl_gtest.sh: #7078: 'DatagramOnly/TlsConnectDatagram: MissLotsOfPackets/2 770' - PASSED ssl_gtest.sh: #7079: 'DatagramOnly/TlsConnectDatagram: ReplaceFirstServerRecordWithApplicationData/0 772' - PASSED ssl_gtest.sh: #7080: 'DatagramOnly/TlsConnectDatagram: ReplaceFirstServerRecordWithApplicationData/1 771' - PASSED ssl_gtest.sh: #7081: 'DatagramOnly/TlsConnectDatagram: ReplaceFirstServerRecordWithApplicationData/2 770' - PASSED ssl_gtest.sh: #7082: 'DatagramOnly/TlsConnectDatagram: ReplaceFirstClientRecordWithApplicationData/0 772' - PASSED ssl_gtest.sh: #7083: 'DatagramOnly/TlsConnectDatagram: ReplaceFirstClientRecordWithApplicationData/1 771' - PASSED ssl_gtest.sh: #7084: 'DatagramOnly/TlsConnectDatagram: ReplaceFirstClientRecordWithApplicationData/2 770' - PASSED ssl_gtest.sh: #7085: 'DatagramHolddown/TlsHolddownTest: TestDtlsHolddownExpiry/0 772' - PASSED ssl_gtest.sh: #7086: 'DatagramHolddown/TlsHolddownTest: TestDtlsHolddownExpiry/1 771' - PASSED ssl_gtest.sh: #7087: 'DatagramHolddown/TlsHolddownTest: TestDtlsHolddownExpiry/2 770' - PASSED ssl_gtest.sh: #7088: 'DatagramHolddown/TlsHolddownTest: TestDtlsHolddownExpiryResumption/0 772' - PASSED ssl_gtest.sh: #7089: 'DatagramHolddown/TlsHolddownTest: TestDtlsHolddownExpiryResumption/1 771' - PASSED ssl_gtest.sh: #7090: 'DatagramHolddown/TlsHolddownTest: TestDtlsHolddownExpiryResumption/2 770' - PASSED ssl_gtest.sh: #7091: 'Version12Only/TlsConnectTls12: ConnectExtendedMasterSecretSha384/0 0' - PASSED ssl_gtest.sh: #7092: 'Version12Only/TlsConnectTls12: ConnectExtendedMasterSecretSha384/1 1' - PASSED ssl_gtest.sh: #7093: 'Version12Only/TlsConnectTls12: ConnectEcdheP384/0 0' - PASSED ssl_gtest.sh: #7094: 'Version12Only/TlsConnectTls12: ConnectEcdheP384/1 1' - PASSED ssl_gtest.sh: #7095: 'Version12Only/TlsConnectTls12: ConnectUnsupportedSigAlg/0 0' - PASSED ssl_gtest.sh: #7096: 'Version12Only/TlsConnectTls12: ConnectUnsupportedSigAlg/1 1' - PASSED ssl_gtest.sh: #7097: 'Version12Only/TlsConnectTls12: ConnectIncorrectSigAlg/0 0' - PASSED ssl_gtest.sh: #7098: 'Version12Only/TlsConnectTls12: ConnectIncorrectSigAlg/1 1' - PASSED ssl_gtest.sh: #7099: 'Version12Only/TlsConnectTls12: ConnectSigAlgEnabledByPolicy/0 0' - PASSED ssl_gtest.sh: #7100: 'Version12Only/TlsConnectTls12: ConnectSigAlgEnabledByPolicy/1 1' - PASSED ssl_gtest.sh: #7101: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisabledByPolicy/0 0' - PASSED ssl_gtest.sh: #7102: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisabledByPolicy/1 1' - PASSED ssl_gtest.sh: #7103: 'Version12Only/TlsConnectTls12: ConnectInconsistentSigAlgDHE/0 0' - PASSED ssl_gtest.sh: #7104: 'Version12Only/TlsConnectTls12: ConnectInconsistentSigAlgDHE/1 1' - PASSED ssl_gtest.sh: #7105: 'Version12Only/TlsConnectTls12: ConnectSigAlgEnabledByPolicyDhe/0 0' - PASSED ssl_gtest.sh: #7106: 'Version12Only/TlsConnectTls12: ConnectSigAlgEnabledByPolicyDhe/1 1' - PASSED ssl_gtest.sh: #7107: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisabledByPolicyDhe/0 0' - PASSED ssl_gtest.sh: #7108: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisabledByPolicyDhe/1 1' - PASSED ssl_gtest.sh: #7109: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisablePreferredGroupByOption3072Dhe/0 0' - PASSED ssl_gtest.sh: #7110: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisablePreferredGroupByOption3072Dhe/1 1' - PASSED ssl_gtest.sh: #7111: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisableGroupByOption3072Dhe/0 0' - PASSED ssl_gtest.sh: #7112: 'Version12Only/TlsConnectTls12: ConnectSigAlgDisableGroupByOption3072Dhe/1 1' - PASSED ssl_gtest.sh: #7113: 'Version12Only/TlsConnectTls12: AutoClientSelectRsaPss/0 0' - PASSED ssl_gtest.sh: #7114: 'Version12Only/TlsConnectTls12: AutoClientSelectRsaPss/1 1' - PASSED ssl_gtest.sh: #7115: 'Version12Only/TlsConnectTls12: AutoClientSelectEcc/0 0' - PASSED ssl_gtest.sh: #7116: 'Version12Only/TlsConnectTls12: AutoClientSelectEcc/1 1' - PASSED ssl_gtest.sh: #7117: 'Version12Only/TlsConnectTls12: AutoClientSelectDsa/0 0' - PASSED ssl_gtest.sh: #7118: 'Version12Only/TlsConnectTls12: AutoClientSelectDsa/1 1' - PASSED ssl_gtest.sh: #7119: 'Version12Only/TlsConnectTls12: ServerAuthCheckSigAlg/0 0' - PASSED ssl_gtest.sh: #7120: 'Version12Only/TlsConnectTls12: ServerAuthCheckSigAlg/1 1' - PASSED ssl_gtest.sh: #7121: 'Version12Only/TlsConnectTls12: SignatureSchemeCurveMismatch/0 0' - PASSED ssl_gtest.sh: #7122: 'Version12Only/TlsConnectTls12: SignatureSchemeCurveMismatch/1 1' - PASSED ssl_gtest.sh: #7123: 'Version12Only/TlsConnectTls12: SignatureSchemeBadConfig/0 0' - PASSED ssl_gtest.sh: #7124: 'Version12Only/TlsConnectTls12: SignatureSchemeBadConfig/1 1' - PASSED ssl_gtest.sh: #7125: 'Version12Only/TlsConnectTls12: SignatureAlgorithmDrop/0 0' - PASSED ssl_gtest.sh: #7126: 'Version12Only/TlsConnectTls12: SignatureAlgorithmDrop/1 1' - PASSED ssl_gtest.sh: #7127: 'Version12Only/TlsConnectTls12: RequestClientAuthWithSha384/0 0' - PASSED ssl_gtest.sh: #7128: 'Version12Only/TlsConnectTls12: RequestClientAuthWithSha384/1 1' - PASSED ssl_gtest.sh: #7129: 'Version12Only/TlsConnectTls12: Tls12CertDisabledGroup/0 0' - PASSED ssl_gtest.sh: #7130: 'Version12Only/TlsConnectTls12: Tls12CertDisabledGroup/1 1' - PASSED ssl_gtest.sh: #7131: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPss/0 (0, 772)' - PASSED ssl_gtest.sh: #7132: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPss/1 (0, 771)' - PASSED ssl_gtest.sh: #7133: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPss/2 (1, 772)' - PASSED ssl_gtest.sh: #7134: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPss/3 (1, 771)' - PASSED ssl_gtest.sh: #7135: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPssNoParameters/0 (0, 772)' - PASSED ssl_gtest.sh: #7136: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPssNoParameters/1 (0, 771)' - PASSED ssl_gtest.sh: #7137: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPssNoParameters/2 (1, 772)' - PASSED ssl_gtest.sh: #7138: 'Version12Plus/TlsConnectTls12Plus: ServerAuthRsaPssNoParameters/3 (1, 771)' - PASSED ssl_gtest.sh: #7139: 'Version12Plus/TlsConnectTls12Plus: SignatureAlgorithmNoOverlapEcdsa/0 (0, 772)' - PASSED ssl_gtest.sh: #7140: 'Version12Plus/TlsConnectTls12Plus: SignatureAlgorithmNoOverlapEcdsa/1 (0, 771)' - PASSED ssl_gtest.sh: #7141: 'Version12Plus/TlsConnectTls12Plus: SignatureAlgorithmNoOverlapEcdsa/2 (1, 772)' - PASSED ssl_gtest.sh: #7142: 'Version12Plus/TlsConnectTls12Plus: SignatureAlgorithmNoOverlapEcdsa/3 (1, 771)' - PASSED ssl_gtest.sh: #7143: 'Version12Plus/TlsConnectTls12Plus: MisconfiguredCertScheme/0 (0, 772)' - PASSED ssl_gtest.sh: #7144: 'Version12Plus/TlsConnectTls12Plus: MisconfiguredCertScheme/1 (0, 771)' - PASSED ssl_gtest.sh: #7145: 'Version12Plus/TlsConnectTls12Plus: MisconfiguredCertScheme/2 (1, 772)' - PASSED ssl_gtest.sh: #7146: 'Version12Plus/TlsConnectTls12Plus: MisconfiguredCertScheme/3 (1, 771)' - PASSED ssl_gtest.sh: #7147: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: ConnectEcdhePreferenceMismatchHrr/0 (0, 772)' - PASSED ssl_gtest.sh: #7148: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: ConnectEcdhePreferenceMismatchHrr/1 (1, 772)' - PASSED ssl_gtest.sh: #7149: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: SecondClientHelloPreambleMatches/0 (0, 772)' - PASSED ssl_gtest.sh: #7150: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: SecondClientHelloPreambleMatches/1 (1, 772)' - PASSED ssl_gtest.sh: #7151: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: ConnectEcdhePreferenceMismatchHrrExtraShares/0 (0, 772)' - PASSED ssl_gtest.sh: #7152: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: ConnectEcdhePreferenceMismatchHrrExtraShares/1 (1, 772)' - PASSED ssl_gtest.sh: #7153: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: RetryCallbackRetryWithGroupMismatchAndAdditionalShares/0 (0, 772)' - PASSED ssl_gtest.sh: #7154: 'HelloRetryRequestKeyExchangeTests/TlsKeyExchange13: RetryCallbackRetryWithGroupMismatchAndAdditionalShares/1 (1, 772)' - PASSED ssl_gtest.sh: #7155: 'HelloRetryRequestAgentTests/HelloRetryRequestAgentTest: SendSecondHelloRetryRequest/0 (0, 772)' - PASSED ssl_gtest.sh: #7156: 'HelloRetryRequestAgentTests/HelloRetryRequestAgentTest: SendSecondHelloRetryRequest/1 (1, 772)' - PASSED ssl_gtest.sh: #7157: 'HelloRetryRequestAgentTests/HelloRetryRequestAgentTest: HandleBogusHelloRetryRequest/0 (0, 772)' - PASSED ssl_gtest.sh: #7158: 'HelloRetryRequestAgentTests/HelloRetryRequestAgentTest: HandleBogusHelloRetryRequest/1 (1, 772)' - PASSED ssl_gtest.sh: #7159: 'HelloRetryRequestAgentTests/HelloRetryRequestAgentTest: HandleNoopHelloRetryRequest/0 (0, 772)' - PASSED ssl_gtest.sh: #7160: 'HelloRetryRequestAgentTests/HelloRetryRequestAgentTest: HandleNoopHelloRetryRequest/1 (1, 772)' - PASSED ssl_gtest.sh: #7161: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniLength/0 (0, 772)' - PASSED ssl_gtest.sh: #7162: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7163: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniLength/2 (0, 770)' - PASSED ssl_gtest.sh: #7164: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniLength/3 (0, 769)' - PASSED ssl_gtest.sh: #7165: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniHostLength/0 (0, 772)' - PASSED ssl_gtest.sh: #7166: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniHostLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7167: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniHostLength/2 (0, 770)' - PASSED ssl_gtest.sh: #7168: 'ExtensionStream/TlsExtensionTestGeneric: DamageSniHostLength/3 (0, 769)' - PASSED ssl_gtest.sh: #7169: 'ExtensionStream/TlsExtensionTestGeneric: TruncateSni/0 (0, 772)' - PASSED ssl_gtest.sh: #7170: 'ExtensionStream/TlsExtensionTestGeneric: TruncateSni/1 (0, 771)' - PASSED ssl_gtest.sh: #7171: 'ExtensionStream/TlsExtensionTestGeneric: TruncateSni/2 (0, 770)' - PASSED ssl_gtest.sh: #7172: 'ExtensionStream/TlsExtensionTestGeneric: TruncateSni/3 (0, 769)' - PASSED ssl_gtest.sh: #7173: 'ExtensionStream/TlsExtensionTestGeneric: RepeatSni/0 (0, 772)' - PASSED ssl_gtest.sh: #7174: 'ExtensionStream/TlsExtensionTestGeneric: RepeatSni/1 (0, 771)' - PASSED ssl_gtest.sh: #7175: 'ExtensionStream/TlsExtensionTestGeneric: RepeatSni/2 (0, 770)' - PASSED ssl_gtest.sh: #7176: 'ExtensionStream/TlsExtensionTestGeneric: RepeatSni/3 (0, 769)' - PASSED ssl_gtest.sh: #7177: 'ExtensionStream/TlsExtensionTestGeneric: BadSni/0 (0, 772)' - PASSED ssl_gtest.sh: #7178: 'ExtensionStream/TlsExtensionTestGeneric: BadSni/1 (0, 771)' - PASSED ssl_gtest.sh: #7179: 'ExtensionStream/TlsExtensionTestGeneric: BadSni/2 (0, 770)' - PASSED ssl_gtest.sh: #7180: 'ExtensionStream/TlsExtensionTestGeneric: BadSni/3 (0, 769)' - PASSED ssl_gtest.sh: #7181: 'ExtensionStream/TlsExtensionTestGeneric: EmptySni/0 (0, 772)' - PASSED ssl_gtest.sh: #7182: 'ExtensionStream/TlsExtensionTestGeneric: EmptySni/1 (0, 771)' - PASSED ssl_gtest.sh: #7183: 'ExtensionStream/TlsExtensionTestGeneric: EmptySni/2 (0, 770)' - PASSED ssl_gtest.sh: #7184: 'ExtensionStream/TlsExtensionTestGeneric: EmptySni/3 (0, 769)' - PASSED ssl_gtest.sh: #7185: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnExtension/0 (0, 772)' - PASSED ssl_gtest.sh: #7186: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnExtension/1 (0, 771)' - PASSED ssl_gtest.sh: #7187: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnExtension/2 (0, 770)' - PASSED ssl_gtest.sh: #7188: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnExtension/3 (0, 769)' - PASSED ssl_gtest.sh: #7189: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnList/0 (0, 772)' - PASSED ssl_gtest.sh: #7190: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnList/1 (0, 771)' - PASSED ssl_gtest.sh: #7191: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnList/2 (0, 770)' - PASSED ssl_gtest.sh: #7192: 'ExtensionStream/TlsExtensionTestGeneric: EmptyAlpnList/3 (0, 769)' - PASSED ssl_gtest.sh: #7193: 'ExtensionStream/TlsExtensionTestGeneric: OneByteAlpn/0 (0, 772)' - PASSED ssl_gtest.sh: #7194: 'ExtensionStream/TlsExtensionTestGeneric: OneByteAlpn/1 (0, 771)' - PASSED ssl_gtest.sh: #7195: 'ExtensionStream/TlsExtensionTestGeneric: OneByteAlpn/2 (0, 770)' - PASSED ssl_gtest.sh: #7196: 'ExtensionStream/TlsExtensionTestGeneric: OneByteAlpn/3 (0, 769)' - PASSED ssl_gtest.sh: #7197: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMissingValue/0 (0, 772)' - PASSED ssl_gtest.sh: #7198: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMissingValue/1 (0, 771)' - PASSED ssl_gtest.sh: #7199: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMissingValue/2 (0, 770)' - PASSED ssl_gtest.sh: #7200: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMissingValue/3 (0, 769)' - PASSED ssl_gtest.sh: #7201: 'ExtensionStream/TlsExtensionTestGeneric: AlpnZeroLength/0 (0, 772)' - PASSED ssl_gtest.sh: #7202: 'ExtensionStream/TlsExtensionTestGeneric: AlpnZeroLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7203: 'ExtensionStream/TlsExtensionTestGeneric: AlpnZeroLength/2 (0, 770)' - PASSED ssl_gtest.sh: #7204: 'ExtensionStream/TlsExtensionTestGeneric: AlpnZeroLength/3 (0, 769)' - PASSED ssl_gtest.sh: #7205: 'ExtensionStream/TlsExtensionTestGeneric: AlpnLengthOverflow/0 (0, 772)' - PASSED ssl_gtest.sh: #7206: 'ExtensionStream/TlsExtensionTestGeneric: AlpnLengthOverflow/1 (0, 771)' - PASSED ssl_gtest.sh: #7207: 'ExtensionStream/TlsExtensionTestGeneric: AlpnLengthOverflow/2 (0, 770)' - PASSED ssl_gtest.sh: #7208: 'ExtensionStream/TlsExtensionTestGeneric: AlpnLengthOverflow/3 (0, 769)' - PASSED ssl_gtest.sh: #7209: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMismatch/0 (0, 772)' - PASSED ssl_gtest.sh: #7210: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMismatch/1 (0, 771)' - PASSED ssl_gtest.sh: #7211: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMismatch/2 (0, 770)' - PASSED ssl_gtest.sh: #7212: 'ExtensionStream/TlsExtensionTestGeneric: AlpnMismatch/3 (0, 769)' - PASSED ssl_gtest.sh: #7213: 'ExtensionStream/TlsExtensionTestGeneric: AlpnDisabledServer/0 (0, 772)' - PASSED ssl_gtest.sh: #7214: 'ExtensionStream/TlsExtensionTestGeneric: AlpnDisabledServer/1 (0, 771)' - PASSED ssl_gtest.sh: #7215: 'ExtensionStream/TlsExtensionTestGeneric: AlpnDisabledServer/2 (0, 770)' - PASSED ssl_gtest.sh: #7216: 'ExtensionStream/TlsExtensionTestGeneric: AlpnDisabledServer/3 (0, 769)' - PASSED ssl_gtest.sh: #7217: 'ExtensionStream/TlsExtensionTestGeneric: NoSupportedGroups/0 (0, 772)' - PASSED ssl_gtest.sh: #7218: 'ExtensionStream/TlsExtensionTestGeneric: NoSupportedGroups/1 (0, 771)' - PASSED ssl_gtest.sh: #7219: 'ExtensionStream/TlsExtensionTestGeneric: NoSupportedGroups/2 (0, 770)' - PASSED ssl_gtest.sh: #7220: 'ExtensionStream/TlsExtensionTestGeneric: NoSupportedGroups/3 (0, 769)' - PASSED ssl_gtest.sh: #7221: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesShort/0 (0, 772)' - PASSED ssl_gtest.sh: #7222: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesShort/1 (0, 771)' - PASSED ssl_gtest.sh: #7223: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesShort/2 (0, 770)' - PASSED ssl_gtest.sh: #7224: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesShort/3 (0, 769)' - PASSED ssl_gtest.sh: #7225: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesBadLength/0 (0, 772)' - PASSED ssl_gtest.sh: #7226: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesBadLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7227: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesBadLength/2 (0, 770)' - PASSED ssl_gtest.sh: #7228: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesBadLength/3 (0, 769)' - PASSED ssl_gtest.sh: #7229: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesTrailingData/0 (0, 772)' - PASSED ssl_gtest.sh: #7230: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesTrailingData/1 (0, 771)' - PASSED ssl_gtest.sh: #7231: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesTrailingData/2 (0, 770)' - PASSED ssl_gtest.sh: #7232: 'ExtensionStream/TlsExtensionTestGeneric: SupportedCurvesTrailingData/3 (0, 769)' - PASSED ssl_gtest.sh: #7233: 'ExtensionDatagram/TlsExtensionTestGeneric: DamageSniLength/0 (1, 772)' - PASSED ssl_gtest.sh: #7234: 'ExtensionDatagram/TlsExtensionTestGeneric: DamageSniLength/1 (1, 771)' - PASSED ssl_gtest.sh: #7235: 'ExtensionDatagram/TlsExtensionTestGeneric: DamageSniLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7236: 'ExtensionDatagram/TlsExtensionTestGeneric: DamageSniHostLength/0 (1, 772)' - PASSED ssl_gtest.sh: #7237: 'ExtensionDatagram/TlsExtensionTestGeneric: DamageSniHostLength/1 (1, 771)' - PASSED ssl_gtest.sh: #7238: 'ExtensionDatagram/TlsExtensionTestGeneric: DamageSniHostLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7239: 'ExtensionDatagram/TlsExtensionTestGeneric: TruncateSni/0 (1, 772)' - PASSED ssl_gtest.sh: #7240: 'ExtensionDatagram/TlsExtensionTestGeneric: TruncateSni/1 (1, 771)' - PASSED ssl_gtest.sh: #7241: 'ExtensionDatagram/TlsExtensionTestGeneric: TruncateSni/2 (1, 770)' - PASSED ssl_gtest.sh: #7242: 'ExtensionDatagram/TlsExtensionTestGeneric: RepeatSni/0 (1, 772)' - PASSED ssl_gtest.sh: #7243: 'ExtensionDatagram/TlsExtensionTestGeneric: RepeatSni/1 (1, 771)' - PASSED ssl_gtest.sh: #7244: 'ExtensionDatagram/TlsExtensionTestGeneric: RepeatSni/2 (1, 770)' - PASSED ssl_gtest.sh: #7245: 'ExtensionDatagram/TlsExtensionTestGeneric: BadSni/0 (1, 772)' - PASSED ssl_gtest.sh: #7246: 'ExtensionDatagram/TlsExtensionTestGeneric: BadSni/1 (1, 771)' - PASSED ssl_gtest.sh: #7247: 'ExtensionDatagram/TlsExtensionTestGeneric: BadSni/2 (1, 770)' - PASSED ssl_gtest.sh: #7248: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptySni/0 (1, 772)' - PASSED ssl_gtest.sh: #7249: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptySni/1 (1, 771)' - PASSED ssl_gtest.sh: #7250: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptySni/2 (1, 770)' - PASSED ssl_gtest.sh: #7251: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptyAlpnExtension/0 (1, 772)' - PASSED ssl_gtest.sh: #7252: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptyAlpnExtension/1 (1, 771)' - PASSED ssl_gtest.sh: #7253: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptyAlpnExtension/2 (1, 770)' - PASSED ssl_gtest.sh: #7254: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptyAlpnList/0 (1, 772)' - PASSED ssl_gtest.sh: #7255: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptyAlpnList/1 (1, 771)' - PASSED ssl_gtest.sh: #7256: 'ExtensionDatagram/TlsExtensionTestGeneric: EmptyAlpnList/2 (1, 770)' - PASSED ssl_gtest.sh: #7257: 'ExtensionDatagram/TlsExtensionTestGeneric: OneByteAlpn/0 (1, 772)' - PASSED ssl_gtest.sh: #7258: 'ExtensionDatagram/TlsExtensionTestGeneric: OneByteAlpn/1 (1, 771)' - PASSED ssl_gtest.sh: #7259: 'ExtensionDatagram/TlsExtensionTestGeneric: OneByteAlpn/2 (1, 770)' - PASSED ssl_gtest.sh: #7260: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnMissingValue/0 (1, 772)' - PASSED ssl_gtest.sh: #7261: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnMissingValue/1 (1, 771)' - PASSED ssl_gtest.sh: #7262: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnMissingValue/2 (1, 770)' - PASSED ssl_gtest.sh: #7263: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnZeroLength/0 (1, 772)' - PASSED ssl_gtest.sh: #7264: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnZeroLength/1 (1, 771)' - PASSED ssl_gtest.sh: #7265: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnZeroLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7266: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnLengthOverflow/0 (1, 772)' - PASSED ssl_gtest.sh: #7267: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnLengthOverflow/1 (1, 771)' - PASSED ssl_gtest.sh: #7268: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnLengthOverflow/2 (1, 770)' - PASSED ssl_gtest.sh: #7269: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnMismatch/0 (1, 772)' - PASSED ssl_gtest.sh: #7270: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnMismatch/1 (1, 771)' - PASSED ssl_gtest.sh: #7271: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnMismatch/2 (1, 770)' - PASSED ssl_gtest.sh: #7272: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnDisabledServer/0 (1, 772)' - PASSED ssl_gtest.sh: #7273: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnDisabledServer/1 (1, 771)' - PASSED ssl_gtest.sh: #7274: 'ExtensionDatagram/TlsExtensionTestGeneric: AlpnDisabledServer/2 (1, 770)' - PASSED ssl_gtest.sh: #7275: 'ExtensionDatagram/TlsExtensionTestGeneric: NoSupportedGroups/0 (1, 772)' - PASSED ssl_gtest.sh: #7276: 'ExtensionDatagram/TlsExtensionTestGeneric: NoSupportedGroups/1 (1, 771)' - PASSED ssl_gtest.sh: #7277: 'ExtensionDatagram/TlsExtensionTestGeneric: NoSupportedGroups/2 (1, 770)' - PASSED ssl_gtest.sh: #7278: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesShort/0 (1, 772)' - PASSED ssl_gtest.sh: #7279: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesShort/1 (1, 771)' - PASSED ssl_gtest.sh: #7280: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesShort/2 (1, 770)' - PASSED ssl_gtest.sh: #7281: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesBadLength/0 (1, 772)' - PASSED ssl_gtest.sh: #7282: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesBadLength/1 (1, 771)' - PASSED ssl_gtest.sh: #7283: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesBadLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7284: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesTrailingData/0 (1, 772)' - PASSED ssl_gtest.sh: #7285: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesTrailingData/1 (1, 771)' - PASSED ssl_gtest.sh: #7286: 'ExtensionDatagram/TlsExtensionTestGeneric: SupportedCurvesTrailingData/2 (1, 770)' - PASSED ssl_gtest.sh: #7287: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedEmptyList/0 (0, 769)' - PASSED ssl_gtest.sh: #7288: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedEmptyList/1 (0, 770)' - PASSED ssl_gtest.sh: #7289: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedEmptyList/2 (0, 771)' - PASSED ssl_gtest.sh: #7290: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedEmptyName/0 (0, 769)' - PASSED ssl_gtest.sh: #7291: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedEmptyName/1 (0, 770)' - PASSED ssl_gtest.sh: #7292: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedEmptyName/2 (0, 771)' - PASSED ssl_gtest.sh: #7293: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedListTrailingData/0 (0, 769)' - PASSED ssl_gtest.sh: #7294: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedListTrailingData/1 (0, 770)' - PASSED ssl_gtest.sh: #7295: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedListTrailingData/2 (0, 771)' - PASSED ssl_gtest.sh: #7296: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedExtraEntry/0 (0, 769)' - PASSED ssl_gtest.sh: #7297: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedExtraEntry/1 (0, 770)' - PASSED ssl_gtest.sh: #7298: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedExtraEntry/2 (0, 771)' - PASSED ssl_gtest.sh: #7299: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedBadListLength/0 (0, 769)' - PASSED ssl_gtest.sh: #7300: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedBadListLength/1 (0, 770)' - PASSED ssl_gtest.sh: #7301: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedBadListLength/2 (0, 771)' - PASSED ssl_gtest.sh: #7302: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedBadNameLength/0 (0, 769)' - PASSED ssl_gtest.sh: #7303: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedBadNameLength/1 (0, 770)' - PASSED ssl_gtest.sh: #7304: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedBadNameLength/2 (0, 771)' - PASSED ssl_gtest.sh: #7305: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedUnknownName/0 (0, 769)' - PASSED ssl_gtest.sh: #7306: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedUnknownName/1 (0, 770)' - PASSED ssl_gtest.sh: #7307: 'ExtensionPre13Stream/TlsExtensionTestPre13: AlpnReturnedUnknownName/2 (0, 771)' - PASSED ssl_gtest.sh: #7308: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsEmpty/0 (0, 769)' - PASSED ssl_gtest.sh: #7309: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsEmpty/1 (0, 770)' - PASSED ssl_gtest.sh: #7310: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsEmpty/2 (0, 771)' - PASSED ssl_gtest.sh: #7311: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsBadLength/0 (0, 769)' - PASSED ssl_gtest.sh: #7312: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsBadLength/1 (0, 770)' - PASSED ssl_gtest.sh: #7313: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsBadLength/2 (0, 771)' - PASSED ssl_gtest.sh: #7314: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsTrailingData/0 (0, 769)' - PASSED ssl_gtest.sh: #7315: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsTrailingData/1 (0, 770)' - PASSED ssl_gtest.sh: #7316: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsTrailingData/2 (0, 771)' - PASSED ssl_gtest.sh: #7317: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsCompressed/0 (0, 769)' - PASSED ssl_gtest.sh: #7318: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsCompressed/1 (0, 770)' - PASSED ssl_gtest.sh: #7319: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsCompressed/2 (0, 771)' - PASSED ssl_gtest.sh: #7320: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsUndefined/0 (0, 769)' - PASSED ssl_gtest.sh: #7321: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsUndefined/1 (0, 770)' - PASSED ssl_gtest.sh: #7322: 'ExtensionPre13Stream/TlsExtensionTestPre13: SupportedPointsUndefined/2 (0, 771)' - PASSED ssl_gtest.sh: #7323: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoBadLength/0 (0, 769)' - PASSED ssl_gtest.sh: #7324: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoBadLength/1 (0, 770)' - PASSED ssl_gtest.sh: #7325: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoBadLength/2 (0, 771)' - PASSED ssl_gtest.sh: #7326: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoMismatch/0 (0, 769)' - PASSED ssl_gtest.sh: #7327: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoMismatch/1 (0, 770)' - PASSED ssl_gtest.sh: #7328: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoMismatch/2 (0, 771)' - PASSED ssl_gtest.sh: #7329: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoExtensionEmpty/0 (0, 769)' - PASSED ssl_gtest.sh: #7330: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoExtensionEmpty/1 (0, 770)' - PASSED ssl_gtest.sh: #7331: 'ExtensionPre13Stream/TlsExtensionTestPre13: RenegotiationInfoExtensionEmpty/2 (0, 771)' - PASSED ssl_gtest.sh: #7332: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyList/0 (0, 770)' - PASSED ssl_gtest.sh: #7333: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyList/1 (0, 771)' - PASSED ssl_gtest.sh: #7334: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyList/2 (1, 770)' - PASSED ssl_gtest.sh: #7335: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyList/3 (1, 771)' - PASSED ssl_gtest.sh: #7336: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyName/0 (0, 770)' - PASSED ssl_gtest.sh: #7337: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyName/1 (0, 771)' - PASSED ssl_gtest.sh: #7338: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyName/2 (1, 770)' - PASSED ssl_gtest.sh: #7339: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedEmptyName/3 (1, 771)' - PASSED ssl_gtest.sh: #7340: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedListTrailingData/0 (0, 770)' - PASSED ssl_gtest.sh: #7341: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedListTrailingData/1 (0, 771)' - PASSED ssl_gtest.sh: #7342: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedListTrailingData/2 (1, 770)' - PASSED ssl_gtest.sh: #7343: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedListTrailingData/3 (1, 771)' - PASSED ssl_gtest.sh: #7344: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedExtraEntry/0 (0, 770)' - PASSED ssl_gtest.sh: #7345: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedExtraEntry/1 (0, 771)' - PASSED ssl_gtest.sh: #7346: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedExtraEntry/2 (1, 770)' - PASSED ssl_gtest.sh: #7347: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedExtraEntry/3 (1, 771)' - PASSED ssl_gtest.sh: #7348: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadListLength/0 (0, 770)' - PASSED ssl_gtest.sh: #7349: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadListLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7350: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadListLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7351: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadListLength/3 (1, 771)' - PASSED ssl_gtest.sh: #7352: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadNameLength/0 (0, 770)' - PASSED ssl_gtest.sh: #7353: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadNameLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7354: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadNameLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7355: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedBadNameLength/3 (1, 771)' - PASSED ssl_gtest.sh: #7356: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedUnknownName/0 (0, 770)' - PASSED ssl_gtest.sh: #7357: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedUnknownName/1 (0, 771)' - PASSED ssl_gtest.sh: #7358: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedUnknownName/2 (1, 770)' - PASSED ssl_gtest.sh: #7359: 'ExtensionPre13Datagram/TlsExtensionTestPre13: AlpnReturnedUnknownName/3 (1, 771)' - PASSED ssl_gtest.sh: #7360: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsEmpty/0 (0, 770)' - PASSED ssl_gtest.sh: #7361: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsEmpty/1 (0, 771)' - PASSED ssl_gtest.sh: #7362: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsEmpty/2 (1, 770)' - PASSED ssl_gtest.sh: #7363: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsEmpty/3 (1, 771)' - PASSED ssl_gtest.sh: #7364: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsBadLength/0 (0, 770)' - PASSED ssl_gtest.sh: #7365: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsBadLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7366: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsBadLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7367: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsBadLength/3 (1, 771)' - PASSED ssl_gtest.sh: #7368: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsTrailingData/0 (0, 770)' - PASSED ssl_gtest.sh: #7369: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsTrailingData/1 (0, 771)' - PASSED ssl_gtest.sh: #7370: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsTrailingData/2 (1, 770)' - PASSED ssl_gtest.sh: #7371: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsTrailingData/3 (1, 771)' - PASSED ssl_gtest.sh: #7372: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsCompressed/0 (0, 770)' - PASSED ssl_gtest.sh: #7373: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsCompressed/1 (0, 771)' - PASSED ssl_gtest.sh: #7374: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsCompressed/2 (1, 770)' - PASSED ssl_gtest.sh: #7375: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsCompressed/3 (1, 771)' - PASSED ssl_gtest.sh: #7376: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsUndefined/0 (0, 770)' - PASSED ssl_gtest.sh: #7377: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsUndefined/1 (0, 771)' - PASSED ssl_gtest.sh: #7378: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsUndefined/2 (1, 770)' - PASSED ssl_gtest.sh: #7379: 'ExtensionPre13Datagram/TlsExtensionTestPre13: SupportedPointsUndefined/3 (1, 771)' - PASSED ssl_gtest.sh: #7380: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoBadLength/0 (0, 770)' - PASSED ssl_gtest.sh: #7381: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoBadLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7382: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoBadLength/2 (1, 770)' - PASSED ssl_gtest.sh: #7383: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoBadLength/3 (1, 771)' - PASSED ssl_gtest.sh: #7384: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoMismatch/0 (0, 770)' - PASSED ssl_gtest.sh: #7385: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoMismatch/1 (0, 771)' - PASSED ssl_gtest.sh: #7386: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoMismatch/2 (1, 770)' - PASSED ssl_gtest.sh: #7387: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoMismatch/3 (1, 771)' - PASSED ssl_gtest.sh: #7388: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoExtensionEmpty/0 (0, 770)' - PASSED ssl_gtest.sh: #7389: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoExtensionEmpty/1 (0, 771)' - PASSED ssl_gtest.sh: #7390: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoExtensionEmpty/2 (1, 770)' - PASSED ssl_gtest.sh: #7391: 'ExtensionPre13Datagram/TlsExtensionTestPre13: RenegotiationInfoExtensionEmpty/3 (1, 771)' - PASSED ssl_gtest.sh: #7392: 'ExtensionDatagramOnly/TlsExtensionTestDtls: SrtpShort/0 772' - PASSED ssl_gtest.sh: #7393: 'ExtensionDatagramOnly/TlsExtensionTestDtls: SrtpShort/1 771' - PASSED ssl_gtest.sh: #7394: 'ExtensionDatagramOnly/TlsExtensionTestDtls: SrtpShort/2 770' - PASSED ssl_gtest.sh: #7395: 'ExtensionDatagramOnly/TlsExtensionTestDtls: SrtpOdd/0 772' - PASSED ssl_gtest.sh: #7396: 'ExtensionDatagramOnly/TlsExtensionTestDtls: SrtpOdd/1 771' - PASSED ssl_gtest.sh: #7397: 'ExtensionDatagramOnly/TlsExtensionTestDtls: SrtpOdd/2 770' - PASSED ssl_gtest.sh: #7398: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsBadLength/0 (0, 772)' - PASSED ssl_gtest.sh: #7399: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsBadLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7400: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsBadLength/2 (1, 772)' - PASSED ssl_gtest.sh: #7401: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsBadLength/3 (1, 771)' - PASSED ssl_gtest.sh: #7402: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsTrailingData/0 (0, 772)' - PASSED ssl_gtest.sh: #7403: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsTrailingData/1 (0, 771)' - PASSED ssl_gtest.sh: #7404: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsTrailingData/2 (1, 772)' - PASSED ssl_gtest.sh: #7405: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsTrailingData/3 (1, 771)' - PASSED ssl_gtest.sh: #7406: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsEmpty/0 (0, 772)' - PASSED ssl_gtest.sh: #7407: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsEmpty/1 (0, 771)' - PASSED ssl_gtest.sh: #7408: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsEmpty/2 (1, 772)' - PASSED ssl_gtest.sh: #7409: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsEmpty/3 (1, 771)' - PASSED ssl_gtest.sh: #7410: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsNoOverlap/0 (0, 772)' - PASSED ssl_gtest.sh: #7411: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsNoOverlap/1 (0, 771)' - PASSED ssl_gtest.sh: #7412: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsNoOverlap/2 (1, 772)' - PASSED ssl_gtest.sh: #7413: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsNoOverlap/3 (1, 771)' - PASSED ssl_gtest.sh: #7414: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsOddLength/0 (0, 772)' - PASSED ssl_gtest.sh: #7415: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsOddLength/1 (0, 771)' - PASSED ssl_gtest.sh: #7416: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsOddLength/2 (1, 772)' - PASSED ssl_gtest.sh: #7417: 'ExtensionTls12Plus/TlsExtensionTest12Plus: SignatureAlgorithmsOddLength/3 (1, 771)' - PASSED ssl_gtest.sh: #7418: 'ExtensionTls12/TlsExtensionTest12: SupportedCurvesDisableX25519/0 (0, 771)' - PASSED ssl_gtest.sh: #7419: 'ExtensionTls12/TlsExtensionTest12: SupportedCurvesDisableX25519/1 (1, 771)' - PASSED ssl_gtest.sh: #7420: 'ExtensionTls12/TlsExtensionTest12: SignatureAlgorithmConfiguration/0 (0, 771)' - PASSED ssl_gtest.sh: #7421: 'ExtensionTls12/TlsExtensionTest12: SignatureAlgorithmConfiguration/1 (1, 771)' - PASSED ssl_gtest.sh: #7422: 'ExtensionTls12/TlsExtensionTest12: SignatureAlgorithmDisableDSA/0 (0, 771)' - PASSED ssl_gtest.sh: #7423: 'ExtensionTls12/TlsExtensionTest12: SignatureAlgorithmDisableDSA/1 (1, 771)' - PASSED ssl_gtest.sh: #7424: 'ExtensionTls13/TlsExtensionTest13: EmptyClientKeyShare/0 0' - PASSED ssl_gtest.sh: #7425: 'ExtensionTls13/TlsExtensionTest13: EmptyClientKeyShare/1 1' - PASSED ssl_gtest.sh: #7426: 'ExtensionTls13/TlsExtensionTest13: NoKeModesIfResumptionOff/0 0' - PASSED ssl_gtest.sh: #7427: 'ExtensionTls13/TlsExtensionTest13: NoKeModesIfResumptionOff/1 1' - PASSED ssl_gtest.sh: #7428: 'ExtensionTls13/TlsExtensionTest13: RemoveTls13FromVersionList/0 0' - PASSED ssl_gtest.sh: #7429: 'ExtensionTls13/TlsExtensionTest13: RemoveTls13FromVersionList/1 1' - PASSED ssl_gtest.sh: #7430: 'ExtensionTls13/TlsExtensionTest13: RemoveTls13FromVersionListServerV12/0 0' - PASSED ssl_gtest.sh: #7431: 'ExtensionTls13/TlsExtensionTest13: RemoveTls13FromVersionListServerV12/1 1' - PASSED ssl_gtest.sh: #7432: 'ExtensionTls13/TlsExtensionTest13: RemoveTls13FromVersionListBothV12/0 0' - PASSED ssl_gtest.sh: #7433: 'ExtensionTls13/TlsExtensionTest13: RemoveTls13FromVersionListBothV12/1 1' - PASSED ssl_gtest.sh: #7434: 'ExtensionTls13/TlsExtensionTest13: HrrThenRemoveSignatureAlgorithms/0 0' - PASSED ssl_gtest.sh: #7435: 'ExtensionTls13/TlsExtensionTest13: HrrThenRemoveSignatureAlgorithms/1 1' - PASSED ssl_gtest.sh: #7436: 'ExtensionTls13/TlsExtensionTest13: HrrThenRemoveKeyShare/0 0' - PASSED ssl_gtest.sh: #7437: 'ExtensionTls13/TlsExtensionTest13: HrrThenRemoveKeyShare/1 1' - PASSED ssl_gtest.sh: #7438: 'ExtensionTls13/TlsExtensionTest13: HrrThenRemoveSupportedGroups/0 0' - PASSED ssl_gtest.sh: #7439: 'ExtensionTls13/TlsExtensionTest13: HrrThenRemoveSupportedGroups/1 1' - PASSED ssl_gtest.sh: #7440: 'ExtensionTls13/TlsExtensionTest13: EmptyVersionList/0 0' - PASSED ssl_gtest.sh: #7441: 'ExtensionTls13/TlsExtensionTest13: EmptyVersionList/1 1' - PASSED ssl_gtest.sh: #7442: 'ExtensionTls13/TlsExtensionTest13: OddVersionList/0 0' - PASSED ssl_gtest.sh: #7443: 'ExtensionTls13/TlsExtensionTest13: OddVersionList/1 1' - PASSED ssl_gtest.sh: #7444: 'ExtensionTls13/TlsExtensionTest13: SignatureAlgorithmsInvalidTls13/0 0' - PASSED ssl_gtest.sh: #7445: 'ExtensionTls13/TlsExtensionTest13: SignatureAlgorithmsInvalidTls13/1 1' - PASSED ssl_gtest.sh: #7446: 'BogusExtensionStream/TlsBogusExtensionTestPre13: AddBogusExtensionServerHello/0 (0, 769)' - PASSED ssl_gtest.sh: #7447: 'BogusExtensionStream/TlsBogusExtensionTestPre13: AddBogusExtensionServerHello/1 (0, 770)' - PASSED ssl_gtest.sh: #7448: 'BogusExtensionStream/TlsBogusExtensionTestPre13: AddBogusExtensionServerHello/2 (0, 771)' - PASSED ssl_gtest.sh: #7449: 'BogusExtensionDatagram/TlsBogusExtensionTestPre13: AddBogusExtensionServerHello/0 (1, 770)' - PASSED ssl_gtest.sh: #7450: 'BogusExtensionDatagram/TlsBogusExtensionTestPre13: AddBogusExtensionServerHello/1 (1, 771)' - PASSED ssl_gtest.sh: #7451: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionServerHello/0 (0, 772)' - PASSED ssl_gtest.sh: #7452: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionServerHello/1 (1, 772)' - PASSED ssl_gtest.sh: #7453: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionEncryptedExtensions/0 (0, 772)' - PASSED ssl_gtest.sh: #7454: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionEncryptedExtensions/1 (1, 772)' - PASSED ssl_gtest.sh: #7455: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionCertificate/0 (0, 772)' - PASSED ssl_gtest.sh: #7456: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionCertificate/1 (1, 772)' - PASSED ssl_gtest.sh: #7457: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionCertificateRequest/0 (0, 772)' - PASSED ssl_gtest.sh: #7458: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionCertificateRequest/1 (1, 772)' - PASSED ssl_gtest.sh: #7459: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionHelloRetryRequest/0 (0, 772)' - PASSED ssl_gtest.sh: #7460: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionHelloRetryRequest/1 (1, 772)' - PASSED ssl_gtest.sh: #7461: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionNewSessionTicket/0 (0, 772)' - PASSED ssl_gtest.sh: #7462: 'BogusExtension13/TlsBogusExtensionTest13: AddBogusExtensionNewSessionTicket/1 (1, 772)' - PASSED ssl_gtest.sh: #7463: 'DisallowedExtension13/TlsDisallowedExtensionTest13: AddVersionExtensionEncryptedExtensions/0 (0, 772)' - PASSED ssl_gtest.sh: #7464: 'DisallowedExtension13/TlsDisallowedExtensionTest13: AddVersionExtensionEncryptedExtensions/1 (1, 772)' - PASSED ssl_gtest.sh: #7465: 'DisallowedExtension13/TlsDisallowedExtensionTest13: AddVersionExtensionCertificate/0 (0, 772)' - PASSED ssl_gtest.sh: #7466: 'DisallowedExtension13/TlsDisallowedExtensionTest13: AddVersionExtensionCertificate/1 (1, 772)' - PASSED ssl_gtest.sh: #7467: 'DisallowedExtension13/TlsDisallowedExtensionTest13: AddVersionExtensionCertificateRequest/0 (0, 772)' - PASSED ssl_gtest.sh: #7468: 'DisallowedExtension13/TlsDisallowedExtensionTest13: AddVersionExtensionCertificateRequest/1 (1, 772)' - PASSED ssl_gtest.sh: #7469: 'DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13: AddPSKExtensionEncryptedExtensions/0 (0, 772)' - PASSED ssl_gtest.sh: #7470: 'DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13: AddPSKExtensionEncryptedExtensions/1 (1, 772)' - PASSED ssl_gtest.sh: #7471: 'DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13: AddPSKExtensionCertificate/0 (0, 772)' - PASSED ssl_gtest.sh: #7472: 'DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13: AddPSKExtensionCertificate/1 (1, 772)' - PASSED ssl_gtest.sh: #7473: 'DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13: AddPSKExtensionCertificateRequest/0 (0, 772)' - PASSED ssl_gtest.sh: #7474: 'DisallowedUnadvertisedExtension13/TlsDisallowedUnadvertisedExtensionTest13: AddPSKExtensionCertificateRequest/1 (1, 772)' - PASSED ssl_gtest.sh: #7475: 'DatagramPre13/TlsConnectDatagramPre13: DropClientFirstFlightOnce/0 770' - PASSED ssl_gtest.sh: #7476: 'DatagramPre13/TlsConnectDatagramPre13: DropClientFirstFlightOnce/1 771' - PASSED ssl_gtest.sh: #7477: 'DatagramPre13/TlsConnectDatagramPre13: DropServerFirstFlightOnce/0 770' - PASSED ssl_gtest.sh: #7478: 'DatagramPre13/TlsConnectDatagramPre13: DropServerFirstFlightOnce/1 771' - PASSED ssl_gtest.sh: #7479: 'DatagramPre13/TlsConnectDatagramPre13: DropAllFirstTransmissions/0 770' - PASSED ssl_gtest.sh: #7480: 'DatagramPre13/TlsConnectDatagramPre13: DropAllFirstTransmissions/1 771' - PASSED ssl_gtest.sh: #7481: 'DatagramPre13/TlsConnectDatagramPre13: DropServerFirstFlightThrice/0 770' - PASSED ssl_gtest.sh: #7482: 'DatagramPre13/TlsConnectDatagramPre13: DropServerFirstFlightThrice/1 771' - PASSED ssl_gtest.sh: #7483: 'DatagramPre13/TlsConnectDatagramPre13: DropClientSecondFlightOnce/0 770' - PASSED ssl_gtest.sh: #7484: 'DatagramPre13/TlsConnectDatagramPre13: DropClientSecondFlightOnce/1 771' - PASSED ssl_gtest.sh: #7485: 'DatagramPre13/TlsConnectDatagramPre13: DropClientSecondFlightThrice/0 770' - PASSED ssl_gtest.sh: #7486: 'DatagramPre13/TlsConnectDatagramPre13: DropClientSecondFlightThrice/1 771' - PASSED ssl_gtest.sh: #7487: 'DatagramPre13/TlsConnectDatagramPre13: DropServerSecondFlightThrice/0 770' - PASSED ssl_gtest.sh: #7488: 'DatagramPre13/TlsConnectDatagramPre13: DropServerSecondFlightThrice/1 771' - PASSED ssl_gtest.sh: #7489: 'DatagramDrop13/TlsDropDatagram13: DropClientFirstFlightOnce/0 true' - PASSED ssl_gtest.sh: #7490: 'DatagramDrop13/TlsDropDatagram13: DropClientFirstFlightOnce/1 false' - PASSED ssl_gtest.sh: #7491: 'DatagramDrop13/TlsDropDatagram13: DropServerFirstFlightOnce/0 true' - PASSED ssl_gtest.sh: #7492: 'DatagramDrop13/TlsDropDatagram13: DropServerFirstFlightOnce/1 false' - PASSED ssl_gtest.sh: #7493: 'DatagramDrop13/TlsDropDatagram13: DropServerFirstRecordOnce/0 true' - PASSED ssl_gtest.sh: #7494: 'DatagramDrop13/TlsDropDatagram13: DropServerFirstRecordOnce/1 false' - PASSED ssl_gtest.sh: #7495: 'DatagramDrop13/TlsDropDatagram13: DropServerSecondRecordOnce/0 true' - PASSED ssl_gtest.sh: #7496: 'DatagramDrop13/TlsDropDatagram13: DropServerSecondRecordOnce/1 false' - PASSED ssl_gtest.sh: #7497: 'DatagramDrop13/TlsDropDatagram13: DropServerAckOnce/0 true' - PASSED ssl_gtest.sh: #7498: 'DatagramDrop13/TlsDropDatagram13: DropServerAckOnce/1 false' - PASSED ssl_gtest.sh: #7499: 'DatagramDrop13/TlsDropDatagram13: DropClientCertVerify/0 true' - PASSED ssl_gtest.sh: #7500: 'DatagramDrop13/TlsDropDatagram13: DropClientCertVerify/1 false' - PASSED ssl_gtest.sh: #7501: 'DatagramDrop13/TlsDropDatagram13: DropFirstHalfOfServerCertificate/0 true' - PASSED ssl_gtest.sh: #7502: 'DatagramDrop13/TlsDropDatagram13: DropFirstHalfOfServerCertificate/1 false' - PASSED ssl_gtest.sh: #7503: 'DatagramDrop13/TlsDropDatagram13: DropSecondHalfOfServerCertificate/0 true' - PASSED ssl_gtest.sh: #7504: 'DatagramDrop13/TlsDropDatagram13: DropSecondHalfOfServerCertificate/1 false' - PASSED ssl_gtest.sh: #7505: 'DatagramDrop13/TlsDropDatagram13: NoDropsDuringZeroRtt/0 true' - PASSED ssl_gtest.sh: #7506: 'DatagramDrop13/TlsDropDatagram13: NoDropsDuringZeroRtt/1 false' - PASSED ssl_gtest.sh: #7507: 'DatagramDrop13/TlsDropDatagram13: DropEEDuringZeroRtt/0 true' - PASSED ssl_gtest.sh: #7508: 'DatagramDrop13/TlsDropDatagram13: DropEEDuringZeroRtt/1 false' - PASSED ssl_gtest.sh: #7509: 'DatagramDrop13/TlsDropDatagram13: ReorderServerEE/0 true' - PASSED ssl_gtest.sh: #7510: 'DatagramDrop13/TlsDropDatagram13: ReorderServerEE/1 false' - PASSED ssl_gtest.sh: #7511: 'DatagramFragment13/TlsFragmentationAndRecoveryTest: DropFirstHalf/0 true' - PASSED ssl_gtest.sh: #7512: 'DatagramFragment13/TlsFragmentationAndRecoveryTest: DropFirstHalf/1 false' - PASSED ssl_gtest.sh: #7513: 'DatagramFragment13/TlsFragmentationAndRecoveryTest: DropSecondHalf/0 true' - PASSED ssl_gtest.sh: #7514: 'DatagramFragment13/TlsFragmentationAndRecoveryTest: DropSecondHalf/1 false' - PASSED ssl_gtest.sh: #7515: 'DatagramReorder13/TlsReorderDatagram13: ReorderServerCertificate/0 true' - PASSED ssl_gtest.sh: #7516: 'DatagramReorder13/TlsReorderDatagram13: ReorderServerCertificate/1 false' - PASSED ssl_gtest.sh: #7517: 'DatagramReorder13/TlsReorderDatagram13: DataAfterEOEDDuringZeroRtt/0 true' - PASSED ssl_gtest.sh: #7518: 'DatagramReorder13/TlsReorderDatagram13: DataAfterEOEDDuringZeroRtt/1 false' - PASSED ssl_gtest.sh: #7519: 'DatagramReorder13/TlsReorderDatagram13: DataAfterFinDuringZeroRtt/0 true' - PASSED ssl_gtest.sh: #7520: 'DatagramReorder13/TlsReorderDatagram13: DataAfterFinDuringZeroRtt/1 false' - PASSED ssl_gtest.sh: #7521: 'Datagram12Plus/TlsConnectDatagram12Plus: MissAWindow/0 772' - PASSED ssl_gtest.sh: #7522: 'Datagram12Plus/TlsConnectDatagram12Plus: MissAWindow/1 771' - PASSED ssl_gtest.sh: #7523: 'Datagram12Plus/TlsConnectDatagram12Plus: MissAWindowAndOne/0 772' - PASSED ssl_gtest.sh: #7524: 'Datagram12Plus/TlsConnectDatagram12Plus: MissAWindowAndOne/1 771' - PASSED ssl_gtest.sh: #7525: 'DamageYStream/TlsDamageDHYTest: DamageServerY/0 (0, 769, 0, true)' - PASSED ssl_gtest.sh: #7526: 'DamageYStream/TlsDamageDHYTest: DamageServerY/1 (0, 769, 0, false)' - PASSED ssl_gtest.sh: #7527: 'DamageYStream/TlsDamageDHYTest: DamageServerY/2 (0, 769, 1, true)' - PASSED ssl_gtest.sh: #7528: 'DamageYStream/TlsDamageDHYTest: DamageServerY/3 (0, 769, 1, false)' - PASSED ssl_gtest.sh: #7529: 'DamageYStream/TlsDamageDHYTest: DamageServerY/4 (0, 769, 2, true)' - PASSED ssl_gtest.sh: #7530: 'DamageYStream/TlsDamageDHYTest: DamageServerY/5 (0, 769, 2, false)' - PASSED ssl_gtest.sh: #7531: 'DamageYStream/TlsDamageDHYTest: DamageServerY/6 (0, 769, 3, true)' - PASSED ssl_gtest.sh: #7532: 'DamageYStream/TlsDamageDHYTest: DamageServerY/7 (0, 769, 3, false)' - PASSED ssl_gtest.sh: #7533: 'DamageYStream/TlsDamageDHYTest: DamageServerY/8 (0, 769, 4, true)' - PASSED ssl_gtest.sh: #7534: 'DamageYStream/TlsDamageDHYTest: DamageServerY/9 (0, 769, 4, false)' - PASSED ssl_gtest.sh: #7535: 'DamageYStream/TlsDamageDHYTest: DamageServerY/10 (0, 769, 5, true)' - PASSED ssl_gtest.sh: #7536: 'DamageYStream/TlsDamageDHYTest: DamageServerY/11 (0, 769, 5, false)' - PASSED ssl_gtest.sh: #7537: 'DamageYStream/TlsDamageDHYTest: DamageServerY/12 (0, 770, 0, true)' - PASSED ssl_gtest.sh: #7538: 'DamageYStream/TlsDamageDHYTest: DamageServerY/13 (0, 770, 0, false)' - PASSED ssl_gtest.sh: #7539: 'DamageYStream/TlsDamageDHYTest: DamageServerY/14 (0, 770, 1, true)' - PASSED ssl_gtest.sh: #7540: 'DamageYStream/TlsDamageDHYTest: DamageServerY/15 (0, 770, 1, false)' - PASSED ssl_gtest.sh: #7541: 'DamageYStream/TlsDamageDHYTest: DamageServerY/16 (0, 770, 2, true)' - PASSED ssl_gtest.sh: #7542: 'DamageYStream/TlsDamageDHYTest: DamageServerY/17 (0, 770, 2, false)' - PASSED ssl_gtest.sh: #7543: 'DamageYStream/TlsDamageDHYTest: DamageServerY/18 (0, 770, 3, true)' - PASSED ssl_gtest.sh: #7544: 'DamageYStream/TlsDamageDHYTest: DamageServerY/19 (0, 770, 3, false)' - PASSED ssl_gtest.sh: #7545: 'DamageYStream/TlsDamageDHYTest: DamageServerY/20 (0, 770, 4, true)' - PASSED ssl_gtest.sh: #7546: 'DamageYStream/TlsDamageDHYTest: DamageServerY/21 (0, 770, 4, false)' - PASSED ssl_gtest.sh: #7547: 'DamageYStream/TlsDamageDHYTest: DamageServerY/22 (0, 770, 5, true)' - PASSED ssl_gtest.sh: #7548: 'DamageYStream/TlsDamageDHYTest: DamageServerY/23 (0, 770, 5, false)' - PASSED ssl_gtest.sh: #7549: 'DamageYStream/TlsDamageDHYTest: DamageServerY/24 (0, 771, 0, true)' - PASSED ssl_gtest.sh: #7550: 'DamageYStream/TlsDamageDHYTest: DamageServerY/25 (0, 771, 0, false)' - PASSED ssl_gtest.sh: #7551: 'DamageYStream/TlsDamageDHYTest: DamageServerY/26 (0, 771, 1, true)' - PASSED ssl_gtest.sh: #7552: 'DamageYStream/TlsDamageDHYTest: DamageServerY/27 (0, 771, 1, false)' - PASSED ssl_gtest.sh: #7553: 'DamageYStream/TlsDamageDHYTest: DamageServerY/28 (0, 771, 2, true)' - PASSED ssl_gtest.sh: #7554: 'DamageYStream/TlsDamageDHYTest: DamageServerY/29 (0, 771, 2, false)' - PASSED ssl_gtest.sh: #7555: 'DamageYStream/TlsDamageDHYTest: DamageServerY/30 (0, 771, 3, true)' - PASSED ssl_gtest.sh: #7556: 'DamageYStream/TlsDamageDHYTest: DamageServerY/31 (0, 771, 3, false)' - PASSED ssl_gtest.sh: #7557: 'DamageYStream/TlsDamageDHYTest: DamageServerY/32 (0, 771, 4, true)' - PASSED ssl_gtest.sh: #7558: 'DamageYStream/TlsDamageDHYTest: DamageServerY/33 (0, 771, 4, false)' - PASSED ssl_gtest.sh: #7559: 'DamageYStream/TlsDamageDHYTest: DamageServerY/34 (0, 771, 5, true)' - PASSED ssl_gtest.sh: #7560: 'DamageYStream/TlsDamageDHYTest: DamageServerY/35 (0, 771, 5, false)' - PASSED ssl_gtest.sh: #7561: 'DamageYStream/TlsDamageDHYTest: DamageClientY/0 (0, 769, 0, true)' - PASSED ssl_gtest.sh: #7562: 'DamageYStream/TlsDamageDHYTest: DamageClientY/1 (0, 769, 0, false)' - PASSED ssl_gtest.sh: #7563: 'DamageYStream/TlsDamageDHYTest: DamageClientY/2 (0, 769, 1, true)' - PASSED ssl_gtest.sh: #7564: 'DamageYStream/TlsDamageDHYTest: DamageClientY/3 (0, 769, 1, false)' - PASSED ssl_gtest.sh: #7565: 'DamageYStream/TlsDamageDHYTest: DamageClientY/4 (0, 769, 2, true)' - PASSED ssl_gtest.sh: #7566: 'DamageYStream/TlsDamageDHYTest: DamageClientY/5 (0, 769, 2, false)' - PASSED ssl_gtest.sh: #7567: 'DamageYStream/TlsDamageDHYTest: DamageClientY/6 (0, 769, 3, true)' - PASSED ssl_gtest.sh: #7568: 'DamageYStream/TlsDamageDHYTest: DamageClientY/7 (0, 769, 3, false)' - PASSED ssl_gtest.sh: #7569: 'DamageYStream/TlsDamageDHYTest: DamageClientY/8 (0, 769, 4, true)' - PASSED ssl_gtest.sh: #7570: 'DamageYStream/TlsDamageDHYTest: DamageClientY/9 (0, 769, 4, false)' - PASSED ssl_gtest.sh: #7571: 'DamageYStream/TlsDamageDHYTest: DamageClientY/10 (0, 769, 5, true)' - PASSED ssl_gtest.sh: #7572: 'DamageYStream/TlsDamageDHYTest: DamageClientY/11 (0, 769, 5, false)' - PASSED ssl_gtest.sh: #7573: 'DamageYStream/TlsDamageDHYTest: DamageClientY/12 (0, 770, 0, true)' - PASSED ssl_gtest.sh: #7574: 'DamageYStream/TlsDamageDHYTest: DamageClientY/13 (0, 770, 0, false)' - PASSED ssl_gtest.sh: #7575: 'DamageYStream/TlsDamageDHYTest: DamageClientY/14 (0, 770, 1, true)' - PASSED ssl_gtest.sh: #7576: 'DamageYStream/TlsDamageDHYTest: DamageClientY/15 (0, 770, 1, false)' - PASSED ssl_gtest.sh: #7577: 'DamageYStream/TlsDamageDHYTest: DamageClientY/16 (0, 770, 2, true)' - PASSED ssl_gtest.sh: #7578: 'DamageYStream/TlsDamageDHYTest: DamageClientY/17 (0, 770, 2, false)' - PASSED ssl_gtest.sh: #7579: 'DamageYStream/TlsDamageDHYTest: DamageClientY/18 (0, 770, 3, true)' - PASSED ssl_gtest.sh: #7580: 'DamageYStream/TlsDamageDHYTest: DamageClientY/19 (0, 770, 3, false)' - PASSED ssl_gtest.sh: #7581: 'DamageYStream/TlsDamageDHYTest: DamageClientY/20 (0, 770, 4, true)' - PASSED ssl_gtest.sh: #7582: 'DamageYStream/TlsDamageDHYTest: DamageClientY/21 (0, 770, 4, false)' - PASSED ssl_gtest.sh: #7583: 'DamageYStream/TlsDamageDHYTest: DamageClientY/22 (0, 770, 5, true)' - PASSED ssl_gtest.sh: #7584: 'DamageYStream/TlsDamageDHYTest: DamageClientY/23 (0, 770, 5, false)' - PASSED ssl_gtest.sh: #7585: 'DamageYStream/TlsDamageDHYTest: DamageClientY/24 (0, 771, 0, true)' - PASSED ssl_gtest.sh: #7586: 'DamageYStream/TlsDamageDHYTest: DamageClientY/25 (0, 771, 0, false)' - PASSED ssl_gtest.sh: #7587: 'DamageYStream/TlsDamageDHYTest: DamageClientY/26 (0, 771, 1, true)' - PASSED ssl_gtest.sh: #7588: 'DamageYStream/TlsDamageDHYTest: DamageClientY/27 (0, 771, 1, false)' - PASSED ssl_gtest.sh: #7589: 'DamageYStream/TlsDamageDHYTest: DamageClientY/28 (0, 771, 2, true)' - PASSED ssl_gtest.sh: #7590: 'DamageYStream/TlsDamageDHYTest: DamageClientY/29 (0, 771, 2, false)' - PASSED ssl_gtest.sh: #7591: 'DamageYStream/TlsDamageDHYTest: DamageClientY/30 (0, 771, 3, true)' - PASSED ssl_gtest.sh: #7592: 'DamageYStream/TlsDamageDHYTest: DamageClientY/31 (0, 771, 3, false)' - PASSED ssl_gtest.sh: #7593: 'DamageYStream/TlsDamageDHYTest: DamageClientY/32 (0, 771, 4, true)' - PASSED ssl_gtest.sh: #7594: 'DamageYStream/TlsDamageDHYTest: DamageClientY/33 (0, 771, 4, false)' - PASSED ssl_gtest.sh: #7595: 'DamageYStream/TlsDamageDHYTest: DamageClientY/34 (0, 771, 5, true)' - PASSED ssl_gtest.sh: #7596: 'DamageYStream/TlsDamageDHYTest: DamageClientY/35 (0, 771, 5, false)' - PASSED ssl_gtest.sh: #7597: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/0 (1, 770, 0, true)' - PASSED ssl_gtest.sh: #7598: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/1 (1, 770, 0, false)' - PASSED ssl_gtest.sh: #7599: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/2 (1, 770, 1, true)' - PASSED ssl_gtest.sh: #7600: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/3 (1, 770, 1, false)' - PASSED ssl_gtest.sh: #7601: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/4 (1, 770, 2, true)' - PASSED ssl_gtest.sh: #7602: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/5 (1, 770, 2, false)' - PASSED ssl_gtest.sh: #7603: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/6 (1, 770, 3, true)' - PASSED ssl_gtest.sh: #7604: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/7 (1, 770, 3, false)' - PASSED ssl_gtest.sh: #7605: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/8 (1, 770, 4, true)' - PASSED ssl_gtest.sh: #7606: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/9 (1, 770, 4, false)' - PASSED ssl_gtest.sh: #7607: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/10 (1, 770, 5, true)' - PASSED ssl_gtest.sh: #7608: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/11 (1, 770, 5, false)' - PASSED ssl_gtest.sh: #7609: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/12 (1, 771, 0, true)' - PASSED ssl_gtest.sh: #7610: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/13 (1, 771, 0, false)' - PASSED ssl_gtest.sh: #7611: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/14 (1, 771, 1, true)' - PASSED ssl_gtest.sh: #7612: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/15 (1, 771, 1, false)' - PASSED ssl_gtest.sh: #7613: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/16 (1, 771, 2, true)' - PASSED ssl_gtest.sh: #7614: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/17 (1, 771, 2, false)' - PASSED ssl_gtest.sh: #7615: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/18 (1, 771, 3, true)' - PASSED ssl_gtest.sh: #7616: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/19 (1, 771, 3, false)' - PASSED ssl_gtest.sh: #7617: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/20 (1, 771, 4, true)' - PASSED ssl_gtest.sh: #7618: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/21 (1, 771, 4, false)' - PASSED ssl_gtest.sh: #7619: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/22 (1, 771, 5, true)' - PASSED ssl_gtest.sh: #7620: 'DamageYDatagram/TlsDamageDHYTest: DamageServerY/23 (1, 771, 5, false)' - PASSED ssl_gtest.sh: #7621: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/0 (1, 770, 0, true)' - PASSED ssl_gtest.sh: #7622: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/1 (1, 770, 0, false)' - PASSED ssl_gtest.sh: #7623: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/2 (1, 770, 1, true)' - PASSED ssl_gtest.sh: #7624: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/3 (1, 770, 1, false)' - PASSED ssl_gtest.sh: #7625: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/4 (1, 770, 2, true)' - PASSED ssl_gtest.sh: #7626: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/5 (1, 770, 2, false)' - PASSED ssl_gtest.sh: #7627: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/6 (1, 770, 3, true)' - PASSED ssl_gtest.sh: #7628: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/7 (1, 770, 3, false)' - PASSED ssl_gtest.sh: #7629: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/8 (1, 770, 4, true)' - PASSED ssl_gtest.sh: #7630: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/9 (1, 770, 4, false)' - PASSED ssl_gtest.sh: #7631: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/10 (1, 770, 5, true)' - PASSED ssl_gtest.sh: #7632: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/11 (1, 770, 5, false)' - PASSED ssl_gtest.sh: #7633: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/12 (1, 771, 0, true)' - PASSED ssl_gtest.sh: #7634: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/13 (1, 771, 0, false)' - PASSED ssl_gtest.sh: #7635: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/14 (1, 771, 1, true)' - PASSED ssl_gtest.sh: #7636: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/15 (1, 771, 1, false)' - PASSED ssl_gtest.sh: #7637: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/16 (1, 771, 2, true)' - PASSED ssl_gtest.sh: #7638: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/17 (1, 771, 2, false)' - PASSED ssl_gtest.sh: #7639: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/18 (1, 771, 3, true)' - PASSED ssl_gtest.sh: #7640: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/19 (1, 771, 3, false)' - PASSED ssl_gtest.sh: #7641: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/20 (1, 771, 4, true)' - PASSED ssl_gtest.sh: #7642: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/21 (1, 771, 4, false)' - PASSED ssl_gtest.sh: #7643: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/22 (1, 771, 5, true)' - PASSED ssl_gtest.sh: #7644: 'DamageYDatagram/TlsDamageDHYTest: DamageClientY/23 (1, 771, 5, false)' - PASSED ssl_gtest.sh: #7645: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7646: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7647: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7648: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7649: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7650: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7651: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/6 (0, 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7652: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/7 (0, 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7653: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/8 (0, 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7654: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/9 (0, 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7655: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/10 (0, 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7656: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/11 (0, 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7657: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/12 (0, 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7658: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/13 (0, 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7659: 'CipherSuiteRC4/TlsCipherSuiteTest: SingleCipherSuite/14 (0, 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7660: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7661: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7662: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/2 (0, 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7663: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/3 (0, 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7664: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7665: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7666: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/6 (0, 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7667: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/7 (0, 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7668: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/8 (0, 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7669: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/9 (0, 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7670: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/10 (0, 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7671: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/11 (0, 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7672: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/12 (0, 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7673: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/13 (0, 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7674: 'CipherSuiteRC4/TlsCipherSuiteTest: ResumeCipherSuite/14 (0, 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7675: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/0 (0, 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7676: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/1 (0, 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7677: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/2 (0, 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7678: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/3 (0, 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7679: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/4 (0, 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7680: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/5 (0, 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7681: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/6 (0, 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7682: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/7 (0, 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7683: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/8 (0, 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7684: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/9 (0, 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7685: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/10 (0, 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7686: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/11 (0, 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7687: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/12 (0, 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7688: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/13 (0, 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7689: 'CipherSuiteRC4/TlsCipherSuiteTest: ReadLimit/14 (0, 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7690: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/0 (0, 769, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7691: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/1 (0, 769, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7692: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/2 (0, 769, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7693: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/3 (0, 769, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7694: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/4 (0, 769, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7695: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/5 (0, 770, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7696: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/6 (0, 770, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7697: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/7 (0, 770, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7698: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/8 (0, 770, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7699: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/9 (0, 770, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7700: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/10 (0, 771, 5, 65537, 0)' - PASSED ssl_gtest.sh: #7701: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/11 (0, 771, 49154, 65537, 0)' - PASSED ssl_gtest.sh: #7702: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/12 (0, 771, 49159, 65537, 0)' - PASSED ssl_gtest.sh: #7703: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/13 (0, 771, 49164, 65537, 0)' - PASSED ssl_gtest.sh: #7704: 'CipherSuiteRC4/TlsCipherSuiteTest: WriteLimit/14 (0, 771, 49169, 65537, 0)' - PASSED ssl_gtest.sh: #7705: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7706: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7707: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #7708: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #7709: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7710: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7711: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/6 (1, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7712: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/7 (1, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7713: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/8 (1, 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #7714: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/9 (1, 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #7715: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/10 (1, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7716: 'CipherSuiteAEAD12/TlsCipherSuiteTest: SingleCipherSuite/11 (1, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7717: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7718: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7719: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7720: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7721: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/6 (1, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7722: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/7 (1, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7723: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/10 (1, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7724: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ResumeCipherSuite/11 (1, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7725: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/0 (0, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7726: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/1 (0, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7727: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/2 (0, 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #7728: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/3 (0, 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #7729: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/4 (0, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7730: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/5 (0, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7731: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/6 (1, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7732: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/7 (1, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7733: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/8 (1, 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #7734: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/9 (1, 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #7735: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/10 (1, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7736: 'CipherSuiteAEAD12/TlsCipherSuiteTest: ReadLimit/11 (1, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7737: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/0 (0, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7738: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/1 (0, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7739: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/2 (0, 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #7740: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/3 (0, 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #7741: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/4 (0, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7742: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/5 (0, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7743: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/6 (1, 771, 156, 65537, 0)' - PASSED ssl_gtest.sh: #7744: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/7 (1, 771, 157, 65537, 0)' - PASSED ssl_gtest.sh: #7745: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/8 (1, 771, 162, 65537, 0)' - PASSED ssl_gtest.sh: #7746: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/9 (1, 771, 163, 65537, 0)' - PASSED ssl_gtest.sh: #7747: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/10 (1, 771, 49188, 65537, 0)' - PASSED ssl_gtest.sh: #7748: 'CipherSuiteAEAD12/TlsCipherSuiteTest: WriteLimit/11 (1, 771, 49192, 65537, 0)' - PASSED ssl_gtest.sh: #7749: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7750: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7751: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7752: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7753: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7754: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7755: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/6 (0, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7756: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/7 (0, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7757: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/8 (0, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7758: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/9 (1, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7759: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/10 (1, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7760: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/11 (1, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7761: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/12 (1, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7762: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/13 (1, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7763: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/14 (1, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7764: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/15 (1, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7765: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/16 (1, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7766: 'CipherSuiteAEAD/TlsCipherSuiteTest: SingleCipherSuite/17 (1, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7767: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7768: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7769: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/2 (0, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7770: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/3 (0, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7771: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7772: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7773: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/6 (0, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7774: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/7 (0, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7775: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/8 (0, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7776: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/9 (1, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7777: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/10 (1, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7778: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/11 (1, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7779: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/12 (1, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7780: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/13 (1, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7781: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/14 (1, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7782: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/15 (1, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7783: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/16 (1, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7784: 'CipherSuiteAEAD/TlsCipherSuiteTest: ResumeCipherSuite/17 (1, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7785: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/0 (0, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7786: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/1 (0, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7787: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/2 (0, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7788: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/3 (0, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7789: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/4 (0, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7790: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/5 (0, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7791: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/6 (0, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7792: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/7 (0, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7793: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/8 (0, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7794: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/9 (1, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7795: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/10 (1, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7796: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/11 (1, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7797: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/12 (1, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7798: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/13 (1, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7799: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/14 (1, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7800: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/15 (1, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7801: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/16 (1, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7802: 'CipherSuiteAEAD/TlsCipherSuiteTest: ReadLimit/17 (1, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7803: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/0 (0, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7804: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/1 (0, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7805: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/2 (0, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7806: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/3 (0, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7807: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/4 (0, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7808: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/5 (0, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7809: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/6 (0, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7810: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/7 (0, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7811: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/8 (0, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7812: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/9 (1, 771, 49195, 65537, 0)' - PASSED ssl_gtest.sh: #7813: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/10 (1, 771, 49196, 65537, 0)' - PASSED ssl_gtest.sh: #7814: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/11 (1, 771, 49199, 65537, 0)' - PASSED ssl_gtest.sh: #7815: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/12 (1, 771, 49200, 65537, 0)' - PASSED ssl_gtest.sh: #7816: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/13 (1, 771, 158, 65537, 0)' - PASSED ssl_gtest.sh: #7817: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/14 (1, 771, 159, 65537, 0)' - PASSED ssl_gtest.sh: #7818: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/15 (1, 771, 52393, 65537, 0)' - PASSED ssl_gtest.sh: #7819: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/16 (1, 771, 52392, 65537, 0)' - PASSED ssl_gtest.sh: #7820: 'CipherSuiteAEAD/TlsCipherSuiteTest: WriteLimit/17 (1, 771, 52394, 65537, 0)' - PASSED ssl_gtest.sh: #7821: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7822: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7823: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7824: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7825: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7826: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7827: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/6 (0, 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #7828: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/7 (0, 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #7829: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/8 (1, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7830: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/9 (1, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7831: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/10 (1, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7832: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/11 (1, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7833: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/12 (1, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7834: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/13 (1, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7835: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/14 (1, 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #7836: 'CipherSuiteCBC12/TlsCipherSuiteTest: SingleCipherSuite/15 (1, 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #7837: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7838: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7839: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/2 (0, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7840: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/3 (0, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7841: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7842: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7843: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/8 (1, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7844: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/9 (1, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7845: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/10 (1, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7846: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/11 (1, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7847: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/12 (1, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7848: 'CipherSuiteCBC12/TlsCipherSuiteTest: ResumeCipherSuite/13 (1, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7849: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/0 (0, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7850: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/1 (0, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7851: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/2 (0, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7852: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/3 (0, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7853: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/4 (0, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7854: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/5 (0, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7855: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/6 (0, 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #7856: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/7 (0, 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #7857: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/8 (1, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7858: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/9 (1, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7859: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/10 (1, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7860: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/11 (1, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7861: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/12 (1, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7862: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/13 (1, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7863: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/14 (1, 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #7864: 'CipherSuiteCBC12/TlsCipherSuiteTest: ReadLimit/15 (1, 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #7865: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/0 (0, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7866: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/1 (0, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7867: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/2 (0, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7868: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/3 (0, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7869: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/4 (0, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7870: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/5 (0, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7871: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/6 (0, 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #7872: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/7 (0, 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #7873: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/8 (1, 771, 107, 65537, 0)' - PASSED ssl_gtest.sh: #7874: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/9 (1, 771, 61, 65537, 0)' - PASSED ssl_gtest.sh: #7875: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/10 (1, 771, 49187, 65537, 0)' - PASSED ssl_gtest.sh: #7876: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/11 (1, 771, 49191, 65537, 0)' - PASSED ssl_gtest.sh: #7877: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/12 (1, 771, 103, 65537, 0)' - PASSED ssl_gtest.sh: #7878: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/13 (1, 771, 60, 65537, 0)' - PASSED ssl_gtest.sh: #7879: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/14 (1, 771, 64, 65537, 0)' - PASSED ssl_gtest.sh: #7880: 'CipherSuiteCBC12/TlsCipherSuiteTest: WriteLimit/15 (1, 771, 106, 65537, 0)' - PASSED ssl_gtest.sh: #7881: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7882: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7883: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7884: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7885: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7886: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7887: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/6 (0, 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #7888: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/7 (0, 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #7889: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/8 (0, 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #7890: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/9 (0, 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #7891: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/10 (0, 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #7892: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/11 (0, 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #7893: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/12 (0, 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #7894: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/13 (0, 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #7895: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/14 (0, 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #7896: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/15 (0, 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #7897: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/16 (0, 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7898: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/17 (0, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7899: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/18 (0, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7900: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/19 (0, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7901: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/20 (0, 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7902: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/21 (0, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7903: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/22 (0, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #7904: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/23 (0, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #7905: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/24 (0, 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #7906: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/25 (0, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #7907: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/26 (0, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #7908: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/27 (0, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #7909: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/28 (0, 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #7910: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/29 (0, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #7911: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/30 (0, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #7912: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/31 (0, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #7913: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/32 (0, 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7914: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/33 (0, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7915: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/34 (0, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7916: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/35 (0, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7917: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/36 (0, 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7918: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/37 (0, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7919: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/38 (0, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #7920: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/39 (0, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #7921: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/40 (0, 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #7922: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/41 (0, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #7923: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/42 (0, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #7924: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/43 (0, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #7925: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/44 (0, 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #7926: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/45 (0, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #7927: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/46 (0, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #7928: 'CipherSuiteCBCStream/TlsCipherSuiteTest: SingleCipherSuite/47 (0, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #7929: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7930: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7931: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/2 (0, 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7932: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/3 (0, 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7933: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7934: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7935: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/6 (0, 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #7936: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/7 (0, 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #7937: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/8 (0, 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #7938: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/9 (0, 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #7939: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/10 (0, 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #7940: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/11 (0, 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #7941: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/12 (0, 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #7942: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/13 (0, 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #7943: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/14 (0, 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #7944: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/15 (0, 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #7945: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/16 (0, 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7946: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/17 (0, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7947: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/18 (0, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7948: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/19 (0, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7949: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/20 (0, 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7950: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/21 (0, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7951: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/22 (0, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #7952: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/23 (0, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #7953: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/24 (0, 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #7954: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/25 (0, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #7955: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/26 (0, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #7956: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/27 (0, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #7957: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/28 (0, 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #7958: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/29 (0, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #7959: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/30 (0, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #7960: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/31 (0, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #7961: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/32 (0, 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7962: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/33 (0, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7963: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/34 (0, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7964: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/35 (0, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7965: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/36 (0, 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7966: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/37 (0, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7967: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/38 (0, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #7968: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/39 (0, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #7969: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/40 (0, 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #7970: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/41 (0, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #7971: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/42 (0, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #7972: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/43 (0, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #7973: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/44 (0, 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #7974: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/45 (0, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #7975: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/46 (0, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #7976: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ResumeCipherSuite/47 (0, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #7977: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/0 (0, 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7978: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/1 (0, 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7979: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/2 (0, 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7980: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/3 (0, 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7981: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/4 (0, 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7982: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/5 (0, 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7983: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/6 (0, 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #7984: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/7 (0, 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #7985: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/8 (0, 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #7986: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/9 (0, 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #7987: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/10 (0, 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #7988: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/11 (0, 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #7989: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/12 (0, 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #7990: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/13 (0, 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #7991: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/14 (0, 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #7992: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/15 (0, 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #7993: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/16 (0, 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #7994: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/17 (0, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #7995: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/18 (0, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #7996: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/19 (0, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #7997: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/20 (0, 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #7998: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/21 (0, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #7999: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/22 (0, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8000: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/23 (0, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8001: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/24 (0, 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #8002: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/25 (0, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8003: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/26 (0, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8004: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/27 (0, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8005: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/28 (0, 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #8006: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/29 (0, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8007: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/30 (0, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8008: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/31 (0, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8009: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/32 (0, 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #8010: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/33 (0, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8011: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/34 (0, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8012: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/35 (0, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8013: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/36 (0, 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #8014: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/37 (0, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8015: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/38 (0, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8016: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/39 (0, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8017: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/40 (0, 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #8018: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/41 (0, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8019: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/42 (0, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8020: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/43 (0, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8021: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/44 (0, 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #8022: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/45 (0, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8023: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/46 (0, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8024: 'CipherSuiteCBCStream/TlsCipherSuiteTest: ReadLimit/47 (0, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8025: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/0 (0, 769, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #8026: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/1 (0, 769, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8027: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/2 (0, 769, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8028: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/3 (0, 769, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8029: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/4 (0, 769, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #8030: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/5 (0, 769, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8031: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/6 (0, 769, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8032: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/7 (0, 769, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8033: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/8 (0, 769, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #8034: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/9 (0, 769, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8035: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/10 (0, 769, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8036: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/11 (0, 769, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8037: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/12 (0, 769, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #8038: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/13 (0, 769, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8039: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/14 (0, 769, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8040: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/15 (0, 769, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8041: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/16 (0, 770, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #8042: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/17 (0, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8043: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/18 (0, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8044: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/19 (0, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8045: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/20 (0, 770, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #8046: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/21 (0, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8047: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/22 (0, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8048: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/23 (0, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8049: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/24 (0, 770, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #8050: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/25 (0, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8051: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/26 (0, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8052: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/27 (0, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8053: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/28 (0, 770, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #8054: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/29 (0, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8055: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/30 (0, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8056: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/31 (0, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8057: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/32 (0, 771, 49153, 65537, 0)' - PASSED ssl_gtest.sh: #8058: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/33 (0, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8059: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/34 (0, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8060: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/35 (0, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8061: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/36 (0, 771, 49158, 65537, 0)' - PASSED ssl_gtest.sh: #8062: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/37 (0, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8063: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/38 (0, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8064: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/39 (0, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8065: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/40 (0, 771, 49163, 65537, 0)' - PASSED ssl_gtest.sh: #8066: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/41 (0, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8067: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/42 (0, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8068: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/43 (0, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8069: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/44 (0, 771, 49168, 65537, 0)' - PASSED ssl_gtest.sh: #8070: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/45 (0, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8071: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/46 (0, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8072: 'CipherSuiteCBCStream/TlsCipherSuiteTest: WriteLimit/47 (0, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8073: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/0 (1, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8074: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/1 (1, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8075: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/2 (1, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8076: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/3 (1, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8077: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/4 (1, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8078: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/5 (1, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8079: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/6 (1, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8080: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/7 (1, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8081: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/8 (1, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8082: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/9 (1, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8083: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/10 (1, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8084: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/11 (1, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8085: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/12 (1, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8086: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/13 (1, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8087: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/14 (1, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8088: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/15 (1, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8089: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/16 (1, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8090: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/17 (1, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8091: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/18 (1, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8092: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/19 (1, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8093: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/20 (1, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8094: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/21 (1, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8095: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/22 (1, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8096: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: SingleCipherSuite/23 (1, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8097: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/0 (1, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8098: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/1 (1, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8099: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/2 (1, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8100: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/3 (1, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8101: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/4 (1, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8102: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/5 (1, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8103: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/6 (1, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8104: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/7 (1, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8105: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/8 (1, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8106: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/9 (1, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8107: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/10 (1, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8108: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/11 (1, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8109: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/12 (1, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8110: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/13 (1, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8111: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/14 (1, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8112: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/15 (1, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8113: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/16 (1, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8114: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/17 (1, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8115: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/18 (1, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8116: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/19 (1, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8117: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/20 (1, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8118: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/21 (1, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8119: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/22 (1, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8120: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ResumeCipherSuite/23 (1, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8121: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/0 (1, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8122: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/1 (1, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8123: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/2 (1, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8124: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/3 (1, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8125: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/4 (1, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8126: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/5 (1, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8127: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/6 (1, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8128: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/7 (1, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8129: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/8 (1, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8130: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/9 (1, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8131: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/10 (1, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8132: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/11 (1, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8133: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/12 (1, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8134: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/13 (1, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8135: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/14 (1, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8136: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/15 (1, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8137: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/16 (1, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8138: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/17 (1, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8139: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/18 (1, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8140: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/19 (1, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8141: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/20 (1, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8142: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/21 (1, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8143: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/22 (1, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8144: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: ReadLimit/23 (1, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8145: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/0 (1, 770, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8146: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/1 (1, 770, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8147: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/2 (1, 770, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8148: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/3 (1, 770, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8149: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/4 (1, 770, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8150: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/5 (1, 770, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8151: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/6 (1, 770, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8152: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/7 (1, 770, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8153: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/8 (1, 770, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8154: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/9 (1, 770, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8155: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/10 (1, 770, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8156: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/11 (1, 770, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8157: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/12 (1, 771, 49155, 65537, 0)' - PASSED ssl_gtest.sh: #8158: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/13 (1, 771, 49156, 65537, 0)' - PASSED ssl_gtest.sh: #8159: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/14 (1, 771, 49157, 65537, 0)' - PASSED ssl_gtest.sh: #8160: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/15 (1, 771, 49160, 65537, 0)' - PASSED ssl_gtest.sh: #8161: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/16 (1, 771, 49161, 65537, 0)' - PASSED ssl_gtest.sh: #8162: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/17 (1, 771, 49162, 65537, 0)' - PASSED ssl_gtest.sh: #8163: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/18 (1, 771, 49165, 65537, 0)' - PASSED ssl_gtest.sh: #8164: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/19 (1, 771, 49166, 65537, 0)' - PASSED ssl_gtest.sh: #8165: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/20 (1, 771, 49167, 65537, 0)' - PASSED ssl_gtest.sh: #8166: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/21 (1, 771, 49170, 65537, 0)' - PASSED ssl_gtest.sh: #8167: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/22 (1, 771, 49171, 65537, 0)' - PASSED ssl_gtest.sh: #8168: 'CipherSuiteCBCDatagram/TlsCipherSuiteTest: WriteLimit/23 (1, 771, 49172, 65537, 0)' - PASSED ssl_gtest.sh: #8169: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #8170: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #8171: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #8172: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #8173: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #8174: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #8175: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/6 (0, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #8176: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/7 (0, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #8177: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/8 (0, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #8178: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/9 (0, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #8179: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/10 (0, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #8180: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/11 (0, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #8181: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/12 (0, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #8182: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/13 (0, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #8183: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/14 (0, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #8184: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/15 (0, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #8185: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/16 (0, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #8186: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/17 (0, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #8187: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/18 (0, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #8188: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/19 (0, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #8189: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/20 (0, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #8190: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/21 (0, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #8191: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/22 (0, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #8192: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/23 (0, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #8193: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/24 (0, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #8194: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/25 (0, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #8195: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/26 (0, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #8196: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/27 (0, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #8197: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/28 (0, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #8198: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/29 (0, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #8199: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/30 (0, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #8200: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/31 (0, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #8201: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/32 (0, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #8202: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/33 (0, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #8203: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/34 (0, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #8204: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/35 (0, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #8205: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/36 (0, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #8206: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/37 (0, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #8207: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/38 (0, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #8208: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/39 (0, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #8209: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/40 (0, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #8210: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/41 (0, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #8211: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/42 (0, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #8212: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/43 (0, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #8213: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/44 (0, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #8214: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/45 (0, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #8215: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/46 (0, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #8216: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/47 (0, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #8217: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/48 (0, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #8218: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/49 (0, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #8219: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/50 (0, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #8220: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/51 (0, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #8221: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/52 (0, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #8222: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/53 (0, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #8223: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/54 (0, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #8224: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/55 (0, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #8225: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/56 (0, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #8226: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/57 (0, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #8227: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/58 (0, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #8228: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/59 (0, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #8229: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/60 (0, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #8230: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/61 (0, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #8231: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/62 (0, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #8232: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/63 (0, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #8233: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/64 (0, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #8234: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/65 (0, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #8235: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/66 (0, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #8236: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/67 (0, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #8237: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/68 (0, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #8238: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/69 (0, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #8239: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/70 (0, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #8240: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/71 (0, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #8241: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/72 (0, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #8242: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/73 (0, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #8243: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/74 (0, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #8244: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/75 (0, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #8245: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/76 (0, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #8246: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/77 (0, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #8247: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/78 (0, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #8248: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/79 (0, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #8249: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/80 (0, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #8250: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/81 (0, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #8251: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/82 (0, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #8252: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/83 (0, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #8253: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/84 (0, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #8254: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/85 (0, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #8255: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/86 (0, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #8256: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/87 (0, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #8257: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/88 (0, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #8258: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/89 (0, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #8259: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/90 (0, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #8260: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/91 (0, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #8261: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/92 (0, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #8262: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/93 (0, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #8263: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/94 (0, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #8264: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/95 (0, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #8265: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/96 (0, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #8266: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/97 (0, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #8267: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/98 (0, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #8268: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/99 (0, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #8269: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/100 (0, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #8270: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/101 (0, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #8271: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/102 (0, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #8272: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/103 (0, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #8273: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/104 (0, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #8274: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/105 (0, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #8275: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/106 (0, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #8276: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/107 (0, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #8277: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/108 (0, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #8278: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/109 (0, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #8279: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/110 (0, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #8280: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/111 (0, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #8281: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/112 (0, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #8282: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/113 (0, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #8283: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/114 (0, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #8284: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/115 (0, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #8285: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/116 (0, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #8286: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/117 (0, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #8287: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/118 (0, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #8288: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/119 (0, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #8289: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/120 (0, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #8290: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/121 (0, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #8291: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/122 (0, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #8292: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/123 (0, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #8293: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/124 (0, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #8294: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/125 (0, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #8295: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/126 (0, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #8296: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/127 (0, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #8297: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/128 (0, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #8298: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/129 (0, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #8299: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/130 (0, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #8300: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/131 (0, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #8301: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/132 (0, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #8302: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/133 (0, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #8303: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/134 (0, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #8304: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/135 (0, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #8305: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/136 (0, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #8306: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/137 (0, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #8307: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/138 (0, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #8308: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/139 (0, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #8309: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/140 (0, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #8310: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/141 (0, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #8311: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/142 (0, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #8312: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/143 (0, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #8313: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/144 (0, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #8314: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/145 (0, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #8315: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/146 (0, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #8316: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/147 (0, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #8317: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/148 (0, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #8318: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/149 (0, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #8319: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/150 (0, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #8320: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/151 (0, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #8321: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/152 (0, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #8322: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/153 (0, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #8323: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/154 (0, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #8324: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/155 (0, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #8325: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/156 (0, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #8326: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/157 (0, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #8327: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/158 (0, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #8328: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/159 (0, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #8329: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/160 (0, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #8330: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/161 (0, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #8331: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/162 (0, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #8332: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/163 (0, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #8333: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/164 (0, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #8334: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/165 (0, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #8335: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/166 (0, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #8336: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/167 (0, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #8337: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/168 (0, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #8338: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/169 (0, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #8339: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/170 (0, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #8340: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/171 (0, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #8341: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/172 (0, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #8342: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/173 (0, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #8343: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/174 (0, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #8344: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/175 (0, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #8345: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/176 (0, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #8346: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/177 (0, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #8347: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/178 (0, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #8348: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/179 (0, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #8349: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/180 (0, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #8350: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/181 (0, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #8351: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/182 (0, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #8352: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/183 (0, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #8353: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/184 (0, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #8354: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/185 (0, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #8355: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/186 (0, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #8356: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/187 (0, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #8357: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/188 (0, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #8358: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/189 (0, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #8359: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/190 (0, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #8360: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/191 (0, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #8361: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/192 (0, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #8362: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/193 (0, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #8363: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/194 (0, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #8364: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/195 (0, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #8365: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/196 (0, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #8366: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/197 (0, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #8367: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/198 (0, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #8368: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/199 (0, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #8369: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/200 (0, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #8370: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/201 (0, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #8371: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/202 (0, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #8372: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/203 (0, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #8373: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/204 (0, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #8374: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/205 (0, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #8375: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/206 (0, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #8376: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/207 (0, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #8377: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/208 (0, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #8378: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/209 (0, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #8379: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/210 (0, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #8380: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/211 (0, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #8381: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/212 (0, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #8382: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/213 (0, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #8383: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/214 (0, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #8384: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/215 (0, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #8385: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/216 (0, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #8386: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/217 (0, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #8387: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/218 (0, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #8388: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/219 (0, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #8389: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/220 (0, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #8390: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/221 (0, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #8391: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/222 (0, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #8392: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/223 (0, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #8393: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/224 (0, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #8394: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/225 (0, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #8395: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/226 (0, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #8396: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/227 (0, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #8397: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/228 (0, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #8398: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/229 (0, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #8399: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/230 (0, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #8400: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/231 (0, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #8401: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/232 (0, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #8402: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/233 (0, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #8403: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/234 (0, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #8404: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/235 (0, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #8405: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/236 (0, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #8406: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/237 (0, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #8407: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/238 (0, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #8408: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/239 (0, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #8409: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/240 (0, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #8410: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/241 (0, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #8411: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/242 (0, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #8412: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/243 (0, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #8413: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/244 (0, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #8414: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/245 (0, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #8415: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/246 (0, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #8416: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/247 (0, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #8417: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/248 (0, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #8418: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/249 (0, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #8419: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/250 (0, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #8420: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/251 (0, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #8421: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/252 (0, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #8422: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/253 (0, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #8423: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/254 (0, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #8424: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/255 (0, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #8425: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/256 (0, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #8426: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/257 (0, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #8427: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/258 (0, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #8428: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/259 (0, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #8429: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/260 (0, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #8430: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/261 (0, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #8431: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/262 (0, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #8432: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/263 (0, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #8433: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/264 (0, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #8434: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/265 (0, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #8435: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/266 (0, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #8436: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/267 (0, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #8437: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/268 (0, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #8438: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/269 (0, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #8439: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/270 (0, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #8440: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/271 (0, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #8441: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/272 (0, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #8442: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/273 (0, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #8443: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/274 (0, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #8444: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/275 (0, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #8445: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/276 (0, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #8446: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/277 (0, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #8447: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/278 (0, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #8448: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/279 (0, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #8449: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/280 (0, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #8450: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/281 (0, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #8451: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/282 (0, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #8452: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/283 (0, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #8453: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/284 (0, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #8454: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/285 (0, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #8455: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/286 (0, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #8456: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/287 (0, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #8457: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/288 (0, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #8458: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/289 (0, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #8459: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/290 (0, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #8460: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/291 (0, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #8461: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/292 (0, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #8462: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/293 (0, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #8463: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/294 (0, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #8464: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/295 (0, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #8465: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/296 (0, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #8466: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/297 (0, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #8467: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/298 (0, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #8468: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/299 (0, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #8469: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/300 (0, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #8470: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/301 (0, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #8471: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/302 (0, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #8472: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/303 (0, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #8473: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/304 (0, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #8474: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/305 (0, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #8475: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/306 (0, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #8476: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/307 (0, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #8477: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/308 (0, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #8478: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/309 (0, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #8479: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/310 (0, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #8480: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/311 (0, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #8481: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/312 (0, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #8482: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/313 (0, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #8483: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/314 (0, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #8484: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/315 (0, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #8485: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/316 (0, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #8486: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/317 (0, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #8487: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/318 (0, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #8488: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/319 (0, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #8489: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/320 (0, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #8490: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/321 (0, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #8491: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/322 (0, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #8492: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/323 (0, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #8493: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/324 (0, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #8494: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/325 (0, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #8495: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/326 (0, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #8496: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/327 (0, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #8497: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/328 (0, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #8498: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/329 (0, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #8499: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/330 (0, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #8500: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/331 (0, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #8501: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/332 (0, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #8502: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/333 (0, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #8503: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/334 (0, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #8504: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/335 (0, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #8505: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/336 (0, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #8506: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/337 (0, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #8507: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/338 (0, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #8508: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/339 (0, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #8509: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/340 (0, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #8510: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/341 (0, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #8511: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/342 (0, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #8512: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/343 (0, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #8513: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/344 (0, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #8514: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/345 (0, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #8515: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/346 (0, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #8516: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/347 (0, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #8517: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/348 (0, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #8518: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/349 (0, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #8519: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/350 (0, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #8520: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/351 (0, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #8521: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/352 (0, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #8522: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/353 (0, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #8523: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/354 (0, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #8524: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/355 (0, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #8525: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/356 (0, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #8526: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/357 (0, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #8527: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/358 (0, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #8528: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/359 (0, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #8529: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/360 (0, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #8530: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/361 (0, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #8531: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/362 (0, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #8532: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/363 (0, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #8533: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/364 (0, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #8534: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/365 (0, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #8535: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/366 (0, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #8536: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/367 (0, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #8537: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/368 (0, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #8538: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/369 (0, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #8539: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/370 (0, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #8540: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/371 (0, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #8541: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/372 (0, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #8542: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/373 (0, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #8543: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/374 (0, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #8544: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/375 (0, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #8545: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/376 (0, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #8546: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/377 (0, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #8547: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/378 (0, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #8548: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/379 (0, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #8549: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/380 (0, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #8550: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/381 (0, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #8551: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/382 (0, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #8552: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/383 (0, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #8553: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/384 (0, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #8554: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/385 (0, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #8555: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/386 (0, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #8556: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/387 (0, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #8557: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/388 (0, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #8558: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/389 (0, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #8559: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/390 (0, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #8560: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/391 (0, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #8561: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/392 (0, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #8562: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/393 (0, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #8563: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/394 (0, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #8564: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/395 (0, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #8565: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/396 (0, 771, 64, 29, 1025)' - PASSED ssl_gtest.sh: #8566: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/397 (0, 771, 64, 29, 1281)' - PASSED ssl_gtest.sh: #8567: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/398 (0, 771, 64, 29, 1537)' - PASSED ssl_gtest.sh: #8568: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/399 (0, 771, 64, 29, 1027)' - PASSED ssl_gtest.sh: #8569: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/400 (0, 771, 64, 29, 1283)' - PASSED ssl_gtest.sh: #8570: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/401 (0, 771, 64, 29, 2052)' - PASSED ssl_gtest.sh: #8571: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/402 (0, 771, 64, 29, 2053)' - PASSED ssl_gtest.sh: #8572: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/403 (0, 771, 64, 29, 2054)' - PASSED ssl_gtest.sh: #8573: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/404 (0, 771, 64, 29, 2057)' - PASSED ssl_gtest.sh: #8574: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/405 (0, 771, 64, 29, 2058)' - PASSED ssl_gtest.sh: #8575: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/406 (0, 771, 64, 29, 2059)' - PASSED ssl_gtest.sh: #8576: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/407 (0, 771, 64, 23, 1025)' - PASSED ssl_gtest.sh: #8577: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/408 (0, 771, 64, 23, 1281)' - PASSED ssl_gtest.sh: #8578: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/409 (0, 771, 64, 23, 1537)' - PASSED ssl_gtest.sh: #8579: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/410 (0, 771, 64, 23, 1027)' - PASSED ssl_gtest.sh: #8580: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/411 (0, 771, 64, 23, 1283)' - PASSED ssl_gtest.sh: #8581: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/412 (0, 771, 64, 23, 2052)' - PASSED ssl_gtest.sh: #8582: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/413 (0, 771, 64, 23, 2053)' - PASSED ssl_gtest.sh: #8583: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/414 (0, 771, 64, 23, 2054)' - PASSED ssl_gtest.sh: #8584: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/415 (0, 771, 64, 23, 2057)' - PASSED ssl_gtest.sh: #8585: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/416 (0, 771, 64, 23, 2058)' - PASSED ssl_gtest.sh: #8586: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/417 (0, 771, 64, 23, 2059)' - PASSED ssl_gtest.sh: #8587: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/418 (0, 771, 64, 24, 1025)' - PASSED ssl_gtest.sh: #8588: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/419 (0, 771, 64, 24, 1281)' - PASSED ssl_gtest.sh: #8589: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/420 (0, 771, 64, 24, 1537)' - PASSED ssl_gtest.sh: #8590: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/421 (0, 771, 64, 24, 1027)' - PASSED ssl_gtest.sh: #8591: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/422 (0, 771, 64, 24, 1283)' - PASSED ssl_gtest.sh: #8592: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/423 (0, 771, 64, 24, 2052)' - PASSED ssl_gtest.sh: #8593: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/424 (0, 771, 64, 24, 2053)' - PASSED ssl_gtest.sh: #8594: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/425 (0, 771, 64, 24, 2054)' - PASSED ssl_gtest.sh: #8595: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/426 (0, 771, 64, 24, 2057)' - PASSED ssl_gtest.sh: #8596: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/427 (0, 771, 64, 24, 2058)' - PASSED ssl_gtest.sh: #8597: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/428 (0, 771, 64, 24, 2059)' - PASSED ssl_gtest.sh: #8598: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/429 (0, 771, 64, 256, 1025)' - PASSED ssl_gtest.sh: #8599: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/430 (0, 771, 64, 256, 1281)' - PASSED ssl_gtest.sh: #8600: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/431 (0, 771, 64, 256, 1537)' - PASSED ssl_gtest.sh: #8601: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/432 (0, 771, 64, 256, 1027)' - PASSED ssl_gtest.sh: #8602: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/433 (0, 771, 64, 256, 1283)' - PASSED ssl_gtest.sh: #8603: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/434 (0, 771, 64, 256, 2052)' - PASSED ssl_gtest.sh: #8604: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/435 (0, 771, 64, 256, 2053)' - PASSED ssl_gtest.sh: #8605: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/436 (0, 771, 64, 256, 2054)' - PASSED ssl_gtest.sh: #8606: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/437 (0, 771, 64, 256, 2057)' - PASSED ssl_gtest.sh: #8607: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/438 (0, 771, 64, 256, 2058)' - PASSED ssl_gtest.sh: #8608: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/439 (0, 771, 64, 256, 2059)' - PASSED ssl_gtest.sh: #8609: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/440 (0, 771, 64, 257, 1025)' - PASSED ssl_gtest.sh: #8610: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/441 (0, 771, 64, 257, 1281)' - PASSED ssl_gtest.sh: #8611: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/442 (0, 771, 64, 257, 1537)' - PASSED ssl_gtest.sh: #8612: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/443 (0, 771, 64, 257, 1027)' - PASSED ssl_gtest.sh: #8613: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/444 (0, 771, 64, 257, 1283)' - PASSED ssl_gtest.sh: #8614: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/445 (0, 771, 64, 257, 2052)' - PASSED ssl_gtest.sh: #8615: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/446 (0, 771, 64, 257, 2053)' - PASSED ssl_gtest.sh: #8616: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/447 (0, 771, 64, 257, 2054)' - PASSED ssl_gtest.sh: #8617: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/448 (0, 771, 64, 257, 2057)' - PASSED ssl_gtest.sh: #8618: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/449 (0, 771, 64, 257, 2058)' - PASSED ssl_gtest.sh: #8619: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/450 (0, 771, 64, 257, 2059)' - PASSED ssl_gtest.sh: #8620: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/451 (0, 771, 64, 25497, 1025)' - PASSED ssl_gtest.sh: #8621: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/452 (0, 771, 64, 25497, 1281)' - PASSED ssl_gtest.sh: #8622: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/453 (0, 771, 64, 25497, 1537)' - PASSED ssl_gtest.sh: #8623: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/454 (0, 771, 64, 25497, 1027)' - PASSED ssl_gtest.sh: #8624: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/455 (0, 771, 64, 25497, 1283)' - PASSED ssl_gtest.sh: #8625: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/456 (0, 771, 64, 25497, 2052)' - PASSED ssl_gtest.sh: #8626: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/457 (0, 771, 64, 25497, 2053)' - PASSED ssl_gtest.sh: #8627: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/458 (0, 771, 64, 25497, 2054)' - PASSED ssl_gtest.sh: #8628: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/459 (0, 771, 64, 25497, 2057)' - PASSED ssl_gtest.sh: #8629: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/460 (0, 771, 64, 25497, 2058)' - PASSED ssl_gtest.sh: #8630: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/461 (0, 771, 64, 25497, 2059)' - PASSED ssl_gtest.sh: #8631: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/462 (0, 771, 106, 29, 1025)' - PASSED ssl_gtest.sh: #8632: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/463 (0, 771, 106, 29, 1281)' - PASSED ssl_gtest.sh: #8633: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/464 (0, 771, 106, 29, 1537)' - PASSED ssl_gtest.sh: #8634: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/465 (0, 771, 106, 29, 1027)' - PASSED ssl_gtest.sh: #8635: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/466 (0, 771, 106, 29, 1283)' - PASSED ssl_gtest.sh: #8636: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/467 (0, 771, 106, 29, 2052)' - PASSED ssl_gtest.sh: #8637: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/468 (0, 771, 106, 29, 2053)' - PASSED ssl_gtest.sh: #8638: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/469 (0, 771, 106, 29, 2054)' - PASSED ssl_gtest.sh: #8639: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/470 (0, 771, 106, 29, 2057)' - PASSED ssl_gtest.sh: #8640: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/471 (0, 771, 106, 29, 2058)' - PASSED ssl_gtest.sh: #8641: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/472 (0, 771, 106, 29, 2059)' - PASSED ssl_gtest.sh: #8642: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/473 (0, 771, 106, 23, 1025)' - PASSED ssl_gtest.sh: #8643: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/474 (0, 771, 106, 23, 1281)' - PASSED ssl_gtest.sh: #8644: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/475 (0, 771, 106, 23, 1537)' - PASSED ssl_gtest.sh: #8645: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/476 (0, 771, 106, 23, 1027)' - PASSED ssl_gtest.sh: #8646: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/477 (0, 771, 106, 23, 1283)' - PASSED ssl_gtest.sh: #8647: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/478 (0, 771, 106, 23, 2052)' - PASSED ssl_gtest.sh: #8648: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/479 (0, 771, 106, 23, 2053)' - PASSED ssl_gtest.sh: #8649: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/480 (0, 771, 106, 23, 2054)' - PASSED ssl_gtest.sh: #8650: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/481 (0, 771, 106, 23, 2057)' - PASSED ssl_gtest.sh: #8651: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/482 (0, 771, 106, 23, 2058)' - PASSED ssl_gtest.sh: #8652: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/483 (0, 771, 106, 23, 2059)' - PASSED ssl_gtest.sh: #8653: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/484 (0, 771, 106, 24, 1025)' - PASSED ssl_gtest.sh: #8654: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/485 (0, 771, 106, 24, 1281)' - PASSED ssl_gtest.sh: #8655: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/486 (0, 771, 106, 24, 1537)' - PASSED ssl_gtest.sh: #8656: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/487 (0, 771, 106, 24, 1027)' - PASSED ssl_gtest.sh: #8657: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/488 (0, 771, 106, 24, 1283)' - PASSED ssl_gtest.sh: #8658: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/489 (0, 771, 106, 24, 2052)' - PASSED ssl_gtest.sh: #8659: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/490 (0, 771, 106, 24, 2053)' - PASSED ssl_gtest.sh: #8660: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/491 (0, 771, 106, 24, 2054)' - PASSED ssl_gtest.sh: #8661: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/492 (0, 771, 106, 24, 2057)' - PASSED ssl_gtest.sh: #8662: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/493 (0, 771, 106, 24, 2058)' - PASSED ssl_gtest.sh: #8663: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/494 (0, 771, 106, 24, 2059)' - PASSED ssl_gtest.sh: #8664: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/495 (0, 771, 106, 256, 1025)' - PASSED ssl_gtest.sh: #8665: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/496 (0, 771, 106, 256, 1281)' - PASSED ssl_gtest.sh: #8666: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/497 (0, 771, 106, 256, 1537)' - PASSED ssl_gtest.sh: #8667: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/498 (0, 771, 106, 256, 1027)' - PASSED ssl_gtest.sh: #8668: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/499 (0, 771, 106, 256, 1283)' - PASSED ssl_gtest.sh: #8669: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/500 (0, 771, 106, 256, 2052)' - PASSED ssl_gtest.sh: #8670: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/501 (0, 771, 106, 256, 2053)' - PASSED ssl_gtest.sh: #8671: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/502 (0, 771, 106, 256, 2054)' - PASSED ssl_gtest.sh: #8672: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/503 (0, 771, 106, 256, 2057)' - PASSED ssl_gtest.sh: #8673: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/504 (0, 771, 106, 256, 2058)' - PASSED ssl_gtest.sh: #8674: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/505 (0, 771, 106, 256, 2059)' - PASSED ssl_gtest.sh: #8675: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/506 (0, 771, 106, 257, 1025)' - PASSED ssl_gtest.sh: #8676: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/507 (0, 771, 106, 257, 1281)' - PASSED ssl_gtest.sh: #8677: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/508 (0, 771, 106, 257, 1537)' - PASSED ssl_gtest.sh: #8678: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/509 (0, 771, 106, 257, 1027)' - PASSED ssl_gtest.sh: #8679: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/510 (0, 771, 106, 257, 1283)' - PASSED ssl_gtest.sh: #8680: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/511 (0, 771, 106, 257, 2052)' - PASSED ssl_gtest.sh: #8681: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/512 (0, 771, 106, 257, 2053)' - PASSED ssl_gtest.sh: #8682: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/513 (0, 771, 106, 257, 2054)' - PASSED ssl_gtest.sh: #8683: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/514 (0, 771, 106, 257, 2057)' - PASSED ssl_gtest.sh: #8684: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/515 (0, 771, 106, 257, 2058)' - PASSED ssl_gtest.sh: #8685: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/516 (0, 771, 106, 257, 2059)' - PASSED ssl_gtest.sh: #8686: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/517 (0, 771, 106, 25497, 1025)' - PASSED ssl_gtest.sh: #8687: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/518 (0, 771, 106, 25497, 1281)' - PASSED ssl_gtest.sh: #8688: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/519 (0, 771, 106, 25497, 1537)' - PASSED ssl_gtest.sh: #8689: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/520 (0, 771, 106, 25497, 1027)' - PASSED ssl_gtest.sh: #8690: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/521 (0, 771, 106, 25497, 1283)' - PASSED ssl_gtest.sh: #8691: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/522 (0, 771, 106, 25497, 2052)' - PASSED ssl_gtest.sh: #8692: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/523 (0, 771, 106, 25497, 2053)' - PASSED ssl_gtest.sh: #8693: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/524 (0, 771, 106, 25497, 2054)' - PASSED ssl_gtest.sh: #8694: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/525 (0, 771, 106, 25497, 2057)' - PASSED ssl_gtest.sh: #8695: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/526 (0, 771, 106, 25497, 2058)' - PASSED ssl_gtest.sh: #8696: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/527 (0, 771, 106, 25497, 2059)' - PASSED ssl_gtest.sh: #8697: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/528 (1, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #8698: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/529 (1, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #8699: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/530 (1, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #8700: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/531 (1, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #8701: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/532 (1, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #8702: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/533 (1, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #8703: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/534 (1, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #8704: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/535 (1, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #8705: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/536 (1, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #8706: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/537 (1, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #8707: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/538 (1, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #8708: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/539 (1, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #8709: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/540 (1, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #8710: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/541 (1, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #8711: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/542 (1, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #8712: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/543 (1, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #8713: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/544 (1, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #8714: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/545 (1, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #8715: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/546 (1, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #8716: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/547 (1, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #8717: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/548 (1, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #8718: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/549 (1, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #8719: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/550 (1, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #8720: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/551 (1, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #8721: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/552 (1, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #8722: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/553 (1, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #8723: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/554 (1, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #8724: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/555 (1, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #8725: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/556 (1, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #8726: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/557 (1, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #8727: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/558 (1, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #8728: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/559 (1, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #8729: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/560 (1, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #8730: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/561 (1, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #8731: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/562 (1, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #8732: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/563 (1, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #8733: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/564 (1, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #8734: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/565 (1, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #8735: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/566 (1, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #8736: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/567 (1, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #8737: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/568 (1, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #8738: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/569 (1, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #8739: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/570 (1, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #8740: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/571 (1, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #8741: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/572 (1, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #8742: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/573 (1, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #8743: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/574 (1, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #8744: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/575 (1, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #8745: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/576 (1, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #8746: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/577 (1, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #8747: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/578 (1, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #8748: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/579 (1, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #8749: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/580 (1, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #8750: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/581 (1, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #8751: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/582 (1, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #8752: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/583 (1, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #8753: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/584 (1, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #8754: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/585 (1, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #8755: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/586 (1, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #8756: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/587 (1, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #8757: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/588 (1, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #8758: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/589 (1, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #8759: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/590 (1, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #8760: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/591 (1, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #8761: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/592 (1, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #8762: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/593 (1, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #8763: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/594 (1, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #8764: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/595 (1, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #8765: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/596 (1, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #8766: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/597 (1, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #8767: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/598 (1, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #8768: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/599 (1, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #8769: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/600 (1, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #8770: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/601 (1, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #8771: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/602 (1, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #8772: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/603 (1, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #8773: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/604 (1, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #8774: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/605 (1, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #8775: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/606 (1, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #8776: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/607 (1, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #8777: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/608 (1, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #8778: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/609 (1, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #8779: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/610 (1, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #8780: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/611 (1, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #8781: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/612 (1, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #8782: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/613 (1, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #8783: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/614 (1, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #8784: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/615 (1, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #8785: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/616 (1, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #8786: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/617 (1, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #8787: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/618 (1, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #8788: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/619 (1, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #8789: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/620 (1, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #8790: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/621 (1, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #8791: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/622 (1, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #8792: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/623 (1, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #8793: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/624 (1, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #8794: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/625 (1, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #8795: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/626 (1, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #8796: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/627 (1, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #8797: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/628 (1, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #8798: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/629 (1, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #8799: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/630 (1, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #8800: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/631 (1, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #8801: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/632 (1, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #8802: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/633 (1, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #8803: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/634 (1, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #8804: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/635 (1, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #8805: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/636 (1, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #8806: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/637 (1, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #8807: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/638 (1, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #8808: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/639 (1, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #8809: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/640 (1, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #8810: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/641 (1, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #8811: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/642 (1, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #8812: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/643 (1, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #8813: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/644 (1, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #8814: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/645 (1, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #8815: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/646 (1, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #8816: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/647 (1, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #8817: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/648 (1, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #8818: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/649 (1, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #8819: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/650 (1, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #8820: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/651 (1, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #8821: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/652 (1, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #8822: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/653 (1, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #8823: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/654 (1, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #8824: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/655 (1, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #8825: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/656 (1, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #8826: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/657 (1, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #8827: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/658 (1, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #8828: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/659 (1, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #8829: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/660 (1, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #8830: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/661 (1, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #8831: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/662 (1, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #8832: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/663 (1, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #8833: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/664 (1, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #8834: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/665 (1, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #8835: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/666 (1, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #8836: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/667 (1, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #8837: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/668 (1, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #8838: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/669 (1, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #8839: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/670 (1, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #8840: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/671 (1, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #8841: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/672 (1, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #8842: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/673 (1, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #8843: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/674 (1, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #8844: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/675 (1, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #8845: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/676 (1, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #8846: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/677 (1, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #8847: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/678 (1, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #8848: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/679 (1, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #8849: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/680 (1, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #8850: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/681 (1, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #8851: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/682 (1, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #8852: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/683 (1, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #8853: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/684 (1, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #8854: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/685 (1, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #8855: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/686 (1, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #8856: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/687 (1, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #8857: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/688 (1, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #8858: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/689 (1, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #8859: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/690 (1, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #8860: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/691 (1, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #8861: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/692 (1, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #8862: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/693 (1, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #8863: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/694 (1, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #8864: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/695 (1, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #8865: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/696 (1, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #8866: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/697 (1, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #8867: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/698 (1, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #8868: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/699 (1, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #8869: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/700 (1, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #8870: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/701 (1, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #8871: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/702 (1, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #8872: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/703 (1, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #8873: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/704 (1, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #8874: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/705 (1, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #8875: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/706 (1, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #8876: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/707 (1, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #8877: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/708 (1, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #8878: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/709 (1, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #8879: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/710 (1, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #8880: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/711 (1, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #8881: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/712 (1, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #8882: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/713 (1, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #8883: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/714 (1, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #8884: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/715 (1, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #8885: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/716 (1, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #8886: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/717 (1, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #8887: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/718 (1, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #8888: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/719 (1, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #8889: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/720 (1, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #8890: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/721 (1, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #8891: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/722 (1, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #8892: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/723 (1, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #8893: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/724 (1, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #8894: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/725 (1, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #8895: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/726 (1, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #8896: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/727 (1, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #8897: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/728 (1, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #8898: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/729 (1, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #8899: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/730 (1, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #8900: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/731 (1, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #8901: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/732 (1, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #8902: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/733 (1, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #8903: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/734 (1, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #8904: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/735 (1, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #8905: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/736 (1, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #8906: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/737 (1, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #8907: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/738 (1, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #8908: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/739 (1, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #8909: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/740 (1, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #8910: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/741 (1, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #8911: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/742 (1, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #8912: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/743 (1, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #8913: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/744 (1, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #8914: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/745 (1, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #8915: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/746 (1, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #8916: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/747 (1, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #8917: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/748 (1, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #8918: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/749 (1, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #8919: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/750 (1, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #8920: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/751 (1, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #8921: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/752 (1, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #8922: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/753 (1, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #8923: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/754 (1, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #8924: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/755 (1, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #8925: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/756 (1, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #8926: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/757 (1, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #8927: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/758 (1, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #8928: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/759 (1, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #8929: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/760 (1, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #8930: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/761 (1, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #8931: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/762 (1, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #8932: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/763 (1, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #8933: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/764 (1, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #8934: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/765 (1, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #8935: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/766 (1, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #8936: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/767 (1, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #8937: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/768 (1, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #8938: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/769 (1, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #8939: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/770 (1, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #8940: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/771 (1, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #8941: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/772 (1, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #8942: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/773 (1, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #8943: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/774 (1, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #8944: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/775 (1, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #8945: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/776 (1, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #8946: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/777 (1, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #8947: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/778 (1, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #8948: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/779 (1, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #8949: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/780 (1, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #8950: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/781 (1, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #8951: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/782 (1, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #8952: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/783 (1, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #8953: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/784 (1, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #8954: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/785 (1, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #8955: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/786 (1, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #8956: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/787 (1, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #8957: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/788 (1, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #8958: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/789 (1, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #8959: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/790 (1, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #8960: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/791 (1, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #8961: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/792 (1, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #8962: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/793 (1, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #8963: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/794 (1, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #8964: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/795 (1, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #8965: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/796 (1, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #8966: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/797 (1, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #8967: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/798 (1, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #8968: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/799 (1, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #8969: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/800 (1, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #8970: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/801 (1, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #8971: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/802 (1, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #8972: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/803 (1, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #8973: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/804 (1, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #8974: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/805 (1, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #8975: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/806 (1, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #8976: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/807 (1, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #8977: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/808 (1, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #8978: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/809 (1, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #8979: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/810 (1, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #8980: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/811 (1, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #8981: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/812 (1, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #8982: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/813 (1, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #8983: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/814 (1, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #8984: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/815 (1, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #8985: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/816 (1, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #8986: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/817 (1, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #8987: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/818 (1, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #8988: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/819 (1, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #8989: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/820 (1, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #8990: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/821 (1, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #8991: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/822 (1, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #8992: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/823 (1, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #8993: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/824 (1, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #8994: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/825 (1, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #8995: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/826 (1, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #8996: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/827 (1, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #8997: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/828 (1, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #8998: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/829 (1, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #8999: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/830 (1, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #9000: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/831 (1, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #9001: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/832 (1, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #9002: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/833 (1, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #9003: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/834 (1, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #9004: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/835 (1, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #9005: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/836 (1, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #9006: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/837 (1, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #9007: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/838 (1, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #9008: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/839 (1, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #9009: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/840 (1, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #9010: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/841 (1, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #9011: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/842 (1, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #9012: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/843 (1, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #9013: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/844 (1, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #9014: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/845 (1, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #9015: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/846 (1, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #9016: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/847 (1, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #9017: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/848 (1, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #9018: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/849 (1, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #9019: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/850 (1, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #9020: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/851 (1, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #9021: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/852 (1, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #9022: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/853 (1, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #9023: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/854 (1, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #9024: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/855 (1, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #9025: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/856 (1, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #9026: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/857 (1, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #9027: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/858 (1, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #9028: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/859 (1, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #9029: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/860 (1, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #9030: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/861 (1, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #9031: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/862 (1, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #9032: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/863 (1, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #9033: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/864 (1, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #9034: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/865 (1, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #9035: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/866 (1, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #9036: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/867 (1, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #9037: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/868 (1, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #9038: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/869 (1, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #9039: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/870 (1, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #9040: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/871 (1, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #9041: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/872 (1, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #9042: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/873 (1, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #9043: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/874 (1, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #9044: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/875 (1, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #9045: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/876 (1, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #9046: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/877 (1, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #9047: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/878 (1, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #9048: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/879 (1, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #9049: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/880 (1, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #9050: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/881 (1, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #9051: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/882 (1, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #9052: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/883 (1, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #9053: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/884 (1, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #9054: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/885 (1, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #9055: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/886 (1, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #9056: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/887 (1, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #9057: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/888 (1, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #9058: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/889 (1, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #9059: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/890 (1, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #9060: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/891 (1, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #9061: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/892 (1, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #9062: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/893 (1, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #9063: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/894 (1, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #9064: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/895 (1, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #9065: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/896 (1, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #9066: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/897 (1, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #9067: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/898 (1, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #9068: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/899 (1, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #9069: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/900 (1, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #9070: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/901 (1, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #9071: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/902 (1, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #9072: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/903 (1, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #9073: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/904 (1, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #9074: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/905 (1, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #9075: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/906 (1, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #9076: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/907 (1, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #9077: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/908 (1, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #9078: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/909 (1, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #9079: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/910 (1, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #9080: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/911 (1, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #9081: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/912 (1, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #9082: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/913 (1, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #9083: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/914 (1, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #9084: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/915 (1, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #9085: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/916 (1, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #9086: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/917 (1, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #9087: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/918 (1, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #9088: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/919 (1, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #9089: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/920 (1, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #9090: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/921 (1, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #9091: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/922 (1, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #9092: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/923 (1, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #9093: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/924 (1, 771, 64, 29, 1025)' - PASSED ssl_gtest.sh: #9094: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/925 (1, 771, 64, 29, 1281)' - PASSED ssl_gtest.sh: #9095: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/926 (1, 771, 64, 29, 1537)' - PASSED ssl_gtest.sh: #9096: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/927 (1, 771, 64, 29, 1027)' - PASSED ssl_gtest.sh: #9097: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/928 (1, 771, 64, 29, 1283)' - PASSED ssl_gtest.sh: #9098: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/929 (1, 771, 64, 29, 2052)' - PASSED ssl_gtest.sh: #9099: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/930 (1, 771, 64, 29, 2053)' - PASSED ssl_gtest.sh: #9100: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/931 (1, 771, 64, 29, 2054)' - PASSED ssl_gtest.sh: #9101: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/932 (1, 771, 64, 29, 2057)' - PASSED ssl_gtest.sh: #9102: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/933 (1, 771, 64, 29, 2058)' - PASSED ssl_gtest.sh: #9103: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/934 (1, 771, 64, 29, 2059)' - PASSED ssl_gtest.sh: #9104: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/935 (1, 771, 64, 23, 1025)' - PASSED ssl_gtest.sh: #9105: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/936 (1, 771, 64, 23, 1281)' - PASSED ssl_gtest.sh: #9106: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/937 (1, 771, 64, 23, 1537)' - PASSED ssl_gtest.sh: #9107: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/938 (1, 771, 64, 23, 1027)' - PASSED ssl_gtest.sh: #9108: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/939 (1, 771, 64, 23, 1283)' - PASSED ssl_gtest.sh: #9109: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/940 (1, 771, 64, 23, 2052)' - PASSED ssl_gtest.sh: #9110: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/941 (1, 771, 64, 23, 2053)' - PASSED ssl_gtest.sh: #9111: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/942 (1, 771, 64, 23, 2054)' - PASSED ssl_gtest.sh: #9112: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/943 (1, 771, 64, 23, 2057)' - PASSED ssl_gtest.sh: #9113: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/944 (1, 771, 64, 23, 2058)' - PASSED ssl_gtest.sh: #9114: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/945 (1, 771, 64, 23, 2059)' - PASSED ssl_gtest.sh: #9115: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/946 (1, 771, 64, 24, 1025)' - PASSED ssl_gtest.sh: #9116: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/947 (1, 771, 64, 24, 1281)' - PASSED ssl_gtest.sh: #9117: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/948 (1, 771, 64, 24, 1537)' - PASSED ssl_gtest.sh: #9118: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/949 (1, 771, 64, 24, 1027)' - PASSED ssl_gtest.sh: #9119: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/950 (1, 771, 64, 24, 1283)' - PASSED ssl_gtest.sh: #9120: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/951 (1, 771, 64, 24, 2052)' - PASSED ssl_gtest.sh: #9121: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/952 (1, 771, 64, 24, 2053)' - PASSED ssl_gtest.sh: #9122: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/953 (1, 771, 64, 24, 2054)' - PASSED ssl_gtest.sh: #9123: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/954 (1, 771, 64, 24, 2057)' - PASSED ssl_gtest.sh: #9124: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/955 (1, 771, 64, 24, 2058)' - PASSED ssl_gtest.sh: #9125: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/956 (1, 771, 64, 24, 2059)' - PASSED ssl_gtest.sh: #9126: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/957 (1, 771, 64, 256, 1025)' - PASSED ssl_gtest.sh: #9127: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/958 (1, 771, 64, 256, 1281)' - PASSED ssl_gtest.sh: #9128: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/959 (1, 771, 64, 256, 1537)' - PASSED ssl_gtest.sh: #9129: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/960 (1, 771, 64, 256, 1027)' - PASSED ssl_gtest.sh: #9130: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/961 (1, 771, 64, 256, 1283)' - PASSED ssl_gtest.sh: #9131: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/962 (1, 771, 64, 256, 2052)' - PASSED ssl_gtest.sh: #9132: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/963 (1, 771, 64, 256, 2053)' - PASSED ssl_gtest.sh: #9133: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/964 (1, 771, 64, 256, 2054)' - PASSED ssl_gtest.sh: #9134: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/965 (1, 771, 64, 256, 2057)' - PASSED ssl_gtest.sh: #9135: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/966 (1, 771, 64, 256, 2058)' - PASSED ssl_gtest.sh: #9136: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/967 (1, 771, 64, 256, 2059)' - PASSED ssl_gtest.sh: #9137: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/968 (1, 771, 64, 257, 1025)' - PASSED ssl_gtest.sh: #9138: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/969 (1, 771, 64, 257, 1281)' - PASSED ssl_gtest.sh: #9139: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/970 (1, 771, 64, 257, 1537)' - PASSED ssl_gtest.sh: #9140: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/971 (1, 771, 64, 257, 1027)' - PASSED ssl_gtest.sh: #9141: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/972 (1, 771, 64, 257, 1283)' - PASSED ssl_gtest.sh: #9142: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/973 (1, 771, 64, 257, 2052)' - PASSED ssl_gtest.sh: #9143: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/974 (1, 771, 64, 257, 2053)' - PASSED ssl_gtest.sh: #9144: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/975 (1, 771, 64, 257, 2054)' - PASSED ssl_gtest.sh: #9145: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/976 (1, 771, 64, 257, 2057)' - PASSED ssl_gtest.sh: #9146: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/977 (1, 771, 64, 257, 2058)' - PASSED ssl_gtest.sh: #9147: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/978 (1, 771, 64, 257, 2059)' - PASSED ssl_gtest.sh: #9148: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/979 (1, 771, 64, 25497, 1025)' - PASSED ssl_gtest.sh: #9149: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/980 (1, 771, 64, 25497, 1281)' - PASSED ssl_gtest.sh: #9150: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/981 (1, 771, 64, 25497, 1537)' - PASSED ssl_gtest.sh: #9151: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/982 (1, 771, 64, 25497, 1027)' - PASSED ssl_gtest.sh: #9152: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/983 (1, 771, 64, 25497, 1283)' - PASSED ssl_gtest.sh: #9153: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/984 (1, 771, 64, 25497, 2052)' - PASSED ssl_gtest.sh: #9154: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/985 (1, 771, 64, 25497, 2053)' - PASSED ssl_gtest.sh: #9155: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/986 (1, 771, 64, 25497, 2054)' - PASSED ssl_gtest.sh: #9156: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/987 (1, 771, 64, 25497, 2057)' - PASSED ssl_gtest.sh: #9157: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/988 (1, 771, 64, 25497, 2058)' - PASSED ssl_gtest.sh: #9158: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/989 (1, 771, 64, 25497, 2059)' - PASSED ssl_gtest.sh: #9159: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/990 (1, 771, 106, 29, 1025)' - PASSED ssl_gtest.sh: #9160: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/991 (1, 771, 106, 29, 1281)' - PASSED ssl_gtest.sh: #9161: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/992 (1, 771, 106, 29, 1537)' - PASSED ssl_gtest.sh: #9162: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/993 (1, 771, 106, 29, 1027)' - PASSED ssl_gtest.sh: #9163: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/994 (1, 771, 106, 29, 1283)' - PASSED ssl_gtest.sh: #9164: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/995 (1, 771, 106, 29, 2052)' - PASSED ssl_gtest.sh: #9165: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/996 (1, 771, 106, 29, 2053)' - PASSED ssl_gtest.sh: #9166: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/997 (1, 771, 106, 29, 2054)' - PASSED ssl_gtest.sh: #9167: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/998 (1, 771, 106, 29, 2057)' - PASSED ssl_gtest.sh: #9168: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/999 (1, 771, 106, 29, 2058)' - PASSED ssl_gtest.sh: #9169: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1000 (1, 771, 106, 29, 2059)' - PASSED ssl_gtest.sh: #9170: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1001 (1, 771, 106, 23, 1025)' - PASSED ssl_gtest.sh: #9171: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1002 (1, 771, 106, 23, 1281)' - PASSED ssl_gtest.sh: #9172: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1003 (1, 771, 106, 23, 1537)' - PASSED ssl_gtest.sh: #9173: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1004 (1, 771, 106, 23, 1027)' - PASSED ssl_gtest.sh: #9174: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1005 (1, 771, 106, 23, 1283)' - PASSED ssl_gtest.sh: #9175: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1006 (1, 771, 106, 23, 2052)' - PASSED ssl_gtest.sh: #9176: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1007 (1, 771, 106, 23, 2053)' - PASSED ssl_gtest.sh: #9177: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1008 (1, 771, 106, 23, 2054)' - PASSED ssl_gtest.sh: #9178: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1009 (1, 771, 106, 23, 2057)' - PASSED ssl_gtest.sh: #9179: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1010 (1, 771, 106, 23, 2058)' - PASSED ssl_gtest.sh: #9180: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1011 (1, 771, 106, 23, 2059)' - PASSED ssl_gtest.sh: #9181: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1012 (1, 771, 106, 24, 1025)' - PASSED ssl_gtest.sh: #9182: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1013 (1, 771, 106, 24, 1281)' - PASSED ssl_gtest.sh: #9183: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1014 (1, 771, 106, 24, 1537)' - PASSED ssl_gtest.sh: #9184: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1015 (1, 771, 106, 24, 1027)' - PASSED ssl_gtest.sh: #9185: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1016 (1, 771, 106, 24, 1283)' - PASSED ssl_gtest.sh: #9186: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1017 (1, 771, 106, 24, 2052)' - PASSED ssl_gtest.sh: #9187: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1018 (1, 771, 106, 24, 2053)' - PASSED ssl_gtest.sh: #9188: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1019 (1, 771, 106, 24, 2054)' - PASSED ssl_gtest.sh: #9189: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1020 (1, 771, 106, 24, 2057)' - PASSED ssl_gtest.sh: #9190: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1021 (1, 771, 106, 24, 2058)' - PASSED ssl_gtest.sh: #9191: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1022 (1, 771, 106, 24, 2059)' - PASSED ssl_gtest.sh: #9192: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1023 (1, 771, 106, 256, 1025)' - PASSED ssl_gtest.sh: #9193: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1024 (1, 771, 106, 256, 1281)' - PASSED ssl_gtest.sh: #9194: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1025 (1, 771, 106, 256, 1537)' - PASSED ssl_gtest.sh: #9195: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1026 (1, 771, 106, 256, 1027)' - PASSED ssl_gtest.sh: #9196: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1027 (1, 771, 106, 256, 1283)' - PASSED ssl_gtest.sh: #9197: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1028 (1, 771, 106, 256, 2052)' - PASSED ssl_gtest.sh: #9198: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1029 (1, 771, 106, 256, 2053)' - PASSED ssl_gtest.sh: #9199: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1030 (1, 771, 106, 256, 2054)' - PASSED ssl_gtest.sh: #9200: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1031 (1, 771, 106, 256, 2057)' - PASSED ssl_gtest.sh: #9201: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1032 (1, 771, 106, 256, 2058)' - PASSED ssl_gtest.sh: #9202: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1033 (1, 771, 106, 256, 2059)' - PASSED ssl_gtest.sh: #9203: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1034 (1, 771, 106, 257, 1025)' - PASSED ssl_gtest.sh: #9204: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1035 (1, 771, 106, 257, 1281)' - PASSED ssl_gtest.sh: #9205: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1036 (1, 771, 106, 257, 1537)' - PASSED ssl_gtest.sh: #9206: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1037 (1, 771, 106, 257, 1027)' - PASSED ssl_gtest.sh: #9207: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1038 (1, 771, 106, 257, 1283)' - PASSED ssl_gtest.sh: #9208: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1039 (1, 771, 106, 257, 2052)' - PASSED ssl_gtest.sh: #9209: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1040 (1, 771, 106, 257, 2053)' - PASSED ssl_gtest.sh: #9210: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1041 (1, 771, 106, 257, 2054)' - PASSED ssl_gtest.sh: #9211: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1042 (1, 771, 106, 257, 2057)' - PASSED ssl_gtest.sh: #9212: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1043 (1, 771, 106, 257, 2058)' - PASSED ssl_gtest.sh: #9213: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1044 (1, 771, 106, 257, 2059)' - PASSED ssl_gtest.sh: #9214: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1045 (1, 771, 106, 25497, 1025)' - PASSED ssl_gtest.sh: #9215: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1046 (1, 771, 106, 25497, 1281)' - PASSED ssl_gtest.sh: #9216: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1047 (1, 771, 106, 25497, 1537)' - PASSED ssl_gtest.sh: #9217: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1048 (1, 771, 106, 25497, 1027)' - PASSED ssl_gtest.sh: #9218: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1049 (1, 771, 106, 25497, 1283)' - PASSED ssl_gtest.sh: #9219: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1050 (1, 771, 106, 25497, 2052)' - PASSED ssl_gtest.sh: #9220: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1051 (1, 771, 106, 25497, 2053)' - PASSED ssl_gtest.sh: #9221: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1052 (1, 771, 106, 25497, 2054)' - PASSED ssl_gtest.sh: #9222: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1053 (1, 771, 106, 25497, 2057)' - PASSED ssl_gtest.sh: #9223: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1054 (1, 771, 106, 25497, 2058)' - PASSED ssl_gtest.sh: #9224: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: SingleCipherSuite/1055 (1, 771, 106, 25497, 2059)' - PASSED ssl_gtest.sh: #9225: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #9226: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #9227: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/2 (0, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #9228: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/3 (0, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #9229: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #9230: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #9231: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/6 (0, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #9232: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/7 (0, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #9233: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/8 (0, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #9234: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/9 (0, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #9235: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/10 (0, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #9236: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/11 (0, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #9237: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/12 (0, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #9238: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/13 (0, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #9239: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/14 (0, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #9240: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/15 (0, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #9241: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/16 (0, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #9242: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/17 (0, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #9243: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/18 (0, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #9244: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/19 (0, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #9245: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/20 (0, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #9246: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/21 (0, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #9247: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/22 (0, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #9248: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/23 (0, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #9249: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/24 (0, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #9250: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/25 (0, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #9251: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/26 (0, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #9252: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/27 (0, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #9253: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/28 (0, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #9254: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/29 (0, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #9255: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/30 (0, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #9256: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/31 (0, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #9257: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/32 (0, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #9258: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/33 (0, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #9259: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/34 (0, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #9260: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/35 (0, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #9261: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/36 (0, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #9262: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/37 (0, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #9263: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/38 (0, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #9264: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/39 (0, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #9265: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/40 (0, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #9266: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/41 (0, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #9267: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/42 (0, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #9268: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/43 (0, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #9269: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/44 (0, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #9270: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/45 (0, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #9271: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/46 (0, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #9272: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/47 (0, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #9273: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/48 (0, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #9274: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/49 (0, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #9275: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/50 (0, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #9276: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/51 (0, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #9277: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/52 (0, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #9278: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/53 (0, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #9279: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/54 (0, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #9280: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/55 (0, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #9281: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/56 (0, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #9282: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/57 (0, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #9283: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/58 (0, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #9284: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/59 (0, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #9285: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/60 (0, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #9286: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/61 (0, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #9287: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/62 (0, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #9288: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/63 (0, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #9289: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/64 (0, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #9290: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/65 (0, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #9291: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/66 (0, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #9292: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/67 (0, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #9293: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/68 (0, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #9294: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/69 (0, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #9295: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/70 (0, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #9296: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/71 (0, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #9297: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/72 (0, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #9298: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/73 (0, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #9299: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/74 (0, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #9300: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/75 (0, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #9301: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/76 (0, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #9302: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/77 (0, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #9303: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/78 (0, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #9304: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/79 (0, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #9305: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/80 (0, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #9306: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/81 (0, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #9307: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/82 (0, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #9308: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/83 (0, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #9309: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/84 (0, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #9310: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/85 (0, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #9311: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/86 (0, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #9312: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/87 (0, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #9313: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/88 (0, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #9314: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/89 (0, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #9315: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/90 (0, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #9316: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/91 (0, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #9317: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/92 (0, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #9318: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/93 (0, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #9319: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/94 (0, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #9320: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/95 (0, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #9321: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/96 (0, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #9322: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/97 (0, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #9323: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/98 (0, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #9324: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/99 (0, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #9325: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/100 (0, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #9326: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/101 (0, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #9327: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/102 (0, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #9328: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/103 (0, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #9329: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/104 (0, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #9330: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/105 (0, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #9331: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/106 (0, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #9332: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/107 (0, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #9333: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/108 (0, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #9334: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/109 (0, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #9335: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/110 (0, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #9336: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/111 (0, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #9337: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/112 (0, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #9338: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/113 (0, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #9339: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/114 (0, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #9340: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/115 (0, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #9341: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/116 (0, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #9342: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/117 (0, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #9343: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/118 (0, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #9344: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/119 (0, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #9345: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/120 (0, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #9346: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/121 (0, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #9347: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/122 (0, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #9348: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/123 (0, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #9349: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/124 (0, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #9350: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/125 (0, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #9351: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/126 (0, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #9352: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/127 (0, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #9353: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/128 (0, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #9354: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/129 (0, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #9355: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/130 (0, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #9356: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/131 (0, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #9357: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/132 (0, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #9358: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/133 (0, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #9359: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/134 (0, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #9360: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/135 (0, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #9361: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/136 (0, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #9362: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/137 (0, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #9363: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/138 (0, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #9364: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/139 (0, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #9365: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/140 (0, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #9366: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/141 (0, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #9367: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/142 (0, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #9368: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/143 (0, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #9369: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/144 (0, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #9370: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/145 (0, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #9371: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/146 (0, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #9372: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/147 (0, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #9373: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/148 (0, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #9374: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/149 (0, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #9375: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/150 (0, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #9376: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/151 (0, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #9377: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/152 (0, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #9378: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/153 (0, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #9379: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/154 (0, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #9380: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/155 (0, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #9381: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/156 (0, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #9382: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/157 (0, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #9383: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/158 (0, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #9384: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/159 (0, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #9385: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/160 (0, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #9386: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/161 (0, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #9387: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/162 (0, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #9388: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/163 (0, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #9389: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/164 (0, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #9390: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/165 (0, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #9391: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/166 (0, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #9392: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/167 (0, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #9393: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/168 (0, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #9394: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/169 (0, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #9395: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/170 (0, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #9396: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/171 (0, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #9397: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/172 (0, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #9398: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/173 (0, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #9399: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/174 (0, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #9400: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/175 (0, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #9401: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/176 (0, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #9402: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/177 (0, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #9403: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/178 (0, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #9404: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/179 (0, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #9405: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/180 (0, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #9406: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/181 (0, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #9407: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/182 (0, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #9408: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/183 (0, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #9409: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/184 (0, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #9410: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/185 (0, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #9411: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/186 (0, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #9412: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/187 (0, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #9413: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/188 (0, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #9414: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/189 (0, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #9415: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/190 (0, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #9416: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/191 (0, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #9417: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/192 (0, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #9418: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/193 (0, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #9419: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/194 (0, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #9420: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/195 (0, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #9421: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/196 (0, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #9422: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/197 (0, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #9423: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/198 (0, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #9424: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/199 (0, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #9425: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/200 (0, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #9426: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/201 (0, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #9427: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/202 (0, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #9428: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/203 (0, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #9429: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/204 (0, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #9430: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/205 (0, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #9431: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/206 (0, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #9432: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/207 (0, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #9433: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/208 (0, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #9434: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/209 (0, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #9435: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/210 (0, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #9436: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/211 (0, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #9437: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/212 (0, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #9438: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/213 (0, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #9439: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/214 (0, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #9440: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/215 (0, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #9441: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/216 (0, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #9442: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/217 (0, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #9443: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/218 (0, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #9444: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/219 (0, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #9445: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/220 (0, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #9446: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/221 (0, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #9447: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/222 (0, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #9448: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/223 (0, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #9449: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/224 (0, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #9450: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/225 (0, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #9451: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/226 (0, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #9452: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/227 (0, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #9453: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/228 (0, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #9454: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/229 (0, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #9455: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/230 (0, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #9456: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/231 (0, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #9457: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/232 (0, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #9458: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/233 (0, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #9459: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/234 (0, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #9460: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/235 (0, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #9461: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/236 (0, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #9462: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/237 (0, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #9463: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/238 (0, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #9464: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/239 (0, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #9465: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/240 (0, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #9466: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/241 (0, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #9467: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/242 (0, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #9468: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/243 (0, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #9469: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/244 (0, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #9470: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/245 (0, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #9471: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/246 (0, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #9472: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/247 (0, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #9473: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/248 (0, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #9474: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/249 (0, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #9475: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/250 (0, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #9476: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/251 (0, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #9477: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/252 (0, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #9478: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/253 (0, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #9479: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/254 (0, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #9480: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/255 (0, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #9481: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/256 (0, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #9482: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/257 (0, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #9483: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/258 (0, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #9484: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/259 (0, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #9485: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/260 (0, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #9486: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/261 (0, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #9487: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/262 (0, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #9488: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/263 (0, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #9489: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/264 (0, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #9490: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/265 (0, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #9491: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/266 (0, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #9492: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/267 (0, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #9493: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/268 (0, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #9494: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/269 (0, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #9495: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/270 (0, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #9496: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/271 (0, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #9497: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/272 (0, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #9498: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/273 (0, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #9499: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/274 (0, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #9500: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/275 (0, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #9501: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/276 (0, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #9502: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/277 (0, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #9503: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/278 (0, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #9504: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/279 (0, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #9505: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/280 (0, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #9506: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/281 (0, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #9507: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/282 (0, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #9508: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/283 (0, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #9509: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/284 (0, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #9510: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/285 (0, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #9511: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/286 (0, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #9512: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/287 (0, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #9513: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/288 (0, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #9514: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/289 (0, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #9515: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/290 (0, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #9516: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/291 (0, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #9517: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/292 (0, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #9518: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/293 (0, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #9519: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/294 (0, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #9520: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/295 (0, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #9521: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/296 (0, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #9522: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/297 (0, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #9523: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/298 (0, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #9524: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/299 (0, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #9525: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/300 (0, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #9526: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/301 (0, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #9527: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/302 (0, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #9528: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/303 (0, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #9529: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/304 (0, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #9530: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/305 (0, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #9531: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/306 (0, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #9532: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/307 (0, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #9533: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/308 (0, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #9534: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/309 (0, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #9535: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/310 (0, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #9536: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/311 (0, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #9537: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/312 (0, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #9538: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/313 (0, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #9539: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/314 (0, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #9540: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/315 (0, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #9541: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/316 (0, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #9542: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/317 (0, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #9543: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/318 (0, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #9544: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/319 (0, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #9545: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/320 (0, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #9546: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/321 (0, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #9547: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/322 (0, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #9548: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/323 (0, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #9549: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/324 (0, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #9550: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/325 (0, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #9551: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/326 (0, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #9552: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/327 (0, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #9553: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/328 (0, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #9554: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/329 (0, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #9555: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/330 (0, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #9556: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/331 (0, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #9557: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/332 (0, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #9558: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/333 (0, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #9559: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/334 (0, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #9560: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/335 (0, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #9561: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/336 (0, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #9562: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/337 (0, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #9563: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/338 (0, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #9564: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/339 (0, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #9565: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/340 (0, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #9566: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/341 (0, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #9567: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/342 (0, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #9568: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/343 (0, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #9569: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/344 (0, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #9570: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/345 (0, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #9571: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/346 (0, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #9572: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/347 (0, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #9573: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/348 (0, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #9574: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/349 (0, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #9575: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/350 (0, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #9576: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/351 (0, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #9577: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/352 (0, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #9578: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/353 (0, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #9579: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/354 (0, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #9580: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/355 (0, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #9581: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/356 (0, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #9582: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/357 (0, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #9583: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/358 (0, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #9584: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/359 (0, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #9585: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/360 (0, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #9586: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/361 (0, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #9587: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/362 (0, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #9588: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/363 (0, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #9589: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/364 (0, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #9590: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/365 (0, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #9591: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/366 (0, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #9592: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/367 (0, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #9593: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/368 (0, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #9594: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/369 (0, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #9595: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/370 (0, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #9596: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/371 (0, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #9597: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/372 (0, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #9598: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/373 (0, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #9599: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/374 (0, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #9600: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/375 (0, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #9601: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/376 (0, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #9602: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/377 (0, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #9603: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/378 (0, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #9604: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/379 (0, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #9605: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/380 (0, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #9606: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/381 (0, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #9607: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/382 (0, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #9608: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/383 (0, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #9609: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/384 (0, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #9610: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/385 (0, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #9611: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/386 (0, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #9612: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/387 (0, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #9613: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/388 (0, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #9614: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/389 (0, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #9615: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/390 (0, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #9616: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/391 (0, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #9617: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/392 (0, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #9618: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/393 (0, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #9619: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/394 (0, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #9620: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/395 (0, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #9621: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/528 (1, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #9622: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/529 (1, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #9623: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/530 (1, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #9624: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/531 (1, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #9625: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/532 (1, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #9626: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/533 (1, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #9627: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/534 (1, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #9628: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/535 (1, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #9629: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/536 (1, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #9630: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/537 (1, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #9631: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/538 (1, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #9632: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/539 (1, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #9633: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/540 (1, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #9634: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/541 (1, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #9635: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/542 (1, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #9636: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/543 (1, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #9637: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/544 (1, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #9638: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/545 (1, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #9639: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/546 (1, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #9640: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/547 (1, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #9641: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/548 (1, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #9642: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/549 (1, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #9643: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/550 (1, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #9644: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/551 (1, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #9645: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/552 (1, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #9646: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/553 (1, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #9647: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/554 (1, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #9648: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/555 (1, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #9649: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/556 (1, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #9650: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/557 (1, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #9651: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/558 (1, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #9652: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/559 (1, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #9653: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/560 (1, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #9654: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/561 (1, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #9655: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/562 (1, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #9656: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/563 (1, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #9657: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/564 (1, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #9658: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/565 (1, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #9659: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/566 (1, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #9660: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/567 (1, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #9661: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/568 (1, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #9662: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/569 (1, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #9663: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/570 (1, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #9664: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/571 (1, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #9665: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/572 (1, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #9666: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/573 (1, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #9667: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/574 (1, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #9668: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/575 (1, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #9669: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/576 (1, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #9670: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/577 (1, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #9671: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/578 (1, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #9672: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/579 (1, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #9673: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/580 (1, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #9674: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/581 (1, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #9675: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/582 (1, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #9676: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/583 (1, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #9677: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/584 (1, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #9678: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/585 (1, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #9679: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/586 (1, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #9680: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/587 (1, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #9681: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/588 (1, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #9682: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/589 (1, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #9683: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/590 (1, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #9684: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/591 (1, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #9685: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/592 (1, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #9686: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/593 (1, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #9687: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/594 (1, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #9688: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/595 (1, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #9689: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/596 (1, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #9690: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/597 (1, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #9691: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/598 (1, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #9692: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/599 (1, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #9693: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/600 (1, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #9694: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/601 (1, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #9695: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/602 (1, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #9696: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/603 (1, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #9697: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/604 (1, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #9698: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/605 (1, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #9699: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/606 (1, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #9700: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/607 (1, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #9701: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/608 (1, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #9702: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/609 (1, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #9703: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/610 (1, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #9704: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/611 (1, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #9705: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/612 (1, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #9706: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/613 (1, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #9707: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/614 (1, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #9708: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/615 (1, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #9709: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/616 (1, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #9710: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/617 (1, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #9711: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/618 (1, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #9712: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/619 (1, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #9713: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/620 (1, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #9714: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/621 (1, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #9715: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/622 (1, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #9716: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/623 (1, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #9717: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/624 (1, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #9718: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/625 (1, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #9719: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/626 (1, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #9720: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/627 (1, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #9721: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/628 (1, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #9722: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/629 (1, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #9723: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/630 (1, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #9724: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/631 (1, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #9725: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/632 (1, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #9726: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/633 (1, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #9727: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/634 (1, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #9728: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/635 (1, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #9729: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/636 (1, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #9730: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/637 (1, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #9731: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/638 (1, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #9732: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/639 (1, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #9733: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/640 (1, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #9734: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/641 (1, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #9735: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/642 (1, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #9736: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/643 (1, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #9737: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/644 (1, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #9738: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/645 (1, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #9739: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/646 (1, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #9740: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/647 (1, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #9741: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/648 (1, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #9742: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/649 (1, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #9743: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/650 (1, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #9744: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/651 (1, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #9745: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/652 (1, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #9746: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/653 (1, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #9747: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/654 (1, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #9748: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/655 (1, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #9749: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/656 (1, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #9750: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/657 (1, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #9751: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/658 (1, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #9752: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/659 (1, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #9753: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/660 (1, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #9754: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/661 (1, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #9755: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/662 (1, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #9756: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/663 (1, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #9757: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/664 (1, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #9758: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/665 (1, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #9759: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/666 (1, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #9760: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/667 (1, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #9761: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/668 (1, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #9762: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/669 (1, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #9763: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/670 (1, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #9764: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/671 (1, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #9765: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/672 (1, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #9766: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/673 (1, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #9767: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/674 (1, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #9768: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/675 (1, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #9769: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/676 (1, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #9770: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/677 (1, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #9771: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/678 (1, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #9772: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/679 (1, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #9773: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/680 (1, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #9774: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/681 (1, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #9775: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/682 (1, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #9776: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/683 (1, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #9777: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/684 (1, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #9778: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/685 (1, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #9779: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/686 (1, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #9780: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/687 (1, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #9781: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/688 (1, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #9782: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/689 (1, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #9783: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/690 (1, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #9784: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/691 (1, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #9785: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/692 (1, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #9786: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/693 (1, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #9787: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/694 (1, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #9788: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/695 (1, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #9789: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/696 (1, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #9790: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/697 (1, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #9791: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/698 (1, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #9792: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/699 (1, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #9793: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/700 (1, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #9794: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/701 (1, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #9795: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/702 (1, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #9796: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/703 (1, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #9797: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/704 (1, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #9798: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/705 (1, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #9799: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/706 (1, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #9800: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/707 (1, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #9801: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/708 (1, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #9802: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/709 (1, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #9803: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/710 (1, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #9804: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/711 (1, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #9805: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/712 (1, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #9806: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/713 (1, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #9807: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/714 (1, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #9808: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/715 (1, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #9809: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/716 (1, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #9810: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/717 (1, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #9811: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/718 (1, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #9812: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/719 (1, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #9813: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/720 (1, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #9814: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/721 (1, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #9815: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/722 (1, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #9816: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/723 (1, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #9817: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/724 (1, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #9818: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/725 (1, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #9819: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/726 (1, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #9820: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/727 (1, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #9821: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/728 (1, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #9822: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/729 (1, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #9823: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/730 (1, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #9824: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/731 (1, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #9825: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/732 (1, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #9826: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/733 (1, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #9827: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/734 (1, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #9828: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/735 (1, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #9829: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/736 (1, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #9830: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/737 (1, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #9831: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/738 (1, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #9832: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/739 (1, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #9833: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/740 (1, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #9834: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/741 (1, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #9835: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/742 (1, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #9836: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/743 (1, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #9837: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/744 (1, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #9838: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/745 (1, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #9839: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/746 (1, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #9840: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/747 (1, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #9841: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/748 (1, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #9842: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/749 (1, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #9843: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/750 (1, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #9844: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/751 (1, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #9845: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/752 (1, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #9846: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/753 (1, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #9847: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/754 (1, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #9848: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/755 (1, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #9849: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/756 (1, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #9850: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/757 (1, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #9851: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/758 (1, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #9852: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/759 (1, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #9853: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/760 (1, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #9854: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/761 (1, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #9855: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/762 (1, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #9856: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/763 (1, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #9857: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/764 (1, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #9858: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/765 (1, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #9859: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/766 (1, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #9860: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/767 (1, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #9861: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/768 (1, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #9862: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/769 (1, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #9863: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/770 (1, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #9864: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/771 (1, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #9865: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/772 (1, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #9866: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/773 (1, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #9867: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/774 (1, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #9868: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/775 (1, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #9869: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/776 (1, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #9870: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/777 (1, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #9871: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/778 (1, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #9872: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/779 (1, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #9873: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/780 (1, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #9874: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/781 (1, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #9875: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/782 (1, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #9876: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/783 (1, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #9877: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/784 (1, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #9878: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/785 (1, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #9879: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/786 (1, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #9880: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/787 (1, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #9881: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/788 (1, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #9882: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/789 (1, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #9883: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/790 (1, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #9884: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/791 (1, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #9885: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/792 (1, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #9886: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/793 (1, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #9887: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/794 (1, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #9888: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/795 (1, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #9889: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/796 (1, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #9890: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/797 (1, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #9891: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/798 (1, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #9892: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/799 (1, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #9893: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/800 (1, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #9894: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/801 (1, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #9895: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/802 (1, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #9896: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/803 (1, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #9897: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/804 (1, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #9898: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/805 (1, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #9899: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/806 (1, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #9900: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/807 (1, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #9901: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/808 (1, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #9902: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/809 (1, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #9903: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/810 (1, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #9904: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/811 (1, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #9905: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/812 (1, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #9906: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/813 (1, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #9907: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/814 (1, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #9908: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/815 (1, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #9909: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/816 (1, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #9910: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/817 (1, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #9911: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/818 (1, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #9912: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/819 (1, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #9913: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/820 (1, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #9914: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/821 (1, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #9915: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/822 (1, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #9916: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/823 (1, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #9917: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/824 (1, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #9918: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/825 (1, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #9919: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/826 (1, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #9920: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/827 (1, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #9921: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/828 (1, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #9922: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/829 (1, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #9923: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/830 (1, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #9924: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/831 (1, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #9925: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/832 (1, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #9926: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/833 (1, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #9927: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/834 (1, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #9928: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/835 (1, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #9929: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/836 (1, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #9930: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/837 (1, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #9931: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/838 (1, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #9932: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/839 (1, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #9933: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/840 (1, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #9934: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/841 (1, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #9935: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/842 (1, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #9936: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/843 (1, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #9937: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/844 (1, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #9938: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/845 (1, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #9939: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/846 (1, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #9940: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/847 (1, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #9941: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/848 (1, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #9942: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/849 (1, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #9943: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/850 (1, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #9944: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/851 (1, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #9945: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/852 (1, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #9946: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/853 (1, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #9947: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/854 (1, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #9948: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/855 (1, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #9949: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/856 (1, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #9950: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/857 (1, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #9951: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/858 (1, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #9952: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/859 (1, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #9953: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/860 (1, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #9954: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/861 (1, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #9955: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/862 (1, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #9956: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/863 (1, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #9957: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/864 (1, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #9958: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/865 (1, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #9959: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/866 (1, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #9960: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/867 (1, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #9961: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/868 (1, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #9962: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/869 (1, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #9963: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/870 (1, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #9964: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/871 (1, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #9965: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/872 (1, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #9966: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/873 (1, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #9967: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/874 (1, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #9968: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/875 (1, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #9969: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/876 (1, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #9970: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/877 (1, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #9971: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/878 (1, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #9972: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/879 (1, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #9973: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/880 (1, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #9974: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/881 (1, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #9975: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/882 (1, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #9976: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/883 (1, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #9977: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/884 (1, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #9978: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/885 (1, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #9979: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/886 (1, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #9980: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/887 (1, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #9981: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/888 (1, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #9982: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/889 (1, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #9983: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/890 (1, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #9984: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/891 (1, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #9985: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/892 (1, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #9986: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/893 (1, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #9987: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/894 (1, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #9988: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/895 (1, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #9989: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/896 (1, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #9990: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/897 (1, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #9991: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/898 (1, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #9992: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/899 (1, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #9993: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/900 (1, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #9994: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/901 (1, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #9995: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/902 (1, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #9996: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/903 (1, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #9997: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/904 (1, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #9998: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/905 (1, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #9999: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/906 (1, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #10000: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/907 (1, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #10001: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/908 (1, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #10002: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/909 (1, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #10003: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/910 (1, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #10004: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/911 (1, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #10005: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/912 (1, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #10006: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/913 (1, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #10007: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/914 (1, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #10008: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/915 (1, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #10009: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/916 (1, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #10010: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/917 (1, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #10011: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/918 (1, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #10012: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/919 (1, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #10013: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/920 (1, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #10014: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/921 (1, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #10015: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/922 (1, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #10016: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ResumeCipherSuite/923 (1, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #10017: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/0 (0, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #10018: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1 (0, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #10019: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/2 (0, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #10020: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/3 (0, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #10021: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/4 (0, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #10022: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/5 (0, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #10023: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/6 (0, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #10024: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/7 (0, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #10025: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/8 (0, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #10026: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/9 (0, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #10027: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/10 (0, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #10028: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/11 (0, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #10029: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/12 (0, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #10030: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/13 (0, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #10031: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/14 (0, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #10032: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/15 (0, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #10033: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/16 (0, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #10034: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/17 (0, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #10035: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/18 (0, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #10036: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/19 (0, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #10037: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/20 (0, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #10038: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/21 (0, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #10039: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/22 (0, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #10040: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/23 (0, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #10041: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/24 (0, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #10042: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/25 (0, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #10043: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/26 (0, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #10044: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/27 (0, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #10045: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/28 (0, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #10046: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/29 (0, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #10047: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/30 (0, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #10048: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/31 (0, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #10049: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/32 (0, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #10050: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/33 (0, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #10051: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/34 (0, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #10052: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/35 (0, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #10053: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/36 (0, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #10054: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/37 (0, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #10055: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/38 (0, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #10056: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/39 (0, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #10057: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/40 (0, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #10058: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/41 (0, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #10059: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/42 (0, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #10060: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/43 (0, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #10061: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/44 (0, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #10062: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/45 (0, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #10063: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/46 (0, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #10064: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/47 (0, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #10065: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/48 (0, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #10066: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/49 (0, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #10067: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/50 (0, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #10068: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/51 (0, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #10069: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/52 (0, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #10070: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/53 (0, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #10071: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/54 (0, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #10072: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/55 (0, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #10073: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/56 (0, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #10074: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/57 (0, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #10075: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/58 (0, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #10076: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/59 (0, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #10077: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/60 (0, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #10078: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/61 (0, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #10079: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/62 (0, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #10080: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/63 (0, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #10081: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/64 (0, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #10082: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/65 (0, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #10083: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/66 (0, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #10084: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/67 (0, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #10085: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/68 (0, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #10086: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/69 (0, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #10087: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/70 (0, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #10088: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/71 (0, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #10089: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/72 (0, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #10090: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/73 (0, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #10091: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/74 (0, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #10092: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/75 (0, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #10093: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/76 (0, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #10094: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/77 (0, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #10095: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/78 (0, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #10096: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/79 (0, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #10097: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/80 (0, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #10098: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/81 (0, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #10099: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/82 (0, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #10100: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/83 (0, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #10101: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/84 (0, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #10102: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/85 (0, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #10103: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/86 (0, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #10104: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/87 (0, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #10105: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/88 (0, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #10106: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/89 (0, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #10107: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/90 (0, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #10108: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/91 (0, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #10109: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/92 (0, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #10110: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/93 (0, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #10111: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/94 (0, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #10112: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/95 (0, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #10113: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/96 (0, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #10114: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/97 (0, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #10115: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/98 (0, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #10116: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/99 (0, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #10117: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/100 (0, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #10118: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/101 (0, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #10119: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/102 (0, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #10120: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/103 (0, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #10121: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/104 (0, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #10122: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/105 (0, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #10123: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/106 (0, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #10124: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/107 (0, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #10125: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/108 (0, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #10126: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/109 (0, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #10127: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/110 (0, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #10128: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/111 (0, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #10129: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/112 (0, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #10130: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/113 (0, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #10131: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/114 (0, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #10132: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/115 (0, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #10133: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/116 (0, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #10134: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/117 (0, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #10135: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/118 (0, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #10136: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/119 (0, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #10137: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/120 (0, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #10138: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/121 (0, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #10139: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/122 (0, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #10140: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/123 (0, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #10141: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/124 (0, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #10142: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/125 (0, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #10143: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/126 (0, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #10144: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/127 (0, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #10145: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/128 (0, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #10146: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/129 (0, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #10147: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/130 (0, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #10148: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/131 (0, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #10149: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/132 (0, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #10150: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/133 (0, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #10151: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/134 (0, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #10152: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/135 (0, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #10153: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/136 (0, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #10154: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/137 (0, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #10155: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/138 (0, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #10156: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/139 (0, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #10157: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/140 (0, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #10158: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/141 (0, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #10159: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/142 (0, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #10160: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/143 (0, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #10161: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/144 (0, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #10162: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/145 (0, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #10163: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/146 (0, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #10164: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/147 (0, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #10165: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/148 (0, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #10166: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/149 (0, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #10167: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/150 (0, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #10168: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/151 (0, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #10169: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/152 (0, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #10170: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/153 (0, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #10171: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/154 (0, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #10172: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/155 (0, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #10173: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/156 (0, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #10174: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/157 (0, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #10175: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/158 (0, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #10176: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/159 (0, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #10177: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/160 (0, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #10178: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/161 (0, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #10179: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/162 (0, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #10180: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/163 (0, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #10181: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/164 (0, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #10182: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/165 (0, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #10183: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/166 (0, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #10184: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/167 (0, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #10185: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/168 (0, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #10186: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/169 (0, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #10187: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/170 (0, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #10188: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/171 (0, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #10189: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/172 (0, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #10190: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/173 (0, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #10191: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/174 (0, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #10192: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/175 (0, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #10193: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/176 (0, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #10194: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/177 (0, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #10195: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/178 (0, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #10196: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/179 (0, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #10197: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/180 (0, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #10198: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/181 (0, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #10199: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/182 (0, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #10200: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/183 (0, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #10201: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/184 (0, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #10202: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/185 (0, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #10203: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/186 (0, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #10204: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/187 (0, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #10205: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/188 (0, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #10206: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/189 (0, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #10207: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/190 (0, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #10208: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/191 (0, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #10209: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/192 (0, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #10210: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/193 (0, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #10211: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/194 (0, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #10212: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/195 (0, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #10213: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/196 (0, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #10214: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/197 (0, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #10215: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/198 (0, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #10216: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/199 (0, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #10217: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/200 (0, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #10218: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/201 (0, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #10219: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/202 (0, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #10220: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/203 (0, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #10221: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/204 (0, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #10222: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/205 (0, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #10223: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/206 (0, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #10224: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/207 (0, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #10225: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/208 (0, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #10226: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/209 (0, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #10227: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/210 (0, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #10228: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/211 (0, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #10229: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/212 (0, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #10230: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/213 (0, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #10231: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/214 (0, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #10232: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/215 (0, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #10233: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/216 (0, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #10234: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/217 (0, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #10235: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/218 (0, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #10236: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/219 (0, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #10237: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/220 (0, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #10238: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/221 (0, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #10239: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/222 (0, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #10240: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/223 (0, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #10241: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/224 (0, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #10242: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/225 (0, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #10243: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/226 (0, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #10244: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/227 (0, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #10245: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/228 (0, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #10246: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/229 (0, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #10247: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/230 (0, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #10248: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/231 (0, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #10249: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/232 (0, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #10250: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/233 (0, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #10251: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/234 (0, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #10252: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/235 (0, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #10253: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/236 (0, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #10254: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/237 (0, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #10255: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/238 (0, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #10256: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/239 (0, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #10257: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/240 (0, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #10258: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/241 (0, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #10259: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/242 (0, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #10260: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/243 (0, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #10261: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/244 (0, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #10262: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/245 (0, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #10263: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/246 (0, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #10264: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/247 (0, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #10265: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/248 (0, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #10266: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/249 (0, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #10267: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/250 (0, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #10268: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/251 (0, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #10269: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/252 (0, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #10270: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/253 (0, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #10271: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/254 (0, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #10272: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/255 (0, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #10273: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/256 (0, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #10274: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/257 (0, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #10275: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/258 (0, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #10276: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/259 (0, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #10277: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/260 (0, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #10278: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/261 (0, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #10279: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/262 (0, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #10280: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/263 (0, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #10281: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/264 (0, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #10282: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/265 (0, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #10283: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/266 (0, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #10284: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/267 (0, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #10285: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/268 (0, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #10286: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/269 (0, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #10287: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/270 (0, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #10288: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/271 (0, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #10289: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/272 (0, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #10290: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/273 (0, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #10291: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/274 (0, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #10292: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/275 (0, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #10293: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/276 (0, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #10294: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/277 (0, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #10295: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/278 (0, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #10296: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/279 (0, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #10297: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/280 (0, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #10298: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/281 (0, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #10299: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/282 (0, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #10300: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/283 (0, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #10301: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/284 (0, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #10302: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/285 (0, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #10303: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/286 (0, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #10304: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/287 (0, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #10305: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/288 (0, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #10306: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/289 (0, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #10307: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/290 (0, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #10308: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/291 (0, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #10309: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/292 (0, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #10310: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/293 (0, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #10311: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/294 (0, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #10312: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/295 (0, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #10313: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/296 (0, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #10314: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/297 (0, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #10315: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/298 (0, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #10316: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/299 (0, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #10317: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/300 (0, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #10318: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/301 (0, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #10319: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/302 (0, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #10320: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/303 (0, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #10321: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/304 (0, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #10322: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/305 (0, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #10323: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/306 (0, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #10324: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/307 (0, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #10325: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/308 (0, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #10326: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/309 (0, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #10327: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/310 (0, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #10328: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/311 (0, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #10329: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/312 (0, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #10330: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/313 (0, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #10331: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/314 (0, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #10332: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/315 (0, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #10333: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/316 (0, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #10334: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/317 (0, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #10335: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/318 (0, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #10336: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/319 (0, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #10337: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/320 (0, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #10338: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/321 (0, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #10339: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/322 (0, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #10340: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/323 (0, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #10341: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/324 (0, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #10342: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/325 (0, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #10343: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/326 (0, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #10344: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/327 (0, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #10345: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/328 (0, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #10346: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/329 (0, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #10347: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/330 (0, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #10348: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/331 (0, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #10349: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/332 (0, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #10350: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/333 (0, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #10351: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/334 (0, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #10352: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/335 (0, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #10353: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/336 (0, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #10354: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/337 (0, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #10355: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/338 (0, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #10356: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/339 (0, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #10357: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/340 (0, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #10358: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/341 (0, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #10359: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/342 (0, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #10360: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/343 (0, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #10361: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/344 (0, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #10362: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/345 (0, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #10363: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/346 (0, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #10364: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/347 (0, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #10365: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/348 (0, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #10366: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/349 (0, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #10367: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/350 (0, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #10368: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/351 (0, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #10369: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/352 (0, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #10370: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/353 (0, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #10371: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/354 (0, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #10372: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/355 (0, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #10373: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/356 (0, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #10374: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/357 (0, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #10375: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/358 (0, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #10376: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/359 (0, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #10377: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/360 (0, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #10378: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/361 (0, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #10379: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/362 (0, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #10380: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/363 (0, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #10381: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/364 (0, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #10382: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/365 (0, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #10383: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/366 (0, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #10384: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/367 (0, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #10385: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/368 (0, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #10386: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/369 (0, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #10387: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/370 (0, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #10388: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/371 (0, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #10389: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/372 (0, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #10390: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/373 (0, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #10391: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/374 (0, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #10392: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/375 (0, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #10393: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/376 (0, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #10394: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/377 (0, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #10395: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/378 (0, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #10396: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/379 (0, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #10397: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/380 (0, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #10398: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/381 (0, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #10399: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/382 (0, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #10400: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/383 (0, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #10401: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/384 (0, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #10402: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/385 (0, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #10403: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/386 (0, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #10404: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/387 (0, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #10405: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/388 (0, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #10406: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/389 (0, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #10407: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/390 (0, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #10408: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/391 (0, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #10409: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/392 (0, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #10410: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/393 (0, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #10411: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/394 (0, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #10412: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/395 (0, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #10413: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/396 (0, 771, 64, 29, 1025)' - PASSED ssl_gtest.sh: #10414: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/397 (0, 771, 64, 29, 1281)' - PASSED ssl_gtest.sh: #10415: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/398 (0, 771, 64, 29, 1537)' - PASSED ssl_gtest.sh: #10416: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/399 (0, 771, 64, 29, 1027)' - PASSED ssl_gtest.sh: #10417: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/400 (0, 771, 64, 29, 1283)' - PASSED ssl_gtest.sh: #10418: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/401 (0, 771, 64, 29, 2052)' - PASSED ssl_gtest.sh: #10419: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/402 (0, 771, 64, 29, 2053)' - PASSED ssl_gtest.sh: #10420: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/403 (0, 771, 64, 29, 2054)' - PASSED ssl_gtest.sh: #10421: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/404 (0, 771, 64, 29, 2057)' - PASSED ssl_gtest.sh: #10422: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/405 (0, 771, 64, 29, 2058)' - PASSED ssl_gtest.sh: #10423: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/406 (0, 771, 64, 29, 2059)' - PASSED ssl_gtest.sh: #10424: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/407 (0, 771, 64, 23, 1025)' - PASSED ssl_gtest.sh: #10425: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/408 (0, 771, 64, 23, 1281)' - PASSED ssl_gtest.sh: #10426: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/409 (0, 771, 64, 23, 1537)' - PASSED ssl_gtest.sh: #10427: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/410 (0, 771, 64, 23, 1027)' - PASSED ssl_gtest.sh: #10428: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/411 (0, 771, 64, 23, 1283)' - PASSED ssl_gtest.sh: #10429: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/412 (0, 771, 64, 23, 2052)' - PASSED ssl_gtest.sh: #10430: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/413 (0, 771, 64, 23, 2053)' - PASSED ssl_gtest.sh: #10431: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/414 (0, 771, 64, 23, 2054)' - PASSED ssl_gtest.sh: #10432: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/415 (0, 771, 64, 23, 2057)' - PASSED ssl_gtest.sh: #10433: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/416 (0, 771, 64, 23, 2058)' - PASSED ssl_gtest.sh: #10434: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/417 (0, 771, 64, 23, 2059)' - PASSED ssl_gtest.sh: #10435: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/418 (0, 771, 64, 24, 1025)' - PASSED ssl_gtest.sh: #10436: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/419 (0, 771, 64, 24, 1281)' - PASSED ssl_gtest.sh: #10437: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/420 (0, 771, 64, 24, 1537)' - PASSED ssl_gtest.sh: #10438: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/421 (0, 771, 64, 24, 1027)' - PASSED ssl_gtest.sh: #10439: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/422 (0, 771, 64, 24, 1283)' - PASSED ssl_gtest.sh: #10440: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/423 (0, 771, 64, 24, 2052)' - PASSED ssl_gtest.sh: #10441: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/424 (0, 771, 64, 24, 2053)' - PASSED ssl_gtest.sh: #10442: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/425 (0, 771, 64, 24, 2054)' - PASSED ssl_gtest.sh: #10443: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/426 (0, 771, 64, 24, 2057)' - PASSED ssl_gtest.sh: #10444: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/427 (0, 771, 64, 24, 2058)' - PASSED ssl_gtest.sh: #10445: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/428 (0, 771, 64, 24, 2059)' - PASSED ssl_gtest.sh: #10446: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/429 (0, 771, 64, 256, 1025)' - PASSED ssl_gtest.sh: #10447: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/430 (0, 771, 64, 256, 1281)' - PASSED ssl_gtest.sh: #10448: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/431 (0, 771, 64, 256, 1537)' - PASSED ssl_gtest.sh: #10449: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/432 (0, 771, 64, 256, 1027)' - PASSED ssl_gtest.sh: #10450: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/433 (0, 771, 64, 256, 1283)' - PASSED ssl_gtest.sh: #10451: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/434 (0, 771, 64, 256, 2052)' - PASSED ssl_gtest.sh: #10452: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/435 (0, 771, 64, 256, 2053)' - PASSED ssl_gtest.sh: #10453: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/436 (0, 771, 64, 256, 2054)' - PASSED ssl_gtest.sh: #10454: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/437 (0, 771, 64, 256, 2057)' - PASSED ssl_gtest.sh: #10455: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/438 (0, 771, 64, 256, 2058)' - PASSED ssl_gtest.sh: #10456: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/439 (0, 771, 64, 256, 2059)' - PASSED ssl_gtest.sh: #10457: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/440 (0, 771, 64, 257, 1025)' - PASSED ssl_gtest.sh: #10458: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/441 (0, 771, 64, 257, 1281)' - PASSED ssl_gtest.sh: #10459: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/442 (0, 771, 64, 257, 1537)' - PASSED ssl_gtest.sh: #10460: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/443 (0, 771, 64, 257, 1027)' - PASSED ssl_gtest.sh: #10461: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/444 (0, 771, 64, 257, 1283)' - PASSED ssl_gtest.sh: #10462: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/445 (0, 771, 64, 257, 2052)' - PASSED ssl_gtest.sh: #10463: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/446 (0, 771, 64, 257, 2053)' - PASSED ssl_gtest.sh: #10464: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/447 (0, 771, 64, 257, 2054)' - PASSED ssl_gtest.sh: #10465: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/448 (0, 771, 64, 257, 2057)' - PASSED ssl_gtest.sh: #10466: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/449 (0, 771, 64, 257, 2058)' - PASSED ssl_gtest.sh: #10467: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/450 (0, 771, 64, 257, 2059)' - PASSED ssl_gtest.sh: #10468: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/451 (0, 771, 64, 25497, 1025)' - PASSED ssl_gtest.sh: #10469: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/452 (0, 771, 64, 25497, 1281)' - PASSED ssl_gtest.sh: #10470: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/453 (0, 771, 64, 25497, 1537)' - PASSED ssl_gtest.sh: #10471: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/454 (0, 771, 64, 25497, 1027)' - PASSED ssl_gtest.sh: #10472: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/455 (0, 771, 64, 25497, 1283)' - PASSED ssl_gtest.sh: #10473: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/456 (0, 771, 64, 25497, 2052)' - PASSED ssl_gtest.sh: #10474: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/457 (0, 771, 64, 25497, 2053)' - PASSED ssl_gtest.sh: #10475: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/458 (0, 771, 64, 25497, 2054)' - PASSED ssl_gtest.sh: #10476: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/459 (0, 771, 64, 25497, 2057)' - PASSED ssl_gtest.sh: #10477: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/460 (0, 771, 64, 25497, 2058)' - PASSED ssl_gtest.sh: #10478: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/461 (0, 771, 64, 25497, 2059)' - PASSED ssl_gtest.sh: #10479: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/462 (0, 771, 106, 29, 1025)' - PASSED ssl_gtest.sh: #10480: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/463 (0, 771, 106, 29, 1281)' - PASSED ssl_gtest.sh: #10481: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/464 (0, 771, 106, 29, 1537)' - PASSED ssl_gtest.sh: #10482: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/465 (0, 771, 106, 29, 1027)' - PASSED ssl_gtest.sh: #10483: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/466 (0, 771, 106, 29, 1283)' - PASSED ssl_gtest.sh: #10484: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/467 (0, 771, 106, 29, 2052)' - PASSED ssl_gtest.sh: #10485: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/468 (0, 771, 106, 29, 2053)' - PASSED ssl_gtest.sh: #10486: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/469 (0, 771, 106, 29, 2054)' - PASSED ssl_gtest.sh: #10487: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/470 (0, 771, 106, 29, 2057)' - PASSED ssl_gtest.sh: #10488: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/471 (0, 771, 106, 29, 2058)' - PASSED ssl_gtest.sh: #10489: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/472 (0, 771, 106, 29, 2059)' - PASSED ssl_gtest.sh: #10490: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/473 (0, 771, 106, 23, 1025)' - PASSED ssl_gtest.sh: #10491: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/474 (0, 771, 106, 23, 1281)' - PASSED ssl_gtest.sh: #10492: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/475 (0, 771, 106, 23, 1537)' - PASSED ssl_gtest.sh: #10493: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/476 (0, 771, 106, 23, 1027)' - PASSED ssl_gtest.sh: #10494: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/477 (0, 771, 106, 23, 1283)' - PASSED ssl_gtest.sh: #10495: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/478 (0, 771, 106, 23, 2052)' - PASSED ssl_gtest.sh: #10496: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/479 (0, 771, 106, 23, 2053)' - PASSED ssl_gtest.sh: #10497: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/480 (0, 771, 106, 23, 2054)' - PASSED ssl_gtest.sh: #10498: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/481 (0, 771, 106, 23, 2057)' - PASSED ssl_gtest.sh: #10499: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/482 (0, 771, 106, 23, 2058)' - PASSED ssl_gtest.sh: #10500: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/483 (0, 771, 106, 23, 2059)' - PASSED ssl_gtest.sh: #10501: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/484 (0, 771, 106, 24, 1025)' - PASSED ssl_gtest.sh: #10502: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/485 (0, 771, 106, 24, 1281)' - PASSED ssl_gtest.sh: #10503: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/486 (0, 771, 106, 24, 1537)' - PASSED ssl_gtest.sh: #10504: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/487 (0, 771, 106, 24, 1027)' - PASSED ssl_gtest.sh: #10505: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/488 (0, 771, 106, 24, 1283)' - PASSED ssl_gtest.sh: #10506: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/489 (0, 771, 106, 24, 2052)' - PASSED ssl_gtest.sh: #10507: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/490 (0, 771, 106, 24, 2053)' - PASSED ssl_gtest.sh: #10508: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/491 (0, 771, 106, 24, 2054)' - PASSED ssl_gtest.sh: #10509: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/492 (0, 771, 106, 24, 2057)' - PASSED ssl_gtest.sh: #10510: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/493 (0, 771, 106, 24, 2058)' - PASSED ssl_gtest.sh: #10511: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/494 (0, 771, 106, 24, 2059)' - PASSED ssl_gtest.sh: #10512: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/495 (0, 771, 106, 256, 1025)' - PASSED ssl_gtest.sh: #10513: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/496 (0, 771, 106, 256, 1281)' - PASSED ssl_gtest.sh: #10514: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/497 (0, 771, 106, 256, 1537)' - PASSED ssl_gtest.sh: #10515: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/498 (0, 771, 106, 256, 1027)' - PASSED ssl_gtest.sh: #10516: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/499 (0, 771, 106, 256, 1283)' - PASSED ssl_gtest.sh: #10517: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/500 (0, 771, 106, 256, 2052)' - PASSED ssl_gtest.sh: #10518: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/501 (0, 771, 106, 256, 2053)' - PASSED ssl_gtest.sh: #10519: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/502 (0, 771, 106, 256, 2054)' - PASSED ssl_gtest.sh: #10520: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/503 (0, 771, 106, 256, 2057)' - PASSED ssl_gtest.sh: #10521: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/504 (0, 771, 106, 256, 2058)' - PASSED ssl_gtest.sh: #10522: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/505 (0, 771, 106, 256, 2059)' - PASSED ssl_gtest.sh: #10523: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/506 (0, 771, 106, 257, 1025)' - PASSED ssl_gtest.sh: #10524: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/507 (0, 771, 106, 257, 1281)' - PASSED ssl_gtest.sh: #10525: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/508 (0, 771, 106, 257, 1537)' - PASSED ssl_gtest.sh: #10526: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/509 (0, 771, 106, 257, 1027)' - PASSED ssl_gtest.sh: #10527: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/510 (0, 771, 106, 257, 1283)' - PASSED ssl_gtest.sh: #10528: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/511 (0, 771, 106, 257, 2052)' - PASSED ssl_gtest.sh: #10529: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/512 (0, 771, 106, 257, 2053)' - PASSED ssl_gtest.sh: #10530: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/513 (0, 771, 106, 257, 2054)' - PASSED ssl_gtest.sh: #10531: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/514 (0, 771, 106, 257, 2057)' - PASSED ssl_gtest.sh: #10532: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/515 (0, 771, 106, 257, 2058)' - PASSED ssl_gtest.sh: #10533: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/516 (0, 771, 106, 257, 2059)' - PASSED ssl_gtest.sh: #10534: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/517 (0, 771, 106, 25497, 1025)' - PASSED ssl_gtest.sh: #10535: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/518 (0, 771, 106, 25497, 1281)' - PASSED ssl_gtest.sh: #10536: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/519 (0, 771, 106, 25497, 1537)' - PASSED ssl_gtest.sh: #10537: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/520 (0, 771, 106, 25497, 1027)' - PASSED ssl_gtest.sh: #10538: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/521 (0, 771, 106, 25497, 1283)' - PASSED ssl_gtest.sh: #10539: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/522 (0, 771, 106, 25497, 2052)' - PASSED ssl_gtest.sh: #10540: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/523 (0, 771, 106, 25497, 2053)' - PASSED ssl_gtest.sh: #10541: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/524 (0, 771, 106, 25497, 2054)' - PASSED ssl_gtest.sh: #10542: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/525 (0, 771, 106, 25497, 2057)' - PASSED ssl_gtest.sh: #10543: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/526 (0, 771, 106, 25497, 2058)' - PASSED ssl_gtest.sh: #10544: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/527 (0, 771, 106, 25497, 2059)' - PASSED ssl_gtest.sh: #10545: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/528 (1, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #10546: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/529 (1, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #10547: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/530 (1, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #10548: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/531 (1, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #10549: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/532 (1, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #10550: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/533 (1, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #10551: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/534 (1, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #10552: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/535 (1, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #10553: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/536 (1, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #10554: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/537 (1, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #10555: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/538 (1, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #10556: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/539 (1, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #10557: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/540 (1, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #10558: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/541 (1, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #10559: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/542 (1, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #10560: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/543 (1, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #10561: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/544 (1, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #10562: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/545 (1, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #10563: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/546 (1, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #10564: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/547 (1, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #10565: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/548 (1, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #10566: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/549 (1, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #10567: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/550 (1, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #10568: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/551 (1, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #10569: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/552 (1, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #10570: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/553 (1, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #10571: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/554 (1, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #10572: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/555 (1, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #10573: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/556 (1, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #10574: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/557 (1, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #10575: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/558 (1, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #10576: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/559 (1, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #10577: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/560 (1, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #10578: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/561 (1, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #10579: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/562 (1, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #10580: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/563 (1, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #10581: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/564 (1, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #10582: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/565 (1, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #10583: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/566 (1, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #10584: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/567 (1, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #10585: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/568 (1, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #10586: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/569 (1, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #10587: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/570 (1, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #10588: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/571 (1, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #10589: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/572 (1, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #10590: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/573 (1, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #10591: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/574 (1, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #10592: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/575 (1, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #10593: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/576 (1, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #10594: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/577 (1, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #10595: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/578 (1, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #10596: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/579 (1, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #10597: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/580 (1, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #10598: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/581 (1, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #10599: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/582 (1, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #10600: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/583 (1, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #10601: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/584 (1, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #10602: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/585 (1, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #10603: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/586 (1, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #10604: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/587 (1, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #10605: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/588 (1, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #10606: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/589 (1, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #10607: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/590 (1, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #10608: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/591 (1, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #10609: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/592 (1, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #10610: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/593 (1, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #10611: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/594 (1, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #10612: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/595 (1, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #10613: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/596 (1, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #10614: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/597 (1, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #10615: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/598 (1, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #10616: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/599 (1, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #10617: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/600 (1, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #10618: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/601 (1, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #10619: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/602 (1, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #10620: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/603 (1, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #10621: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/604 (1, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #10622: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/605 (1, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #10623: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/606 (1, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #10624: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/607 (1, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #10625: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/608 (1, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #10626: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/609 (1, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #10627: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/610 (1, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #10628: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/611 (1, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #10629: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/612 (1, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #10630: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/613 (1, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #10631: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/614 (1, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #10632: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/615 (1, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #10633: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/616 (1, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #10634: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/617 (1, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #10635: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/618 (1, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #10636: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/619 (1, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #10637: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/620 (1, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #10638: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/621 (1, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #10639: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/622 (1, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #10640: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/623 (1, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #10641: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/624 (1, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #10642: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/625 (1, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #10643: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/626 (1, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #10644: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/627 (1, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #10645: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/628 (1, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #10646: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/629 (1, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #10647: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/630 (1, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #10648: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/631 (1, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #10649: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/632 (1, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #10650: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/633 (1, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #10651: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/634 (1, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #10652: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/635 (1, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #10653: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/636 (1, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #10654: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/637 (1, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #10655: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/638 (1, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #10656: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/639 (1, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #10657: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/640 (1, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #10658: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/641 (1, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #10659: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/642 (1, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #10660: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/643 (1, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #10661: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/644 (1, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #10662: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/645 (1, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #10663: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/646 (1, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #10664: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/647 (1, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #10665: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/648 (1, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #10666: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/649 (1, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #10667: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/650 (1, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #10668: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/651 (1, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #10669: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/652 (1, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #10670: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/653 (1, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #10671: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/654 (1, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #10672: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/655 (1, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #10673: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/656 (1, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #10674: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/657 (1, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #10675: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/658 (1, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #10676: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/659 (1, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #10677: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/660 (1, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #10678: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/661 (1, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #10679: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/662 (1, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #10680: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/663 (1, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #10681: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/664 (1, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #10682: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/665 (1, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #10683: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/666 (1, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #10684: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/667 (1, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #10685: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/668 (1, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #10686: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/669 (1, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #10687: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/670 (1, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #10688: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/671 (1, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #10689: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/672 (1, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #10690: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/673 (1, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #10691: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/674 (1, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #10692: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/675 (1, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #10693: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/676 (1, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #10694: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/677 (1, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #10695: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/678 (1, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #10696: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/679 (1, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #10697: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/680 (1, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #10698: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/681 (1, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #10699: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/682 (1, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #10700: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/683 (1, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #10701: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/684 (1, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #10702: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/685 (1, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #10703: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/686 (1, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #10704: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/687 (1, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #10705: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/688 (1, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #10706: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/689 (1, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #10707: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/690 (1, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #10708: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/691 (1, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #10709: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/692 (1, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #10710: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/693 (1, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #10711: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/694 (1, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #10712: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/695 (1, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #10713: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/696 (1, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #10714: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/697 (1, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #10715: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/698 (1, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #10716: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/699 (1, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #10717: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/700 (1, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #10718: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/701 (1, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #10719: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/702 (1, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #10720: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/703 (1, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #10721: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/704 (1, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #10722: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/705 (1, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #10723: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/706 (1, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #10724: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/707 (1, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #10725: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/708 (1, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #10726: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/709 (1, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #10727: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/710 (1, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #10728: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/711 (1, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #10729: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/712 (1, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #10730: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/713 (1, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #10731: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/714 (1, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #10732: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/715 (1, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #10733: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/716 (1, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #10734: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/717 (1, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #10735: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/718 (1, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #10736: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/719 (1, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #10737: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/720 (1, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #10738: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/721 (1, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #10739: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/722 (1, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #10740: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/723 (1, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #10741: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/724 (1, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #10742: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/725 (1, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #10743: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/726 (1, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #10744: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/727 (1, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #10745: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/728 (1, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #10746: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/729 (1, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #10747: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/730 (1, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #10748: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/731 (1, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #10749: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/732 (1, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #10750: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/733 (1, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #10751: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/734 (1, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #10752: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/735 (1, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #10753: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/736 (1, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #10754: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/737 (1, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #10755: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/738 (1, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #10756: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/739 (1, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #10757: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/740 (1, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #10758: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/741 (1, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #10759: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/742 (1, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #10760: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/743 (1, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #10761: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/744 (1, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #10762: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/745 (1, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #10763: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/746 (1, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #10764: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/747 (1, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #10765: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/748 (1, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #10766: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/749 (1, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #10767: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/750 (1, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #10768: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/751 (1, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #10769: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/752 (1, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #10770: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/753 (1, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #10771: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/754 (1, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #10772: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/755 (1, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #10773: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/756 (1, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #10774: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/757 (1, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #10775: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/758 (1, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #10776: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/759 (1, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #10777: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/760 (1, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #10778: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/761 (1, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #10779: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/762 (1, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #10780: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/763 (1, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #10781: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/764 (1, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #10782: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/765 (1, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #10783: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/766 (1, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #10784: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/767 (1, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #10785: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/768 (1, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #10786: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/769 (1, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #10787: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/770 (1, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #10788: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/771 (1, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #10789: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/772 (1, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #10790: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/773 (1, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #10791: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/774 (1, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #10792: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/775 (1, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #10793: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/776 (1, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #10794: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/777 (1, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #10795: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/778 (1, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #10796: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/779 (1, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #10797: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/780 (1, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #10798: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/781 (1, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #10799: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/782 (1, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #10800: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/783 (1, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #10801: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/784 (1, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #10802: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/785 (1, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #10803: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/786 (1, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #10804: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/787 (1, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #10805: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/788 (1, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #10806: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/789 (1, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #10807: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/790 (1, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #10808: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/791 (1, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #10809: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/792 (1, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #10810: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/793 (1, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #10811: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/794 (1, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #10812: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/795 (1, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #10813: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/796 (1, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #10814: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/797 (1, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #10815: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/798 (1, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #10816: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/799 (1, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #10817: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/800 (1, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #10818: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/801 (1, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #10819: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/802 (1, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #10820: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/803 (1, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #10821: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/804 (1, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #10822: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/805 (1, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #10823: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/806 (1, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #10824: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/807 (1, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #10825: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/808 (1, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #10826: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/809 (1, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #10827: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/810 (1, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #10828: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/811 (1, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #10829: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/812 (1, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #10830: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/813 (1, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #10831: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/814 (1, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #10832: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/815 (1, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #10833: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/816 (1, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #10834: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/817 (1, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #10835: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/818 (1, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #10836: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/819 (1, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #10837: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/820 (1, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #10838: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/821 (1, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #10839: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/822 (1, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #10840: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/823 (1, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #10841: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/824 (1, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #10842: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/825 (1, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #10843: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/826 (1, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #10844: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/827 (1, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #10845: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/828 (1, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #10846: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/829 (1, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #10847: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/830 (1, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #10848: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/831 (1, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #10849: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/832 (1, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #10850: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/833 (1, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #10851: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/834 (1, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #10852: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/835 (1, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #10853: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/836 (1, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #10854: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/837 (1, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #10855: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/838 (1, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #10856: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/839 (1, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #10857: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/840 (1, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #10858: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/841 (1, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #10859: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/842 (1, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #10860: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/843 (1, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #10861: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/844 (1, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #10862: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/845 (1, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #10863: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/846 (1, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #10864: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/847 (1, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #10865: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/848 (1, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #10866: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/849 (1, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #10867: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/850 (1, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #10868: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/851 (1, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #10869: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/852 (1, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #10870: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/853 (1, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #10871: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/854 (1, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #10872: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/855 (1, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #10873: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/856 (1, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #10874: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/857 (1, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #10875: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/858 (1, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #10876: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/859 (1, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #10877: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/860 (1, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #10878: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/861 (1, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #10879: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/862 (1, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #10880: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/863 (1, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #10881: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/864 (1, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #10882: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/865 (1, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #10883: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/866 (1, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #10884: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/867 (1, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #10885: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/868 (1, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #10886: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/869 (1, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #10887: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/870 (1, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #10888: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/871 (1, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #10889: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/872 (1, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #10890: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/873 (1, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #10891: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/874 (1, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #10892: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/875 (1, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #10893: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/876 (1, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #10894: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/877 (1, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #10895: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/878 (1, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #10896: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/879 (1, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #10897: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/880 (1, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #10898: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/881 (1, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #10899: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/882 (1, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #10900: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/883 (1, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #10901: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/884 (1, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #10902: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/885 (1, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #10903: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/886 (1, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #10904: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/887 (1, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #10905: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/888 (1, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #10906: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/889 (1, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #10907: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/890 (1, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #10908: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/891 (1, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #10909: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/892 (1, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #10910: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/893 (1, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #10911: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/894 (1, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #10912: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/895 (1, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #10913: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/896 (1, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #10914: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/897 (1, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #10915: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/898 (1, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #10916: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/899 (1, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #10917: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/900 (1, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #10918: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/901 (1, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #10919: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/902 (1, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #10920: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/903 (1, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #10921: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/904 (1, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #10922: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/905 (1, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #10923: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/906 (1, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #10924: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/907 (1, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #10925: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/908 (1, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #10926: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/909 (1, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #10927: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/910 (1, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #10928: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/911 (1, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #10929: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/912 (1, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #10930: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/913 (1, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #10931: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/914 (1, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #10932: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/915 (1, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #10933: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/916 (1, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #10934: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/917 (1, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #10935: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/918 (1, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #10936: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/919 (1, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #10937: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/920 (1, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #10938: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/921 (1, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #10939: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/922 (1, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #10940: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/923 (1, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #10941: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/924 (1, 771, 64, 29, 1025)' - PASSED ssl_gtest.sh: #10942: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/925 (1, 771, 64, 29, 1281)' - PASSED ssl_gtest.sh: #10943: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/926 (1, 771, 64, 29, 1537)' - PASSED ssl_gtest.sh: #10944: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/927 (1, 771, 64, 29, 1027)' - PASSED ssl_gtest.sh: #10945: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/928 (1, 771, 64, 29, 1283)' - PASSED ssl_gtest.sh: #10946: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/929 (1, 771, 64, 29, 2052)' - PASSED ssl_gtest.sh: #10947: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/930 (1, 771, 64, 29, 2053)' - PASSED ssl_gtest.sh: #10948: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/931 (1, 771, 64, 29, 2054)' - PASSED ssl_gtest.sh: #10949: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/932 (1, 771, 64, 29, 2057)' - PASSED ssl_gtest.sh: #10950: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/933 (1, 771, 64, 29, 2058)' - PASSED ssl_gtest.sh: #10951: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/934 (1, 771, 64, 29, 2059)' - PASSED ssl_gtest.sh: #10952: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/935 (1, 771, 64, 23, 1025)' - PASSED ssl_gtest.sh: #10953: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/936 (1, 771, 64, 23, 1281)' - PASSED ssl_gtest.sh: #10954: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/937 (1, 771, 64, 23, 1537)' - PASSED ssl_gtest.sh: #10955: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/938 (1, 771, 64, 23, 1027)' - PASSED ssl_gtest.sh: #10956: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/939 (1, 771, 64, 23, 1283)' - PASSED ssl_gtest.sh: #10957: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/940 (1, 771, 64, 23, 2052)' - PASSED ssl_gtest.sh: #10958: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/941 (1, 771, 64, 23, 2053)' - PASSED ssl_gtest.sh: #10959: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/942 (1, 771, 64, 23, 2054)' - PASSED ssl_gtest.sh: #10960: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/943 (1, 771, 64, 23, 2057)' - PASSED ssl_gtest.sh: #10961: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/944 (1, 771, 64, 23, 2058)' - PASSED ssl_gtest.sh: #10962: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/945 (1, 771, 64, 23, 2059)' - PASSED ssl_gtest.sh: #10963: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/946 (1, 771, 64, 24, 1025)' - PASSED ssl_gtest.sh: #10964: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/947 (1, 771, 64, 24, 1281)' - PASSED ssl_gtest.sh: #10965: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/948 (1, 771, 64, 24, 1537)' - PASSED ssl_gtest.sh: #10966: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/949 (1, 771, 64, 24, 1027)' - PASSED ssl_gtest.sh: #10967: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/950 (1, 771, 64, 24, 1283)' - PASSED ssl_gtest.sh: #10968: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/951 (1, 771, 64, 24, 2052)' - PASSED ssl_gtest.sh: #10969: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/952 (1, 771, 64, 24, 2053)' - PASSED ssl_gtest.sh: #10970: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/953 (1, 771, 64, 24, 2054)' - PASSED ssl_gtest.sh: #10971: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/954 (1, 771, 64, 24, 2057)' - PASSED ssl_gtest.sh: #10972: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/955 (1, 771, 64, 24, 2058)' - PASSED ssl_gtest.sh: #10973: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/956 (1, 771, 64, 24, 2059)' - PASSED ssl_gtest.sh: #10974: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/957 (1, 771, 64, 256, 1025)' - PASSED ssl_gtest.sh: #10975: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/958 (1, 771, 64, 256, 1281)' - PASSED ssl_gtest.sh: #10976: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/959 (1, 771, 64, 256, 1537)' - PASSED ssl_gtest.sh: #10977: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/960 (1, 771, 64, 256, 1027)' - PASSED ssl_gtest.sh: #10978: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/961 (1, 771, 64, 256, 1283)' - PASSED ssl_gtest.sh: #10979: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/962 (1, 771, 64, 256, 2052)' - PASSED ssl_gtest.sh: #10980: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/963 (1, 771, 64, 256, 2053)' - PASSED ssl_gtest.sh: #10981: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/964 (1, 771, 64, 256, 2054)' - PASSED ssl_gtest.sh: #10982: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/965 (1, 771, 64, 256, 2057)' - PASSED ssl_gtest.sh: #10983: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/966 (1, 771, 64, 256, 2058)' - PASSED ssl_gtest.sh: #10984: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/967 (1, 771, 64, 256, 2059)' - PASSED ssl_gtest.sh: #10985: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/968 (1, 771, 64, 257, 1025)' - PASSED ssl_gtest.sh: #10986: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/969 (1, 771, 64, 257, 1281)' - PASSED ssl_gtest.sh: #10987: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/970 (1, 771, 64, 257, 1537)' - PASSED ssl_gtest.sh: #10988: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/971 (1, 771, 64, 257, 1027)' - PASSED ssl_gtest.sh: #10989: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/972 (1, 771, 64, 257, 1283)' - PASSED ssl_gtest.sh: #10990: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/973 (1, 771, 64, 257, 2052)' - PASSED ssl_gtest.sh: #10991: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/974 (1, 771, 64, 257, 2053)' - PASSED ssl_gtest.sh: #10992: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/975 (1, 771, 64, 257, 2054)' - PASSED ssl_gtest.sh: #10993: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/976 (1, 771, 64, 257, 2057)' - PASSED ssl_gtest.sh: #10994: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/977 (1, 771, 64, 257, 2058)' - PASSED ssl_gtest.sh: #10995: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/978 (1, 771, 64, 257, 2059)' - PASSED ssl_gtest.sh: #10996: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/979 (1, 771, 64, 25497, 1025)' - PASSED ssl_gtest.sh: #10997: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/980 (1, 771, 64, 25497, 1281)' - PASSED ssl_gtest.sh: #10998: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/981 (1, 771, 64, 25497, 1537)' - PASSED ssl_gtest.sh: #10999: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/982 (1, 771, 64, 25497, 1027)' - PASSED ssl_gtest.sh: #11000: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/983 (1, 771, 64, 25497, 1283)' - PASSED ssl_gtest.sh: #11001: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/984 (1, 771, 64, 25497, 2052)' - PASSED ssl_gtest.sh: #11002: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/985 (1, 771, 64, 25497, 2053)' - PASSED ssl_gtest.sh: #11003: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/986 (1, 771, 64, 25497, 2054)' - PASSED ssl_gtest.sh: #11004: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/987 (1, 771, 64, 25497, 2057)' - PASSED ssl_gtest.sh: #11005: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/988 (1, 771, 64, 25497, 2058)' - PASSED ssl_gtest.sh: #11006: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/989 (1, 771, 64, 25497, 2059)' - PASSED ssl_gtest.sh: #11007: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/990 (1, 771, 106, 29, 1025)' - PASSED ssl_gtest.sh: #11008: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/991 (1, 771, 106, 29, 1281)' - PASSED ssl_gtest.sh: #11009: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/992 (1, 771, 106, 29, 1537)' - PASSED ssl_gtest.sh: #11010: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/993 (1, 771, 106, 29, 1027)' - PASSED ssl_gtest.sh: #11011: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/994 (1, 771, 106, 29, 1283)' - PASSED ssl_gtest.sh: #11012: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/995 (1, 771, 106, 29, 2052)' - PASSED ssl_gtest.sh: #11013: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/996 (1, 771, 106, 29, 2053)' - PASSED ssl_gtest.sh: #11014: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/997 (1, 771, 106, 29, 2054)' - PASSED ssl_gtest.sh: #11015: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/998 (1, 771, 106, 29, 2057)' - PASSED ssl_gtest.sh: #11016: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/999 (1, 771, 106, 29, 2058)' - PASSED ssl_gtest.sh: #11017: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1000 (1, 771, 106, 29, 2059)' - PASSED ssl_gtest.sh: #11018: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1001 (1, 771, 106, 23, 1025)' - PASSED ssl_gtest.sh: #11019: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1002 (1, 771, 106, 23, 1281)' - PASSED ssl_gtest.sh: #11020: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1003 (1, 771, 106, 23, 1537)' - PASSED ssl_gtest.sh: #11021: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1004 (1, 771, 106, 23, 1027)' - PASSED ssl_gtest.sh: #11022: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1005 (1, 771, 106, 23, 1283)' - PASSED ssl_gtest.sh: #11023: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1006 (1, 771, 106, 23, 2052)' - PASSED ssl_gtest.sh: #11024: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1007 (1, 771, 106, 23, 2053)' - PASSED ssl_gtest.sh: #11025: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1008 (1, 771, 106, 23, 2054)' - PASSED ssl_gtest.sh: #11026: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1009 (1, 771, 106, 23, 2057)' - PASSED ssl_gtest.sh: #11027: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1010 (1, 771, 106, 23, 2058)' - PASSED ssl_gtest.sh: #11028: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1011 (1, 771, 106, 23, 2059)' - PASSED ssl_gtest.sh: #11029: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1012 (1, 771, 106, 24, 1025)' - PASSED ssl_gtest.sh: #11030: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1013 (1, 771, 106, 24, 1281)' - PASSED ssl_gtest.sh: #11031: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1014 (1, 771, 106, 24, 1537)' - PASSED ssl_gtest.sh: #11032: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1015 (1, 771, 106, 24, 1027)' - PASSED ssl_gtest.sh: #11033: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1016 (1, 771, 106, 24, 1283)' - PASSED ssl_gtest.sh: #11034: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1017 (1, 771, 106, 24, 2052)' - PASSED ssl_gtest.sh: #11035: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1018 (1, 771, 106, 24, 2053)' - PASSED ssl_gtest.sh: #11036: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1019 (1, 771, 106, 24, 2054)' - PASSED ssl_gtest.sh: #11037: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1020 (1, 771, 106, 24, 2057)' - PASSED ssl_gtest.sh: #11038: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1021 (1, 771, 106, 24, 2058)' - PASSED ssl_gtest.sh: #11039: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1022 (1, 771, 106, 24, 2059)' - PASSED ssl_gtest.sh: #11040: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1023 (1, 771, 106, 256, 1025)' - PASSED ssl_gtest.sh: #11041: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1024 (1, 771, 106, 256, 1281)' - PASSED ssl_gtest.sh: #11042: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1025 (1, 771, 106, 256, 1537)' - PASSED ssl_gtest.sh: #11043: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1026 (1, 771, 106, 256, 1027)' - PASSED ssl_gtest.sh: #11044: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1027 (1, 771, 106, 256, 1283)' - PASSED ssl_gtest.sh: #11045: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1028 (1, 771, 106, 256, 2052)' - PASSED ssl_gtest.sh: #11046: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1029 (1, 771, 106, 256, 2053)' - PASSED ssl_gtest.sh: #11047: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1030 (1, 771, 106, 256, 2054)' - PASSED ssl_gtest.sh: #11048: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1031 (1, 771, 106, 256, 2057)' - PASSED ssl_gtest.sh: #11049: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1032 (1, 771, 106, 256, 2058)' - PASSED ssl_gtest.sh: #11050: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1033 (1, 771, 106, 256, 2059)' - PASSED ssl_gtest.sh: #11051: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1034 (1, 771, 106, 257, 1025)' - PASSED ssl_gtest.sh: #11052: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1035 (1, 771, 106, 257, 1281)' - PASSED ssl_gtest.sh: #11053: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1036 (1, 771, 106, 257, 1537)' - PASSED ssl_gtest.sh: #11054: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1037 (1, 771, 106, 257, 1027)' - PASSED ssl_gtest.sh: #11055: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1038 (1, 771, 106, 257, 1283)' - PASSED ssl_gtest.sh: #11056: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1039 (1, 771, 106, 257, 2052)' - PASSED ssl_gtest.sh: #11057: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1040 (1, 771, 106, 257, 2053)' - PASSED ssl_gtest.sh: #11058: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1041 (1, 771, 106, 257, 2054)' - PASSED ssl_gtest.sh: #11059: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1042 (1, 771, 106, 257, 2057)' - PASSED ssl_gtest.sh: #11060: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1043 (1, 771, 106, 257, 2058)' - PASSED ssl_gtest.sh: #11061: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1044 (1, 771, 106, 257, 2059)' - PASSED ssl_gtest.sh: #11062: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1045 (1, 771, 106, 25497, 1025)' - PASSED ssl_gtest.sh: #11063: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1046 (1, 771, 106, 25497, 1281)' - PASSED ssl_gtest.sh: #11064: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1047 (1, 771, 106, 25497, 1537)' - PASSED ssl_gtest.sh: #11065: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1048 (1, 771, 106, 25497, 1027)' - PASSED ssl_gtest.sh: #11066: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1049 (1, 771, 106, 25497, 1283)' - PASSED ssl_gtest.sh: #11067: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1050 (1, 771, 106, 25497, 2052)' - PASSED ssl_gtest.sh: #11068: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1051 (1, 771, 106, 25497, 2053)' - PASSED ssl_gtest.sh: #11069: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1052 (1, 771, 106, 25497, 2054)' - PASSED ssl_gtest.sh: #11070: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1053 (1, 771, 106, 25497, 2057)' - PASSED ssl_gtest.sh: #11071: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1054 (1, 771, 106, 25497, 2058)' - PASSED ssl_gtest.sh: #11072: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: ReadLimit/1055 (1, 771, 106, 25497, 2059)' - PASSED ssl_gtest.sh: #11073: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/0 (0, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #11074: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1 (0, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #11075: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/2 (0, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #11076: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/3 (0, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #11077: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/4 (0, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #11078: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/5 (0, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #11079: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/6 (0, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #11080: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/7 (0, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #11081: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/8 (0, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #11082: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/9 (0, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #11083: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/10 (0, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #11084: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/11 (0, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #11085: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/12 (0, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #11086: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/13 (0, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #11087: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/14 (0, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #11088: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/15 (0, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #11089: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/16 (0, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #11090: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/17 (0, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #11091: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/18 (0, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #11092: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/19 (0, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #11093: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/20 (0, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #11094: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/21 (0, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #11095: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/22 (0, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #11096: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/23 (0, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #11097: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/24 (0, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #11098: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/25 (0, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #11099: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/26 (0, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #11100: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/27 (0, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #11101: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/28 (0, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #11102: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/29 (0, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #11103: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/30 (0, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #11104: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/31 (0, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #11105: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/32 (0, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #11106: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/33 (0, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #11107: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/34 (0, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #11108: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/35 (0, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #11109: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/36 (0, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #11110: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/37 (0, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #11111: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/38 (0, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #11112: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/39 (0, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #11113: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/40 (0, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #11114: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/41 (0, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #11115: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/42 (0, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #11116: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/43 (0, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #11117: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/44 (0, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #11118: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/45 (0, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #11119: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/46 (0, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #11120: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/47 (0, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #11121: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/48 (0, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #11122: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/49 (0, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #11123: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/50 (0, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #11124: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/51 (0, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #11125: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/52 (0, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #11126: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/53 (0, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #11127: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/54 (0, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #11128: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/55 (0, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #11129: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/56 (0, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #11130: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/57 (0, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #11131: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/58 (0, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #11132: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/59 (0, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #11133: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/60 (0, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #11134: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/61 (0, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #11135: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/62 (0, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #11136: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/63 (0, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #11137: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/64 (0, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #11138: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/65 (0, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #11139: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/66 (0, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #11140: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/67 (0, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #11141: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/68 (0, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #11142: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/69 (0, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #11143: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/70 (0, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #11144: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/71 (0, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #11145: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/72 (0, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #11146: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/73 (0, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #11147: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/74 (0, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #11148: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/75 (0, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #11149: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/76 (0, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #11150: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/77 (0, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #11151: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/78 (0, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #11152: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/79 (0, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #11153: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/80 (0, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #11154: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/81 (0, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #11155: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/82 (0, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #11156: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/83 (0, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #11157: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/84 (0, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #11158: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/85 (0, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #11159: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/86 (0, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #11160: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/87 (0, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #11161: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/88 (0, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #11162: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/89 (0, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #11163: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/90 (0, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #11164: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/91 (0, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #11165: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/92 (0, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #11166: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/93 (0, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #11167: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/94 (0, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #11168: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/95 (0, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #11169: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/96 (0, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #11170: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/97 (0, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #11171: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/98 (0, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #11172: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/99 (0, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #11173: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/100 (0, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #11174: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/101 (0, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #11175: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/102 (0, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #11176: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/103 (0, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #11177: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/104 (0, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #11178: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/105 (0, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #11179: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/106 (0, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #11180: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/107 (0, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #11181: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/108 (0, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #11182: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/109 (0, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #11183: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/110 (0, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #11184: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/111 (0, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #11185: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/112 (0, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #11186: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/113 (0, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #11187: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/114 (0, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #11188: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/115 (0, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #11189: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/116 (0, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #11190: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/117 (0, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #11191: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/118 (0, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #11192: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/119 (0, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #11193: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/120 (0, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #11194: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/121 (0, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #11195: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/122 (0, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #11196: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/123 (0, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #11197: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/124 (0, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #11198: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/125 (0, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #11199: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/126 (0, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #11200: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/127 (0, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #11201: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/128 (0, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #11202: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/129 (0, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #11203: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/130 (0, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #11204: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/131 (0, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #11205: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/132 (0, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #11206: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/133 (0, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #11207: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/134 (0, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #11208: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/135 (0, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #11209: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/136 (0, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #11210: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/137 (0, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #11211: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/138 (0, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #11212: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/139 (0, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #11213: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/140 (0, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #11214: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/141 (0, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #11215: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/142 (0, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #11216: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/143 (0, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #11217: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/144 (0, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #11218: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/145 (0, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #11219: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/146 (0, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #11220: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/147 (0, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #11221: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/148 (0, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #11222: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/149 (0, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #11223: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/150 (0, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #11224: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/151 (0, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #11225: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/152 (0, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #11226: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/153 (0, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #11227: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/154 (0, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #11228: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/155 (0, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #11229: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/156 (0, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #11230: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/157 (0, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #11231: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/158 (0, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #11232: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/159 (0, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #11233: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/160 (0, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #11234: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/161 (0, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #11235: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/162 (0, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #11236: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/163 (0, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #11237: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/164 (0, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #11238: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/165 (0, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #11239: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/166 (0, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #11240: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/167 (0, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #11241: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/168 (0, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #11242: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/169 (0, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #11243: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/170 (0, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #11244: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/171 (0, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #11245: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/172 (0, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #11246: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/173 (0, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #11247: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/174 (0, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #11248: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/175 (0, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #11249: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/176 (0, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #11250: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/177 (0, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #11251: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/178 (0, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #11252: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/179 (0, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #11253: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/180 (0, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #11254: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/181 (0, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #11255: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/182 (0, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #11256: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/183 (0, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #11257: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/184 (0, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #11258: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/185 (0, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #11259: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/186 (0, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #11260: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/187 (0, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #11261: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/188 (0, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #11262: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/189 (0, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #11263: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/190 (0, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #11264: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/191 (0, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #11265: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/192 (0, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #11266: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/193 (0, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #11267: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/194 (0, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #11268: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/195 (0, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #11269: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/196 (0, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #11270: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/197 (0, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #11271: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/198 (0, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #11272: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/199 (0, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #11273: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/200 (0, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #11274: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/201 (0, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #11275: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/202 (0, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #11276: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/203 (0, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #11277: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/204 (0, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #11278: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/205 (0, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #11279: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/206 (0, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #11280: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/207 (0, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #11281: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/208 (0, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #11282: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/209 (0, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #11283: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/210 (0, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #11284: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/211 (0, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #11285: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/212 (0, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #11286: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/213 (0, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #11287: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/214 (0, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #11288: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/215 (0, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #11289: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/216 (0, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #11290: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/217 (0, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #11291: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/218 (0, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #11292: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/219 (0, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #11293: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/220 (0, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #11294: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/221 (0, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #11295: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/222 (0, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #11296: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/223 (0, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #11297: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/224 (0, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #11298: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/225 (0, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #11299: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/226 (0, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #11300: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/227 (0, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #11301: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/228 (0, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #11302: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/229 (0, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #11303: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/230 (0, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #11304: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/231 (0, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #11305: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/232 (0, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #11306: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/233 (0, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #11307: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/234 (0, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #11308: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/235 (0, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #11309: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/236 (0, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #11310: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/237 (0, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #11311: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/238 (0, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #11312: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/239 (0, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #11313: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/240 (0, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #11314: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/241 (0, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #11315: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/242 (0, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #11316: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/243 (0, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #11317: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/244 (0, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #11318: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/245 (0, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #11319: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/246 (0, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #11320: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/247 (0, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #11321: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/248 (0, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #11322: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/249 (0, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #11323: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/250 (0, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #11324: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/251 (0, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #11325: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/252 (0, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #11326: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/253 (0, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #11327: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/254 (0, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #11328: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/255 (0, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #11329: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/256 (0, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #11330: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/257 (0, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #11331: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/258 (0, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #11332: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/259 (0, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #11333: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/260 (0, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #11334: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/261 (0, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #11335: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/262 (0, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #11336: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/263 (0, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #11337: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/264 (0, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #11338: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/265 (0, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #11339: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/266 (0, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #11340: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/267 (0, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #11341: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/268 (0, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #11342: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/269 (0, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #11343: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/270 (0, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #11344: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/271 (0, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #11345: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/272 (0, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #11346: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/273 (0, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #11347: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/274 (0, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #11348: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/275 (0, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #11349: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/276 (0, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #11350: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/277 (0, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #11351: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/278 (0, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #11352: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/279 (0, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #11353: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/280 (0, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #11354: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/281 (0, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #11355: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/282 (0, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #11356: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/283 (0, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #11357: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/284 (0, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #11358: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/285 (0, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #11359: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/286 (0, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #11360: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/287 (0, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #11361: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/288 (0, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #11362: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/289 (0, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #11363: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/290 (0, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #11364: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/291 (0, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #11365: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/292 (0, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #11366: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/293 (0, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #11367: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/294 (0, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #11368: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/295 (0, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #11369: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/296 (0, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #11370: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/297 (0, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #11371: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/298 (0, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #11372: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/299 (0, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #11373: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/300 (0, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #11374: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/301 (0, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #11375: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/302 (0, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #11376: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/303 (0, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #11377: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/304 (0, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #11378: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/305 (0, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #11379: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/306 (0, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #11380: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/307 (0, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #11381: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/308 (0, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #11382: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/309 (0, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #11383: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/310 (0, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #11384: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/311 (0, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #11385: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/312 (0, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #11386: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/313 (0, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #11387: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/314 (0, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #11388: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/315 (0, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #11389: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/316 (0, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #11390: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/317 (0, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #11391: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/318 (0, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #11392: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/319 (0, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #11393: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/320 (0, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #11394: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/321 (0, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #11395: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/322 (0, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #11396: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/323 (0, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #11397: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/324 (0, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #11398: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/325 (0, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #11399: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/326 (0, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #11400: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/327 (0, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #11401: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/328 (0, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #11402: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/329 (0, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #11403: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/330 (0, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #11404: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/331 (0, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #11405: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/332 (0, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #11406: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/333 (0, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #11407: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/334 (0, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #11408: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/335 (0, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #11409: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/336 (0, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #11410: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/337 (0, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #11411: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/338 (0, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #11412: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/339 (0, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #11413: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/340 (0, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #11414: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/341 (0, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #11415: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/342 (0, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #11416: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/343 (0, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #11417: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/344 (0, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #11418: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/345 (0, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #11419: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/346 (0, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #11420: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/347 (0, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #11421: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/348 (0, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #11422: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/349 (0, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #11423: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/350 (0, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #11424: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/351 (0, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #11425: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/352 (0, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #11426: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/353 (0, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #11427: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/354 (0, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #11428: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/355 (0, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #11429: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/356 (0, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #11430: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/357 (0, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #11431: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/358 (0, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #11432: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/359 (0, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #11433: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/360 (0, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #11434: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/361 (0, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #11435: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/362 (0, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #11436: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/363 (0, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #11437: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/364 (0, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #11438: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/365 (0, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #11439: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/366 (0, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #11440: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/367 (0, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #11441: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/368 (0, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #11442: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/369 (0, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #11443: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/370 (0, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #11444: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/371 (0, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #11445: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/372 (0, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #11446: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/373 (0, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #11447: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/374 (0, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #11448: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/375 (0, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #11449: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/376 (0, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #11450: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/377 (0, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #11451: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/378 (0, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #11452: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/379 (0, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #11453: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/380 (0, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #11454: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/381 (0, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #11455: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/382 (0, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #11456: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/383 (0, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #11457: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/384 (0, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #11458: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/385 (0, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #11459: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/386 (0, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #11460: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/387 (0, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #11461: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/388 (0, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #11462: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/389 (0, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #11463: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/390 (0, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #11464: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/391 (0, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #11465: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/392 (0, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #11466: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/393 (0, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #11467: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/394 (0, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #11468: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/395 (0, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #11469: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/396 (0, 771, 64, 29, 1025)' - PASSED ssl_gtest.sh: #11470: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/397 (0, 771, 64, 29, 1281)' - PASSED ssl_gtest.sh: #11471: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/398 (0, 771, 64, 29, 1537)' - PASSED ssl_gtest.sh: #11472: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/399 (0, 771, 64, 29, 1027)' - PASSED ssl_gtest.sh: #11473: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/400 (0, 771, 64, 29, 1283)' - PASSED ssl_gtest.sh: #11474: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/401 (0, 771, 64, 29, 2052)' - PASSED ssl_gtest.sh: #11475: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/402 (0, 771, 64, 29, 2053)' - PASSED ssl_gtest.sh: #11476: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/403 (0, 771, 64, 29, 2054)' - PASSED ssl_gtest.sh: #11477: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/404 (0, 771, 64, 29, 2057)' - PASSED ssl_gtest.sh: #11478: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/405 (0, 771, 64, 29, 2058)' - PASSED ssl_gtest.sh: #11479: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/406 (0, 771, 64, 29, 2059)' - PASSED ssl_gtest.sh: #11480: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/407 (0, 771, 64, 23, 1025)' - PASSED ssl_gtest.sh: #11481: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/408 (0, 771, 64, 23, 1281)' - PASSED ssl_gtest.sh: #11482: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/409 (0, 771, 64, 23, 1537)' - PASSED ssl_gtest.sh: #11483: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/410 (0, 771, 64, 23, 1027)' - PASSED ssl_gtest.sh: #11484: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/411 (0, 771, 64, 23, 1283)' - PASSED ssl_gtest.sh: #11485: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/412 (0, 771, 64, 23, 2052)' - PASSED ssl_gtest.sh: #11486: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/413 (0, 771, 64, 23, 2053)' - PASSED ssl_gtest.sh: #11487: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/414 (0, 771, 64, 23, 2054)' - PASSED ssl_gtest.sh: #11488: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/415 (0, 771, 64, 23, 2057)' - PASSED ssl_gtest.sh: #11489: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/416 (0, 771, 64, 23, 2058)' - PASSED ssl_gtest.sh: #11490: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/417 (0, 771, 64, 23, 2059)' - PASSED ssl_gtest.sh: #11491: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/418 (0, 771, 64, 24, 1025)' - PASSED ssl_gtest.sh: #11492: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/419 (0, 771, 64, 24, 1281)' - PASSED ssl_gtest.sh: #11493: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/420 (0, 771, 64, 24, 1537)' - PASSED ssl_gtest.sh: #11494: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/421 (0, 771, 64, 24, 1027)' - PASSED ssl_gtest.sh: #11495: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/422 (0, 771, 64, 24, 1283)' - PASSED ssl_gtest.sh: #11496: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/423 (0, 771, 64, 24, 2052)' - PASSED ssl_gtest.sh: #11497: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/424 (0, 771, 64, 24, 2053)' - PASSED ssl_gtest.sh: #11498: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/425 (0, 771, 64, 24, 2054)' - PASSED ssl_gtest.sh: #11499: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/426 (0, 771, 64, 24, 2057)' - PASSED ssl_gtest.sh: #11500: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/427 (0, 771, 64, 24, 2058)' - PASSED ssl_gtest.sh: #11501: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/428 (0, 771, 64, 24, 2059)' - PASSED ssl_gtest.sh: #11502: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/429 (0, 771, 64, 256, 1025)' - PASSED ssl_gtest.sh: #11503: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/430 (0, 771, 64, 256, 1281)' - PASSED ssl_gtest.sh: #11504: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/431 (0, 771, 64, 256, 1537)' - PASSED ssl_gtest.sh: #11505: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/432 (0, 771, 64, 256, 1027)' - PASSED ssl_gtest.sh: #11506: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/433 (0, 771, 64, 256, 1283)' - PASSED ssl_gtest.sh: #11507: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/434 (0, 771, 64, 256, 2052)' - PASSED ssl_gtest.sh: #11508: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/435 (0, 771, 64, 256, 2053)' - PASSED ssl_gtest.sh: #11509: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/436 (0, 771, 64, 256, 2054)' - PASSED ssl_gtest.sh: #11510: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/437 (0, 771, 64, 256, 2057)' - PASSED ssl_gtest.sh: #11511: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/438 (0, 771, 64, 256, 2058)' - PASSED ssl_gtest.sh: #11512: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/439 (0, 771, 64, 256, 2059)' - PASSED ssl_gtest.sh: #11513: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/440 (0, 771, 64, 257, 1025)' - PASSED ssl_gtest.sh: #11514: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/441 (0, 771, 64, 257, 1281)' - PASSED ssl_gtest.sh: #11515: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/442 (0, 771, 64, 257, 1537)' - PASSED ssl_gtest.sh: #11516: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/443 (0, 771, 64, 257, 1027)' - PASSED ssl_gtest.sh: #11517: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/444 (0, 771, 64, 257, 1283)' - PASSED ssl_gtest.sh: #11518: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/445 (0, 771, 64, 257, 2052)' - PASSED ssl_gtest.sh: #11519: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/446 (0, 771, 64, 257, 2053)' - PASSED ssl_gtest.sh: #11520: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/447 (0, 771, 64, 257, 2054)' - PASSED ssl_gtest.sh: #11521: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/448 (0, 771, 64, 257, 2057)' - PASSED ssl_gtest.sh: #11522: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/449 (0, 771, 64, 257, 2058)' - PASSED ssl_gtest.sh: #11523: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/450 (0, 771, 64, 257, 2059)' - PASSED ssl_gtest.sh: #11524: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/451 (0, 771, 64, 25497, 1025)' - PASSED ssl_gtest.sh: #11525: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/452 (0, 771, 64, 25497, 1281)' - PASSED ssl_gtest.sh: #11526: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/453 (0, 771, 64, 25497, 1537)' - PASSED ssl_gtest.sh: #11527: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/454 (0, 771, 64, 25497, 1027)' - PASSED ssl_gtest.sh: #11528: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/455 (0, 771, 64, 25497, 1283)' - PASSED ssl_gtest.sh: #11529: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/456 (0, 771, 64, 25497, 2052)' - PASSED ssl_gtest.sh: #11530: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/457 (0, 771, 64, 25497, 2053)' - PASSED ssl_gtest.sh: #11531: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/458 (0, 771, 64, 25497, 2054)' - PASSED ssl_gtest.sh: #11532: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/459 (0, 771, 64, 25497, 2057)' - PASSED ssl_gtest.sh: #11533: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/460 (0, 771, 64, 25497, 2058)' - PASSED ssl_gtest.sh: #11534: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/461 (0, 771, 64, 25497, 2059)' - PASSED ssl_gtest.sh: #11535: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/462 (0, 771, 106, 29, 1025)' - PASSED ssl_gtest.sh: #11536: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/463 (0, 771, 106, 29, 1281)' - PASSED ssl_gtest.sh: #11537: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/464 (0, 771, 106, 29, 1537)' - PASSED ssl_gtest.sh: #11538: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/465 (0, 771, 106, 29, 1027)' - PASSED ssl_gtest.sh: #11539: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/466 (0, 771, 106, 29, 1283)' - PASSED ssl_gtest.sh: #11540: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/467 (0, 771, 106, 29, 2052)' - PASSED ssl_gtest.sh: #11541: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/468 (0, 771, 106, 29, 2053)' - PASSED ssl_gtest.sh: #11542: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/469 (0, 771, 106, 29, 2054)' - PASSED ssl_gtest.sh: #11543: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/470 (0, 771, 106, 29, 2057)' - PASSED ssl_gtest.sh: #11544: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/471 (0, 771, 106, 29, 2058)' - PASSED ssl_gtest.sh: #11545: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/472 (0, 771, 106, 29, 2059)' - PASSED ssl_gtest.sh: #11546: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/473 (0, 771, 106, 23, 1025)' - PASSED ssl_gtest.sh: #11547: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/474 (0, 771, 106, 23, 1281)' - PASSED ssl_gtest.sh: #11548: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/475 (0, 771, 106, 23, 1537)' - PASSED ssl_gtest.sh: #11549: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/476 (0, 771, 106, 23, 1027)' - PASSED ssl_gtest.sh: #11550: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/477 (0, 771, 106, 23, 1283)' - PASSED ssl_gtest.sh: #11551: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/478 (0, 771, 106, 23, 2052)' - PASSED ssl_gtest.sh: #11552: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/479 (0, 771, 106, 23, 2053)' - PASSED ssl_gtest.sh: #11553: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/480 (0, 771, 106, 23, 2054)' - PASSED ssl_gtest.sh: #11554: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/481 (0, 771, 106, 23, 2057)' - PASSED ssl_gtest.sh: #11555: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/482 (0, 771, 106, 23, 2058)' - PASSED ssl_gtest.sh: #11556: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/483 (0, 771, 106, 23, 2059)' - PASSED ssl_gtest.sh: #11557: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/484 (0, 771, 106, 24, 1025)' - PASSED ssl_gtest.sh: #11558: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/485 (0, 771, 106, 24, 1281)' - PASSED ssl_gtest.sh: #11559: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/486 (0, 771, 106, 24, 1537)' - PASSED ssl_gtest.sh: #11560: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/487 (0, 771, 106, 24, 1027)' - PASSED ssl_gtest.sh: #11561: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/488 (0, 771, 106, 24, 1283)' - PASSED ssl_gtest.sh: #11562: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/489 (0, 771, 106, 24, 2052)' - PASSED ssl_gtest.sh: #11563: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/490 (0, 771, 106, 24, 2053)' - PASSED ssl_gtest.sh: #11564: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/491 (0, 771, 106, 24, 2054)' - PASSED ssl_gtest.sh: #11565: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/492 (0, 771, 106, 24, 2057)' - PASSED ssl_gtest.sh: #11566: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/493 (0, 771, 106, 24, 2058)' - PASSED ssl_gtest.sh: #11567: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/494 (0, 771, 106, 24, 2059)' - PASSED ssl_gtest.sh: #11568: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/495 (0, 771, 106, 256, 1025)' - PASSED ssl_gtest.sh: #11569: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/496 (0, 771, 106, 256, 1281)' - PASSED ssl_gtest.sh: #11570: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/497 (0, 771, 106, 256, 1537)' - PASSED ssl_gtest.sh: #11571: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/498 (0, 771, 106, 256, 1027)' - PASSED ssl_gtest.sh: #11572: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/499 (0, 771, 106, 256, 1283)' - PASSED ssl_gtest.sh: #11573: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/500 (0, 771, 106, 256, 2052)' - PASSED ssl_gtest.sh: #11574: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/501 (0, 771, 106, 256, 2053)' - PASSED ssl_gtest.sh: #11575: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/502 (0, 771, 106, 256, 2054)' - PASSED ssl_gtest.sh: #11576: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/503 (0, 771, 106, 256, 2057)' - PASSED ssl_gtest.sh: #11577: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/504 (0, 771, 106, 256, 2058)' - PASSED ssl_gtest.sh: #11578: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/505 (0, 771, 106, 256, 2059)' - PASSED ssl_gtest.sh: #11579: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/506 (0, 771, 106, 257, 1025)' - PASSED ssl_gtest.sh: #11580: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/507 (0, 771, 106, 257, 1281)' - PASSED ssl_gtest.sh: #11581: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/508 (0, 771, 106, 257, 1537)' - PASSED ssl_gtest.sh: #11582: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/509 (0, 771, 106, 257, 1027)' - PASSED ssl_gtest.sh: #11583: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/510 (0, 771, 106, 257, 1283)' - PASSED ssl_gtest.sh: #11584: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/511 (0, 771, 106, 257, 2052)' - PASSED ssl_gtest.sh: #11585: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/512 (0, 771, 106, 257, 2053)' - PASSED ssl_gtest.sh: #11586: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/513 (0, 771, 106, 257, 2054)' - PASSED ssl_gtest.sh: #11587: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/514 (0, 771, 106, 257, 2057)' - PASSED ssl_gtest.sh: #11588: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/515 (0, 771, 106, 257, 2058)' - PASSED ssl_gtest.sh: #11589: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/516 (0, 771, 106, 257, 2059)' - PASSED ssl_gtest.sh: #11590: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/517 (0, 771, 106, 25497, 1025)' - PASSED ssl_gtest.sh: #11591: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/518 (0, 771, 106, 25497, 1281)' - PASSED ssl_gtest.sh: #11592: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/519 (0, 771, 106, 25497, 1537)' - PASSED ssl_gtest.sh: #11593: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/520 (0, 771, 106, 25497, 1027)' - PASSED ssl_gtest.sh: #11594: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/521 (0, 771, 106, 25497, 1283)' - PASSED ssl_gtest.sh: #11595: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/522 (0, 771, 106, 25497, 2052)' - PASSED ssl_gtest.sh: #11596: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/523 (0, 771, 106, 25497, 2053)' - PASSED ssl_gtest.sh: #11597: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/524 (0, 771, 106, 25497, 2054)' - PASSED ssl_gtest.sh: #11598: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/525 (0, 771, 106, 25497, 2057)' - PASSED ssl_gtest.sh: #11599: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/526 (0, 771, 106, 25497, 2058)' - PASSED ssl_gtest.sh: #11600: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/527 (0, 771, 106, 25497, 2059)' - PASSED ssl_gtest.sh: #11601: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/528 (1, 771, 107, 29, 1025)' - PASSED ssl_gtest.sh: #11602: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/529 (1, 771, 107, 29, 1281)' - PASSED ssl_gtest.sh: #11603: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/530 (1, 771, 107, 29, 1537)' - PASSED ssl_gtest.sh: #11604: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/531 (1, 771, 107, 29, 1027)' - PASSED ssl_gtest.sh: #11605: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/532 (1, 771, 107, 29, 1283)' - PASSED ssl_gtest.sh: #11606: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/533 (1, 771, 107, 29, 2052)' - PASSED ssl_gtest.sh: #11607: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/534 (1, 771, 107, 29, 2053)' - PASSED ssl_gtest.sh: #11608: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/535 (1, 771, 107, 29, 2054)' - PASSED ssl_gtest.sh: #11609: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/536 (1, 771, 107, 29, 2057)' - PASSED ssl_gtest.sh: #11610: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/537 (1, 771, 107, 29, 2058)' - PASSED ssl_gtest.sh: #11611: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/538 (1, 771, 107, 29, 2059)' - PASSED ssl_gtest.sh: #11612: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/539 (1, 771, 107, 23, 1025)' - PASSED ssl_gtest.sh: #11613: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/540 (1, 771, 107, 23, 1281)' - PASSED ssl_gtest.sh: #11614: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/541 (1, 771, 107, 23, 1537)' - PASSED ssl_gtest.sh: #11615: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/542 (1, 771, 107, 23, 1027)' - PASSED ssl_gtest.sh: #11616: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/543 (1, 771, 107, 23, 1283)' - PASSED ssl_gtest.sh: #11617: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/544 (1, 771, 107, 23, 2052)' - PASSED ssl_gtest.sh: #11618: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/545 (1, 771, 107, 23, 2053)' - PASSED ssl_gtest.sh: #11619: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/546 (1, 771, 107, 23, 2054)' - PASSED ssl_gtest.sh: #11620: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/547 (1, 771, 107, 23, 2057)' - PASSED ssl_gtest.sh: #11621: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/548 (1, 771, 107, 23, 2058)' - PASSED ssl_gtest.sh: #11622: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/549 (1, 771, 107, 23, 2059)' - PASSED ssl_gtest.sh: #11623: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/550 (1, 771, 107, 24, 1025)' - PASSED ssl_gtest.sh: #11624: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/551 (1, 771, 107, 24, 1281)' - PASSED ssl_gtest.sh: #11625: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/552 (1, 771, 107, 24, 1537)' - PASSED ssl_gtest.sh: #11626: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/553 (1, 771, 107, 24, 1027)' - PASSED ssl_gtest.sh: #11627: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/554 (1, 771, 107, 24, 1283)' - PASSED ssl_gtest.sh: #11628: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/555 (1, 771, 107, 24, 2052)' - PASSED ssl_gtest.sh: #11629: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/556 (1, 771, 107, 24, 2053)' - PASSED ssl_gtest.sh: #11630: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/557 (1, 771, 107, 24, 2054)' - PASSED ssl_gtest.sh: #11631: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/558 (1, 771, 107, 24, 2057)' - PASSED ssl_gtest.sh: #11632: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/559 (1, 771, 107, 24, 2058)' - PASSED ssl_gtest.sh: #11633: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/560 (1, 771, 107, 24, 2059)' - PASSED ssl_gtest.sh: #11634: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/561 (1, 771, 107, 256, 1025)' - PASSED ssl_gtest.sh: #11635: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/562 (1, 771, 107, 256, 1281)' - PASSED ssl_gtest.sh: #11636: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/563 (1, 771, 107, 256, 1537)' - PASSED ssl_gtest.sh: #11637: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/564 (1, 771, 107, 256, 1027)' - PASSED ssl_gtest.sh: #11638: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/565 (1, 771, 107, 256, 1283)' - PASSED ssl_gtest.sh: #11639: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/566 (1, 771, 107, 256, 2052)' - PASSED ssl_gtest.sh: #11640: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/567 (1, 771, 107, 256, 2053)' - PASSED ssl_gtest.sh: #11641: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/568 (1, 771, 107, 256, 2054)' - PASSED ssl_gtest.sh: #11642: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/569 (1, 771, 107, 256, 2057)' - PASSED ssl_gtest.sh: #11643: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/570 (1, 771, 107, 256, 2058)' - PASSED ssl_gtest.sh: #11644: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/571 (1, 771, 107, 256, 2059)' - PASSED ssl_gtest.sh: #11645: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/572 (1, 771, 107, 257, 1025)' - PASSED ssl_gtest.sh: #11646: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/573 (1, 771, 107, 257, 1281)' - PASSED ssl_gtest.sh: #11647: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/574 (1, 771, 107, 257, 1537)' - PASSED ssl_gtest.sh: #11648: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/575 (1, 771, 107, 257, 1027)' - PASSED ssl_gtest.sh: #11649: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/576 (1, 771, 107, 257, 1283)' - PASSED ssl_gtest.sh: #11650: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/577 (1, 771, 107, 257, 2052)' - PASSED ssl_gtest.sh: #11651: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/578 (1, 771, 107, 257, 2053)' - PASSED ssl_gtest.sh: #11652: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/579 (1, 771, 107, 257, 2054)' - PASSED ssl_gtest.sh: #11653: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/580 (1, 771, 107, 257, 2057)' - PASSED ssl_gtest.sh: #11654: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/581 (1, 771, 107, 257, 2058)' - PASSED ssl_gtest.sh: #11655: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/582 (1, 771, 107, 257, 2059)' - PASSED ssl_gtest.sh: #11656: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/583 (1, 771, 107, 25497, 1025)' - PASSED ssl_gtest.sh: #11657: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/584 (1, 771, 107, 25497, 1281)' - PASSED ssl_gtest.sh: #11658: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/585 (1, 771, 107, 25497, 1537)' - PASSED ssl_gtest.sh: #11659: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/586 (1, 771, 107, 25497, 1027)' - PASSED ssl_gtest.sh: #11660: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/587 (1, 771, 107, 25497, 1283)' - PASSED ssl_gtest.sh: #11661: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/588 (1, 771, 107, 25497, 2052)' - PASSED ssl_gtest.sh: #11662: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/589 (1, 771, 107, 25497, 2053)' - PASSED ssl_gtest.sh: #11663: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/590 (1, 771, 107, 25497, 2054)' - PASSED ssl_gtest.sh: #11664: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/591 (1, 771, 107, 25497, 2057)' - PASSED ssl_gtest.sh: #11665: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/592 (1, 771, 107, 25497, 2058)' - PASSED ssl_gtest.sh: #11666: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/593 (1, 771, 107, 25497, 2059)' - PASSED ssl_gtest.sh: #11667: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/594 (1, 771, 61, 29, 1025)' - PASSED ssl_gtest.sh: #11668: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/595 (1, 771, 61, 29, 1281)' - PASSED ssl_gtest.sh: #11669: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/596 (1, 771, 61, 29, 1537)' - PASSED ssl_gtest.sh: #11670: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/597 (1, 771, 61, 29, 1027)' - PASSED ssl_gtest.sh: #11671: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/598 (1, 771, 61, 29, 1283)' - PASSED ssl_gtest.sh: #11672: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/599 (1, 771, 61, 29, 2052)' - PASSED ssl_gtest.sh: #11673: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/600 (1, 771, 61, 29, 2053)' - PASSED ssl_gtest.sh: #11674: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/601 (1, 771, 61, 29, 2054)' - PASSED ssl_gtest.sh: #11675: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/602 (1, 771, 61, 29, 2057)' - PASSED ssl_gtest.sh: #11676: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/603 (1, 771, 61, 29, 2058)' - PASSED ssl_gtest.sh: #11677: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/604 (1, 771, 61, 29, 2059)' - PASSED ssl_gtest.sh: #11678: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/605 (1, 771, 61, 23, 1025)' - PASSED ssl_gtest.sh: #11679: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/606 (1, 771, 61, 23, 1281)' - PASSED ssl_gtest.sh: #11680: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/607 (1, 771, 61, 23, 1537)' - PASSED ssl_gtest.sh: #11681: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/608 (1, 771, 61, 23, 1027)' - PASSED ssl_gtest.sh: #11682: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/609 (1, 771, 61, 23, 1283)' - PASSED ssl_gtest.sh: #11683: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/610 (1, 771, 61, 23, 2052)' - PASSED ssl_gtest.sh: #11684: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/611 (1, 771, 61, 23, 2053)' - PASSED ssl_gtest.sh: #11685: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/612 (1, 771, 61, 23, 2054)' - PASSED ssl_gtest.sh: #11686: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/613 (1, 771, 61, 23, 2057)' - PASSED ssl_gtest.sh: #11687: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/614 (1, 771, 61, 23, 2058)' - PASSED ssl_gtest.sh: #11688: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/615 (1, 771, 61, 23, 2059)' - PASSED ssl_gtest.sh: #11689: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/616 (1, 771, 61, 24, 1025)' - PASSED ssl_gtest.sh: #11690: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/617 (1, 771, 61, 24, 1281)' - PASSED ssl_gtest.sh: #11691: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/618 (1, 771, 61, 24, 1537)' - PASSED ssl_gtest.sh: #11692: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/619 (1, 771, 61, 24, 1027)' - PASSED ssl_gtest.sh: #11693: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/620 (1, 771, 61, 24, 1283)' - PASSED ssl_gtest.sh: #11694: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/621 (1, 771, 61, 24, 2052)' - PASSED ssl_gtest.sh: #11695: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/622 (1, 771, 61, 24, 2053)' - PASSED ssl_gtest.sh: #11696: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/623 (1, 771, 61, 24, 2054)' - PASSED ssl_gtest.sh: #11697: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/624 (1, 771, 61, 24, 2057)' - PASSED ssl_gtest.sh: #11698: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/625 (1, 771, 61, 24, 2058)' - PASSED ssl_gtest.sh: #11699: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/626 (1, 771, 61, 24, 2059)' - PASSED ssl_gtest.sh: #11700: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/627 (1, 771, 61, 256, 1025)' - PASSED ssl_gtest.sh: #11701: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/628 (1, 771, 61, 256, 1281)' - PASSED ssl_gtest.sh: #11702: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/629 (1, 771, 61, 256, 1537)' - PASSED ssl_gtest.sh: #11703: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/630 (1, 771, 61, 256, 1027)' - PASSED ssl_gtest.sh: #11704: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/631 (1, 771, 61, 256, 1283)' - PASSED ssl_gtest.sh: #11705: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/632 (1, 771, 61, 256, 2052)' - PASSED ssl_gtest.sh: #11706: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/633 (1, 771, 61, 256, 2053)' - PASSED ssl_gtest.sh: #11707: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/634 (1, 771, 61, 256, 2054)' - PASSED ssl_gtest.sh: #11708: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/635 (1, 771, 61, 256, 2057)' - PASSED ssl_gtest.sh: #11709: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/636 (1, 771, 61, 256, 2058)' - PASSED ssl_gtest.sh: #11710: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/637 (1, 771, 61, 256, 2059)' - PASSED ssl_gtest.sh: #11711: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/638 (1, 771, 61, 257, 1025)' - PASSED ssl_gtest.sh: #11712: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/639 (1, 771, 61, 257, 1281)' - PASSED ssl_gtest.sh: #11713: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/640 (1, 771, 61, 257, 1537)' - PASSED ssl_gtest.sh: #11714: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/641 (1, 771, 61, 257, 1027)' - PASSED ssl_gtest.sh: #11715: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/642 (1, 771, 61, 257, 1283)' - PASSED ssl_gtest.sh: #11716: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/643 (1, 771, 61, 257, 2052)' - PASSED ssl_gtest.sh: #11717: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/644 (1, 771, 61, 257, 2053)' - PASSED ssl_gtest.sh: #11718: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/645 (1, 771, 61, 257, 2054)' - PASSED ssl_gtest.sh: #11719: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/646 (1, 771, 61, 257, 2057)' - PASSED ssl_gtest.sh: #11720: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/647 (1, 771, 61, 257, 2058)' - PASSED ssl_gtest.sh: #11721: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/648 (1, 771, 61, 257, 2059)' - PASSED ssl_gtest.sh: #11722: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/649 (1, 771, 61, 25497, 1025)' - PASSED ssl_gtest.sh: #11723: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/650 (1, 771, 61, 25497, 1281)' - PASSED ssl_gtest.sh: #11724: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/651 (1, 771, 61, 25497, 1537)' - PASSED ssl_gtest.sh: #11725: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/652 (1, 771, 61, 25497, 1027)' - PASSED ssl_gtest.sh: #11726: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/653 (1, 771, 61, 25497, 1283)' - PASSED ssl_gtest.sh: #11727: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/654 (1, 771, 61, 25497, 2052)' - PASSED ssl_gtest.sh: #11728: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/655 (1, 771, 61, 25497, 2053)' - PASSED ssl_gtest.sh: #11729: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/656 (1, 771, 61, 25497, 2054)' - PASSED ssl_gtest.sh: #11730: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/657 (1, 771, 61, 25497, 2057)' - PASSED ssl_gtest.sh: #11731: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/658 (1, 771, 61, 25497, 2058)' - PASSED ssl_gtest.sh: #11732: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/659 (1, 771, 61, 25497, 2059)' - PASSED ssl_gtest.sh: #11733: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/660 (1, 771, 49187, 29, 1025)' - PASSED ssl_gtest.sh: #11734: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/661 (1, 771, 49187, 29, 1281)' - PASSED ssl_gtest.sh: #11735: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/662 (1, 771, 49187, 29, 1537)' - PASSED ssl_gtest.sh: #11736: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/663 (1, 771, 49187, 29, 1027)' - PASSED ssl_gtest.sh: #11737: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/664 (1, 771, 49187, 29, 1283)' - PASSED ssl_gtest.sh: #11738: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/665 (1, 771, 49187, 29, 2052)' - PASSED ssl_gtest.sh: #11739: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/666 (1, 771, 49187, 29, 2053)' - PASSED ssl_gtest.sh: #11740: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/667 (1, 771, 49187, 29, 2054)' - PASSED ssl_gtest.sh: #11741: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/668 (1, 771, 49187, 29, 2057)' - PASSED ssl_gtest.sh: #11742: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/669 (1, 771, 49187, 29, 2058)' - PASSED ssl_gtest.sh: #11743: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/670 (1, 771, 49187, 29, 2059)' - PASSED ssl_gtest.sh: #11744: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/671 (1, 771, 49187, 23, 1025)' - PASSED ssl_gtest.sh: #11745: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/672 (1, 771, 49187, 23, 1281)' - PASSED ssl_gtest.sh: #11746: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/673 (1, 771, 49187, 23, 1537)' - PASSED ssl_gtest.sh: #11747: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/674 (1, 771, 49187, 23, 1027)' - PASSED ssl_gtest.sh: #11748: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/675 (1, 771, 49187, 23, 1283)' - PASSED ssl_gtest.sh: #11749: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/676 (1, 771, 49187, 23, 2052)' - PASSED ssl_gtest.sh: #11750: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/677 (1, 771, 49187, 23, 2053)' - PASSED ssl_gtest.sh: #11751: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/678 (1, 771, 49187, 23, 2054)' - PASSED ssl_gtest.sh: #11752: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/679 (1, 771, 49187, 23, 2057)' - PASSED ssl_gtest.sh: #11753: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/680 (1, 771, 49187, 23, 2058)' - PASSED ssl_gtest.sh: #11754: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/681 (1, 771, 49187, 23, 2059)' - PASSED ssl_gtest.sh: #11755: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/682 (1, 771, 49187, 24, 1025)' - PASSED ssl_gtest.sh: #11756: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/683 (1, 771, 49187, 24, 1281)' - PASSED ssl_gtest.sh: #11757: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/684 (1, 771, 49187, 24, 1537)' - PASSED ssl_gtest.sh: #11758: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/685 (1, 771, 49187, 24, 1027)' - PASSED ssl_gtest.sh: #11759: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/686 (1, 771, 49187, 24, 1283)' - PASSED ssl_gtest.sh: #11760: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/687 (1, 771, 49187, 24, 2052)' - PASSED ssl_gtest.sh: #11761: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/688 (1, 771, 49187, 24, 2053)' - PASSED ssl_gtest.sh: #11762: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/689 (1, 771, 49187, 24, 2054)' - PASSED ssl_gtest.sh: #11763: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/690 (1, 771, 49187, 24, 2057)' - PASSED ssl_gtest.sh: #11764: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/691 (1, 771, 49187, 24, 2058)' - PASSED ssl_gtest.sh: #11765: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/692 (1, 771, 49187, 24, 2059)' - PASSED ssl_gtest.sh: #11766: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/693 (1, 771, 49187, 256, 1025)' - PASSED ssl_gtest.sh: #11767: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/694 (1, 771, 49187, 256, 1281)' - PASSED ssl_gtest.sh: #11768: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/695 (1, 771, 49187, 256, 1537)' - PASSED ssl_gtest.sh: #11769: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/696 (1, 771, 49187, 256, 1027)' - PASSED ssl_gtest.sh: #11770: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/697 (1, 771, 49187, 256, 1283)' - PASSED ssl_gtest.sh: #11771: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/698 (1, 771, 49187, 256, 2052)' - PASSED ssl_gtest.sh: #11772: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/699 (1, 771, 49187, 256, 2053)' - PASSED ssl_gtest.sh: #11773: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/700 (1, 771, 49187, 256, 2054)' - PASSED ssl_gtest.sh: #11774: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/701 (1, 771, 49187, 256, 2057)' - PASSED ssl_gtest.sh: #11775: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/702 (1, 771, 49187, 256, 2058)' - PASSED ssl_gtest.sh: #11776: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/703 (1, 771, 49187, 256, 2059)' - PASSED ssl_gtest.sh: #11777: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/704 (1, 771, 49187, 257, 1025)' - PASSED ssl_gtest.sh: #11778: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/705 (1, 771, 49187, 257, 1281)' - PASSED ssl_gtest.sh: #11779: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/706 (1, 771, 49187, 257, 1537)' - PASSED ssl_gtest.sh: #11780: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/707 (1, 771, 49187, 257, 1027)' - PASSED ssl_gtest.sh: #11781: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/708 (1, 771, 49187, 257, 1283)' - PASSED ssl_gtest.sh: #11782: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/709 (1, 771, 49187, 257, 2052)' - PASSED ssl_gtest.sh: #11783: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/710 (1, 771, 49187, 257, 2053)' - PASSED ssl_gtest.sh: #11784: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/711 (1, 771, 49187, 257, 2054)' - PASSED ssl_gtest.sh: #11785: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/712 (1, 771, 49187, 257, 2057)' - PASSED ssl_gtest.sh: #11786: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/713 (1, 771, 49187, 257, 2058)' - PASSED ssl_gtest.sh: #11787: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/714 (1, 771, 49187, 257, 2059)' - PASSED ssl_gtest.sh: #11788: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/715 (1, 771, 49187, 25497, 1025)' - PASSED ssl_gtest.sh: #11789: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/716 (1, 771, 49187, 25497, 1281)' - PASSED ssl_gtest.sh: #11790: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/717 (1, 771, 49187, 25497, 1537)' - PASSED ssl_gtest.sh: #11791: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/718 (1, 771, 49187, 25497, 1027)' - PASSED ssl_gtest.sh: #11792: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/719 (1, 771, 49187, 25497, 1283)' - PASSED ssl_gtest.sh: #11793: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/720 (1, 771, 49187, 25497, 2052)' - PASSED ssl_gtest.sh: #11794: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/721 (1, 771, 49187, 25497, 2053)' - PASSED ssl_gtest.sh: #11795: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/722 (1, 771, 49187, 25497, 2054)' - PASSED ssl_gtest.sh: #11796: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/723 (1, 771, 49187, 25497, 2057)' - PASSED ssl_gtest.sh: #11797: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/724 (1, 771, 49187, 25497, 2058)' - PASSED ssl_gtest.sh: #11798: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/725 (1, 771, 49187, 25497, 2059)' - PASSED ssl_gtest.sh: #11799: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/726 (1, 771, 49191, 29, 1025)' - PASSED ssl_gtest.sh: #11800: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/727 (1, 771, 49191, 29, 1281)' - PASSED ssl_gtest.sh: #11801: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/728 (1, 771, 49191, 29, 1537)' - PASSED ssl_gtest.sh: #11802: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/729 (1, 771, 49191, 29, 1027)' - PASSED ssl_gtest.sh: #11803: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/730 (1, 771, 49191, 29, 1283)' - PASSED ssl_gtest.sh: #11804: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/731 (1, 771, 49191, 29, 2052)' - PASSED ssl_gtest.sh: #11805: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/732 (1, 771, 49191, 29, 2053)' - PASSED ssl_gtest.sh: #11806: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/733 (1, 771, 49191, 29, 2054)' - PASSED ssl_gtest.sh: #11807: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/734 (1, 771, 49191, 29, 2057)' - PASSED ssl_gtest.sh: #11808: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/735 (1, 771, 49191, 29, 2058)' - PASSED ssl_gtest.sh: #11809: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/736 (1, 771, 49191, 29, 2059)' - PASSED ssl_gtest.sh: #11810: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/737 (1, 771, 49191, 23, 1025)' - PASSED ssl_gtest.sh: #11811: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/738 (1, 771, 49191, 23, 1281)' - PASSED ssl_gtest.sh: #11812: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/739 (1, 771, 49191, 23, 1537)' - PASSED ssl_gtest.sh: #11813: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/740 (1, 771, 49191, 23, 1027)' - PASSED ssl_gtest.sh: #11814: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/741 (1, 771, 49191, 23, 1283)' - PASSED ssl_gtest.sh: #11815: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/742 (1, 771, 49191, 23, 2052)' - PASSED ssl_gtest.sh: #11816: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/743 (1, 771, 49191, 23, 2053)' - PASSED ssl_gtest.sh: #11817: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/744 (1, 771, 49191, 23, 2054)' - PASSED ssl_gtest.sh: #11818: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/745 (1, 771, 49191, 23, 2057)' - PASSED ssl_gtest.sh: #11819: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/746 (1, 771, 49191, 23, 2058)' - PASSED ssl_gtest.sh: #11820: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/747 (1, 771, 49191, 23, 2059)' - PASSED ssl_gtest.sh: #11821: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/748 (1, 771, 49191, 24, 1025)' - PASSED ssl_gtest.sh: #11822: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/749 (1, 771, 49191, 24, 1281)' - PASSED ssl_gtest.sh: #11823: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/750 (1, 771, 49191, 24, 1537)' - PASSED ssl_gtest.sh: #11824: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/751 (1, 771, 49191, 24, 1027)' - PASSED ssl_gtest.sh: #11825: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/752 (1, 771, 49191, 24, 1283)' - PASSED ssl_gtest.sh: #11826: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/753 (1, 771, 49191, 24, 2052)' - PASSED ssl_gtest.sh: #11827: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/754 (1, 771, 49191, 24, 2053)' - PASSED ssl_gtest.sh: #11828: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/755 (1, 771, 49191, 24, 2054)' - PASSED ssl_gtest.sh: #11829: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/756 (1, 771, 49191, 24, 2057)' - PASSED ssl_gtest.sh: #11830: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/757 (1, 771, 49191, 24, 2058)' - PASSED ssl_gtest.sh: #11831: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/758 (1, 771, 49191, 24, 2059)' - PASSED ssl_gtest.sh: #11832: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/759 (1, 771, 49191, 256, 1025)' - PASSED ssl_gtest.sh: #11833: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/760 (1, 771, 49191, 256, 1281)' - PASSED ssl_gtest.sh: #11834: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/761 (1, 771, 49191, 256, 1537)' - PASSED ssl_gtest.sh: #11835: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/762 (1, 771, 49191, 256, 1027)' - PASSED ssl_gtest.sh: #11836: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/763 (1, 771, 49191, 256, 1283)' - PASSED ssl_gtest.sh: #11837: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/764 (1, 771, 49191, 256, 2052)' - PASSED ssl_gtest.sh: #11838: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/765 (1, 771, 49191, 256, 2053)' - PASSED ssl_gtest.sh: #11839: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/766 (1, 771, 49191, 256, 2054)' - PASSED ssl_gtest.sh: #11840: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/767 (1, 771, 49191, 256, 2057)' - PASSED ssl_gtest.sh: #11841: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/768 (1, 771, 49191, 256, 2058)' - PASSED ssl_gtest.sh: #11842: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/769 (1, 771, 49191, 256, 2059)' - PASSED ssl_gtest.sh: #11843: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/770 (1, 771, 49191, 257, 1025)' - PASSED ssl_gtest.sh: #11844: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/771 (1, 771, 49191, 257, 1281)' - PASSED ssl_gtest.sh: #11845: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/772 (1, 771, 49191, 257, 1537)' - PASSED ssl_gtest.sh: #11846: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/773 (1, 771, 49191, 257, 1027)' - PASSED ssl_gtest.sh: #11847: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/774 (1, 771, 49191, 257, 1283)' - PASSED ssl_gtest.sh: #11848: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/775 (1, 771, 49191, 257, 2052)' - PASSED ssl_gtest.sh: #11849: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/776 (1, 771, 49191, 257, 2053)' - PASSED ssl_gtest.sh: #11850: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/777 (1, 771, 49191, 257, 2054)' - PASSED ssl_gtest.sh: #11851: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/778 (1, 771, 49191, 257, 2057)' - PASSED ssl_gtest.sh: #11852: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/779 (1, 771, 49191, 257, 2058)' - PASSED ssl_gtest.sh: #11853: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/780 (1, 771, 49191, 257, 2059)' - PASSED ssl_gtest.sh: #11854: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/781 (1, 771, 49191, 25497, 1025)' - PASSED ssl_gtest.sh: #11855: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/782 (1, 771, 49191, 25497, 1281)' - PASSED ssl_gtest.sh: #11856: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/783 (1, 771, 49191, 25497, 1537)' - PASSED ssl_gtest.sh: #11857: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/784 (1, 771, 49191, 25497, 1027)' - PASSED ssl_gtest.sh: #11858: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/785 (1, 771, 49191, 25497, 1283)' - PASSED ssl_gtest.sh: #11859: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/786 (1, 771, 49191, 25497, 2052)' - PASSED ssl_gtest.sh: #11860: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/787 (1, 771, 49191, 25497, 2053)' - PASSED ssl_gtest.sh: #11861: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/788 (1, 771, 49191, 25497, 2054)' - PASSED ssl_gtest.sh: #11862: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/789 (1, 771, 49191, 25497, 2057)' - PASSED ssl_gtest.sh: #11863: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/790 (1, 771, 49191, 25497, 2058)' - PASSED ssl_gtest.sh: #11864: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/791 (1, 771, 49191, 25497, 2059)' - PASSED ssl_gtest.sh: #11865: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/792 (1, 771, 103, 29, 1025)' - PASSED ssl_gtest.sh: #11866: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/793 (1, 771, 103, 29, 1281)' - PASSED ssl_gtest.sh: #11867: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/794 (1, 771, 103, 29, 1537)' - PASSED ssl_gtest.sh: #11868: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/795 (1, 771, 103, 29, 1027)' - PASSED ssl_gtest.sh: #11869: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/796 (1, 771, 103, 29, 1283)' - PASSED ssl_gtest.sh: #11870: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/797 (1, 771, 103, 29, 2052)' - PASSED ssl_gtest.sh: #11871: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/798 (1, 771, 103, 29, 2053)' - PASSED ssl_gtest.sh: #11872: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/799 (1, 771, 103, 29, 2054)' - PASSED ssl_gtest.sh: #11873: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/800 (1, 771, 103, 29, 2057)' - PASSED ssl_gtest.sh: #11874: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/801 (1, 771, 103, 29, 2058)' - PASSED ssl_gtest.sh: #11875: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/802 (1, 771, 103, 29, 2059)' - PASSED ssl_gtest.sh: #11876: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/803 (1, 771, 103, 23, 1025)' - PASSED ssl_gtest.sh: #11877: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/804 (1, 771, 103, 23, 1281)' - PASSED ssl_gtest.sh: #11878: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/805 (1, 771, 103, 23, 1537)' - PASSED ssl_gtest.sh: #11879: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/806 (1, 771, 103, 23, 1027)' - PASSED ssl_gtest.sh: #11880: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/807 (1, 771, 103, 23, 1283)' - PASSED ssl_gtest.sh: #11881: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/808 (1, 771, 103, 23, 2052)' - PASSED ssl_gtest.sh: #11882: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/809 (1, 771, 103, 23, 2053)' - PASSED ssl_gtest.sh: #11883: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/810 (1, 771, 103, 23, 2054)' - PASSED ssl_gtest.sh: #11884: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/811 (1, 771, 103, 23, 2057)' - PASSED ssl_gtest.sh: #11885: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/812 (1, 771, 103, 23, 2058)' - PASSED ssl_gtest.sh: #11886: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/813 (1, 771, 103, 23, 2059)' - PASSED ssl_gtest.sh: #11887: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/814 (1, 771, 103, 24, 1025)' - PASSED ssl_gtest.sh: #11888: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/815 (1, 771, 103, 24, 1281)' - PASSED ssl_gtest.sh: #11889: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/816 (1, 771, 103, 24, 1537)' - PASSED ssl_gtest.sh: #11890: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/817 (1, 771, 103, 24, 1027)' - PASSED ssl_gtest.sh: #11891: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/818 (1, 771, 103, 24, 1283)' - PASSED ssl_gtest.sh: #11892: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/819 (1, 771, 103, 24, 2052)' - PASSED ssl_gtest.sh: #11893: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/820 (1, 771, 103, 24, 2053)' - PASSED ssl_gtest.sh: #11894: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/821 (1, 771, 103, 24, 2054)' - PASSED ssl_gtest.sh: #11895: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/822 (1, 771, 103, 24, 2057)' - PASSED ssl_gtest.sh: #11896: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/823 (1, 771, 103, 24, 2058)' - PASSED ssl_gtest.sh: #11897: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/824 (1, 771, 103, 24, 2059)' - PASSED ssl_gtest.sh: #11898: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/825 (1, 771, 103, 256, 1025)' - PASSED ssl_gtest.sh: #11899: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/826 (1, 771, 103, 256, 1281)' - PASSED ssl_gtest.sh: #11900: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/827 (1, 771, 103, 256, 1537)' - PASSED ssl_gtest.sh: #11901: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/828 (1, 771, 103, 256, 1027)' - PASSED ssl_gtest.sh: #11902: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/829 (1, 771, 103, 256, 1283)' - PASSED ssl_gtest.sh: #11903: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/830 (1, 771, 103, 256, 2052)' - PASSED ssl_gtest.sh: #11904: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/831 (1, 771, 103, 256, 2053)' - PASSED ssl_gtest.sh: #11905: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/832 (1, 771, 103, 256, 2054)' - PASSED ssl_gtest.sh: #11906: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/833 (1, 771, 103, 256, 2057)' - PASSED ssl_gtest.sh: #11907: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/834 (1, 771, 103, 256, 2058)' - PASSED ssl_gtest.sh: #11908: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/835 (1, 771, 103, 256, 2059)' - PASSED ssl_gtest.sh: #11909: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/836 (1, 771, 103, 257, 1025)' - PASSED ssl_gtest.sh: #11910: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/837 (1, 771, 103, 257, 1281)' - PASSED ssl_gtest.sh: #11911: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/838 (1, 771, 103, 257, 1537)' - PASSED ssl_gtest.sh: #11912: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/839 (1, 771, 103, 257, 1027)' - PASSED ssl_gtest.sh: #11913: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/840 (1, 771, 103, 257, 1283)' - PASSED ssl_gtest.sh: #11914: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/841 (1, 771, 103, 257, 2052)' - PASSED ssl_gtest.sh: #11915: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/842 (1, 771, 103, 257, 2053)' - PASSED ssl_gtest.sh: #11916: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/843 (1, 771, 103, 257, 2054)' - PASSED ssl_gtest.sh: #11917: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/844 (1, 771, 103, 257, 2057)' - PASSED ssl_gtest.sh: #11918: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/845 (1, 771, 103, 257, 2058)' - PASSED ssl_gtest.sh: #11919: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/846 (1, 771, 103, 257, 2059)' - PASSED ssl_gtest.sh: #11920: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/847 (1, 771, 103, 25497, 1025)' - PASSED ssl_gtest.sh: #11921: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/848 (1, 771, 103, 25497, 1281)' - PASSED ssl_gtest.sh: #11922: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/849 (1, 771, 103, 25497, 1537)' - PASSED ssl_gtest.sh: #11923: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/850 (1, 771, 103, 25497, 1027)' - PASSED ssl_gtest.sh: #11924: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/851 (1, 771, 103, 25497, 1283)' - PASSED ssl_gtest.sh: #11925: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/852 (1, 771, 103, 25497, 2052)' - PASSED ssl_gtest.sh: #11926: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/853 (1, 771, 103, 25497, 2053)' - PASSED ssl_gtest.sh: #11927: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/854 (1, 771, 103, 25497, 2054)' - PASSED ssl_gtest.sh: #11928: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/855 (1, 771, 103, 25497, 2057)' - PASSED ssl_gtest.sh: #11929: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/856 (1, 771, 103, 25497, 2058)' - PASSED ssl_gtest.sh: #11930: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/857 (1, 771, 103, 25497, 2059)' - PASSED ssl_gtest.sh: #11931: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/858 (1, 771, 60, 29, 1025)' - PASSED ssl_gtest.sh: #11932: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/859 (1, 771, 60, 29, 1281)' - PASSED ssl_gtest.sh: #11933: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/860 (1, 771, 60, 29, 1537)' - PASSED ssl_gtest.sh: #11934: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/861 (1, 771, 60, 29, 1027)' - PASSED ssl_gtest.sh: #11935: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/862 (1, 771, 60, 29, 1283)' - PASSED ssl_gtest.sh: #11936: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/863 (1, 771, 60, 29, 2052)' - PASSED ssl_gtest.sh: #11937: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/864 (1, 771, 60, 29, 2053)' - PASSED ssl_gtest.sh: #11938: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/865 (1, 771, 60, 29, 2054)' - PASSED ssl_gtest.sh: #11939: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/866 (1, 771, 60, 29, 2057)' - PASSED ssl_gtest.sh: #11940: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/867 (1, 771, 60, 29, 2058)' - PASSED ssl_gtest.sh: #11941: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/868 (1, 771, 60, 29, 2059)' - PASSED ssl_gtest.sh: #11942: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/869 (1, 771, 60, 23, 1025)' - PASSED ssl_gtest.sh: #11943: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/870 (1, 771, 60, 23, 1281)' - PASSED ssl_gtest.sh: #11944: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/871 (1, 771, 60, 23, 1537)' - PASSED ssl_gtest.sh: #11945: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/872 (1, 771, 60, 23, 1027)' - PASSED ssl_gtest.sh: #11946: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/873 (1, 771, 60, 23, 1283)' - PASSED ssl_gtest.sh: #11947: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/874 (1, 771, 60, 23, 2052)' - PASSED ssl_gtest.sh: #11948: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/875 (1, 771, 60, 23, 2053)' - PASSED ssl_gtest.sh: #11949: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/876 (1, 771, 60, 23, 2054)' - PASSED ssl_gtest.sh: #11950: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/877 (1, 771, 60, 23, 2057)' - PASSED ssl_gtest.sh: #11951: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/878 (1, 771, 60, 23, 2058)' - PASSED ssl_gtest.sh: #11952: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/879 (1, 771, 60, 23, 2059)' - PASSED ssl_gtest.sh: #11953: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/880 (1, 771, 60, 24, 1025)' - PASSED ssl_gtest.sh: #11954: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/881 (1, 771, 60, 24, 1281)' - PASSED ssl_gtest.sh: #11955: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/882 (1, 771, 60, 24, 1537)' - PASSED ssl_gtest.sh: #11956: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/883 (1, 771, 60, 24, 1027)' - PASSED ssl_gtest.sh: #11957: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/884 (1, 771, 60, 24, 1283)' - PASSED ssl_gtest.sh: #11958: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/885 (1, 771, 60, 24, 2052)' - PASSED ssl_gtest.sh: #11959: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/886 (1, 771, 60, 24, 2053)' - PASSED ssl_gtest.sh: #11960: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/887 (1, 771, 60, 24, 2054)' - PASSED ssl_gtest.sh: #11961: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/888 (1, 771, 60, 24, 2057)' - PASSED ssl_gtest.sh: #11962: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/889 (1, 771, 60, 24, 2058)' - PASSED ssl_gtest.sh: #11963: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/890 (1, 771, 60, 24, 2059)' - PASSED ssl_gtest.sh: #11964: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/891 (1, 771, 60, 256, 1025)' - PASSED ssl_gtest.sh: #11965: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/892 (1, 771, 60, 256, 1281)' - PASSED ssl_gtest.sh: #11966: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/893 (1, 771, 60, 256, 1537)' - PASSED ssl_gtest.sh: #11967: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/894 (1, 771, 60, 256, 1027)' - PASSED ssl_gtest.sh: #11968: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/895 (1, 771, 60, 256, 1283)' - PASSED ssl_gtest.sh: #11969: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/896 (1, 771, 60, 256, 2052)' - PASSED ssl_gtest.sh: #11970: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/897 (1, 771, 60, 256, 2053)' - PASSED ssl_gtest.sh: #11971: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/898 (1, 771, 60, 256, 2054)' - PASSED ssl_gtest.sh: #11972: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/899 (1, 771, 60, 256, 2057)' - PASSED ssl_gtest.sh: #11973: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/900 (1, 771, 60, 256, 2058)' - PASSED ssl_gtest.sh: #11974: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/901 (1, 771, 60, 256, 2059)' - PASSED ssl_gtest.sh: #11975: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/902 (1, 771, 60, 257, 1025)' - PASSED ssl_gtest.sh: #11976: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/903 (1, 771, 60, 257, 1281)' - PASSED ssl_gtest.sh: #11977: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/904 (1, 771, 60, 257, 1537)' - PASSED ssl_gtest.sh: #11978: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/905 (1, 771, 60, 257, 1027)' - PASSED ssl_gtest.sh: #11979: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/906 (1, 771, 60, 257, 1283)' - PASSED ssl_gtest.sh: #11980: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/907 (1, 771, 60, 257, 2052)' - PASSED ssl_gtest.sh: #11981: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/908 (1, 771, 60, 257, 2053)' - PASSED ssl_gtest.sh: #11982: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/909 (1, 771, 60, 257, 2054)' - PASSED ssl_gtest.sh: #11983: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/910 (1, 771, 60, 257, 2057)' - PASSED ssl_gtest.sh: #11984: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/911 (1, 771, 60, 257, 2058)' - PASSED ssl_gtest.sh: #11985: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/912 (1, 771, 60, 257, 2059)' - PASSED ssl_gtest.sh: #11986: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/913 (1, 771, 60, 25497, 1025)' - PASSED ssl_gtest.sh: #11987: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/914 (1, 771, 60, 25497, 1281)' - PASSED ssl_gtest.sh: #11988: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/915 (1, 771, 60, 25497, 1537)' - PASSED ssl_gtest.sh: #11989: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/916 (1, 771, 60, 25497, 1027)' - PASSED ssl_gtest.sh: #11990: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/917 (1, 771, 60, 25497, 1283)' - PASSED ssl_gtest.sh: #11991: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/918 (1, 771, 60, 25497, 2052)' - PASSED ssl_gtest.sh: #11992: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/919 (1, 771, 60, 25497, 2053)' - PASSED ssl_gtest.sh: #11993: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/920 (1, 771, 60, 25497, 2054)' - PASSED ssl_gtest.sh: #11994: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/921 (1, 771, 60, 25497, 2057)' - PASSED ssl_gtest.sh: #11995: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/922 (1, 771, 60, 25497, 2058)' - PASSED ssl_gtest.sh: #11996: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/923 (1, 771, 60, 25497, 2059)' - PASSED ssl_gtest.sh: #11997: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/924 (1, 771, 64, 29, 1025)' - PASSED ssl_gtest.sh: #11998: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/925 (1, 771, 64, 29, 1281)' - PASSED ssl_gtest.sh: #11999: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/926 (1, 771, 64, 29, 1537)' - PASSED ssl_gtest.sh: #12000: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/927 (1, 771, 64, 29, 1027)' - PASSED ssl_gtest.sh: #12001: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/928 (1, 771, 64, 29, 1283)' - PASSED ssl_gtest.sh: #12002: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/929 (1, 771, 64, 29, 2052)' - PASSED ssl_gtest.sh: #12003: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/930 (1, 771, 64, 29, 2053)' - PASSED ssl_gtest.sh: #12004: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/931 (1, 771, 64, 29, 2054)' - PASSED ssl_gtest.sh: #12005: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/932 (1, 771, 64, 29, 2057)' - PASSED ssl_gtest.sh: #12006: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/933 (1, 771, 64, 29, 2058)' - PASSED ssl_gtest.sh: #12007: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/934 (1, 771, 64, 29, 2059)' - PASSED ssl_gtest.sh: #12008: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/935 (1, 771, 64, 23, 1025)' - PASSED ssl_gtest.sh: #12009: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/936 (1, 771, 64, 23, 1281)' - PASSED ssl_gtest.sh: #12010: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/937 (1, 771, 64, 23, 1537)' - PASSED ssl_gtest.sh: #12011: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/938 (1, 771, 64, 23, 1027)' - PASSED ssl_gtest.sh: #12012: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/939 (1, 771, 64, 23, 1283)' - PASSED ssl_gtest.sh: #12013: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/940 (1, 771, 64, 23, 2052)' - PASSED ssl_gtest.sh: #12014: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/941 (1, 771, 64, 23, 2053)' - PASSED ssl_gtest.sh: #12015: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/942 (1, 771, 64, 23, 2054)' - PASSED ssl_gtest.sh: #12016: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/943 (1, 771, 64, 23, 2057)' - PASSED ssl_gtest.sh: #12017: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/944 (1, 771, 64, 23, 2058)' - PASSED ssl_gtest.sh: #12018: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/945 (1, 771, 64, 23, 2059)' - PASSED ssl_gtest.sh: #12019: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/946 (1, 771, 64, 24, 1025)' - PASSED ssl_gtest.sh: #12020: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/947 (1, 771, 64, 24, 1281)' - PASSED ssl_gtest.sh: #12021: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/948 (1, 771, 64, 24, 1537)' - PASSED ssl_gtest.sh: #12022: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/949 (1, 771, 64, 24, 1027)' - PASSED ssl_gtest.sh: #12023: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/950 (1, 771, 64, 24, 1283)' - PASSED ssl_gtest.sh: #12024: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/951 (1, 771, 64, 24, 2052)' - PASSED ssl_gtest.sh: #12025: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/952 (1, 771, 64, 24, 2053)' - PASSED ssl_gtest.sh: #12026: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/953 (1, 771, 64, 24, 2054)' - PASSED ssl_gtest.sh: #12027: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/954 (1, 771, 64, 24, 2057)' - PASSED ssl_gtest.sh: #12028: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/955 (1, 771, 64, 24, 2058)' - PASSED ssl_gtest.sh: #12029: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/956 (1, 771, 64, 24, 2059)' - PASSED ssl_gtest.sh: #12030: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/957 (1, 771, 64, 256, 1025)' - PASSED ssl_gtest.sh: #12031: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/958 (1, 771, 64, 256, 1281)' - PASSED ssl_gtest.sh: #12032: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/959 (1, 771, 64, 256, 1537)' - PASSED ssl_gtest.sh: #12033: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/960 (1, 771, 64, 256, 1027)' - PASSED ssl_gtest.sh: #12034: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/961 (1, 771, 64, 256, 1283)' - PASSED ssl_gtest.sh: #12035: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/962 (1, 771, 64, 256, 2052)' - PASSED ssl_gtest.sh: #12036: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/963 (1, 771, 64, 256, 2053)' - PASSED ssl_gtest.sh: #12037: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/964 (1, 771, 64, 256, 2054)' - PASSED ssl_gtest.sh: #12038: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/965 (1, 771, 64, 256, 2057)' - PASSED ssl_gtest.sh: #12039: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/966 (1, 771, 64, 256, 2058)' - PASSED ssl_gtest.sh: #12040: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/967 (1, 771, 64, 256, 2059)' - PASSED ssl_gtest.sh: #12041: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/968 (1, 771, 64, 257, 1025)' - PASSED ssl_gtest.sh: #12042: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/969 (1, 771, 64, 257, 1281)' - PASSED ssl_gtest.sh: #12043: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/970 (1, 771, 64, 257, 1537)' - PASSED ssl_gtest.sh: #12044: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/971 (1, 771, 64, 257, 1027)' - PASSED ssl_gtest.sh: #12045: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/972 (1, 771, 64, 257, 1283)' - PASSED ssl_gtest.sh: #12046: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/973 (1, 771, 64, 257, 2052)' - PASSED ssl_gtest.sh: #12047: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/974 (1, 771, 64, 257, 2053)' - PASSED ssl_gtest.sh: #12048: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/975 (1, 771, 64, 257, 2054)' - PASSED ssl_gtest.sh: #12049: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/976 (1, 771, 64, 257, 2057)' - PASSED ssl_gtest.sh: #12050: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/977 (1, 771, 64, 257, 2058)' - PASSED ssl_gtest.sh: #12051: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/978 (1, 771, 64, 257, 2059)' - PASSED ssl_gtest.sh: #12052: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/979 (1, 771, 64, 25497, 1025)' - PASSED ssl_gtest.sh: #12053: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/980 (1, 771, 64, 25497, 1281)' - PASSED ssl_gtest.sh: #12054: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/981 (1, 771, 64, 25497, 1537)' - PASSED ssl_gtest.sh: #12055: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/982 (1, 771, 64, 25497, 1027)' - PASSED ssl_gtest.sh: #12056: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/983 (1, 771, 64, 25497, 1283)' - PASSED ssl_gtest.sh: #12057: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/984 (1, 771, 64, 25497, 2052)' - PASSED ssl_gtest.sh: #12058: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/985 (1, 771, 64, 25497, 2053)' - PASSED ssl_gtest.sh: #12059: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/986 (1, 771, 64, 25497, 2054)' - PASSED ssl_gtest.sh: #12060: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/987 (1, 771, 64, 25497, 2057)' - PASSED ssl_gtest.sh: #12061: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/988 (1, 771, 64, 25497, 2058)' - PASSED ssl_gtest.sh: #12062: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/989 (1, 771, 64, 25497, 2059)' - PASSED ssl_gtest.sh: #12063: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/990 (1, 771, 106, 29, 1025)' - PASSED ssl_gtest.sh: #12064: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/991 (1, 771, 106, 29, 1281)' - PASSED ssl_gtest.sh: #12065: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/992 (1, 771, 106, 29, 1537)' - PASSED ssl_gtest.sh: #12066: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/993 (1, 771, 106, 29, 1027)' - PASSED ssl_gtest.sh: #12067: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/994 (1, 771, 106, 29, 1283)' - PASSED ssl_gtest.sh: #12068: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/995 (1, 771, 106, 29, 2052)' - PASSED ssl_gtest.sh: #12069: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/996 (1, 771, 106, 29, 2053)' - PASSED ssl_gtest.sh: #12070: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/997 (1, 771, 106, 29, 2054)' - PASSED ssl_gtest.sh: #12071: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/998 (1, 771, 106, 29, 2057)' - PASSED ssl_gtest.sh: #12072: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/999 (1, 771, 106, 29, 2058)' - PASSED ssl_gtest.sh: #12073: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1000 (1, 771, 106, 29, 2059)' - PASSED ssl_gtest.sh: #12074: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1001 (1, 771, 106, 23, 1025)' - PASSED ssl_gtest.sh: #12075: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1002 (1, 771, 106, 23, 1281)' - PASSED ssl_gtest.sh: #12076: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1003 (1, 771, 106, 23, 1537)' - PASSED ssl_gtest.sh: #12077: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1004 (1, 771, 106, 23, 1027)' - PASSED ssl_gtest.sh: #12078: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1005 (1, 771, 106, 23, 1283)' - PASSED ssl_gtest.sh: #12079: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1006 (1, 771, 106, 23, 2052)' - PASSED ssl_gtest.sh: #12080: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1007 (1, 771, 106, 23, 2053)' - PASSED ssl_gtest.sh: #12081: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1008 (1, 771, 106, 23, 2054)' - PASSED ssl_gtest.sh: #12082: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1009 (1, 771, 106, 23, 2057)' - PASSED ssl_gtest.sh: #12083: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1010 (1, 771, 106, 23, 2058)' - PASSED ssl_gtest.sh: #12084: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1011 (1, 771, 106, 23, 2059)' - PASSED ssl_gtest.sh: #12085: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1012 (1, 771, 106, 24, 1025)' - PASSED ssl_gtest.sh: #12086: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1013 (1, 771, 106, 24, 1281)' - PASSED ssl_gtest.sh: #12087: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1014 (1, 771, 106, 24, 1537)' - PASSED ssl_gtest.sh: #12088: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1015 (1, 771, 106, 24, 1027)' - PASSED ssl_gtest.sh: #12089: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1016 (1, 771, 106, 24, 1283)' - PASSED ssl_gtest.sh: #12090: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1017 (1, 771, 106, 24, 2052)' - PASSED ssl_gtest.sh: #12091: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1018 (1, 771, 106, 24, 2053)' - PASSED ssl_gtest.sh: #12092: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1019 (1, 771, 106, 24, 2054)' - PASSED ssl_gtest.sh: #12093: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1020 (1, 771, 106, 24, 2057)' - PASSED ssl_gtest.sh: #12094: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1021 (1, 771, 106, 24, 2058)' - PASSED ssl_gtest.sh: #12095: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1022 (1, 771, 106, 24, 2059)' - PASSED ssl_gtest.sh: #12096: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1023 (1, 771, 106, 256, 1025)' - PASSED ssl_gtest.sh: #12097: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1024 (1, 771, 106, 256, 1281)' - PASSED ssl_gtest.sh: #12098: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1025 (1, 771, 106, 256, 1537)' - PASSED ssl_gtest.sh: #12099: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1026 (1, 771, 106, 256, 1027)' - PASSED ssl_gtest.sh: #12100: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1027 (1, 771, 106, 256, 1283)' - PASSED ssl_gtest.sh: #12101: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1028 (1, 771, 106, 256, 2052)' - PASSED ssl_gtest.sh: #12102: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1029 (1, 771, 106, 256, 2053)' - PASSED ssl_gtest.sh: #12103: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1030 (1, 771, 106, 256, 2054)' - PASSED ssl_gtest.sh: #12104: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1031 (1, 771, 106, 256, 2057)' - PASSED ssl_gtest.sh: #12105: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1032 (1, 771, 106, 256, 2058)' - PASSED ssl_gtest.sh: #12106: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1033 (1, 771, 106, 256, 2059)' - PASSED ssl_gtest.sh: #12107: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1034 (1, 771, 106, 257, 1025)' - PASSED ssl_gtest.sh: #12108: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1035 (1, 771, 106, 257, 1281)' - PASSED ssl_gtest.sh: #12109: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1036 (1, 771, 106, 257, 1537)' - PASSED ssl_gtest.sh: #12110: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1037 (1, 771, 106, 257, 1027)' - PASSED ssl_gtest.sh: #12111: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1038 (1, 771, 106, 257, 1283)' - PASSED ssl_gtest.sh: #12112: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1039 (1, 771, 106, 257, 2052)' - PASSED ssl_gtest.sh: #12113: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1040 (1, 771, 106, 257, 2053)' - PASSED ssl_gtest.sh: #12114: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1041 (1, 771, 106, 257, 2054)' - PASSED ssl_gtest.sh: #12115: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1042 (1, 771, 106, 257, 2057)' - PASSED ssl_gtest.sh: #12116: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1043 (1, 771, 106, 257, 2058)' - PASSED ssl_gtest.sh: #12117: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1044 (1, 771, 106, 257, 2059)' - PASSED ssl_gtest.sh: #12118: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1045 (1, 771, 106, 25497, 1025)' - PASSED ssl_gtest.sh: #12119: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1046 (1, 771, 106, 25497, 1281)' - PASSED ssl_gtest.sh: #12120: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1047 (1, 771, 106, 25497, 1537)' - PASSED ssl_gtest.sh: #12121: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1048 (1, 771, 106, 25497, 1027)' - PASSED ssl_gtest.sh: #12122: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1049 (1, 771, 106, 25497, 1283)' - PASSED ssl_gtest.sh: #12123: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1050 (1, 771, 106, 25497, 2052)' - PASSED ssl_gtest.sh: #12124: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1051 (1, 771, 106, 25497, 2053)' - PASSED ssl_gtest.sh: #12125: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1052 (1, 771, 106, 25497, 2054)' - PASSED ssl_gtest.sh: #12126: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1053 (1, 771, 106, 25497, 2057)' - PASSED ssl_gtest.sh: #12127: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1054 (1, 771, 106, 25497, 2058)' - PASSED ssl_gtest.sh: #12128: 'CipherSuiteTLS12SigSchemes/TlsCipherSuiteTest: WriteLimit/1055 (1, 771, 106, 25497, 2059)' - PASSED ssl_gtest.sh: #12129: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 772, 4865, 29, 1027)' - PASSED ssl_gtest.sh: #12130: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 772, 4865, 29, 1283)' - PASSED ssl_gtest.sh: #12131: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 772, 4865, 29, 2052)' - PASSED ssl_gtest.sh: #12132: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 772, 4865, 29, 2053)' - PASSED ssl_gtest.sh: #12133: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 772, 4865, 29, 2054)' - PASSED ssl_gtest.sh: #12134: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 772, 4865, 29, 2057)' - PASSED ssl_gtest.sh: #12135: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/6 (0, 772, 4865, 29, 2058)' - PASSED ssl_gtest.sh: #12136: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/7 (0, 772, 4865, 29, 2059)' - PASSED ssl_gtest.sh: #12137: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/8 (0, 772, 4865, 23, 1027)' - PASSED ssl_gtest.sh: #12138: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/9 (0, 772, 4865, 23, 1283)' - PASSED ssl_gtest.sh: #12139: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/10 (0, 772, 4865, 23, 2052)' - PASSED ssl_gtest.sh: #12140: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/11 (0, 772, 4865, 23, 2053)' - PASSED ssl_gtest.sh: #12141: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/12 (0, 772, 4865, 23, 2054)' - PASSED ssl_gtest.sh: #12142: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/13 (0, 772, 4865, 23, 2057)' - PASSED ssl_gtest.sh: #12143: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/14 (0, 772, 4865, 23, 2058)' - PASSED ssl_gtest.sh: #12144: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/15 (0, 772, 4865, 23, 2059)' - PASSED ssl_gtest.sh: #12145: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/16 (0, 772, 4865, 24, 1027)' - PASSED ssl_gtest.sh: #12146: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/17 (0, 772, 4865, 24, 1283)' - PASSED ssl_gtest.sh: #12147: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/18 (0, 772, 4865, 24, 2052)' - PASSED ssl_gtest.sh: #12148: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/19 (0, 772, 4865, 24, 2053)' - PASSED ssl_gtest.sh: #12149: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/20 (0, 772, 4865, 24, 2054)' - PASSED ssl_gtest.sh: #12150: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/21 (0, 772, 4865, 24, 2057)' - PASSED ssl_gtest.sh: #12151: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/22 (0, 772, 4865, 24, 2058)' - PASSED ssl_gtest.sh: #12152: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/23 (0, 772, 4865, 24, 2059)' - PASSED ssl_gtest.sh: #12153: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/24 (0, 772, 4865, 256, 1027)' - PASSED ssl_gtest.sh: #12154: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/25 (0, 772, 4865, 256, 1283)' - PASSED ssl_gtest.sh: #12155: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/26 (0, 772, 4865, 256, 2052)' - PASSED ssl_gtest.sh: #12156: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/27 (0, 772, 4865, 256, 2053)' - PASSED ssl_gtest.sh: #12157: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/28 (0, 772, 4865, 256, 2054)' - PASSED ssl_gtest.sh: #12158: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/29 (0, 772, 4865, 256, 2057)' - PASSED ssl_gtest.sh: #12159: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/30 (0, 772, 4865, 256, 2058)' - PASSED ssl_gtest.sh: #12160: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/31 (0, 772, 4865, 256, 2059)' - PASSED ssl_gtest.sh: #12161: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/32 (0, 772, 4865, 257, 1027)' - PASSED ssl_gtest.sh: #12162: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/33 (0, 772, 4865, 257, 1283)' - PASSED ssl_gtest.sh: #12163: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/34 (0, 772, 4865, 257, 2052)' - PASSED ssl_gtest.sh: #12164: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/35 (0, 772, 4865, 257, 2053)' - PASSED ssl_gtest.sh: #12165: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/36 (0, 772, 4865, 257, 2054)' - PASSED ssl_gtest.sh: #12166: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/37 (0, 772, 4865, 257, 2057)' - PASSED ssl_gtest.sh: #12167: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/38 (0, 772, 4865, 257, 2058)' - PASSED ssl_gtest.sh: #12168: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/39 (0, 772, 4865, 257, 2059)' - PASSED ssl_gtest.sh: #12169: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/40 (0, 772, 4865, 25497, 1027)' - PASSED ssl_gtest.sh: #12170: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/41 (0, 772, 4865, 25497, 1283)' - PASSED ssl_gtest.sh: #12171: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/42 (0, 772, 4865, 25497, 2052)' - PASSED ssl_gtest.sh: #12172: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/43 (0, 772, 4865, 25497, 2053)' - PASSED ssl_gtest.sh: #12173: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/44 (0, 772, 4865, 25497, 2054)' - PASSED ssl_gtest.sh: #12174: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/45 (0, 772, 4865, 25497, 2057)' - PASSED ssl_gtest.sh: #12175: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/46 (0, 772, 4865, 25497, 2058)' - PASSED ssl_gtest.sh: #12176: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/47 (0, 772, 4865, 25497, 2059)' - PASSED ssl_gtest.sh: #12177: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/48 (0, 772, 4867, 29, 1027)' - PASSED ssl_gtest.sh: #12178: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/49 (0, 772, 4867, 29, 1283)' - PASSED ssl_gtest.sh: #12179: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/50 (0, 772, 4867, 29, 2052)' - PASSED ssl_gtest.sh: #12180: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/51 (0, 772, 4867, 29, 2053)' - PASSED ssl_gtest.sh: #12181: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/52 (0, 772, 4867, 29, 2054)' - PASSED ssl_gtest.sh: #12182: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/53 (0, 772, 4867, 29, 2057)' - PASSED ssl_gtest.sh: #12183: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/54 (0, 772, 4867, 29, 2058)' - PASSED ssl_gtest.sh: #12184: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/55 (0, 772, 4867, 29, 2059)' - PASSED ssl_gtest.sh: #12185: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/56 (0, 772, 4867, 23, 1027)' - PASSED ssl_gtest.sh: #12186: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/57 (0, 772, 4867, 23, 1283)' - PASSED ssl_gtest.sh: #12187: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/58 (0, 772, 4867, 23, 2052)' - PASSED ssl_gtest.sh: #12188: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/59 (0, 772, 4867, 23, 2053)' - PASSED ssl_gtest.sh: #12189: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/60 (0, 772, 4867, 23, 2054)' - PASSED ssl_gtest.sh: #12190: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/61 (0, 772, 4867, 23, 2057)' - PASSED ssl_gtest.sh: #12191: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/62 (0, 772, 4867, 23, 2058)' - PASSED ssl_gtest.sh: #12192: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/63 (0, 772, 4867, 23, 2059)' - PASSED ssl_gtest.sh: #12193: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/64 (0, 772, 4867, 24, 1027)' - PASSED ssl_gtest.sh: #12194: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/65 (0, 772, 4867, 24, 1283)' - PASSED ssl_gtest.sh: #12195: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/66 (0, 772, 4867, 24, 2052)' - PASSED ssl_gtest.sh: #12196: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/67 (0, 772, 4867, 24, 2053)' - PASSED ssl_gtest.sh: #12197: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/68 (0, 772, 4867, 24, 2054)' - PASSED ssl_gtest.sh: #12198: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/69 (0, 772, 4867, 24, 2057)' - PASSED ssl_gtest.sh: #12199: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/70 (0, 772, 4867, 24, 2058)' - PASSED ssl_gtest.sh: #12200: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/71 (0, 772, 4867, 24, 2059)' - PASSED ssl_gtest.sh: #12201: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/72 (0, 772, 4867, 256, 1027)' - PASSED ssl_gtest.sh: #12202: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/73 (0, 772, 4867, 256, 1283)' - PASSED ssl_gtest.sh: #12203: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/74 (0, 772, 4867, 256, 2052)' - PASSED ssl_gtest.sh: #12204: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/75 (0, 772, 4867, 256, 2053)' - PASSED ssl_gtest.sh: #12205: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/76 (0, 772, 4867, 256, 2054)' - PASSED ssl_gtest.sh: #12206: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/77 (0, 772, 4867, 256, 2057)' - PASSED ssl_gtest.sh: #12207: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/78 (0, 772, 4867, 256, 2058)' - PASSED ssl_gtest.sh: #12208: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/79 (0, 772, 4867, 256, 2059)' - PASSED ssl_gtest.sh: #12209: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/80 (0, 772, 4867, 257, 1027)' - PASSED ssl_gtest.sh: #12210: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/81 (0, 772, 4867, 257, 1283)' - PASSED ssl_gtest.sh: #12211: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/82 (0, 772, 4867, 257, 2052)' - PASSED ssl_gtest.sh: #12212: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/83 (0, 772, 4867, 257, 2053)' - PASSED ssl_gtest.sh: #12213: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/84 (0, 772, 4867, 257, 2054)' - PASSED ssl_gtest.sh: #12214: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/85 (0, 772, 4867, 257, 2057)' - PASSED ssl_gtest.sh: #12215: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/86 (0, 772, 4867, 257, 2058)' - PASSED ssl_gtest.sh: #12216: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/87 (0, 772, 4867, 257, 2059)' - PASSED ssl_gtest.sh: #12217: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/88 (0, 772, 4867, 25497, 1027)' - PASSED ssl_gtest.sh: #12218: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/89 (0, 772, 4867, 25497, 1283)' - PASSED ssl_gtest.sh: #12219: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/90 (0, 772, 4867, 25497, 2052)' - PASSED ssl_gtest.sh: #12220: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/91 (0, 772, 4867, 25497, 2053)' - PASSED ssl_gtest.sh: #12221: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/92 (0, 772, 4867, 25497, 2054)' - PASSED ssl_gtest.sh: #12222: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/93 (0, 772, 4867, 25497, 2057)' - PASSED ssl_gtest.sh: #12223: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/94 (0, 772, 4867, 25497, 2058)' - PASSED ssl_gtest.sh: #12224: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/95 (0, 772, 4867, 25497, 2059)' - PASSED ssl_gtest.sh: #12225: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/96 (0, 772, 4866, 29, 1027)' - PASSED ssl_gtest.sh: #12226: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/97 (0, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #12227: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/98 (0, 772, 4866, 29, 2052)' - PASSED ssl_gtest.sh: #12228: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/99 (0, 772, 4866, 29, 2053)' - PASSED ssl_gtest.sh: #12229: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/100 (0, 772, 4866, 29, 2054)' - PASSED ssl_gtest.sh: #12230: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/101 (0, 772, 4866, 29, 2057)' - PASSED ssl_gtest.sh: #12231: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/102 (0, 772, 4866, 29, 2058)' - PASSED ssl_gtest.sh: #12232: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/103 (0, 772, 4866, 29, 2059)' - PASSED ssl_gtest.sh: #12233: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/104 (0, 772, 4866, 23, 1027)' - PASSED ssl_gtest.sh: #12234: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/105 (0, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #12235: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/106 (0, 772, 4866, 23, 2052)' - PASSED ssl_gtest.sh: #12236: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/107 (0, 772, 4866, 23, 2053)' - PASSED ssl_gtest.sh: #12237: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/108 (0, 772, 4866, 23, 2054)' - PASSED ssl_gtest.sh: #12238: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/109 (0, 772, 4866, 23, 2057)' - PASSED ssl_gtest.sh: #12239: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/110 (0, 772, 4866, 23, 2058)' - PASSED ssl_gtest.sh: #12240: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/111 (0, 772, 4866, 23, 2059)' - PASSED ssl_gtest.sh: #12241: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/112 (0, 772, 4866, 24, 1027)' - PASSED ssl_gtest.sh: #12242: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/113 (0, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #12243: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/114 (0, 772, 4866, 24, 2052)' - PASSED ssl_gtest.sh: #12244: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/115 (0, 772, 4866, 24, 2053)' - PASSED ssl_gtest.sh: #12245: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/116 (0, 772, 4866, 24, 2054)' - PASSED ssl_gtest.sh: #12246: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/117 (0, 772, 4866, 24, 2057)' - PASSED ssl_gtest.sh: #12247: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/118 (0, 772, 4866, 24, 2058)' - PASSED ssl_gtest.sh: #12248: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/119 (0, 772, 4866, 24, 2059)' - PASSED ssl_gtest.sh: #12249: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/120 (0, 772, 4866, 256, 1027)' - PASSED ssl_gtest.sh: #12250: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/121 (0, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #12251: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/122 (0, 772, 4866, 256, 2052)' - PASSED ssl_gtest.sh: #12252: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/123 (0, 772, 4866, 256, 2053)' - PASSED ssl_gtest.sh: #12253: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/124 (0, 772, 4866, 256, 2054)' - PASSED ssl_gtest.sh: #12254: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/125 (0, 772, 4866, 256, 2057)' - PASSED ssl_gtest.sh: #12255: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/126 (0, 772, 4866, 256, 2058)' - PASSED ssl_gtest.sh: #12256: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/127 (0, 772, 4866, 256, 2059)' - PASSED ssl_gtest.sh: #12257: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/128 (0, 772, 4866, 257, 1027)' - PASSED ssl_gtest.sh: #12258: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/129 (0, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #12259: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/130 (0, 772, 4866, 257, 2052)' - PASSED ssl_gtest.sh: #12260: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/131 (0, 772, 4866, 257, 2053)' - PASSED ssl_gtest.sh: #12261: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/132 (0, 772, 4866, 257, 2054)' - PASSED ssl_gtest.sh: #12262: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/133 (0, 772, 4866, 257, 2057)' - PASSED ssl_gtest.sh: #12263: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/134 (0, 772, 4866, 257, 2058)' - PASSED ssl_gtest.sh: #12264: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/135 (0, 772, 4866, 257, 2059)' - PASSED ssl_gtest.sh: #12265: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/136 (0, 772, 4866, 25497, 1027)' - PASSED ssl_gtest.sh: #12266: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/137 (0, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #12267: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/138 (0, 772, 4866, 25497, 2052)' - PASSED ssl_gtest.sh: #12268: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/139 (0, 772, 4866, 25497, 2053)' - PASSED ssl_gtest.sh: #12269: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/140 (0, 772, 4866, 25497, 2054)' - PASSED ssl_gtest.sh: #12270: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/141 (0, 772, 4866, 25497, 2057)' - PASSED ssl_gtest.sh: #12271: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/142 (0, 772, 4866, 25497, 2058)' - PASSED ssl_gtest.sh: #12272: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/143 (0, 772, 4866, 25497, 2059)' - PASSED ssl_gtest.sh: #12273: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/144 (1, 772, 4865, 29, 1027)' - PASSED ssl_gtest.sh: #12274: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/145 (1, 772, 4865, 29, 1283)' - PASSED ssl_gtest.sh: #12275: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/146 (1, 772, 4865, 29, 2052)' - PASSED ssl_gtest.sh: #12276: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/147 (1, 772, 4865, 29, 2053)' - PASSED ssl_gtest.sh: #12277: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/148 (1, 772, 4865, 29, 2054)' - PASSED ssl_gtest.sh: #12278: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/149 (1, 772, 4865, 29, 2057)' - PASSED ssl_gtest.sh: #12279: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/150 (1, 772, 4865, 29, 2058)' - PASSED ssl_gtest.sh: #12280: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/151 (1, 772, 4865, 29, 2059)' - PASSED ssl_gtest.sh: #12281: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/152 (1, 772, 4865, 23, 1027)' - PASSED ssl_gtest.sh: #12282: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/153 (1, 772, 4865, 23, 1283)' - PASSED ssl_gtest.sh: #12283: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/154 (1, 772, 4865, 23, 2052)' - PASSED ssl_gtest.sh: #12284: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/155 (1, 772, 4865, 23, 2053)' - PASSED ssl_gtest.sh: #12285: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/156 (1, 772, 4865, 23, 2054)' - PASSED ssl_gtest.sh: #12286: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/157 (1, 772, 4865, 23, 2057)' - PASSED ssl_gtest.sh: #12287: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/158 (1, 772, 4865, 23, 2058)' - PASSED ssl_gtest.sh: #12288: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/159 (1, 772, 4865, 23, 2059)' - PASSED ssl_gtest.sh: #12289: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/160 (1, 772, 4865, 24, 1027)' - PASSED ssl_gtest.sh: #12290: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/161 (1, 772, 4865, 24, 1283)' - PASSED ssl_gtest.sh: #12291: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/162 (1, 772, 4865, 24, 2052)' - PASSED ssl_gtest.sh: #12292: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/163 (1, 772, 4865, 24, 2053)' - PASSED ssl_gtest.sh: #12293: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/164 (1, 772, 4865, 24, 2054)' - PASSED ssl_gtest.sh: #12294: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/165 (1, 772, 4865, 24, 2057)' - PASSED ssl_gtest.sh: #12295: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/166 (1, 772, 4865, 24, 2058)' - PASSED ssl_gtest.sh: #12296: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/167 (1, 772, 4865, 24, 2059)' - PASSED ssl_gtest.sh: #12297: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/168 (1, 772, 4865, 256, 1027)' - PASSED ssl_gtest.sh: #12298: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/169 (1, 772, 4865, 256, 1283)' - PASSED ssl_gtest.sh: #12299: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/170 (1, 772, 4865, 256, 2052)' - PASSED ssl_gtest.sh: #12300: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/171 (1, 772, 4865, 256, 2053)' - PASSED ssl_gtest.sh: #12301: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/172 (1, 772, 4865, 256, 2054)' - PASSED ssl_gtest.sh: #12302: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/173 (1, 772, 4865, 256, 2057)' - PASSED ssl_gtest.sh: #12303: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/174 (1, 772, 4865, 256, 2058)' - PASSED ssl_gtest.sh: #12304: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/175 (1, 772, 4865, 256, 2059)' - PASSED ssl_gtest.sh: #12305: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/176 (1, 772, 4865, 257, 1027)' - PASSED ssl_gtest.sh: #12306: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/177 (1, 772, 4865, 257, 1283)' - PASSED ssl_gtest.sh: #12307: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/178 (1, 772, 4865, 257, 2052)' - PASSED ssl_gtest.sh: #12308: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/179 (1, 772, 4865, 257, 2053)' - PASSED ssl_gtest.sh: #12309: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/180 (1, 772, 4865, 257, 2054)' - PASSED ssl_gtest.sh: #12310: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/181 (1, 772, 4865, 257, 2057)' - PASSED ssl_gtest.sh: #12311: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/182 (1, 772, 4865, 257, 2058)' - PASSED ssl_gtest.sh: #12312: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/183 (1, 772, 4865, 257, 2059)' - PASSED ssl_gtest.sh: #12313: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/184 (1, 772, 4865, 25497, 1027)' - PASSED ssl_gtest.sh: #12314: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/185 (1, 772, 4865, 25497, 1283)' - PASSED ssl_gtest.sh: #12315: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/186 (1, 772, 4865, 25497, 2052)' - PASSED ssl_gtest.sh: #12316: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/187 (1, 772, 4865, 25497, 2053)' - PASSED ssl_gtest.sh: #12317: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/188 (1, 772, 4865, 25497, 2054)' - PASSED ssl_gtest.sh: #12318: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/189 (1, 772, 4865, 25497, 2057)' - PASSED ssl_gtest.sh: #12319: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/190 (1, 772, 4865, 25497, 2058)' - PASSED ssl_gtest.sh: #12320: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/191 (1, 772, 4865, 25497, 2059)' - PASSED ssl_gtest.sh: #12321: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/192 (1, 772, 4867, 29, 1027)' - PASSED ssl_gtest.sh: #12322: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/193 (1, 772, 4867, 29, 1283)' - PASSED ssl_gtest.sh: #12323: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/194 (1, 772, 4867, 29, 2052)' - PASSED ssl_gtest.sh: #12324: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/195 (1, 772, 4867, 29, 2053)' - PASSED ssl_gtest.sh: #12325: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/196 (1, 772, 4867, 29, 2054)' - PASSED ssl_gtest.sh: #12326: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/197 (1, 772, 4867, 29, 2057)' - PASSED ssl_gtest.sh: #12327: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/198 (1, 772, 4867, 29, 2058)' - PASSED ssl_gtest.sh: #12328: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/199 (1, 772, 4867, 29, 2059)' - PASSED ssl_gtest.sh: #12329: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/200 (1, 772, 4867, 23, 1027)' - PASSED ssl_gtest.sh: #12330: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/201 (1, 772, 4867, 23, 1283)' - PASSED ssl_gtest.sh: #12331: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/202 (1, 772, 4867, 23, 2052)' - PASSED ssl_gtest.sh: #12332: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/203 (1, 772, 4867, 23, 2053)' - PASSED ssl_gtest.sh: #12333: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/204 (1, 772, 4867, 23, 2054)' - PASSED ssl_gtest.sh: #12334: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/205 (1, 772, 4867, 23, 2057)' - PASSED ssl_gtest.sh: #12335: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/206 (1, 772, 4867, 23, 2058)' - PASSED ssl_gtest.sh: #12336: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/207 (1, 772, 4867, 23, 2059)' - PASSED ssl_gtest.sh: #12337: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/208 (1, 772, 4867, 24, 1027)' - PASSED ssl_gtest.sh: #12338: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/209 (1, 772, 4867, 24, 1283)' - PASSED ssl_gtest.sh: #12339: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/210 (1, 772, 4867, 24, 2052)' - PASSED ssl_gtest.sh: #12340: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/211 (1, 772, 4867, 24, 2053)' - PASSED ssl_gtest.sh: #12341: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/212 (1, 772, 4867, 24, 2054)' - PASSED ssl_gtest.sh: #12342: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/213 (1, 772, 4867, 24, 2057)' - PASSED ssl_gtest.sh: #12343: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/214 (1, 772, 4867, 24, 2058)' - PASSED ssl_gtest.sh: #12344: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/215 (1, 772, 4867, 24, 2059)' - PASSED ssl_gtest.sh: #12345: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/216 (1, 772, 4867, 256, 1027)' - PASSED ssl_gtest.sh: #12346: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/217 (1, 772, 4867, 256, 1283)' - PASSED ssl_gtest.sh: #12347: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/218 (1, 772, 4867, 256, 2052)' - PASSED ssl_gtest.sh: #12348: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/219 (1, 772, 4867, 256, 2053)' - PASSED ssl_gtest.sh: #12349: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/220 (1, 772, 4867, 256, 2054)' - PASSED ssl_gtest.sh: #12350: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/221 (1, 772, 4867, 256, 2057)' - PASSED ssl_gtest.sh: #12351: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/222 (1, 772, 4867, 256, 2058)' - PASSED ssl_gtest.sh: #12352: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/223 (1, 772, 4867, 256, 2059)' - PASSED ssl_gtest.sh: #12353: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/224 (1, 772, 4867, 257, 1027)' - PASSED ssl_gtest.sh: #12354: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/225 (1, 772, 4867, 257, 1283)' - PASSED ssl_gtest.sh: #12355: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/226 (1, 772, 4867, 257, 2052)' - PASSED ssl_gtest.sh: #12356: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/227 (1, 772, 4867, 257, 2053)' - PASSED ssl_gtest.sh: #12357: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/228 (1, 772, 4867, 257, 2054)' - PASSED ssl_gtest.sh: #12358: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/229 (1, 772, 4867, 257, 2057)' - PASSED ssl_gtest.sh: #12359: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/230 (1, 772, 4867, 257, 2058)' - PASSED ssl_gtest.sh: #12360: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/231 (1, 772, 4867, 257, 2059)' - PASSED ssl_gtest.sh: #12361: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/232 (1, 772, 4867, 25497, 1027)' - PASSED ssl_gtest.sh: #12362: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/233 (1, 772, 4867, 25497, 1283)' - PASSED ssl_gtest.sh: #12363: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/234 (1, 772, 4867, 25497, 2052)' - PASSED ssl_gtest.sh: #12364: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/235 (1, 772, 4867, 25497, 2053)' - PASSED ssl_gtest.sh: #12365: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/236 (1, 772, 4867, 25497, 2054)' - PASSED ssl_gtest.sh: #12366: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/237 (1, 772, 4867, 25497, 2057)' - PASSED ssl_gtest.sh: #12367: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/238 (1, 772, 4867, 25497, 2058)' - PASSED ssl_gtest.sh: #12368: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/239 (1, 772, 4867, 25497, 2059)' - PASSED ssl_gtest.sh: #12369: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/240 (1, 772, 4866, 29, 1027)' - PASSED ssl_gtest.sh: #12370: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/241 (1, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #12371: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/242 (1, 772, 4866, 29, 2052)' - PASSED ssl_gtest.sh: #12372: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/243 (1, 772, 4866, 29, 2053)' - PASSED ssl_gtest.sh: #12373: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/244 (1, 772, 4866, 29, 2054)' - PASSED ssl_gtest.sh: #12374: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/245 (1, 772, 4866, 29, 2057)' - PASSED ssl_gtest.sh: #12375: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/246 (1, 772, 4866, 29, 2058)' - PASSED ssl_gtest.sh: #12376: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/247 (1, 772, 4866, 29, 2059)' - PASSED ssl_gtest.sh: #12377: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/248 (1, 772, 4866, 23, 1027)' - PASSED ssl_gtest.sh: #12378: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/249 (1, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #12379: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/250 (1, 772, 4866, 23, 2052)' - PASSED ssl_gtest.sh: #12380: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/251 (1, 772, 4866, 23, 2053)' - PASSED ssl_gtest.sh: #12381: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/252 (1, 772, 4866, 23, 2054)' - PASSED ssl_gtest.sh: #12382: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/253 (1, 772, 4866, 23, 2057)' - PASSED ssl_gtest.sh: #12383: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/254 (1, 772, 4866, 23, 2058)' - PASSED ssl_gtest.sh: #12384: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/255 (1, 772, 4866, 23, 2059)' - PASSED ssl_gtest.sh: #12385: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/256 (1, 772, 4866, 24, 1027)' - PASSED ssl_gtest.sh: #12386: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/257 (1, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #12387: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/258 (1, 772, 4866, 24, 2052)' - PASSED ssl_gtest.sh: #12388: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/259 (1, 772, 4866, 24, 2053)' - PASSED ssl_gtest.sh: #12389: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/260 (1, 772, 4866, 24, 2054)' - PASSED ssl_gtest.sh: #12390: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/261 (1, 772, 4866, 24, 2057)' - PASSED ssl_gtest.sh: #12391: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/262 (1, 772, 4866, 24, 2058)' - PASSED ssl_gtest.sh: #12392: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/263 (1, 772, 4866, 24, 2059)' - PASSED ssl_gtest.sh: #12393: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/264 (1, 772, 4866, 256, 1027)' - PASSED ssl_gtest.sh: #12394: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/265 (1, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #12395: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/266 (1, 772, 4866, 256, 2052)' - PASSED ssl_gtest.sh: #12396: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/267 (1, 772, 4866, 256, 2053)' - PASSED ssl_gtest.sh: #12397: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/268 (1, 772, 4866, 256, 2054)' - PASSED ssl_gtest.sh: #12398: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/269 (1, 772, 4866, 256, 2057)' - PASSED ssl_gtest.sh: #12399: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/270 (1, 772, 4866, 256, 2058)' - PASSED ssl_gtest.sh: #12400: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/271 (1, 772, 4866, 256, 2059)' - PASSED ssl_gtest.sh: #12401: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/272 (1, 772, 4866, 257, 1027)' - PASSED ssl_gtest.sh: #12402: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/273 (1, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #12403: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/274 (1, 772, 4866, 257, 2052)' - PASSED ssl_gtest.sh: #12404: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/275 (1, 772, 4866, 257, 2053)' - PASSED ssl_gtest.sh: #12405: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/276 (1, 772, 4866, 257, 2054)' - PASSED ssl_gtest.sh: #12406: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/277 (1, 772, 4866, 257, 2057)' - PASSED ssl_gtest.sh: #12407: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/278 (1, 772, 4866, 257, 2058)' - PASSED ssl_gtest.sh: #12408: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/279 (1, 772, 4866, 257, 2059)' - PASSED ssl_gtest.sh: #12409: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/280 (1, 772, 4866, 25497, 1027)' - PASSED ssl_gtest.sh: #12410: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/281 (1, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #12411: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/282 (1, 772, 4866, 25497, 2052)' - PASSED ssl_gtest.sh: #12412: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/283 (1, 772, 4866, 25497, 2053)' - PASSED ssl_gtest.sh: #12413: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/284 (1, 772, 4866, 25497, 2054)' - PASSED ssl_gtest.sh: #12414: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/285 (1, 772, 4866, 25497, 2057)' - PASSED ssl_gtest.sh: #12415: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/286 (1, 772, 4866, 25497, 2058)' - PASSED ssl_gtest.sh: #12416: 'CipherSuiteTLS13/TlsCipherSuiteTest: SingleCipherSuite/287 (1, 772, 4866, 25497, 2059)' - PASSED ssl_gtest.sh: #12417: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 772, 4865, 29, 1027)' - PASSED ssl_gtest.sh: #12418: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 772, 4865, 29, 1283)' - PASSED ssl_gtest.sh: #12419: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/2 (0, 772, 4865, 29, 2052)' - PASSED ssl_gtest.sh: #12420: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/3 (0, 772, 4865, 29, 2053)' - PASSED ssl_gtest.sh: #12421: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 772, 4865, 29, 2054)' - PASSED ssl_gtest.sh: #12422: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 772, 4865, 29, 2057)' - PASSED ssl_gtest.sh: #12423: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/6 (0, 772, 4865, 29, 2058)' - PASSED ssl_gtest.sh: #12424: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/7 (0, 772, 4865, 29, 2059)' - PASSED ssl_gtest.sh: #12425: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/8 (0, 772, 4865, 23, 1027)' - PASSED ssl_gtest.sh: #12426: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/9 (0, 772, 4865, 23, 1283)' - PASSED ssl_gtest.sh: #12427: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/10 (0, 772, 4865, 23, 2052)' - PASSED ssl_gtest.sh: #12428: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/11 (0, 772, 4865, 23, 2053)' - PASSED ssl_gtest.sh: #12429: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/12 (0, 772, 4865, 23, 2054)' - PASSED ssl_gtest.sh: #12430: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/13 (0, 772, 4865, 23, 2057)' - PASSED ssl_gtest.sh: #12431: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/14 (0, 772, 4865, 23, 2058)' - PASSED ssl_gtest.sh: #12432: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/15 (0, 772, 4865, 23, 2059)' - PASSED ssl_gtest.sh: #12433: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/16 (0, 772, 4865, 24, 1027)' - PASSED ssl_gtest.sh: #12434: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/17 (0, 772, 4865, 24, 1283)' - PASSED ssl_gtest.sh: #12435: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/18 (0, 772, 4865, 24, 2052)' - PASSED ssl_gtest.sh: #12436: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/19 (0, 772, 4865, 24, 2053)' - PASSED ssl_gtest.sh: #12437: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/20 (0, 772, 4865, 24, 2054)' - PASSED ssl_gtest.sh: #12438: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/21 (0, 772, 4865, 24, 2057)' - PASSED ssl_gtest.sh: #12439: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/22 (0, 772, 4865, 24, 2058)' - PASSED ssl_gtest.sh: #12440: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/23 (0, 772, 4865, 24, 2059)' - PASSED ssl_gtest.sh: #12441: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/24 (0, 772, 4865, 256, 1027)' - PASSED ssl_gtest.sh: #12442: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/25 (0, 772, 4865, 256, 1283)' - PASSED ssl_gtest.sh: #12443: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/26 (0, 772, 4865, 256, 2052)' - PASSED ssl_gtest.sh: #12444: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/27 (0, 772, 4865, 256, 2053)' - PASSED ssl_gtest.sh: #12445: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/28 (0, 772, 4865, 256, 2054)' - PASSED ssl_gtest.sh: #12446: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/29 (0, 772, 4865, 256, 2057)' - PASSED ssl_gtest.sh: #12447: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/30 (0, 772, 4865, 256, 2058)' - PASSED ssl_gtest.sh: #12448: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/31 (0, 772, 4865, 256, 2059)' - PASSED ssl_gtest.sh: #12449: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/32 (0, 772, 4865, 257, 1027)' - PASSED ssl_gtest.sh: #12450: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/33 (0, 772, 4865, 257, 1283)' - PASSED ssl_gtest.sh: #12451: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/34 (0, 772, 4865, 257, 2052)' - PASSED ssl_gtest.sh: #12452: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/35 (0, 772, 4865, 257, 2053)' - PASSED ssl_gtest.sh: #12453: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/36 (0, 772, 4865, 257, 2054)' - PASSED ssl_gtest.sh: #12454: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/37 (0, 772, 4865, 257, 2057)' - PASSED ssl_gtest.sh: #12455: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/38 (0, 772, 4865, 257, 2058)' - PASSED ssl_gtest.sh: #12456: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/39 (0, 772, 4865, 257, 2059)' - PASSED ssl_gtest.sh: #12457: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/40 (0, 772, 4865, 25497, 1027)' - PASSED ssl_gtest.sh: #12458: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/41 (0, 772, 4865, 25497, 1283)' - PASSED ssl_gtest.sh: #12459: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/42 (0, 772, 4865, 25497, 2052)' - PASSED ssl_gtest.sh: #12460: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/43 (0, 772, 4865, 25497, 2053)' - PASSED ssl_gtest.sh: #12461: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/44 (0, 772, 4865, 25497, 2054)' - PASSED ssl_gtest.sh: #12462: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/45 (0, 772, 4865, 25497, 2057)' - PASSED ssl_gtest.sh: #12463: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/46 (0, 772, 4865, 25497, 2058)' - PASSED ssl_gtest.sh: #12464: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/47 (0, 772, 4865, 25497, 2059)' - PASSED ssl_gtest.sh: #12465: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/48 (0, 772, 4867, 29, 1027)' - PASSED ssl_gtest.sh: #12466: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/49 (0, 772, 4867, 29, 1283)' - PASSED ssl_gtest.sh: #12467: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/50 (0, 772, 4867, 29, 2052)' - PASSED ssl_gtest.sh: #12468: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/51 (0, 772, 4867, 29, 2053)' - PASSED ssl_gtest.sh: #12469: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/52 (0, 772, 4867, 29, 2054)' - PASSED ssl_gtest.sh: #12470: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/53 (0, 772, 4867, 29, 2057)' - PASSED ssl_gtest.sh: #12471: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/54 (0, 772, 4867, 29, 2058)' - PASSED ssl_gtest.sh: #12472: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/55 (0, 772, 4867, 29, 2059)' - PASSED ssl_gtest.sh: #12473: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/56 (0, 772, 4867, 23, 1027)' - PASSED ssl_gtest.sh: #12474: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/57 (0, 772, 4867, 23, 1283)' - PASSED ssl_gtest.sh: #12475: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/58 (0, 772, 4867, 23, 2052)' - PASSED ssl_gtest.sh: #12476: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/59 (0, 772, 4867, 23, 2053)' - PASSED ssl_gtest.sh: #12477: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/60 (0, 772, 4867, 23, 2054)' - PASSED ssl_gtest.sh: #12478: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/61 (0, 772, 4867, 23, 2057)' - PASSED ssl_gtest.sh: #12479: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/62 (0, 772, 4867, 23, 2058)' - PASSED ssl_gtest.sh: #12480: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/63 (0, 772, 4867, 23, 2059)' - PASSED ssl_gtest.sh: #12481: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/64 (0, 772, 4867, 24, 1027)' - PASSED ssl_gtest.sh: #12482: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/65 (0, 772, 4867, 24, 1283)' - PASSED ssl_gtest.sh: #12483: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/66 (0, 772, 4867, 24, 2052)' - PASSED ssl_gtest.sh: #12484: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/67 (0, 772, 4867, 24, 2053)' - PASSED ssl_gtest.sh: #12485: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/68 (0, 772, 4867, 24, 2054)' - PASSED ssl_gtest.sh: #12486: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/69 (0, 772, 4867, 24, 2057)' - PASSED ssl_gtest.sh: #12487: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/70 (0, 772, 4867, 24, 2058)' - PASSED ssl_gtest.sh: #12488: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/71 (0, 772, 4867, 24, 2059)' - PASSED ssl_gtest.sh: #12489: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/72 (0, 772, 4867, 256, 1027)' - PASSED ssl_gtest.sh: #12490: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/73 (0, 772, 4867, 256, 1283)' - PASSED ssl_gtest.sh: #12491: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/74 (0, 772, 4867, 256, 2052)' - PASSED ssl_gtest.sh: #12492: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/75 (0, 772, 4867, 256, 2053)' - PASSED ssl_gtest.sh: #12493: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/76 (0, 772, 4867, 256, 2054)' - PASSED ssl_gtest.sh: #12494: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/77 (0, 772, 4867, 256, 2057)' - PASSED ssl_gtest.sh: #12495: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/78 (0, 772, 4867, 256, 2058)' - PASSED ssl_gtest.sh: #12496: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/79 (0, 772, 4867, 256, 2059)' - PASSED ssl_gtest.sh: #12497: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/80 (0, 772, 4867, 257, 1027)' - PASSED ssl_gtest.sh: #12498: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/81 (0, 772, 4867, 257, 1283)' - PASSED ssl_gtest.sh: #12499: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/82 (0, 772, 4867, 257, 2052)' - PASSED ssl_gtest.sh: #12500: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/83 (0, 772, 4867, 257, 2053)' - PASSED ssl_gtest.sh: #12501: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/84 (0, 772, 4867, 257, 2054)' - PASSED ssl_gtest.sh: #12502: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/85 (0, 772, 4867, 257, 2057)' - PASSED ssl_gtest.sh: #12503: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/86 (0, 772, 4867, 257, 2058)' - PASSED ssl_gtest.sh: #12504: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/87 (0, 772, 4867, 257, 2059)' - PASSED ssl_gtest.sh: #12505: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/88 (0, 772, 4867, 25497, 1027)' - PASSED ssl_gtest.sh: #12506: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/89 (0, 772, 4867, 25497, 1283)' - PASSED ssl_gtest.sh: #12507: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/90 (0, 772, 4867, 25497, 2052)' - PASSED ssl_gtest.sh: #12508: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/91 (0, 772, 4867, 25497, 2053)' - PASSED ssl_gtest.sh: #12509: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/92 (0, 772, 4867, 25497, 2054)' - PASSED ssl_gtest.sh: #12510: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/93 (0, 772, 4867, 25497, 2057)' - PASSED ssl_gtest.sh: #12511: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/94 (0, 772, 4867, 25497, 2058)' - PASSED ssl_gtest.sh: #12512: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/95 (0, 772, 4867, 25497, 2059)' - PASSED ssl_gtest.sh: #12513: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/96 (0, 772, 4866, 29, 1027)' - PASSED ssl_gtest.sh: #12514: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/97 (0, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #12515: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/98 (0, 772, 4866, 29, 2052)' - PASSED ssl_gtest.sh: #12516: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/99 (0, 772, 4866, 29, 2053)' - PASSED ssl_gtest.sh: #12517: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/100 (0, 772, 4866, 29, 2054)' - PASSED ssl_gtest.sh: #12518: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/101 (0, 772, 4866, 29, 2057)' - PASSED ssl_gtest.sh: #12519: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/102 (0, 772, 4866, 29, 2058)' - PASSED ssl_gtest.sh: #12520: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/103 (0, 772, 4866, 29, 2059)' - PASSED ssl_gtest.sh: #12521: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/104 (0, 772, 4866, 23, 1027)' - PASSED ssl_gtest.sh: #12522: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/105 (0, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #12523: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/106 (0, 772, 4866, 23, 2052)' - PASSED ssl_gtest.sh: #12524: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/107 (0, 772, 4866, 23, 2053)' - PASSED ssl_gtest.sh: #12525: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/108 (0, 772, 4866, 23, 2054)' - PASSED ssl_gtest.sh: #12526: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/109 (0, 772, 4866, 23, 2057)' - PASSED ssl_gtest.sh: #12527: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/110 (0, 772, 4866, 23, 2058)' - PASSED ssl_gtest.sh: #12528: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/111 (0, 772, 4866, 23, 2059)' - PASSED ssl_gtest.sh: #12529: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/112 (0, 772, 4866, 24, 1027)' - PASSED ssl_gtest.sh: #12530: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/113 (0, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #12531: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/114 (0, 772, 4866, 24, 2052)' - PASSED ssl_gtest.sh: #12532: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/115 (0, 772, 4866, 24, 2053)' - PASSED ssl_gtest.sh: #12533: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/116 (0, 772, 4866, 24, 2054)' - PASSED ssl_gtest.sh: #12534: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/117 (0, 772, 4866, 24, 2057)' - PASSED ssl_gtest.sh: #12535: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/118 (0, 772, 4866, 24, 2058)' - PASSED ssl_gtest.sh: #12536: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/119 (0, 772, 4866, 24, 2059)' - PASSED ssl_gtest.sh: #12537: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/120 (0, 772, 4866, 256, 1027)' - PASSED ssl_gtest.sh: #12538: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/121 (0, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #12539: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/122 (0, 772, 4866, 256, 2052)' - PASSED ssl_gtest.sh: #12540: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/123 (0, 772, 4866, 256, 2053)' - PASSED ssl_gtest.sh: #12541: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/124 (0, 772, 4866, 256, 2054)' - PASSED ssl_gtest.sh: #12542: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/125 (0, 772, 4866, 256, 2057)' - PASSED ssl_gtest.sh: #12543: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/126 (0, 772, 4866, 256, 2058)' - PASSED ssl_gtest.sh: #12544: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/127 (0, 772, 4866, 256, 2059)' - PASSED ssl_gtest.sh: #12545: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/128 (0, 772, 4866, 257, 1027)' - PASSED ssl_gtest.sh: #12546: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/129 (0, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #12547: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/130 (0, 772, 4866, 257, 2052)' - PASSED ssl_gtest.sh: #12548: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/131 (0, 772, 4866, 257, 2053)' - PASSED ssl_gtest.sh: #12549: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/132 (0, 772, 4866, 257, 2054)' - PASSED ssl_gtest.sh: #12550: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/133 (0, 772, 4866, 257, 2057)' - PASSED ssl_gtest.sh: #12551: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/134 (0, 772, 4866, 257, 2058)' - PASSED ssl_gtest.sh: #12552: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/135 (0, 772, 4866, 257, 2059)' - PASSED ssl_gtest.sh: #12553: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/136 (0, 772, 4866, 25497, 1027)' - PASSED ssl_gtest.sh: #12554: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/137 (0, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #12555: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/138 (0, 772, 4866, 25497, 2052)' - PASSED ssl_gtest.sh: #12556: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/139 (0, 772, 4866, 25497, 2053)' - PASSED ssl_gtest.sh: #12557: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/140 (0, 772, 4866, 25497, 2054)' - PASSED ssl_gtest.sh: #12558: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/141 (0, 772, 4866, 25497, 2057)' - PASSED ssl_gtest.sh: #12559: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/142 (0, 772, 4866, 25497, 2058)' - PASSED ssl_gtest.sh: #12560: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/143 (0, 772, 4866, 25497, 2059)' - PASSED ssl_gtest.sh: #12561: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/144 (1, 772, 4865, 29, 1027)' - PASSED ssl_gtest.sh: #12562: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/145 (1, 772, 4865, 29, 1283)' - PASSED ssl_gtest.sh: #12563: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/146 (1, 772, 4865, 29, 2052)' - PASSED ssl_gtest.sh: #12564: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/147 (1, 772, 4865, 29, 2053)' - PASSED ssl_gtest.sh: #12565: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/148 (1, 772, 4865, 29, 2054)' - PASSED ssl_gtest.sh: #12566: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/149 (1, 772, 4865, 29, 2057)' - PASSED ssl_gtest.sh: #12567: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/150 (1, 772, 4865, 29, 2058)' - PASSED ssl_gtest.sh: #12568: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/151 (1, 772, 4865, 29, 2059)' - PASSED ssl_gtest.sh: #12569: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/152 (1, 772, 4865, 23, 1027)' - PASSED ssl_gtest.sh: #12570: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/153 (1, 772, 4865, 23, 1283)' - PASSED ssl_gtest.sh: #12571: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/154 (1, 772, 4865, 23, 2052)' - PASSED ssl_gtest.sh: #12572: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/155 (1, 772, 4865, 23, 2053)' - PASSED ssl_gtest.sh: #12573: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/156 (1, 772, 4865, 23, 2054)' - PASSED ssl_gtest.sh: #12574: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/157 (1, 772, 4865, 23, 2057)' - PASSED ssl_gtest.sh: #12575: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/158 (1, 772, 4865, 23, 2058)' - PASSED ssl_gtest.sh: #12576: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/159 (1, 772, 4865, 23, 2059)' - PASSED ssl_gtest.sh: #12577: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/160 (1, 772, 4865, 24, 1027)' - PASSED ssl_gtest.sh: #12578: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/161 (1, 772, 4865, 24, 1283)' - PASSED ssl_gtest.sh: #12579: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/162 (1, 772, 4865, 24, 2052)' - PASSED ssl_gtest.sh: #12580: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/163 (1, 772, 4865, 24, 2053)' - PASSED ssl_gtest.sh: #12581: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/164 (1, 772, 4865, 24, 2054)' - PASSED ssl_gtest.sh: #12582: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/165 (1, 772, 4865, 24, 2057)' - PASSED ssl_gtest.sh: #12583: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/166 (1, 772, 4865, 24, 2058)' - PASSED ssl_gtest.sh: #12584: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/167 (1, 772, 4865, 24, 2059)' - PASSED ssl_gtest.sh: #12585: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/168 (1, 772, 4865, 256, 1027)' - PASSED ssl_gtest.sh: #12586: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/169 (1, 772, 4865, 256, 1283)' - PASSED ssl_gtest.sh: #12587: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/170 (1, 772, 4865, 256, 2052)' - PASSED ssl_gtest.sh: #12588: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/171 (1, 772, 4865, 256, 2053)' - PASSED ssl_gtest.sh: #12589: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/172 (1, 772, 4865, 256, 2054)' - PASSED ssl_gtest.sh: #12590: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/173 (1, 772, 4865, 256, 2057)' - PASSED ssl_gtest.sh: #12591: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/174 (1, 772, 4865, 256, 2058)' - PASSED ssl_gtest.sh: #12592: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/175 (1, 772, 4865, 256, 2059)' - PASSED ssl_gtest.sh: #12593: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/176 (1, 772, 4865, 257, 1027)' - PASSED ssl_gtest.sh: #12594: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/177 (1, 772, 4865, 257, 1283)' - PASSED ssl_gtest.sh: #12595: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/178 (1, 772, 4865, 257, 2052)' - PASSED ssl_gtest.sh: #12596: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/179 (1, 772, 4865, 257, 2053)' - PASSED ssl_gtest.sh: #12597: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/180 (1, 772, 4865, 257, 2054)' - PASSED ssl_gtest.sh: #12598: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/181 (1, 772, 4865, 257, 2057)' - PASSED ssl_gtest.sh: #12599: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/182 (1, 772, 4865, 257, 2058)' - PASSED ssl_gtest.sh: #12600: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/183 (1, 772, 4865, 257, 2059)' - PASSED ssl_gtest.sh: #12601: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/184 (1, 772, 4865, 25497, 1027)' - PASSED ssl_gtest.sh: #12602: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/185 (1, 772, 4865, 25497, 1283)' - PASSED ssl_gtest.sh: #12603: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/186 (1, 772, 4865, 25497, 2052)' - PASSED ssl_gtest.sh: #12604: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/187 (1, 772, 4865, 25497, 2053)' - PASSED ssl_gtest.sh: #12605: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/188 (1, 772, 4865, 25497, 2054)' - PASSED ssl_gtest.sh: #12606: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/189 (1, 772, 4865, 25497, 2057)' - PASSED ssl_gtest.sh: #12607: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/190 (1, 772, 4865, 25497, 2058)' - PASSED ssl_gtest.sh: #12608: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/191 (1, 772, 4865, 25497, 2059)' - PASSED ssl_gtest.sh: #12609: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/192 (1, 772, 4867, 29, 1027)' - PASSED ssl_gtest.sh: #12610: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/193 (1, 772, 4867, 29, 1283)' - PASSED ssl_gtest.sh: #12611: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/194 (1, 772, 4867, 29, 2052)' - PASSED ssl_gtest.sh: #12612: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/195 (1, 772, 4867, 29, 2053)' - PASSED ssl_gtest.sh: #12613: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/196 (1, 772, 4867, 29, 2054)' - PASSED ssl_gtest.sh: #12614: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/197 (1, 772, 4867, 29, 2057)' - PASSED ssl_gtest.sh: #12615: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/198 (1, 772, 4867, 29, 2058)' - PASSED ssl_gtest.sh: #12616: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/199 (1, 772, 4867, 29, 2059)' - PASSED ssl_gtest.sh: #12617: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/200 (1, 772, 4867, 23, 1027)' - PASSED ssl_gtest.sh: #12618: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/201 (1, 772, 4867, 23, 1283)' - PASSED ssl_gtest.sh: #12619: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/202 (1, 772, 4867, 23, 2052)' - PASSED ssl_gtest.sh: #12620: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/203 (1, 772, 4867, 23, 2053)' - PASSED ssl_gtest.sh: #12621: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/204 (1, 772, 4867, 23, 2054)' - PASSED ssl_gtest.sh: #12622: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/205 (1, 772, 4867, 23, 2057)' - PASSED ssl_gtest.sh: #12623: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/206 (1, 772, 4867, 23, 2058)' - PASSED ssl_gtest.sh: #12624: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/207 (1, 772, 4867, 23, 2059)' - PASSED ssl_gtest.sh: #12625: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/208 (1, 772, 4867, 24, 1027)' - PASSED ssl_gtest.sh: #12626: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/209 (1, 772, 4867, 24, 1283)' - PASSED ssl_gtest.sh: #12627: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/210 (1, 772, 4867, 24, 2052)' - PASSED ssl_gtest.sh: #12628: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/211 (1, 772, 4867, 24, 2053)' - PASSED ssl_gtest.sh: #12629: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/212 (1, 772, 4867, 24, 2054)' - PASSED ssl_gtest.sh: #12630: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/213 (1, 772, 4867, 24, 2057)' - PASSED ssl_gtest.sh: #12631: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/214 (1, 772, 4867, 24, 2058)' - PASSED ssl_gtest.sh: #12632: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/215 (1, 772, 4867, 24, 2059)' - PASSED ssl_gtest.sh: #12633: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/216 (1, 772, 4867, 256, 1027)' - PASSED ssl_gtest.sh: #12634: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/217 (1, 772, 4867, 256, 1283)' - PASSED ssl_gtest.sh: #12635: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/218 (1, 772, 4867, 256, 2052)' - PASSED ssl_gtest.sh: #12636: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/219 (1, 772, 4867, 256, 2053)' - PASSED ssl_gtest.sh: #12637: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/220 (1, 772, 4867, 256, 2054)' - PASSED ssl_gtest.sh: #12638: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/221 (1, 772, 4867, 256, 2057)' - PASSED ssl_gtest.sh: #12639: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/222 (1, 772, 4867, 256, 2058)' - PASSED ssl_gtest.sh: #12640: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/223 (1, 772, 4867, 256, 2059)' - PASSED ssl_gtest.sh: #12641: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/224 (1, 772, 4867, 257, 1027)' - PASSED ssl_gtest.sh: #12642: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/225 (1, 772, 4867, 257, 1283)' - PASSED ssl_gtest.sh: #12643: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/226 (1, 772, 4867, 257, 2052)' - PASSED ssl_gtest.sh: #12644: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/227 (1, 772, 4867, 257, 2053)' - PASSED ssl_gtest.sh: #12645: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/228 (1, 772, 4867, 257, 2054)' - PASSED ssl_gtest.sh: #12646: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/229 (1, 772, 4867, 257, 2057)' - PASSED ssl_gtest.sh: #12647: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/230 (1, 772, 4867, 257, 2058)' - PASSED ssl_gtest.sh: #12648: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/231 (1, 772, 4867, 257, 2059)' - PASSED ssl_gtest.sh: #12649: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/232 (1, 772, 4867, 25497, 1027)' - PASSED ssl_gtest.sh: #12650: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/233 (1, 772, 4867, 25497, 1283)' - PASSED ssl_gtest.sh: #12651: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/234 (1, 772, 4867, 25497, 2052)' - PASSED ssl_gtest.sh: #12652: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/235 (1, 772, 4867, 25497, 2053)' - PASSED ssl_gtest.sh: #12653: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/236 (1, 772, 4867, 25497, 2054)' - PASSED ssl_gtest.sh: #12654: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/237 (1, 772, 4867, 25497, 2057)' - PASSED ssl_gtest.sh: #12655: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/238 (1, 772, 4867, 25497, 2058)' - PASSED ssl_gtest.sh: #12656: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/239 (1, 772, 4867, 25497, 2059)' - PASSED ssl_gtest.sh: #12657: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/240 (1, 772, 4866, 29, 1027)' - PASSED ssl_gtest.sh: #12658: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/241 (1, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #12659: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/242 (1, 772, 4866, 29, 2052)' - PASSED ssl_gtest.sh: #12660: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/243 (1, 772, 4866, 29, 2053)' - PASSED ssl_gtest.sh: #12661: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/244 (1, 772, 4866, 29, 2054)' - PASSED ssl_gtest.sh: #12662: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/245 (1, 772, 4866, 29, 2057)' - PASSED ssl_gtest.sh: #12663: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/246 (1, 772, 4866, 29, 2058)' - PASSED ssl_gtest.sh: #12664: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/247 (1, 772, 4866, 29, 2059)' - PASSED ssl_gtest.sh: #12665: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/248 (1, 772, 4866, 23, 1027)' - PASSED ssl_gtest.sh: #12666: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/249 (1, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #12667: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/250 (1, 772, 4866, 23, 2052)' - PASSED ssl_gtest.sh: #12668: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/251 (1, 772, 4866, 23, 2053)' - PASSED ssl_gtest.sh: #12669: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/252 (1, 772, 4866, 23, 2054)' - PASSED ssl_gtest.sh: #12670: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/253 (1, 772, 4866, 23, 2057)' - PASSED ssl_gtest.sh: #12671: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/254 (1, 772, 4866, 23, 2058)' - PASSED ssl_gtest.sh: #12672: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/255 (1, 772, 4866, 23, 2059)' - PASSED ssl_gtest.sh: #12673: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/256 (1, 772, 4866, 24, 1027)' - PASSED ssl_gtest.sh: #12674: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/257 (1, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #12675: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/258 (1, 772, 4866, 24, 2052)' - PASSED ssl_gtest.sh: #12676: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/259 (1, 772, 4866, 24, 2053)' - PASSED ssl_gtest.sh: #12677: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/260 (1, 772, 4866, 24, 2054)' - PASSED ssl_gtest.sh: #12678: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/261 (1, 772, 4866, 24, 2057)' - PASSED ssl_gtest.sh: #12679: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/262 (1, 772, 4866, 24, 2058)' - PASSED ssl_gtest.sh: #12680: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/263 (1, 772, 4866, 24, 2059)' - PASSED ssl_gtest.sh: #12681: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/264 (1, 772, 4866, 256, 1027)' - PASSED ssl_gtest.sh: #12682: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/265 (1, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #12683: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/266 (1, 772, 4866, 256, 2052)' - PASSED ssl_gtest.sh: #12684: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/267 (1, 772, 4866, 256, 2053)' - PASSED ssl_gtest.sh: #12685: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/268 (1, 772, 4866, 256, 2054)' - PASSED ssl_gtest.sh: #12686: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/269 (1, 772, 4866, 256, 2057)' - PASSED ssl_gtest.sh: #12687: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/270 (1, 772, 4866, 256, 2058)' - PASSED ssl_gtest.sh: #12688: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/271 (1, 772, 4866, 256, 2059)' - PASSED ssl_gtest.sh: #12689: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/272 (1, 772, 4866, 257, 1027)' - PASSED ssl_gtest.sh: #12690: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/273 (1, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #12691: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/274 (1, 772, 4866, 257, 2052)' - PASSED ssl_gtest.sh: #12692: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/275 (1, 772, 4866, 257, 2053)' - PASSED ssl_gtest.sh: #12693: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/276 (1, 772, 4866, 257, 2054)' - PASSED ssl_gtest.sh: #12694: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/277 (1, 772, 4866, 257, 2057)' - PASSED ssl_gtest.sh: #12695: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/278 (1, 772, 4866, 257, 2058)' - PASSED ssl_gtest.sh: #12696: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/279 (1, 772, 4866, 257, 2059)' - PASSED ssl_gtest.sh: #12697: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/280 (1, 772, 4866, 25497, 1027)' - PASSED ssl_gtest.sh: #12698: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/281 (1, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #12699: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/282 (1, 772, 4866, 25497, 2052)' - PASSED ssl_gtest.sh: #12700: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/283 (1, 772, 4866, 25497, 2053)' - PASSED ssl_gtest.sh: #12701: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/284 (1, 772, 4866, 25497, 2054)' - PASSED ssl_gtest.sh: #12702: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/285 (1, 772, 4866, 25497, 2057)' - PASSED ssl_gtest.sh: #12703: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/286 (1, 772, 4866, 25497, 2058)' - PASSED ssl_gtest.sh: #12704: 'CipherSuiteTLS13/TlsCipherSuiteTest: ResumeCipherSuite/287 (1, 772, 4866, 25497, 2059)' - PASSED ssl_gtest.sh: #12705: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/0 (0, 772, 4865, 29, 1027)' - PASSED ssl_gtest.sh: #12706: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/1 (0, 772, 4865, 29, 1283)' - PASSED ssl_gtest.sh: #12707: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/2 (0, 772, 4865, 29, 2052)' - PASSED ssl_gtest.sh: #12708: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/3 (0, 772, 4865, 29, 2053)' - PASSED ssl_gtest.sh: #12709: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/4 (0, 772, 4865, 29, 2054)' - PASSED ssl_gtest.sh: #12710: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/5 (0, 772, 4865, 29, 2057)' - PASSED ssl_gtest.sh: #12711: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/6 (0, 772, 4865, 29, 2058)' - PASSED ssl_gtest.sh: #12712: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/7 (0, 772, 4865, 29, 2059)' - PASSED ssl_gtest.sh: #12713: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/8 (0, 772, 4865, 23, 1027)' - PASSED ssl_gtest.sh: #12714: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/9 (0, 772, 4865, 23, 1283)' - PASSED ssl_gtest.sh: #12715: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/10 (0, 772, 4865, 23, 2052)' - PASSED ssl_gtest.sh: #12716: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/11 (0, 772, 4865, 23, 2053)' - PASSED ssl_gtest.sh: #12717: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/12 (0, 772, 4865, 23, 2054)' - PASSED ssl_gtest.sh: #12718: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/13 (0, 772, 4865, 23, 2057)' - PASSED ssl_gtest.sh: #12719: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/14 (0, 772, 4865, 23, 2058)' - PASSED ssl_gtest.sh: #12720: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/15 (0, 772, 4865, 23, 2059)' - PASSED ssl_gtest.sh: #12721: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/16 (0, 772, 4865, 24, 1027)' - PASSED ssl_gtest.sh: #12722: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/17 (0, 772, 4865, 24, 1283)' - PASSED ssl_gtest.sh: #12723: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/18 (0, 772, 4865, 24, 2052)' - PASSED ssl_gtest.sh: #12724: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/19 (0, 772, 4865, 24, 2053)' - PASSED ssl_gtest.sh: #12725: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/20 (0, 772, 4865, 24, 2054)' - PASSED ssl_gtest.sh: #12726: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/21 (0, 772, 4865, 24, 2057)' - PASSED ssl_gtest.sh: #12727: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/22 (0, 772, 4865, 24, 2058)' - PASSED ssl_gtest.sh: #12728: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/23 (0, 772, 4865, 24, 2059)' - PASSED ssl_gtest.sh: #12729: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/24 (0, 772, 4865, 256, 1027)' - PASSED ssl_gtest.sh: #12730: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/25 (0, 772, 4865, 256, 1283)' - PASSED ssl_gtest.sh: #12731: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/26 (0, 772, 4865, 256, 2052)' - PASSED ssl_gtest.sh: #12732: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/27 (0, 772, 4865, 256, 2053)' - PASSED ssl_gtest.sh: #12733: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/28 (0, 772, 4865, 256, 2054)' - PASSED ssl_gtest.sh: #12734: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/29 (0, 772, 4865, 256, 2057)' - PASSED ssl_gtest.sh: #12735: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/30 (0, 772, 4865, 256, 2058)' - PASSED ssl_gtest.sh: #12736: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/31 (0, 772, 4865, 256, 2059)' - PASSED ssl_gtest.sh: #12737: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/32 (0, 772, 4865, 257, 1027)' - PASSED ssl_gtest.sh: #12738: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/33 (0, 772, 4865, 257, 1283)' - PASSED ssl_gtest.sh: #12739: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/34 (0, 772, 4865, 257, 2052)' - PASSED ssl_gtest.sh: #12740: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/35 (0, 772, 4865, 257, 2053)' - PASSED ssl_gtest.sh: #12741: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/36 (0, 772, 4865, 257, 2054)' - PASSED ssl_gtest.sh: #12742: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/37 (0, 772, 4865, 257, 2057)' - PASSED ssl_gtest.sh: #12743: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/38 (0, 772, 4865, 257, 2058)' - PASSED ssl_gtest.sh: #12744: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/39 (0, 772, 4865, 257, 2059)' - PASSED ssl_gtest.sh: #12745: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/40 (0, 772, 4865, 25497, 1027)' - PASSED ssl_gtest.sh: #12746: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/41 (0, 772, 4865, 25497, 1283)' - PASSED ssl_gtest.sh: #12747: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/42 (0, 772, 4865, 25497, 2052)' - PASSED ssl_gtest.sh: #12748: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/43 (0, 772, 4865, 25497, 2053)' - PASSED ssl_gtest.sh: #12749: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/44 (0, 772, 4865, 25497, 2054)' - PASSED ssl_gtest.sh: #12750: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/45 (0, 772, 4865, 25497, 2057)' - PASSED ssl_gtest.sh: #12751: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/46 (0, 772, 4865, 25497, 2058)' - PASSED ssl_gtest.sh: #12752: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/47 (0, 772, 4865, 25497, 2059)' - PASSED ssl_gtest.sh: #12753: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/48 (0, 772, 4867, 29, 1027)' - PASSED ssl_gtest.sh: #12754: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/49 (0, 772, 4867, 29, 1283)' - PASSED ssl_gtest.sh: #12755: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/50 (0, 772, 4867, 29, 2052)' - PASSED ssl_gtest.sh: #12756: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/51 (0, 772, 4867, 29, 2053)' - PASSED ssl_gtest.sh: #12757: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/52 (0, 772, 4867, 29, 2054)' - PASSED ssl_gtest.sh: #12758: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/53 (0, 772, 4867, 29, 2057)' - PASSED ssl_gtest.sh: #12759: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/54 (0, 772, 4867, 29, 2058)' - PASSED ssl_gtest.sh: #12760: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/55 (0, 772, 4867, 29, 2059)' - PASSED ssl_gtest.sh: #12761: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/56 (0, 772, 4867, 23, 1027)' - PASSED ssl_gtest.sh: #12762: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/57 (0, 772, 4867, 23, 1283)' - PASSED ssl_gtest.sh: #12763: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/58 (0, 772, 4867, 23, 2052)' - PASSED ssl_gtest.sh: #12764: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/59 (0, 772, 4867, 23, 2053)' - PASSED ssl_gtest.sh: #12765: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/60 (0, 772, 4867, 23, 2054)' - PASSED ssl_gtest.sh: #12766: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/61 (0, 772, 4867, 23, 2057)' - PASSED ssl_gtest.sh: #12767: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/62 (0, 772, 4867, 23, 2058)' - PASSED ssl_gtest.sh: #12768: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/63 (0, 772, 4867, 23, 2059)' - PASSED ssl_gtest.sh: #12769: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/64 (0, 772, 4867, 24, 1027)' - PASSED ssl_gtest.sh: #12770: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/65 (0, 772, 4867, 24, 1283)' - PASSED ssl_gtest.sh: #12771: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/66 (0, 772, 4867, 24, 2052)' - PASSED ssl_gtest.sh: #12772: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/67 (0, 772, 4867, 24, 2053)' - PASSED ssl_gtest.sh: #12773: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/68 (0, 772, 4867, 24, 2054)' - PASSED ssl_gtest.sh: #12774: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/69 (0, 772, 4867, 24, 2057)' - PASSED ssl_gtest.sh: #12775: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/70 (0, 772, 4867, 24, 2058)' - PASSED ssl_gtest.sh: #12776: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/71 (0, 772, 4867, 24, 2059)' - PASSED ssl_gtest.sh: #12777: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/72 (0, 772, 4867, 256, 1027)' - PASSED ssl_gtest.sh: #12778: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/73 (0, 772, 4867, 256, 1283)' - PASSED ssl_gtest.sh: #12779: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/74 (0, 772, 4867, 256, 2052)' - PASSED ssl_gtest.sh: #12780: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/75 (0, 772, 4867, 256, 2053)' - PASSED ssl_gtest.sh: #12781: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/76 (0, 772, 4867, 256, 2054)' - PASSED ssl_gtest.sh: #12782: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/77 (0, 772, 4867, 256, 2057)' - PASSED ssl_gtest.sh: #12783: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/78 (0, 772, 4867, 256, 2058)' - PASSED ssl_gtest.sh: #12784: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/79 (0, 772, 4867, 256, 2059)' - PASSED ssl_gtest.sh: #12785: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/80 (0, 772, 4867, 257, 1027)' - PASSED ssl_gtest.sh: #12786: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/81 (0, 772, 4867, 257, 1283)' - PASSED ssl_gtest.sh: #12787: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/82 (0, 772, 4867, 257, 2052)' - PASSED ssl_gtest.sh: #12788: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/83 (0, 772, 4867, 257, 2053)' - PASSED ssl_gtest.sh: #12789: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/84 (0, 772, 4867, 257, 2054)' - PASSED ssl_gtest.sh: #12790: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/85 (0, 772, 4867, 257, 2057)' - PASSED ssl_gtest.sh: #12791: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/86 (0, 772, 4867, 257, 2058)' - PASSED ssl_gtest.sh: #12792: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/87 (0, 772, 4867, 257, 2059)' - PASSED ssl_gtest.sh: #12793: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/88 (0, 772, 4867, 25497, 1027)' - PASSED ssl_gtest.sh: #12794: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/89 (0, 772, 4867, 25497, 1283)' - PASSED ssl_gtest.sh: #12795: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/90 (0, 772, 4867, 25497, 2052)' - PASSED ssl_gtest.sh: #12796: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/91 (0, 772, 4867, 25497, 2053)' - PASSED ssl_gtest.sh: #12797: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/92 (0, 772, 4867, 25497, 2054)' - PASSED ssl_gtest.sh: #12798: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/93 (0, 772, 4867, 25497, 2057)' - PASSED ssl_gtest.sh: #12799: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/94 (0, 772, 4867, 25497, 2058)' - PASSED ssl_gtest.sh: #12800: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/95 (0, 772, 4867, 25497, 2059)' - PASSED ssl_gtest.sh: #12801: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/96 (0, 772, 4866, 29, 1027)' - PASSED ssl_gtest.sh: #12802: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/97 (0, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #12803: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/98 (0, 772, 4866, 29, 2052)' - PASSED ssl_gtest.sh: #12804: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/99 (0, 772, 4866, 29, 2053)' - PASSED ssl_gtest.sh: #12805: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/100 (0, 772, 4866, 29, 2054)' - PASSED ssl_gtest.sh: #12806: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/101 (0, 772, 4866, 29, 2057)' - PASSED ssl_gtest.sh: #12807: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/102 (0, 772, 4866, 29, 2058)' - PASSED ssl_gtest.sh: #12808: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/103 (0, 772, 4866, 29, 2059)' - PASSED ssl_gtest.sh: #12809: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/104 (0, 772, 4866, 23, 1027)' - PASSED ssl_gtest.sh: #12810: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/105 (0, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #12811: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/106 (0, 772, 4866, 23, 2052)' - PASSED ssl_gtest.sh: #12812: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/107 (0, 772, 4866, 23, 2053)' - PASSED ssl_gtest.sh: #12813: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/108 (0, 772, 4866, 23, 2054)' - PASSED ssl_gtest.sh: #12814: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/109 (0, 772, 4866, 23, 2057)' - PASSED ssl_gtest.sh: #12815: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/110 (0, 772, 4866, 23, 2058)' - PASSED ssl_gtest.sh: #12816: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/111 (0, 772, 4866, 23, 2059)' - PASSED ssl_gtest.sh: #12817: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/112 (0, 772, 4866, 24, 1027)' - PASSED ssl_gtest.sh: #12818: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/113 (0, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #12819: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/114 (0, 772, 4866, 24, 2052)' - PASSED ssl_gtest.sh: #12820: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/115 (0, 772, 4866, 24, 2053)' - PASSED ssl_gtest.sh: #12821: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/116 (0, 772, 4866, 24, 2054)' - PASSED ssl_gtest.sh: #12822: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/117 (0, 772, 4866, 24, 2057)' - PASSED ssl_gtest.sh: #12823: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/118 (0, 772, 4866, 24, 2058)' - PASSED ssl_gtest.sh: #12824: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/119 (0, 772, 4866, 24, 2059)' - PASSED ssl_gtest.sh: #12825: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/120 (0, 772, 4866, 256, 1027)' - PASSED ssl_gtest.sh: #12826: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/121 (0, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #12827: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/122 (0, 772, 4866, 256, 2052)' - PASSED ssl_gtest.sh: #12828: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/123 (0, 772, 4866, 256, 2053)' - PASSED ssl_gtest.sh: #12829: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/124 (0, 772, 4866, 256, 2054)' - PASSED ssl_gtest.sh: #12830: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/125 (0, 772, 4866, 256, 2057)' - PASSED ssl_gtest.sh: #12831: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/126 (0, 772, 4866, 256, 2058)' - PASSED ssl_gtest.sh: #12832: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/127 (0, 772, 4866, 256, 2059)' - PASSED ssl_gtest.sh: #12833: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/128 (0, 772, 4866, 257, 1027)' - PASSED ssl_gtest.sh: #12834: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/129 (0, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #12835: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/130 (0, 772, 4866, 257, 2052)' - PASSED ssl_gtest.sh: #12836: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/131 (0, 772, 4866, 257, 2053)' - PASSED ssl_gtest.sh: #12837: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/132 (0, 772, 4866, 257, 2054)' - PASSED ssl_gtest.sh: #12838: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/133 (0, 772, 4866, 257, 2057)' - PASSED ssl_gtest.sh: #12839: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/134 (0, 772, 4866, 257, 2058)' - PASSED ssl_gtest.sh: #12840: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/135 (0, 772, 4866, 257, 2059)' - PASSED ssl_gtest.sh: #12841: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/136 (0, 772, 4866, 25497, 1027)' - PASSED ssl_gtest.sh: #12842: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/137 (0, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #12843: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/138 (0, 772, 4866, 25497, 2052)' - PASSED ssl_gtest.sh: #12844: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/139 (0, 772, 4866, 25497, 2053)' - PASSED ssl_gtest.sh: #12845: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/140 (0, 772, 4866, 25497, 2054)' - PASSED ssl_gtest.sh: #12846: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/141 (0, 772, 4866, 25497, 2057)' - PASSED ssl_gtest.sh: #12847: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/142 (0, 772, 4866, 25497, 2058)' - PASSED ssl_gtest.sh: #12848: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/143 (0, 772, 4866, 25497, 2059)' - PASSED ssl_gtest.sh: #12849: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/144 (1, 772, 4865, 29, 1027)' - PASSED ssl_gtest.sh: #12850: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/145 (1, 772, 4865, 29, 1283)' - PASSED ssl_gtest.sh: #12851: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/146 (1, 772, 4865, 29, 2052)' - PASSED ssl_gtest.sh: #12852: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/147 (1, 772, 4865, 29, 2053)' - PASSED ssl_gtest.sh: #12853: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/148 (1, 772, 4865, 29, 2054)' - PASSED ssl_gtest.sh: #12854: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/149 (1, 772, 4865, 29, 2057)' - PASSED ssl_gtest.sh: #12855: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/150 (1, 772, 4865, 29, 2058)' - PASSED ssl_gtest.sh: #12856: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/151 (1, 772, 4865, 29, 2059)' - PASSED ssl_gtest.sh: #12857: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/152 (1, 772, 4865, 23, 1027)' - PASSED ssl_gtest.sh: #12858: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/153 (1, 772, 4865, 23, 1283)' - PASSED ssl_gtest.sh: #12859: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/154 (1, 772, 4865, 23, 2052)' - PASSED ssl_gtest.sh: #12860: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/155 (1, 772, 4865, 23, 2053)' - PASSED ssl_gtest.sh: #12861: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/156 (1, 772, 4865, 23, 2054)' - PASSED ssl_gtest.sh: #12862: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/157 (1, 772, 4865, 23, 2057)' - PASSED ssl_gtest.sh: #12863: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/158 (1, 772, 4865, 23, 2058)' - PASSED ssl_gtest.sh: #12864: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/159 (1, 772, 4865, 23, 2059)' - PASSED ssl_gtest.sh: #12865: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/160 (1, 772, 4865, 24, 1027)' - PASSED ssl_gtest.sh: #12866: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/161 (1, 772, 4865, 24, 1283)' - PASSED ssl_gtest.sh: #12867: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/162 (1, 772, 4865, 24, 2052)' - PASSED ssl_gtest.sh: #12868: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/163 (1, 772, 4865, 24, 2053)' - PASSED ssl_gtest.sh: #12869: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/164 (1, 772, 4865, 24, 2054)' - PASSED ssl_gtest.sh: #12870: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/165 (1, 772, 4865, 24, 2057)' - PASSED ssl_gtest.sh: #12871: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/166 (1, 772, 4865, 24, 2058)' - PASSED ssl_gtest.sh: #12872: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/167 (1, 772, 4865, 24, 2059)' - PASSED ssl_gtest.sh: #12873: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/168 (1, 772, 4865, 256, 1027)' - PASSED ssl_gtest.sh: #12874: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/169 (1, 772, 4865, 256, 1283)' - PASSED ssl_gtest.sh: #12875: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/170 (1, 772, 4865, 256, 2052)' - PASSED ssl_gtest.sh: #12876: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/171 (1, 772, 4865, 256, 2053)' - PASSED ssl_gtest.sh: #12877: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/172 (1, 772, 4865, 256, 2054)' - PASSED ssl_gtest.sh: #12878: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/173 (1, 772, 4865, 256, 2057)' - PASSED ssl_gtest.sh: #12879: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/174 (1, 772, 4865, 256, 2058)' - PASSED ssl_gtest.sh: #12880: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/175 (1, 772, 4865, 256, 2059)' - PASSED ssl_gtest.sh: #12881: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/176 (1, 772, 4865, 257, 1027)' - PASSED ssl_gtest.sh: #12882: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/177 (1, 772, 4865, 257, 1283)' - PASSED ssl_gtest.sh: #12883: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/178 (1, 772, 4865, 257, 2052)' - PASSED ssl_gtest.sh: #12884: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/179 (1, 772, 4865, 257, 2053)' - PASSED ssl_gtest.sh: #12885: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/180 (1, 772, 4865, 257, 2054)' - PASSED ssl_gtest.sh: #12886: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/181 (1, 772, 4865, 257, 2057)' - PASSED ssl_gtest.sh: #12887: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/182 (1, 772, 4865, 257, 2058)' - PASSED ssl_gtest.sh: #12888: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/183 (1, 772, 4865, 257, 2059)' - PASSED ssl_gtest.sh: #12889: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/184 (1, 772, 4865, 25497, 1027)' - PASSED ssl_gtest.sh: #12890: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/185 (1, 772, 4865, 25497, 1283)' - PASSED ssl_gtest.sh: #12891: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/186 (1, 772, 4865, 25497, 2052)' - PASSED ssl_gtest.sh: #12892: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/187 (1, 772, 4865, 25497, 2053)' - PASSED ssl_gtest.sh: #12893: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/188 (1, 772, 4865, 25497, 2054)' - PASSED ssl_gtest.sh: #12894: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/189 (1, 772, 4865, 25497, 2057)' - PASSED ssl_gtest.sh: #12895: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/190 (1, 772, 4865, 25497, 2058)' - PASSED ssl_gtest.sh: #12896: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/191 (1, 772, 4865, 25497, 2059)' - PASSED ssl_gtest.sh: #12897: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/192 (1, 772, 4867, 29, 1027)' - PASSED ssl_gtest.sh: #12898: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/193 (1, 772, 4867, 29, 1283)' - PASSED ssl_gtest.sh: #12899: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/194 (1, 772, 4867, 29, 2052)' - PASSED ssl_gtest.sh: #12900: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/195 (1, 772, 4867, 29, 2053)' - PASSED ssl_gtest.sh: #12901: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/196 (1, 772, 4867, 29, 2054)' - PASSED ssl_gtest.sh: #12902: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/197 (1, 772, 4867, 29, 2057)' - PASSED ssl_gtest.sh: #12903: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/198 (1, 772, 4867, 29, 2058)' - PASSED ssl_gtest.sh: #12904: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/199 (1, 772, 4867, 29, 2059)' - PASSED ssl_gtest.sh: #12905: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/200 (1, 772, 4867, 23, 1027)' - PASSED ssl_gtest.sh: #12906: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/201 (1, 772, 4867, 23, 1283)' - PASSED ssl_gtest.sh: #12907: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/202 (1, 772, 4867, 23, 2052)' - PASSED ssl_gtest.sh: #12908: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/203 (1, 772, 4867, 23, 2053)' - PASSED ssl_gtest.sh: #12909: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/204 (1, 772, 4867, 23, 2054)' - PASSED ssl_gtest.sh: #12910: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/205 (1, 772, 4867, 23, 2057)' - PASSED ssl_gtest.sh: #12911: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/206 (1, 772, 4867, 23, 2058)' - PASSED ssl_gtest.sh: #12912: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/207 (1, 772, 4867, 23, 2059)' - PASSED ssl_gtest.sh: #12913: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/208 (1, 772, 4867, 24, 1027)' - PASSED ssl_gtest.sh: #12914: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/209 (1, 772, 4867, 24, 1283)' - PASSED ssl_gtest.sh: #12915: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/210 (1, 772, 4867, 24, 2052)' - PASSED ssl_gtest.sh: #12916: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/211 (1, 772, 4867, 24, 2053)' - PASSED ssl_gtest.sh: #12917: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/212 (1, 772, 4867, 24, 2054)' - PASSED ssl_gtest.sh: #12918: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/213 (1, 772, 4867, 24, 2057)' - PASSED ssl_gtest.sh: #12919: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/214 (1, 772, 4867, 24, 2058)' - PASSED ssl_gtest.sh: #12920: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/215 (1, 772, 4867, 24, 2059)' - PASSED ssl_gtest.sh: #12921: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/216 (1, 772, 4867, 256, 1027)' - PASSED ssl_gtest.sh: #12922: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/217 (1, 772, 4867, 256, 1283)' - PASSED ssl_gtest.sh: #12923: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/218 (1, 772, 4867, 256, 2052)' - PASSED ssl_gtest.sh: #12924: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/219 (1, 772, 4867, 256, 2053)' - PASSED ssl_gtest.sh: #12925: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/220 (1, 772, 4867, 256, 2054)' - PASSED ssl_gtest.sh: #12926: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/221 (1, 772, 4867, 256, 2057)' - PASSED ssl_gtest.sh: #12927: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/222 (1, 772, 4867, 256, 2058)' - PASSED ssl_gtest.sh: #12928: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/223 (1, 772, 4867, 256, 2059)' - PASSED ssl_gtest.sh: #12929: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/224 (1, 772, 4867, 257, 1027)' - PASSED ssl_gtest.sh: #12930: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/225 (1, 772, 4867, 257, 1283)' - PASSED ssl_gtest.sh: #12931: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/226 (1, 772, 4867, 257, 2052)' - PASSED ssl_gtest.sh: #12932: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/227 (1, 772, 4867, 257, 2053)' - PASSED ssl_gtest.sh: #12933: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/228 (1, 772, 4867, 257, 2054)' - PASSED ssl_gtest.sh: #12934: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/229 (1, 772, 4867, 257, 2057)' - PASSED ssl_gtest.sh: #12935: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/230 (1, 772, 4867, 257, 2058)' - PASSED ssl_gtest.sh: #12936: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/231 (1, 772, 4867, 257, 2059)' - PASSED ssl_gtest.sh: #12937: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/232 (1, 772, 4867, 25497, 1027)' - PASSED ssl_gtest.sh: #12938: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/233 (1, 772, 4867, 25497, 1283)' - PASSED ssl_gtest.sh: #12939: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/234 (1, 772, 4867, 25497, 2052)' - PASSED ssl_gtest.sh: #12940: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/235 (1, 772, 4867, 25497, 2053)' - PASSED ssl_gtest.sh: #12941: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/236 (1, 772, 4867, 25497, 2054)' - PASSED ssl_gtest.sh: #12942: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/237 (1, 772, 4867, 25497, 2057)' - PASSED ssl_gtest.sh: #12943: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/238 (1, 772, 4867, 25497, 2058)' - PASSED ssl_gtest.sh: #12944: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/239 (1, 772, 4867, 25497, 2059)' - PASSED ssl_gtest.sh: #12945: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/240 (1, 772, 4866, 29, 1027)' - PASSED ssl_gtest.sh: #12946: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/241 (1, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #12947: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/242 (1, 772, 4866, 29, 2052)' - PASSED ssl_gtest.sh: #12948: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/243 (1, 772, 4866, 29, 2053)' - PASSED ssl_gtest.sh: #12949: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/244 (1, 772, 4866, 29, 2054)' - PASSED ssl_gtest.sh: #12950: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/245 (1, 772, 4866, 29, 2057)' - PASSED ssl_gtest.sh: #12951: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/246 (1, 772, 4866, 29, 2058)' - PASSED ssl_gtest.sh: #12952: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/247 (1, 772, 4866, 29, 2059)' - PASSED ssl_gtest.sh: #12953: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/248 (1, 772, 4866, 23, 1027)' - PASSED ssl_gtest.sh: #12954: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/249 (1, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #12955: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/250 (1, 772, 4866, 23, 2052)' - PASSED ssl_gtest.sh: #12956: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/251 (1, 772, 4866, 23, 2053)' - PASSED ssl_gtest.sh: #12957: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/252 (1, 772, 4866, 23, 2054)' - PASSED ssl_gtest.sh: #12958: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/253 (1, 772, 4866, 23, 2057)' - PASSED ssl_gtest.sh: #12959: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/254 (1, 772, 4866, 23, 2058)' - PASSED ssl_gtest.sh: #12960: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/255 (1, 772, 4866, 23, 2059)' - PASSED ssl_gtest.sh: #12961: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/256 (1, 772, 4866, 24, 1027)' - PASSED ssl_gtest.sh: #12962: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/257 (1, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #12963: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/258 (1, 772, 4866, 24, 2052)' - PASSED ssl_gtest.sh: #12964: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/259 (1, 772, 4866, 24, 2053)' - PASSED ssl_gtest.sh: #12965: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/260 (1, 772, 4866, 24, 2054)' - PASSED ssl_gtest.sh: #12966: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/261 (1, 772, 4866, 24, 2057)' - PASSED ssl_gtest.sh: #12967: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/262 (1, 772, 4866, 24, 2058)' - PASSED ssl_gtest.sh: #12968: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/263 (1, 772, 4866, 24, 2059)' - PASSED ssl_gtest.sh: #12969: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/264 (1, 772, 4866, 256, 1027)' - PASSED ssl_gtest.sh: #12970: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/265 (1, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #12971: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/266 (1, 772, 4866, 256, 2052)' - PASSED ssl_gtest.sh: #12972: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/267 (1, 772, 4866, 256, 2053)' - PASSED ssl_gtest.sh: #12973: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/268 (1, 772, 4866, 256, 2054)' - PASSED ssl_gtest.sh: #12974: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/269 (1, 772, 4866, 256, 2057)' - PASSED ssl_gtest.sh: #12975: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/270 (1, 772, 4866, 256, 2058)' - PASSED ssl_gtest.sh: #12976: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/271 (1, 772, 4866, 256, 2059)' - PASSED ssl_gtest.sh: #12977: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/272 (1, 772, 4866, 257, 1027)' - PASSED ssl_gtest.sh: #12978: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/273 (1, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #12979: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/274 (1, 772, 4866, 257, 2052)' - PASSED ssl_gtest.sh: #12980: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/275 (1, 772, 4866, 257, 2053)' - PASSED ssl_gtest.sh: #12981: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/276 (1, 772, 4866, 257, 2054)' - PASSED ssl_gtest.sh: #12982: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/277 (1, 772, 4866, 257, 2057)' - PASSED ssl_gtest.sh: #12983: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/278 (1, 772, 4866, 257, 2058)' - PASSED ssl_gtest.sh: #12984: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/279 (1, 772, 4866, 257, 2059)' - PASSED ssl_gtest.sh: #12985: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/280 (1, 772, 4866, 25497, 1027)' - PASSED ssl_gtest.sh: #12986: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/281 (1, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #12987: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/282 (1, 772, 4866, 25497, 2052)' - PASSED ssl_gtest.sh: #12988: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/283 (1, 772, 4866, 25497, 2053)' - PASSED ssl_gtest.sh: #12989: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/284 (1, 772, 4866, 25497, 2054)' - PASSED ssl_gtest.sh: #12990: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/285 (1, 772, 4866, 25497, 2057)' - PASSED ssl_gtest.sh: #12991: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/286 (1, 772, 4866, 25497, 2058)' - PASSED ssl_gtest.sh: #12992: 'CipherSuiteTLS13/TlsCipherSuiteTest: ReadLimit/287 (1, 772, 4866, 25497, 2059)' - PASSED ssl_gtest.sh: #12993: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/0 (0, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #12994: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/1 (0, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #12995: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/2 (0, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #12996: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/3 (0, 772, 4866, 25, 1283)' - PASSED ssl_gtest.sh: #12997: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/4 (0, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #12998: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/5 (0, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #12999: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/6 (0, 772, 4866, 258, 1283)' - PASSED ssl_gtest.sh: #13000: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/7 (0, 772, 4866, 259, 1283)' - PASSED ssl_gtest.sh: #13001: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/8 (0, 772, 4866, 260, 1283)' - PASSED ssl_gtest.sh: #13002: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/9 (0, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #13003: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/10 (1, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #13004: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/11 (1, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #13005: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/12 (1, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #13006: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/13 (1, 772, 4866, 25, 1283)' - PASSED ssl_gtest.sh: #13007: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/14 (1, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #13008: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/15 (1, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #13009: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/16 (1, 772, 4866, 258, 1283)' - PASSED ssl_gtest.sh: #13010: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/17 (1, 772, 4866, 259, 1283)' - PASSED ssl_gtest.sh: #13011: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/18 (1, 772, 4866, 260, 1283)' - PASSED ssl_gtest.sh: #13012: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: SingleCipherSuite/19 (1, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #13013: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/0 (0, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #13014: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/1 (0, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #13015: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/2 (0, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #13016: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/3 (0, 772, 4866, 25, 1283)' - PASSED ssl_gtest.sh: #13017: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/4 (0, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #13018: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/5 (0, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #13019: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/6 (0, 772, 4866, 258, 1283)' - PASSED ssl_gtest.sh: #13020: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/7 (0, 772, 4866, 259, 1283)' - PASSED ssl_gtest.sh: #13021: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/8 (0, 772, 4866, 260, 1283)' - PASSED ssl_gtest.sh: #13022: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/9 (0, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #13023: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/10 (1, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #13024: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/11 (1, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #13025: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/12 (1, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #13026: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/13 (1, 772, 4866, 25, 1283)' - PASSED ssl_gtest.sh: #13027: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/14 (1, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #13028: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/15 (1, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #13029: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/16 (1, 772, 4866, 258, 1283)' - PASSED ssl_gtest.sh: #13030: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/17 (1, 772, 4866, 259, 1283)' - PASSED ssl_gtest.sh: #13031: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/18 (1, 772, 4866, 260, 1283)' - PASSED ssl_gtest.sh: #13032: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ResumeCipherSuite/19 (1, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #13033: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/0 (0, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #13034: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/1 (0, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #13035: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/2 (0, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #13036: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/3 (0, 772, 4866, 25, 1283)' - PASSED ssl_gtest.sh: #13037: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/4 (0, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #13038: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/5 (0, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #13039: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/6 (0, 772, 4866, 258, 1283)' - PASSED ssl_gtest.sh: #13040: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/7 (0, 772, 4866, 259, 1283)' - PASSED ssl_gtest.sh: #13041: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/8 (0, 772, 4866, 260, 1283)' - PASSED ssl_gtest.sh: #13042: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/9 (0, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #13043: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/10 (1, 772, 4866, 29, 1283)' - PASSED ssl_gtest.sh: #13044: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/11 (1, 772, 4866, 23, 1283)' - PASSED ssl_gtest.sh: #13045: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/12 (1, 772, 4866, 24, 1283)' - PASSED ssl_gtest.sh: #13046: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/13 (1, 772, 4866, 25, 1283)' - PASSED ssl_gtest.sh: #13047: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/14 (1, 772, 4866, 256, 1283)' - PASSED ssl_gtest.sh: #13048: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/15 (1, 772, 4866, 257, 1283)' - PASSED ssl_gtest.sh: #13049: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/16 (1, 772, 4866, 258, 1283)' - PASSED ssl_gtest.sh: #13050: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/17 (1, 772, 4866, 259, 1283)' - PASSED ssl_gtest.sh: #13051: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/18 (1, 772, 4866, 260, 1283)' - PASSED ssl_gtest.sh: #13052: 'CipherSuiteTLS13AllGroups/TlsCipherSuiteTest: ReadLimit/19 (1, 772, 4866, 25497, 1283)' - PASSED ssl_gtest.sh: #13053: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/0 TLS 1.0, TLS_ECDHE_RSA_WITH_NULL_SHA, name = "NULL", key size = 0' - PASSED ssl_gtest.sh: #13054: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/1 TLS 1.0, TLS_RSA_WITH_RC4_128_SHA, name = "RC4", key size = 128' - PASSED ssl_gtest.sh: #13055: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/2 TLS 1.0, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, name = "3DES-EDE-CBC", key size = 168' - PASSED ssl_gtest.sh: #13056: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/3 TLS 1.0, TLS_RSA_WITH_AES_128_CBC_SHA, name = "AES-128", key size = 128' - PASSED ssl_gtest.sh: #13057: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/4 TLS 1.2, TLS_RSA_WITH_AES_256_CBC_SHA256, name = "AES-256", key size = 256' - PASSED ssl_gtest.sh: #13058: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/5 TLS 1.2, TLS_RSA_WITH_AES_128_GCM_SHA256, name = "AES-128-GCM", key size = 128' - PASSED ssl_gtest.sh: #13059: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/6 TLS 1.2, TLS_RSA_WITH_AES_256_GCM_SHA384, name = "AES-256-GCM", key size = 256' - PASSED ssl_gtest.sh: #13060: 'TestSecurityStatus/SecurityStatusTest: CheckSecurityStatus/7 TLS 1.2, TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, name = "ChaCha20-Poly1305", key size = 256' - PASSED ssl_gtest.sh: #13061: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13062: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13063: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13064: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13065: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13066: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13067: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13068: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13069: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS11AsyncImmediate (0, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13070: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS11AsyncDelay (0, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13071: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS11Sync (0, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13072: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS11None (0, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13073: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS10AsyncImmediate (0, 769, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13074: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS10AsyncDelay (0, 769, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13075: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS10Sync (0, 769, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13076: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuth/TLS10None (0, 769, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13077: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13078: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13079: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13080: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13081: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13082: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13083: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13084: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13085: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS11AsyncImmediate (0, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13086: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS11AsyncDelay (0, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13087: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS11Sync (0, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13088: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS11None (0, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13089: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS10AsyncImmediate (0, 769, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13090: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS10AsyncDelay (0, 769, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13091: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS10Sync (0, 769, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13092: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthRequestedRejected/TLS10None (0, 769, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13093: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13094: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13095: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13096: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13097: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13098: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13099: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13100: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13101: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS11AsyncImmediate (0, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13102: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS11AsyncDelay (0, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13103: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS11Sync (0, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13104: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS11None (0, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13105: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS10AsyncImmediate (0, 769, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13106: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS10AsyncDelay (0, 769, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13107: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS10Sync (0, 769, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13108: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthEcdsa/TLS10None (0, 769, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13109: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13110: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13111: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13112: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13113: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13114: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13115: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13116: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13117: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS11AsyncImmediate (0, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13118: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS11AsyncDelay (0, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13119: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS11Sync (0, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13120: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS11None (0, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13121: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS10AsyncImmediate (0, 769, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13122: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS10AsyncDelay (0, 769, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13123: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS10Sync (0, 769, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13124: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthWithEch/TLS10None (0, 769, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13125: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13126: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13127: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13128: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13129: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13130: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13131: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13132: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13133: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS11AsyncImmediate (0, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13134: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS11AsyncDelay (0, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13135: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS11Sync (0, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13136: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS11None (0, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13137: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS10AsyncImmediate (0, 769, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13138: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS10AsyncDelay (0, 769, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13139: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS10Sync (0, 769, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13140: 'ClientAuthGenericStream/TlsConnectClientAuth: ClientAuthBigRsa/TLS10None (0, 769, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13141: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13142: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13143: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13144: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13145: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13146: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13147: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13148: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13149: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS11AsyncImmediate (1, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13150: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS11AsyncDelay (1, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13151: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS11Sync (1, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13152: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuth/DTLS11None (1, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13153: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13154: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13155: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13156: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13157: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13158: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13159: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13160: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13161: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS11AsyncImmediate (1, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13162: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS11AsyncDelay (1, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13163: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS11Sync (1, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13164: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthRequestedRejected/DTLS11None (1, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13165: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13166: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13167: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13168: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13169: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13170: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13171: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13172: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13173: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS11AsyncImmediate (1, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13174: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS11AsyncDelay (1, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13175: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS11Sync (1, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13176: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthEcdsa/DTLS11None (1, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13177: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13178: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13179: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13180: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13181: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13182: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13183: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13184: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13185: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS11AsyncImmediate (1, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13186: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS11AsyncDelay (1, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13187: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS11Sync (1, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13188: 'ClientAuthGenericDatagram/TlsConnectClientAuth: ClientAuthBigRsa/DTLS11None (1, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13189: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13190: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13191: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13192: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13193: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13194: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13195: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13196: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthRequiredRejected/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13197: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13198: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13199: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13200: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13201: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13202: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13203: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13204: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureScheme/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13205: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13206: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13207: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13208: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13209: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13210: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13211: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13212: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1SignatureSchemeOnly/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13213: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13214: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13215: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13216: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13217: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13218: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13219: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13220: 'ClientAuth13/TlsConnectClientAuth13: ClientAuthPkcs1AndEcdsaScheme/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13221: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuth/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13222: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuth/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13223: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuth/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13224: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuth/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13225: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterResumption/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13226: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterResumption/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13227: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterResumption/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13228: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterResumption/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13229: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMultiple/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13230: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMultiple/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13231: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMultiple/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13232: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMultiple/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13233: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthConcurrent/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13234: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthConcurrent/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13235: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthConcurrent/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13236: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthConcurrent/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13237: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBeforeKeyUpdate/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13238: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBeforeKeyUpdate/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13239: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBeforeKeyUpdate/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13240: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBeforeKeyUpdate/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13241: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDuringClientKeyUpdate/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13242: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDuringClientKeyUpdate/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13243: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDuringClientKeyUpdate/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13244: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDuringClientKeyUpdate/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13245: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMissingExtension/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13246: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMissingExtension/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13247: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMissingExtension/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13248: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthMissingExtension/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13249: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterClientAuth/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13250: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterClientAuth/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13251: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterClientAuth/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13252: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthAfterClientAuth/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13253: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthContextMismatch/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13254: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthContextMismatch/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13255: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthContextMismatch/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13256: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthContextMismatch/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13257: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBadSignature/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13258: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBadSignature/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13259: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBadSignature/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13260: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthBadSignature/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13261: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDecline/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13262: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDecline/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13263: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDecline/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13264: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDecline/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13265: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthWithSessionTicketsEnabled/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13266: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthWithSessionTicketsEnabled/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13267: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthWithSessionTicketsEnabled/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13268: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthWithSessionTicketsEnabled/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13269: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDisjointSchemes/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13270: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDisjointSchemes/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13271: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDisjointSchemes/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13272: 'ClientAuth13/TlsConnectClientAuthStream13: PostHandshakeAuthDisjointSchemes/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13273: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13274: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13275: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13276: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13277: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13278: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13279: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13280: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthCheckSigAlg/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13281: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13282: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13283: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13284: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13285: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13286: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13287: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13288: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthBigRsaCheckSigAlg/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13289: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13290: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13291: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13292: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13293: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13294: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13295: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13296: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentRsaeSignatureScheme/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13297: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13298: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13299: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13300: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13301: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13302: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13303: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13304: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthInconsistentPssSignatureScheme/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13305: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13306: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13307: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13308: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13309: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13310: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13311: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13312: 'ClientAuth12/TlsConnectClientAuth12: ClientAuthNoSigAlgs/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13313: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS10AsyncImmediate (0, 769, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13314: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS10AsyncDelay (0, 769, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13315: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS10Sync (0, 769, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13316: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS10None (0, 769, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13317: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS11AsyncImmediate (0, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13318: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS11AsyncDelay (0, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13319: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS11Sync (0, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13320: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS11None (0, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13321: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13322: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13323: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13324: 'ClientAuthPre13Stream/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13325: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS11AsyncImmediate (1, 770, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13326: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS11AsyncDelay (1, 770, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13327: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS11Sync (1, 770, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13328: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS11None (1, 770, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13329: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13330: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13331: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13332: 'ClientAuthPre13Datagram/TlsConnectClientAuthPre13: ClientAuthRequiredRejected/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13333: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS13AsyncImmediate (0, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13334: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS13AsyncDelay (0, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13335: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS13Sync (0, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13336: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS13None (0, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13337: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS12AsyncImmediate (0, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13338: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS12AsyncDelay (0, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13339: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS12Sync (0, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13340: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/TLS12None (0, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13341: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS13AsyncImmediate (1, 772, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13342: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS13AsyncDelay (1, 772, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13343: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS13Sync (1, 772, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13344: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS13None (1, 772, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13345: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS12AsyncImmediate (1, 771, 4-byte object <00-00 00-00>)' - PASSED ssl_gtest.sh: #13346: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS12AsyncDelay (1, 771, 4-byte object <01-00 00-00>)' - PASSED ssl_gtest.sh: #13347: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS12Sync (1, 771, 4-byte object <02-00 00-00>)' - PASSED ssl_gtest.sh: #13348: 'ClientAuth12Plus/TlsConnectClientAuth12Plus: ClientAuthDisjointSchemes/DTLS12None (1, 771, 4-byte object <03-00 00-00>)' - PASSED ssl_gtest.sh: #13349: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 771, "rsa_sign", 7, 1025)' - PASSED ssl_gtest.sh: #13350: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (0, 771, "rsa_sign", 7, 1281)' - PASSED ssl_gtest.sh: #13351: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/2 (0, 771, "rsa_sign", 7, 1537)' - PASSED ssl_gtest.sh: #13352: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/3 (0, 771, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13353: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/4 (0, 771, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13354: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/5 (1, 771, "rsa_sign", 7, 1025)' - PASSED ssl_gtest.sh: #13355: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/6 (1, 771, "rsa_sign", 7, 1281)' - PASSED ssl_gtest.sh: #13356: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/7 (1, 771, "rsa_sign", 7, 1537)' - PASSED ssl_gtest.sh: #13357: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/8 (1, 771, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13358: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/9 (1, 771, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13359: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 771, "rsa_sign", 7, 1025)' - PASSED ssl_gtest.sh: #13360: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (0, 771, "rsa_sign", 7, 1281)' - PASSED ssl_gtest.sh: #13361: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/2 (0, 771, "rsa_sign", 7, 1537)' - PASSED ssl_gtest.sh: #13362: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/3 (0, 771, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13363: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/4 (0, 771, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13364: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/5 (1, 771, "rsa_sign", 7, 1025)' - PASSED ssl_gtest.sh: #13365: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/6 (1, 771, "rsa_sign", 7, 1281)' - PASSED ssl_gtest.sh: #13366: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/7 (1, 771, "rsa_sign", 7, 1537)' - PASSED ssl_gtest.sh: #13367: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/8 (1, 771, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13368: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/9 (1, 771, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13369: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 771, "rsa_sign", 7, 1025)' - PASSED ssl_gtest.sh: #13370: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (0, 771, "rsa_sign", 7, 1281)' - PASSED ssl_gtest.sh: #13371: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/2 (0, 771, "rsa_sign", 7, 1537)' - PASSED ssl_gtest.sh: #13372: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/3 (0, 771, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13373: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/4 (0, 771, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13374: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/5 (1, 771, "rsa_sign", 7, 1025)' - PASSED ssl_gtest.sh: #13375: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/6 (1, 771, "rsa_sign", 7, 1281)' - PASSED ssl_gtest.sh: #13376: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/7 (1, 771, "rsa_sign", 7, 1537)' - PASSED ssl_gtest.sh: #13377: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/8 (1, 771, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13378: 'SignatureSchemeRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/9 (1, 771, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13379: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 772, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13380: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (0, 772, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13381: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/2 (1, 772, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13382: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/3 (1, 772, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13383: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 772, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13384: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (0, 772, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13385: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/2 (1, 772, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13386: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/3 (1, 772, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13387: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 772, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13388: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (0, 772, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13389: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/2 (1, 772, "rsa_sign", 7, 2052)' - PASSED ssl_gtest.sh: #13390: 'SignatureSchemeRsaTls13/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/3 (1, 772, "rsa_sign", 7, 2053)' - PASSED ssl_gtest.sh: #13391: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 772, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13392: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (0, 771, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13393: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/2 (1, 772, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13394: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/3 (1, 771, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13395: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 772, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13396: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (0, 771, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13397: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/2 (1, 772, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13398: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/3 (1, 771, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13399: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 772, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13400: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (0, 771, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13401: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/2 (1, 772, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13402: 'SignatureSchemeBigRsa/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/3 (1, 771, "rsa2048", 7, 2054)' - PASSED ssl_gtest.sh: #13403: 'SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 771, "rsa", 7, 513)' - PASSED ssl_gtest.sh: #13404: 'SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (1, 771, "rsa", 7, 513)' - PASSED ssl_gtest.sh: #13405: 'SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 771, "rsa", 7, 513)' - PASSED ssl_gtest.sh: #13406: 'SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (1, 771, "rsa", 7, 513)' - PASSED ssl_gtest.sh: #13407: 'SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 771, "rsa", 7, 513)' - PASSED ssl_gtest.sh: #13408: 'SignatureSchemeRsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (1, 771, "rsa", 7, 513)' - PASSED ssl_gtest.sh: #13409: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 772, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13410: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (0, 771, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13411: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/2 (1, 772, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13412: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/3 (1, 771, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13413: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 772, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13414: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (0, 771, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13415: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/2 (1, 772, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13416: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/3 (1, 771, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13417: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 772, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13418: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (0, 771, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13419: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/2 (1, 772, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13420: 'SignatureSchemeEcdsaP256/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/3 (1, 771, "ecdsa256", 4, 1027)' - PASSED ssl_gtest.sh: #13421: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 772, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13422: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (0, 771, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13423: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/2 (1, 772, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13424: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/3 (1, 771, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13425: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 772, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13426: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (0, 771, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13427: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/2 (1, 772, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13428: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/3 (1, 771, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13429: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 772, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13430: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (0, 771, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13431: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/2 (1, 772, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13432: 'SignatureSchemeEcdsaP384/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/3 (1, 771, "ecdsa384", 4, 1283)' - PASSED ssl_gtest.sh: #13433: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 772, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13434: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (0, 771, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13435: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/2 (1, 772, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13436: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/3 (1, 771, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13437: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 772, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13438: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (0, 771, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13439: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/2 (1, 772, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13440: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/3 (1, 771, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13441: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 772, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13442: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (0, 771, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13443: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/2 (1, 772, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13444: 'SignatureSchemeEcdsaP521/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/3 (1, 771, "ecdsa521", 4, 1539)' - PASSED ssl_gtest.sh: #13445: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/0 (0, 771, "ecdsa256", 4, 515)' - PASSED ssl_gtest.sh: #13446: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/1 (0, 771, "ecdsa384", 4, 515)' - PASSED ssl_gtest.sh: #13447: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/2 (1, 771, "ecdsa256", 4, 515)' - PASSED ssl_gtest.sh: #13448: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigServer/3 (1, 771, "ecdsa384", 4, 515)' - PASSED ssl_gtest.sh: #13449: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/0 (0, 771, "ecdsa256", 4, 515)' - PASSED ssl_gtest.sh: #13450: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/1 (0, 771, "ecdsa384", 4, 515)' - PASSED ssl_gtest.sh: #13451: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/2 (1, 771, "ecdsa256", 4, 515)' - PASSED ssl_gtest.sh: #13452: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigClient/3 (1, 771, "ecdsa384", 4, 515)' - PASSED ssl_gtest.sh: #13453: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/0 (0, 771, "ecdsa256", 4, 515)' - PASSED ssl_gtest.sh: #13454: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/1 (0, 771, "ecdsa384", 4, 515)' - PASSED ssl_gtest.sh: #13455: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/2 (1, 771, "ecdsa256", 4, 515)' - PASSED ssl_gtest.sh: #13456: 'SignatureSchemeEcdsaSha1/TlsSignatureSchemeConfiguration: SignatureSchemeConfigBoth/3 (1, 771, "ecdsa384", 4, 515)' - PASSED ssl_gtest.sh: #13457: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/0 (0, 772, 191, 4)' - PASSED ssl_gtest.sh: #13458: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/1 (0, 772, 191, 32)' - PASSED ssl_gtest.sh: #13459: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/2 (0, 772, 307, 4)' - PASSED ssl_gtest.sh: #13460: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/3 (0, 772, 307, 32)' - PASSED ssl_gtest.sh: #13461: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/4 (0, 772, 16, 4)' - PASSED ssl_gtest.sh: #13462: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/5 (0, 772, 16, 32)' - PASSED ssl_gtest.sh: #13463: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/6 (0, 772, 200, 4)' - PASSED ssl_gtest.sh: #13464: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/7 (0, 772, 200, 32)' - PASSED ssl_gtest.sh: #13465: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/8 (0, 771, 191, 4)' - PASSED ssl_gtest.sh: #13466: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/9 (0, 771, 191, 32)' - PASSED ssl_gtest.sh: #13467: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/10 (0, 771, 307, 4)' - PASSED ssl_gtest.sh: #13468: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/11 (0, 771, 307, 32)' - PASSED ssl_gtest.sh: #13469: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/12 (0, 771, 16, 4)' - PASSED ssl_gtest.sh: #13470: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/13 (0, 771, 16, 32)' - PASSED ssl_gtest.sh: #13471: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/14 (0, 771, 200, 4)' - PASSED ssl_gtest.sh: #13472: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/15 (0, 771, 200, 32)' - PASSED ssl_gtest.sh: #13473: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/16 (1, 772, 191, 4)' - PASSED ssl_gtest.sh: #13474: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/17 (1, 772, 191, 32)' - PASSED ssl_gtest.sh: #13475: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/18 (1, 772, 307, 4)' - PASSED ssl_gtest.sh: #13476: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/19 (1, 772, 307, 32)' - PASSED ssl_gtest.sh: #13477: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/20 (1, 772, 16, 4)' - PASSED ssl_gtest.sh: #13478: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/21 (1, 772, 16, 32)' - PASSED ssl_gtest.sh: #13479: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/22 (1, 772, 200, 4)' - PASSED ssl_gtest.sh: #13480: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/23 (1, 772, 200, 32)' - PASSED ssl_gtest.sh: #13481: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/24 (1, 771, 191, 4)' - PASSED ssl_gtest.sh: #13482: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/25 (1, 771, 191, 32)' - PASSED ssl_gtest.sh: #13483: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/26 (1, 771, 307, 4)' - PASSED ssl_gtest.sh: #13484: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/27 (1, 771, 307, 32)' - PASSED ssl_gtest.sh: #13485: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/28 (1, 771, 16, 4)' - PASSED ssl_gtest.sh: #13486: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/29 (1, 771, 16, 32)' - PASSED ssl_gtest.sh: #13487: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/30 (1, 771, 200, 4)' - PASSED ssl_gtest.sh: #13488: 'SignaturesWithPolicySuccess/TlsConnectAuthWithPolicyTls12Plus: PolicySuccessTest/31 (1, 771, 200, 32)' - PASSED ssl_gtest.sh: #13489: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/0 (0, 771, 191, 4)' - PASSED ssl_gtest.sh: #13490: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/1 (0, 771, 191, 32)' - PASSED ssl_gtest.sh: #13491: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/2 (0, 771, 307, 4)' - PASSED ssl_gtest.sh: #13492: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/3 (0, 771, 307, 32)' - PASSED ssl_gtest.sh: #13493: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/4 (0, 771, 16, 4)' - PASSED ssl_gtest.sh: #13494: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/5 (0, 771, 16, 32)' - PASSED ssl_gtest.sh: #13495: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/6 (0, 771, 200, 4)' - PASSED ssl_gtest.sh: #13496: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/7 (0, 771, 200, 32)' - PASSED ssl_gtest.sh: #13497: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/8 (1, 771, 191, 4)' - PASSED ssl_gtest.sh: #13498: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/9 (1, 771, 191, 32)' - PASSED ssl_gtest.sh: #13499: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/10 (1, 771, 307, 4)' - PASSED ssl_gtest.sh: #13500: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/11 (1, 771, 307, 32)' - PASSED ssl_gtest.sh: #13501: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/12 (1, 771, 16, 4)' - PASSED ssl_gtest.sh: #13502: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/13 (1, 771, 16, 32)' - PASSED ssl_gtest.sh: #13503: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/14 (1, 771, 200, 4)' - PASSED ssl_gtest.sh: #13504: 'SignaturesWithPolicyFail/TlsConnectAuthWithPolicyTls12: PolicyFailureTest/15 (1, 771, 200, 32)' - PASSED ssl_gtest.sh: #13505: 'AgentTests/TlsAgentTest: EarlyFinished/0 ("CLIENT", 0, 772)' - PASSED ssl_gtest.sh: #13506: 'AgentTests/TlsAgentTest: EarlyFinished/1 ("CLIENT", 0, 771)' - PASSED ssl_gtest.sh: #13507: 'AgentTests/TlsAgentTest: EarlyFinished/2 ("CLIENT", 0, 770)' - PASSED ssl_gtest.sh: #13508: 'AgentTests/TlsAgentTest: EarlyFinished/3 ("CLIENT", 0, 769)' - PASSED ssl_gtest.sh: #13509: 'AgentTests/TlsAgentTest: EarlyFinished/4 ("SERVER", 0, 772)' - PASSED ssl_gtest.sh: #13510: 'AgentTests/TlsAgentTest: EarlyFinished/5 ("SERVER", 0, 771)' - PASSED ssl_gtest.sh: #13511: 'AgentTests/TlsAgentTest: EarlyFinished/6 ("SERVER", 0, 770)' - PASSED ssl_gtest.sh: #13512: 'AgentTests/TlsAgentTest: EarlyFinished/7 ("SERVER", 0, 769)' - PASSED ssl_gtest.sh: #13513: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/0 ("CLIENT", 0, 772)' - PASSED ssl_gtest.sh: #13514: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/1 ("CLIENT", 0, 771)' - PASSED ssl_gtest.sh: #13515: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/2 ("CLIENT", 0, 770)' - PASSED ssl_gtest.sh: #13516: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/3 ("CLIENT", 0, 769)' - PASSED ssl_gtest.sh: #13517: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/4 ("SERVER", 0, 772)' - PASSED ssl_gtest.sh: #13518: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/5 ("SERVER", 0, 771)' - PASSED ssl_gtest.sh: #13519: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/6 ("SERVER", 0, 770)' - PASSED ssl_gtest.sh: #13520: 'AgentTests/TlsAgentTest: EarlyCertificateVerify/7 ("SERVER", 0, 769)' - PASSED ssl_gtest.sh: #13521: 'ClientTests13/TlsAgentTestClient13: CannedHello/0 (0, 772)' - PASSED ssl_gtest.sh: #13522: 'ClientTests13/TlsAgentTestClient13: CannedHello/1 (1, 772)' - PASSED ssl_gtest.sh: #13523: 'ClientTests13/TlsAgentTestClient13: EncryptedExtensionsInClear/0 (0, 772)' - PASSED ssl_gtest.sh: #13524: 'ClientTests13/TlsAgentTestClient13: EncryptedExtensionsInClear/1 (1, 772)' - PASSED ssl_gtest.sh: #13525: 'Tls13ZeroRttReplayTest/TlsZeroRttReplayTest: ResPskZeroRttReplay/0 0' - PASSED ssl_gtest.sh: #13526: 'Tls13ZeroRttReplayTest/TlsZeroRttReplayTest: ResPskZeroRttReplay/1 1' - PASSED ssl_gtest.sh: #13527: 'Tls13ZeroRttReplayTest/TlsZeroRttReplayTest: ExtPskZeroRttReplay/0 0' - PASSED ssl_gtest.sh: #13528: 'Tls13ZeroRttReplayTest/TlsZeroRttReplayTest: ExtPskZeroRttReplay/1 1' - PASSED ssl_gtest.sh: #13529: 'Tls13ZeroRttReplayTest/TlsZeroRttReplayTest: ZeroRttReplayAfterRollover/0 0' - PASSED ssl_gtest.sh: #13530: 'Tls13ZeroRttReplayTest/TlsZeroRttReplayTest: ZeroRttReplayAfterRollover/1 1' - PASSED ssl_gtest.sh: #13531: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/0 8-byte object <01-00 00-00 01-00 00-00>' - PASSED ssl_gtest.sh: #13532: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/1 8-byte object <01-00 00-00 02-00 00-00>' - PASSED ssl_gtest.sh: #13533: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/2 8-byte object <01-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13534: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/3 8-byte object <01-00 00-00 04-00 00-00>' - PASSED ssl_gtest.sh: #13535: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/4 8-byte object <03-00 00-00 0A-00 00-00>' - PASSED ssl_gtest.sh: #13536: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/5 8-byte object <03-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13537: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/6 8-byte object <04-00 00-00 0F-00 00-00>' - PASSED ssl_gtest.sh: #13538: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/7 8-byte object <02-00 00-00 12-00 00-00>' - PASSED ssl_gtest.sh: #13539: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/8 8-byte object <10-00 00-00 10-00 00-00>' - PASSED ssl_gtest.sh: #13540: 'BloomFilterConfigurations/BloomFilterTest: InitOnly/9 8-byte object <10-00 00-00 09-00 00-00>' - PASSED ssl_gtest.sh: #13541: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/0 8-byte object <01-00 00-00 01-00 00-00>' - PASSED ssl_gtest.sh: #13542: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/1 8-byte object <01-00 00-00 02-00 00-00>' - PASSED ssl_gtest.sh: #13543: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/2 8-byte object <01-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13544: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/3 8-byte object <01-00 00-00 04-00 00-00>' - PASSED ssl_gtest.sh: #13545: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/4 8-byte object <03-00 00-00 0A-00 00-00>' - PASSED ssl_gtest.sh: #13546: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/5 8-byte object <03-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13547: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/6 8-byte object <04-00 00-00 0F-00 00-00>' - PASSED ssl_gtest.sh: #13548: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/7 8-byte object <02-00 00-00 12-00 00-00>' - PASSED ssl_gtest.sh: #13549: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/8 8-byte object <10-00 00-00 10-00 00-00>' - PASSED ssl_gtest.sh: #13550: 'BloomFilterConfigurations/BloomFilterTest: AddToEmpty/9 8-byte object <10-00 00-00 09-00 00-00>' - PASSED ssl_gtest.sh: #13551: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/0 8-byte object <01-00 00-00 01-00 00-00>' - PASSED ssl_gtest.sh: #13552: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/1 8-byte object <01-00 00-00 02-00 00-00>' - PASSED ssl_gtest.sh: #13553: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/2 8-byte object <01-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13554: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/3 8-byte object <01-00 00-00 04-00 00-00>' - PASSED ssl_gtest.sh: #13555: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/4 8-byte object <03-00 00-00 0A-00 00-00>' - PASSED ssl_gtest.sh: #13556: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/5 8-byte object <03-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13557: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/6 8-byte object <04-00 00-00 0F-00 00-00>' - PASSED ssl_gtest.sh: #13558: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/7 8-byte object <02-00 00-00 12-00 00-00>' - PASSED ssl_gtest.sh: #13559: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/8 8-byte object <10-00 00-00 10-00 00-00>' - PASSED ssl_gtest.sh: #13560: 'BloomFilterConfigurations/BloomFilterTest: AddTwo/9 8-byte object <10-00 00-00 09-00 00-00>' - PASSED ssl_gtest.sh: #13561: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/0 8-byte object <01-00 00-00 01-00 00-00>' - PASSED ssl_gtest.sh: #13562: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/1 8-byte object <01-00 00-00 02-00 00-00>' - PASSED ssl_gtest.sh: #13563: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/2 8-byte object <01-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13564: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/3 8-byte object <01-00 00-00 04-00 00-00>' - PASSED ssl_gtest.sh: #13565: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/4 8-byte object <03-00 00-00 0A-00 00-00>' - PASSED ssl_gtest.sh: #13566: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/5 8-byte object <03-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13567: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/6 8-byte object <04-00 00-00 0F-00 00-00>' - PASSED ssl_gtest.sh: #13568: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/7 8-byte object <02-00 00-00 12-00 00-00>' - PASSED ssl_gtest.sh: #13569: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/8 8-byte object <10-00 00-00 10-00 00-00>' - PASSED ssl_gtest.sh: #13570: 'BloomFilterConfigurations/BloomFilterTest: AddOneTwice/9 8-byte object <10-00 00-00 09-00 00-00>' - PASSED ssl_gtest.sh: #13571: 'BloomFilterConfigurations/BloomFilterTest: Zero/0 8-byte object <01-00 00-00 01-00 00-00>' - PASSED ssl_gtest.sh: #13572: 'BloomFilterConfigurations/BloomFilterTest: Zero/1 8-byte object <01-00 00-00 02-00 00-00>' - PASSED ssl_gtest.sh: #13573: 'BloomFilterConfigurations/BloomFilterTest: Zero/2 8-byte object <01-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13574: 'BloomFilterConfigurations/BloomFilterTest: Zero/3 8-byte object <01-00 00-00 04-00 00-00>' - PASSED ssl_gtest.sh: #13575: 'BloomFilterConfigurations/BloomFilterTest: Zero/4 8-byte object <03-00 00-00 0A-00 00-00>' - PASSED ssl_gtest.sh: #13576: 'BloomFilterConfigurations/BloomFilterTest: Zero/5 8-byte object <03-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13577: 'BloomFilterConfigurations/BloomFilterTest: Zero/6 8-byte object <04-00 00-00 0F-00 00-00>' - PASSED ssl_gtest.sh: #13578: 'BloomFilterConfigurations/BloomFilterTest: Zero/7 8-byte object <02-00 00-00 12-00 00-00>' - PASSED ssl_gtest.sh: #13579: 'BloomFilterConfigurations/BloomFilterTest: Zero/8 8-byte object <10-00 00-00 10-00 00-00>' - PASSED ssl_gtest.sh: #13580: 'BloomFilterConfigurations/BloomFilterTest: Zero/9 8-byte object <10-00 00-00 09-00 00-00>' - PASSED ssl_gtest.sh: #13581: 'BloomFilterConfigurations/BloomFilterTest: Fill/0 8-byte object <01-00 00-00 01-00 00-00>' - PASSED ssl_gtest.sh: #13582: 'BloomFilterConfigurations/BloomFilterTest: Fill/1 8-byte object <01-00 00-00 02-00 00-00>' - PASSED ssl_gtest.sh: #13583: 'BloomFilterConfigurations/BloomFilterTest: Fill/2 8-byte object <01-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13584: 'BloomFilterConfigurations/BloomFilterTest: Fill/3 8-byte object <01-00 00-00 04-00 00-00>' - PASSED ssl_gtest.sh: #13585: 'BloomFilterConfigurations/BloomFilterTest: Fill/4 8-byte object <03-00 00-00 0A-00 00-00>' - PASSED ssl_gtest.sh: #13586: 'BloomFilterConfigurations/BloomFilterTest: Fill/5 8-byte object <03-00 00-00 03-00 00-00>' - PASSED ssl_gtest.sh: #13587: 'BloomFilterConfigurations/BloomFilterTest: Fill/6 8-byte object <04-00 00-00 0F-00 00-00>' - PASSED ssl_gtest.sh: #13588: 'BloomFilterConfigurations/BloomFilterTest: Fill/7 8-byte object <02-00 00-00 12-00 00-00>' - PASSED ssl_gtest.sh: #13589: 'BloomFilterConfigurations/BloomFilterTest: Fill/8 8-byte object <10-00 00-00 10-00 00-00>' - PASSED ssl_gtest.sh: #13590: 'BloomFilterConfigurations/BloomFilterTest: Fill/9 8-byte object <10-00 00-00 09-00 00-00>' - PASSED TIMESTAMP ssl_gtests END: Thu Dec 26 15:10:32 UTC 2024 ssl_gtests.sh: Testing with PKIX =============================== Running test cycle: PKIX ---------------------- List of tests that will be executed: libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec gtests ssl_gtests Running tests for libpkix TIMESTAMP libpkix BEGIN: Thu Dec 26 15:10:32 UTC 2024 TIMESTAMP libpkix END: Thu Dec 26 15:10:32 UTC 2024 Running tests for cert TIMESTAMP cert BEGIN: Thu Dec 26 15:10:32 UTC 2024 rm: cannot remove '/builddir/build/BUILD/nss-3.101/tests_results/security/localhost.PKIX.cert.cache.tar.gz': No such file or directory cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.101/dist/Linux5.14_x86_cc_glibc_PTH_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #82: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #84: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #85: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #86: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.101/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert